Info Security Memo
  • Blog
  • Sitemap
    • Categories
  • Contact
  • About
  • Resources
  • Tools
  • 51sec.org

Build Confidence

Focusing on Information Security 

Info Security Notes

[Cybersecurity Architecture] How to Execute An Investigation of Security Breach

3/3/2023

0 Comments

 
[Cybersecurity Architecture] How to Execute An Investigation of Security Breach

What is Breach?

Breach is defined as an incident involving the loss of, or unauthorized disclousre of, sensitive, classified, sometimes regulated information as a reslt of a compromise or breakdown in the organization's security and protection systems.




Once breach happened in your environment, as cybersecurity professional, how will you prepare to execute the investigation and ask the questions?



7 Steps Process

Further details can be found from https://www.ekransystem.com/en/blog/data-breach-investigation-best-practices


7 steps for data breach response and investigation

RCA

RCA: root-cause-analysis



Fish bone diagram mapping all integrated controls in your environment to the six primary assets used to delivery services and products:





Questions to Answer for Cybersecurity Team




1 Was it human error or technology error led to this breach?

Example: the vulnerability was not been patched for what reason?

2 Was it due to weak governance?

Example: Was CEO knowing about this vulnerability existing or only knows by the technician?


Roles and Responsibilities:




3 Are we stuck in the elevator?


Do we live in the glass bubble? = Has IT Audit put themselves into a glass bubble by not communicating with other groups such as I&IT?


Or could be another way around, has IT Audit been exiled by I&IT?


Are we a victim of our own culture?


Does our organization support interaction of IT audit during incident response situations? 

There are so many attacking surface / exploit code around your Technology stack.




4 Was it sophisticated?

Malware:


Undectectable Malware. 


5 Was it due to a lack of guidance?



6 Was it due to a lack of knowledge?


None of popular Cybersecurity frameworks (CIS Controles, NYCRR 500, NIST CSF, General Data Protection Regulation) includes managment system and audit process. 


Management System:



ISO 27001 ISMS



IIA 3 Lines of Defense

The Three Lines Model - The model previously known as the Three Lines of Defense

The Three Lines Model helps organizations identify structures and processes that best assist the achievement of objectives and facilitate strong governance and risk management. The model applies to all organizations and is optimized by:
 Adopting a principles-based approach and adapting the model to suit organizational objectives and circumstances. 
 Focusing on the contribution risk management makes to achieving objectives and creating value, as well as to matters of “defense” and protecting value. 
 Clearly understanding the roles and responsibilities represented in the model and the relationships among them. 
 Implementing measures to ensure activities and objectives are aligned with the prioritized interests of stakeholders.


The IIA’s Three Lines Model:



About The IIA 
The Institute of Internal Auditors (IIA) is the internal audit profession’s most widely recognized advocate, educator, and provider of standards, guidance, and certifications. Established in 1941, The IIA today serves more than 200,000 members from more than 170 countries and territories. The association’s global headquarters is in Lake Mary, Fla., USA. For more information, visit www.globaliia.org.


Defense in Depth

 DiD architecture was designed from ISO27001







References



https://www.youtube.com/watch?v=hc4_oNwDFco


via Blogger http://blog.51sec.org/2023/03/cybersecurity-architecture-how-to.html
March 03, 2023 at 08:32PM Architecture
0 Comments



Leave a Reply.

    Categories

    All
    Architecture
    Blog
    Checkpoint
    Cisco
    Cloud
    CyberArk
    F5
    Fortigate
    Guardium
    Juniper
    Linux
    Network
    Others
    Palo Alto
    Qualys
    Raspberry Pi
    Security
    SIEM
    Software
    Vmware
    VPN
    Wireless

    Archives

    March 2024
    February 2024
    January 2024
    December 2023
    November 2023
    October 2023
    September 2023
    August 2023
    July 2023
    June 2023
    May 2023
    April 2023
    March 2023
    February 2023
    January 2023
    December 2022
    November 2022
    October 2022
    September 2022
    August 2022
    July 2022
    June 2022
    May 2022
    April 2022
    March 2022
    February 2022
    January 2022
    December 2021
    November 2021
    October 2021
    September 2021
    August 2021
    July 2021
    June 2021
    May 2021
    April 2021
    March 2021
    February 2021
    January 2021
    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    October 2019
    September 2019
    June 2019
    July 2018
    May 2018
    December 2017
    August 2017
    April 2017
    March 2017
    January 2017
    December 2016
    November 2016
    October 2016
    September 2016
    August 2016
    July 2016
    June 2016
    May 2016
    April 2016
    March 2016
    February 2016
    January 2016
    December 2015
    November 2015
    October 2015
    September 2015
    August 2015
    July 2015
    June 2015
    May 2015
    April 2015
    March 2015

    Print Page:

    RSS Feed

    Email Subscribe
Powered by Create your own unique website with customizable templates.
  • Blog
  • Sitemap
    • Categories
  • Contact
  • About
  • Resources
  • Tools
  • 51sec.org