
Developing a security plan for an organization involves several critical steps, from choosing the right security framework to implementing domain-specific controls. This approach ensures a robust defense against the evolving threat landscape.
Selecting a Security Framework
The adoption of a security framework like the National Institute of Standards and Technology (NIST) is essential. The NIST framework helps businesses across various industries to align their cybersecurity activities with business drivers and integrate them into their risk management processes.
User Domain Controls
The user domain, encompassing all individuals within an organization, is challenging to manage due to human unpredictability. Training programs and policies, such as Acceptable Use Policies and Email Policies, are crucial to educating users on best practices and mitigating social engineering threats.
Workstation Domain Protections
At the workstation domain, the last line of defense before reaching the user, implementing antivirus protection and host-level firewalls is key to blocking attacks that bypass other security measures.
Local Area Network (LAN) Domain Security
In the LAN domain, deploying Intrusion Detection and Prevention systems, along with server-level virus protection and email filtering, helps secure the internal network from various threats.
System/Application Domain Management
Regular software and system patching are vital to close security gaps and protect against vulnerabilities that could be exploited by attackers.
LAN-to-WAN Domain Defense
Perimeter defense at the LAN-to-WAN domain includes comprehensive firewall protection and closing unused ports to prevent external access to the network.
Remote Access Domain Solutions
For remote access, secure methods like VPNs or Citrix ensure that remote workers can access network resources securely without exposing the organization to additional risk.
Wide Area Network (WAN) Domain Encryption
Encrypting data transmitted over the WAN and using HTTPS for web traffic ensures that information remains secure, even when sent over potentially insecure networks.
The Importance of a Holistic Security Approach
A comprehensive security plan must cover all domains, from user education to WAN encryption, ensuring that every aspect of the organization’s network is protected.
Works Cited
- Weekes, J. (2017, November 09). “Step-by-Step: How to implement effective policies and procedures.” Retrieved from Health and Safety Handbook.
- NIST. (2018). “Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1.” National Institute of Standards and Technology. NIST Cybersecurity Framework.