Infosec Management
Cyber Security Policy preparation and implementation
Motto of most of the hacking attempts of banking sector is financial gain. RBI, as an regulator has come up with Cyber Security Framework for Banking sector to protect the Bank’s networks and systems from intruder attacks. Cyber Security Control implementation and its assessment is a continuous process as new techniques are applied to hack into the systems. We prepare and assist the Banks to implements the controls that could help the banks in achieving the adherence to RBI’s Cyber Security Framework. The task includes the assessment of gaps, preparation of primary and secondary controls and educate the Bank’s stakeholders to understand Cyber Security Policy and framework.
- Preparation of Policy to achieve effective Perimeter Cyber Security
- Defining the procedures to achieve Cyber Security
- Defining roles and responsibilities
- Employee Awareness
- Defining the reports and frequency
- Reporting Authority
- Periodic Internal Assessment
- Corrective Actions
- Alignment of Cyber Security Policy with business goals.
- Monitoring and restriction to accesses
Implementation and audits of SIEM
With reference to the RBI’s Cyber Security Framework, Banks need to implement SIEM (Security Incident and Event Monitoring) systems as a early warning to combat probable hacking incidents. SIEM should be comprehensive covering all the data leakage points and weak links. Our competent team professionally assists the organizations to implement the SIEM systems to create fortified fence to protect the crucial and confidential organizational information.
- Identification and analysis of threats
- Selection of SIEM Tool
- Acquisition and implementation of SIEM Tool
- Configuration of SIEM Tool
- Defining and configuring alerts and warnings
- Corrective actions, time frame and responsibilities
- Preparation of attack repository and action taken
- Incident reporting
- Deriving the cost of loss due to incidents and arrangements to recover it.
- Valuation of assets and insurance for the same.
System and Network Hardening
The components and OS are identified to be prone to attacks as the bugs identified usually are not fixed. We help the organizations to identify the vulnerabilities arising out of the bugs that could be exploited and misused for malicious purpose. Our team proposes the solutions to strengthen the systems and networks through patch management.
- Preparation of policies and procedures
- Vulnerability scan
- Compliance against the findings observed
- Continual Patch Management Policy and procedure
- Patch testing and deployment responsibility
- Change request management policy and procedure
- Authorization of change and patch deployment
- Redundancy for devices/services/human resources
Assessment of redundant arrangement
Application Code Review
Professionals in the team of Associated IT Consultants are well versed with the review of application codes. Application code review could portrait the flaws in the application from the perspective of Confidentiality, Integrity and Availability. This also helps to understand the redundant calls to loops hampering the performance of the application.
- Tool based and script-based assessment of code
- Reporting the vulnerabilities
- Compliance and re-scan
- Proof of concept
- Regulatory requirements and alignment
- Change request management policy and procedure
- Authorization of change and patch deployment
- Access restrictions to code
- Periodic review of code against reported/identified vulnerabilities by OEM
Firewall Configuration and Management
Firewalls are the gateways to the networks. Stringent the firewall configuration, secure is the network. We prepare the firewall rules and configure those rules to secure the organization delivering the business needs with restricted accesses.
- Preparation of policies and procedures
- Defining the rules for accesses
- Configuring rules for accesses
- Vulnerability scan
- Compliance against the findings observed
- Periodic Firmware update
- Roll back action plan
- Backup of configuration and secured custody
- Periodic internal assessment of configuration and vulnerabilities