Table of contents exchange of letters with the minister executive summary



Download 5.91 Mb.
View original pdf
Page263/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   259   260   261   262   263   264   265   266   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019

COI Report – Part VII
Page 326 of 425

What is important is to respond without wasting anytime and respond with full force, all hands on the deck, where everybody is focused on figuring out what's going on, understanding what the attackers will do next if they had this level of access, understanding what sort of steps can betaken to prevent them from spreading further, contain them within a certain environment, and then figure out the remediation steps which requires a response with full force.
947. Technology. The ASOC must be equipped with the right tools to do its job. This includes a suite of technology that provide the right level of visibility over the organisation’s operations, commensurate with its security posture. The suite of technologies may need to be updated periodically, as cyber attack vectors evolve. Some examples include a) Security information and event management (“SIEM”) solutions b)
Intrustion Detection System (“IDS”)/Intrusion Prevention System
(“IPS”) solutions c) Threat and vulnerability management tools d) Filtering technologies e) Data loss prevention tools f)
Traffic/packet inspection solutions g) Data analytics platforms h) Reporting technologies and i) Forensic tools.



COI Report – Part VII
Page 327 of 425

948. The SIEM solution chosen is particularly important, as ASOCs are most often organised around the SIEM, which aggregates and correlates data from the various tools employed by the ASOC onto a single platform, which then provides a comprehensive overview to security staff at a single glance.
949. People. An ASOC requires the right manpower to function well. The staff of the ASOC should be a mix of experienced security professionals and IT staff. The IT staff provide a solid understanding of the organisation’s IT infrastructure, and are usually trained in computer engineering, network engineering, or computer science and may have credentials such as CISSP
87
or GIAC.
88
The security personnel can help to bring fresh perspectives based on their experience. Working together, the ASOC staff should be able to analyse large quantities of data and intuitively recognise the need for further investigation when it arises.
950. Processes. The ASOC needs to have well-defined processes that facilitate consistent operations and repeatable outcomes. The ASOC needs to be stable and functional at all times, as it is the heart of an organisation’s security architecture. At the same time, the processes must be wide and flexible enough to accommodate possible incident scenarios and provide detailed guidance for response. Examples of incidents include a) Phishing b) Malware infections c) Bring your own device-related incidents Certified Information Systems Security Professional (“CISSP”) is an independent information security certification granted by the International Information System Security Certification Consortium, also known as ISC. Global Information Assurance Certification (“GIAC”) is an information security certification entity that provides a set of vendor-neutral computer security certifications linked to the training courses provided by the SANS Institute.



Download 5.91 Mb.

Share with your friends:
1   ...   259   260   261   262   263   264   265   266   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page