《威胁驱动的网络安全方法》英文电子版(45页)

ID:27812

阅读量:0

大小:1.69 MB

页数:45页

时间:2023-01-01

金币:20

上传者:战必胜
1
A Threat-Driven Approach to Cyber
Security
Methodologies, Practices and Tools to Enable a Functionally Integrated Cyber
Security Organization
Michael Muckin, Scott C. Fitch
Lockheed Martin Corporation
Abstract
Contemporary cyber security risk management practices are largely driven by compliance
requirements, which force organizations to focus on security controls and vulnerabilities.
Risk management considers multiple facets – including assets, threats, vulnerabilities and
controls – which are jointly evaluated with the variables of probability and impact.
Threats cause damage to information systems. Threats utilize vulnerabilities to enact this
damage, and security controls are implemented to attempt to prevent or mitigate attacks
executed by threat actors. The unbalanced focus on controls and vulnerabilities prevents
organizations from combating the most critical element in risk management: the threats.
This unbalanced condition is manifested as incident response processes rather than threat
intelligence management in the analyst realm, adherence to predefined standards and
policies in security architecture and engineering practices, and compliance verification in
the operational domain.
A functionally integrated cyber security organization is structured to place threats at the
forefront of strategic, tactical and operational practices. Architects, engineers and
analysts adhere to a common methodology that incorporates threat analysis and threat
intelligence across systems development and operational processes. This ensures security
controls are implemented, evaluated and adjusted over time per the most impactful
threats and attack vectors. The resultant risk management practices are enhanced due to a
higher fidelity of information regarding current state security postures. This drives
improved resource allocation and spending, and produces an agile and resilient cyber
security practice. When this threat-driven approach is implemented along with tailored
compliance processes, organizations can produce information systems that are both
compliant and more secure.
Keywords: threat modeling, attack trees, threat profiles, threat intelligence, threat and risk, security
controls, cybersecurity, compliance
© Lockheed Martin Corporation
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