In order to improve the security posture of your network, you first need to know what is vulnerable. The dynamic nature of most environments requires persistent monitoring to defend against the evolving threat landscape.
Constant changes to networks, systems and applications can leave you susceptible to an attack, even if you are keeping your security controls up to date. CyberDefense provides integrated vulnerability scanning, assessment, and reporting that includes:
Establish, implement, and actively manage (track, report on, correct) the security configuration of laptops, servers, and workstations using a rigorous configuration management and change control process to prevent attackers from exploiting vulnerable services and settings.
Not all operating systems, applications or devices come from the manufacturer with robust security enabled. often, they are configured for easy (or easily repeatable) deployment, with the expectation that you will upgrade their access and operational security following their initial introduction to your environment. Unfortunately, attackers prey on those who fail to follow this practice and neglect to secure their networks (i.e. by leaving passwords at the default value). CyberDefense helps with the following functionality:
The processes and tools used to track/control/prevent/correct the use, assignment, and configuration of administrative privileges on computers, networks, and applications.
A common mistake of new system administrators and security engineers is the widespread use of administrative privileges. This can be due to apathy or negligence when administrator accounts are shared among teams or admin level access is granted without scrutiny. Also included is the scenario where an administrator is using their admin credentials to perform non-admin tasks such as browsing the Internet or reading email. This is easily combatted by instituting a proper "need-to-know" policy when building or reorganizing your IT infrastructure.
However, for auditing this behavior, CyberDefense will identify when certain logins are used and can alert you to this behavior. Correlation rules could even be written to alert you when a specific login is used on a certain system and, combined with policy actions and custom scripting, take an automatic action to disable that account.