Rookie

漫游指南-1 的世界

流浪在大理的斜杠青年

Party A Information Security Work Outline

Daily Work#

  • Internet Information Leakage
  • Web/App/Intranet Penetration Testing
  • Application Launch/Version Iteration Update Security Testing
  • Vulnerability Security Early Warning/Establish Knowledge Base
  • Security Emergency/Vulnerability Scanning System/IPS/Database Audit

Security Management#

  • 1)27001: Focus on Security Management
  • 2)SDL: Focus on Secure Development
  • 3)ITIL: Focus on Security Operations
  • Security Policies/Standards
  • Security Processes
  • Security Inspections
  • Security Internal Control
  • Security Audits
  • Security Monthly Reports
  • Security Training

Offensive and Defensive Security#

  • 1 Application Security
    • WEB Security
    • APP Security
    • Intranet Host Security
    • Software Development Security
    • Third-party Outsourced Product Security
  • 2 Architecture Security
    • Intranet Monitoring
    • Network Security
    • System Security
    • Multi-level Protection/ISO27001 Construction
  • 3 Security Protection
    • WAF
    • Security Operations Center (SOC)
    • Network Intrusion Detection System (NIDS)
    • Host Intrusion Detection System (HIDS)
    • Honeypots/github/scanners/self-developed security tools
  • 4 Security Emergency Response Center
    • Public Channel Construction
    • Platform Vulnerability Collection
    • Vulnerability Cause Analysis
    • Regular Emergency Response Drills
    • Secure Coding/Offensive and Defensive Technology Research

Implementation Plan#

Three Things#

  • Security Baseline: Ensure that newly launched systems are secure
  • Intrusion Detection: IDS, Agent
  • Emergency Response: Processes
    • Incident Cause Analysis
    • Incident Forensics Investigation
    • System Backdoor Detection, Vulnerability Analysis
    • Data Collection, Analysis

Three Tables#

  • Internal Organizational Structure of the Company
  • Mapping of Online Products and Delivery Teams (Responsible Persons)
  • Overall Network Topology, System Logical Architecture, Physical Deployment, Inter-system Call Relationships, etc.
Loading...
Ownership of this post data is guaranteed by blockchain and smart contracts to the creator alone.