CHAPTER 7: MAPPING THE LAYERS AGAINST THE PART 2 REFERENCE CONTROLS

Now that we have discussed the broad cyber resilience (or defence-in-depth) layers – prevention, detection, response and governance – we need to break them down into concrete controls.

Part 2 of this book discusses a range of reference controls, which are also listed in Table 3. This table maps those controls against the defence-in-depth layers, helping you get a sense of the more concrete actions you could take to build each layer.

Note that one control can be used for more than one layer. This is true for the higher-level controls, as discussed in Part 2, as well as for specific solutions. CCTV, for example, can simultaneously act as a deterrent (prevention), a means to identify an intruder (detection) and a means of identifying the culprit (response).

Table 3: The Reference Controls From Part 2 Mapped Against the Defence-in-Depth Layers

Prevention

Detection

Response

Governance

Asset management

image

image

Board-level commitment and involvement

image

Business continuity management

image

Configuration and patch management

image

Continual improvement process

image

Encryption

image

External certification/validation

image

Identity and access control

image

image

Incident response management

image

Internal audits

image

Malware protection

image

image

Network and communications security

image

image

Physical and environmental security

image

image

Security monitoring

image

Security policies

image

image

image

image

Staff training and awareness

image

image

image

Supply chain security

image

image

System security

image

Vulnerability scanning and penetration testing

image

image

Table 3 can help you plan the controls you may want to implement to build a well-balanced, multi-layered security system. As you select controls, however, you should always remember to take a risk-based approach that aligns to your organisation’s needs and requirements. It is also a good idea to bear in mind Schneier’s five questions, discussed in Chapter 4, on making well-considered trade-offs.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset