Cyber Security Management Procedure

 

Our Company’s Cyber Security Management procedure addresses the following 10 cyber security principles :

1. Risk Management:

Our company employs the NIST Cybersecurity Framework to identify, assess, and prioritize cyber security risks. We use tools like Dog Watch to conduct risk assessments and implement security measures accordingly. Our framework ensures that we address the biggest threats with appropriate responsiveness.

 

2. Secure Configuration:

We utilize configuration management SOAR tools to ensure the secure configuration of our systems. Databases are secured using encryption methods such as Transparent Data Encryption (TDE). We regularly apply software updates and patches using WSUS (Windows Server Update Services) to avoid data breaches. Unnecessary functionalities are disabled using Group Policy Objects (GPO) in Windows environments, and known vulnerabilities are addressed promptly through vulnerability scanning.

 

3. Home and Mobile Working:

Our remote working security measures include using SD-WAN & VPNs (Virtual Private Networks) for secure connections. We implement Multi-Factor Authentication (MFA) with tools like Duo Security to limit access to sensitive systems. Policies are in place to protect laptops and removable devices using BitLocker for encryption and Mobile Device Management (MDM) solutions secure physical information outside the office.

 

4. Incident Management:

Our incident management procedures are supported by using SIEM (Security Information and Event Management) systems to monitor and analyze security incidents. We have systematic back-up policies using Veeam Backup & Replication to ensure quick restoration of operations after a security incident. Incident response plans are tested regularly with the help of disaster recovery software like Zerto.

 

5. Malware Prevention:

We implement anti-malware software like Endpoint Protection and Unigr8ways to protect against malware. Our policies include regular employee training on identifying phishing attempts and safe browsing practices. We also deploy endpoint detection and response (EDR) tools to provide advanced threat detection and prevention.

 

6.Managing User Access:

Access controls are managed using Identity and Access Management (IAM) solutions. Role-Based Access Control (RBAC) ensures that staff can only access information relevant to their job roles. We regularly audit access permissions using tools to maintain strict control over user access.

 

7.Monitoring:

Our systems are monitored continuously using SIEM solutions. These tools help us promptly identify incidents and initiate response efforts. We also use network traffic analysis tools like Darktrace to detect anomalies in real-time.

 

8.Network Security:

We secure our network using firewalls and intrusion prevention systems (IPS). Regular penetration testing is conducted using tools to identify and mitigate vulnerabilities. Network segmentation is enforced using VLANs and access control lists (ACLs) to reduce the likelihood of exploitation.

 

9. Removable Media Controls:

Policies are enforced using Device Control solutions to restrict and monitor the use of removable media. We ensure digital protection through encryption and physical protection by securing devices in locked cabinets when not in use.

 

10. Accountability, User Education, and Awareness:

We implement training programs using platforms to educate our staff on security practices. Regular phishing simulation tests and cyber security awareness campaigns ensure our employees are well-informed and vigilant.

By incorporating these frameworks, software, and exact systems, our documented Cyber Security Management procedure ensures a comprehensive and effective approach to protecting our company’s systems and data from cyber threats.