Here are my short summary of the article “Learning From A Year of Security Breaches” that are applicable to most of work environments.
- Centralize logs, including host, application, authentication, and infrastructure, into as few system as possible; make critical logs alertable; but be aware of user privacy in what you log
- You might not find the root cause of a beach because of weakness in the environment, systems or people; practicing incident response can indentify these weakness
- Attackers will target employee’s home, personal email, or device to breach the corporate security; Educate your employees to improve their security practices and involve the corporate security team even if they have personal security issues
- Avoid putting secrets and keys into source code
- Protect employees’ credential by integrating Single Sing On or Multi Factor Authentication
- Be aware of insider threats
- Measure and eliminate the security debt - cutting corners for fast growth
No comments:
Post a Comment