Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Assessment Guidelines to Securing an Enterprise

    Written by

    Chris Wysopal
    Published December 19, 2001
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Secure Infrastructure:

      • Employ Perimeter Security
      • Do not allow any external Internet connections to terminate on any internal machines. DMZs must be used. This also goes for connections from partner networks.
      • All Internet exposed machines should have locked down operating systems and applications. Components should be removed and permissions set so that the machines have the minimum functionality required to do their job. Run a hardening script. Machines must be deployed with the latest patches. Consider a standardized secure build. Take a backup of the machine before deploying for quick reconstitution to a known state.
      • Filter incoming mail. Drop attachment types not required to run your organization. Strip out scripting code. Use anti-virus software to scan remaining attachments.
      • Do not deploy Wireless networks unless they are connected outside of perimeter firewall and VPN software is used.
      • VPN client machines must be under the control of corporate IT. They should run personal firewalls, anti-virus software, and comply with IT policy for the activities and software allowed.
      • Compartmentalize your network: servers on server networks, clients on client networks, administration done from administrative networks. Filter these networks based on the services required for each.
      • Use anti-virus software and personal firewalls on each machine. Keep signatures up to date.
      • Do not use protocols that use clear text authentication such as POP or IMAP. Use SSL versions instead. Dont use weakly encrypted authentication such as Windows LANMAN or NTLM.

      Secure Software:

      • Consider security at the very beginning of the internal application development cycle: at requirements or design phase rather than at test phase or not at all. Have a security review of the applications design.
      • Follow secure coding practices for your internal application development. Train application developers in secure coding and review the implementation for security problems.

      Secure Operations:

      • Track all user accounts and have procedures in place to remove them on termination. Dont forget remote access accounts such as VPN keys. Change passwords on administrative role accounts such as root accounts when people with access to them leave the company. Audit all accounts and passwords.
      • Compartmentalize administrative functions so there is no “super admin” account that can control it all.
      • Maintain Incident Readiness
      • Turn on the audit and logging capability of your servers
      • Centralize logging from servers on a secure log host. Review these logs.
      • Have an incident response procedure that includes roles, responsibilities, call tree, and relationships with legal and security firms.
      • Conduct training on incident response for IT security staff enabling them to detect and diagnose incidents and not destroy evidence.
      • Educate all employees to instill user awareness on issues including strong passwords, malicious attachments, the risks of using external non-approved services such as free email, chat services and peer-to-peer systems.
      • Institute a policy of patching critical machines within 24 hours and all other machines within 2 weeks. Create the resources to accomplish this. Subscribe to vendor security bulletin mailing lists.
      • Practice positive data destruction on information no longer needed by your organization.
      • Document your network and all the services running on it.
      • Back up data on a regular basis.
      Chris Wysopal
      Chris Wysopal

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×