10 Steps To Cyber Security - Gov.uk

26 downloads 243 Views 649KB Size Report
USer Education and AWareneSS. Home and Mobile Working. Network Security. Establish an effective governance structure and
10 Steps To Cyber Security DefiningTandTcommunicatingTyourTBoard’sTInformationTRiskTManagementTRegimeTisT centralTtoTyourTorganisation’sToverallTcyberTsecurityTstrategyjTCESGTrecommendTyouT reviewTthisTregimeTGTtogetherTwithTtheTnineTassociatedTsecurityTareasTdescribedTbelowTGT inTorderTtoTprotectTyourTbusinessTagainstTtheTmajorityTofTcyberTthreatsj

ProtectTyourTnetworksTagainstTexternalTandT internalTattackjTManageTtheTnetworkTperimeterjT FilterToutTunauthorisedTaccessTandTmaliciousT contentjTMonitorTandTtestTsecurityTcontrolsj

MalwareTProtection

Monitoring

UserTEducationTandTAwareness

ProduceTuserTsecurityTpoliciesTcoveringT

acceptableTandTsecureTuseTofTtheTorganisation’sT systemsjTEstablishTaTstaffTtrainingTprogrammejT MaintainTuserTawarenessTofTtheTcyberTrisksjT

HomeTandTMobileTWorking

NetworkTSecurity

ProduceTrelevantTpolicyTandTestablishTantiG malwareTdefencesTthatTareTapplicableTandT relevantTtoTallTbusinessTareasjTScanTforT malwareTacrossTtheTorganisationj

CESG

EstablishTanTeffectiveT governanceTstructure andTdetermineTyour riskTappetitejT

Information RiskTManagement Regime

MaintainTtheT Board’sTengagementT withTthe cyberTriskj

EstablishTaTmonitoringTstrategyTandTproduceT supportingTpoliciesjTContinuouslyTmonitorTallT ICTTsystemsTandTnetworksjTAnalyseTlogsTforT unusualTactivityTthatTcouldTindicateTanTattackjT

TProduceT supportingT informationTriskT managementTT policiesj

DevelopTaTmobileTworkingTpolicyTandT trainTstaffTtoTadhereTtoTitjTApplyTtheT secureTbaselineTTbuildTtoTallTdevicesjT ProtectTdataTbothTinTtransitTandTatTrestjT

SecureTConfiguration

ApplyTsecurityTpatchesTandTensureTthatTtheT secureTconfigurationTofTallTICTTsystemsTisT maintainedjTCreateTaTsystemTinventoryTandT defineTaTbaselineTbuildTforTallTICTTdevicesj

RemovableTMediaTControls

ProduceTaTpolicyTtoTcontrolTallTaccessTtoT removableTmediajTLimitTmediaTtypesTandTusejT ScanTallTmediaTforTmalwareTbeforeTimportingT onTtoTtheTcorporateTsystemj

ManagingTUserTPrivileges IncidentTManagement

EstablishTanTincidentTresponseTandTdisasterTrecoverT capabilityjTProduceTandTtestTincidentTmanagementTplansjT ProvideTspecialistTtrainingTtoTtheTincidentTmanagementT teamjTReportTcriminalTincidentsTtoTlawTenforcementjT

EstablishTaccountTmanagementTprocessesTandT limitTtheTnumberTofTprivilegedTaccountsjTLimitT userTprivilegesTandTmonitorTuserTactivityjT ControlTaccessTtoTactivityTandTauditTlogsjT