官术网_书友最值得收藏!

Assume breach

Due to the emerging threats and cyber security challenges, it was necessary to change the methodology from prevent breach to assume breach. The traditional prevent breach approach by itself does not promote the ongoing testing, and to deal with modern threats you must always be refining your protection. For this reason, the adoption of this model to the cybersecurity field was a natural move.

When the former director of the CIA and National Security Agency Retired Gen. Michael Hayden said in 2012(26):

"Fundamentally, if somebody wants to get in, they're getting in. Alright, good. Accept that."

During an interview, many people didn't quite understand what he really meant, but this sentence is the core of the assume breach approach. Assume breach validates the protection, detection, and response to ensure they are implemented correctly. But to operationalize this, it becomes vital that you leverage Red/Blue Team exercises to simulate attacks against its own infrastructure and test the company's security controls, sensors, and incident-response process.

In the following diagram, you have an example of the interaction between phases in the Red Team/Blue Team exercise:

It will be during the post breach phase that the Red and Blue Team will work together to produce the final report. It is important to emphasize that this should not be a one off exercise, instead, must be a continuous process that will be refined and improved with best practices over time.

主站蜘蛛池模板: 广水市| 南丰县| 洪湖市| 武隆县| 凤凰县| 股票| 乌兰县| 嘉禾县| 昆山市| 西畴县| 垦利县| 花莲市| 南丰县| 陆河县| 武宣县| 景泰县| 闸北区| 永兴县| 年辖:市辖区| 黄冈市| 凤翔县| 沂源县| 封丘县| 德江县| 宾川县| 芒康县| 长顺县| 锦屏县| 蕲春县| 华亭县| 米脂县| 大悟县| 绥中县| 鹤壁市| 时尚| 延边| 余庆县| 嵊泗县| 太仓市| 当雄县| 阳原县|