精品欧美一区二区三区在线观看 _久久久久国色av免费观看性色_国产精品久久在线观看_亚洲第一综合网站_91精品又粗又猛又爽_小泽玛利亚一区二区免费_91亚洲精品国偷拍自产在线观看 _久久精品视频在线播放_美女精品久久久_欧美日韩国产成人在线

Microsoft Added to Lapsus$ Cyber Attack Victim List: Five Ways for Enterprise Risk Control

原創(chuàng) 精選
Techplur
Here are five tips on how enterprises can deal with cyber security issues.

On March 24th, it was revealed that a Microsoft account had been stolen by the hacker group Lapsus$. The attackers gained limited access and claimed to have mastered part of Microsoft's source code.

Of the intrusion, Microsoft said, "Our cybersecurity response teams quickly engaged to remediate the compromised account and prevent further activity."

While it was not the first time that Lapsus$ breached a tech giant, after hearing of a series of incidents, risk control departments have already started establishing their system security checks and rectification plans. However, it is often said that "more preparation may quicken the pace of work." Instead of blindly acting in the existing production environment, rethinking the system development and operation could also be good. To identify security risks and prevent them beforehand, we will discuss the security control experience in this article from system development security, system review, weight value classification, risk management, and monitoring response.


1. Development Security

DevSecOps evolves from agile development and aims to left-shift security as far as possible to the initial stage of each development sub-cycle, so it could help developers know the potential threats and vulnerabilities in code earlier. Four practical patterns can be used for this purpose.

Proactive: Segmenting dependencies between applications to isolate components and limit vulnerabilities and threats to one piece, thus ensuring the continued operation of other components. The typical scenario for this pattern is micro-service applications.

One-vote negation: The code logic and user scenarios are designed to interrupt all processes in the event of malicious behavior. For instance, if a user attempts to perform a cross-site scripting attack while visiting a website, any action and its session should be blocked outright.

Industry practice: In teams that lack security experts, standard threat models and control schemas can identify potential risks that application components may face in advance and select the best protection measures.

Multiple Input: Using automated monitoring tools and many input parameters to integrate risk assessment of the operating environment and use cases into the entire software lifecycle.

In addition, we need to implement the following in software development:

Set different user function groups for various application services.

Avoid leaking any password, passphrase, certificate, or private key during the transmission of application data by encryption and other means.

Unify the login methods of multiple applications as Multi-Factor Authentication (MFA) + Single Sign-On (SSO) to achieve automatic matching of user account privileges.

Use proven products to manage keys and promptly discover expired or canceled certificates.

Quickly check code to find invalid or outdated dependencies, codebases, potential memory leaks, endless loops, and code vulnerabilities.


2. System Review

Besides providing software services, we cannot do without the underlying architecture. An enterprise's IT architecture and platforms will present an intricate and complex structural state as an enterprise grows. Therefore, we need to sort out the environment where the daily IT services are located and the resources used in a server room, equipment, lines, applications, business, and users.

Before taking inventory and collecting specific information, we need to develop the classification and definition of the entries in advance to ensure that the generated list is uniform and standardized. Based on the characteristics and status of the data, we must identify the physical hardware devices that store static data, the software applications that process real-time data, the networks that carry dynamic data, the databases that contain structured data, the cloud platforms that store unstructured data, the file servers and user terminals that continuously read and write data.

We can use "automatic tool discovery + manual input + secondary review" to ensure accuracy in building a comprehensive, complete, and intuitive system baseline. This will be our reference standard for later rectification.


3. Weight Value Classification

As a result, we can take a step back from the classical theory of information security and evaluate in-depth the actual impact that various components and data may have on the enterprise when their confidentiality (C), integrity (I) and availability (A) are compromised, and assign the respective values to the three factors accordingly. With the values, we can then calculate the weight value (V) of the asset based on the following formula:

It is worth noting that we can not only assign values to hardware and software assets but also data so that we can progress to clarify which data needs to be encrypted, erased, used internally with restrictions, and available directly to the public. The actual numbers are often difficult to define, so we can use a range of values to classify them into levels like "Top Secret, Confidential, Private, Sensitive, Public, etc."

Sometimes, where confidentiality is stringent, we need to distinguish different levels of security for fields in specific structured data tables, key/value (K/V) in unstructured data fields, and meta information in the corresponding attribute labels of a vector. Besides the logical classification of data, we also need to identify the confidentiality level of equipment components as physical labels.


