nguyễn tấn vi - office of the ciso

Post on 14-Feb-2017

383 Views

Category:

Technology

2 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Office of the CISO

Xin cảm ơn các nhà tài trợ

About me

@vikjava

What will be covered?

StrategicDetectionMetricsReport

THE FAST AND THE FURIOUS

Strategic

Business

Policy

Infrastructure security

Infra & operations

Monitoring

Authentication and AuthorizationSystems and Data ChangeNetwork ActivityResource Access Malware Activity Failure and Critical Error

Detection of Possible Brute Force AttackDetection of Insider Threat

Check Event ID 4663 & more:Top malicious DNS requests from user.Incidents from users reported at DLP, spam

filtering, web proxy, etc.Transmission of sensitive data in plain text.3rd party users network resource access.Resource access outside business hours.Sensitive resource access failure by user.Privileged user access by resource criticality,

access failure, etc.Systems and Data Change

Detection

Application Defense CheckTop Web application Attacks per server Malicious SQL commands issued by

administrator.Applications suspicious performance indicator,

resource utilization vector.Application Platform (OS) patch-related status.Web attacks post configuration changed on

applications.

Malware CheckUnusual network traffic spikes to and from sources.Endpoints with maximum number of malware threats.Top trends of malware observed; detected, prevented,

mitigated.Brute force pattern check on Bastion host.

Metrics

Function Management Perspective Defined Metrics Incident Management How well do we detect, accurately

identify, handle, and recover from security incidents?

Mean Time to Incident Discovery Number of Incidents Mean Time Between Security Incidents Mean Time to Incident Recovery

Vulnerability Management How well do we manage the exposure of the organization to vulnerabilities by identifying and mitigating known vulnerabilities?

Vulnerability Scanning Coverage Percent of Systems with No Known

Severe Vulnerabilities Mean Time to Mitigate Vulnerabilities Number of Known Vulnerabilities

Patch Management How well are we able to maintain the patch state of our systems?

Patch Policy Compliance Patch Management Coverage Mean Time to Patch

Application Security Can we rely on the security model of business applications to operate as intended?

Number of Applications Percent of Critical Applications Risk Assessment Coverage Security Testing Coverage

Configuration Management How do changes to system configurations affect the security of the organization?

Mean Time to Complete Changes Percent of Changes with Security

Reviews Percent of Changes with Security

Exceptions

Financial Metrics What is the level and purpose of spending on information security?

IT Security Spending as % of IT Budget IT Security Budget Allocation

Report

Questionsor

Comments

top related