{"id":655,"date":"2019-10-19T13:30:51","date_gmt":"2019-10-19T13:30:51","guid":{"rendered":"https:\/\/securityeverafter.com\/?p=655"},"modified":"2023-02-01T09:49:36","modified_gmt":"2023-02-01T14:49:36","slug":"what-assumptions-are-you-making","status":"publish","type":"post","link":"https:\/\/securityeverafter.com\/what-assumptions-are-you-making\/","title":{"rendered":"What Assumptions Are You Making?"},"content":{"rendered":"
I used to make a lot of assumptions. I assumed I would get an alert if my security agents were not working correctly. Since no one said there was a problem with my security agents, I assumed everything would be okay. These are just a few assumptions I make daily as a cybersecurity practitioner about the security agents that protect my organization. While it is preferable to think everything is okay, it is much better to validate that assumption regularly.\u00a0<\/span><\/p>\r\n\r\n\r\n\r\n I have been fortunate to work in cybersecurity for many years and at several diverse types of organizations. During that time, I always found it helpful to check on the status of the security agents periodically. I have found with scheduling recurring calendar reminders; I can better validate the assumption that the security agents are working as intended. Specific areas of focus include confirming the security agent is installed correctly and performing the actions specified in the policy.\u00a0<\/p>\r\n\r\n\r\n\r\n Central monitoring consoles are a great place to start for security agents that have not communicated back to the console within an acceptable time. The output from the console can be compared to the\u00a0Inventory and Control of Hardware Assets<\/a> to ensure that every system has a security agent installed. Whether an automated or manual task, this practical step can help to validate your assumption.\u00a0<\/p>\r\n\r\n\r\n\r\n Think about your assumptions, and take action right away! By being intentional about validating the health of your security agents, you can do a great deal to validate the assumptions you are making.<\/p>\r\n\r\n\r\n\r\n One of my favorite questions is “How long can you stand to not know”. In this case, how long can you stand to not know when your security agents are not working as expected? If you get stuck, check out my earlier article and video from the Center for Internet Security on the Implementation Guide for Small and Medium-Sized Businesses<\/a>.\u00a0<\/p>\r\n I would be failing you if I did not ask – What Assumptions Are You Making in your cybersecurity program? Let us know of your success in the comments section below!\u00a0<\/p>\r\nWhat assumptions can you validate today?<\/h2>\r\n