4. Risk Management: Operational Risk Identification and Response

Some developers may wonder what factors will affect C, I, and A? We need to identify the external threats, internal vulnerabilities, and combined risks to components and data in the operational environment. Generally, we can take the following four steps to identify risks:


  1. Collect and identify: Based on records and industry experience, recruit people in different roles to do brainstorming, questionnaire interviews, matrix charts, etc., to identify hidden risks in the existing environment. For example:
  • Technical level: software and hardware failures and damages, application system vulnerabilities, malware deadlocks, denial-of-service attacks on the network, etc.
  • infrastructure level: power outages, water leakages, operator network interruptions, etc.
  • Human level: access to websites with trojans, various operational mistakes, file data misalignment or tampering, etc.
  • Management level: lack of awareness of cybersecurity, mistakes in handling methods, imperfect rules and regulations, etc.


  1. Analysis and evaluation: Use different methods, such as qualitative/quantitative, to evaluate and rank the identified risks in terms of degree, scope, and likelihood and make a risk ranking matrix accordingly. We can refer to the following criteria for risk quantification:
  • Extent of damage—minor, average, major, severe, extra serious, etc.
  • Scope of impact – enterprise-wide, external customers, multiple sub-sites, specific departments, systems, individual services, etc.
  • Possibility of occurrence - consider the physical and logical areas, fault tolerance, level of protection, and compliance.


  1. Response and disposal:We need to choose among the standard risk mitigation, transfer, avoidance, and acceptance methods and respond according to our risk policy (i.e., risk acceptance). Among them, we need to pay attention to the following two aspects:
  • We should pay attention to the consistency of disposal measures to avoid some local "short slab" in the barrel effect.
  • We can flexibly adjust the control strategies based on distinguishing between the owner of the risk and the control implementer and taking the time, budget, and other costs into account.


5. Monitoring Response: Minimizing Security Incidents

Currently, many companies are establishing proactive monitoring and response mechanisms to minimize the negative impact of security incidents on business operations. The operation team can set up reliability engineers (SREs) to monitor critical equipment status in real-time during routine preventive inspections and find and locate component failures based on documentation on time. They can also review and track performance metrics remotely and by deploying open-source logging and event monitoring tools such as Zabbix.

Let's take a cloud-based business environment as an example to discuss how to manage and control the entire lifecycle of event monitoring and response.

Detection and identification stage: Capture and filter system events from each VM, as well as network-based abnormal traffic information, and then continuously write the filtered log information to the HBase database, providing an essential basis for various correlation analyses and necessary forensics later.

Investigation and analysis stage: Using tools to group the types of events according to feature codes and count the frequency of events. Meanwhile, we can introduce the Application Performance Analysis (APM) module to pinpoint the URL of the application service where the access speed drops or where the user submits a SQL statement with a delay to locate the root faster.

Mitigating and remediation stage: The problematic VM image can be isolated from other systems and services by suspending it, which will not destroy the evidence on that VM but will stop the situation from getting worse.

We can refer to the following process to effectively respond to emergencies:



Conclusion

In this article, we have discussed five keys in system security practices: development security, system review, weight value classification, risk management, and monitoring response.

Faced with the complex internal and external network environment, we should adhere to the simple concept of "no harming others, while guarding against others" and proactively continue to review and improve our IT system. As long as each enterprise can promptly make up for the security shortcomings, the overall cybersecurity situation in the IT industry will be significantly improved.


About the Author

Julian Chen has over ten years of IT project implementation experience and excels at resources and risk control. Chen loves to share network and information security knowledge and innovative technology tips by writing blogs. Chen also teaches information security both online and offline.

責任編輯:龐桂玉 來源: 51CTO
相關推薦

2022-05-13 14:36:12

網絡犯罪網絡攻擊密碼

2009-12-04 15:43:50

Microsoft?

