- Jul 1, 2017
- 1,396
IAD’s Top 10 Information Assurance Mitigation Strategies
1. Application Whitelisting
2. Control & limit administrative privileges
3. Limit file-sharing
4. Use a cloud-based antivirus
5. Enable anti-exploit features
6. Use a HIPS
7. Use a Secure baseline (configure group policy)
8. Use a service that blocks domains known for malicious content.
9. Update your software
10. Segregate your network and functions.
====================================================
All the snark aside, the NSA created this top 10 for citizens and government agencies as the most basic guidelines to follow and I agree. I think if every Security configuration were modeled after this, 99.9% of malware would have no chance except for the 0.01% that uses incredible exploits, changes signatures and waits for its opportunity to strike. I think it is worth going through the list to check if your system hits all the checkmarks.
1. Application Whitelisting
2. Control & limit administrative privileges
3. Limit file-sharing
4. Use a cloud-based antivirus
5. Enable anti-exploit features
6. Use a HIPS
7. Use a Secure baseline (configure group policy)
8. Use a service that blocks domains known for malicious content.
9. Update your software
10. Segregate your network and functions.
====================================================
All the snark aside, the NSA created this top 10 for citizens and government agencies as the most basic guidelines to follow and I agree. I think if every Security configuration were modeled after this, 99.9% of malware would have no chance except for the 0.01% that uses incredible exploits, changes signatures and waits for its opportunity to strike. I think it is worth going through the list to check if your system hits all the checkmarks.