20 Security Recommendations
-
Identify areas of highest risk and continuously assess and remediate critical vulnerabilities
-
Develop and deploy application whitelisting on high value targets (e.g., domain controllers)
-
Add file integrity monitoring to all public-facing and application servers
-
Centralize and increase frequency of patch management
-
Develop information classification processes and Identify sensitive information repositories
-
Build internal segmentation
-
Move highly sensitive management controls (e.g. SAN Management) off the enterprise network
-
Inventory and track all hardware and software (including BYOD)
-
Monitor and secure outbound routes with the same discretion as inbound routes
-
Implement encryption into critical services and paths
-
Maintain and monitor security (e.g., active directory) and edge (e.g., firewall) logs
-
Control, track and audit use of administrative privileges
-
Limit users to least possible privileges
-
Monitor and control account creation and termination
-
Avoid identical distributed passwords (e.g. using the same "local admin" password)
-
Limit and control remote access capabilities (e.g. VPN)
-
Enhance authentication processes
-
Implement and test disaster recovery and business continuity plans
-
Provide continuous security training for alt employees /users
-
Develop solid incident response processes and capability
-
Test defense-in-depth concepts with penetration tests and red teaming
Things to Know about Your Network
-
Current Network Diagrams
-
Hardware Inventory
-
Software Inventory
-
AV Logs and Scan Results
-
Firewall Logs
-
Firewall Rules
-
Policies and Procedures Manual