Advanced Security: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
No edit summary
 
(21 intermediate revisions by the same user not shown)
Line 1: Line 1:
{| class="wikitable" style="border: none; background-color: transparent; width: 100%;"
{| class="wikitable" style="border: none; background-color: transparent; width: 100%;"
|-
|-
| rowspan="3" style="border: none; background-color: #EBEBEB; text-align: center; vertical-align: top; width: 20%;" | [[File:Elephants.png|frameless|225px|center|link=Advanced_Protection]]
| rowspan="3" style="border: none; background-color: transparent; text-align: center; vertical-align: middle; width: 20%;" | [[File:Elephants.png|frameless|225px|center|link=Advanced_Protection]]
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%;" |
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%; font-weight: bold;"|
'''Network Segmentation'''
Network Segmentation
<br><br>
[[File:ACT_Network_Segmentation_Icon.svg|frameless|60px|center|link=Network Segmentation]]
<br>
<br>
[[File:network-segmentation.png|frameless|40px|center]]
<div style="text-align: left; font-weight: normal; font-size: 75%;">Divide networks into smaller, isolated segments to limit the impact of a potential breach.</div>
| style="border: none; background-color: transparent; vertical-align: top; text-align: center; width: 20%; font-weight: bold;"|
Intrusion Detection & Prevention Systems
<br>
<br>
<div style="text-align: left;">Divide networks into smaller, isolated segments to limit the impact of a potential breach.</div>
[[File:ACT_Intrusion_Protection_Icon.svg|frameless|60px|center|link=Intrusion Detection & Prevention Systems]]
| style="border: none; background-color: transparent; vertical-align: top; text-align: center; width: 20%;" |
'''Intrusion Detection & Prevention Systems'''
<br>
<br>
[[File:intrusion-protection.png|frameless|40px|center]]
<div style="text-align: left; font-weight: normal; font-size: 75%;">Deploy advanced systems to detect and prevent network intrusions.</div>
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" |
Endpoint Protection
<br>
<br>
<div style="text-align: left;">Deploy advanced systems to detect and prevent network intrusions.</div>
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%;" |
'''Endpoint Protection'''
<br>
<br>
[[File:endpoint-protection.png|frameless|40px|center]]
[[File:ACT_Endpoint_Protection_Icon.svg|frameless|60px|center|link=Endpoint Protection]]
<br>
<br>
<div style="text-align: left;">Implement robust antivirus and endpoint security solutions to safeguard individual devices.</div>
<div style="text-align: left; font-weight: normal; font-size: 75%;">Implement robust antivirus and endpoint security solutions to safeguard individual devices.</div>
| style="border: none; background-color: transparent; vertical-align: top; text-align: center; width: 20%;" |
| style="border: none; background-color: transparent; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" |
'''Security Information & Event Management'''
Security Information & Event Management
<br>
<br>
[[File:security-information-event-management.png|frameless|40px|center]]
[[File:ACT_Security_Information_Event_Management_Icon.svg|frameless|60px|center|link=Security Information & Event Management]]
<br>
<br>
<div style="text-align: left;">Utilize SIEM tools to monitor and analyze security events across the network.</div>
<div style="text-align: left; font-weight: normal; font-size: 75%;">Utilize SIEM tools to monitor and analyze security events across the network.</div>
|-
|-
| style="border: none; background-color: transparent; vertical-align: top; text-align: center; width: 20%;" |
| style="border: none; background-color: transparent; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" |
'''Vulnerability Management'''
Threat & Vulnerability Management
<br>
<br>
[[File:vulnerability-management.png|frameless|40px|center]]
<br>
<br>
<div style="text-align: left;">Conduct regular assessments to identify and address system vulnerabilities.</div>
[[File:ACT_Vulnerability_Management_Icon.svg|frameless|60px|center|link=Threat & Vulnerability Management]]
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%;" |
'''Penetration Testing'''
<br>
<br>
[[File:penetration-testing.png|frameless|40px|center]]
<div style="text-align: left; font-weight: normal; font-size: 75%;">Conduct regular assessments to identify and address system vulnerabilities.</div>
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" |
Attack & Penetration Testing
<br>
<br>
<div style="text-align: left;">Simulate real-world attacks to evaluate the security of a system or network.</div>
| style="border: none; background-color: transparent; vertical-align: top; text-align: center; width: 20%;" |
'''Incident Response Planning'''
<br>
<br>
[[File:incident-response.png|frameless|40px|center]]
[[File:ACT_Penetration_Testing_Icon.svg|frameless|60px|center|link=Attack & Penetration Testing]]
<br>
<br>
<div style="text-align: left;">Develop and test an incident response plan to efficiently handle cybersecurity incidents.</div>
<div style="text-align: left; font-weight: normal; font-size: 75%;">Simulate real-world attacks to evaluate the security of a system or network.</div>
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%;" |
| style="border: none; background-color: transparent; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" |
'''Secure Configuration Management'''
Incident Response Planning & Testing
<br>
<br>
[[File:configuration-management.png|frameless|40px|center]]
[[File:ACT_Incident_Response_Icon.svg|frameless|60px|center|link=Incident Response Planning & Testing]]
<br>
<br>
<div style="text-align: left;">Establish and maintain secure configuration settings for all systems and devices.</div>
<div style="text-align: left; font-weight: normal; font-size: 75%;">Develop and test an incident response plan to efficiently handle cybersecurity incidents.</div>
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" |
Secure Configuration Management
<br>
[[File:ACT_Configuration_Management_Icon.svg|frameless|60px|center|link=Secure Configuration Management]]
<br>
<div style="text-align: left; font-weight: normal; font-size: 75%;">Establish and maintain secure configuration settings for all systems and devices.</div>
|-
|-
| style="border: none; background-color: transparent; vertical-align: top; text-align: center; width: 20%;" |
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" |
'''Change Management'''
Change Management
<br>
<br>
[[File:ACT_Change_Management_Icon.svg|frameless|60px|center|link=Change Management]]
<br>
<br>
[[File:change-management.png|frameless|40px|center]]
<div style="text-align: left; font-weight: normal; font-size: 75%;">Implement structured processes to manage changes in a controlled and efficient manner.</div>
| style="border: none; background-color: transparent; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" |
Identity & Access Management
<br>
<br>
<div style="text-align: left;">Implement structured processes to manage changes in a controlled and efficient manner.</div>
[[File:ACT_Identity_Access_Management_Icon.svg|frameless|60px|center|link=Identity & Access Management]]
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%;" |
'''Identity & Access Management'''
<br>
<br>
[[File:identity-access-management.png|frameless|40px|center]]
<div style="text-align: left; font-weight: normal; font-size: 75%;">Implement proper user access controls, management processes, and regularly review user privileges.</div>
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" |
Patch Management
<br>
<br>
<div style="text-align: left;">Implement proper user access controls, management processes, and regularly review user privileges.</div>
| style="border: none; background-color: transparent; vertical-align: top; text-align: center; width: 20%;" |
'''Patch Management'''
<br>
<br>
[[File:patch-management.png|frameless|40px|center]]
[[File:ACT_Patch_Management_Icon.svg|frameless|60px|center|link=Patch Management]]
<br>
<br>
<div style="text-align: left;">Establish processes to apply patches and updates to systems and applications in a timely manner.</div>
<div style="text-align: left; font-weight: normal; font-size: 75%;">Establish processes to apply patches and updates to systems and applications in a timely manner.</div>
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%;" |
| style="border: none; background-color: transparent; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" |
'''Security Awareness Training & Testing'''
Security Awareness Training & Testing
<br>
<br>
[[File:security-awareness.png|frameless|40px|center]]
[[File:ACT_Security_Awareness_Icon.svg|frameless|60px|center|link=Security Awareness Training & Testing]]
<br>
<br>
<div style="text-align: left;">Provide regular training and education on cybersecurity best practices to all personnel; and periodically test that knowledge.</div>
<div style="text-align: left; font-weight: normal; font-size: 75%;">Provide regular training and education on cybersecurity best practices to all personnel; and periodically test that knowledge.</div>
|}
|}

