The modern IT infrastructure that we know today has evolved a lot in past few years. We can now purchase easily with many storage capacities and high speed high performance processor computers. Centralized, distributed, focus shifted to network computing. All of these developments have grown, as we relaxed the way of business, causing many enterprise security problems.
In this article you will check the Top 10 information security management systems for enterprises that can be distributed to alleviate the impact of known enterprise infrastructure security problems.
Overall security approach
Successful enterprise cyber security requires good planning and overall security strategies that are continuously reviewing all aspects of the organization, from business processes to people. In many cases, companies will consider expensive technology solutions to address security breaches.
Corporate security program / policy development
Organizations need to develop security programs that explain the roles, policies, procedures, standards, and guidelines for enterprise security.
Role: An overview of who is in charge. Chief Information Security Officer (ISO) can assume the stable security state of the organization.
Policy: A general organization-wide description that sets up the necessary requirements to ensure a minimum level of security. Example: Allowed e-mail usage policy, Internet usage policy, mobile device usage policy, etc.
Standard: Derived from the policy for deploying the specific steps or processes necessary to meet specific requirements. For example, the requirement that all email communications must be encrypted.
Risk Management – Continually
Risk management is the process of identifying risks, assessing risks, and taking steps to reduce risk to an acceptable level. This includes tasks to identify assets of organizations that need security. Human resource, technology, trade secret, patent, copyright, etc can be included. Then identify all possible risks that can affect the availability, confidentiality and integrity of these assets. Management can decide how to handle confirmed risks. Risk can be reduced or transferred to third parties such as insurance companies.
Business Process Reconstruction: Adopt industry best practices
In addition to the need to manage enterprise IT technology, it is necessary to establish and use best practices and processes to optimize IT services. A number of internationally recognized frameworks have been developed to explain the effective ICT infrastructure management process. Therefore you do not need to reinvent the wheel.
COBIT – control purpose of information and related technology
ITIL – Information Technology Infrastructure Library
And ISO 27001
Streamline physical / environmental security
Physical and environmental security is important to protect corporate information assets and ICT infrastructure. Physical security will have to look at problems such as monitoring and detection. Security guards, alarm, CCTV, and everything else involved in your security system. Environment control and design of access control and suppression solutions (eg locks, fencing, lighting, mantrap, biometric recognition etc.), server room temperature, humidity, air conditioning, static electricity, fire suppression and detection, power generation and backup.
Deploy the content filtering / inspection solution.
As contents (e-mail, Internet traffic, etc.) move inside and outside the company, they need to be properly managed to avoid security breaches and attacks. Controls the following:
- Web filter enforcing the Internet usage policy of the organization using content filtering, application blocking and best-in-class spyware protection.
- Spam / virus, spoof filter / firewall to protect e-mail server from spoofing, phishing and spyware attacks
- Unified Threat Management (UTM) Solution: There are organizations that have chosen to deploy UTM solutions that provide industry leading functions within a single package, including Intrusion Prevention System. Anti-virus using anti-spam; Web filtering; anti-spam, firewall, SSL – VPN, traffic shaping, and other.
Internal management of the corporate network
We have already confirmed that there are an increasing number of security breaches occurring within the enterprise. Therefore, it is important to properly manage within the corporate network. The actions we can take are as follows.
- Inventory collection of all authorized software and devices on the network.
- Audit log maintenance, monitoring, and analysis
- Continuous vulnerability assessment, patch management, improvement
- Restrictions and control of network ports, protocols, and services
Maintain identity and authority management system
Identity management is very important to avoid user authority violations and excessive authority problems. Please prepare procedures, guidelines, and systems for Identity management related to creating users, changing user permissions, deleting permissions, forgetting user passwords. It also requires controlled use of administrator privileges. Can you access the company as needed? For example, does every employee in the organization access the payroll database?
Focus on DLP (Data Loss Prevention).
To prevent loss of data, consider the security of motion and static data. The advent of mobile terminals and memory sticks makes it easy to copy a large number of corporate data in seconds. I heard that some employees sell customer databases to competitors. DLP (Data Loss Prevention) includes tools to prevent accidental data leakage, including device and port control, encryption (encryption of hard drives and removable media).
Also, there is confidential information, it is necessary to discard, and how do you handle the hard disk? How about paper documents? I am convinced that I can get a lot of information in the trash can. (Some investigative reporters use this method to “snoop”). Considering all commercially available crushers, excuse the excuse for organizations not crushing sensitive paper documents. You can also crush plastic and CD media.
Do not go alone.
Security of information assets is becoming increasingly important. Unfortunately, many organizations are not considered to be important until the actual violation.
We are thinking about direct costs that prevent precautions on information security will not be taken. Here, the cost of recovering lost or changed data of the case, the cost of informing the customer of the violation facts, the fine and indirect costs of the violation are included. Loss of customer, loss of productivity, time and violation required for investigation and resolution, and so on. Therefore, if necessary, it is important to support in the following areas with external support from external companies and consultants.
- Conducted an IT audit and penetration test aka “ethical hacking” on my infrastructure.
- Information security awareness education support for employees
Protection of corporate information assets is not only a simple case but also a continuous process requiring continued efforts and support of the CEO, so that the threat to the information system continues because evolving changes, attention is necessary.