Sunday, April 19, 2015

Defense in Depth


With the evolution of technologies our dependency on digital devices has increased manifold. And we are exposed to cyber-attacks more than ever. Lately, some of giant organizations like Sony and Amazon have become the victims of cyber-attacks and that have sent ripples to the others similar or smaller and less protected establishments to ponder over how immune they are for such attacks or what defense mechanism they have to defend if such attacks happen to their organizations. As they say Cyber Attack is not the question of yes or no it is the question of ‘When’, we need to be as ready as expecting the attack today itself. Security is never much but the terms; ROI (Return on Investment) and cost benefit analysis are also relevant. Most of organizations adopt multilayered security approach, Security at the perimeter-Firewalls, DMZ (De militarized Zone), IPS (Intrusion Prevention System), IDS (Intrusion Detection System) Honey pots, WAFs (Web Application Firewall) and Host based Protection System as Antivirus, Anti-spy ware, threat protection etc. Considering this as not enough, many organizations place SOC (Security Operations Centre) and NOC (Network Operations Center) to have a robust mechanism in order to defend the cyber-attacks. SIEM (Security Incident and Event Management) helps to captures logs in real time, generate alerts and does the correlations also to identify the abnormal or suspicious activities on the network. SIEM solutions like HP Arcsight, MacAfee ESM, and Alien Vault USM also help in auditing breaches such as misuse of the privilege user IDs and unauthorized changes etc. organizations are also introducing End User IT Analytic Solutions like Nexthink & SysTrack that monitor the end user activities in real time and generate alerts and reports to helpdesk to respond to any security incident quickly and efficiently.  ISO27001 and ISO27035 articulate the need of a robust Security Incident Management to actually make use of these automated security tools. Unless the organizations have a strong Incident Management in place, they will find themselves off-guard when they have to do a face to face with DoS/DDoS (Denial of Service/Distributed Denial of Service) attack for example.

The basic components of a Security Incident Management are Preparation, Detection & Analysis, Containment Eradication & Recovery, and Post Incident Activity 

 

This is a continuous cycle and each subset of the cycle is as important as the entire cycle. Organizations need to have a clear and well defined Incident Management Policy & guidelines with clarity on the roles and responsibility of all the teams/individuals involved in the cause. Post Mortem to actually find out lessons learnt is very important as they say “There is a principle that says, never waste a good crisis."

However as the defense security is not complete without strong Incident Management Program, the same is true about Information Security Awareness. Security Awareness has lately become the major part of any security defense program. Given the rise of Social engineering techniques such as phishing, spear phishing, email spoofing and APTs Security Awareness has become the talk of the town. With the help of Social engineering attackers can penetrate even the strongest perimeter security and break into the most reliable and secured network. Many companies are investing on security awareness program besides other traditional security protection measures.  Security Awareness can thwart most of the security incidents and can keep a check on insider attacks. Organizations need to have a thorough Information Security Awareness Program in place to educate the employees about the security threats and best practices.

 

 

 

No comments:

Post a Comment