官术网_书友最值得收藏!

Assume breach

Due to the emerging threats and cyber security challenges, it was necessary to change the methodology from prevent breach to assume breach. The traditional prevent breach approach by itself does not promote the ongoing testing, and to deal with modern threats you must always be refining your protection. For this reason, the adoption of this model to the cybersecurity field was a natural move.

When the former director of the CIA and National Security Agency Retired Gen. Michael Hayden said in 2012(26):

"Fundamentally, if somebody wants to get in, they're getting in. Alright, good. Accept that."

During an interview, many people didn't quite understand what he really meant, but this sentence is the core of the assume breach approach. Assume breach validates the protection, detection, and response to ensure they are implemented correctly. But to operationalize this, it becomes vital that you leverage Red/Blue Team exercises to simulate attacks against its own infrastructure and test the company's security controls, sensors, and incident-response process.

In the following diagram, you have an example of the interaction between phases in the Red Team/Blue Team exercise:

It will be during the post breach phase that the Red and Blue Team will work together to produce the final report. It is important to emphasize that this should not be a one off exercise, instead, must be a continuous process that will be refined and improved with best practices over time.

主站蜘蛛池模板: 汪清县| 林芝县| 宝山区| 胶州市| 浙江省| 吉隆县| 阜阳市| 易门县| 库伦旗| 凤翔县| 金坛市| 阳春市| 乌苏市| 上犹县| 宾阳县| 天峻县| 内江市| 博客| 莲花县| 临朐县| 理塘县| 威信县| 千阳县| 九寨沟县| 青铜峡市| 博野县| 浮山县| 故城县| 东丰县| 龙游县| 潼南县| 乳源| 曲麻莱县| 栾城县| 巫山县| 梁平县| 聊城市| 漯河市| 凉城县| 福海县| 桑植县|