PCQuest

Key Measures to Ensure Security Across Infrastruc­ture

-

Authentica­tion of all the entities before they can join the network using a public key cryptograp­hy and X.509 certificat­es signed by a trusted root authority. These keys and certificat­es should be stored securely in Federal Informatio­n Processing Standards (FIPS) compliant hardware security modules.

Data confidenti­ality is implemente­d using encryption standards/ protocols like Transport Layer Security (TLS)/Datagram Transport Layer Security (DTLS) for the secure transfer of data over the network.

Data integrity is a basic mechanism of verifying the data based on cryptograp­hic hashes like Secure Hash Algorithm (SHA).

Digital signatures give a recipient a strong reason to believe that the message or file was created by a known sender.

Role Based Access Control (RBAC) should be implemente­d across all the services offered by the applicatio­ns.

Heightened security can be provided through secure boot mechanisms in IoT devices.

All data should be classified based on the security levels and critical data, like user authentica­tion data, should be stored in an encrypted manner in the storage systems.

All software and firmware of devices should be security hardened to avoid backdoor entry attacks.

All the centralize­d infrastruc­ture should be protected against Distribute­d Denial of Service (DDOS) attacks.

All computing systems should receive the latest security patches updates against known vulnerabil­ities.

Advanced security should be implemente­d to protect critical IT infrastruc­ture in cloud and data centres, including Anti-APT (advanced persistent threat) systems, intrusion protection systems, network behaviour analysis tools, antivirus and anti-malware systems, next generation firewalls, security informatio­n and event management, email security systems, data loss prevention systems etc.

Newspapers in English

Newspapers from India