📜 ⬆️ ⬇️

Information Security Recommendations for Small and Medium Business (SMB)

Hi, Habr! I present to your attention the translation and adaptation of the article " CIS-Controls Implementation Guide for Small- and Medium-Sized Enterprises (SMEs) ".

image

Introduction


Credit card information leaks, personal data theft, extortion programs (for example, WannaCry), intellectual property theft, breach of confidentiality, denial of service - these information security incidents have become common news. Among the victims come across the largest, most wealthy and most protected enterprises: government agencies, large retail chains, financial structures, even manufacturers of information security solutions.

Such companies have multimillion budgets allocated to information security, and yet they do not cope with the usual attacks. Many such attacks could be prevented by known methods of protecting information, such as regular updates and the practice of using secure configurations.
')
What, then, to everyone else? How can organizations with a small budget and limited staff respond to the increasing number of cyber crimes? This document is designed to provide SMB owners with tools to protect their business, based on CIS Controls. CIS Controls is a comprehensive set of well-proven information security techniques that counteract the most common threats and vulnerabilities. These methods of information security developed by experts in the subject area.

Among the threats to SMB are:

Theft of confidential information is a type of attack in which external violators or dissatisfied employees steal information that is important to the company.

Site deface is a type of attack in which the page of a web site is replaced with another page, most often containing advertisements, threats or causing warnings.

Phishing is a type of attack in which an attacker obtains important information (for example, usernames, passwords, or credit card data) by forging messages from a trusted source (for example, an e-mail created as legitimate, fraudulently causes the recipient to click the link in the e-mail software on computer).

An extortioner is a type of malicious software that blocks access to data on a computer, as a result of which criminals extort a ransom for unlocking locked data.

Data loss due to natural phenomena or accidents.

The document contains a small set of CIS Controls information security measures specifically selected to protect SMB. Since information security tools are constantly changing, you can contact us on the site and get the latest information.

Overview


Security is closely related to IT infrastructure management: a well-managed network is harder to crack than a poorly managed one. To understand how well your organization is protecting information, ask yourself the following questions:


Listed below are various free or low-cost tools, as well as procedures that will help you answer the questions listed and increase the security level in your organization The listed tools are not exhaustive, but they reflect a wide range of available free or low-cost tools that any SMB can use to increase its level of information security.
These Recommendations suggest using a phased approach to building an information security system:


At each stage, you will be presented with questions that need to be answered, as well as actions and tools that will help you achieve your goals.

Stage 1. Know your infrastructure


image

At the very beginning, in order to advance in the issue of information security, you need to deal with the local network, connected devices, critical data and software. Without a clear understanding of what you need to protect, it will be difficult to make sure that you provide an acceptable level of information security.

Key questions to keep in mind:


What information needs to be protected. Where the most important information is stored in your network


You may lose your business if your company's critical data is lost, stolen or damaged. Accidental events and natural disasters also have the potential to cause irreparable damage. In addition, potential intruders target data that may have value to them. These attackers can be hackers as well as employees of your company who want to steal your customers, financial information or intellectual property. To use valuable information, they must access it, and access, as a rule, they receive through the organization's local network.

To protect your business, you need to understand the value of your data and how you can use it. It is also necessary to determine what information is required to be protected within the framework of the legislation, for example, payment information or personal data. The following are examples of data that you need to identify and inventory:


It also presents the main federal laws that define the requirements for the protection of information (which may apply to the SMB) [from the translator: the documents are inserted taking into account the Russian legislation] :


What devices are connected to your network


If you know which devices are connected to your network, then your infrastructure becomes easier to manage, and you understand which devices you need to protect. The following are steps you can do to find out about devices on your network.

Actions:



Instruments:


What software is installed on employees' computers


Monitoring installed software is a key component of both good IT management and effective information protection. Malicious software on your network can create risks that need to be minimized, but you can also include legal liability for using unlicensed software. Non-updated software is a common cause of malware intrusion, which leads to attacks on your information systems. If you understand what software is installed on your network, control the installed software, and protect administrator accounts, you reduce the likelihood and impact of information security incidents.

Actions:



Instruments:



Stage 2. Protect your assets


image

Employees are your most important asset, and this expression is true not only in business, but also in information security. Protecting your information requires not only technological solutions, but also employee awareness of preventing accidental disruption of your systems. As part of this phase, not only the protection of your computers will be described, but also the training of your employees in important aspects of information security.

A few questions you need to answer:


Configure basic information security requirements


In order to gain access to your information system, malicious programs and attackers most often use either insecurely configured applications or vulnerability applications. You need to make sure that your operating system and applications (especially web browsers) are updated and properly configured. In addition, it is recommended to use anti-malware protection mechanisms that can be embedded in your operating system. For example, Windows Device Guard, Windows Bitlocker and others mentioned below.

Actions:



Instruments:



Development of processes on information security


Information security is a story not only about technology, but also about processes and people. It is not enough to have information security tools only. To ensure the security of your organization, your employees must also strictly comply with information security requirements. There are two key factors for teaching your employees information security issues: to convey information to them, to constantly maintain their level of knowledge.

Information to be communicated to employees:



Knowledge support:



Instruments:



Stage 3: Prepare your organization


image

After your organization has developed a solid foundation for information security, you need to build incident response mechanisms. This approach includes an understanding of how to cope with an information security incident and how to restore the company's work after it.

Key issues:


Backup Management


Creating and managing backups can be a routine and not a very interesting task, however, this is one of the best ways to protect your data, recover from a crash, and get your business back to normal. This is important because ransomware programs can encrypt all of your data and block them until repurchase. A robust response plan, supplemented by current and supported backups, is the best defense when dealing with an information security incident.

Actions:



Instruments:



Preparing for the incident


Nobody wants an information security incident to happen, but the better prepared you are, the sooner you can recover from the incident. Information security incidents include a “denial of service” attack that violates access to your site, an ransomware attack that blocks your system or your data, a malware attack that results in the loss of your client’s or employee’s data, and stealing a laptop containing unencrypted data.

To be prepared, you need to know who to contact in case of an incident. You can contact your internal IT staff for help, or maybe you rely on a third-party incident management company. In any case, you should know the roles of those responsible for managing incidents before an event occurs.

Actions:



What to do if an incident occurs:


Source: https://habr.com/ru/post/348892/


All Articles