Security Tactics For People, Processes, and Technology
Security Tactics For People, Processes, and Technology
2. Processes – This layer of cybersecurity ensures that IT teams have strategies in place to proactively
prevent and to respond quickly and effectively in the event of a cybersecurity incident.
IT security teams should have a cyber-incident response plan in place. A good incident response plan will
provide an organization with repeatable procedures and an operational approach to address
cybersecurity incidents to recover business processes as quickly and efficiently as possible. Additionally,
ensuring proper backups are in place; regularly testing these backups is imperative to minimize downtime
and increase the chances of data recovery from a cyber-event.
Next are the collection and analysis of threat research. Every security strategy and tool must be informed
by current threat intelligence to detect and respond to threats effectively. For example, threat research
might reveal that cybercriminals have been carrying out attacks through a specific vulnerability, or
targeting endpoints with a specific malware. Armed with this information, IT teams can then take
proactive measures by making any necessary system updated and increasing monitoring to detect
behavior indicative of one of these attacks. It is also important that IT teams consult both local and global
threat data for the most comprehensive understanding of the threat landscape.
Another important process for achieving effective cybersecurity is the prioritization of assets. While IT
teams remain strained from a cybersecurity skills gap, networks have become increasingly sophisticated,
making it impossible to monitor each area of the network at all times manually. Security teams can
develop policies and deploy strategies to keep these data more secure and minimize consequences. This
might mean using network segmentation to add an extra level of security or creating access control
policies based on who needs access to these specific sets of data.
3. Technology – There are hosts of technologies that security teams can implement to layer their defenses.
It is important that IT teams do not implement isolated point solutions as they layer their defenses, but
rather select those tools based on their ability to be integrated and automated to create a security fabric
that can facilitate the rapid detection and mitigation of threats.
Another tactic that IT teams should leverage is deception technology. Network complexity is an Achilles
heel for adversaries. Deception technologies level the playing field by automating the creation of dynamic
decoys that are dispersed throughout the IT environment, making it harder for the adversary to
determine which assets are fake and which are real. When an adversary can’t make this distinction,
cybercriminals are forced to waste time on fake assets and exercise caution as they look for tripwires
embedded in these fake environment.
Cloud technology is set to have a significant impact on the transformation of systems security technology.
More business enterprises and government agencies have embraced cloud technology to store the vast
amounts of information that they generate daily.
There will be more approaches to information systems security that will be developed for use in the cloud.
Techniques for on-premise data storage will be migrated to the cloud. Components such as virtualized
intrusion detection and prevention systems, virtualized firewalls and virtualized systems security will now be
used from the cloud as opposed to the traditional forms.
Both private and public entities have doubled up their data center security by the use of Infrastructure as a
Service (IaaS) services such as FireHost and Amazon.
Deep learning encompasses some technologies like machine learning and artificial intelligence. There is a
significant deal of interest for systems security in these technologies. Deep learning, just like behavior
analytics, focuses on anomalous behavior. Whenever artificial intelligence and machine learning systems are
fed with the right data regarding potential systems security threats, they can make decisions on how to
prevent hacks depending on their immediate environment without any human point.
The system scrutinizes entities, instead of users, that have access to the information system. The most recent
developments in machine learning technology and exact business analytics mean that we can now analyze
different entities that are found in the enterprise at both the macro and the micro levels. Business
organizations and government agencies can now stamp out any persistent or advanced cyber threats using
artificial intelligence and machine learning.
Security Objectives
Security Policy
A security policy is a set of rules that applies to activities for the computer and communications resources that
belong to an organization. These rules include areas such as physical security, personnel security,
administrative security, and network security.
The security policy defines what an organization wants to protect and what it expects of its system users. It
provides a basis for security planning when designing new applications or expanding the current network. It
describes user responsibilities like protecting confidential information and creating nontrivial passwords. The
security policy should also describe how the effectiveness of security measures will be monitored. Such
monitoring helps in determining whether someone is attempting to circumvent the safeguards.
To develop a security policy, clearly define the security objectives. Afterward, take steps to put into effect the
rules it contains. These steps should include training employees and adding the necessary software and
hardware to enforce the rules. When making changes in computing environment, update the security policy
as well.
Security Objectives
When creating and carrying out a security policy, one must have clear objectives. These objectives must fall
into one (1) or more of the following categories:
• Resource Protection – The resource protection scheme ensures that only authorized users can access
objects on the system. The ability to secure all types of system resources is a system strength. As such,
carefully define the different categories of users that can access the system. In addition, define what
access authorization can be given to these groups of users as part of creating security policy.
• Authentication – The assurance or verification that the resource (human or machine) at the other end
of the session really is what it claims to be. Solid authentication defends a system against the security
risk of impersonation, in which a sender or receiver uses a false identity to access a system.
Traditionally, systems used passwords and usernames for authentication. Now, digital certificates can
provide a more secure method for authentication while offering other security benefits as well.
• Authorization – This is an assurance that the person or computer at the other end of the session has
permission to carry out the request. Authorization is the process of determining who or what can
access the system resources or perform certain activities on a system. Typically, authorization is
performed in context application.
• Integrity – This is an assurance that the arriving information is the same as what was sent out.
