Assignment 4 cybersecurity strategy for the critical infrastructure | CSIS 343 - Cybersecurity
1. Network Segmentation:
Zero Trust Architecture (ZTA):
Continuous Monitoring: Implement real-time monitoring of user and device behavior, requiring continuous authentication and authorization, even for previously trusted entities. Adaptive Access Controls: Utilize adaptive access controls that dynamically adjust based on user behavior, risk factors, and the context of the access request. Device Trustworthiness: Assess the trustworthiness of devices connecting to the network, ensuring that only properly configured and secure devices are allowed access.
Micro-Segmentation:
Application-Centric Segmentation: Adopt an application-centric approach to segmentation, aligning security policies with the specific requirements of critical applications. Automated Micro-Segmentation: Explore solutions that automate the enforcement of micro- segmentation policies based on real-time threat intelligence and network behavior analysis. Visibility and Analytics: Implement tools that provide deep visibility into network traffic, allowing for the identification of anomalous behavior within segmented zones.
ICS Segmentation:
Air-Gapping Critical Systems: Consider air-gapping critical Industrial Control Systems from other networks to provide an additional layer of physical isolation. Secure Gateways: Implement secure gateways and firewalls designed for ICS environments to control traffic flow and protect critical processes. Anomaly Detection for ICS: Deploy anomaly detection systems specifically tailored for ICS networks to identify deviations from normal behavior that may indicate a security incident.