Defense in Depth Security Baselines

  • Different layers of security.

  • Personnel

    • Training

    • MFA

    • Separation of Duties

    • Mandatory Vacations

    • Success Planning

    • Job descriptions

  • Defense in Depth

    • Processes

      • Improvement

      • Learn from trends.

      • Find weaknesses.

    • Technolgoy

      • Software

      • Hardware

      • Security-as-a-Service

    • Network

      • Review your design

      • Segmentation – VLANs, routers

      • Consider Software defined networking?

      • Air gapped?

      • Don’t overcomplicate it

  • Configuration Baselines

    • Definition of what is normal.

    • Detect misconfiguratons

    • Detect anomalies

    • Start simple: IPs, MACs, services, CPU, memory, running processes

  • Hardening Systems

    • Reduce the attack surface.

    • Config hardening

      • Deactivate non-critical components

      • Disable unused accounts

      • Patch, update

      • Restrict peripherals

      • User permissions

      • ACL on resources

      • Install security suites.

  • Patching

    • #1 solution for most remediations

    • Exploits often target known and patched vulnerabilities

    • Update systems

      • Windows Update

      • WSUS

      • APT

      • YUM

    • Patch management solutions

      • SCCM

Last updated