Authentication






Aspect

Details

Click Link for more details

Description

Verify identity of users before granting access.


Refer topic Access Control

Role in Defense in Depth

Prevent unauthorized access at various system levels.

Threats Mitigated

Unauthorized access, Identity theft.

User Mitigation Strategies

Strong password policies, Multi-factor authentication.




Encryption






Aspect

Details

Click Link for more details

Description

Protect data in transit and at rest.


Role in Defense in Depth

Protect data confidentiality and integrity.

Threats Mitigated

Data breaches, Interception.

User Mitigation Strategies

Use of updated and strong encryption standards.




Access Controls






Aspect

Details

Click Link for more details

Description

Define and enforce who can access what resources.


Role in Defense in Depth

Ensure that only authorized users have access to certain 

data or systems.

Threats Mitigated

Unauthorized access, Privilege escalation.


User Mitigation Strategies

Regular review and update of access rights.

Refer topic Role Base Access Control




Intrusion Detection System (IDS)






Aspect

Details

Click Link for more details

Description

Monitor network and system activities for malicious

 activities or policy violations.

Role in Defense in Depth

Detect potential security breaches.


Threats Mitigated

Intrusion attempts, Malware.


User Mitigation Strategies

Timely update of IDS signatures, Regular monitoring.

Refer topic Network Security




Patch Management






Aspect

Details

Click Link for more details

Description

Regular updates of software with patches.


Role in Defense in Depth

Protect against vulnerabilities due to outdated software.


Threats Mitigated

Exploitation of known vulnerabilities.


User Mitigation Strategies

Regular patching schedule, Immediate update of critical patches.





Firewall






Aspect

Details

Click Link for more details

Description

Control incoming and outgoing network traffic based on

 an applied rule set.

Role in Defense in Depth

Establish a barrier between a trusted and an untrusted network.


Threats Mitigated

Unauthorized access, Network attacks.


User Mitigation Strategies

Proper configuration of firewall rules, Regular review.

Refer topic Network Security




Backup and Recovery






Aspect

Details

Click Link for more details

Description

Procedures for creating and storing copies of data.


Role in Defense in Depth

Ensure availability and integrity, prevent data loss.


Threats Mitigated

Data loss due to system failures, Ransomware.


User Mitigation Strategies

Regular backups, Test recovery processes.

Refer topic Backup & Restore




Network Segmentation






Aspect

Details

Click Link for more details

Description

Splitting the network into smaller parts.


Role in Defense in Depth

Limit an attack’s ability to move laterally across systems.


Threats Mitigated

Lateral movement, Propagation of threats.


User Mitigation Strategies

Implement VLANs, Enforce strict access controls.

Refer topic LAN




Legacy Code Monitoring






Aspect

Details

Click Link for more details

Description

Tools and procedures to monitor legacy systems.


Role in Defense in Depth

Manage the security of outdated systems still in use.


Threats Mitigated

Vulnerabilities in outdated systems.


User Mitigation Strategies

Use of protective monitoring, Legacy systems isolated

 from main network.




File Integrity Monitoring (FIM)






Aspect

Details

Click Link for more details

Description

Monitoring and detection of changes to critical system 

files, configuration files, or content files.

Role in Defense in Depth

Provides alerts on unauthorized changes that could 

indicate a breach.

Threats Mitigated

Tampering, Unauthorized changes, Malware.


User Mitigation Strategies

Regular review of FIM alerts, Quick response to 

unauthorized modifications.

Created with the Personal Edition of HelpNDoc: Maximize Your PDF Protection with These Simple Steps