SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
10 Keys To Effective Network Security
[ WHITE PAPER ]
™
Author:
Razorpoint Security Team
Version:
1.3
Date of current version:
2006-10/05
Date of original version:
2001-04/04
Copyright © 2001-2006 Razorpoint Security Technologies, Inc.
All Rights Reserved.
10 Keys To Effective Network Security
The following 10 keys outline a foundation in building an effective security policy for your network operating environment.
They explain the realities of network security and how to apply corporate resources toward the ongoing effort of securing
a network environment.
KEY 1: Executive level needs to be responsible (Establish accountability).
Think of network security in terms of system survival and business continuity. As such, accountability should be shouldered
at senior levels much like a company’s financial position falls upon a CFO or CEO. Effective security policies should be
implemented and maintained by a skilled and experienced technology staff directed by a senior company officer or
director (CTO, Director of Technology, etc.). Technology departments should be empowered with the resources (skilled
staff, budget, hardware, software, etc.) and autonomy to react effectively on an ongoing basis. The senior company
director must ensure the availability of these resources, while the entire senior management maintains accountability.
KEY 2: Educate staff and promote awareness.
People are almost always the weakest link in any organization’s security chain. It is for this reason that proper education
and awareness of network security and security policies be understood by not only technology staff, but all employees.
While more detailed technology expertise should be mandatory within technology departments, awareness and training
must be provided to all company employees. Company employment documents should include a detailed explanation of
the company’s policy on technology usage including, but not limited to, computers (laptops, desktops, servers), network
access, Internet access, email, the worldwide web, and remote access to company resources.
KEY 3: A process, not a product (Security is ongoing, never ending).
There is no single answer. As part of employee security awareness, the fact that security is never realized by a single
product or technique should be stressed. The myth of “You just install this one shrink-wrapped package and you’re
done” is a dangerous pitfall many firms fall into. The overall security posture of a company needs to be part of the
business decision-making process. Security is a process, not a product.
KEY 4: Exhibit cautious, but prudent, spending (Don’t “just throw money at it”).
Security is not just “having a firewall.” Many of the “all-things-to-all-people” products are not sufficient. These general
tools (firewalls, VPNs, packet filters, etc.) can still leave company-specific systems vulnerable. A solution of this nature
can end up costing an overwhelming amount due to an unforeseen security compromise. Purchasing and properly
deploying tools such as firewalls, intrusion detection systems, VPNs, etc. as part of an overall security policy is an
excellent way to promote a secure operating environment. Regular maintenance of these security tools should be a
mandatory exercise in enforcing a company’s security policy.
KEY 5: Regular assessment of the “threatscape” – Be proactive.
Hire a security firm to regularly audit the security of your network infrastructure. This is similar to an outside accounting
firm auditing a company’s financial records. As a proactive security measure, a qualified, third party should be retained to
regularly audit the state of a company’s security. Security firms test, externally as well as internally, the true strength of
an infrastructure’s security. An audit of this type provides a “hacker’s eye view” of a network operating environment.
October 5, 2006 10 Keys To Effective Network Security [v1.3] Page 1 of 3
31 east 32nd street, sixth floor | new york city, new york 10016-5509 usa | tel: 212.744.6900 | fax: 212.744.6344 | www.razorpointsecurity.com | security@razorpointsecurity.com
Copyright © 2001-2006 Razorpoint Security Technologies, Inc. All Rights Reserved.
™
KEY 6: Deploy and maintain a balanced, flexible security policy.
An effective security policy should also include physical security, disaster recovery and user training. A “one size fits
all” approach should be avoided. Design a security policy, or “process,” that is geared toward your current technology
infrastructure as well as future iterations. It should evolve as your organization evolves. A balanced and flexible
security policy should encompass firewalls, VPNs, good password usage, remote access procedures, security of physical
resources (file cabinets, computer rooms, network access points, confidential documents, etc.), disaster recovery
