A simple 4-step model to information security
- Maintaining & Monitoring IT resource/asset integrity
- Preparing & Limiting damage/loss in the course of attack
- Proper Access control/Authentication & Authorization
- Secure Data Communication
Top 10 steps to mitigation
- Application Whitelisting
- Training & Awareness
- Proper Admin Privilege control & monitoring
- Anti-Virus File Recommendations for Cloud interactions
- Use of HIPSi.e.Host Intrusion Prevention System Rules
- Configure secure host baseline
- Web-Domain i.e. DNS Trusted Ratings
- Updated systems always
- Secure Architecture planning & revise
- Incident Log review and monitoring process setup
Comments