Project Name:
Recommendations
- Implement strict access controls like formalised access granting/revoking processes and multi-factor authentication
(CIS Control 6: Access Control Management)
- Assign permissions using the Principle of Least Privilege (PoLP)
(CIS Control 12.2 Establish and Maintain a Secure Network Architecture)
- Use SSL/TLS certificates for data-in-transit and strong encryption standards like AES for data-at-rest
(CIS Control 3.10/3.11: Encrypt Sensitive Data in Transit and At Rest)
- Enable logging and auditing of system and user activity from workstations, servers, and devices
(CIS Control 8.1: Establish and Maintain an Audit Log Management Process)
- Enable logging, monitoring, and alerting for critical component configurations
(CIS Control 4.6: Securely Manage Enterprise Assets and Software)
- Perform system hardening on operating systems, servers, and applications
(CIS Control 16.7: Use Standard Hardening Configuration Template for Application Infrastructure)
- Ensure appropriate network segmentation between hosts and among assets. Aim for Zero-Trust Architecture (ZTA)
(CIS Control 12.2: Establish and Maintain a Secure Network Architecture)
- Implement role-based access control (RBAC) so that individual users are linked to unique identifiable accounts
(CIS Control 6.8: Define and Maintain Role-Based Access Control)
- Conduct regular backups of all in-scope assets and data
(CIS Control 11.2: Perform Automated Backups)
- Develop a Disaster Recovery Plan to prevent data loss and maintain business continuity
(CIS Control 17.4: Establish and Maintain an Incident Response Process)
Governance, Risk and Compliance (GRC)
- Ensure a role matrix is defined within Project documentation
(CIS Control 6.8: Define and Maintain Role-Based Access Control)
- Prioritise vulnerability identification and remediation using a formalised process
(CIS Control 7.1: Establish and Maintain a Vulnerability Management process)
- Provide ongoing Security Awareness and Training to educate users on different forms of social engineering
(CIS Control 14.2: Train Workforce Members to Recognise Social Engineering Attacks)
- Conduct regular Technical Risk Assessments to identify risks and required security controls
(CIS Control 7.1: Establish and Maintain a Vulnerability Management process)
- Conduct regular Penetration Testing on all aspects of the solution
(CIS Control 7.1: Establish and Maintain a Vulnerability Management process)
- Implement endpoint detection and response (EDR) tools to enhance attack visibility
(CIS Control 13.7: Deploy a Host-Based Intrusion Prevention Solution)
- Develop a Business Continuity Plan to maintain the delivery of services during an incident
(CIS Control 17.4: Establish and Maintain an Incident Response Process)
View all of our Security Services
Copy & paste the below URL with your saved answers for your records:
We strongly encourage you to engage your existing security team to implement the recommended controls identified within this report. Should you require further assistance, please feel free to reach out to us.