国产精品电影_久久视频免费_欧美日韩国产激情_成年人视频免费在线播放_日本久久亚洲电影_久久都是精品_66av99_九色精品美女在线_蜜臀a∨国产成人精品_冲田杏梨av在线_欧美精品在线一区二区三区_麻豆mv在线看

Microsoft Added to Lapsus$ Cyber Attack Victim List: Five Ways for Enterprise Risk Control

原創 精選
Techplur
Here are five tips on how enterprises can deal with cyber security issues.

On March 24th, it was revealed that a Microsoft account had been stolen by the hacker group Lapsus$. The attackers gained limited access and claimed to have mastered part of Microsoft's source code.

Of the intrusion, Microsoft said, "Our cybersecurity response teams quickly engaged to remediate the compromised account and prevent further activity."

While it was not the first time that Lapsus$ breached a tech giant, after hearing of a series of incidents, risk control departments have already started establishing their system security checks and rectification plans. However, it is often said that "more preparation may quicken the pace of work." Instead of blindly acting in the existing production environment, rethinking the system development and operation could also be good. To identify security risks and prevent them beforehand, we will discuss the security control experience in this article from system development security, system review, weight value classification, risk management, and monitoring response.


1. Development Security

DevSecOps evolves from agile development and aims to left-shift security as far as possible to the initial stage of each development sub-cycle, so it could help developers know the potential threats and vulnerabilities in code earlier. Four practical patterns can be used for this purpose.

Proactive: Segmenting dependencies between applications to isolate components and limit vulnerabilities and threats to one piece, thus ensuring the continued operation of other components. The typical scenario for this pattern is micro-service applications.

One-vote negation: The code logic and user scenarios are designed to interrupt all processes in the event of malicious behavior. For instance, if a user attempts to perform a cross-site scripting attack while visiting a website, any action and its session should be blocked outright.

Industry practice: In teams that lack security experts, standard threat models and control schemas can identify potential risks that application components may face in advance and select the best protection measures.

Multiple Input: Using automated monitoring tools and many input parameters to integrate risk assessment of the operating environment and use cases into the entire software lifecycle.

In addition, we need to implement the following in software development:

Set different user function groups for various application services.

Avoid leaking any password, passphrase, certificate, or private key during the transmission of application data by encryption and other means.

Unify the login methods of multiple applications as Multi-Factor Authentication (MFA) + Single Sign-On (SSO) to achieve automatic matching of user account privileges.

Use proven products to manage keys and promptly discover expired or canceled certificates.

Quickly check code to find invalid or outdated dependencies, codebases, potential memory leaks, endless loops, and code vulnerabilities.


2. System Review

Besides providing software services, we cannot do without the underlying architecture. An enterprise's IT architecture and platforms will present an intricate and complex structural state as an enterprise grows. Therefore, we need to sort out the environment where the daily IT services are located and the resources used in a server room, equipment, lines, applications, business, and users.

Before taking inventory and collecting specific information, we need to develop the classification and definition of the entries in advance to ensure that the generated list is uniform and standardized. Based on the characteristics and status of the data, we must identify the physical hardware devices that store static data, the software applications that process real-time data, the networks that carry dynamic data, the databases that contain structured data, the cloud platforms that store unstructured data, the file servers and user terminals that continuously read and write data.

We can use "automatic tool discovery + manual input + secondary review" to ensure accuracy in building a comprehensive, complete, and intuitive system baseline. This will be our reference standard for later rectification.


3. Weight Value Classification

As a result, we can take a step back from the classical theory of information security and evaluate in-depth the actual impact that various components and data may have on the enterprise when their confidentiality (C), integrity (I) and availability (A) are compromised, and assign the respective values to the three factors accordingly. With the values, we can then calculate the weight value (V) of the asset based on the following formula:

It is worth noting that we can not only assign values to hardware and software assets but also data so that we can progress to clarify which data needs to be encrypted, erased, used internally with restrictions, and available directly to the public. The actual numbers are often difficult to define, so we can use a range of values to classify them into levels like "Top Secret, Confidential, Private, Sensitive, Public, etc."

Sometimes, where confidentiality is stringent, we need to distinguish different levels of security for fields in specific structured data tables, key/value (K/V) in unstructured data fields, and meta information in the corresponding attribute labels of a vector. Besides the logical classification of data, we also need to identify the confidentiality level of equipment components as physical labels.


4. Risk Management: Operational Risk Identification and Response

Some developers may wonder what factors will affect C, I, and A? We need to identify the external threats, internal vulnerabilities, and combined risks to components and data in the operational environment. Generally, we can take the following four steps to identify risks:


  1. Collect and identify: Based on records and industry experience, recruit people in different roles to do brainstorming, questionnaire interviews, matrix charts, etc., to identify hidden risks in the existing environment. For example:
  • Technical level: software and hardware failures and damages, application system vulnerabilities, malware deadlocks, denial-of-service attacks on the network, etc.
  • infrastructure level: power outages, water leakages, operator network interruptions, etc.
  • Human level: access to websites with trojans, various operational mistakes, file data misalignment or tampering, etc.
  • Management level: lack of awareness of cybersecurity, mistakes in handling methods, imperfect rules and regulations, etc.


  1. Analysis and evaluation: Use different methods, such as qualitative/quantitative, to evaluate and rank the identified risks in terms of degree, scope, and likelihood and make a risk ranking matrix accordingly. We can refer to the following criteria for risk quantification:
  • Extent of damage—minor, average, major, severe, extra serious, etc.
  • Scope of impact – enterprise-wide, external customers, multiple sub-sites, specific departments, systems, individual services, etc.
  • Possibility of occurrence - consider the physical and logical areas, fault tolerance, level of protection, and compliance.


  1. Response and disposal:We need to choose among the standard risk mitigation, transfer, avoidance, and acceptance methods and respond according to our risk policy (i.e., risk acceptance). Among them, we need to pay attention to the following two aspects:
  • We should pay attention to the consistency of disposal measures to avoid some local "short slab" in the barrel effect.
  • We can flexibly adjust the control strategies based on distinguishing between the owner of the risk and the control implementer and taking the time, budget, and other costs into account.


5. Monitoring Response: Minimizing Security Incidents

Currently, many companies are establishing proactive monitoring and response mechanisms to minimize the negative impact of security incidents on business operations. The operation team can set up reliability engineers (SREs) to monitor critical equipment status in real-time during routine preventive inspections and find and locate component failures based on documentation on time. They can also review and track performance metrics remotely and by deploying open-source logging and event monitoring tools such as Zabbix.

Let's take a cloud-based business environment as an example to discuss how to manage and control the entire lifecycle of event monitoring and response.

Detection and identification stage: Capture and filter system events from each VM, as well as network-based abnormal traffic information, and then continuously write the filtered log information to the HBase database, providing an essential basis for various correlation analyses and necessary forensics later.

Investigation and analysis stage: Using tools to group the types of events according to feature codes and count the frequency of events. Meanwhile, we can introduce the Application Performance Analysis (APM) module to pinpoint the URL of the application service where the access speed drops or where the user submits a SQL statement with a delay to locate the root faster.

Mitigating and remediation stage: The problematic VM image can be isolated from other systems and services by suspending it, which will not destroy the evidence on that VM but will stop the situation from getting worse.

We can refer to the following process to effectively respond to emergencies:



Conclusion

In this article, we have discussed five keys in system security practices: development security, system review, weight value classification, risk management, and monitoring response.

Faced with the complex internal and external network environment, we should adhere to the simple concept of "no harming others, while guarding against others" and proactively continue to review and improve our IT system. As long as each enterprise can promptly make up for the security shortcomings, the overall cybersecurity situation in the IT industry will be significantly improved.


About the Author

Julian Chen has over ten years of IT project implementation experience and excels at resources and risk control. Chen loves to share network and information security knowledge and innovative technology tips by writing blogs. Chen also teaches information security both online and offline.

責任編輯:龐桂玉 來源: 51CTO
相關推薦

2009-12-04 15:43:50

Microsoft?

