Advanced Security: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
No edit summary |
||
Line 3: | Line 3: | ||
| colspan="3" style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | [[File:Elephants.png|frameless|225px|center|link=Advanced_Protection]] | | colspan="3" style="border: none; background-color: transparent; text-align: center; vertical-align: middle;" | [[File:Elephants.png|frameless|225px|center|link=Advanced_Protection]] | ||
|- | |- | ||
| style="border: none; background-color: transparent; | | style="border: none; background-color: transparent; vertical-align: top; text-align: center;" | [[File:network-segmentation.png|frameless|60px|center]] | ||
| style="border: none; background-color: transparent; | <br> | ||
| style="border: none; background-color: transparent; | '''Network Segmentation''' | ||
<br> | |||
<div style="text-align: left;">Divide networks into smaller, isolated segments to limit the impact of a potential breach.</div> | |||
| style="border: none; background-color: transparent; vertical-align: top; text-align: center;" | [[File:intrusion-protection.png|frameless|60px|center]] | |||
<br> | |||
'''Intrusion Detection & Prevention Systems''' | |||
<br> | |||
<div style="text-align: left;">Deploy advanced systems to detect and prevent network intrusions.</div> | |||
| style="border: none; background-color: transparent; vertical-align: top; text-align: center;" | [[File:endpoint-protection.png|frameless|60px|center]] | |||
<br> | |||
'''Endpoint Protection''' | |||
<br> | |||
<div style="text-align: left;">Implement robust antivirus and endpoint security solutions to safeguard individual devices.</div> | |||
|- | |- | ||
| style="border: none; background-color: transparent; | | style="border: none; background-color: transparent; vertical-align: top; text-align: center;" | [[File:security-information-event-management.png|frameless|60px|center]] | ||
| style="border: none; background-color: transparent; | <br> | ||
| style="border: none; background-color: transparent; | '''Security Information & Event Management''' | ||
<br> | |||
<div style="text-align: left;">Utilize SIEM tools to monitor and analyze security events across the network.</div> | |||
| style="border: none; background-color: transparent; vertical-align: top; text-align: center;" | [[File:vulnerability-management.png|frameless|60px|center]] | |||
<br> | |||
'''Vulnerability Management''' | |||
<br> | |||
<div style="text-align: left;">Conduct regular assessments to identify and address system vulnerabilities.</div> | |||
| style="border: none; background-color: transparent; vertical-align: top; text-align: center;" | [[File:penetration-testing.png|frameless|60px|center]] | |||
<br> | |||
'''Penetration Testing''' | |||
<br> | |||
<div style="text-align: left;">Simulate real-world attacks to evaluate the security of a system or network.</div> | |||
|- | |- | ||
| style="border: none; background-color: transparent; | | style="border: none; background-color: transparent; vertical-align: top; text-align: center;" | [[File:incident-response.png|frameless|60px|center]] | ||
| style="border: none; background-color: transparent; | <br> | ||
| style="border: none; background-color: transparent; | '''Incident Response Planning''' | ||
<br> | |||
<div style="text-align: left;">Develop and test an incident response plan to efficiently handle cybersecurity incidents.</div> | |||
| style="border: none; background-color: transparent; vertical-align: top; text-align: center;" | [[File:configuration-management.png|frameless|60px|center]] | |||
<br> | |||
'''Secure Configuration Management''' | |||
<br> | |||
<div style="text-align: left;">Establish and maintain secure configuration settings for all systems and devices.</div> | |||
| style="border: none; background-color: transparent; vertical-align: top; text-align: center;" | [[File:change-management.png|frameless|60px|center]] | |||
<br> | |||
'''Change Management''' | |||
<br> | |||
<div style="text-align: left;">Implement structured processes to manage changes in a controlled and efficient manner.</div> | |||
|- | |- | ||
| style="border: none; background-color: transparent; | | style="border: none; background-color: transparent; vertical-align: top; text-align: center;" | [[File:identity-access-management.png|frameless|60px|center]] | ||
| style="border: none; background-color: transparent; | <br> | ||
| style="border: none; background-color: transparent; | '''Identity & Access Management''' | ||
<br> | |||
<div style="text-align: left;">Implement proper user access controls, management processes, and regularly review user privileges.</div> | |||
| style="border: none; background-color: transparent; vertical-align: top; text-align: center;" | [[File:patch-management.png|frameless|60px|center]] | |||
<br> | |||
'''Patch Management''' | |||
<br> | |||
<div style="text-align: left;">Establish processes to apply patches and updates to systems and applications in a timely manner.</div> | |||
| style="border: none; background-color: transparent; vertical-align: top; text-align: center;" | [[File:security-awareness.png|frameless|60px|center]] | |||
<br> | |||
'''Security Awareness Training & Testing''' | |||
<br> | |||
<div style="text-align: left;">Provide regular training and education on cybersecurity best practices to all personnel; and periodically test that knowledge.</div> | |||
|} | |} |
Revision as of 00:50, 17 July 2023
Divide networks into smaller, isolated segments to limit the impact of a potential breach.
|
Deploy advanced systems to detect and prevent network intrusions.
|
Implement robust antivirus and endpoint security solutions to safeguard individual devices.
|
Utilize SIEM tools to monitor and analyze security events across the network.
|
Conduct regular assessments to identify and address system vulnerabilities.
|
Simulate real-world attacks to evaluate the security of a system or network.
|
Develop and test an incident response plan to efficiently handle cybersecurity incidents.
|
Establish and maintain secure configuration settings for all systems and devices.
|
Implement structured processes to manage changes in a controlled and efficient manner.
|
Implement proper user access controls, management processes, and regularly review user privileges.
|
Establish processes to apply patches and updates to systems and applications in a timely manner.
|
Provide regular training and education on cybersecurity best practices to all personnel; and periodically test that knowledge.
|