Unit 3
Unit 3
1. Securing physical access to data centers, server rooms, and other critical IT facilities
2. Implementing access control systems, surveillance cameras, and intrusion detection
systems
3. Protecting IT assets from physical threats such as theft, damage, or tampering
5. Access Control:
Keeping information and systems secure is very important for any organization. Information
security governance and risk management help in achieving this by following a set of rules and
practices.
- Security Policies: These are the main rules that the organization follows to protect its sensitive
information and systems. They explain what needs to be done and who is responsible for it.
- Security Standards: These are more detailed instructions on how to implement the security
policies correctly. They provide specific steps and configurations to ensure consistency.
- Security Guidelines: These are recommendations and best practices that help people understand
how to follow security measures properly. Guidelines can cover various topics like password
management, secure coding practices, or what to do in case of a security incident.
- Risk Identification: This means finding out what kind of threats or vulnerabilities could harm the
organization's important information or systems. These risks could be things like cyber attacks,
insider threats (people within the organization causing harm), natural disasters, or human errors.
- Risk Assessment: Once the risks are identified, they need to be analyzed and evaluated based on
how likely they are to happen and how much damage they could cause. This helps the organization
decide which risks are the most important to address first.
- Vulnerability Assessment: This involves scanning and testing the organization's systems,
applications, and networks to find any weaknesses or flaws that could be exploited by attackers.
Regular vulnerability assessments help the organization stay ahead and fix security gaps before
they are misused.
Reducing and Managing Risks:
- Risk Mitigation Planning: Based on the identified risks and how severe they are, the organization
makes plans to reduce or eliminate those risks to an acceptable level. This could involve
implementing security controls (like firewalls or encryption), updating policies and procedures, or
transferring some risks to insurance companies or external service providers.
- Risk Treatment: Depending on the risk and how serious it is, the organization may choose to
accept it (if the risk is low), avoid it (by stopping the activity that causes the risk), reduce it (by
implementing security controls or other measures), or transfer it (by outsourcing or getting
insurance).
- Risk Monitoring and Review: Managing risks is an ongoing process. The organization must
continuously monitor and review its risk situation, making changes to its risk reduction strategies as
needed to address new or changing threats.
- Regulatory Compliance: Organizations must follow relevant laws, regulations, and industry
standards related to information security, such as GDPR (for data protection), HIPAA (for healthcare
data), PCI DSS (for payment card data). This may involve implementing specific security controls,
documenting their practices, and reporting on their compliance.
- Industry Best Practices: Following widely accepted best practices and frameworks, like the NIST
Cybersecurity Framework or CIS Controls, can help organizations establish strong security measures
and stay aligned with industry standards.
- Audits and Assessments: Regular audits and assessments help organizations check if they are
following all relevant regulations and best practices correctly, identify any gaps or issues, and make
necessary improvements.
Building secure and reliable systems is very important, and it requires careful planning and design
from the very beginning. Security architecture and design involve including security principles and
best practices in the system's design to address security requirements and reduce potential risks.
- Think about Security First: When designing a new system, it's crucial to think about security from
the very beginning, not as an afterthought. This approach, called "secure by design," helps ensure
that security measures are built into the system's core design, making it more protected against
threats.
- Understand Security Needs: Before designing the system, it's important to clearly understand
what security requirements are needed. These requirements can come from various sources, such
as rules and regulations, industry best practices, or the organization's own security policies and risk
assessments.
- Identify Potential Threats and Risks: Analyze the potential threats and risks that the system may
face throughout its lifetime. This includes threats from cyber attacks, insiders (people within the
organization causing harm), natural disasters, or human errors. Understanding these risks will help
decide what security controls and measures need to be included in the design.
- Use Security Principles: Include well-known security principles in the system's design, such as the
principles of least privilege (giving only the necessary access), defense in depth (having multiple
layers of security), and secure by default (secure settings as the default). These principles help
ensure that security is a fundamental part of the system, reducing potential vulnerabilities.
- Secure by Design: Include security measures and controls as a part of the system's design, not as
an afterthought. This includes features like encryption, access controls, secure communication
protocols, and secure coding practices.
- Follow Industry Standards and Best Practices: Make sure the system's design follows industry-
accepted standards and best practices for security. This could include frameworks like the NIST
Cybersecurity Framework, ISO 27001, or guidelines from organizations like OWASP (Open Web
Application Security Project).
- Use Proven Secure Designs: Use proven secure design patterns and architectural models that have
been effective in addressing common security concerns. For example, using layered architectures,
secure enclaves, or the principle of least privilege can help reduce risks and improve the system's
overall security.
- Include Security Testing: Include security testing, such as penetration testing, vulnerability
scanning, and code reviews, in the system's development process. This helps identify and fix
potential vulnerabilities early on, reducing the risk of security breaches or costly fixes later.
- Risk-Based Approach: Prioritize security controls and measures based on the identified risks and
their potential impact on the system. This risk-based approach helps use resources effectively and
ensures that the most critical risks are addressed properly in the design.
- Defense in Depth: Include multiple layers of security controls and mechanisms to protect the
system from various types of threats. This approach, known as "defense in depth," ensures that if
one security measure fails, there are additional safeguards in place to protect the system.