scenarios and provide for the ongoing effort of keeping all company employees aware of changes as they occur.
KEY 7: Incorporate security early.
It is always more efficient and effective to design security into an infrastructure from the beginning. Imagine only after
finishing a bank realizing you needed a vault, alarms and security glass. Because of the lack of security consciousness at
the outset, everything must now be redone. Similarly, security must be a primary focus when designing and maintaining
an technology infrastructure. While security components can certainly be added afterward, incorporating security early
yields better results. When necessary, hire an outside firm to perform a security design review of existing or upcoming
technology rollouts. If nothing else, this “extra set of eyes” can provide another perspective on your needs, your
technology and your security choices. Be sure to choose a firm with a proven track record performing security audits
and services.
KEY 8: Outsource security maintenance as necessary.
In some circumstances, it makes business sense for firms to outsource their security needs. Understaffed or undertrained
technology departments may not be equipped to adequately maintain effective network security. In these cases
outsourcing can be an answer. Some or all of a company’s network security can be given to a security firm whose sole
responsibility is securing your environment. Firewalls, VPNs, remote access, and other security-related necessities can
be facilitated by an outside firm. This can also help a company to more slowly, and effectively, grow their own in-house
staff. With security maintained by an outside firm, CTOs and CIOs can take more time staffing in-house teams with the
appropriate, qualified personnel.
KEY 9: Staff your technology team correctly.
Be sure your technology staff is well-rounded in terms of technology expertise (network infrastructure design and
management, security implementation, multiple operating system experience, etc.) and is trained in all necessary areas
of your company’s technology. In addition to necessary certifications (CISSP, Check Point CCSA & CCSE, Cisco CCNA,
etc.) security technology professionals must be able to demonstrate previous experience with relevant technology and
provide references that can support previous career successes.
KEY 10: Maintain vigilance.
No one ever asks “When can we stop doing sales or marketing?” It is the same with security; it is never ending. Y2K was
perceived as a business issue, security is even more so. It needs to be fully understood at the most senior levels why
security is as large a business concern as sales or marketing. A security breach of financial records, confidential company
data, client information or other sensitive material could be disastrous. Security compromises can destroy relationships
with customers and investors. Financial liability, lost revenue, damage to a company’s brand and reputation could prove
irreparable. Security concerns should extend well beyond “stopping a virus” or “installing a firewall,” it should be viewed
as a business continuity issue and, as such, funded, staffed and maintained accordingly.
October 5, 2006 10 Keys To Effective Network Security [v1.3] Page 2 of 3
31 east 32nd street, sixth floor | new york city, new york 10016-5509 usa | tel: 212.744.6900 | fax: 212.744.6344 | www.razorpointsecurity.com | security@razorpointsecurity.com
Copyright © 2001-2006 Razorpoint Security Technologies, Inc. All Rights Reserved.
About Razorpoint Security.
Razorpoint Security Technologies, Inc. specializes in researching and analyzing security vulnerabilities and
conducting comprehensive security assessments. These assessments provide business leaders and corporate
clients the necessary security services and solutions that help keep corporate networks secure. Razorpoint Security
has exceptional expertise in network security, attack/penetration testing and identifying security vulnerabilities
especially as they relate to Internet solutions and web applications. Razorpoint offers all sectors of business the
services necessary to maintain a firm grasp on the evolving state of network security.
For more information, Razorpoint Security Technologies, Inc. can be reached at their headquarters at Madison
Avenue and 32nd Street in New York City.
Razorpoint Security Technologies, Inc.
31 East 32nd Street
Sixth Floor
New York City, NY 10016-5509
t: 212.744.6900
f: 212.744.6344
e: security@razorpointsecurity.com
w: www.razorpointsecurity.com
™
October 5, 2006 10 Keys To Effective Network Security [v1.3] Page 3 of 3
31 east 32nd street, sixth floor | new york city, new york 10016-5509 usa | tel: 212.744.6900 | fax: 212.744.6344 | www.razorpointsecurity.com | security@razorpointsecurity.com
Copyright © 2001-2006 Razorpoint Security Technologies, Inc. All Rights Reserved.

