Top 10 Mitigation steps in information security

A simple 4-step model to information security

  1. Maintaining & Monitoring IT resource/asset integrity 
  2. Preparing & Limiting damage/loss in the course of attack
  3. Proper Access control/Authentication & Authorization
  4. Secure Data Communication

Top 10 steps to mitigation

  1. Application Whitelisting
  2. Training & Awareness
  3. Proper Admin Privilege control & monitoring
  4. Anti-Virus File Recommendations for Cloud interactions
  5. Use of HIPSi.e.Host Intrusion Prevention System Rules
  6. Configure secure host baseline
  7. Web-Domain i.e. DNS Trusted Ratings
  8. Updated systems always
  9. Secure Architecture planning & revise
  10. Incident Log review and monitoring process setup

Courtesy: https://www.nsa.gov/ia/_files/factsheets/I43V_Slick_Sheets/Slicksheet_Top10IAMitigationStrategies_Web.pdf

Votes: 0
E-mail me when people leave their comments –

Community Head, CISO Platform

You need to be a member of CISO Platform to add comments!

Join CISO Platform

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

Atlanta Chapter Meet: Build the Pen Test Maturity Model (Virtual Session)

  • Description:

    The Atlanta Pen Test Chapter has officially begun and is now actively underway.

    Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …

  • Created by: Biswajit Banerjee
  • Tags: ciso, pen testing, red team, security leadership