Securing Infrastructure

1
Securing Infrastructure By design Code auditing Safe languages Shared libraries Secure functionality Risk analysis Cryptography By isolating Compliant architecture Filtering Authorisation Authentication By reacting Antivirus IDS/IPS Patching Hardening Anti exploitation Monitoring By controlling Audits Penetration testing Vulnerability scanning Awareness Compliance enforcement Lifecycle management

Transcript of Securing Infrastructure

Page 1: Securing Infrastructure

Securing Infrastructure

By design

Code auditing

Safe languages

Shared libraries

Secure functionality

Risk analysisCryptography

By isolatingCompliant architecture

FilteringAuthorisation

Authentication

By reacting

Antivirus

IDS/IPS

Patching

Hardening

Anti exploitation

Monitoring

By controllingAudits

Penetration testing

Vulnerability scanning

Awareness

Complianceenforcement

Lifecycle management