Securing Single Points of Compromise (SPoC) | |
Belangia, David Warren1  | |
[1] Los Alamos National Lab. (LANL), Los Alamos, NM (United States) | |
关键词: General & Miscellaneous(99) Compromise Security Cyber; | |
DOI : 10.2172/1188194 RP-ID : LA-UR--15-24805 PID : OSTI ID: 1188194 |
|
美国|英语 | |
来源: SciTech Connect | |
【 摘 要 】
Securing the Single Points of Compromise that provide central services to the institution???s environment is paramount to success when trying to protect the business. (Fisk, 2014) Time Based Security mandates protection (erecting and ensuring effective controls) that last longer than the time to detect and react to a compromise. When enterprise protections fail, providing additional layered controls for these central services provides more time to detect and react. While guidance is readily available for securing the individual critical asset, protecting these assets as a group is not often discussed. Using best business practices to protect these resources as individual assets while leveraging holistic defenses for the group increases the opportunity to maximize protection time, allowing detection and reaction time for the SPoCs that is commensurate with the inherent risk of these centralized services.
【 预 览 】
Files | Size | Format | View |
---|---|---|---|
764KB | download |