X hits on this document

32 views

0 shares

0 downloads

0 comments

2 / 5

People. Achieving Information Assurance begins with a senior level management commitment (typically at the Chief Information Officer level) based on a clear understanding of the perceived threat. This must be followed through with effective Information Assurance policies and procedures,

Information Assurance Defense In Depth Strategy

People

Technology

Operations

Policies & Procedures Training & Awareness

Physical Security Personnel Security

System Security Administration

Facilities Countermeasures

Hire Good People —Train & Reward Them Well Penalize Unauthorized Behavior

assignment of roles and responsibilities, commitment of resources, training of critical personnel (e.g. users and system administrators), and personal accountability. This includes the establishment of physical security and personnel security measures to control and monitor access to facilities and critical elements of the Information Technology environment.

Technology. Today, a wide range of technologies are available for providing Information Assurance services and for detecting intrusions. To insure that the right technologies are procured and deployed, an organization should establish effective policy and processes

Information Assurance Defense In Depth Strategy

People

Technology

Operations

IA Architecture IA Criteria

Acquisition/Integration of Evaluated Products

(Security, Interoperability, PKI)

System Risk Assessment

Application of Evaluated Products and Solutions Support of a Layered Defense Strategy

for technology acquisition. These should include: security policy, Information Assurance principles, system level Information Assurance architectures and standards, criteria for needed Information Assurance products, acquisition of products that have been validated by a reputable third party, configuration guidance, and processes for assessing the risk of the integrated systems. The Defense in Depth strategy recommends several Information Assurance principles. These include:

a) Defense in Multiple Places. Given that adversaries can attack a target from multiple points using either insiders or outsiders, an organization needs to deploy protection mechanisms at multiple locations to resist all classes of attacks. As a minimum, these defensive “focus areas” should include:

Defense In Depth Strategy

People

Technology

Operations

Defenseiin Depth Focus Areas

Defend the

Defend the

Defend the

Network &

Enclave

Computing

Infrastructure

Boundary

Environment

Supporting Infrastructures

KMI/PKI

Detect & Respond

Defend the Networks and Infrastructure

    • -

      Protect the local and wide area communications networks (e.g. from Denial of Service Attacks)

    • -

      Provide confidentiality and integrity protection for data transmitted over these networks (e.g. use encryption and traffic flow security measures to resist passive monitoring)

  • Defend the Enclave Boundaries (e.g. deploy Firewalls and Intrusion Detection to resist active network attacks)

Document info
Document views32
Page views33
Page last viewedSun Jan 22 08:37:58 UTC 2017
Pages5
Paragraphs143
Words1505

Comments