Category: Best Practices

  • Creating a Report for Senior Managers

    Creating a Report for Senior Managers

    Introduction

    Any employee could be called upon to write a report for senior staff. Senior managers are focused on profit and want a very brief overview of systems, people, projects under their responsibility. I recommend the report should be no more than two pages long and contain items of interest that can be shown as a percent or objects that are actionable.

    Suggested Items to Report

    For an enterprise security report, here is a list of potential or suggested items.

    • Vulnerability data
      • Discovered vulnerabilities by scanning. (critical or exploitable).
      • Total company vulnerability risk score.
      • Company risk score trends chart.
      • Company external third-party vulnerability risk score. (BitSight or UpSight Score).
    • Threat Intelligence
      • Third Party data breach disclosures.  Any venders that you use on a regular basis were hit?
      • Emerging vulnerability threats from threat intel sources.
      • Vendor external third-party vulnerability risk score. (BitSight or UpSight Score).
    • SIEM data
      • Count of events, alerts, or incidents. List types and severity.
      • Avg time to close an event.
      • Count of total number of assets.
    • Firewall Stats
      • Count of foreign country blocks.
      • Count of weekly VPN connections (are WFH employees able to make successful connections?)
      • Count of number of files that were Ftp’d to the company.
    • Email stats
      • Count of Inbound blocks from email filters. (block by sender, domain, body, subject, etc).
      • Count of Outbound mail flow stats, how many were sent, etc.
      • Count of phishing emails were reported and that were blocked, allowed or spam, clean, threat.
      • Phishing trends chart.
    • User Behavior
      • Who are the risky users (clicked on a URL link, downloaded software, etc.)
      • List any discovered passwords.
      • Vulnerable service accounts, (outdated passwords, etc).
      • PIM activations ? Sensitive group changes?
    • Future Initiatives
      • Hardening initiatives
        • How many hosts have local admin rights still?
        • Workstation / server hardening scan results. Percent of assets that meet PCI CIS Cisco DISA FDCC HIPPA standards.
        • How many Firewall rules are not being used. Have a 0-hit count.
      • BYOD devices.
        • Count of users accessing company resources using BYOD (i.e. email, teams, or SharePoint)
        • Are there BYOD assets patched, meet a minimum OS version?
  • Generic Outline for Writing a Policy or Procedure

    Generic Outline for Writing a Policy or Procedure

    Initial Thoughts

    Polices are global in nature. All company employee’s are expect to follow the guidelines. Examples of polices include: the Acceptable Use Policy (AUP), Memorandum of Understanding (MOU), or Bring Your Own Device (BYOD) to work. These a often generic guidelines that all employees must adhere to. On the other hand, procedures are typically at the department or team level. They are a step-by-step guide book. Many departments will have multiple Standard Operating Procedure (SOP) for a wide variety of topics.

    When writing either, they follow a general outline. Here is some generic language to get you started.

    General Outline

    1. Purpose – Define the purpose of the policy.

    2. Requirements – Why is this required? What standards are to be followed? PCI data security standard (PCI DSS)? What other Legal or regulatory rules apply?

    3. Definitions – Define any terms or definitions used in the document.

    4. Process & Procedure – Typically a flow chart. Also, what data is to be evaluated (input), what results are expected (output). Are any records created ? Any reports generated?

    5. Role Responsibilities – Who is to do what? Who is to use this procedure?

    7. Communication, Exceptions, & Sanctions – Who is this procedure to be communicated to? All employees? Who is exempt from following the policy? Who should they contact to get an exemption? What is the penalty if it is not followed?

    8. Document Control – Who is the owner of the document, how often is it reviewed (annually?), Revision history chart is needed.

    9. Appendix – A written copy of the PCI standards that the document references. A URL or other notes or documents.

  • Test your DNS Proxy using a PowerShell Script

    Test your DNS Proxy using a PowerShell Script

    Introduction

    Most company’s have a policy to block dangerous websites for employees. Pornography, hate, gambling, social media are all categories that should be blocked. Either, they are big time wasters, or may be required by law to be blocked.

    Although you may have your proxy turned on correctly, that does not mean the bill got paid. Usually, a proxy will default to open for all users. You may be asked by outside 3rd party auditor’s or a senior manager to provide proof that the DNS proxy is actually working and blocking non-approved content.

    The script

    This PowerShell script will run as the current logged on user and send an email with the results. It will print the email in HTML format and each URL that it tests will be color coded. Red means site was blocked, green for site was successfully accessed, and gray for error.

    You will need to provide a list of websites in text document with one URL per line. I have included one below, as an example.

    Save this file as a ‘websitelist.txt’ file.