Question
Need a response PLEASE!!!!!! Next, using the CIS Controls Spreadsheet, identify at least one sub-control that is related to the FSDP you selected. For more
Need a response PLEASE!!!!!!
Next, using the CIS Controls Spreadsheet, identify at least one sub-control that is related to the FSDP you selected. For more information on the controls, review the CIS Controls PDF document.
Once you have identified your subcontrol(s), discuss how the subcontrol relates to data protection in the context of your chosen design principle.
In response to your peers, compare your thoughts with their initial posts.
Minimizing the trust surface
Doug Frantz
Minimizing the trust surface refers to the efforts to minimize interconnectivity requirements of systems. In other words, we want to not have a situation where one system is reliant on another that it doesn't have to be. This becomes important in many cases, but one that immediately comes to mind is when you have venders involved. We have had several case studies where a major company was compromised not through its own direct vulnerabilities, but through a weaker vender whose system required access to their own. Often the trust surface in these cases was bigger than needed often as oversight in getting two systems to talk. Boundary defense helps to mitigate a broad trust surface. While some systems might need to trust others, building boundaries will help to contain any attackers access in a more limited way. An analogy I think of is like water tight bulkheads in a ship. Properly sealing these bulkheads prevent water that has gained access from traveling further.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started