//////////////////////////////////////////////////////////////////// t cht lk
from my threat detection layers etc.)
adds greater protections.
6. Implement Strong Password
Policy Management. Require strong
passwords, and that they should be
changed frequently. Deny password
reuse. Log failed authentication requests.
7. Automate Password Management.
Require unique passwords across
all privileged systems and accounts.
Eliminate hard coded passwords in
service accounts and scripts. Implement
SSH key management tools.
8. Segment Networks. Group assets,
including application and resource servers,
into logical units that do not trust one
another. Segmenting the network reduces
the ‘line of sight’ access attackers must
have into your internal systems. For
access that needs to cross the trust zones,
require a secured jump server with multi-
factor authentication, adaptive access
authorisation, and session monitoring.
9. Consider Micro-Segmentation. Where
possible, go beyond standard network
www.intelligentcio.com
segmentation. Segment based on
context of the user, role, application and
data being requested.
10. Implement Threat and Advanced
Behaviour Monitoring. Somewhere
along the line, accounts have access
to stuff. Implement base security
“
IMPLEMENT
MULTI-FACTOR
AUTHENTICATION
FOR ACCESS
TO INTERNAL
SYSTEMS,
APPLICATIONS
AND EVEN DATA.
event monitoring and advanced threat
detection (including user behaviour
monitoring) to more accurately and
quickly detect compromised account
activity as well as insider privilege
misuse and abuse.
In today’s sophisticated threat landscape,
one product will certainly not provide the
protection enterprises need against all
stages of an attack.
And while some new and innovative
solutions will help protect against or detect
the initial infection, they are not guaranteed
to stop 100% of malicious activity.
In fact, it’s not a matter of if, but a matter
of when, you will be successfully breached.
You still need to do the basics – patching,
firewalls, endpoint AV, threat detection and
so on.
But you also need to protect against, and
monitor for, lateral movement. So, assuming
the bad guys get in, following the 10
recommendations can help you can stop
them, slow them down, and/or detect them
faster in order to mitigate the impact. n
INTELLIGENTCIO
97