官术网_书友最值得收藏!

Assume breach

Due to the emerging threats and cyber security challenges, it was necessary to change the methodology from prevent breach to assume breach. The traditional prevent breach approach by itself does not promote the ongoing testing, and to deal with modern threats you must always be refining your protection. For this reason, the adoption of this model to the cybersecurity field was a natural move.

When the former director of the CIA and National Security Agency Retired Gen. Michael Hayden said in 2012(26):

"Fundamentally, if somebody wants to get in, they're getting in. Alright, good. Accept that."

During an interview, many people didn't quite understand what he really meant, but this sentence is the core of the assume breach approach. Assume breach validates the protection, detection, and response to ensure they are implemented correctly. But to operationalize this, it becomes vital that you leverage Red/Blue Team exercises to simulate attacks against its own infrastructure and test the company's security controls, sensors, and incident-response process.

In the following diagram, you have an example of the interaction between phases in the Red Team/Blue Team exercise:

It will be during the post breach phase that the Red and Blue Team will work together to produce the final report. It is important to emphasize that this should not be a one off exercise, instead, must be a continuous process that will be refined and improved with best practices over time.

主站蜘蛛池模板: 北碚区| 同德县| 建瓯市| 台湾省| 德昌县| 海兴县| 砀山县| 怀仁县| 林周县| 辽阳县| 乌什县| 钦州市| 松阳县| 安顺市| 常山县| 阿拉善右旗| 元朗区| 漳州市| 全州县| 册亨县| 安吉县| 秭归县| 桂阳县| 且末县| 石楼县| 新巴尔虎右旗| 安化县| 西华县| 西青区| 高阳县| 泰来县| 柘荣县| 濮阳市| 大竹县| 塔河县| 米林县| 开封市| 山东省| 淮安市| 阿尔山市| 宁波市|