Mais conteúdo relacionado

Mais procurados

Information security governance
Information security governanceInformation security governance
Information security governanceKoen Maris
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention Manish Dixit Ceh
 
The CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the UnexpectedThe CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the UnexpectedIBM Security
 
Proposal for IT Security Team
Proposal for IT Security TeamProposal for IT Security Team
Proposal for IT Security TeamRishabh Gupta
 
A New Security Management Approach for Agile Environments
A New Security Management Approach for Agile EnvironmentsA New Security Management Approach for Agile Environments
A New Security Management Approach for Agile EnvironmentsPECB
 
New CISO - The First 90 Days
New CISO - The First 90 DaysNew CISO - The First 90 Days
New CISO - The First 90 DaysResilient Systems
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALCYBER SENSE
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceEnergySec
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessnewbie2019
 
Cybersecurity on Business Resilience
Cybersecurity on Business ResilienceCybersecurity on Business Resilience
Cybersecurity on Business ResiliencePECB
 
Aetna information security assurance program
Aetna information security assurance programAetna information security assurance program
Aetna information security assurance programSiddharth Janakiram
 
Why so many SIEM Implmentations Fail
Why so many SIEM Implmentations FailWhy so many SIEM Implmentations Fail
Why so many SIEM Implmentations FailRita Barry
 
2008: Web Application Security Tutorial
2008: Web Application Security Tutorial2008: Web Application Security Tutorial
2008: Web Application Security TutorialNeil Matatall
 
Implementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren LiImplementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren LiDaneWarren
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Craig Martin
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
Building a security strategy?
Building a security strategy?Building a security strategy?
Building a security strategy?Lori McInnes
 

Mais procurados (20)

Information security governance
Information security governanceInformation security governance
Information security governance
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
 
The CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the UnexpectedThe CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the Unexpected
 
Proposal for IT Security Team
Proposal for IT Security TeamProposal for IT Security Team
Proposal for IT Security Team
 
Information Security Seminar
Information Security SeminarInformation Security Seminar
Information Security Seminar
 
A New Security Management Approach for Agile Environments
A New Security Management Approach for Agile EnvironmentsA New Security Management Approach for Agile Environments
A New Security Management Approach for Agile Environments
 
New CISO - The First 90 Days
New CISO - The First 90 DaysNew CISO - The First 90 Days
New CISO - The First 90 Days
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
 
Cybersecurity on Business Resilience
Cybersecurity on Business ResilienceCybersecurity on Business Resilience
Cybersecurity on Business Resilience
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
 
Aetna information security assurance program
Aetna information security assurance programAetna information security assurance program
Aetna information security assurance program
 
Why so many SIEM Implmentations Fail
Why so many SIEM Implmentations FailWhy so many SIEM Implmentations Fail
Why so many SIEM Implmentations Fail
 
2008: Web Application Security Tutorial
2008: Web Application Security Tutorial2008: Web Application Security Tutorial
2008: Web Application Security Tutorial
 
Implementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren LiImplementing Business Aligned Security Strategy Dane Warren Li
Implementing Business Aligned Security Strategy Dane Warren Li
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
develop security policy
develop security policydevelop security policy
develop security policy
 
Building a security strategy?
Building a security strategy?Building a security strategy?
Building a security strategy?
 

Destaque

Linguistic Passphrase Cracking
Linguistic Passphrase CrackingLinguistic Passphrase Cracking
Linguistic Passphrase CrackingPriyanka Aash
 
Effective security monitoring mp 2014
Effective security monitoring mp 2014Effective security monitoring mp 2014
Effective security monitoring mp 2014Ricardo Resnik
 
Acciones de MinTIC en Seguridad y privacidad de T.I. para el Estado
Acciones de MinTIC en Seguridad y privacidad de T.I. para el EstadoAcciones de MinTIC en Seguridad y privacidad de T.I. para el Estado
Acciones de MinTIC en Seguridad y privacidad de T.I. para el EstadoFacultad Ingeniería Udec
 
Active security monitoring
Active security monitoringActive security monitoring
Active security monitoringPetra Divekyova
 
Cloud Security Monitoring at Auth0 - Security BSides Seattle
Cloud Security Monitoring at Auth0 - Security BSides SeattleCloud Security Monitoring at Auth0 - Security BSides Seattle
Cloud Security Monitoring at Auth0 - Security BSides SeattleEugene Kogan
 