2019-06-11 18:06:32

智能

2022-03-23 13:57:24

勒索組織黑客

2023-02-07 09:24:28

2022-12-21 13:02:43

2022-06-15 18:42:16

戴爾

2025-07-11 00:51:55

2022-03-25 13:45:37

黑客網絡攻擊數(shù)據(jù)泄露

2022-03-23 19:13:47

數(shù)據(jù)泄露勒索組織

2022-03-23 08:01:36

CSSGrid小游戲

2022-04-24 10:02:30

Lapsus$黑客組織T-Mobile

2021-08-23 16:47:34

戴爾

2022-03-22 13:44:54

網絡安全微軟黑客

2021-07-20 09:05:36

Zoom收購Five9

2021-12-16 15:24:47

戴爾

2009-06-12 11:06:35

EJB技術

2021-09-23 18:42:28

SAS數(shù)據(jù)分析AI

2022-07-22 15:38:40

Teams服務癱瘓服務器

2022-05-20 18:39:31

戴爾
點贊
收藏

51CTO技術棧公眾號

中文字幕 91| 日本精品中文字幕| www.欧美com| 亚洲少妇视频| 国产精品久久夜| 成人在线观看91| 无码人妻久久一区二区三区不卡| 91综合久久| 亚洲国产福利在线| 天天操狠狠操夜夜操| 9999精品成人免费毛片在线看| 91丝袜高跟美女视频| 91精品久久久久久综合乱菊 | 91香蕉视频导航| 18av在线播放| 国产日韩欧美亚洲| 国产精品国产三级国产专区53 | 日韩av在线导航| 超碰成人在线播放| 成人av免费电影网站| 亚洲男人的天堂一区二区| 欧美一区视久久| 日韩一级免费毛片| 国产高清精品久久久久| 国产精品视频男人的天堂| 国产午夜在线播放| 欧美另类亚洲| 久久在线免费观看视频| jizz中文字幕| 蜜桃a∨噜噜一区二区三区| 日韩三级视频在线观看| 美女在线视频一区二区| 小黄鸭精品aⅴ导航网站入口| 亚洲一卡二卡三卡四卡五卡| 一本色道久久综合亚洲二区三区| 你懂的在线网址| 成人黄色一级视频| www.久久草| 国产福利第一页| 极品尤物av久久免费看| 国产日韩精品在线观看| 69av视频在线观看| 国产精品一国产精品k频道56| 欧美激情区在线播放| 欧美日韩亚洲国产另类| 91精品1区| 久久精品99无色码中文字幕| 18啪啪污污免费网站| 精品视频国产| 中文字幕日韩高清| 999久久久国产| 青青草原综合久久大伊人精品| 亚洲色图五月天| 97超碰在线免费观看| 一本久久青青| 亚洲人成人99网站| 最新中文字幕av| 成人婷婷网色偷偷亚洲男人的天堂| 亚洲女人天堂成人av在线| 国精品无码人妻一区二区三区| 精品在线99| 国产亚洲精品久久久优势| 91成人在线免费视频| 日韩精品中文字幕第1页| 中文字幕亚洲综合久久筱田步美| 中文字幕av久久爽一区| 全球成人免费直播| 精品国产一区二区三区久久狼黑人 | 99久久免费精品| 久久久婷婷一区二区三区不卡| 青春草在线观看| 日本一二三不卡| 黄色免费高清视频| 女人天堂av在线播放| 婷婷一区二区三区| 日韩中文字幕免费在线| 日韩一级特黄| 精品日产卡一卡二卡麻豆| 久久久久国产精品无码免费看| 亚洲免费专区| www.午夜精品| 精品一区二区三区人妻| 性娇小13――14欧美| 国产日韩欧美另类| 国产18精品乱码免费看| 2023国产一二三区日本精品2022| 亚洲精品tv久久久久久久久| 在线观看操人| 日韩欧美在线观看| 国产乱码一区二区三区四区| 美国成人xxx| 中文字幕亚洲欧美日韩在线不卡| av激情在线观看| 国产亚洲成人一区| 成人免费看吃奶视频网站| 日批视频在线播放| 中文字幕一区二区三区四区不卡| 99久久免费观看| 国产亚洲精彩久久| 日韩av一区在线观看| 亚洲欧美精品久久| 在线视频精品| 91在线无精精品一区二区| 亚洲色图欧美视频| 亚洲蜜臀av乱码久久精品| 国产精品无码av无码| 综合激情网...