精品欧美一区二区三区在线观看 _久久久久国色av免费观看性色_国产精品久久在线观看_亚洲第一综合网站_91精品又粗又猛又爽_小泽玛利亚一区二区免费_91亚洲精品国偷拍自产在线观看 _久久精品视频在线播放_美女精品久久久_欧美日韩国产成人在线

Microsoft Added to Lapsus$ Cyber Attack Victim List: Five Ways for Enterprise Risk Control

原創(chuàng) 精選
Techplur
Here are five tips on how enterprises can deal with cyber security issues.

On March 24th, it was revealed that a Microsoft account had been stolen by the hacker group Lapsus$. The attackers gained limited access and claimed to have mastered part of Microsoft's source code.

Of the intrusion, Microsoft said, "Our cybersecurity response teams quickly engaged to remediate the compromised account and prevent further activity."

While it was not the first time that Lapsus$ breached a tech giant, after hearing of a series of incidents, risk control departments have already started establishing their system security checks and rectification plans. However, it is often said that "more preparation may quicken the pace of work." Instead of blindly acting in the existing production environment, rethinking the system development and operation could also be good. To identify security risks and prevent them beforehand, we will discuss the security control experience in this article from system development security, system review, weight value classification, risk management, and monitoring response.


1. Development Security

DevSecOps evolves from agile development and aims to left-shift security as far as possible to the initial stage of each development sub-cycle, so it could help developers know the potential threats and vulnerabilities in code earlier. Four practical patterns can be used for this purpose.

Proactive: Segmenting dependencies between applications to isolate components and limit vulnerabilities and threats to one piece, thus ensuring the continued operation of other components. The typical scenario for this pattern is micro-service applications.

One-vote negation: The code logic and user scenarios are designed to interrupt all processes in the event of malicious behavior. For instance, if a user attempts to perform a cross-site scripting attack while visiting a website, any action and its session should be blocked outright.

Industry practice: In teams that lack security experts, standard threat models and control schemas can identify potential risks that application components may face in advance and select the best protection measures.

Multiple Input: Using automated monitoring tools and many input parameters to integrate risk assessment of the operating environment and use cases into the entire software lifecycle.

In addition, we need to implement the following in software development:

Set different user function groups for various application services.

Avoid leaking any password, passphrase, certificate, or private key during the transmission of application data by encryption and other means.

Unify the login methods of multiple applications as Multi-Factor Authentication (MFA) + Single Sign-On (SSO) to achieve automatic matching of user account privileges.

Use proven products to manage keys and promptly discover expired or canceled certificates.

Quickly check code to find invalid or outdated dependencies, codebases, potential memory leaks, endless loops, and code vulnerabilities.


2. System Review

Besides providing software services, we cannot do without the underlying architecture. An enterprise's IT architecture and platforms will present an intricate and complex structural state as an enterprise grows. Therefore, we need to sort out the environment where the daily IT services are located and the resources used in a server room, equipment, lines, applications, business, and users.

Before taking inventory and collecting specific information, we need to develop the classification and definition of the entries in advance to ensure that the generated list is uniform and standardized. Based on the characteristics and status of the data, we must identify the physical hardware devices that store static data, the software applications that process real-time data, the networks that carry dynamic data, the databases that contain structured data, the cloud platforms that store unstructured data, the file servers and user terminals that continuously read and write data.

We can use "automatic tool discovery + manual input + secondary review" to ensure accuracy in building a comprehensive, complete, and intuitive system baseline. This will be our reference standard for later rectification.


3. Weight Value Classification

As a result, we can take a step back from the classical theory of information security and evaluate in-depth the actual impact that various components and data may have on the enterprise when their confidentiality (C), integrity (I) and availability (A) are compromised, and assign the respective values to the three factors accordingly. With the values, we can then calculate the weight value (V) of the asset based on the following formula:

It is worth noting that we can not only assign values to hardware and software assets but also data so that we can progress to clarify which data needs to be encrypted, erased, used internally with restrictions, and available directly to the public. The actual numbers are often difficult to define, so we can use a range of values to classify them into levels like "Top Secret, Confidential, Private, Sensitive, Public, etc."

Sometimes, where confidentiality is stringent, we need to distinguish different levels of security for fields in specific structured data tables, key/value (K/V) in unstructured data fields, and meta information in the corresponding attribute labels of a vector. Besides the logical classification of data, we also need to identify the confidentiality level of equipment components as physical labels.


4. Risk Management: Operational Risk Identification and Response

Some developers may wonder what factors will affect C, I, and A? We need to identify the external threats, internal vulnerabilities, and combined risks to components and data in the operational environment. Generally, we can take the following four steps to identify risks:


  1. Collect and identify: Based on records and industry experience, recruit people in different roles to do brainstorming, questionnaire interviews, matrix charts, etc., to identify hidden risks in the existing environment. For example:
  • Technical level: software and hardware failures and damages, application system vulnerabilities, malware deadlocks, denial-of-service attacks on the network, etc.
  • infrastructure level: power outages, water leakages, operator network interruptions, etc.
  • Human level: access to websites with trojans, various operational mistakes, file data misalignment or tampering, etc.
  • Management level: lack of awareness of cybersecurity, mistakes in handling methods, imperfect rules and regulations, etc.


  1. Analysis and evaluation: Use different methods, such as qualitative/quantitative, to evaluate and rank the identified risks in terms of degree, scope, and likelihood and make a risk ranking matrix accordingly. We can refer to the following criteria for risk quantification:
  • Extent of damage—minor, average, major, severe, extra serious, etc.
  • Scope of impact – enterprise-wide, external customers, multiple sub-sites, specific departments, systems, individual services, etc.
  • Possibility of occurrence - consider the physical and logical areas, fault tolerance, level of protection, and compliance.


  1. Response and disposal:We need to choose among the standard risk mitigation, transfer, avoidance, and acceptance methods and respond according to our risk policy (i.e., risk acceptance). Among them, we need to pay attention to the following two aspects:
  • We should pay attention to the consistency of disposal measures to avoid some local "short slab" in the barrel effect.
  • We can flexibly adjust the control strategies based on distinguishing between the owner of the risk and the control implementer and taking the time, budget, and other costs into account.


5. Monitoring Response: Minimizing Security Incidents

Currently, many companies are establishing proactive monitoring and response mechanisms to minimize the negative impact of security incidents on business operations. The operation team can set up reliability engineers (SREs) to monitor critical equipment status in real-time during routine preventive inspections and find and locate component failures based on documentation on time. They can also review and track performance metrics remotely and by deploying open-source logging and event monitoring tools such as Zabbix.

Let's take a cloud-based business environment as an example to discuss how to manage and control the entire lifecycle of event monitoring and response.

Detection and identification stage: Capture and filter system events from each VM, as well as network-based abnormal traffic information, and then continuously write the filtered log information to the HBase database, providing an essential basis for various correlation analyses and necessary forensics later.

Investigation and analysis stage: Using tools to group the types of events according to feature codes and count the frequency of events. Meanwhile, we can introduce the Application Performance Analysis (APM) module to pinpoint the URL of the application service where the access speed drops or where the user submits a SQL statement with a delay to locate the root faster.

Mitigating and remediation stage: The problematic VM image can be isolated from other systems and services by suspending it, which will not destroy the evidence on that VM but will stop the situation from getting worse.

We can refer to the following process to effectively respond to emergencies:



Conclusion

In this article, we have discussed five keys in system security practices: development security, system review, weight value classification, risk management, and monitoring response.

Faced with the complex internal and external network environment, we should adhere to the simple concept of "no harming others, while guarding against others" and proactively continue to review and improve our IT system. As long as each enterprise can promptly make up for the security shortcomings, the overall cybersecurity situation in the IT industry will be significantly improved.


About the Author

Julian Chen has over ten years of IT project implementation experience and excels at resources and risk control. Chen loves to share network and information security knowledge and innovative technology tips by writing blogs. Chen also teaches information security both online and offline.

責任編輯:龐桂玉 來源: 51CTO
相關推薦

2022-05-13 14:36:12

網絡犯罪網絡攻擊密碼

2009-12-04 15:43:50

Microsoft?

