Proposed solution

Proposed solution

Solutions for handling Cyber security issues, can be divided in to three major solutions:

Avoid. 

If the risk outweighs the benefits, discontinuing an  may be the best course of action if it means no longer being exposed to it.

If you are no longer using the system, the system does not have to be secured as it can be removed. Ways of finding out if a system is being used is to analyze the usage by Microsoft Defender for Identity. If the system is not being used by any (or few users) it can be decommissioned

Article content

It is also possible to use the Microsoft Defender for Endpoint to analyze and see what is used actively and find out if the solution is being active.

Article content

Or in worst case use the SCREAM method: https://lnkd.in/ecUv-9gs

What’s the Scream Test? Well, in the Microsoft case it was a multistep process:

  • Display the message “Hey, is this your server, contact us?” on the sign-in splash page for two weeks.
  • Restart the server once each day for two weeks to see whether someone opens a ticket (in other words, screams).
  • Shut down the server for two weeks and see whether someone opens a ticket. (Again, whether they scream.)
  • Retire the server, retaining the storage for a period, just in case.


Transfer. 

Share a portion of the risk with other parties through cyber insurance or outsourcing certain operations to third parties.

This might include move things to the cloud an example might be Azure SQL Azure SQL | Microsoft Azure ,which includes: multi-layered protection with built-in security controls including network security, encryption, and access and key management and physical security.


Mitigate. 

Deploy security controls and other measures to reduce the Likelihood and/or Impact and therefore the risk level.

This can include either on-prem security controls or cloud based controls. An overview of the controls that are present in Azure can be found here: Overview of the Azure Security Benchmark v3 | Microsoft Docs


Article content



Backlink

https://www.garudax.id/pulse/tactical-output-niklas-fredengren

Forwardlink

https://www.garudax.id/pulse/cost-niklas-fredengren

Interesting thoughts Niklas. With rapidly changing landscape and gaps in skills to even make a decision to "Transfer" or "Mitigate". You have any thoughts on what probabilities that "Ignore" will also increase as a result?

Like
Reply

To view or add a comment, sign in

More articles by Niklas Fredengren

  • Multinomial decisions

    As part of the research for this article series, I read a research paper on tactical behaviour of bicyclists. One thing…

  • Investment

    The reason for that is that security is not usually an investment that provides profit but loss prevention. So what is…

  • Budget

    With evolving and emerging cyber threats, setting aside enough budget for cyber security initiatives is increasingly…

  • Value

    Measuring cybersecurity value But how can a company effectively measure its cybersecurity program and whether the…

  • Cost

    We all know that Cybersecurity has a cost. I define it as Cost of Doing something and Cost of Inaction.

  • Tactical Output

    The Tactical output is the outcome after all perspectives are taken in to account. This will be the a definition on…

  • Priorities

    In One of the biggest challenge in Cybersecurity is the usage of resources. This leads to a need of choosing between…

    1 Comment
  • Weight

    To be able to prioritize what should be worked on, there is a need to describe what importance each threat has. One…

  • Tactical Input

    Today, security operations do not suffer from a "Big Data" problem but rather a "Big Data Analysis" problem. Let's face…

  • Threats

    Threats would be all the things that will affect your organization possibilities to accomplish the Strategical and…

Others also viewed

Explore content categories