SlideShare a Scribd company logo
Essential
Digital
Security
Processes10
Computer insecurity is
inevitable, and technology
alone cannot save us.
We also need to implement
and follow secure processes.
Here are 10 essential
processes every organization
should follow.
Compartmentalize
Compartmentalize
Follow the principle
of least privilege:
only give people
the privileges (e.g.
server access) they
need to do their job.
Secure the weakest link
Secure the weakest link
Look at the entire
vulnerability landscape
and create an attack tree:
find the weakest link and secure it.
Then worry about the next
weakest link and so on.
Use choke points
Use choke points
A choke point forces users into a
narrow channel, one that you can
more easily monitor
and control. Firewalls
and login screens are
some examples.
Provide defense in depth
Provide defense in depth
This is about creating
layers of security,
such as a firewall
combined with an
intrusion detection
system and strong cryptography.
Fail securely
Fail securely
Systems should fail in such
a way as to be more secure,
not less. (For example, if
an ATM’s PIN verification system
fails, it should fail in such a way
as to not spit money out the slot).
Leverageunpredictability
Leverageunpredictability
There’s no reason to
broadcast your network
topology to everyone
that asks. If networks are
unpredictable, attackers won’t be
able to wander around so freely.
Embrace simplicity
Embrace simplicity
A system is only
as secure as the
weakest link,
so a system with
fewer links is
easier to secure.
Enlist the users
Enlist the users
Security measures that aren’t
understood and agreed to by
everyone don’t work.
Enlist their support
as much and as often
as possible.
Assure
Assure
What we really need
is assurance that our
systems work properly.
This involves a structured design
process, detailed documentation,
and extensive testing.
Question
Question
Constantly question security.
Question your assumptions and
decisions. Question your
trust and threat models.
Keep looking at your attack trees.
Trust no one, especially yourself.
Find out how to build
secure systems in
by Bruce Schneier
Secrets & Lies
Digital Security in a Networked World

More Related Content

PDF
TRAPMINE Next-Generation Endpoint Security
DOCX
Blue solutions symantec
TXT
PDF
Worms 2.0: Evolution — From SyFy to "You Die"
PDF
Cybersecurity during real WAR [English version]
DOCX
Work from home under the lockdown
PPS
Go Its 25 15
PDF
Simple and-smart-security-tips-for-website -design-orange949
TRAPMINE Next-Generation Endpoint Security
Blue solutions symantec
Worms 2.0: Evolution — From SyFy to "You Die"
Cybersecurity during real WAR [English version]
Work from home under the lockdown
Go Its 25 15
Simple and-smart-security-tips-for-website -design-orange949

Viewers also liked (7)

PPT
Ethical Hacking
PPTX
Digital security presentation
PPT
Digital Security Slide Show
PPTX
Digital security
PDF
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
PPTX
Cybercrime.ppt
PPTX
Cyber crime and security ppt
Ethical Hacking
Digital security presentation
Digital Security Slide Show
Digital security
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
Cybercrime.ppt
Cyber crime and security ppt
Ad

Similar to 10 Essential Digital Security Processes (20)

