Preface:
Although your in house IT setup has SIEM, IDS, IPS, ..etc. But you may have questions? What is the defense criteria. Yes, we fully understand that install full scope of defense mechanism might mitigate the risk, right? Implement the IT strategic outsourcing. Enforce the follow the Sun policy. Deploy the management security service. But think it over, those defense mechanisms are involve human operation. Perhaps the SLA agreement of your services provider promises 99.99 % response time. But cyber security incident handling method far away with normal IT operation framework. For instance, engage the forensic investigation sometimes consume time to isolate the problem. As a matter of fact, SLA looks like a value. The quicker you receive email reply or return phone call did not imply it boots up the value of cyber incident management.
Objective:
Now we look back the cyber incident history. The security experts and security analysis Guru are summarized the key factors of the weakness of IT infrastructure today. No matter how was the size of your firm. Below key elements can guide you to the appropriate approach.
Weaknesses of IT domain – Key elements
- Unauthenticated protocols
- Outdated hardware
- Weak user authentication
- Weak file integrity checks
- Vulnerable Windows operating systems
- Undocumented third-party relationships
If your firm is able to compliance above 6 items of key elements. I was say congratulation to you. But for the realistic point of view, I believed that it is not easy to archive. For instance, you application development team is going to enhance the application. However the application integrate with a legacy product. Furthermore the legacy product is retired of their product life cycle. You know what is the weakness and the vulnerabilities. As a matter of fact, it is not possible to inform your management team suspend the project process since this is a business objective. Similar fashion of scenario you might encountered or familiar. Any idea or resolution to resolve such business habit forming manner. Since all the final decision will be decide by CSO, CIO or coporate management team. But at least following hints can give more space to you for thinking of this subject matter.
Definition:
Use a security controls matrix to justify controls and identify the weakness of the specifics area. The design goal is that take the benefit of matrix table for simplification terms. Thus provide a straight forward path which can apply to the key objective area. Since we all tech guy and no need to mention in depth. For more details, please see below:
Base on the 6 key elements of weakness in overall IT Infrastructure. Below assessment tool can provides an overall idea to you which area of weakness encountered in your shop.
authenticated protocols | Availability SSL or VPN (Ipsec) | Change control policy |
Router (GUI access) | Yes(1)/No(0) | Yes(1)/No(0) |
Switch (GUI access) | Yes(1)/No(0) | Yes(1)/No(0) |
Firewall (GUI access) | Yes(1)/No(0) | Yes(1)/No(0) |
Managed security service (GUI access) | Yes(1)/No(0) | Yes(1)/No(0) |
Cloud Farm (GUI access) | Yes(1)/No(0) | Yes(1)/No(0) |
Total score | Full score (5) | Full score (5) |
Outdated Hardware | Still operate | In-House hardware lifecycle policy |
Router (OS obsoleted) | Yes(0)/No(1) | Yes(1)/No(0) |
Switch (OS obsoleted) | Yes(0)/No(1) | Yes(1)/No(0) |
Firewall (OS obsoleted) | Yes(0)/No(1) | Yes(1)/No(0) |
Sever (Vendor support – End of Life) | Yes(0)/No(1) | Yes(1)/No(0) |
PABX (CTI server) | Yes(0)/No(1) | Yes(1)/No(0) |
Total score | Full score (5) | Full score (5) |
user authentication | ID asset management | Single sign-on feature |
Router Logon access | Yes(1)/No(0) | Yes(0)/No(1) |
Switch Logon access | Yes(1)/No(0) | Yes(0)/No(1) |
Firewall Logon access | Yes(1)/No(0) | Yes(0)/No(1) |
Privileges ID | Yes(1)/No(0) | Yes(0)/No(1) |
Application program service ID | Yes(1)/No(0) | Yes(0)/No(1) |
Total score | Full score (5) | Full Score (5) |
File integrity check | Top Secret / Confidential Data | Data classification Policy |
Server | Yes(1)/No(0) | Yes(1)/No(0) |
Web Application (External) | Yes(1)/No(0) | Yes(1)/No(0) |
Web Application (Internal) | Yes(1)/No(0) | Yes(1)/No(0) |
Database (DB) | Yes(1)/No(0) | Yes(1)/No(0) |
Cloud farm | Yes(1)/No(0) | Yes(1)/No(0) |
Total score | Full score (5) | Full score (5) |
Vulnerability management | Zero day & critical patch | Incident management procedure |
Router | Yes(1)/No(0) | Yes(1)/No(0) |
Switch | Yes(1)/No(0) | Yes(1)/No(0) |
Firewall | Yes(1)/No(0) | Yes(1)/No(0) |
Server | Yes(1)/No(0) | Yes(1)/No(0) |
Application | Yes(1)/No(0) | Yes(1)/No(0) |
Total score | Full score (5) | Full score (5) |
3rd Party relationship | Responsibilities (scope of works and support level of cyber security incident) | Dedicated subject matter expert implement in this role |
Management security services | Yes(1)/No(0) | Yes(1)/No(0) |
Web Hosting | Yes(1)/No(0) | Yes(1)/No(0) |
Application (Vendor service support token) | Yes(1)/No(0) | Yes(1)/No(0) |
Hardware maintenance (services provider) | Yes(1)/No(0) | Yes(1)/No(0) |
Network (MPLS, Frame-link, Internet line, Boardband..etc) | Yes(1)/No(0) | Yes(1)/No(0) |
Total score | Full score (5) | Full score (5) |
Achievement:
What is your over performance score on above matrix table? If it is not suitable to your environment. No problem, please go ahead to modify the criteria and try to fit to your project scope. Even though external auditor engage the risk assessment they are using the same idea. Good luck to all of you!