You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: introduction.md
+11-11Lines changed: 11 additions & 11 deletions
Original file line number
Diff line number
Diff line change
@@ -1,9 +1,9 @@
1
1
# Introduction
2
2
3
-
There are many myths about security, and how difficult it is. Cyber security is complex domain. There is no perfect solution. Never. However there are simple solutions that do work. Always. Often the best cyber security solutions are open solutions which everyone can use. Good solutions are not subject to a hype. Open solutions are transparent so everyone can use and improve it.
3
+
There are many myths about security, and how difficult it is. Cyber security is a complex domain. There is no perfect solution. Never. But there are simple solutions that do work. Often the best cyber security solutions are open solutions which everyone can use. Good solutions are not subject to a hype. Open solutions are transparent and fully open. So everyone can use and improve it.
4
4
5
5
```{admonition} This Playbook
6
-
is created to help you solving your specific complex security challenges.
6
+
is created to help you with solving your specific complex security challenges.
7
7
```
8
8
9
9
@@ -17,7 +17,7 @@ Find a proven solution by using this Security Reference Architecture:
17
17
:margin: 3
18
18
:class-body: text-center
19
19
:class-header: bg-light text-center
20
-
**[Prevention](prevention/prevention)**✍
20
+
**[Prevention](prevention/prevention)**🔐
21
21
^^^
22
22
[Simple Checklist](prevention/simple-checklists)
23
23
@@ -31,7 +31,7 @@ Find a proven solution by using this Security Reference Architecture:
31
31
:margin: 3
32
32
:class-body: text-center
33
33
:class-header: bg-light text-center
34
-
**[Protection](protection/security-management)**🚀
34
+
**[Protection](protection/security-management)**✅
35
35
^^^
36
36
[Security Policies](protection/security-policies)
37
37
@@ -49,7 +49,7 @@ Find a proven solution by using this Security Reference Architecture:
@@ -62,7 +62,7 @@ Find a proven solution by using this Security Reference Architecture:
62
62
:margin: 3
63
63
:class-body: text-center
64
64
:class-header: bg-light text-center
65
-
**[Learning ](learning/securitycourses)**🎁
65
+
**[Learning ](learning/securitycourses)**📚
66
66
^^^
67
67
[Security courses](learning/securitycourses)
68
68
@@ -82,19 +82,19 @@ Find a proven solution by using this Security Reference Architecture:
82
82
83
83
This security architecture is not just another security book. We wanted to create an innovative solution that helps you to create better and faster security solutions for your security use case. So we used our many years of experience when dealing with security challenges and created this interactive community driven publication to enable this goal.
84
84
85
-
All information within this guide is targeted for reuse to solve your cyber security challenge. This guides is designed so you can make your cyber security designs faster and better. Do not reinvent the wheel. Reuse and improve solid cyber security knowledge and experience that is created to build upon.
85
+
All information within this guide is targeted for reuse to solve your cyber security challenge. This guide is designed so you can make your cyber security designs faster and better. Do not reinvent the wheel. Reuse and improve solid cyber security knowledge and experience that is created to build upon.
86
86
87
87
88
88
We believe in open and simple cyber security solutions. Openness and transparency builds trust.
89
89
90
90
Open simple solutions are:
91
-
* solutions that are easily too understand
91
+
* solutions that are easily to understand
92
92
* solutions that can be studied
93
93
* solutions that can be improved
94
94
95
-
Good cyber security solutions are open solutions. Transparency builds trust. Simple solutions that can easily be understand and studied are more transparent than complex proprietary solutions.
95
+
Good cyber security solutions are open solutions. Transparency builds trust. Simple solutions that can easily be understood and studied are more transparent than complex proprietary solutions.
96
96
97
-
Our mission with this open security reference architecture is to create the best playbook on internet that continuously helps you solving your cyber security challenges.
97
+
Our mission with this open security reference architecture is to create the best playbook on the internet that continuously helps you with solving your cyber security challenges.
98
98
99
99
We believe this is best done together.
100
100
```{tip} Just use the buttons on top of every page. Create an edit suggestion or create an issue.
@@ -110,7 +110,7 @@ Cyber security is a process, not a destination to arrive at. Designing a cyber s
110
110
111
111
Good security design and implementation takes time, patience and hard work.
112
112
113
-
Society, companies, governments are increasingly dependent on IT. Good cyber security is required for safety and privacy.
113
+
Society, companies, and governments are increasingly dependent on IT. Good cyber security is required for safety and privacy.
114
114
115
115
There are no silver bullets when it comes to cyber security. Risks will never be zero. Using complex and expensive cyber security solutions are not by definition better.
Copy file name to clipboardExpand all lines: prevention/architecturesteps.md
+3-3Lines changed: 3 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
3
3
This section outlines a clear and simple way to create your security solution.
4
4
5
-
To create a sustainable solution to mitigate security risks you must start is to create a security architecture for your solution.
5
+
To create a sustainable solution to mitigate security risks you must start is by creating a security architecture for your solution.
6
6
7
7
An architecture itself does not protect you but a good solution architecture:
8
8
* reduces costs
@@ -12,7 +12,7 @@ In an architecture the emphasis is not only on the IT (software and hardware) bu
12
12
13
13
The perfect solution to reduce security risks to zero does not exist. A solution architecture helps in the continuous process of optimizing and controlling your security risks.
14
14
15
-
Creating a security architecture can take a lot of time and effort. But a good way to speed up the process of creating your solution is to use this open security reference architecture as basis.
15
+
Creating a security architecture can take a lot of time and effort. But a good way to speed up the process of creating your solution is to use this open security reference architecture as the basis.
16
16
17
17
This open security reference architecture is created to:
18
18
1. Make security architectures faster and
@@ -22,7 +22,7 @@ This open security reference architecture is created to:
22
22
23
23
Creating security a security or privacy solution architecture consists of the following high level steps:
24
24
25
-
* Dive in the business strategy and organization. Perform a simple risks assessment.
25
+
* Dive in the business strategy and organization. Perform a simple risk assessment.
26
26
27
27
* Gather security principles and requirements that are relevant for your context.
Copy file name to clipboardExpand all lines: prevention/prevention.md
+5-5Lines changed: 5 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -1,17 +1,17 @@
1
1
# Simplify Prevention
2
2
3
-
Investing in prevention measurements is the easiest and simplest way to minimize cyber security risks.
3
+
Investing in prevention measurements is the easiest and simplest way to minimise cyber security risks.
4
4
5
5
Good cyber security prevention measurements are simple and cheap. So before investing is expensive cyber security software solution follow these simple prevention rules:
6
6
7
7
8
8
```{admonition} Make a daily-back of important data.
9
9
:class: tip, dropdown
10
10
11
-
A simple backup that works is cheap, simple and effective against many security threads. Having idiot proof off backups is the most valuable weapon against ransomware.
11
+
A simple backup that works is cheap, simple and effective against many security threads. Having idiot proof backups is the most valuable weapon against ransomware.
12
12
13
13
14
-
A Off-line, incorruptible, and disconnected backups – that cannot be encrypted by the malware – is a key corrective control that stops the malware from encrypting your ‘live’ data as well as the backed-up data.
14
+
Off-line, incorruptible, and disconnected backups – that cannot be encrypted by the malware – is a key corrective control that stops the malware from encrypting your ‘live’ data as well as the backed-up data.
15
15
```
16
16
17
17
@@ -66,7 +66,7 @@ As with applications, security weaknesses are often discovered in operating syst
Mcirosoft Windows is intended to be easy to use, and often users have free reign of the computer. However, administrator privileges should only be provided on an as-needs basis, as otherwise exploits have the ‘keys to the kingdom’ and can corrupt the computer itself.
69
+
Microsoft Windows is intended to be easy to use, and often users have free reign of the computer. However, administrator privileges should only be provided on an as-needs basis, as otherwise exploits have the ‘keys to the kingdom’ and can corrupt the computer itself.
70
70
71
71
Also on unix based systems, appliances and network devices limiting administrative privileges is a must do.
72
72
Software SHOULD never have to use a high privilege account to run.
@@ -75,5 +75,5 @@ Software SHOULD never have to use a high privilege account to run.
75
75
```{admonition} Prevent untrusted code to be run.
76
76
:class: tip, dropdown
77
77
78
-
So use MAC (mandatory access control). Despite the many technologies like sandboxing around the most important and simple measurement is: think! Be aware of attachments and downloads of strangers.
78
+
So use MAC (mandatory access control). Despite the many technologies like sandboxing, the most important and simple measurement is: to think! Be aware of attachments and downloads of strangers.
Copy file name to clipboardExpand all lines: prevention/simple-checklists.md
+3-3Lines changed: 3 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -4,13 +4,13 @@ The landscape of cyber security solutions is filled with:
4
4
* Holy Grails and
5
5
* Failures
6
6
7
-
We are all humans. So for severe problems like mitigating cyber security risks we fall in love with socalled 'Holy Grail' products. The product capabilities of these product are outlined with vague and difficult marketing buzz. So perfect for managers who lack a solid technical background. Of course you have to trust the vendor since these too-good-to-be-true products are never F/OSS products. This of course to hide the fact that magic solutions do not exist. And security by obscurity is a bad security principle.
7
+
We are all humans. So for severe problems like mitigating cyber security risks we fall in love with so-called 'Holy Grail' products. The product capabilities of these products are outlined with vague and difficult marketing buzz. So perfect for managers who lack a solid technical background. Of course you have to trust the vendor since these too-good-to-be-true products are never F/OSS products. This of course to hide the fact that magic solutions do not exist. And security by obscurity is a bad security principle.