Information Security: Advanced SIEM Techniques
Information Security: Advanced SIEM TechniquesInformation Security: Advanced SIEM Techniques
Information Security: Advanced SIEM TechniquesReliaQuest
 
Seguridad informática en el ecuador expreso - v18082011
Seguridad informática en el ecuador   expreso - v18082011Seguridad informática en el ecuador   expreso - v18082011
Seguridad informática en el ecuador expreso - v18082011ROBERTH CHAVEZ
 
Achieving Continuous Monitoring with Security Automation
Achieving Continuous Monitoring with Security AutomationAchieving Continuous Monitoring with Security Automation
Achieving Continuous Monitoring with Security AutomationTripwire
 
Control y monitoreo (seguridad)
Control y monitoreo (seguridad) Control y monitoreo (seguridad)
Control y monitoreo (seguridad) marce18091
 
Security Monitoring using SIEM null bangalore meet april 2015
Security Monitoring using SIEM null bangalore meet april 2015Security Monitoring using SIEM null bangalore meet april 2015
Security Monitoring using SIEM null bangalore meet april 2015n|u - The Open Security Community
 
8 Tips on Creating a Security Culture in the Workplace
8 Tips on Creating a Security Culture in the Workplace8 Tips on Creating a Security Culture in the Workplace
8 Tips on Creating a Security Culture in the WorkplaceTripwire
 
You Can’t Protect What You Can’t See: AWS Security Monitoring & Compliance Va...
You Can’t Protect What You Can’t See: AWS Security Monitoring & Compliance Va...You Can’t Protect What You Can’t See: AWS Security Monitoring & Compliance Va...
You Can’t Protect What You Can’t See: AWS Security Monitoring & Compliance Va...Amazon Web Services
 
Network Security Monitoring or How to mitigate a DDoS attack in 20'
Network Security Monitoring or How to mitigate a DDoS attack in 20'Network Security Monitoring or How to mitigate a DDoS attack in 20'
Network Security Monitoring or How to mitigate a DDoS attack in 20'thaidn
 

Destaque (15)

Linguistic Passphrase Cracking
Linguistic Passphrase CrackingLinguistic Passphrase Cracking
Linguistic Passphrase Cracking
 
PASSWORD BEST PRACTICES
PASSWORD BEST PRACTICESPASSWORD BEST PRACTICES
PASSWORD BEST PRACTICES
 
Effective security monitoring mp 2014
Effective security monitoring mp 2014Effective security monitoring mp 2014
Effective security monitoring mp 2014
 
Acciones de MinTIC en Seguridad y privacidad de T.I. para el Estado
Acciones de MinTIC en Seguridad y privacidad de T.I. para el EstadoAcciones de MinTIC en Seguridad y privacidad de T.I. para el Estado
Acciones de MinTIC en Seguridad y privacidad de T.I. para el Estado
 
Active security monitoring
Active security monitoringActive security monitoring
Active security monitoring
 
Cloud Security Monitoring at Auth0 - Security BSides Seattle
Cloud Security Monitoring at Auth0 - Security BSides SeattleCloud Security Monitoring at Auth0 - Security BSides Seattle
Cloud Security Monitoring at Auth0 - Security BSides Seattle
 
Information Security: Advanced SIEM Techniques
Information Security: Advanced SIEM TechniquesInformation Security: Advanced SIEM Techniques
Information Security: Advanced SIEM Techniques
 
Seguridad informática en el ecuador expreso - v18082011
Seguridad informática en el ecuador   expreso - v18082011Seguridad informática en el ecuador   expreso - v18082011
Seguridad informática en el ecuador expreso - v18082011
 
Achieving Continuous Monitoring with Security Automation
Achieving Continuous Monitoring with Security AutomationAchieving Continuous Monitoring with Security Automation
Achieving Continuous Monitoring with Security Automation
 
Control y monitoreo (seguridad)
Control y monitoreo (seguridad) Control y monitoreo (seguridad)
Control y monitoreo (seguridad)
 
