Security Operations Fundamentals

Back in March, Richard Bejtlich, wrote an entry on his blog entitled Security Operations Fundamentals which fit nicely within Mike Rothman’s Pragmatic CSO construct. The twelve steps he uses as a consultant when encountering a new client’s enterprise are:

  1. Instrument sample ingress/egress points.
  2. Understand business operations.
  3. Identify and prioritize business data.
  4. Identify and prioritize systems processing business data.
  5. Identify and prioritize resources comprising systems.
  6. Define policy, profile resources, and identify violations.
  7. Implement short term incident containment, investigation, and remediation.
  8. Plan and execute instrumentation improvements.
  9. Plan and execute infrastructure improvements.
  10. Plan and execute server improvements.
  11. Plan and execute user platform improvements.
  12. Measure results and return to step 1.
Advertisements

Steve Mullen has been involved in information technology for over 35 years. He is also actively involved in the music program (voice and English hand bells) and Vestry of St. Anne’s Episcopal Church in Damascus, MD.

Posted in Security

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Categories
June 2007
M T W T F S S
« Mar   Aug »
 123
45678910
11121314151617
18192021222324
252627282930  
%d bloggers like this: