SlideShare a Scribd company logo
1 of 23
Proposed Business Process, metrics
and tools Optimization for key IT
domain
Akin Akinfenwa
12March2019
Confused on
metrics to track,
Good Processes to
adopt, and tools
to use?
 Identity & Access Management
 Secure SDLC & Application
Security
 Endpoint Security
 Vulnerability Management
Always begin with the Story….
Key Assumptions made:
This is not specific to industry, hence the business processes in presentation, metrics, and tools are simply generic and not unique to any situation, most of the
processes could be customized to unique industries as needed. Further assumptions will be that IT controls are mapped to COBIT, NIST 800-53 or ISO 27001 already.
IDENTIFY & ACCESS
MANAGEMENT (IAM)?
IAM are Series of framework of policies, procedures
and technologies for ensuring appropriate personnel
have access to technology resources.
Identify And Access Management
Process and activities
PROVISION ENFORCEADMINISTER
 REQUEST ACCESS
 VALIDATE REQUEST
 APPROVE ACCESS
 ASSIGN AND
COMMUNICATE
ACCESS
 PLAN AND
STRATEGIZE
 MANAGE POLICIES
AND STANDARDS
 EDUCATE AND
MANAGE SYSTEMS
 MONITOR, AUDIT
AND RECONCILE
• AUTHENTICATE
• AUTHORIZE
• LOG ACTIVITIES
S Y S T E M S A N D D A T A
WHAT IS TRACKED AND MEASURED IN IDENTITY AND ACCESS MANAGEMENT?
Metric Tracked Ranking
Average number of distinct accounts (credentials) per user:
Number of unused accounts:
Number of orphaned accounts:
Number of new accounts provisioned:
Number of exceptions per access re-certification cycle
Password policy effectiveness:
Average time to provision and de-provision of a user:
Average time to provide an authorization
Average time to make changes in identity policies:
Violation of separation of duties:
High Business impact
Medium Business Impact
Low Business Impact
Management Perspective:
How well do we manage
user provisioning without
exposing the organization
to access risk.
COMMON TOOLS USED IN IDENTIFY &
ACCESS MANAGEMENT (IAM)
IAM Tools On-Premise Cloud
Forefront Identity Manager X X
Microsoft Azure Active Directory X X
Oracle Identity Management X
Okta Identity Management X X
Zoho Vault X X
OneLogin X X
LogMeIn Pro X
Auth0 X
ExcelID X X
ADManager Plus X X
IBM IAM X X
SECURE SDLC &
APPLICATION
SECURITY
Application security encompasses measures
taken to improve the security of an
application often by finding, fixing and
preventing security vulnerabilities
A secure SDLC process ensures that security
assurance activities such as penetration
testing, code review, and architecture analysis
are an integral part of the development
effort.
SECURE SDLC & APPLICATION SECURITY PROCESS
REQUIREMENTS DESIGN DEVELOPMENT TEXT DEPLOYMENT
Map Security
& Privacy
Requirements
Threat
modelling.
Security design
review
Static Analysis
Peer Review
Security test
cases
Dynamic Analysis
Final security
review
Application
security &
monitoring
Response Plan
Web application security
People
• Training
• organization
Process
• Risk management
• SDLC
• Guidelines
• Verification
Technology
• Tools
• Development
• frameworks
WHAT IS TRACKED AND MEASURED IN APPLICATION SECURITY?
Metric Tracked Ranking
Weighted Risk Trend
Remediation Calculation Window
Application Testing Coverage
Mean Time to Respond
Confirmed exploits
Confirmed Account Takeovers
High Business impact
Medium Business Impact
Low Business Impact
Management
Perspective: Can we
rely on the security
model of business
applications to operate
as intended?
Risk is very relative to industry and other controls established within the business
COMMON TOOLS USED IN APPLICATION SECURITY
Application Security tools On-Premise Cloud
Wapiti X X
Zed Attack Proxy X X
Vega X
W3af X X
Skipfish X X
Ratproxy X X
SQLMap X
Wfuzz X
Wapiti X X
Zed Attack Proxy X X
Vega X X
End Point Security
Endpoint Security/ endpoint protection is
an approach to the protection of
computer networks that are remotely
bridged to client devices.
END POINT SECURITY PROCESS
CONFIGURATION
MANAGEMENT
ANTI-MALWARE
ACCEPTABLE USE RPOLICIES
SYSTEM
MONITORING
END-POINT SECURITY
CONTROLS
DATA SECURITY
APPLICATION
SECURITY
I A M
The policies, processes and technology controls
used to protect the confidentiality, integrity, and
availability of an end point system
What is tracked and Measured in Endpoint Security?
Metric Tracked Ranking
Level of visibility the solution provides :
Types of threat detected :
OS supporting ability :
File detection :
Security controls :
High Business impact
Medium Business Impact
Low Business Impact
Management
Perspective: How well
do we manage the
end point of critical
infrastructures such
as Servers, desktop.
Common tools used in End Point Security
End Point Security tools On-Premise Cloud
Bitdefender X X
Carbon Black X X
Code42 X
Check Point X X
Comodo X X
CounterTack X X
RSA X
SentinelOne X
Sophos X X
Symantec X X
Trend Micro X X
Section Break
Insert the title of your subtitle Here
VULNERABILITY
MANAGEMENT
Vulnerability management is the process
surrounding vulnerability scanning, also taking
into account other aspects such as risk
acceptance, remediation etc.
Vulnerability Management Process
preparation
Vulnerability
scan
Define
Remediation
Implement
Remediation
Rescan
THREAT AND VULNERABILITY MANAGEMENT PROCESS
What is tracked and Measured in Vulnerability Management?
Metric Tracked Ranking
Mean Time to Detect
Mean Time to Resolve
Average Window of Exposure
Scanner Coverage
Scan Frequency by Asset Group
Average Risk by BU / Asset Group
Number of Exceptions Granted
Vulnerability Reopen Rate
% of Systems with no open High / Critical Vulnerability
High Business impact
Medium Business Impact
Low Business Impact
Management Perspective:
How well do we manage
the exposure of the
organization to
vulnerabilities by
identifying and mitigating
known vulnerabilities?
COMMON TOOLS USED IN VULNERABILITY MANAGEMENT
Vulnerability Management tools On-Premise Cloud
Comodo HackerProof X X
OpenVAS X X
Nexpose Community X
Nikto X X
Tripwire IP360 X X
Wireshark X X
Aircrack X
Nessus Professional X
Retina CS Community X X
Microsoft Baseline Security Analyzer (MBSA) X X
AlienVault USM Anywhere X
Thank you.
akin.akinfenwa@cyberopsinc.com

