Emergency out-of-band updates –Zero-day and important security discoveries
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Encryption
A
Prevent access to application data files –File system encryption
Full disk encryption (FDE) –Encrypt everything on the drive –BitLocker, FileVault, etc.
File level encryption –Windows EFS
Application data encryption –Managed by the app –Stored data is protected
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Monitoring
A
Aggregate information from devices –Built-in sensors, separate devices –Integrated into servers, switches, routers, firewalls, etc.
Sensors –Intrusion prevention systems, firewall logs, authentication logs, web server access logs, database transaction logs, email logs
Collectors –Proprietary consoles (IPS, firewall), –SIEM consoles, syslog servers –Many SIEMs include a correlation engine to compare diverse sensor data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Least privilege
A
Rights and permissions should be set to the bare minimum –You only get exactly what’s needed to complete your objective
All user accounts must be limited –Applications should run with minimal privileges
Don’t allow users to run with administrative privileges –Limits the scope of malicious behavior
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Configuration enforcement
A
Perform a posture assessment –Each time a device connects
Extensive check –OS patch version –EDR (Endpoint Detection and Response) version –Status of firewall and EDR –Certificate status
Systems out of compliance are quarantined –Private VLAN with limited access –Recheck after making corrections
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Decommissioning
A
Should be a formal policy –Don’t throw your data into the trash –Someone will find this later
Mostly associated with storage devices –Hard drive –SSD –USB drives
Many options for physical devices –Recycle the device for use in another system –Destroy the device