Before we get to the details of those documents, let's start from the very foundation: the enterprise network. Over the years as a network and security professional, one thing I always do on any network I have managed is the "documentation". You may have the state-of-the-art installation in top-notch data center, but without the proper and updated documentation, you are just a sitting duck. To be clear, documentation "is not" the thick user manuals you received from the vendors or other documents to serve the same purpose.
The IT network documentation should be one or more of the following documents.
- System configuration and procedure
- Asset inventory
- BC and DR
- Security policies and procedures
- You can't scale your infrastructure according to data growth
- You can't protect your network if you don't know what you have
- You can't sustain working environment if you don't have contingency plans
- Prepare to document
- Map your network
- Protect your network
- Reach your network
- Control your network
- Manage your network, Patch Management
- Manage your network, Baseline Management
- Document your network
CSIS: 20 Critical Security Controls - Version 4.0
- Inventory of Authorized and Unauthorized Devices
- Inventory of Authorized and Unauthorized Software
- Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
- Continuous Vulnerability Assessment and Remediation
- Malware Defenses
- Application Software Security
- Wireless Device Control
- Data Recovery Capability
- Security Skills Assessment and Appropriate Training to Fill Gaps
- Secure Configurations for Network Devices such as Firewalls, Routers, and Switches
- Limitation and Control of Network Ports, Protocols, and Services
- Controlled Use of Administrative Privileges
- Boundary Defense
- Maintenance, Monitoring, and Analysis of Audit Logs
- Controlled Access Based on the Need to Know
- Account Monitoring and Control
- Data Loss Prevention
- Incident Response and Management
- Secure Network Engineering
- Penetration Tests and Red Team Exercises
The following mapping is to help you get your milestones in organized manner.
Milestone | Security Control | SP 800 |
Prepare to document | ||
Map network | 1 | 53 |
Protect network | 5,13,19 | 53,94,153 |
Reach network | 117 | |
Control network | 12,14,16 | 53 |
Patch management | 4 | 53,40,137 |
Baseline management | 2,3,6,10 | 53,121,124,147,164 |
Document network |
VoilĂ . Now you are on better side of the network management and you can move forward with optimizing what you have in hand. Let's split the tasks into 3 types of management:
- Risk Management
- Security Management
- Governance
Risk Management
Milestone
|
Security
Control
|
SP
800
|
Backup strategy
|
8
|
|
Incident response and disaster recovery plans
|
18
|
|
Training
|
9
|
Security Management
Milestone
|
Security
Control
|
SP
800
|
Virus scanners and HIPS
|
5
|
|
BYOD/BYON
|
5,17
|
|
Data-at-rest protection
|
17
|
|
NAP/NAC
|
1,5
|
|
SIEM
|
14
|
|
Perimeter defence
|
11,13
|
|
Policies and procedures
|
||
App whitelist/blacklist
|
2
|
|
Remote access security
|
7
|
Governance
Milestone
|
Security
Control
|
SP
800
|
Configuration and Change Management
|
3,10
|
|
Audit strategy
|
Once you arm yourself with these milestones and controls, you could tackle not only today's network-related issues but also future expansion, effectively and efficiently. You will be ready for upcoming Bring-Your-Own-Device or Bring-Your-Own-Network in Generation Z workplace with flexible and comprehensive procedures while keeping your shields up without falling victims of hacktivism.
Here we are. Merry Christmas and Happy New Year !!!