PPTX
Network and system administration Chapter 5.pptx
DOCX
Chapter 5Overview of SecurityTechnologiesWe can’t h
ODP
Cyber Security for Financial Institutions
PPT
Lecture 1
PDF
Monitoring your organization against threats - Critical System Control
PPTX
Top 25 SOC Analyst interview questions that You Should Know.pptx
PDF
Top 25 SOC Analyst interview questions.pdf
PPTX
Enterprise Security Monitoring, And Log Management.
PPTX
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
PPTX
Security Operation Center Fundamental
PPTX
Chapter 12 - Securing a Network CompTIA Network+
PDF
Shields up - improving web application security
PDF
Banking and Modern Payments System Security Analysis
PPTX
Prevent Getting Hacked by Using a Network Vulnerability Scanner
PDF
A Brief Note On Companies And The Largest Ever Consumer...
PDF
SMB Network Security Checklist
PDF
Vulnerability Analyst interview Questions.pdf
PDF
Kudler Fine Foods IT Security Report And Presentation –...
PDF
The Top Five Security Threats to Hyperledger Fabric & How to Mitigate Them
PDF
The Top 20 Cyberattacks on Industrial Control Systems
Network and system administration Chapter 5.pptx
Chapter 5Overview of SecurityTechnologiesWe can’t h
Cyber Security for Financial Institutions
Lecture 1
Monitoring your organization against threats - Critical System Control
Top 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions.pdf
Enterprise Security Monitoring, And Log Management.
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Security Operation Center Fundamental
Chapter 12 - Securing a Network CompTIA Network+
Shields up - improving web application security
Banking and Modern Payments System Security Analysis
Prevent Getting Hacked by Using a Network Vulnerability Scanner
A Brief Note On Companies And The Largest Ever Consumer...
SMB Network Security Checklist
Vulnerability Analyst interview Questions.pdf
Kudler Fine Foods IT Security Report And Presentation –...
The Top Five Security Threats to Hyperledger Fabric & How to Mitigate Them
The Top 20 Cyberattacks on Industrial Control Systems
Ad

More from Wiley (20)

PPTX
Publisher as Strategic Partner for Societies October 2019
PDF
19 Inspiring Books by Jon Gordon
PDF
3 Big Myths That Hold Women Back
PDF
The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...
PDF
The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...
PDF
A Celebration of Women's History Month
PDF
Leadership Is for Everyone
PDF
The Five Leadership Practices that Improve Sales Success
PPTX
7 Steps to Develop Well-Designed Course Objectives
PPTX
Today's Students: 7 Powerful Facts
PDF
Should you get an MBA?
PDF
Valuing International Collaboration in Research
PDF
Leadership Makes a Difference
PDF
5 Reasons to Earn Your CPA License WEL
PDF
From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...
PDF
An Educator's Guide to Cheating
PDF
Mine the Gap: Using Handouts With Gaps
PDF
Get Your Students Motivated: Tips for the Classroom
PDF
Level I CFA Exam 2017 Curriculum Updates
PDF
6 Steps to Hire Someone with Soft Skills
Publisher as Strategic Partner for Societies October 2019
19 Inspiring Books by Jon Gordon
3 Big Myths That Hold Women Back
The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...
The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...
A Celebration of Women's History Month
Leadership Is for Everyone
The Five Leadership Practices that Improve Sales Success
7 Steps to Develop Well-Designed Course Objectives
Today's Students: 7 Powerful Facts
Should you get an MBA?
Valuing International Collaboration in Research
Leadership Makes a Difference
5 Reasons to Earn Your CPA License WEL
From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...
An Educator's Guide to Cheating
Mine the Gap: Using Handouts With Gaps
Get Your Students Motivated: Tips for the Classroom
Level I CFA Exam 2017 Curriculum Updates
6 Steps to Hire Someone with Soft Skills

Recently uploaded (20)

PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPT
Teaching material agriculture food technology
PDF
Machine learning based COVID-19 study performance prediction
PDF
Empathic Computing: Creating Shared Understanding
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Electronic commerce courselecture one. Pdf
PDF
Getting Started with Data Integration: FME Form 101
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Encapsulation theory and applications.pdf
Programs and apps: productivity, graphics, security and other tools
Encapsulation_ Review paper, used for researhc scholars
Per capita expenditure prediction using model stacking based on satellite ima...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Approach and Philosophy of On baking technology
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Reach Out and Touch Someone: Haptics and Empathic Computing
Teaching material agriculture food technology
Machine learning based COVID-19 study performance prediction
Empathic Computing: Creating Shared Understanding
The Rise and Fall of 3GPP – Time for a Sabbatical?
Electronic commerce courselecture one. Pdf
Getting Started with Data Integration: FME Form 101
Spectral efficient network and resource selection model in 5G networks
SOPHOS-XG Firewall Administrator PPT.pptx
Accuracy of neural networks in brain wave diagnosis of schizophrenia
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
cuic standard and advanced reporting.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Encapsulation theory and applications.pdf

10 Essential Digital Security Processes