Infosec Strategies and Best Practices

Book description

Advance your career as an information security professional by turning theory into robust solutions to secure your organization

Key Features

  • Convert the theory of your security certifications into actionable changes to secure your organization
  • Discover how to structure policies and procedures in order to operationalize your organization's information security strategy
  • Learn how to achieve security goals in your organization and reduce software risk

Book Description

Information security and risk management best practices enable professionals to plan, implement, measure, and test their organization's systems and ensure that they're adequately protected against threats.

The book starts by helping you to understand the core principles of information security, why risk management is important, and how you can drive information security governance. You'll then explore methods for implementing security controls to achieve the organization's information security goals. As you make progress, you'll get to grips with design principles that can be utilized along with methods to assess and mitigate architectural vulnerabilities. The book will also help you to discover best practices for designing secure network architectures and controlling and managing third-party identity services. Finally, you will learn about designing and managing security testing processes, along with ways in which you can improve software security.

By the end of this infosec book, you'll have learned how to make your organization less vulnerable to threats and reduce the likelihood and impact of exploitation. As a result, you will be able to make an impactful change in your organization toward a higher level of information security.

What you will learn

  • Understand and operationalize risk management concepts and important security operations activities
  • Discover how to identify, classify, and maintain information and assets
  • Assess and mitigate vulnerabilities in information systems
  • Determine how security control testing will be undertaken
  • Incorporate security into the SDLC (software development life cycle)
  • Improve the security of developed software and mitigate the risks of using unsafe software

Who this book is for

If you are looking to begin your career in an information security role, then this book is for you. Anyone who is studying to achieve industry-standard certification such as the CISSP or CISM, but looking for a way to convert concepts (and the seemingly endless number of acronyms) from theory into practice and start making a difference in your day-to-day work will find this book useful.

Table of contents

  1. Infosec Strategies and Best Practices
  2. Contributors
  3. About the author
  4. About the reviewer
  5. Preface
    1. Who this book is for
    2. What this book covers
    3. To get the most out of this book
    4. Download the color images
    5. Conventions used
    6. Get in touch
    7. Reviews
  6. Section 1: Information Security Risk Management and Governance
  7. Chapter 1: InfoSec and Risk Management
    1. Basic InfoSec terminology
    2. Understanding why risk management is important
      1. Understanding assets
      2. Understanding vulnerabilities
    3. Performing a basic risk assessment
      1. Defining and calculating impact
      2. Defining and calculating likelihood
      3. Calculating risk
      4. Risk appetite, risk treatment, and risk acceptance
    4. Considering legal regulations, investigations, and compliance structures
      1. Compliance structures
      2. Understanding legal and regulatory requirements
      3. Responding to and undertaking investigations
      4. Further compliance optimization
    5. Proven methodologies in creating a strategy
      1. Creating InfoSec policies, procedures, and playbooks 
      2. Establishing and maintaining a security awareness, education, and training program
      3. Managing third-party risk 
      4. Continual improvement and reporting
    6. Summary
  8. Chapter 2: Protecting the Security of Assets
    1. Implementing an ISMS
      1. Responsibilities of top management
      2. Developing an ISMS
      3. Educating members of your organization
      4. Evaluating the effectiveness of the ISMS
      5. Improving the policy
    2. Identifying and classifying information assets
      1. Structuring information asset classifications
      2. Determining the roles for assets
      3. Methods of identifying and protecting information assets
      4. Retention policies
    3. Securing information assets
    4. Disposing of assets
      1. Data remnants
    5. Summary
  9. Section 2: Closing the Gap: How to Protect the Organization
  10. Chapter 3: Designing Secure Information Systems
    1. Understanding the risks your organization faces
      1. Threats, threat actors, and motivations
      2. Vulnerabilities
      3. System exploitation methods
    2. Best practices in assessing and mitigating vulnerabilities
      1. Hardware security
      2. Software security
      3. Network security
      4. Physical security
      5. Selecting appropriate controls/defense against the dark arts
    3. Best practices in designing secure information systems
      1. Secure design principles
      2. Well-known controls and their mitigations
      3. Considering alternative devices
    4. Summary
  11. Chapter 4: Designing and Protecting Network Security
    1. Designing secure network architectures
      1. Internet Protocol suite and the OSI model
      2. Network components and protocols
      3. Network devices and applications
      4. Attacks, defense, and detection
    2. Strategies for protecting network security
      1. Creating a policy
      2. Keep it simple
      3. Business continuity and disaster recovery
      4. Backup and restore procedures
      5. Insider threat mitigations/third-party threats
      6. Software and firmware updates
      7. Ensuring secure communication
      8. Cloud network security
      9. Education and awareness
      10. Security Operations Center
  12. Chapter 5: Controlling Access and Managing Identity
    1. Access control models and concepts
      1. State machine model
      2. Information flow model
      3. Confidentiality models
      4. Integrity models
      5. Real-world access control models
    2. Selecting and implementing authentication and authorization mechanisms
      1. Authentication versus authorization
      2. Authentication and security
      3. Authorization
    3. Identity and access management (IAM) 
      1. Leveraging identity services
    4. Controlling physical access to assets
      1. Physical access control
      2. Electronic access control
      3. Preventing exploitation
    5. Summary
  13. Section 3: Operationalizing Information Security
  14. Chapter 6: Designing and Managing Security Testing Processes
    1. Preparing for security assessments
      1. Defining your requirements
    2. Understanding the different types of security assessments
      1. Automated assessments and scanning
      2. Internal assessments
      3. Third-party assessments
    3. Best practices in performing security assessments
    4. Interpreting results from security assessments
    5. Summary
  15. Chapter 7: Owning Security Operations
    1. Effective strategies in provisioning resources and maintaining assets
      1. Provisioning resources
    2. Focusing on availability, disaster recovery, and business continuity
      1. Defining, implementing, and testing disaster recovery processes
      2. Managing business continuity design, planning, and testing
      3. Implementing and managing physical security
    3. Managing upgrades, patching, and applying security controls
      1. Education
      2. Change control
      3. Security improvement program
    4. Investigating events and responding to incidents
      1. Defining your incident response plans
      2. Performing security investigations
    5. Implementing and utilizing detective controls
    6. Using security monitoring to improve visibility
    7. Security monitoring best practices
      1. Establish requirements and define workflows
      2. Define specific rules and ensure their effectiveness
      3. Continuously improve your SIEM configuration and incident response policies
    8. Summary
  16. Chapter 8: Improving the Security of Software
    1. Exploring software security paradigms
      1. Buyer beware
      2. Legal documentation
    2. Understanding the secure development life cycle
      1. Compatibility with various software development methodologies
      2. Defining business and security requirements
      3. Designing secure software
      4. Testing plans for secure software
      5. Securing software development
      6. Testing the software
    3. Utilizing the OWASP Top 10 Proactive Controls
      1. Define security requirements
      2. Leverage security frameworks and libraries
      3. Secure database access
      4. Encode and escape data
      5. Validate all inputs
      6. Implement digital identity
      7. Enforce access controls
      8. Protect data everywhere
      9. Implement security logging and monitoring
      10. Handle all errors and exceptions
    4. Assessing software security
      1. Reducing the risk from software developed by a third-party vendor
      2. Improving the security of in-house software
    5. Summary
    6. Why subscribe?
  17. Other Books You May Enjoy
    1. Packt is searching for authors like you
    2. Leave a review - let other readers know what you think

Product information

  • Title: Infosec Strategies and Best Practices
  • Author(s): Joseph MacMillan
  • Release date: May 2021
  • Publisher(s): Packt Publishing
  • ISBN: 9781800566354