Information Security and Risk Management
Information security and Risk Management system :
Primary Objective: Maintaining and conducting business operations in a secure environment.
Organization: what are business needs
Information: which are critical for business
What's your business/organization mission and vision?
Which sector your business/organization belongs to ?
identify and classify our organization's assets (tangible and intangible)
ensure the security of those assets is adequately protected by implementing core security principles
CIA Triad:
Confidentiality : deals with secrecy, restrict un authorized access
Security controls like encryption, access controls
Which security control we in placed to achieve this
Data encryption : data at rest
Hashing : data in transit (file integrity monitoring)
Sha 256
Sha 512
MFA (IAM and user access)
Privilege Access Management
Password rotations and policies
Secret Management
Physical Security
Default deny for critical data and infrastructure
Documented approval from leadership
Proper auditing/activity log management
Integrity : protecting reliability
Access restriction to make changes
Encryption policies to achieve integrity when data at rest
Hashing policies to achieve integrity when data at transit
Availability : having uninterrupted access
High availability of services or access to data.
What is org Disaster Recovery Plan?
What is org Business Continuity Plan?
Fail over clustering
Site reliability
Site resiliency
Automatic failover
Load balancing
Redundant components of software and hardware
Cold, hot and warm sites
AAA
Authentication
Authorization
Accounting
IAAAA
Identification
Authentication
Authorization
Auditing
Accounting
Information Security Management System and Risk Management
Information security policies, procedures and playbooks
Managing third party Risks
Cloud service provider
Third Party service provider
Policies with Third party service provider to know breach information
Service Level Agreements
Vendor Security Assessment https://opensource.google/projects/vsaq
Consensus Assessments Initiative Questionnaire
Data Loss Prevention
Asset Security
Assets Types
i. Physical
ii. Digital
iii. Non reputational
Asset Register/Inventory
i. Asset Owners
ii. Asset value
iii. Asset Classification
CMDB
Asset identification and classification
Security Awareness Training
a. Phishing simulations
Security Architecture and Engineering
Vulnerability Management
Network Security
Identity and Access Management
Security Testing
Disaster Recovery and Business Continuity plan
Security Operations
Software Development Security/DevSecOps
References:
Last updated
Was this helpful?