Please enable JavaScript.
Coggle requires JavaScript to display documents.
Security (Applying Defense-In-Depth(D.I.D) (Use layered approach to…
Security
Applying Defense-In-Depth(D.I.D)
Use layered approach to security
Reduce and attacker's chance of success
Increase an attacker's risk of detection
Best Practices for Increasing Security
Follow the principle of least privilege
Use separate administrative account
Restrict administrator console sign-in
Policy & Procedure
Develop and communicate policy using best practice
Test your policies
Physical Security
Keep sensitive hardware in secure room
Keep back ups in a safe
Use RFID door to secure the room
Data
ACLS - NTFS Permission
Encrypted File System (EFS)
Application
Application Hardening
Closed Unused Port
Ensure the security patches are up-to-date
Centralise management with WSUS
Host
Can be done with group policy
Security Configuring
Security Templates
Account Policies
Local Policies
Event Log
Restricted Groups
System services
Registry
File System
User Rights
(via GPO)
Privileges
Logon Rights
:check:
==> Hint:
User Right what user can do to a computer system
Security Auditing
Configure according to your company security regulatory
Filter the Security Event Log in Event Viewer to find specific security related events
Restricted Group
Group Policy can control group membership
For group on domain- joined computer
For group in ADDS
Two Options
Members of this group
This group is a member of
Restricting software
App Locker
Software Restriction Policies
Don't run specified window application
PMBok-Area 8-Risk Management
Factor to manage risk
1.The Impact
2.The Likelihood
==> Combining factor we prioritize the risk and deploy strategies to
Mitigate
It
2 Main beginner technique
Quantitative Technique-EMV
Benefit: Enable us to see the risk in the sub project
Qualitative Technique-Probability Impact Matrix
Benefit: Enable us to sort risk into order and mitigate top down