Proposed solution

Proposed solution

Solutions for handling Cyber security issues, can be divided in to three major solutions:

Avoid.?

If the risk outweighs the benefits, discontinuing an? may be the best course of action if it means no longer being exposed to it.

If you are no longer using the system, the system does not have to be secured as it can be removed. Ways of finding out if a system is being used is to analyze the usage by Microsoft Defender for Identity. If the system is not being used by any (or few users) it can be decommissioned

It is also possible to use the Microsoft Defender for Endpoint to analyze and see what is used actively and find out if the solution is being active.

Or in worst case use the SCREAM method: https://lnkd.in/ecUv-9gs

What’s the Scream Test? Well, in the Microsoft case it was a multistep process:

  • Display the message “Hey, is this your server, contact us?” on the sign-in splash page for two weeks.
  • Restart the server once each day for two weeks to see whether someone opens a ticket (in other words, screams).
  • Shut down the server for two weeks and see whether someone opens a ticket. (Again, whether they scream.)
  • Retire the server, retaining the storage for a period, just in case.


Transfer.?

Share a portion of the risk with other parties through cyber insurance or outsourcing certain operations to third parties.

This might include move things to the cloud an example might be Azure SQL Azure SQL | Microsoft Azure ,which includes: multi-layered protection with?built-in security controls?including network security, encryption, and access and key management and physical security.


Mitigate.?

Deploy security controls and other measures to reduce the Likelihood and/or Impact and therefore the risk level.

This can include either on-prem security controls or cloud based controls. An overview of the controls that are present in Azure can be found here: Overview of the Azure Security Benchmark v3 | Microsoft Docs




Backlink

https://www.dhirubhai.net/pulse/tactical-output-niklas-fredengren

Forwardlink

https://www.dhirubhai.net/pulse/cost-niklas-fredengren

James Cameron

Cybersecurity & AI Executive Advisor | Global Cybersecurity & AI Services Leader | Microsoft, AWS & Avanade Alumni | Enterprise Security & AI Innovation | Youth Baseball Coach - Manager LLWS Champs Europe/Africa 2024

1 年

Interesting thoughts Niklas. With rapidly changing landscape and gaps in skills to even make a decision to "Transfer" or "Mitigate". You have any thoughts on what probabilities that "Ignore" will also increase as a result?

回复

要查看或添加评论,请登录

Niklas Fredengren的更多文章

  • Multinomial decisions

    Multinomial decisions

    As part of the research for this article series, I read a research paper on tactical behaviour of bicyclists. One thing…

  • Investment

    Investment

    The reason for that is that security is not usually an investment that provides profit but loss prevention. So what is…

  • Budget

    Budget

    With evolving and emerging cyber threats, setting aside enough budget for cyber security initiatives is increasingly…

  • Value

    Value

    Measuring cybersecurity value But how can a company effectively measure its cybersecurity program and whether the…

  • Cost

    Cost

    We all know that Cybersecurity has a cost. I define it as Cost of Doing something and Cost of Inaction.

  • Tactical Output

    Tactical Output

    The Tactical output is the outcome after all perspectives are taken in to account. This will be the a definition on…

  • Priorities

    Priorities

    In One of the biggest challenge in Cybersecurity is the usage of resources. This leads to a need of choosing between…

    1 条评论
  • Weight

    Weight

    To be able to prioritize what should be worked on, there is a need to describe what importance each threat has. One…

  • Tactical Input

    Tactical Input

    Today, security operations do not suffer from a "Big Data" problem but rather a "Big Data Analysis" problem. Let's face…

  • Threats

    Threats

    Threats would be all the things that will affect your organization possibilities to accomplish the Strategical and…

社区洞察

其他会员也浏览了