More Related Content

What's hot

Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_servicesG. Subramanian
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overviewxband
 
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
What We’ve Learned Building a Cyber  Security Operation Center: du Case  StudyWhat We’ve Learned Building a Cyber  Security Operation Center: du Case  Study
What We’ve Learned Building a Cyber Security Operation Center: du Case StudyPriyanka Aash
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineeringAHM Pervej Kabir
 
Software Development Life Cycle – Managing Risk and Measuring Security
Software Development Life Cycle – Managing Risk and Measuring SecuritySoftware Development Life Cycle – Managing Risk and Measuring Security
Software Development Life Cycle – Managing Risk and Measuring SecurityThomas Malmberg
 
Enterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and complianceEnterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and complianceSPAN Infotech (India) Pvt Ltd
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1Priyanka Aash
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellenceErik Taavila
 
IBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerIBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerThierry Matusiak
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?Jonathan Sinclair
 
Software Security Initiatives
Software Security InitiativesSoftware Security Initiatives
Software Security InitiativesMarco Morana
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations centerCMR WORLD TECH
 
Certified Information Systems Security Professional
Certified Information Systems Security ProfessionalCertified Information Systems Security Professional
Certified Information Systems Security ProfessionalHelen Njuguna
 
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...PlatformSecurityManagement
 

What's hot (19)

Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
Information Security and the SDLC
Information Security and the SDLCInformation Security and the SDLC
Information Security and the SDLC
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
 
Secure Design: Threat Modeling
Secure Design: Threat ModelingSecure Design: Threat Modeling
Secure Design: Threat Modeling
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
 
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
What We’ve Learned Building a Cyber  Security Operation Center: du Case  StudyWhat We’ve Learned Building a Cyber  Security Operation Center: du Case  Study
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
 
Soc
SocSoc
Soc
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
 
Risk Management Strategy (RMF v2)
Risk Management Strategy (RMF v2)Risk Management Strategy (RMF v2)
Risk Management Strategy (RMF v2)
 
Software Development Life Cycle – Managing Risk and Measuring Security
Software Development Life Cycle – Managing Risk and Measuring SecuritySoftware Development Life Cycle – Managing Risk and Measuring Security
Software Development Life Cycle – Managing Risk and Measuring Security
 
Enterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and complianceEnterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and compliance
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
IBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerIBM Security Software Solutions - One Pager
IBM Security Software Solutions - One Pager
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?
 
Software Security Initiatives
Software Security InitiativesSoftware Security Initiatives
Software Security Initiatives
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
Certified Information Systems Security Professional
Certified Information Systems Security ProfessionalCertified Information Systems Security Professional
Certified Information Systems Security Professional
 
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
 

Similar to Proposed optimization of IT processes, metrics and tools

key metrics and process in cyber security case scenario
key metrics and process in cyber security case scenario key metrics and process in cyber security case scenario
key metrics and process in cyber security case scenario Skillweed
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBsJyothi Satyanathan
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 sucesuminas
 
Security Governance Isp Eng
Security Governance Isp EngSecurity Governance Isp Eng
Security Governance Isp EngMaurizio Milazzo
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineeringAHM Pervej Kabir
 
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptxCompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptxInfosectrain3
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?rbrockway
 
Comodo SOC service provider
Comodo SOC service providerComodo SOC service provider
Comodo SOC service providerpaulharry03
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security EngineeringMarco Morana
 
II Security At Microsoft
II Security At MicrosoftII Security At Microsoft
II Security At MicrosoftMark J. Feldman
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxYoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxVictoriaChavesta
 
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...Draup3
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention Manish Dixit Ceh
 
MS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference ArchitectureMS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference Architectureangelohammond
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM
 
CRS Company Overview -Feb 6 2017
CRS Company Overview -Feb 6 2017CRS Company Overview -Feb 6 2017
CRS Company Overview -Feb 6 2017Joseph John
 

Similar to Proposed optimization of IT processes, metrics and tools (20)

key metrics and process in cyber security case scenario
key metrics and process in cyber security case scenario key metrics and process in cyber security case scenario
key metrics and process in cyber security case scenario
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 
Security Governance Isp Eng
Security Governance Isp EngSecurity Governance Isp Eng
Security Governance Isp Eng
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
 
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptxCompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
 
CCA study group
CCA study groupCCA study group
CCA study group
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?
 
Comodo SOC service provider
Comodo SOC service providerComodo SOC service provider
Comodo SOC service provider
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
 
II Security At Microsoft
II Security At MicrosoftII Security At Microsoft
II Security At Microsoft
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
 
CRISC Course Preview
CRISC Course PreviewCRISC Course Preview
CRISC Course Preview
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
 
MS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference ArchitectureMS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference Architecture
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
IAM Solution
IAM  SolutionIAM  Solution
IAM Solution
 
CRS Company Overview -Feb 6 2017
CRS Company Overview -Feb 6 2017CRS Company Overview -Feb 6 2017
CRS Company Overview -Feb 6 2017
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Proposed optimization of IT processes, metrics and tools