Security Monitoring using SIEM null bangalore meet april 2015
Security Monitoring using SIEM null bangalore meet april 2015Security Monitoring using SIEM null bangalore meet april 2015
Security Monitoring using SIEM null bangalore meet april 2015
 
8 Tips on Creating a Security Culture in the Workplace
8 Tips on Creating a Security Culture in the Workplace8 Tips on Creating a Security Culture in the Workplace
8 Tips on Creating a Security Culture in the Workplace
 
You Can’t Protect What You Can’t See: AWS Security Monitoring & Compliance Va...
You Can’t Protect What You Can’t See: AWS Security Monitoring & Compliance Va...You Can’t Protect What You Can’t See: AWS Security Monitoring & Compliance Va...
You Can’t Protect What You Can’t See: AWS Security Monitoring & Compliance Va...
 
Network Security Monitoring or How to mitigate a DDoS attack in 20'
Network Security Monitoring or How to mitigate a DDoS attack in 20'Network Security Monitoring or How to mitigate a DDoS attack in 20'
Network Security Monitoring or How to mitigate a DDoS attack in 20'
 
Ciberseguridad para nuestra gente
Ciberseguridad para nuestra genteCiberseguridad para nuestra gente
Ciberseguridad para nuestra gente
 

Semelhante a 10 KEYS TO EFFECTIVE NETWORK SECURITY

Application Security Maturity Model
Application Security Maturity ModelApplication Security Maturity Model
Application Security Maturity ModelSecurity Innovation
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxwkyra78
 
The Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxThe Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxMark Simos
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityMighty Guides, Inc.
 
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...UBM_Design_Central
 
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...UBM_Design_Central
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operationsPiyush Jain
 
Business Process Revamp is Paramount in 2024.pdf
Business Process Revamp is Paramount in 2024.pdfBusiness Process Revamp is Paramount in 2024.pdf
Business Process Revamp is Paramount in 2024.pdfChinatu Uzuegbu
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of TrustDefCamp
 
111.pptx
111.pptx111.pptx
111.pptxJESUNPK
 
Epsilon_Five_Key_Errors_Booklet_A5_16pp-LR
Epsilon_Five_Key_Errors_Booklet_A5_16pp-LREpsilon_Five_Key_Errors_Booklet_A5_16pp-LR
Epsilon_Five_Key_Errors_Booklet_A5_16pp-LRAndrea Baratta
 
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAEIT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE360 BSI
 
Transforming Information Security: Designing a State-of-the-Art Extended Team
Transforming Information Security: Designing a State-of-the-Art Extended TeamTransforming Information Security: Designing a State-of-the-Art Extended Team
Transforming Information Security: Designing a State-of-the-Art Extended TeamEMC
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...EC-Council
 

Semelhante a 10 KEYS TO EFFECTIVE NETWORK SECURITY (20)

ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
 
Application Security Maturity Model
Application Security Maturity ModelApplication Security Maturity Model
Application Security Maturity Model
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 
The Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxThe Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptx
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
 
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
 
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
 
Many products-no-security (1)
Many products-no-security (1)Many products-no-security (1)
Many products-no-security (1)
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
 
Eng Solutions - Capability Statement-Latest
Eng Solutions - Capability Statement-LatestEng Solutions - Capability Statement-Latest
Eng Solutions - Capability Statement-Latest
 
Business Process Revamp is Paramount in 2024.pdf
Business Process Revamp is Paramount in 2024.pdfBusiness Process Revamp is Paramount in 2024.pdf
Business Process Revamp is Paramount in 2024.pdf
 
Security and SMBs
Security and SMBsSecurity and SMBs
Security and SMBs
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of Trust
 
111.pptx
111.pptx111.pptx
111.pptx
 
Epsilon_Five_Key_Errors_Booklet_A5_16pp-LR
Epsilon_Five_Key_Errors_Booklet_A5_16pp-LREpsilon_Five_Key_Errors_Booklet_A5_16pp-LR
Epsilon_Five_Key_Errors_Booklet_A5_16pp-LR
 
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAEIT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
 
