- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 237字
- 2021-06-30 19:15:47
Assume breach
Due to the emerging threats and cyber security challenges, it was necessary to change the methodology from prevent breach to assume breach. The traditional prevent breach approach by itself does not promote the ongoing testing, and to deal with modern threats you must always be refining your protection. For this reason, the adoption of this model to the cybersecurity field was a natural move.
When the former director of the CIA and National Security Agency Retired Gen. Michael Hayden said in 2012(26):
During an interview, many people didn't quite understand what he really meant, but this sentence is the core of the assume breach approach. Assume breach validates the protection, detection, and response to ensure they are implemented correctly. But to operationalize this, it becomes vital that you leverage Red/Blue Team exercises to simulate attacks against its own infrastructure and test the company's security controls, sensors, and incident-response process.
In the following diagram, you have an example of the interaction between phases in the Red Team/Blue Team exercise:

It will be during the post breach phase that the Red and Blue Team will work together to produce the final report. It is important to emphasize that this should not be a one off exercise, instead, must be a continuous process that will be refined and improved with best practices over time.
- Kubernetes修煉手冊
- Linux系統(tǒng)架構(gòu)與運維實戰(zhàn)
- PLC控制程序精編108例
- 精通Linux內(nèi)核開發(fā)
- 嵌入式應(yīng)用程序設(shè)計綜合教程(微課版)
- 嵌入式操作系統(tǒng)(Linux篇)(微課版)
- Linux系統(tǒng)安全基礎(chǔ):二進(jìn)制代碼安全性分析基礎(chǔ)與實踐
- Dreamweaver CS5.5 Mobile and Web Development with HTML5,CSS3,and jQuery
- OpenStack系統(tǒng)架構(gòu)設(shè)計實戰(zhàn)
- Linux服務(wù)器配置與管理
- INSTANT Galleria Howto
- Learn CUDA Programming
- Building Telephony Systems With Asterisk
- iOS 10 開發(fā)指南
- 完美應(yīng)用Ubuntu(第2版)