Penetration Testing with Kali Linux
PWK - Copyright © 2023 OffSec Services Limited. All rights reserved.
45
on its secrecy. However, we’d want our system to be secure
even if
the attacker knows there is a
password, and even if they know the cryptographic algorithm behind it.
Defense in Depth
72
advocates for adding defenses to as many layers of a system as possible, so
that if one is bypassed, another may still prevent full infiltration. An example of defense in depth
outside the context of cybersecurity would be a garage that requires entering an electronic code,
using a key on a bolted door lock, then finally disabling a voice-activated internal alarm system to
open the garage.
Many organizations do not apply adequate defenses for their systems
and lean too heavily on
external tools or providers that focus on one specific area of defense. This can lead to single
points of failure, resulting in a very weak security posture. We must learn to apply many layers of
controls and design our systems with defense in depth in order to resist more threats and better
respond to incidents.
3.4.2
Security Controls and Strategies
To meet the ideals of concepts such as least privilege, open security, and defense-in-depth, we
need to implement
Security Strategies
. These can include interventions like:
•
24/7 vigilance
•
Threat modelling
•
Table top discussions
•
Continuous training on tactics, processes, and procedures
•
Continuous automated patching
•
Continuous supply chain verification
•
Secure coding and design
•
Daily log reviews
•
Multiple layers of well-implemented
Yüklə
Dostları ilə paylaş: