官术网_书友最值得收藏!

Enhancing your security posture

If you carefully read this entire chapter, it should be very clear that you can't use the old approach to security facing today's challenges and threats. For this reason, it is important to ensure that your security posture is prepared to deal with these challenges. To accomplish this, you must solidify your current protection system across different devices regardless of the form factor.

It is also important to enable IT and security operations to quickly identify an attack, by enhancing the detection system. Last but certainly not least, it is necessary to reduce the time between infection and containment by rapidly responding to an attack by enhancing the effectiveness of the response process.

Based on this, we can safely say that the security posture is composed of three foundational pillars as shown in the following diagram:

These pillars must be solidified and if in the past, the majority of the budget was put into protection, now it's even more imperative to spread that investment and level of effort across the other pillars. These investments are not exclusively in technical security controls, they must also be done in the other spheres of the business, which includes administrative controls.

It is recommended to perform a self-assessment to identify the gaps within each pillar from the tool perspective. Many companies evolved over time and never really updated their security tools to accommodate the new threat landscape and how attackers are exploiting vulnerabilities.

A company with an enhanced security posture shouldn't be part of the statistics that were previously mentioned (229 days between the infiltration and detection). This gap should be drastically reduced and the response should be immediate. To accomplish this, a better incident response process must be in place, with modern tools that can help security engineers to investigate security-related issues. Chapter 2, Incident Response Process will cover incident response in more detail and Chapter 13, Investigating an Incident, will cover some case studies related to actual security investigations.

主站蜘蛛池模板: 武清区| 广南县| 长垣县| 镇远县| 淮南市| 丰原市| 郧西县| 明光市| 襄垣县| 平舆县| 沅陵县| 常州市| 西藏| 昌图县| 漳浦县| 禹州市| 竹北市| 乌什县| 葫芦岛市| 夏津县| 永和县| 佛冈县| 望江县| 金华市| 游戏| 建湖县| 腾冲县| 郑州市| 广元市| 佛教| 漳州市| 讷河市| 祁门县| 恩施市| 都江堰市| 文昌市| 樟树市| 湖南省| 简阳市| 南木林县| 五大连池市|