2019-06-11 18:06:32

智能

2022-03-23 13:57:24

勒索組織黑客

2023-02-07 09:24:28

2022-12-21 13:02:43

2022-06-15 18:42:16

戴爾

2025-07-11 00:51:55

2022-03-25 13:45:37

黑客網絡攻擊數(shù)據(jù)泄露

2022-03-23 19:13:47

數(shù)據(jù)泄露勒索組織

2022-03-23 08:01:36

CSSGrid小游戲

2022-04-24 10:02:30

Lapsus$黑客組織T-Mobile

2021-08-23 16:47:34

戴爾

2022-03-22 13:44:54

網絡安全微軟黑客

2021-07-20 09:05:36

Zoom收購Five9

2021-12-16 15:24:47

戴爾

2009-06-12 11:06:35

EJB技術

2021-09-23 18:42:28

SAS數(shù)據(jù)分析AI

2022-07-22 15:38:40

Teams服務癱瘓服務器

2022-05-20 18:39:31

戴爾
點贊
收藏

51CTO技術棧公眾號

国产午夜亚洲精品理论片色戒| 国产精品45p| 国产精品全国免费观看高清 | 国产亚洲激情视频在线| 182午夜在线观看| 日本aa在线| 妖精视频一区二区三区免费观看| 91久久奴性调教| 中文字幕の友人北条麻妃| 少妇精品高潮欲妇又嫩中文字幕| 丝袜诱惑制服诱惑色一区在线观看 | 小小影院久久| 日韩电影网在线| 日本高清免费在线视频| 久久99精品久久久久久久青青日本| 破处女黄色一级片| 国产在视频线精品视频www666| 日韩一级大片在线| 人妻丰满熟妇av无码区app| www.黄色国产| 日韩精品一卡二卡三卡四卡无卡| 欧美另类暴力丝袜| 久久精品—区二区三区舞蹈| 亚洲1区在线| 欧美性受xxxx黑人xyx| 日本国产在线播放| 在线免费av导航| 欧美精彩视频一区二区三区| 国产欧美丝袜| 国产三级第一页| 日本成人超碰在线观看| 在线播放亚洲激情| 国产精品扒开腿做爽爽爽a片唱戏| 精品三级在线| 欧日韩精品视频| 国产成人亚洲精品无码h在线| 性欧美ⅴideo另类hd| 国产精品乱人伦| 欧美一级二级三级九九九| 人妻91麻豆一区二区三区| 国内精品久久久久影院薰衣草| 国产精品aaaa| 欧美日韩综合一区二区三区| 亚洲精品社区| 91国内在线视频| 亚洲最大成人网站| 欧美亚洲国产日韩| 亚洲第一天堂无码专区| 亚洲av综合色区无码另类小说| 色8久久久久| 欧美日韩一区二区三区在线看 | 992在线观看| 欧美日韩在线二区| 国产一区二区精品丝袜| 99re视频在线播放| 欧美激情精品久久久久久小说| 特级毛片在线| 亚洲一区免费在线观看| 日本xxxxx18| 午夜av在线播放| 一区二区三区在线视频观看| 中文字幕日韩精品无码内射| 青草在线视频| 亚洲图片自拍偷拍| 国精产品一区一区三区视频| av女在线播放| 日韩欧中文字幕| 男女爽爽爽视频| 免费在线成人激情电影| 亚洲丝袜美腿综合| 欧美一级免费在线观看| wwwav在线| 亚洲高清免费视频| a√天堂在线观看| 在线激情小视频| 国产白丝精品91爽爽久久| 91在线观看网站| 一级黄色av片| 红桃视频欧美| 久久久久久网址| 亚洲国产成人精品激情在线| 欧美专区一区二区三区| 久久久av亚洲男天堂| 中国一级片在线观看| 久久中文资源| 欧美日韩高清在线| 91视频福利网| 成人全视频免费观看在线看| 欧美精选在线播放| 操人视频免费看| 久久国产精品免费精品3p| 亚洲成人亚洲激情| 亚洲区自拍偷拍| 亚洲天堂免费| 国产91av在线| 国产精品国产三级国产aⅴ| 丁香啪啪综合成人亚洲小说| 美女主播视频一区| 一区二区三区人妻| 日本韩国免费观看| 国产夜色精品一区二区av| 波多野结衣激情| 久热在线观看视频| 6080国产精品一区二区| www.