Advanced Security: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
No edit summary |
||
(25 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
{| class="wikitable" style="border: none; background-color: transparent; width: 100%;" | {| class="wikitable" style="border: none; background-color: transparent; width: 100%;" | ||
|- | |- | ||
| | | rowspan="3" style="border: none; background-color: transparent; text-align: center; vertical-align: middle; width: 20%;" | [[File:Elephants.png|frameless|225px|center|link=Advanced_Protection]] | ||
|- | | style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%; font-weight: bold;"| | ||
| style="border: none; background-color: transparent; vertical-align: top; text-align: center;" | [[File: | Network Segmentation | ||
<br><br> | |||
[[File:ACT_Network_Segmentation_Icon.svg|frameless|60px|center|link=Network Segmentation]] | |||
<br> | |||
<div style="text-align: left; font-weight: normal; font-size: 75%;">Divide networks into smaller, isolated segments to limit the impact of a potential breach.</div> | |||
| style="border: none; background-color: transparent; vertical-align: top; text-align: center; width: 20%; font-weight: bold;"| | |||
Intrusion Detection & Prevention Systems | |||
<br> | |||
[[File:ACT_Intrusion_Protection_Icon.svg|frameless|60px|center|link=Intrusion Detection & Prevention Systems]] | |||
<br> | <br> | ||
<div style="text-align: left; font-weight: normal; font-size: 75%;">Deploy advanced systems to detect and prevent network intrusions.</div> | |||
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" | | |||
Endpoint Protection | |||
<br> | <br> | ||
<br> | <br> | ||
[[File:ACT_Endpoint_Protection_Icon.svg|frameless|60px|center|link=Endpoint Protection]] | |||
<br> | <br> | ||
<div style="text-align: left;"> | <div style="text-align: left; font-weight: normal; font-size: 75%;">Implement robust antivirus and endpoint security solutions to safeguard individual devices.</div> | ||
| style="border: none; background-color: transparent; vertical-align: top; text-align: center; | | style="border: none; background-color: transparent; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" | | ||
Security Information & Event Management | |||
<br> | <br> | ||
[[File:ACT_Security_Information_Event_Management_Icon.svg|frameless|60px|center|link=Security Information & Event Management]] | |||
<br> | <br> | ||
<div style="text-align: left;"> | <div style="text-align: left; font-weight: normal; font-size: 75%;">Utilize SIEM tools to monitor and analyze security events across the network.</div> | ||
|- | |- | ||
| style="border: none; background-color: transparent; vertical-align: top; text-align: center;" | [[File: | | style="border: none; background-color: transparent; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" | | ||
Threat & Vulnerability Management | |||
<br> | |||
<br> | |||
[[File:ACT_Vulnerability_Management_Icon.svg|frameless|60px|center|link=Threat & Vulnerability Management]] | |||
<br> | <br> | ||
<div style="text-align: left; font-weight: normal; font-size: 75%;">Conduct regular assessments to identify and address system vulnerabilities.</div> | |||
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" | | |||
Attack & Penetration Testing | |||
<br> | <br> | ||
<br> | <br> | ||
[[File:ACT_Penetration_Testing_Icon.svg|frameless|60px|center|link=Attack & Penetration Testing]] | |||
<br> | <br> | ||
<div style="text-align: left;"> | <div style="text-align: left; font-weight: normal; font-size: 75%;">Simulate real-world attacks to evaluate the security of a system or network.</div> | ||
| style="border: none; background-color: transparent; vertical-align: top; text-align: center; | | style="border: none; background-color: transparent; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" | | ||
Incident Response Planning & Testing | |||
<br> | <br> | ||
[[File:ACT_Incident_Response_Icon.svg|frameless|60px|center|link=Incident Response Planning & Testing]] | |||
<br> | <br> | ||
<div style="text-align: left;"> | <div style="text-align: left; font-weight: normal; font-size: 75%;">Develop and test an incident response plan to efficiently handle cybersecurity incidents.</div> | ||
