One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 1093969
Date de publication 2019-04-16 13:00:00 (vue: 2019-04-19 10:04:23)
Titre Security is Simple as 1, 2, 3
Texte Keeping an organization’s IT assets secure in this day and age is a challenge.  The sands of the information security landscape are constantly shifting, and it can be difficult for practitioners to find solid footing; to identify those initiatives that will net the greatest return on security spend.  Each day seems to bring another emerging concern in the threat landscape.  The organization itself often seems to work against us, wanting to expand our already too-broad attack surface by embracing new technologies, connecting with partners, or acquiring other businesses entirely.  In such a climate it can be easy to allow our attention to be drawn to the expanding edge or our environment and the newest threats to be found there.  Advanced Persistent Threats (APT), supply chain risks, and cloud/container platform issues, to name a few, are more recent additions to our list of concerns.  And let’s be honest, as technologists we are drawn to the new, the novel, the esoteric – because it is interesting.  While there are real risks to be addressed here, they may not represent the greatest area of exposure for your users and information assets or the best ROI.  Over the past four years of performing research for monthly threat briefings there are three themes that constantly arise which, if mastered, can greatly reduce the information security risk to the enterprise.  These are: Keep systems and software components up to date.  This includes regular patching as well as upgrading platforms when they are no longer supported.  Two key components of a success patching program are making sure that all devices in the environment are (1) identified and (2) under management. Enforce the principle of least privilege.  User accounts, applications, service accounts and network resource permissions must all be taken into account and kept up to date.  The use of segmentation and micro-segmentation strategies are an excellent additional layer of control to apply.  Constantly train users on security culture and safe computing practices.  User training and awareness cannot be limited to phishing emails or social engineering alone.  Topics should include physical security related issues (locking doors, desks, and cabinets), challenging strangers for credentials when appropriate, responsible data distribution practices and how to report suspected oversights.  Ultimately this must be a paradigm shift; an exercise in building an organizational culture that emphasizes security and the priority of reporting suspected indicators of incidents in a consequence-free climate. Often, the root cause of a security incident can be traced back to failures associated with one or more of these three points rather than some fringe security exposure.  Environments are dynamic, and it is unlikely we can ever be certain that we have 100% coverage for any security practice or solution we put in place; especially over time.   As a result, when asked by customers what they should be focusing on, I always recommend they consider these practices critical, foundational elements of their security program and work to validate and improve upon the effectiveness of these capabilities on an ongoing basis.    The truth is that such core security practices not particularly interesting and focusing on the fringe of the threat landscape is far more appealing.  The idea that we are on the front lines, in a fight again
Envoyé Oui
Condensat  user 100 accomplished account accounts acquiring add additional additions addressed advanced against age agents all allow alone already always another any appealing applications apply appropriate apt are are: area arise asked assets associated attack attention awareness back basis because best better bond briefings bring broad building businesses cabals cabinets can cannot capabilities cause certain chain challenge challenging change cleaning climate cloud/container combination compacting components computing concepts concern concerns connecting consequence consider constantly control core coverage credentials critical cultural culture customers cybercrime dashing data date day day’s days desks despite devices did: difficult distribution doors drawn driving dynamic each easy edge effectiveness elements elliot emails embracing emerging emphasizes enforce engineering enterprise entirely environment environments esoteric especially ever excellent exercise expand expanding exposure failures far fight find focusing footing; foreign found foundational four free fringe front function good greatest greatly have here his honest horizon how idea identified identify improve incident incidents include includes indicators information initiatives intelligence interesting introduced invest invoked issues itself james keep keeping kept key landscape layer least let’s limited lines list locking long longer look making management mastered may mess micro model monthly more mundane must mystique name ness net network never new newest not novel often one ongoing order organization organization’s organizational other over oversights overwhelming paradigm particularly partners past patching people performing perhaps permissions persistent phishing physical place; platform platforms points portrait practice practices practitioners pretty principle priority privilege problem program protagonist put rather ready real recent recommend reduce regular related report reporting represent research resource resources responsible result return risk risks roi role root safe sands scope secure security seems segmentation self service shift; shifting should simple social software solid solution some something spend spends strangers strategies success such supply supported sure surface suspected syndicates systems taken technologies technologists term than themes these things those though threat threats three time too topics traced train training trash trick truth trying two ultimately under unlikely upgrading upon use user users validate wall wanting well what when which who widespread will win work years your
Tags Threat Patching
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: