Security Capabilities of WP500
Authentication |
|
|
|
|
|
Aspect |
Details |
Click Link for more details |
Description |
Verify identity of users before granting access. |
Refer topic Access Control |
Role in Defense in Depth |
Prevent unauthorized access at various system levels. |
|
Threats Mitigated |
Unauthorized access, Identity theft. |
|
User Mitigation Strategies |
Strong password policies, Multi-factor authentication. |
|
|
|
|
Encryption |
|
|
|
|
|
Aspect |
Details |
Click Link for more details |
Description |
Protect data in transit and at rest. |
|
Role in Defense in Depth |
Protect data confidentiality and integrity. |
|
Threats Mitigated |
Data breaches, Interception. |
|
User Mitigation Strategies |
Use of updated and strong encryption standards. |
|
|
|
|
Access Controls |
|
|
|
|
|
Aspect |
Details |
Click Link for more details |
Description |
Define and enforce who can access what resources. |
|
Role in Defense in Depth |
Ensure that only authorized users have access to certain data or systems. |
|
Threats Mitigated |
Unauthorized access, Privilege escalation. |
|
User Mitigation Strategies |
Regular review and update of access rights. |
Refer topic Role Base Access Control |
|
|
|
Intrusion Detection System (IDS) |
|
|
|
|
|
Aspect |
Details |
Click Link for more details |
Description |
Monitor network and system activities for malicious activities or policy violations. |
|
Role in Defense in Depth |
Detect potential security breaches. |
|
Threats Mitigated |
Intrusion attempts, Malware. |
|
User Mitigation Strategies |
Timely update of IDS signatures, Regular monitoring. |
Refer topic Network Security |
|
|
|
Patch Management |
|
|
|
|
|
Aspect |
Details |
Click Link for more details |
Description |
Regular updates of software with patches. |
|
Role in Defense in Depth |
Protect against vulnerabilities due to outdated software. |
|
Threats Mitigated |
Exploitation of known vulnerabilities. |
|
User Mitigation Strategies |
Regular patching schedule, Immediate update of critical patches. |
|
|
|
|
Firewall |
|
|
|
|
|
Aspect |
Details |
Click Link for more details |
Description |
Control incoming and outgoing network traffic based on an applied rule set. |
|
Role in Defense in Depth |
Establish a barrier between a trusted and an untrusted network. |
|
Threats Mitigated |
Unauthorized access, Network attacks. |
|
User Mitigation Strategies |
Proper configuration of firewall rules, Regular review. |
Refer topic Network Security |
|
|
|
Backup and Recovery |
|
|
|
|
|
Aspect |
Details |
Click Link for more details |
Description |
Procedures for creating and storing copies of data. |
|
Role in Defense in Depth |
Ensure availability and integrity, prevent data loss. |
|
Threats Mitigated |
Data loss due to system failures, Ransomware. |
|
User Mitigation Strategies |
Regular backups, Test recovery processes. |
Refer topic Backup & Restore |
|
|
|
Network Segmentation |
|
|
|
|
|
Aspect |
Details |
Click Link for more details |
Description |
Splitting the network into smaller parts. |
|
Role in Defense in Depth |
Limit an attackās ability to move laterally across systems. |
|
Threats Mitigated |
Lateral movement, Propagation of threats. |
|
User Mitigation Strategies |
Implement VLANs, Enforce strict access controls. |
Refer topic LAN |
|
|
|
Legacy Code Monitoring |
|
|
|
|
|
Aspect |
Details |
Click Link for more details |
Description |
Tools and procedures to monitor legacy systems. |
|
Role in Defense in Depth |
Manage the security of outdated systems still in use. |
|
Threats Mitigated |
Vulnerabilities in outdated systems. |
|
User Mitigation Strategies |
Use of protective monitoring, Legacy systems isolated from main network. |
|
|
|
|
File Integrity Monitoring (FIM) |
|
|
|
|
|
Aspect |
Details |
Click Link for more details |
Description |
Monitoring and detection of changes to critical system files, configuration files, or content files. |
|
Role in Defense in Depth |
Provides alerts on unauthorized changes that could indicate a breach. |
|
Threats Mitigated |
Tampering, Unauthorized changes, Malware. |
|
User Mitigation Strategies |
Regular review of FIM alerts, Quick response to unauthorized modifications. |
Created with the Personal Edition of HelpNDoc: Maximize Your PDF Protection with These Simple Steps