The cyber security threat landscape is constantly changing with the ever growing number and scale of attacks. The consequent measures necessary to combat the threats need to be robust, comprehensive and agile. Simply put, it is about developing an effective approach and constantly testing and refining it. The sections below cover the first 5 sections of some 10 essential recommended steps that should be taken to achieve a effective level of cybersecurity and is based on Guidance from NCSC. The second part will be featured in a future blog post.
Executive Risk Management
Because of the vital role that technology plays in most organisations today, information and their supporting systems need to properly categorised in the business risk profile. The impact of information and systems compromise could be more critical than many other types of business risks and result in reputational and financial damage.
It is important for the risks to be defined and communicated from executive level thus conveying the importance of information and systems.
Further essential steps that the Board should take include;
- Establish a governance framework
- Identify risks and approach to risk management
- Apply standards and best practices
- Educate users and maintain awareness
- Constantly review policies
- Create a user security policy as part of the overall corporate policy
- Include cyber security in the staff induction – making them aware of their personal responsibilities to comply with the security policy
- Security risk awareness – maintain awareness of ongoing security risks and guidance
- Formal training and assessment – staff in security roles should embark on ongoing formal training and certification to keep up to date with the challenges they face
- Incident reporting culture – enable staff to voice their concerns and report poor security practices
- Use supported software
- Develop and implement policies to update and patch systems
- Maintain hardware and software inventory
- Maintain operating systems and software
- Conduct regular vulnerability scans and act on results in a timely manner
- Establish configuration and control management
- Implement white listing and positively identify software that can be executed
- Limit privileged user accounts and user’s ability to change configurations
- Segregate networks into groups based on functions and security roles
- Secure wireless networks – only secure authorised devices should be allowed access to corporate networks
- Secure administration – ensure administrative access is secure and defaults are changed
- Monitor the network – monitor all traffic with intrusion prevention systems so that indications of attacks can be blocked and altered immediately
- Testing and assurance- conduct regular penetration testing and simulate cyber attack exercises to ensure controls work
- Effective account management – manage the lifecycle of accounts from start to finish when staff leave, including temporary accounts
- User authentication and access control – issue and enforce an effective password policy and incorporate two factor authentication for secure systems
- Limit privileges – give users the minimum rights that they need
- Limit the use of privilege accounts – limit the access to privileged rights and ensure administrators use normal accounts for standard business use
- Monitor and logging – monitor user activity and log all events to an audit and accounting system for future analysis
- Education – educate users of their responsibilities to adhere to corporate security policies