Mitigation - 2.5

Mitigation Methods

  • Decommissioning: The process of wiping files or destroying hardware to prevent secure data from being retrieved. This ensures that no sensitive information remains accessible after decommissioning systems or devices.
  • Configuration (Posture) Checks: Ensures that devices meet specific security requirements before being granted access to the network. For example, devices must have an up-to-date operating system and valid security certificates.
  • Encrypting Data: See Encrypting Data for more details on encryption techniques.
    • File Encryption: Uses FES (File Encryption Standard) to protect individual files.
    • Full Disk Encryption (FDE): Encrypts the entire disk to secure all stored data.
    • Application Encryption: Encrypts data at the application level to protect it during use.
  • Monitoring: The process of reviewing logs and alerting administrators of any malicious activity. This helps in detecting and responding to threats in real-time.
  • Patching: Installing security updates to fix vulnerabilities and improve system defenses against potential exploits.
  • Least Privilege: Implementing a principle that allows users only the minimal permissions necessary for their tasks, reducing the risk of unauthorized access.