16231
1623116231
16231
 
Transforming Information Security: Designing a State-of-the-Art Extended Team
Transforming Information Security: Designing a State-of-the-Art Extended TeamTransforming Information Security: Designing a State-of-the-Art Extended Team
Transforming Information Security: Designing a State-of-the-Art Extended Team
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
Applying Lean for information security operations centre
Applying Lean for information security operations centreApplying Lean for information security operations centre
Applying Lean for information security operations centre
 

Último

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 

Último (20)

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 

10 KEYS TO EFFECTIVE NETWORK SECURITY

  • 1. 10 Keys To Effective Network Security [ WHITE PAPER ] ™ Author: Razorpoint Security Team Version: 1.3 Date of current version: 2006-10/05 Date of original version: 2001-04/04 Copyright © 2001-2006 Razorpoint Security Technologies, Inc. All Rights Reserved.
  • 2. 10 Keys To Effective Network Security The following 10 keys outline a foundation in building an effective security policy for your network operating environment. They explain the realities of network security and how to apply corporate resources toward the ongoing effort of securing a network environment. KEY 1: Executive level needs to be responsible (Establish accountability). Think of network security in terms of system survival and business continuity. As such, accountability should be shouldered at senior levels much like a company’s financial position falls upon a CFO or CEO. Effective security policies should be implemented and maintained by a skilled and experienced technology staff directed by a senior company officer or director (CTO, Director of Technology, etc.). Technology departments should be empowered with the resources (skilled staff, budget, hardware, software, etc.) and autonomy to react effectively on an ongoing basis. The senior company director must ensure the availability of these resources, while the entire senior management maintains accountability. KEY 2: Educate staff and promote awareness. People are almost always the weakest link in any organization’s security chain. It is for this reason that proper education and awareness of network security and security policies be understood by not only technology staff, but all employees. While more detailed technology expertise should be mandatory within technology departments, awareness and training must be provided to all company employees. Company employment documents should include a detailed explanation of the company’s policy on technology usage including, but not limited to, computers (laptops, desktops, servers), network access, Internet access, email, the worldwide web, and remote access to company resources. KEY 3: A process, not a product (Security is ongoing, never ending). There is no single answer. As part of employee security awareness, the fact that security is never realized by a single product or technique should be stressed. The myth of “You just install this one shrink-wrapped package and you’re done” is a dangerous pitfall many firms fall into. The overall security posture of a company needs to be part of the business decision-making process. Security is a process, not a product. KEY 4: Exhibit cautious, but prudent, spending (Don’t “just throw money at it”). Security is not just “having a firewall.” Many of the “all-things-to-all-people” products are not sufficient. These general tools (firewalls, VPNs, packet filters, etc.) can still leave company-specific systems vulnerable. A solution of this nature can end up costing an overwhelming amount due to an unforeseen security compromise. Purchasing and properly deploying tools such as firewalls, intrusion detection systems, VPNs, etc. as part of an overall security policy is an excellent way to promote a secure operating environment. Regular maintenance of these security tools should be a mandatory exercise in enforcing a company’s security policy. KEY 5: Regular assessment of the “threatscape” – Be proactive. Hire a security firm to regularly audit the security of your network infrastructure. This is similar to an outside accounting firm auditing a company’s financial records. As a proactive security measure, a qualified, third party should be retained to regularly audit the state of a company’s security. Security firms test, externally as well as internally, the true strength of an infrastructure’s security. An audit of this type provides a “hacker’s eye view” of a network operating environment. October 5, 2006 10 Keys To Effective Network Security [v1.3] Page 1 of 3 31 east 32nd street, sixth floor | new york city, new york 10016-5509 usa | tel: 212.744.6900 | fax: 212.744.6344 | www.razorpointsecurity.com | security@razorpointsecurity.com Copyright © 2001-2006 Razorpoint Security Technologies, Inc. All Rights Reserved. ™
