Documente Academic
Documente Profesional
Documente Cultură
Data leakage and misuse due to Mitigation: Review of endpoint & server protection solutions in the
lack of control on advanced organization, find gaps and improve
malware attacks on information
systems and endpoints
Solutions
APT Protection and detection
Microsoft's Enhanced Mitigation Experience Toolkit, App
locker and Advanced Threat Analytics
Host firewall
Mitigation:
Exploit misconfigured, 1. Pre hardened Operating system images as best practices.
vulnerable organizations
information systems &
2. Harden application as per manufacturer recommendation and
applications leading to data industry best practices
leakage and compromise 3. Automated review of security hardening against benchmarks
4. Regular vulnerability scanning
Solution required:
Enterprise vulnerability scanner
Hardening benchmarks and scanner
Solutions
Two factor authentication
Jump servers for use of privileged identities
Privilege identity security (vaulting, threat analysis and service
accounts)
Identity and access management
Certificate based authentication support for upcoming
systems.
HSM for securing encryption keys