国产区| gogo大尺度成人免费视频| 亚洲成人av中文字幕| 久久精品视频18| 激情久久久久久久| 国产精品一区专区欧美日韩| 亚洲国产av一区二区| 国产嫩草影院久久久久| 国内少妇毛片视频| 福利一区二区免费视频| 亚洲福利视频网| 极品魔鬼身材女神啪啪精品| 国产日韩欧美在线播放不卡| 欧美极品xxxx| 在线免费观看日韩视频| 99久久综合狠狠综合久久| 中文字幕黄色大片| 欧美aa视频| 亚洲成人精品视频| 午夜69成人做爰视频| 巨乳诱惑日韩免费av| 国产91视觉| mm1313亚洲国产精品美女| 欧洲视频一区二区| 丰满少妇一区二区| 亚洲美女少妇无套啪啪呻吟| 91久久在线视频| aaa在线观看| 色综合一个色综合| 日韩欧美色视频| 99国产精品免费视频观看| 国产精品18久久久久久首页狼| 亚洲成人777777| 亚洲黄色性网站| 午夜大片在线观看| 欧美3p视频| 久久精品最新地址| 久久久黄色大片| 91免费看`日韩一区二区| 久久亚洲国产成人精品无码区| 欧美午夜网站| 国产精品婷婷午夜在线观看| 亚洲欧美日韩第一区| 青青草成人免费| 国产美女一区二区三区| 国产福利片一区二区| 久久女人天堂| 色综合伊人色综合网站| 亚洲精品国产精品国自产网站按摩| 久久尤物电影视频在线观看| 免费毛片小视频| 天天躁日日躁狠狠躁欧美| 97avcom| 人妻精品一区一区三区蜜桃91| 亚洲综合自拍偷拍| 国产主播在线看| 加勒比中文字幕精品| 久久久视频精品| 天堂网av2014| 欧美日韩中文字幕综合视频| 中文字幕第20页| 免费在线视频一区| 一区二区在线中文字幕电影视频| 91成人app| 欧美大荫蒂xxx| 国产精品国产精品国产| 国产精品乱码久久久久久| 看看黄色一级片| 欧美精品国产一区二区| 国产精品久久一区二区三区| 日本黄色免费在线| 中文字幕欧美国内| 国产肥老妇视频| 欧美日韩国产中字| 香蕉网在线视频| 狠狠入ady亚洲精品经典电影| 久久久久综合一区二区三区| 成人免费黄色| 欧美精品九九久久| 美女毛片在线看| 欧美精品在线观看播放| 精品无码m3u8在线观看| 久久欧美一区二区| 中文av字幕在线观看| 亚洲精品极品| 一本色道婷婷久久欧美| 豆花视频一区二区| 国产不卡av在线免费观看| a黄色片在线观看| 国产丝袜一区视频在线观看 | 欧美在线精品一区| 欧美手机在线视频| 少妇大叫太大太粗太爽了a片小说| 国产在线播放精品| 国产日韩av高清| 超碰成人av| 久久久国产视频| 青青青手机在线视频观看| 欧美欧美欧美欧美| 日韩免费不卡视频| 亚洲欧美国产77777| 天堂久久精品忘忧草| 成人一区二区三区中文字幕| www.久久久精品| 国产欧美日韩亚洲一区二区三区| 一区一区视频| 最新国产一区| 岛国视频一区免费观看| 久久av影院| 日本久久亚洲电影| 国产理论电影在线| 久久亚洲精品小早川怜子66| 一级黄色av片| 亚洲高清免费观看 | 精品国产欧美日韩| 国产伦精品一区二区三区免费视频| 免费在线成人激情电影| 欧美一区深夜视频| 国产白丝在线观看| 久久精品国产99国产精品澳门| 黄色av网站在线看| 日韩经典中文字幕| 亚洲国产精品久久久久爰性色 | 午夜精品一二三区| 欧美精品一二三四| 波多野结衣电影在线播放| 五月天亚洲精品| 欧美日韩中文视频| 成人毛片老司机大片| 在线不卡一区二区三区| 久久久久国产精品午夜一区| 成人免费观看cn| 亚洲最大网站| 亚洲高清免费观看| 成人免费精品动漫网站| 国产精品久久久久一区二区三区| 少妇久久久久久久久久| 久久综合久久久久88| 性欧美丰满熟妇xxxx性久久久| 成人黄色av网站在线| 黄色在线免费播放| 成人精品国产一区二区4080| 涩视频在线观看| 亚洲国产激情| 97超碰国产精品| 欧美午夜一区二区福利视频| 男女啪啪免费观看| 