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" | | |||
| style="border: none; background-color: | Secure Configuration Management | ||
<br> | <br> | ||
[[File:ACT_Configuration_Management_Icon.svg|frameless|60px|center|link=Secure Configuration Management]] | |||
<br> | <br> | ||
<div style="text-align: left;"> | <div style="text-align: left; font-weight: normal; font-size: 75%;">Establish and maintain secure configuration settings for all systems and devices.</div> | ||
| style="border: none; background-color: | |- | ||
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" | | |||
Change Management | |||
<br> | <br> | ||
<br> | <br> | ||
[[File:ACT_Change_Management_Icon.svg|frameless|60px|center|link=Change Management]] | |||
<br> | <br> | ||
<div style="text-align: left; font-weight: normal; font-size: 75%;">Implement structured processes to manage changes in a controlled and efficient manner.</div> | |||
| style="border: none; background-color: transparent; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" | | |||
Identity & Access Management | |||
<br> | <br> | ||
[[File:ACT_Identity_Access_Management_Icon.svg|frameless|60px|center|link=Identity & Access Management]] | |||
<br> | <br> | ||
<div style="text-align: left; font-weight: normal; font-size: 75%;">Implement proper user access controls, management processes, and regularly review user privileges.</div> | |||
| style="border: none; background-color: #EBEBEB; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" | | |||
Patch Management | |||
<br> | <br> | ||
<br> | <br> | ||
[[File:ACT_Patch_Management_Icon.svg|frameless|60px|center|link=Patch Management]] | |||
<br> | <br> | ||
<div style="text-align: left;">Establish processes to apply patches and updates to systems and applications in a timely manner.</div> | <div style="text-align: left; font-weight: normal; font-size: 75%;">Establish processes to apply patches and updates to systems and applications in a timely manner.</div> | ||
| style="border: none; background-color: transparent; vertical-align: top; text-align: center; | | style="border: none; background-color: transparent; vertical-align: top; text-align: center; width: 20%; font-weight: bold;" | | ||
Security Awareness Training & Testing | |||
<br> | <br> | ||
[[File:ACT_Security_Awareness_Icon.svg|frameless|60px|center|link=Security Awareness Training & Testing]] | |||
<br> | <br> | ||
<div style="text-align: left;">Provide regular training and education on cybersecurity best practices to all personnel; and periodically test that knowledge.</div> | <div style="text-align: left; font-weight: normal; font-size: 75%;">Provide regular training and education on cybersecurity best practices to all personnel; and periodically test that knowledge.</div> | ||
|} | |} |
Latest revision as of 19:56, 26 September 2023
Network Segmentation
Divide networks into smaller, isolated segments to limit the impact of a potential breach.
|
Intrusion Detection & Prevention Systems
Deploy advanced systems to detect and prevent network intrusions.
|
Endpoint Protection
Implement robust antivirus and endpoint security solutions to safeguard individual devices.
|
Security Information & Event Management
Utilize SIEM tools to monitor and analyze security events across the network.
| |
Threat & Vulnerability Management
Conduct regular assessments to identify and address system vulnerabilities.
|
Attack & Penetration Testing
Simulate real-world attacks to evaluate the security of a system or network.
|
Incident Response Planning & Testing
Develop and test an incident response plan to efficiently handle cybersecurity incidents.
|
Secure Configuration Management
Establish and maintain secure configuration settings for all systems and devices.
| |
Change Management
Implement structured processes to manage changes in a controlled and efficient manner.
|
Identity & Access Management
Implement proper user access controls, management processes, and regularly review user privileges.
|
Patch Management
Establish processes to apply patches and updates to systems and applications in a timely manner.
|
Security Awareness Training & Testing
Provide regular training and education on cybersecurity best practices to all personnel; and periodically test that knowledge.
|