The IT Mission

Considering the increasing cyber threats, our Chief Information Security Officer (CISO) asked our IT manager to elevate the IT security systems of our business unit by a notch above its current state. He had a weeks’ time to come up with a plan for the same.

With the same thought, the IT manager left for the day as it was already late for his kid’s birthday party. He tiredly hit the bed with a book in hand and swirling thoughts about the day’s happenings.

Mission Planning

The IT manager summoned the 3 Cyber Angels who had won their last battle with the Cyber Demons.

Protection

The first angel came flying and took out her wand and started the magic.

This was the Protector Angel and her virtue was to set the protection controls in the IT systems. She went around the IT rooms to take stock of what all needs protection. She restricted the physical and logical access to critical infrastructure rooms and critical repositories. Then she checked the firewall for protective patches and set the firewall rules as per organization and project needs. Next, she thought about the access to all IT assets and restricted the administrator rights and installation rights to the authorized members appropriately. She ensured that the organization assets and IT assets were appropriately hardened with multi-factor authentication, anti-virus, port disabling, system idle locking, VPN access. Suddenly it struck her that she must have a backup for critical services to keep the protective systems running. She ensured redundancy for critical infrastructure like power, internet services, firewall and switch.

Detection

The protector angel called in the second angel and asked her to keep an eye on the IT systems operation.

The second angel is the Detector Angel and her virtue was to detect the operation of the protection systems. She swished her wand enumerating the detection needs. She set the Security Information and Event Management (SIEM) tool for the firewall. Then for the IT assets, she set the monitoring for the software packages, OS patches and AV patches and configured to gather all the necessary system logs. While leaving the IT room, she saw the physical perimeter setting access units. She set the access units under monitoring in addition to the CCTV units already monitoring the physical movement. She synchronized the clocks of the access units and CCTV units for proper monitoring.

Reaction

Now it was the turn of the detector angel to pull in the cute Reactor Elf.

The reactor elf used her magic sprinkle to initiate reactions/responses to the anomalies detected in the IT protection system. She set the boundaries for normal operation of the IT systems and set the anomaly notification triggers to authorized members. She smartly ensured that the notifications were strictly timed to ensure immediate action.

All the 3 cyber angels went to the IT manager and woke him up to get his praises.

Our IT manager woke up startled with Dan Brown’s Angels and Demons in hand. It was all a dream. How he wished he could have the Cyber Angels in his team.

Mission Accomplished

Our IT manager had visualized his high-level plan to configure the IT security systems. He had to configure the protection systems first, then the detection systems and finally the reaction systems. We could hear him happily whistling as he put his plan to execution the next day. Do you hear him?