| 中文字幕亚洲国产| 91精品国产乱码久久久张津瑜| 久久99国产精品尤物| 久久精品国产精品国产精品污| 国产三区视频在线观看| 日本韩国精品在线| 污污免费在线观看| 欧美aaaaaaaaaaaa| 国产精品2018| 亚欧在线观看视频| 欧美猛烈性xbxbxbxb| 欧美成人激情| 亚洲2020天天堂在线观看| 一级黄色片在线播放| 26uuu亚洲婷婷狠狠天堂| 加勒比海盗1在线观看免费国语版| 日本不卡网站| 精品久久一二三区| 男人在线观看视频| 日本不卡视频在线| 久久青青草原一区二区| 欧洲黄色一区| 91精品欧美久久久久久动漫| 亚洲а∨天堂久久精品2021| 国产欧美日韩综合一区在线播放| 亚洲淫片在线视频| 黄色国产网站在线播放| 欧美午夜精品一区| 69视频在线观看免费| 久久国产精品久久久久久电车| 国产66精品久久久久999小说| 美女国产在线| 欧美片在线播放| 亚洲黄色网址大全| 免费成人你懂的| 亚欧洲精品在线视频免费观看| 伊人久久av| 日韩久久精品成人| 久久国产黄色片| 91农村精品一区二区在线| 怡红院av亚洲一区二区三区h| 一区二区三区亚洲变态调教大结局| 久久精品中文字幕一区| 国产精品玖玖玖| 日韩毛片高清在线播放| 五月天婷婷影视| 亚洲五月综合| 91免费观看| 成人免费一区二区三区牛牛| 亚洲国产精品久久精品怡红院| 国产欧美日韩另类| 久久日韩粉嫩一区二区三区| 日本黄网站免费| 青青草91久久久久久久久| 国产精品天天狠天天看| 黄色片网站在线| 精品日韩在线一区| 国内免费精品视频| 国产色一区二区| 亚洲欧美天堂在线| 黑人一区二区三区四区五区| 国产主播一区二区三区四区| 亚洲美女久久精品| 日韩在线精品一区| 亚洲国产精品suv| 亚洲成av人影院在线观看网| 中文字幕高清视频| 精品无人码麻豆乱码1区2区| 成人免费看片'免费看| 欧美日韩一本| 国产日韩av高清| 精灵使的剑舞无删减版在线观看| 精品视频久久久久久久| 真实的国产乱xxxx在线91| 亚洲人成电影网站色mp4| 美女久久久久久久久| 久久精品女人| 91成人在线视频观看| 极品一区美女高清| 国产精品久久久久久中文字| 日本在线观看高清完整版| 日韩精品在线免费观看视频| 一区二区国产欧美| 一区二区三区四区乱视频| 久久亚洲AV成人无码国产野外| 久久精品二区亚洲w码| 性一交一乱一伧国产女士spa| 欧美大胆视频| 成人午夜一级二级三级| 欧美裸体视频| 九九九久久久久久| 毛片在线免费| 精品成人免费观看| 最新黄色网址在线观看| 亚洲午夜日本在线观看| 免费看一级黄色| av中文字幕一区| 亚洲自拍第三页| 久久九九免费| 日韩黄色片在线| 色婷婷色综合| 欧美裸体网站| 99re8这里有精品热视频8在线| 国产女人精品视频| 伊人色综合一区二区三区影院视频| 欧美成aaa人片在线观看蜜臀| 男人av在线| 亚洲国产成人在线播放| 国产wwwwwww| 欧美午夜电影在线播放| av大片在线免费观看| 亚洲一区二区3| 极品久久久久久| 国产精品成人免费在线| 婷婷色一区二区三区| 99re热视频这里只精品 | 老司机一区二区| 免费无码国产v片在线观看| 欧美精品日本| 国产盗摄视频在线观看| 日本不卡电影| 亚洲精品成人自拍| 欧美日韩伦理| 日韩精品一区二区三区外面| 无码日韩精品一区二区免费| 风间由美一区二区三区| 久久久久久久久久久久电影| 成人日韩av在线| 亚洲人成网站在线在线观看| 国产精品久久久久久久久久ktv| 美女福利一区二区| 日韩av色综合| 午夜av成人| 国产精品天天狠天天看| 青青青国产精品| 国产精品日韩一区| 欧美高清你懂的| 国产在线久久久| 亚洲日韩中文字幕一区| 国产精品网址在线| 97色婷婷成人综合在线观看| 91精品美女在线| 视频一区日韩| 国产激情一区二区三区在线观看| 