An Integrated Approach to Threat Management
by Steven Drew - Thursday, 11 September 2003.
When incidents do occur, it becomes necessary for organizations to respond in near real-time to minimize the impact of the incident. To accomplish this, organizations need to have the proper combination of people, process and technology focused on the incident response efforts. Organizations must deploy technology that performs security event aggregation and correlation to facilitate the rapid identification and response efforts. Security teams must then have dedicated, properly trained staff assigned as Incident Handling experts who monitor this technology for signs of an attack. SANS' Global Information Assurance Certification offers specialized tracks on Incident Handling that can provide the appropriate knowledge. Of course, these dedicated experts must augment this training with extensive experience. Possessing a wealth of experience will enable them to recognize the attack and respond quickly to the threat.

Organizations must also develop the appropriate Incident Handling process. This process can be set up in a flow chart style. At the top of the process is receipt of correlated incidents. The next stage is categorization where incidents are classified by type of attack and target. At the bottom of the chart a threat assessment and appropriate responses are assigned to the alert. The goal of this process is to have a repeatable, disciplined set of actions that will reduce exposure time and provide an audit trail to measure effectiveness.

The final component of an integrated Threat Management program is the analysis. Organizations must conduct data mining to determine the effectiveness of the program, areas of weakness and the overall threat level facing the organization. Security teams should be able to achieve this by performing ad-hoc correlation and generating reports. Proper analysis can only be performed if the organization deploys the aggregation and correlation technology discussed above. This will provide them with a centralized database for all vulnerabilities, incidents and their associated actions. Analysis is one of the most important components of an integrated Threat Management program. Thorough analysis will provide the feedback necessary for improving this lifecycle over time.

An integrated Threat Management program will enable a true, enterprise-wide intrusion prevention and protection lifecycle. By implementing this program, an organization will fortify their environment, reduce their exposure to threats and attain the security intelligence they need to continuously improve their security. The end result of the integrated Threat Management program is more efficient security management, greater return on security investments and the ability to demonstrate provable security to management and auditors.



Steven Drew is Chief Operating Officer of LURHQ. LURHQ Corporation is the trusted provider of Managed Security Services. Founded in 1996, LURHQ protects the critical information assets of more than 400 customers by offering integrated Threat Management services. LURHQ's 24X7 Threat Management capabilities enable customers to enhance their security posture while reducing the costs of managing their security environments. LURHQs OPEN Service Delivery methodology facilitates a true partnership with customers by providing a real time enterprise security and service delivery vision via the Sherlock Enterprise Security Portal. For more information visit http://www.lurhq.com.

Spotlight

Hackers indicted for stealing Apache helicopter training software

Posted on 1 October 2014.  |  Members of a computer hacking ring have been charged with breaking into computer networks of prominent technology companies and the US Army and stealing more than $100 million in intellectual property and other proprietary data.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Oct 1st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //