Is 3
Is 3
Policy Management
Policy management in information security involves developing,
implementing, enforcing, and updating security policies to protect an
organization's data and IT systems. It ensures that security guidelines
align with business objectives, compliance regulations, and risk
management strategies.
Security Blueprint:
An Information Security Blueprint is a detailed plan that outlines the
implementation of an organization's information security strategy. It
serves as a guide to develop and deploy security measures aligned with
business goals and compliance requirements. Key aspects of an
information security blueprint include:
Framework: Establishes the structure for security controls and
policies, often based on industry standards like ISO 27001or NIST.
Risk Assessment: Identifies potential threats, vulnerabilities, and
risks to the organization's information assets.
Security Architecture: Defines the technologies, processes, and
practices to protect data, systems, and networks.
Roles and Responsibilities: Specifies who is responsible for
implementing and managing security measures.
Compliance and Governance: Ensures adherence to legal and
regulatory requirements.
Continuous Improvement: Incorporates mechanisms for regular
evaluation and updates to adapt to evolving threats and business
changes.
An effective blueprint provides a clear, actionable roadmap for building a
secure and resilient IT environment.
Security Education:
Security education, training, and awareness (SETA) program
1. Security Education:
Focuses on building awareness and understanding of information
security.
Formal education (e.g., university courses) is not required for all
employees but can be pursued through programs like NSA Centers of
Excellence.
Local and online resources offer information security programs.
2. Security Training:
Provides detailed, hands-on instruction tailored to specific job roles.
Can be in-house or outsourced to agencies like SANS, (ISC)², ISSA, or
CSI.
Focused on preparing employees to perform tasks securely, often for
IT professionals.
3. Security Awareness:
Keeps security at the forefront of employees’ minds using
newsletters, posters, videos, flyers, or branded trinkets.
Cost-effective and easy to implement, with newsletters being the
most common method.
Aims to promote a security-conscious culture and reduce risks
caused by employee negligence.
Firewall:
Firewalls are the first line of defense for your network security. A firewall is
a type of cybersecurity tool used to monitor and filter incoming and
outgoing network traffic – from external sources, internal sources, and
even specific applications. The primary goal of a firewall is to block
malicious traffic requests and data packets while letting through
legitimate traffic.
Firewall match the network traffic against the rule set defined in its table.
Once the rule is matched, associate action is applied to the network
traffic. For example, Rules are defined as any employee from Human
Resources department cannot access the data from code server and at
the same time another rule is defined like system administrator can
access the data from both Human Resource and technical department.
Rules can be defined on the firewall based on the necessity and security
policies of the organization. From the perspective of a server, network
traffic can be either outgoing or incoming.
Types of Firewalls:
1. Packet Filtering Firewall
Packet filtering firewall is used to control network access by monitoring
outgoing and incoming packets and allowing them to pass or stop based
on source and destination IP address, protocols, and ports. It analyses
traffic at the transport protocol layer (but mainly uses first 3 layers).
Packet firewalls treat each packet in isolation. They have no ability to tell
whether a packet is part of an existing stream of traffic. Only It can allow
or deny the packets based on unique packet headers. Packet filtering
firewall maintains a filtering table that decides whether the packet will be
forwarded or discarded. From the given filtering table, the packets will be
filtered according to the following rules:
3. Software Firewall
A software firewall is any firewall that is set up locally or on a cloud
server. When it comes to controlling the inflow and outflow of data
packets and limiting the number of networks that can be linked to a single
device, they may be the most advantageous. But the problem with
software firewall is they are time-consuming.
4. Hardware Firewall
They also go by the name “firewalls based on physical appliances.” It
guarantees that the malicious data is halted before it reaches the network
endpoint that is in danger.
Virtual Private Network (VPN)
A Virtual Private Network (VPN) is a technology that creates a secure,
encrypted connection over a public or private network, enabling users to
transmit data safely. It is commonly used to ensure privacy,
confidentiality, and secure remote access.
Key Features:
Encryption: Protects data in transit by encrypting it, ensuring it
cannot be intercepted or read by unauthorized parties.
Secure Remote Access: Enables employees to connect to a
corporate network securely from remote locations.
Anonymity: Masks the user’s IP address, enhancing online privacy.
Data Integrity: Prevents unauthorized modifications to data during
transmission.
Types of VPNs:
1. Remote Access VPN:
o Allows individual users to securely connect to a private network
from remote locations.
o Commonly used by remote workers.
2. Site-to-Site VPN:
o Connects multiple networks (e.g., between different office
locations) securely over the internet.
o Used for inter-branch communication.
VPN Protocols:
IPSec (Internet Protocol Security): Secures IP communication
with encryption and authentication.
SSL/TLS (Secure Sockets Layer/Transport Layer Security):
Used for browser-based VPNs to secure web traffic.
OpenVPN: Open-source protocol offering strong encryption and
reliability.
L2TP (Layer 2 Tunneling Protocol): Often combined with IPSec
for added security.