Creating A Company Culture For Security-Design Documents
April 11, 2023 | Author: Anonymous | Category: N/A
Short Description
Download Creating A Company Culture For Security-Design Documents...
Description
CREATING A COMPANY CULTURE FOR SECURITY- DESIGN DOCUMENT Creatng a company securiy culure, here few hings o bear mind in order o creae a securiy policy ha will preven, reduce or medicae risks. Such hings are he requiremen of on an organizaton because based on i hey priories heir securiy concerns. Auhentcaton: Since he company is online reail Organizaton, you man wan o form an auhentcaton process ha have a srong password policy sysem ha is dicul for brue force aack, ha enforce; lengh requiremens, characer complexiy, check for he presen of dictonary words, and never o record or wrie password down in a plain ex or share i wih o anyone. Also password roaton policy should be encouraged. Exernal websie securiy: As IT suppor specialiss charged wih hese responsibilites, you migh wan o look for one he followings; mul-facor auhentcaton for user like password and pins, Biomerics like fascial, voice recogniton, nger prins ec., VPN connecton services o enhance daa encrypton.\ Inernal websie securiy: For inernal websie securiy, you may wan o consider RADIUS or Remote Authentication Dial-In
User Service, which uses protocol that provides AAA services for users on a network. It's a very common protocol used to manage access to internal networks resources and services by verifying user credentials using a configured authentication scheme. Remote access solution: For remote access solution, you want to consider using VPN services in order to application and service using SSL or TLS certificates.
Firewall and basic rules recommendation: Recommending firewall and basic rules requires understanding which services are necessary and which that is not so that you can recommend implicit deny principle or concept which expresses that anything not explicitly permitted or allowed should be denied. This is dierent from blocking all traic, since an implicit deny configuration will still let traic pass that you have defined as allowed. This can be done through ACL configurations. Wireless security: For wireless security, I will go for WAP2 since is a security enhancement to WPA. Users must ensure the mobile device and AP/router are configured using the same WPA version and pre-shared key (PSK) which make it diicult for an attacker gain access into network resources.\
VLAN configuration recommendation:
Laptop security configuration: For this, you are to assign permission based on the resources, an employee needs to get job done. Encourage strong password policy. If use remotely, VPN connection should be encouraged. Application policy recommendation: Application that is not needed used be disable Regular app update and patches should be deployed to fill security concerns. Since card payment system is involved, PCI-DSS policy should be applied
Security and privacy recommendation: In this, you are to recommend how to oversee the access and use of sensitive data, It is best to use principle of less privilege and regular auditing of data access log to ensure that sensitive data are only accessed by authorized user.
View more...
Comments