  • 1. Proposed Business Process, metrics and tools Optimization for key IT domain Akin Akinfenwa 12March2019
  • 2. Confused on metrics to track, Good Processes to adopt, and tools to use?  Identity & Access Management  Secure SDLC & Application Security  Endpoint Security  Vulnerability Management Always begin with the Story…. Key Assumptions made: This is not specific to industry, hence the business processes in presentation, metrics, and tools are simply generic and not unique to any situation, most of the processes could be customized to unique industries as needed. Further assumptions will be that IT controls are mapped to COBIT, NIST 800-53 or ISO 27001 already.
  • 4. IAM are Series of framework of policies, procedures and technologies for ensuring appropriate personnel have access to technology resources.
  • 5. Identify And Access Management Process and activities PROVISION ENFORCEADMINISTER  REQUEST ACCESS  VALIDATE REQUEST  APPROVE ACCESS  ASSIGN AND COMMUNICATE ACCESS  PLAN AND STRATEGIZE  MANAGE POLICIES AND STANDARDS  EDUCATE AND MANAGE SYSTEMS  MONITOR, AUDIT AND RECONCILE • AUTHENTICATE • AUTHORIZE • LOG ACTIVITIES S Y S T E M S A N D D A T A
  • 6. WHAT IS TRACKED AND MEASURED IN IDENTITY AND ACCESS MANAGEMENT? Metric Tracked Ranking Average number of distinct accounts (credentials) per user: Number of unused accounts: Number of orphaned accounts: Number of new accounts provisioned: Number of exceptions per access re-certification cycle Password policy effectiveness: Average time to provision and de-provision of a user: Average time to provide an authorization Average time to make changes in identity policies: Violation of separation of duties: High Business impact Medium Business Impact Low Business Impact Management Perspective: How well do we manage user provisioning without exposing the organization to access risk.
  • 7. COMMON TOOLS USED IN IDENTIFY & ACCESS MANAGEMENT (IAM) IAM Tools On-Premise Cloud Forefront Identity Manager X X Microsoft Azure Active Directory X X Oracle Identity Management X Okta Identity Management X X Zoho Vault X X OneLogin X X LogMeIn Pro X Auth0 X ExcelID X X ADManager Plus X X IBM IAM X X
  • 9. Application security encompasses measures taken to improve the security of an application often by finding, fixing and preventing security vulnerabilities A secure SDLC process ensures that security assurance activities such as penetration testing, code review, and architecture analysis are an integral part of the development effort.
  • 10. SECURE SDLC & APPLICATION SECURITY PROCESS REQUIREMENTS DESIGN DEVELOPMENT TEXT DEPLOYMENT Map Security & Privacy Requirements Threat modelling. Security design review Static Analysis Peer Review Security test cases Dynamic Analysis Final security review Application security & monitoring Response Plan Web application security People • Training • organization Process • Risk management • SDLC • Guidelines • Verification Technology • Tools • Development • frameworks
  • 11. WHAT IS TRACKED AND MEASURED IN APPLICATION SECURITY? Metric Tracked Ranking Weighted Risk Trend Remediation Calculation Window Application Testing Coverage Mean Time to Respond Confirmed exploits Confirmed Account Takeovers High Business impact Medium Business Impact Low Business Impact Management Perspective: Can we rely on the security model of business applications to operate as intended? Risk is very relative to industry and other controls established within the business
  • 12. COMMON TOOLS USED IN APPLICATION SECURITY Application Security tools On-Premise Cloud Wapiti X X Zed Attack Proxy X X Vega X W3af X X Skipfish X X Ratproxy X X SQLMap X Wfuzz X Wapiti X X Zed Attack Proxy X X Vega X X
  • 14. Endpoint Security/ endpoint protection is an approach to the protection of computer networks that are remotely bridged to client devices.
  • 15. END POINT SECURITY PROCESS CONFIGURATION MANAGEMENT ANTI-MALWARE ACCEPTABLE USE RPOLICIES SYSTEM MONITORING END-POINT SECURITY CONTROLS DATA SECURITY APPLICATION SECURITY I A M The policies, processes and technology controls used to protect the confidentiality, integrity, and availability of an end point system
  • 16. What is tracked and Measured in Endpoint Security? Metric Tracked Ranking Level of visibility the solution provides : Types of threat detected : OS supporting ability : File detection : Security controls : High Business impact Medium Business Impact Low Business Impact Management Perspective: How well do we manage the end point of critical infrastructures such as Servers, desktop.
  • 17. Common tools used in End Point Security End Point Security tools On-Premise Cloud Bitdefender X X Carbon Black X X Code42 X Check Point X X Comodo X X CounterTack X X RSA X SentinelOne X Sophos X X Symantec X X Trend Micro X X
  • 18. Section Break Insert the title of your subtitle Here VULNERABILITY MANAGEMENT
  • 19. Vulnerability management is the process surrounding vulnerability scanning, also taking into account other aspects such as risk acceptance, remediation etc.
  • 21. What is tracked and Measured in Vulnerability Management? Metric Tracked Ranking Mean Time to Detect Mean Time to Resolve Average Window of Exposure Scanner Coverage Scan Frequency by Asset Group Average Risk by BU / Asset Group Number of Exceptions Granted Vulnerability Reopen Rate % of Systems with no open High / Critical Vulnerability High Business impact Medium Business Impact Low Business Impact Management Perspective: How well do we manage the exposure of the organization to vulnerabilities by identifying and mitigating known vulnerabilities?
  • 22. COMMON TOOLS USED IN VULNERABILITY MANAGEMENT Vulnerability Management tools On-Premise Cloud Comodo HackerProof X X OpenVAS X X Nexpose Community X Nikto X X Tripwire IP360 X X Wireshark X X Aircrack X Nessus Professional X Retina CS Community X X Microsoft Baseline Security Analyzer (MBSA) X X AlienVault USM Anywhere X