The Three Pillars of the Three Computer Security Pillars>
Know Be 4 – Roger Grimes
Much of the world, or at least the United States, is coalescing around the NIST Cybersecurity Framework. Itâs a pretty good one to follow out of the many dozens that have been proposed over the decades. My only major problem is that it doesnât tell you which controls matter more than others. At the very least, every cybersecurity plan should first model the most likely risks and then map the proposed and implemented controls against the most likely threats first and best. Itâs insane that the majority of cybersecurity defenses essentially put the cart before the horse and just start mapping out controls without any real consideration of what the actual risks are. But I digressâ¦and I wrote a whole book on the subject, A Data-Driven Computer Defense. Even if the NIST Cybersecurity Framework isnât perfect, itâs nice to get some general agreement about which framework to model our own security policies around. But in order to think about what I need to do and propose, I like to consolidate as much as possible. The NIST Cybersecurity Framework has five pillars â Identify, Protect, Detect, Respond, and Recover. Thatâs too many for me to remember and map to. I have three control objectives in my head: ⢠Prevent ⢠Detect ⢠Recover For each of the three security control pillars (i.e., prevent, detect, recover) you have to do everything in your power to mitigate the most likely, true threats. You need to combine the best defenses you can split out among the three types of controls: ⢠Policy ⢠Technical ⢠Training
Link: https://blog.knowbe4.com/the-three-pillars-of-the-three-computer-security-pillars
The Three Pillars of the Three Computer Security Pillars
Categories:
Tags: