Network Security
1.???62% of organizations say they are at best somewhat confident in their security posture.
2.???58% of organizations are aware of fewer than 75% of the assets on their network.
3.???83% of organizations do not have a unified view into a cloud and on-premises assets.
4.???62% of organizations report that they are unable to quantify their cyber risk in monetary units.
5. The 2022 State of Cybersecurity Posture Report
· Not at all confident – 3%
· Not so confident – 9%
· Somewhat confident – 50%
· Very confident – 30%
· Extremely confident – 8%
?Network Security Best Practices
?1. Know Your Network Infrastructure
?. Presence of security vulnerabilities.
. Unused or unnecessary applications.
. Open ports.
. Hardware (routers, switches, printers etc.)
. Software (firewalls, IDS/IPS, etc.) devices, and
. Digital security certificates (SSL/TLS certificates, IOT certificates, etc.).
?2. Deploy Network & Security Devices
?. Firewall.
. WAF.
. DLP.
. IPS/IDS.
. AV/Ransomware Protection.
. SIEM. (security information and event management)
?
1.???Advanced Threat Detection.
2.???Threat Intelligence Platform.
3.???SIEM.
4.???Vulnerability Management.
5.???Network Access Control.
6.???Next-Gen Endpoint Security.
7.???Next-Gen Firewall.
8.???Web Gateway.
9.???ITSM/ITOM/Security Operations. (IT service management, IT operations management)
10. SOAR. (security orchestration automation and response)
Implement Network Segmentation and Segregation Strategies
. Network Layers.
. Least Privilege Principle.
. Separate Hosts and Network.
. Zooming in the authorization process.
. Network Traffic Whitelisting.
Regular Software Updates Patch Management and Secure Devices
. Change admin credentials.
. Establish baselines and hardening configurations.
. Turn off unnecessary services, disable unassigned or unused ports, manage default settings.
领英推荐
. When updating your network equipment devices, make sure that patches are downloaded only from validated sources.
?Take Care About Identities
. MFA where possible.
. Adopt the POLP.
. Automate workflows
. Go password less.
. Avoid privileged accounts.
. Use vaults to protect privileged accounts.
. Enforce a strong password policy.
. Centralize log collection.
?Non Technical Behaviour of cyber security team
Define your security framework
1.???NIST.
2.???ISO 27001.
3.???CIS ( Center for Internet Security).
4.???A number of studies show that implementation of the first 5 CIS Controls provides an effective defense against the most common cyber attacks (85% of attacks).
?Basic
2. Inventory and control of software assets.
3. Continuous vulnerability management.
4. Controlled use of administrative privileges.
5. Secure configuration for hardware and software on mobile devices, laptops, workstations and servers.
6. Maintenance, monitoring and analysis of audit logs.
?Define metrics to measure your defense effectiveness
. CIS benchmark per host.
. Vulnerabilities per host.
. Kill chain segment time to execute.
. Previously fixed vulnerabilities.
?
·??????Frequency of security issues.
·??????Frequency of closed risks.
·??????Closed security tickets.
·??????AV detection.
?Act as business enabler
2. Customer confidence and loyalty.
3. ?Keeping a business productive.
4. 71% of executives say that cybersecurity concerns impede innovation at their organization.
?Educate and awareness in your company
2. Prepare employees for a data breach.
3. Start at the top.
4. Measure the program.
5. 57% of companies experienced social engineering or phishing attacks.
6. Security awareness makes employees a security asset.
7. Security is about consistency and discipline.