欧美一区二区三区另类| 五月天在线免费视频| 亚洲欧美日韩高清在线| 美乳视频一区二区| 九九亚洲视频| 色噜噜狠狠色综合网| 成人三级视频| 在线成人性视频| 欧美激情日韩| 青青青在线视频播放| 一本久道久久综合婷婷鲸鱼| 日本精品免费在线观看| 久久成人一区| 美女网站色免费| 国产一区在线精品| 久草免费资源站| 91在线播放网址| 亚洲精品视频久久久| 国产欧美精品一区二区三区四区| 亚洲第一综合网| 中文字幕一区二区在线观看| 校园春色 亚洲| 欧美日韩国产一区在线| 天天操天天干天天摸| 欧美精品色一区二区三区| 精品人妻一区二区三区四区不卡 | 亚洲午夜久久久久久久久| 99r国产精品| 国产精品av久久久久久无| 亚洲欧洲韩国日本视频| 久久久久久国产精品视频| 高跟丝袜欧美一区| 一级黄色免费片| 亚洲а∨天堂久久精品喷水| 激情综合闲人网| 久99九色视频在线观看| 巨茎人妖videos另类| 成人av番号网| 日韩aaa久久蜜桃av| 伊人久久av导航| 国产亚洲亚洲| 永久免费黄色片| 久久综合色婷婷| 日韩精品一区国产麻豆| 日本熟妇一区二区三区| 欧美一级片免费看| 六十路在线观看| 色综合久久中文字幕综合网小说| a日韩av网址| 成人欧美一区二区三区视频| 成人一区二区| 男女视频网站在线观看| 麻豆国产精品官网| 丰满大乳奶做爰ⅹxx视频| 亚洲欧洲美洲综合色网| 欧美精品一二三四区| 日韩视频一区二区三区| 国产黄在线看| 午夜精品久久久久久久白皮肤| 日本在线视频站| 中文在线不卡视频| av有码在线观看| 亚洲曰本av电影| 欧美精品一区二区久久| 黄网站欧美内射| 国产乱码精品一区二区三| 国产人妻大战黑人20p| 亚洲成av人片一区二区| 国产激情无套内精对白视频| 揄拍成人国产精品视频| 性爽视频在线| 国产精品日本一区二区| 香蕉久久网站| 自拍偷拍一区二区三区四区| 91首页免费视频| 国产真实夫妇交换视频| 日韩一级片网站| 精产国品自在线www| 国产精品亚洲美女av网站| 中国av一区| av天堂永久资源网| 不卡视频一二三| av资源吧首页| 亚洲精品一线二线三线| 欧美1234区| 国产精品国产三级欧美二区| 欧美jizzhd精品欧美巨大免费| theporn国产精品| 成人欧美一区二区三区小说| 中文字幕人妻丝袜乱一区三区| 在线日韩日本国产亚洲| 日韩欧美一区二区三区在线观看| 蜜桃久久精品乱码一区二区 | 182午夜在线观看| 中文字幕免费一区| 欧美激情一区二区三区免费观看| 亚洲欧洲一区二区三区久久| 国产精品秘入口| 国产成人精品最新| 色综合综合网| 超碰在线97免费| 国产精品久久三区| 国产又大又黄又爽| 九九久久久久99精品| jizz18欧美18| 奇米精品一区二区三区| 91免费观看视频在线| 91精品在线一区| 日韩欧美网址| 三级黄色片免费观看| 亚洲美女偷拍久久| 高清毛片aaaaaaaaa片| 97视频在线看| 国产传媒欧美日韩成人精品大片| 婷婷激情四射五月天| 中文字幕一区三区| 亚洲精品视频专区| 26uuu亚洲伊人春色| 国产一区二区精品久| 欧美一级xxxx| 亚洲第一主播视频| 国产区在线视频| 91精品久久久久久久久久另类| 欧美a级片一区| 精品人妻互换一区二区三区| 欧美网站一区二区| 超碰在线caoporn| 精品不卡在线| 日韩va欧美va亚洲va久久| 婷婷社区五月天| 欧美性猛交xxxx乱大交3| 国产黄在线观看| 91青青草免费在线看| 日韩一级大片| 国产aaaaaaaaa| 精品国产乱子伦一区| 成人做爰视频www网站小优视频| 亚洲精品国产精品久久| 欧美中文日韩| www欧美com| 亚洲免费电影一区| japansex久久高清精品| 波多野结衣家庭教师在线| 中文字幕在线视频一区| 污视频网站免费观看| 国产免费一区二区三区在线能观看| 国产精品成人一区二区网站软件| 国产夫妻性爱视频| 91精品国产综合久久久久久久久久|