Advanced Security: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
No edit summary |
||
Line 3: | Line 3: | ||
| colspan="3" style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | [[File:Elephants.png|frameless|225px|center|link=Advanced_Protection]] | | colspan="3" style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | [[File:Elephants.png|frameless|225px|center|link=Advanced_Protection]] | ||
|- | |- | ||
| style="border: none; background-color: transparent; text-align: left; vertical-align: middle;" | [[File:network-segmentation.png|frameless|60px|left]] <div style="position:relative; text-align: left; z-index:1;"><div style="font-weight:bold;">Network Segmentation</div><br><br>Divide networks into smaller, isolated segments to limit the impact of a potential breach.</div> | | style="border: none; background-color: transparent; text-align: left; vertical-align: middle;" | [[File:network-segmentation.png|frameless|60px|left]] <div style="position:relative; text-align: left; z-index:1;"><div style="font-weight:bold;">Network Segmentation</div><br><br><div>Divide networks into smaller, isolated segments to limit the impact of a potential breach.</div></div> | ||
| style="border: none; background-color: transparent; text-align: left; vertical-align: middle;" | [[File:intrusion-protection.png|frameless|60px|left]] <div style="position:relative; text-align: left; z-index:1;"><div style="font-weight:bold;">Intrusion Detection & Prevention Systems</div><br><br>Deploy advanced systems to detect and prevent network intrusions.</div> | | style="border: none; background-color: transparent; text-align: left; vertical-align: middle;" | [[File:intrusion-protection.png|frameless|60px|left]] <div style="position:relative; text-align: left; z-index:1;"><div style="font-weight:bold;">Intrusion Detection & Prevention Systems</div><br><br><div>Deploy advanced systems to detect and prevent network intrusions.</div></div> | ||
| style="border: none; background-color: transparent; text-align: left; vertical-align: middle;" | [[File:endpoint-protection.png|frameless|60px|left]] <div style="position:relative; text-align: left; z-index:1;"><div style="font-weight:bold;">Endpoint Protection</div><br><br>Implement robust antivirus and endpoint security solutions to safeguard individual devices.</div> | | style="border: none; background-color: transparent; text-align: left; vertical-align: middle;" | [[File:endpoint-protection.png|frameless|60px|left]] <div style="position:relative; text-align: left; z-index:1;"><div style="font-weight:bold;">Endpoint Protection</div><br><br><div>Implement robust antivirus and endpoint security solutions to safeguard individual devices.</div></div> | ||
|- | |- | ||
| style="border: none; background-color: transparent; text-align: left; vertical-align: middle;" | [[File:security-information-event-management.png|frameless|60px|left]] <div style="position:relative; text-align: left; z-index:1;"><div style="font-weight:bold;">Security Information & Event Management</div><br><br>Utilize SIEM tools to monitor and analyze security events across the network.</div> | | style="border: none; background-color: transparent; text-align: left; vertical-align: middle;" | [[File:security-information-event-management.png|frameless|60px|left]] <div style="position:relative; text-align: left; z-index:1;"><div style="font-weight:bold;">Security Information & Event Management</div><br><br><div>Utilize SIEM tools to monitor and analyze security events across the network.</div></div> | ||
| style="border: none; background-color: transparent; text-align: left; vertical-align: middle;" | [[File:vulnerability-management.png|frameless|60px|left]] <div style="position:relative; text-align: left; z-index:1;"><div style="font-weight:bold;">Vulnerability Management</div><br><br>Conduct regular assessments to identify and address system vulnerabilities.</div> | | style="border: none; background-color: transparent; text-align: left; vertical-align: middle;" | [[File:vulnerability-management.png|frameless|60px|left]] <div style="position:relative; text-align: left; z-index:1;"><div style="font-weight:bold;">Vulnerability Management</div><br><br><div>Conduct regular assessments to identify and address system vulnerabilities.</div></div> | ||
| style="border: none; background-color: transparent; text-align: left; vertical-align: middle;" | [[File:penetration-testing.png|frameless|60px|left]] <div style="position:relative; text-align: left; z-index:1;"><div style="font-weight:bold;">Penetration Testing</div></div> | | style="border: none; background-color: transparent; text-align: left; vertical-align: middle;" | [[File:penetration-testing.png|frameless|60px|left]] <div style="position:relative; text-align: left; z-index:1;"><div style="font-weight:bold;">Penetration Testing</div></div> | ||
|- | |- | ||
| style="border: none; background-color: transparent; text-align: left; vertical-align: middle;" | [[File:incident-response.png|frameless|60px|left]] <div style="position:relative; text-align: left; z-index:1;"><div style="font-weight:bold;">Incident Response Planning</div><br><br>Develop and test an incident response plan to efficiently handle cybersecurity incidents.</div> | | style="border: none; background-color: transparent; text-align: left; vertical-align: middle;" | [[File:incident-response.png|frameless|60px|left]] <div style="position:relative; text-align: left; z-index:1;"><div style="font-weight:bold;">Incident Response Planning</div><br><br><div>Develop and test an incident response plan to efficiently handle cybersecurity incidents.</div></div> | ||
| style="border: none; background-color: transparent; text-align: left; vertical-align: middle;" | [[File:configuration-management.png|frameless|60px|left]] <div style="position:relative; text-align: left; z-index:1;"><div style="font-weight:bold;">Secure Configuration Management</div><br><br>Establish and maintain secure configuration settings for all systems and devices.</div> | | style="border: none; background-color: transparent; text-align: left; vertical-align: middle;" | [[File:configuration-management.png|frameless|60px|left]] <div style="position:relative; text-align: left; z-index:1;"><div style="font-weight:bold;">Secure Configuration Management</div><br><br><div>Establish and maintain secure configuration settings for all systems and devices.</div></div> | ||
| style="border: none; background-color: transparent; text-align: left; vertical-align: middle;" | [[File:change-management.png|frameless|60px|left]] <div style="position:relative; text-align: left; z-index:1;"><div style="font-weight:bold;">Change Management</div></div> | | style="border: none; background-color: transparent; text-align: left; vertical-align: middle;" | [[File:change-management.png|frameless|60px|left]] <div style="position:relative; text-align: left; z-index:1;"><div style="font-weight:bold;">Change Management</div></div> | ||
|- | |- | ||
| style="border: none; background-color: transparent; text-align: left; vertical-align: middle;" | [[File:identity-access-management.png|frameless|60px|left]] <div style="position:relative; text-align: left; z-index:1;"><div style="font-weight:bold;">Identity & Access Management</div><br><br>Implement proper user access controls, management processes, and regularly review user privileges.</div> | | style="border: none; background-color: transparent; text-align: left; vertical-align: middle;" | [[File:identity-access-management.png|frameless|60px|left]] <div style="position:relative; text-align: left; z-index:1;"><div style="font-weight:bold;">Identity & Access Management</div><br><br><div>Implement proper user access controls, management processes, and regularly review user privileges.</div></div> | ||
| style="border: none; background-color: transparent; text-align: left; vertical-align: middle;" | [[File:patch-management.png|frameless|60px|left]] <div style="position:relative; text-align: left; z-index:1;"><div style="font-weight:bold;">Patch Management</div><br><br>Establish processes to apply patches and updates to systems and applications in a timely manner.</div> | | style="border: none; background-color: transparent; text-align: left; vertical-align: middle;" | [[File:patch-management.png|frameless|60px|left]] <div style="position:relative; text-align: left; z-index:1;"><div style="font-weight:bold;">Patch Management</div><br><br><div>Establish processes to apply patches and updates to systems and applications in a timely manner.</div></div> | ||
| style="border: none; background-color: transparent; text-align: left; vertical-align: middle;" | [[File:security-awareness.png|frameless|60px|left]] <div style="position:relative; text-align: left; z-index:1;"><div style="font-weight:bold;">Security Awareness Training & Testing</div><br><br>Provide regular training and education on cybersecurity best practices to all personnel; and periodically test that knowledge.</div> | | style="border: none; background-color: transparent; text-align: left; vertical-align: middle;" | [[File:security-awareness.png|frameless|60px|left]] <div style="position:relative; text-align: left; z-index:1;"><div style="font-weight:bold;">Security Awareness Training & Testing</div><br><br><div>Provide regular training and education on cybersecurity best practices to all personnel; and periodically test that knowledge.</div></div> | ||
|} | |} |
Revision as of 00:17, 17 July 2023
Network Segmentation Divide networks into smaller, isolated segments to limit the impact of a potential breach. |
Intrusion Detection & Prevention Systems Deploy advanced systems to detect and prevent network intrusions. |
Endpoint Protection Implement robust antivirus and endpoint security solutions to safeguard individual devices. |
Security Information & Event Management Utilize SIEM tools to monitor and analyze security events across the network. |
Vulnerability Management Conduct regular assessments to identify and address system vulnerabilities. |
Penetration Testing |
Incident Response Planning Develop and test an incident response plan to efficiently handle cybersecurity incidents. |
Secure Configuration Management Establish and maintain secure configuration settings for all systems and devices. |
Change Management |
Identity & Access Management Implement proper user access controls, management processes, and regularly review user privileges. |
Patch Management Establish processes to apply patches and updates to systems and applications in a timely manner. |
Security Awareness Training & Testing Provide regular training and education on cybersecurity best practices to all personnel; and periodically test that knowledge. |