Enterprise Security Landscaping

What To Do First Quadrant quadrantChart title Core Security Controls Maturity Assessment x-axis Low Implementation Complexity --> High Implementation Complexity y-axis Low Impact --> High Impact quadrant-1 Strategic Projects quadrant-2 Essential Foundation quadrant-3 Supporting Controls quadrant-4 Specialized Needs Basic IAM: [0.2, 0.8] SIEM/SOC: [0.9, 0.9] Email Security: [0.3, 0.9] Network Controls: [0.4, 0.6] XDR Platform: [0.8, 0.8] Zero Trust: [0.9, 0.7] Vulnerability Scanning: [0.3, 0.4] Asset Management: [0.2, 0.3] Security Awareness: [0.1, 0.6] GRC Platform: [0.7, 0.4] CASB: [0.6, 0.3] Threat Intel: [0.6, 0.2] Pen Testing: [0.9, 0.3] API Security: [0.5, 0.5] The quadrant is a visual aid to help assessing and prioritizing security risk mitigation activities. Below you will find a more exhaustive overview of what needs to be prioritized. Use that and other information from your own organization to build your own quadrant. ...

November 13, 2024 · 18 min · 3781 words · Security Architecture Team

Mosh: The Mobile Shell - Userland Remote Access with Tailscale

Mosh (Mobile Shell) is a userland remote terminal application that provides resilient connections surviving network changes and interruptions. Unlike traditional system daemons, Mosh runs entirely in userspace, providing natural security boundaries and simplified deployment. How Mosh Works Userland Architecture Mosh operates entirely in userspace, which is fundamentally different from traditional SSH: Initial Connection Uses existing SSH for authentication SSH launches mosh-server as your user (not root) Server picks available UDP port Communicates port and key back through SSH Local mosh-client establishes UDP connection Security Benefits ...

February 15, 2024 · 5 min · 907 words