Welcome to CYBERHYGIENE 3
Carry out or facilitate safety audits (internal, external and third-party). Apply and maintain detection and prevention measures.
Implement and manage patches and vulnerabilities. Backup storage strategies - Participate in business continuity planning and exercises.
Determine compliance and other requirements
Understand and apply risk management concepts
Risk assessment/analysis
Apply Supply Chain Risk Management (SCRM) concepts
Service level requirements
Standards Selection
Data protection methods (DRM, DLP,..)
Research, implement and manage engineering processes using secure design principles
Favoring the use of qualified products and services
Shared responsibility
Implement and manage physical security
Perimeter security controls
Control and protect access to server rooms and technical premises
Open System Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) models
Internet Protocol (IP) networking (eg,Internet Protocol Security (IPSec)
Secure protocols and how to use them
Partitioning and securing interconnections (managing the Internet)
Wireless networks (e.g. Li-Fi, Wi-Fi, Zigbee, satellite)
Ensure security of Wi-Fi access networks and separation of uses (administration, use, public)
Key performance and risk indicators
Backup verification data
Intrusion detection and prevention
Security Information and Event Management(SIEM)
Continuous monitoring, egress, log
Internal security controls
Change management
Assessing the security impact of acquired software
Assigning the right rights to sensitive information system resources