I have to do a gap analysis of an existing architecture against a set of established requirements. The goal of...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
this is to find the security gaps, fix them and bring the infrastructure up to corporate standards. Can you help me with this process?
- The existence of policies, procedures, standards and supporting documentation
- Access control and user provisioning processes and tools
- Change control and configuration management processes
- Asset identification processes
- Vulnerability management processes
- Risk management processes
- Incident handling processes
- Business continuity documentation and readiness
- Software development lifecycle processes
- Perimeter defense strength
- Test the configurations of firewalls, remote access servers, IDS, antivirus, etc.
- Patching processes
- Physical security processes
- Personnel security processes
Once the vulnerability and risk assessment is complete, perform a gap analysis within each sector and include strategic steps regarding how to bring each area "up to corporate standards." A gap analysis compares what is currently there to what is required. The requirements are derived from federal and state laws, government regulations, industry standards and corporate governance requirements. The following are the common steps of a gap analysis:
- Define a scope as it pertains to each previously listed item
- Collect all current documentation within the environment (policies, procedures, configuration standards, etc.)
- Identify all hardware and software assets with the scope that was established in step 2. (This can be done manually or through automated tools.)
- Interview individuals and document how the processes listed previously are carried out.
- Compare the current security practices, configurations and processes to the goals identified in step 1.
- Prioritize the gaps that were identified and create implementation steps to get each area to the right level of compliance.
It's important to note, it can take years to successfully complete a gap analysis, because it takes time to identify all of the laws, regulations and business drivers that will set your corporate security requirements and derive security goals from them.
Let's review a step, to show you how a gap analysis would be carried out and remediation steps taken. If your corporate standards state that each network device, server and workstation must provide a certain level of protection, then the first thing you need to do is establish the configuration standards for each system. This means every router, firewall, server, workstation, and network device must have detail-oriented, written configuration standards stating exactly how to configure each system. After testing these configurations, roll them out to a production environment. To ensure the configurations were created properly, use a product like Symantec's Enterprise Security Manager (ESM). It compares the policy you created (which is the same as the configuration standard you created) to the current settings on each system. It will then show you the configurations that do not meet your policy, which you must then properly configure so they meet your configuration standard.
Remember, this is just one way to detect if the infrastructure is not meeting corporate requirements.
Dig Deeper on Enterprise Risk Management: Metrics and Assessments
Related Q&A from Shon Harris
When it comes to firewalls, the networking group often handles the installation, while the information security department writes the rules. Should ...continue reading
In today's security world, it's hard to keep track of each and every management standard and auditing procedure. In this SearchSecurity.com Q&A, ...continue reading
Before you begin putting the pieces of your security program together, you may want to have a look at ISO 27001. In this expert Q&A, Shon Harris ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.