Security Program Spring Cleaning - Part 1 of 3

Security Program Spring Cleaning - Part 1 of 3

The weather is warming and as we reach mid-Spring in North America, it is time when one must ask - is my security posture Springtime Fresh? Chances are you have a number of stale information security processes with irrelevant or incomplete tasks. Time to put on your housekeeping bandana and dig into the tasks you’ve been putting off since the Q4 holiday change freeze. This week we'll review how we might put the figurative snow shovels in the shed and tidy-up the network focused security tasks strewn about the garage. 

Sharpen your Network Security Tools
It’s time to move the furniture around and find out what dust bunnies are hiding.When was the last time you audited the network access you have granted to vendors, suppliers, partners etc.? Do you know know where all of your VPN tunnels terminate and the access policy on each? How is your vulnerability assessment program doing? Any mergers or acquisitions or additions to your IP address space, any new datacenter deployments this year?  (Don’t worry — you’re not the only one hearing crickets)

To-do To-day List:

  • Review your network ACLs (firewalls, routers etc.) for extraneous access; if you don’t know why rule #32 exists, disable the rule and see who screams
  • Audit point-to-point VPN connections to partners and suppliers; do they really need persistent access, when they’re only working on projects part of the year?
  • Verify your vulnerability scanners are targeting the your complete IP space; think outside the network and ask your facilities folks if they’ve added any offices they haven’t thought to tell you about.
  • Take up the IDS tuning tuning project and review your organizations NSM sensor placement.
  • Log all of your DNS query traffic. If this is your first view into your DNS requests - you are bound to find some grime .
  • Review the egress sFlow/netFlow network data for anomalies.
  • Got SDN? The deployment is likely too new for dust, nevertheless - secure your controllers.


If you don’t know Flow, IDS, NSM, you’re looking at more than a Spring Cleaning — you may need a security remodel. In Part 2 we will look at how to pull up the rugs to clean, polish, and buff-out your organization's identity and access programs.

Mark Maxey

Vice President - Intelligence Operations at Optiv

10y

A refreshing and practical approach with very little of that fussy risk talk

Eric Jones

Senior SDET specializing in Quality Engineering and Test Automation

10y

Great list Josh! Can't wait for the next two!!

Terrence Weekes

Chief Information Security Officer at Jack in the Box + Del Taco, Global Technology Executive, Board Member

10y

Love this idea, Josh Lemos!

To view or add a comment, sign in

More articles by Josh Lemos

  • Given Enough AIs, All Bugs Are Shallow

    We're in the best era ever for finding security vulnerabilities quickly and at scale. Linus' Law, Eric Raymond's famous…

    9 Comments
  • Agents of Order - Agentic Defense

    The AI landscape continues to transform at a blistering pace. Over the past year, I often hypothesized the asymmetric…

    14 Comments
  • AuthZ Agent of Chaos: MCP

    There’s a lot of excitement around agentic AI open protocols such as Model Context Protocol (MCP) and Agent2Agent…

    5 Comments
  • AuthZ Agents of Chaos

    The emergence of agentic AI represents a significant inflection point in computing that requires strategic…

    8 Comments
  • Authorization - The Forgotten Second A

    It seems that everyone in InfoSec is focused on solving three problems: identity, identity, and identity. Its the Who…

    3 Comments
  • Death of Traditional Penetration Testing

    Yes, another $something is dead article. What I mean is the traditional one-size-fits-all cookie-cutter engagement of…

    20 Comments
  • Honeypots - Bringing Stealthy Back

    Deception and passive monitoring have a long history What is new is old: Cuckoo's Egg 2.0 (if you don't know what I'm…

    3 Comments
  • Security Experts Versus the Layperson

    If you are like most technology professionals family and friends come to you for advice on anything tangentially…

    2 Comments
  • Security Program Spring Cleaning - Part 3 of 3

    Now we’ve dusted the bunnies under the furniture, steam cleaned the carpets, and nearly fell asleep reviewing…

    1 Comment
  • Security Program Spring Cleaning - Part 2 of 3

    Last week I kicked off a series of “Spring Cleaning” security tips to freshen up those dusty networks; we moved the…

Others also viewed

Explore content categories