2022-05-13 14:36:12

網絡犯罪網絡攻擊密碼

2019-06-11 18:06:32

智能

2022-03-23 13:57:24

勒索組織黑客

2023-02-07 09:24:28

2022-06-15 18:42:16

戴爾

2025-07-11 00:51:55

2022-12-21 13:02:43

2022-03-23 19:13:47

數據泄露勒索組織

2022-03-25 13:45:37

黑客網絡攻擊數據泄露

2022-03-23 08:01:36

CSSGrid小游戲

2021-08-23 16:47:34

戴爾

2022-04-24 10:02:30

Lapsus$黑客組織T-Mobile

2021-07-20 09:05:36

Zoom收購Five9

2022-03-22 13:44:54

網絡安全微軟黑客

2021-12-16 15:24:47

戴爾

2021-09-23 18:42:28

SAS數據分析AI

2009-06-12 11:06:35

EJB技術

2022-07-22 15:38:40

Teams服務癱瘓服務器

2022-05-20 18:39:31

戴爾
點贊
收藏

51CTO技術棧公眾號

97视频免费在线观看| aa在线观看视频| 国产精品麻豆| 欧美日韩激情一区二区三区| 黄色片一级视频| 国产一区二区伦理| 欧美日韩一区在线观看视频| 亚洲色图88| 国产精品久久一区| 精品av导航| 欧美美女18p| 成人全视频在线观看在线播放高清 | 国产免费色视频| 一本综合精品| 51国偷自产一区二区三区| 国产精品密蕾丝视频下载 | 91久久精品国产| 成人高清电影网站| 国产精品福利无圣光在线一区| 国产精品xxxav免费视频| 久久在线免费视频| 99这里只有精品视频| 久久成人在线视频| 日韩中文字幕在线一区| 欧美国产日本高清在线| 成人黄色av网址| 97精品国产97久久久久久免费 | 日韩欧美主播在线| 日本韩国一区| 欧美性猛片aaaaaaa做受| 超碰国产在线| 欧美一区二区三区视频免费| av在线麻豆| 亚洲天堂色网站| 国产福利亚洲| 欧美劲爆第一页| 久久av免费| 97欧洲一区二区精品免费| 欧美日韩国产欧| 色婷婷精品国产一区二区三区| 精品一区二区影视| 国产精品333| 中文字幕亚洲电影| 日本v片在线免费观看| 欧美久久一区二区| 日韩成人av电影| 午夜免费日韩视频| 欧美成人午夜| 免费成人深夜夜行网站视频| 99视频精品在线| 国产精品久久久久白浆| 3d动漫精品啪啪一区二区竹菊| 国产精欧美一区二区三区蓝颜男同| 麻豆一区二区在线观看| 精品视频久久| 日韩一本精品| 久久久www成人免费无遮挡大片| 看黄色免费网站| 91精品蜜臀在线一区尤物| 日本在线视频一区二区| 欧美中文字幕视频| 亚洲片区在线| 国产精品久久中文字幕| 一区二区三区中文在线观看| 老司机在线看片网av| 伊人av综合网| 成人在线免费观看网站| 台湾成人av| 中文字幕中文字幕在线一区| 岛国大片在线观看| 久热爱精品视频线路一| 欧美精品首页| 激情五月婷婷久久| 日韩一区二区视频在线观看| 国产精品网在线观看| 久久精品丝袜高跟鞋| 国产农村妇女毛片精品久久麻豆 | 日韩高清在线| 成人精品一区二区三区电影免费 | 国产啊啊啊视频在线观看| 美女999久久久精品视频| 亚洲精品二区三区| 少妇人妻在线视频| 欧美蜜桃一区二区三区| 日本在线成人| 天堂av一区二区| 一区二区免费在线播放| 一区一区三区| 成人综合色站| 欧美国产激情二区三区| 日韩另类在线| 成人在线小视频| 国产欧美日韩中文久久| 国产ktv在线视频| 国产综合香蕉五月婷在线| 91丝袜高跟美女视频| 97caopor国产在线视频| 国产成人精品在线| av一二三不卡影片| 不卡av免费观看| 国产传媒一区| 一区二区三区日韩精品| 亚洲国产aⅴ精品一区二区三区| 久久精品国产99精品国产亚洲性色| 亚洲视频在线观看三级| 欧美成人福利| 中文字幕一区二区中文字幕 | 亚洲欧美日韩中文视频| 欧美三级乱码| 免费特级黄毛片| 欧美激情奇米色| 国产大片一区二区| 国产精品186在线观看在线播放| 亚洲一区二区三区四区视频| 欧美国产精品v| 国产成人久久精品一区二区三区| 日本精品一区| 欧美精品久久久久久久久老牛影院| 成人女性视频| 日日噜噜噜夜夜爽爽狠狠| 韩国福利视频一区| 2017欧美狠狠色| 色综合一区二区日本韩国亚洲| 在线成人性视频| 日韩视频免费直播| 亚洲精品免费观看| 日本在线播放| 激情视频一区二区| 欧美区一区二区三区| 在线成人www免费观看视频| 肉丝一区二区| 亚洲伊人第一页| 日本黄色一区二区| 亚洲欧洲一区| 亚洲性图自拍| 亚洲三区在线| 亚洲欧洲国产精品| 99re成人精品视频| 成人三级av在线| 成年人视频在线| 国产精品久久9| 精品免费在线观看| 国产精品久久久久久久免费观看| 久草在线中文888| 成人福利免费观看| 欧美性xxxx在线播放| 在线日韩中文| 天堂av资源在线观看| 99热都是精品| 欧美国产日韩在线| 一区2区3区在线看| 亚洲欧美一级二级三级| 巨大荫蒂视频欧美大片| 亚洲v国产v| 国产一区二区三区丝袜| 久久久久久一二三区| 久久99国产精品视频| 毛片在线播放网站| 午夜欧美一区二区三区免费观看| 日韩国产高清视频在线| 2017欧美狠狠色| 99re66热这里只有精品8| av在线看片| 人人干视频在线| 欧美一区二区三区免费观看| 五月婷婷激情综合网| 国产婷婷精品| 韩国成人漫画| 黄色三级在线观看| 欧美激情导航| 欧美高清无遮挡| 欧美性受xxxx| 成人夜色视频网站在线观看| 伊人久久大香线蕉综合网蜜芽| av在线女优影院| aa在线观看视频| 国产成人精品在线视频| 日韩一区二区在线看| 91小视频在线观看| 欧美粗暴jizz性欧美20| 一个人www视频在线免费观看| 天天干天天干天天干天天干天天干| 91免费看片在线| 亚洲精品中文字幕av| 亚洲女同女同女同女同女同69| 激情欧美日韩| 精品视频在线播放一区二区三区 | 亚洲欧洲日韩在线| 亚洲三级免费| 日韩中文字幕视频网| 91在线不卡| 国产精品动漫网站| 精品久久蜜桃| 欧美高清自拍一区| 日韩欧美不卡在线观看视频| 国产亚洲短视频| 老牛国产精品一区的观看方式| jizz国产精品| 在线播放免费av| 青檬在线电视剧在线观看|