8
8
9
-
Failed security products are doomed when deployed. These products are characterized by:
9
+
Failed security products are doomed when deployed. These products are characterised by:
10
10
* a complex setup
11
11
* propriety solution and
12
12
* complex mandatory maintenance and update processes.
13
-
Too often these product introduces extra risks instead of mitigating risks. Deploying these products can be compared with deliberately installing a large backdoor in your trusted environment.
13
+
Too often these products introduce extra risks instead of mitigating risks. Deploying these products can be compared with deliberately installing a large backdoor in your trusted environment.
14
14
15
15
Checklists help with improving all security management aspects like:
Copy file name to clipboardExpand all lines: prevention/simplesolutions.md
+10-10Lines changed: 10 additions & 10 deletions
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@
4
4
5
5
```{admonition} How to mitigate DDoS attacks - never simple..
6
6
:class: tip, dropdown
7
-
A Denial of Service (DoS) attack is an attempt to affect the availability of a targeted system. Typically, attackers generate large volumes of packets or requests ultimately overwhelming the target system. In case of a Distributed Denial of Service (DDoS) attack the attacker often uses multiple compromised sources to generate the attack. Like cloud services. Also a DDoS attack can be used as distraction to get unprivileged access.
7
+
A Denial of Service (DoS) attack is an attempt to affect the availability of a targeted system. Typically, attackers generate large volumes of packets or requests ultimately overwhelming the target system. In case of a Distributed Denial of Service (DDoS) attack the attacker often uses multiple compromised sources to generate the attack. Like cloud services. Also a DDoS attack can be used as a distraction to get unprivileged access.
8
8
9
9
DDoS attacks are most common at the Network (layer 3), Transport (Layer 4), Presentation (Layer 6) and Application (Layer 7) Layers.
10
10
@@ -25,9 +25,9 @@ Simple rules for mitigating DDOS attacks:
25
25
:class: tip, dropdown
26
26
27
27
So follow these simple steps:
28
-
* Do a risk analyse.
29
-
* Develop a security architecture based on your risks profile.
30
-
* Always consider real distributed solutions where your security concerns are to spread across several nodes to reduce the impact of a single breach. E.g. spread data and secrets across several independent nodes to be more resilience.
28
+
* Do a risk analysis.
29
+
* Develop a security architecture based on your risk profile.
30
+
* Always consider real distributed solutions where your security concerns are to spread across several nodes to reduce the impact of a single breach. E.g. spread data and secrets across several independent nodes to be more resilient.
31
31
* Develop a thread analyse and improve your architecture.
32
32
33
33
@@ -40,10 +40,10 @@ So follow these simple steps:
40
40
```{admonition} Implement simple measurements that really help!
41
41
:class: tip, dropdown
42
42
43
-
The most security protection measurements are very simple and extreme effective.
43
+
Most security protection measurements are very simple and extremely effective.
44
44
45
45
So just do:
46
-
* Develop awareness within your company and awareness trainings a continuous process!
46
+
* Developing awareness within your company and following awareness trainings a continuous process!
47
47
* Always implement virus protection on MS Windows based platforms.
48
48
* Always implement network segmentation.
49
49
* Always implement some simple firewall rules.
@@ -59,15 +59,15 @@ So just do:
59
59
Implement some simple but good detection measurements to detect security breaches. Else:everything you do is useless.
60
60
61
61
So just do:
62
-
* Use audit logging on file systems. Simple is: Use the audit capabilities that are delivered on your operating system. E.g. the FreeBSD audit system for determining read,write,changes on systems is simple but very effective. So use implement this. [FreeBSD Audit Handbook](https://docs.freebsd.org/en/books/handbook/audit/ )
63
-
* Use the default detection system to log and audit all successful and unsuccessfully login attempts on your network.
62
+
* Use audit logging on file systems. Simple is: Use the audit capabilities that are delivered on your operating system. E.g. The FreeBSD audit system for determining read,write,changes on systems is simple but very effective. So use this [FreeBSD Audit Handbook](https://docs.freebsd.org/en/books/handbook/audit/ ).
63
+
* Use the default detection system to log and audit all successful and unsuccessful login attempts on your network.
64
64
65
65
66
66
```
67
67
68
68
## Respond
69
69
70
-
```{admonition} Implement some simple procedures to respond on security incidents.
70
+
```{admonition} Implement some simple procedures to respond to security incidents.
71
71
:class: tip, dropdown
72
72
73
73
Do not reinvent the wheel. For every simple or complex security incident a good procedure is already invented.
@@ -89,7 +89,7 @@ Do not reinvent the wheel. A good recovery plan is simple:
89
89
* Make backups and test recovery procedures.
90
90
91
91
Automate making the backups. But make sure that recovery is always manually verified.
92
-
Test for for disasters. So never ever assume that your backups can not be compromised or stolen.
92
+
Test for disasters. So never ever assume that your backups can not be compromised or stolen.
0 commit comments