高潮久久久久久久久久久久久久| 99久re热视频这里只有精品6| 99这里只有精品视频| 国产精品视频免费一区| 日韩欧美在线精品| 鲁丝片一区二区三区| 精品国产乱码久久久| 一区二区三区四区五区精品 | 国产日韩欧美综合在线| 高潮毛片无遮挡| 国产精品欧美综合在线| 好吊日在线视频| 亚洲一区中文日韩| 中文字幕超碰在线| 欧美在线免费观看视频| 97在线播放免费观看| 欧美一区二区成人6969| 欧美视频在线观看一区二区三区| 日韩精品黄色网| 成年人在线免费观看| 久久精品视频中文字幕| 欧美黄色视屏| 日韩免费不卡av| 日韩三区四区| 九色91在线视频| 色婷婷综合网| 缅甸午夜性猛交xxxx| 免费一级欧美片在线观看| 成人免费黄色av| 97久久精品人人做人人爽50路| 69精品无码成人久久久久久| 亚洲欧美一区二区久久| 国产免费观看av| 欧美日韩国产美| 欧美视频一二区| 日韩在线免费av| 在线观看亚洲一区| 亚洲天堂av综合网| 日韩在线免费电影| 欧美成人午夜剧场免费观看| segui88久久综合| 国产精品一区二区电影| 大型av综合网站| 亚洲第一在线综合在线| 黑丝一区二区三区| 成年网站在线播放| av不卡免费在线观看| 国产精品久久国产精麻豆96堂| 一区二区高清免费观看影视大全| 亚洲影院在线播放| 欧美成人免费网站| 日本中文字幕视频在线| 欧美在线免费观看| 亚洲三级av| 在线观看日韩片| 久久成人亚洲| 91精品啪在线观看国产| 自拍偷拍亚洲综合| 中国黄色一级视频| 亚洲欧美另类中文字幕| 激情在线视频播放| 国产综合久久久久久| 红桃成人av在线播放| 日韩小视频网站| 国产成人午夜精品影院观看视频| 1024手机在线观看你懂的| 欧美日韩综合视频网址| 亚洲美女综合网| 久久夜色精品亚洲噜噜国产mv| 成人看片网页| 日本福利一区二区三区| 国产日韩欧美| 亚洲图片综合网| 亚洲成人av一区二区| 亚洲AV无码国产精品午夜字幕| 北条麻妃一区二区三区中文字幕| 日韩三区免费| 欧美一区二区三区成人久久片| 99热免费精品| 一女三黑人理论片在线| 亚洲大型综合色站| 亚洲免费视频网| 久久久久久久久久av| 97久久综合区小说区图片区| 老汉色影院首页| 国产精品亚洲专一区二区三区| 久久精品在线观看视频| 欧美日韩久久久久久| 五月香视频在线观看| 国产日本欧美一区| 亚洲国产老妈| 99精品视频国产| 一区二区三区丝袜| 亚洲AV无码一区二区三区少妇 | 韩国福利在线| 日本精品久久中文字幕佐佐木| 亚洲综合图色| 爆乳熟妇一区二区三区霸乳| 久久久久国产免费免费| av首页在线观看| 在线日韩欧美视频| 国产精品va视频| 成人区一区二区| www.久久久久久久久| 国产免费av一区| 深夜福利91大全| 日本精品视频| 欧美视频在线观看网站| 91丨porny丨蝌蚪视频| 亚洲va在线观看| 日韩在线视频观看正片免费网站| 欧美国产日韩电影| 欧美精品一区二区性色a+v| 国产激情视频一区二区在线观看| 久久久久亚洲av片无码下载蜜桃| 亚洲国产中文字幕在线观看| 国产日韩电影| 男插女免费视频| 成人av在线资源网| 久久亚洲精品石原莉奈 | caoporn视频在线| 麻豆av一区二区三区| 免费在线观看日韩欧美| 免费中文字幕视频| 精品亚洲一区二区三区| 成人h在线观看| 国产片侵犯亲女视频播放| xnxx国产精品| 91麻豆视频在线观看| 午夜精品福利在线观看| 日本一本不卡| 欧美激情一区二区三区p站| 91久久精品国产91性色tv| 50度灰在线| 欧美日韩精品免费看| 国产精品综合av一区二区国产馆| 天堂网一区二区三区| 精品国产依人香蕉在线精品| 欧美黑人巨大videos精品| 嫩草视频免费在线观看| 欧美日韩国产综合视频在线观看中文| youjizz在线播放| 国产视频在线观看一区| 久久国产精品色婷婷| 日韩美女黄色片| www.亚洲一区| 国产成人精品一区二区免费看京 | 国产精品成人在线观看| 天天干天天草天天射|