前往小程序,Get更优阅读体验!
立即前往
首页
学习
活动
专区
工具
TVP
发布
社区首页 >专栏 >CISSP考试指南笔记:7.6 预防和检测

CISSP考试指南笔记:7.6 预防和检测

作者头像
血狼debugeeker
发布2021-03-23 11:10:28
4410
发布2021-03-23 11:10:28
举报
文章被收录于专栏:debugeeker的专栏debugeeker的专栏

The steps of this generalized process are described here:

  1. Understand the risk.
  2. Use the right controls.
  3. Use the controls correctly.
  4. Manage your configuration.
  5. Assess your operation.

Continuous Monitoring


NIST Special Publication 800-137, “Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations,” defines information security continuous monitoring as “maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions.”

the whole point of continuous monitoring is to determine if the controls remain effective at reducing risk to acceptable levels.

Finally, continuous monitoring involves deciding how to respond to the findings.

The metrics and measurements provide data that must be analyzed in order to make it actionable.

Continuous monitoring is a deliberate process. You decide what information you need, then collect and analyze it at a set frequency, and then you make business decisions with that information. Properly implemented, this process is a powerful tool in your prevention kit.

Firewalls


Once you have this control-risk pairing done, you can look at your network and decide where are the best places to locate firewalls to mitigate those risks.

The operational challenge is to both accurately track the current sets of rules and have a process to identify rules that must be added, modified, or deleted.

Finally, you need a plan to routinely assess the effectiveness of your firewall defenses.

Intrusion Detection and Prevention Systems


the main difference between an IDS and an IPS is that an IDS will only detect and report suspected intrusions, while an IPS will detect, report, and stop suspected intrusions.

The placement of network sensors is critical with IDSs/IPSs just as it is with firewalls.

False positives—that is, detecting intrusions when none happened—can lead to fatigue and desensitizing the personnel who need to examine each of these alerts.

false negatives are events that the system incorrectly classifies as benign, delaying the response until the intrusion is detected through some other means.

Perhaps the most important step toward reducing errors is to baseline the system.Baselining is the process of establishing the normal patterns of behavior for a given network or system.

本文参与 腾讯云自媒体分享计划,分享自作者个人站点/博客。
原始发表:2021-03-07 ,如有侵权请联系 cloudcommunity@tencent.com 删除

本文分享自 作者个人站点/博客 前往查看

如有侵权,请联系 cloudcommunity@tencent.com 删除。

本文参与 腾讯云自媒体分享计划  ,欢迎热爱写作的你一起参与!

评论
登录后参与评论
0 条评论
热度
最新
推荐阅读
目录
  • Continuous Monitoring
  • Firewalls
  • Intrusion Detection and Prevention Systems
领券
问题归档专栏文章快讯文章归档关键词归档开发者手册归档开发者手册 Section 归档