You are on page 1of 1

Separation of duties

Job rotation
Administrative

Mandatory vacations

Controls

Limit boot sequent

1. Discovery - Footprinting and info gathering


2. Enumeration - port scans and resource identification
3. Vulnerability mapping - identify vulnerabilities
4. Exploitation - attempt to gain access

Least privilege

Technical /Logic

Harden Remote Access

Physical - System Hardening

Penetration
Testing

5. Report to management
1. Request for a change to take place
2. Approval of the change
Personnel testing
Physical testing
System and network testing

Change Control
Process

Vulnerability
Testing

5. Implementation

Operations
Security

SMTP
IMAP - can leave on server

E-mail

Replaying - Often left enabled - SPAM redirection

Mike Smith
26/04/10 - Rev.26

New computers or applications installed

Change Control
Documentation

Different configurations implemented


New technologies integrated
etc.

Fax - use an encryptor

Purging

Disk shadowing

Zeroization

Redundant servers

Media Controls

RAID, MAIT, RAIT


Clustering

Dual backbones

4. Tested and presented

6. Report change to management

POP

Backups

3. Documentation of the change

Contingency

Data remanence
Degaussing generates a coercive magnetic force
Physical destruction
Care with object reuse

Direct Access Storage Device


Redundant power
Block diagram of system or control

Mesh network topology - not star

Failure Modes and Effect


Analysis - FMEA

Consider what happens if each block fails


Tabulate failures and effects
Correct the design
Have engineers review

You might also like