  • 3. KEY 6: Deploy and maintain a balanced, flexible security policy. An effective security policy should also include physical security, disaster recovery and user training. A “one size fits all” approach should be avoided. Design a security policy, or “process,” that is geared toward your current technology infrastructure as well as future iterations. It should evolve as your organization evolves. A balanced and flexible security policy should encompass firewalls, VPNs, good password usage, remote access procedures, security of physical resources (file cabinets, computer rooms, network access points, confidential documents, etc.), disaster recovery scenarios and provide for the ongoing effort of keeping all company employees aware of changes as they occur. KEY 7: Incorporate security early. It is always more efficient and effective to design security into an infrastructure from the beginning. Imagine only after finishing a bank realizing you needed a vault, alarms and security glass. Because of the lack of security consciousness at the outset, everything must now be redone. Similarly, security must be a primary focus when designing and maintaining an technology infrastructure. While security components can certainly be added afterward, incorporating security early yields better results. When necessary, hire an outside firm to perform a security design review of existing or upcoming technology rollouts. If nothing else, this “extra set of eyes” can provide another perspective on your needs, your technology and your security choices. Be sure to choose a firm with a proven track record performing security audits and services. KEY 8: Outsource security maintenance as necessary. In some circumstances, it makes business sense for firms to outsource their security needs. Understaffed or undertrained technology departments may not be equipped to adequately maintain effective network security. In these cases outsourcing can be an answer. Some or all of a company’s network security can be given to a security firm whose sole responsibility is securing your environment. Firewalls, VPNs, remote access, and other security-related necessities can be facilitated by an outside firm. This can also help a company to more slowly, and effectively, grow their own in-house staff. With security maintained by an outside firm, CTOs and CIOs can take more time staffing in-house teams with the appropriate, qualified personnel. KEY 9: Staff your technology team correctly. Be sure your technology staff is well-rounded in terms of technology expertise (network infrastructure design and management, security implementation, multiple operating system experience, etc.) and is trained in all necessary areas of your company’s technology. In addition to necessary certifications (CISSP, Check Point CCSA & CCSE, Cisco CCNA, etc.) security technology professionals must be able to demonstrate previous experience with relevant technology and provide references that can support previous career successes. KEY 10: Maintain vigilance. No one ever asks “When can we stop doing sales or marketing?” It is the same with security; it is never ending. Y2K was perceived as a business issue, security is even more so. It needs to be fully understood at the most senior levels why security is as large a business concern as sales or marketing. A security breach of financial records, confidential company data, client information or other sensitive material could be disastrous. Security compromises can destroy relationships with customers and investors. Financial liability, lost revenue, damage to a company’s brand and reputation could prove irreparable. Security concerns should extend well beyond “stopping a virus” or “installing a firewall,” it should be viewed as a business continuity issue and, as such, funded, staffed and maintained accordingly. October 5, 2006 10 Keys To Effective Network Security [v1.3] Page 2 of 3 31 east 32nd street, sixth floor | new york city, new york 10016-5509 usa | tel: 212.744.6900 | fax: 212.744.6344 | www.razorpointsecurity.com | security@razorpointsecurity.com Copyright © 2001-2006 Razorpoint Security Technologies, Inc. All Rights Reserved.
  • 4. About Razorpoint Security. Razorpoint Security Technologies, Inc. specializes in researching and analyzing security vulnerabilities and conducting comprehensive security assessments. These assessments provide business leaders and corporate clients the necessary security services and solutions that help keep corporate networks secure. Razorpoint Security has exceptional expertise in network security, attack/penetration testing and identifying security vulnerabilities especially as they relate to Internet solutions and web applications. Razorpoint offers all sectors of business the services necessary to maintain a firm grasp on the evolving state of network security. For more information, Razorpoint Security Technologies, Inc. can be reached at their headquarters at Madison Avenue and 32nd Street in New York City. Razorpoint Security Technologies, Inc. 31 East 32nd Street Sixth Floor New York City, NY 10016-5509 t: 212.744.6900 f: 212.744.6344 e: security@razorpointsecurity.com w: www.razorpointsecurity.com ™ October 5, 2006 10 Keys To Effective Network Security [v1.3] Page 3 of 3 31 east 32nd street, sixth floor | new york city, new york 10016-5509 usa | tel: 212.744.6900 | fax: 212.744.6344 | www.razorpointsecurity.com | security@razorpointsecurity.com Copyright © 2001-2006 Razorpoint Security Technologies, Inc. All Rights Reserved.