Defence in Depth
Disabling Unnecessary Componets
-
0-day vulnerablity
-
Attack vectors
The method or machanism by which an attacker or malware gains access to a network or system -
Attack surfaces
The sum of all the different attack vectors in a given system -
The less complex something is, the less likely there will be undetected flaws
-
Another way to keep things simple is to decuver your software deployments.
-
Telnet access for a managed switch has no business being enabled in a real-world environement.
Host-Based Firewall
Protect individual hosts from being compromised when they’re used in untrusted, potentially malicious environments.
-
A host-based firewall plays a big part in reducing what’s accessible to an outside attacker.
-
Bastion nhosts, or network
-
If the users have system have a administrators rights, then they have the ability to change firewall rules and configurations.
Logging aand Auditing
-
Security informative adn event management systems
-
Normalization
-
Once logs are centralized and standardized, you can write automated alerting based on rules.
-
ryslog
-
Splunk Enterprise security
-
IBM Security Qradar
-
RSA security Analytics
Antimalware Protection
Lots of unprotected systems would be sompromised in a matter of minutes if directly connected to the internet without any safeguards or protections in place.
-
Antivirus software will monitor and analyze things, like new files being created or being modified on the system, in order to watch for any bbehavior thayt matches a kn own malware signatures
-
It protects against the most common attacks out there on the internet.
-
Antivirus software is just one piece of our anti-malware defences.
-
Binary whistelisting software
Disk Encyption
-
Full-disk encryption(FDE)
Works by automatically converting data on a hard drive into a form that cannot be understood by anyone who doesn’t have the key to “undo” the conversion -
Secure Boot Protocol
-
Platform key
-
input -> Encryptrion Algorithm -> Decryption Algorithm -> Output
-
When you implement a full disk encryption solution at scale, it’s super important to think how to jandle cases where passwords are forgotten.
-
key Escrow
Allows the encryption key to be securily stored for later retrival by an unathorized party. -
home directory or file-based encryption only guarantees confidentiality and integrity of files protected by encryption
Software Patch Management
-
As an IT support specialist, it’s critical that you make sure that you install software updated and security patches in a timely way, in order to defend your company’s system and networks.
-
The best protection is to have a good system and policy in place for your company.
-
critical infrastruture devices should be approched carefully when you apply updates. there’s always the risk that a software update will introduce a new bug that might affect the functionality of the device.
Application Policies
-
A common recommendation, or even requirements, is to only support or require the latest version of a pieces of software.
-
It’s generally a good idea to disallow risky classes of software by policy. Things like file sharing software and piracy-related software tend to be closely associated with malware infections.
-
Undertanding what your users need to do their jobs will help shape your approach to software policies and guidelines.
-
Helping your users accomplish tasks by recommending or supporting specific software makes for more secure environment.
-
Extensions that require full access to web sites visited can be risky, since the extension developer has the power to modify pages visited.