How SecurityScorecard’s cybersecurity monitoring enables defense in depth strategies
Suggestions for creating a defense in depth strategy for ports
As part of your defense in depth
strategy that protects against attackers targeting ports, you should be
continuously monitoring for:
·
Unused open ports
·
Host-based
firewalls
·
Network-based
firewalls
·
Port traffic
filtering
·
Strong passwords
·
Access controls
·
Penetration
testing
While all of these suggestions seem
simple, your interconnected IT infrastructure complicates them. For example,
adding more devices increases the number of ports which in turn means you need
to continuously scan for unused ports. Firewalls control the way information
flows across your network, but they also lead to application visibility and
control issues.
Cybersecurity monitoring enhances defense in depth strategies
Continuously monitoring controls
effectiveness is the only way to ensure that your defense in depth strategies
protect data security. Three of the primary controls that protect against a
data breach - unused open ports, host-based firewalls, network-based firewalls
- often require manual processes and review to ensure their continued
effectiveness.
What does cybersecurity monitoring do?
Unused open ports often remain
unnoticed because organizations lack the capability to continuously scan their
networks. Digital transformation objectives leave you adding and removing
services on a regular basis. Monitoring the ports that these services use can
become overwhelming when done manually, ultimately creating a human error risk
that can lead to a data breach.
Comments
Post a Comment