Secure Device Management Flashcards
Risk Management Process
- Risk identification
- Risk Assessment (score, weigh, prioritise risks)
- Risk Response Planning (determine risk response, plan actions)
- Response Implementation (continuous risk monitoring)
- Monitor and Assess results (continuous risk monitoring and response evaluation)
T-V pair
Threat Vulnerabilities
Risk avoidance
- Stop performing the activities that create risk
Risk reduction
Decrease the risk by taking measures to reduce vulnerability
Risk sharing
Shift some of the risk to other parties
Risk retention
Accept the risk and its consequences
Vulnerability Management
a security practice that is designed to proactively prevent the exploitation of IT vulnerabilities that exist within an organization.
Vulnerability Management Life Cycle
- Discover
- Prioritise Assets
- Assess
- Report
- Remediate
- Verify
Discover
Inventory all assets across the network and identify host details, including operating systems and open services, to identify vulnerabilities. Develop a network baseline. Identify security vulnerabilities on a regular automated schedule.
Prioritise Assets
Categorize assets into groups or business units, and assign a business value to asset groups based on their criticality to business operations.
Assess
Determine a baseline risk profile to eliminate risks based on asset criticality, vulnerability, threats, and asset classification.
Report
Measure the level of business risk associated with your assets according to your security policies. Document a security plan, monitor suspicious activity, and describe known vulnerabilities.
Remediate
Prioritize according to business risk and address vulnerabilities in order of risk.
Verify
Verify that threats have been eliminated through follow-up audits.
Asset management
Asset management involves the implementation of systems that track the location and configuration of networked devices and software across an enterprise. As part of any security management plan, organizations must know what equipment accesses the network, where that equipment is within the enterprise and logically on the network, and what software and data those systems store or can access. Asset management not only tracks corporate assets and other authorized devices, but also can be used to identify devices that are not authorized on the network.