Information Overview of Cybersecurity Basics
What are the essential elements of maintaining information security?
​
Information Cybersecurity Basics
The following list should be reviewed at least twice annually.
​
-
Apply security patches to known systems and applications - patch everything!
-
This includes operating systems, devices, and application software.
-
-
Develop an Asset Register - Know what you have and what you are protecting
-
Communicate with colleagues and identify the systems and services used by the organization.
-
Identify asset owners.
-
Note: It may not be as easy as it first seems. Beware of Shadow IT
-
-
-
Develop regular intervals for applying patches and updates using the Asset Register
-
Identify all systems accounts, including users, administrators, service, and specialty accounts
-
Control and restrict administrator accounts from email or Internet access
-
Enable advanced MFA, Passkey, for all applications
-
Move to Single Sign-on (SAML and SCIM) where possible
-
Manage the OS features, applications, security, and services on endpoint devices
-
Enable Logging on all capable devices
-
Enable EDR and XDR on all endpoints
-
Adopt a Cybersecurity framework – ISO 27001/2, NIST 800-CSF, CIS, SOC, etc.
-
Assess Cyber Security Risk
-
Develop Risk Analysis based on the Asset Register – Start with the most relevant assets.
-
-
Assess security standards of vendor solutions (on-premise or cloud)
-
Deploy Security Awareness Training and Reporting program – The Human Firewall
-
Build an Incident Response Plan
-
Include the following elements: preparation, identification, containment, eradication, recovery, and lessons learned
-
-
Backup Data and System Configurations – Encrypt backups
-
Enable Encryption – in-transit and at-rest
-
Secure Configurations (standardization and hardening) – avoid the tyranny of default settings.
-
Control Information exposure through communication applications such as Teams, Zoom, AI Services, etc.
-
Have CyberSecurity insurance
Must have CyberSecurity Documents
​
-
Asset Register – Resource Inventory
-
Risk Register – Identified Exposures
-
Cybersecurity Policies – (15-20) Organization Cybersecurity Rules
-
Cybersecurity Operational Procedures – Document practices for implementing Cybersecurity policies
-
Incident Response Plan – Preparation - Identification - Containment – Eradication - Recovery - Lessons Learned
-
Security Awareness Training Manual and Performance Reports
-
System alerts and incident review reports
-
Accounts review reports
-
Firewall rules review reports
-
Application list review reports