Thursday, May 17, 2012

Future Security Basics


This incident points out the need for organizations, of all sizes and in all industries, to do the following to help prevent the same type of breach as that within the Utah DTS:


  1. Have well documented systems and applications procedures and supporting standards in place that are consistently followed
  2. Provide training and ongoing awareness for the procedures and standards
  3. Log changes consistently, and have teams responsible for reviewing the logs, and maintaining the logs for an appropriate period of time
  4. Perform ongoing audits to catch such configuration errors
  5. Have a change control process in place to help keep the mistakes of individuals from being put into production
  6. Use intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) to identify inappropriate access as soon as possible
  7. Create and maintain well documented breach detection and response plans
  8. Establish breach response teams and provide them with periodic training and ongoing awareness communications
  9. Engage independent third parties to perform periodic vulnerability scans and penetration tests
  10. Encrypt sensitive data, in transit and as rest in all storage locations. As this incident demonstrates, even if a sensitive file is located on a network behind a firewall, the bad guys may possibly still be able to get to it.

No comments:

Post a Comment