Latest revision as of 19:56, 26 September 2023

Elephants.png

Network Segmentation

ACT Network Segmentation Icon.svg


Divide networks into smaller, isolated segments to limit the impact of a potential breach.

Intrusion Detection & Prevention Systems

ACT Intrusion Protection Icon.svg


Deploy advanced systems to detect and prevent network intrusions.

Endpoint Protection

ACT Endpoint Protection Icon.svg


Implement robust antivirus and endpoint security solutions to safeguard individual devices.

Security Information & Event Management

ACT Security Information Event Management Icon.svg


Utilize SIEM tools to monitor and analyze security events across the network.

Threat & Vulnerability Management

ACT Vulnerability Management Icon.svg


Conduct regular assessments to identify and address system vulnerabilities.

Attack & Penetration Testing

ACT Penetration Testing Icon.svg


Simulate real-world attacks to evaluate the security of a system or network.

Incident Response Planning & Testing

ACT Incident Response Icon.svg


Develop and test an incident response plan to efficiently handle cybersecurity incidents.

Secure Configuration Management

ACT Configuration Management Icon.svg


Establish and maintain secure configuration settings for all systems and devices.

Change Management

ACT Change Management Icon.svg


Implement structured processes to manage changes in a controlled and efficient manner.

Identity & Access Management

ACT Identity Access Management Icon.svg


Implement proper user access controls, management processes, and regularly review user privileges.

Patch Management

ACT Patch Management Icon.svg


Establish processes to apply patches and updates to systems and applications in a timely manner.

Security Awareness Training & Testing

ACT Security Awareness Icon.svg


Provide regular training and education on cybersecurity best practices to all personnel; and periodically test that knowledge.