Understanding integrity requires understanding the concepts of data integrity and system integrity.
o Data Integrity – Data is protected from unauthorized changes or tampering. Data integrity
defends against the security risk of manipulation, or the act of intercepting and changing
information to which s/he is not authorized.
o System Integrity – The system provides consistent and expected results with expected
performance.
• Nonrepudiation – This is the proof that a transaction occurred, or that a user sent or received a
message. The use of digital certificates and public key cryptography to sign transactions, messages,
and documents support nonrepudiation. Both the sender and the receiver agree that the exchange
takes place. The digital signature on the data provides the necessary proof.
• Confidentiality – This is the assurance that sensitive information remains private and is not visible to
an eavesdropper. Confidentiality is critical to total data security.
• Auditing Security Activities – These monitor security-relevant events to provide a log of both
successful and unsuccessful (denied) access. Successful access records tell who is doing what on the
systems. Unsuccessful (denied) access records tell either that someone is attempting to break the
security or that someone is having difficulty accessing the system.
IT Security Framework
Below are some key frameworks that are widely used in the industry.
1. National Institute of Standards and Technology (NIST) – It is a federal agency within the United States
Department of Commerce. NIST’s mission is to develop and promote measurement, standards, and
technology to enhance productivity, facilitate trade, and improve the quality of life. It also establishes IT
standards and guidelines for federal agencies. This cybersecurity framework is completely optional, but
it is designed to increase the resilience of an organization’s defenses.
The Cybersecurity Framework consists of three (3) main components:
• Framework core – It provides a set of desired cybersecurity activities and outcomes using a
common language that is easy to understand.
• Framework implementation tiers – These assist organizations by providing context on how an
organization views cybersecurity risk management.
• Framework profiles – These are primarily used to identify and prioritize opportunities for
improving cybersecurity at an organization.
2. ISO/IEC – 27000 family – The International Organization for Standardization developed the ISO 27000
series. Because it is broad in scope, any type or size of organization can benefit from being familiar with
it and adopting its recommendations, as appropriate to an industry and business type.
ISO 27000 is a systematic approach to managing sensitive information securely (also known as the
Information Security Management System [ISMS]). It includes managing risk for people, processes, and
IT systems. This family is divided into different sub-standards—some of which apply to specific industries,
while others are specific to operational choices.
ISO 27000 includes a six-part approach:
I. Define a security policy.
II. Define the scope of the ISMS.
III. Conduct a risk assessment.
IV. Manage identified risks.
V. Select control objectives and controls to be implemented.
VI. Prepare a statement of applicability.
3. Payment Card Industry Data Security Standard (PCI DSS) – It was initiated to ensure businesses process
card payments were secure and to help reduce card fraud. This payment standard has principle
requirements, all of which are covered by these six (6) categories:
I. Build and maintain a secure network.
II. Protect card data.
III. Maintain a vulnerability program.
IV. Implement strong access control measures.
V. Regularly monitor and test networks.
VI. Maintain an Information security policy
Security Architecture
Security architecture is a unified security design that addresses the necessities and potential risks involved in
a particular scenario or environment. It also specifies when and where to apply security controls. The design
process is generally reproducible.
In security architecture, the design principles are clearly reported and in-depth security control specifications
are generally documented in independent documents. A system architecture can be considered a design that
includes a structure and can address the connection between the components of that structure.
The key attributes of security architecture are as follows:
• Relationships and Dependencies – These signify the relationship between the various components
inside IT architecture and how they depend on each other.
• Benefits – Security architecture’s main advantage is its standardization, which makes it affordable. It
is cost-effective due to the re-use of controls described in the architecture.
• Form – Security architecture is associated with IT architecture; however, it may take a variety of forms.
It includes a catalog of conventional controls in addition to relationship diagrams and principles.
• Drivers – Security controls are determined based on these four (4) factors:
o Risk management
o Benchmarking and good practice
o Financial
o Legal and regulatory
References:
IBM Knowledge Center. (n.d.). Security policy and objectives [Web log post]. Retrieved from
https://www.ibm.com/support/knowledgecenter/en/ssw_ibm_i_73/rzaj4/rzaj40j0securitypolco.htm on April 26,
2019
Mind-core.com (2018, September 5). 5 types of cyber security [Web log post]. Retrieved from https://mind-core.com/5-
types-of-cyber-security/ on May 3, 2019
Security Architecture (n.d.). In Techopedia. Retrieved from https://www.techopedia.com/definition/72/security-
architecture on April 26, 2019
Tarun, R. (2018, December 10). A layered approach to cybersecurity: People, Processes, and Technology [Web log post].
Retrieved from https://www.csoonline.com/article/3326301/a-layered-approach-to-cybersecurity-people-
processes-and-technology.html on April 24, 2019
Theriault, C. (2019, March 28). What is an information security framework and why do I need one? [Web log post].
Retrieved from https://tbgsecurity.com/what-is-an-information-security-framework-and-why-do-i-need-one/ on
April 26, 2019
Tripwire.com (2018, March 25). 3 emerging innovations in technology that will impact cyber security [Web log post].
Retrieved from https://www.tripwire.com/state-of-security/featured/emerging-technology-cyber-security/ on
April 25, 2019