You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Security shifts to the left and involves every stakeholder
147
177
* Architect and design review is required to do threat modeling
148
178
* Developers get secure design and secure coding training
149
179
* Operation and development teams are as a closed-loop collaboration
150
180
* Adoption of industry best practices such as OWASP SAMM and Microsoft SDL for security maturity assessment
151
181
152
-
Stage 4 – self-build security services
182
+
Stage 4
183
+
{: .label }
184
+
## self-build security services
153
185
154
186
Take Salesforce as an example—the Salesforce Developer Center portal provides security training modules, coding, implementation guidelines, tools such as assessment tools, code scanning, testing or CAPTCHA modules, and also a developer forum. Whether you are building an application on top of salesforce or not, the Salesforce Developer Center is still a good reference not only for security knowledge but also for some open source tools you may consider applying.
155
187
156
-
Stage 5 – big data security analysis and automation
188
+
Stage 5
189
+
{: .label }
190
+
## big data security analysis and automation
157
191
158
192
Key characteristics at this stage are:
159
193
@@ -170,31 +204,31 @@ Typical open source technical components in big data analysis frameworks include
170
204
171
205
The key stages in big data security analysis are explained in the table:
172
206
173
-
Data collection:
207
+
**Data collection:**
174
208
175
209
Collects logs from various kinds of sources and systems such as firewalls, web services, Linux, networking gateways, endpoints, and so on.
176
210
177
-
Data normalization:
211
+
**Data normalization:**
178
212
179
213
Sanitizes or transforms data formats into JSON, especially, for critical information such as IP, hostname, email, port, and MAC.
180
214
181
-
Data enrich/label:
215
+
**Data enrich/label:**
182
216
183
217
In terms of IP address data, it will further be associated with GeoIP and WhoIS information. Furthermore, it may also be labeled if it's a known black IP address.
184
218
185
-
Correlation:
219
+
**Correlation:**
186
220
187
221
The correlation analyzes the relationship between some key characteristics such as IP, hostname, DNS domain, file hash, email address, and threat knowledge bases.
188
222
189
-
Storage:
223
+
**Storage:**
190
224
191
225
There are different kinds of data that will be stored —the raw data from the source, the data with enriched information, the results of correlation, GeoIP mapping, and the threat knowledge base.
192
226
193
-
Alerts:
227
+
**Alerts:**
194
228
195
229
Trigger alerts if threats were identified or based on specified alerting rules.
196
230
197
-
Presentation/query:
231
+
**Presentation/query:**
198
232
199
233
Security dashboards for motoring and queries. ElasticSearch, RESTful API, or third-party SIEM.
200
234
@@ -203,7 +237,7 @@ Security dashboards for motoring and queries. ElasticSearch, RESTful API, or thi
203
237
204
238
## Role of a security team in an organization
205
239
206
-
1- Security office under a CTO
240
+
-[ ]**Security office under a CTO**
207
241
208
242

209
243
@@ -218,7 +252,7 @@ Security dashboards for motoring and queries. ElasticSearch, RESTful API, or thi
0 commit comments