1.Managerial / Administrative Control
An information resource manager or network manager or administrator of the network – are the managers responsible for the security of the system. They are the personnel responsible to carry out the actual work and place controls as checks. Essentially, managerial or administrative controls are the functions carried out the personnel mentioned above. Some of the activities they undertake include –Configuration of Software:
- Anti-virus software is configured for right detection of malware and raising alert.
- It is also configured to put frequent checks on all incoming and outgoing email and data traffic from and to the organisation servers.
- Managers also need to take care of configuring the software to detect, delete or ignore any suspicious code in the system.
- Software should also be configured for frequent updates and upgrades.
- Managers also need to configure to run the software frequently to generate required reports for the management.
Installations and Documentation:
- Managers and administrators are the personnel to take care of updating of software like operating systems or productivity tools like Office applications or anti-virus tools etc. by actually carrying out the installations.
- Every installation is documented by the managers for its users to refer to for the reasons like – next update, user manual, maintenance process, process to raise concerns.
- Checks and Audits:
- Regular checks are carried out by the administrators to make sure that.
- Anti-virus software are not disabled.
- All required software are installed at right place and from authentic sources.
- Required system scanning frequency is followed.
- Required reports are generated for every user system and trails are maintained.
Managers also make sure that various security processes are updated, communicated with all users and training programs are conducted as per the policies. Such processes and policies are strictly followed by admin team to set the example to others.
2. Procedural Control
Procedural control is a combination of various procedures laid out for the users of the systems to follow. Such procedures act as controls to save from malware disaster. The procedures include policies that make users follow certain rules while at work. Let us have a look at some of such procedures that are the best practices to follow.Training:
With advent of new installation of a software or hardware, users need be made aware of its intricacies. An organisation is expected to have a training framework in place. Every user of a new system or installation must undergo training that makes him aware of risks arising due to infections.
Awareness of Admin Policies:
- It is a responsibility of any organisation to make the policies visible to the system users. Whether to carry any external hard drive to the office or to access private email from office system or to access a specific website – all such policies if any, should be made visible to every user.
- Every user is also made aware about the mechanism to follow in case he comes across any virus threat.
Data Storage Policies:
- This requires a special attention since losing data may be the biggest loss to the organisation. Certain policy of data storage at central place or data centre policy is essential to ensure smooth functioning of the system.
- Procedure for back-up and recovery of data is another important part of the policies that organisation comes up with. This procedure is defined based on the size of data as well as user levels.
Physical Security:
Not only the system security is important from its software perspective but its physical security is also equally important. At the same time, system users too may be checked at the entrance and exit points in case of system usage at highly confidential establishments like nuclear plants or defence organisations.
3. Technical Control
Technical controls are the processes followed to check the working of technology aspects of the network, servers, user access controls, architecture of the system, firewall etc. All such controls are defined in the policies and procedures defined by the network and information systems teams of the organisations. These are the protection measures undertaken to secure the systems from the virus attacks.Network Architecture:
- Identify and document all the connections in the network.
- Prepare and keep updated the network diagram to identify other connected networks.
- Make sure all networks are easily isolated if need be or keep the plan ready to isolate any infected network.
- Analysis is carried out in every network where there are connections to the internet or other networks.
- Identify and keep updated the users connected to the network.
Firewall:
- Create rules and keep the document updated on every rule amended at the time of installation of a firewall in the system.
- Implement rules and procedures with role assignment at the time of installation.
- Monitor and generate tracking report at right frequency.
Anti-virus Software:
- Maintain updated versions of the software procured from the right vendors.
- Document the software upgrade and maintenance schedule with the help of the vendor.
- Follow the installation procedure as recommended in the software.
- Configure the software frequently as required to make sure that scanning and infection removal happens every time.
Access Control:
- List and update the users of the system frequently.
- Update the access controls in the form of rights allotted to every user.
- Monitor and take corrective action as and when unexpected user access is identified.
- Maintain the remote access users and their inventory along with authentication checks.
- Maintain inventory for access time, time limits, privileges and access rights for all types of access – direct or remote.
- Conduct checks and audits frequently.
- Maintain checks for wire-less users of the system.
- Maintain and update password policies.
- Keep inventory of users and past users who might have left the organisation.
- Back-up and recovery plans.
- Organisations must have disaster management plan in place. Frequent back-ups are taken in hard disks and stored at secured places.
Comments
Post a Comment
thank you for visiting :)