Mitigation - 2.5
Mitigation Methods
- Decommissioning: The process of wiping files or destroying hardware to prevent secure data from being retrieved. This ensures that no sensitive information remains accessible after decommissioning systems or devices.
- Configuration (Posture) Checks: Ensures that devices meet specific security requirements before being granted access to the network. For example, devices must have an up-to-date operating system and valid security certificates.
- Encrypting Data: See Encrypting Data for more details on encryption techniques.
- File Encryption: Uses FES (File Encryption Standard) to protect individual files.
- Full Disk Encryption (FDE): Encrypts the entire disk to secure all stored data.
- Application Encryption: Encrypts data at the application level to protect it during use.
- Monitoring: The process of reviewing logs and alerting administrators of any malicious activity. This helps in detecting and responding to threats in real-time.
- Patching: Installing security updates to fix vulnerabilities and improve system defenses against potential exploits.
- Least Privilege: Implementing a principle that allows users only the minimal permissions necessary for their tasks, reducing the risk of unauthorized access.