Security Spring-Cleaning: Assess & Evaluate for Security Success – Part II

APR 22, 2019

Welcome to Spring and welcome to Part II on ‘Security Spring-Cleaning: Assess & Evaluate for Security Success’ our guide to refreshing old cybersecurity processes with new and better security practices.

The National Cyber Security Alliance agrees that springtime is an ideal time to review your existing security posture.  “By conducting a digital spring cleaning and taking care of overdue online maintenance, you will be more secure against losing personal information and becoming a victim of identity theft.”  Below are three security domains to consider addressing to improve your organizations overall security program with recommended activities to help strengthen your overall capabilities.

1. Infrastructure Security

A review of your corporate infrastructure security helps identify weaknesses, gaps of existing security controls and will help align your security objectives to the organization’s. It can help identify hardware security deficiencies that may negatively impact the systems, databases, and applications that are dependent upon the network. From firewalls to applications, on premises appliances or cloud hosted solutions, infrastructure security covers your entire organization to make sure your perimeter is protected and your data is safe.

Key Activities:

  • Security Tools Rationalization
  • Technical Review of Security Architecture
  • Security Design Assessment

2. Incident Response Services

Whether you are part of the Security Operations team or Computer Security Incident Response Team (CSIRT), it is time to take a hard look at your workflows.  Are they efficient?  Are they updated? When was the last time you did a tabletop exercise or updated your response playbooks? Speed is one of the most important aspects of an effective defense plan against incidents. If you are not efficient in executing your workflow, you leave a larger window of time for attackers to wreak havoc on your network.  Are your playbooks intelligent, are your critical assets defined and do you have automation tools in place to help expedite immediate response actions for identified threats? Being proactive vs reactive in preparing for such a crucial situation can equate to saving your organizations data, money and reputation.

Key Activities:

  • Compromise Assessment
  • Forensic / Incident Response Retainers
  • Table Top Exercises

3. Offensive Security

A successful offensive security strategy includes both a proactive and adversarial approach to protecting computer systems, networks and individuals from attacks.  Consider that the good guys stop working at 6pm, but hackers and cyber-criminals work round the clock, so evaluate your strategy and tactics.  Include penetration testing (white hatters that operate with your permission to test your system as if they were a malicious hacker) to make sure a system is truly secure. Beyond a vulnerability assessment, white hatters can quantify the actual threat and risk it poses, disclosing their findings so you can fix the problems.

Key Activities:

  • Penetration Testing
  • Phishing Exercises
  • Red Team engagements
  • Physical Security Audits

The modern security landscape is evolving constantly so it’s never wise to embrace the status quo.  The emergence of apps, the cloud and other practices require rethinking security on a regular basis.  If your team is ready to evaluate your security strategy, Trace3 experts are available to help you revitalize your cyber-security program.  We take great pride in over eight decades of combined IT security expertise, as our dedicated team works to identify and address risks early, deploy IT resources efficiently, and protect the environment and data prudently.  Learn more about Trace3 Security

At Trace3, we believe All Possibilities Live in Technology.

Leave a Reply

Your email address will not be published. Required fields are marked *