Skip to main content

Posts

Showing posts from August, 2021

The Five Layers

There are five important layers in Security for risk mitigation (refer last Blogs on Risk Chain and Finding Solution to Break the Risk Chain). Implementation of these layers is generally in combination of each other. Correct balancing the implementation of layers at appropriate risk chain link and at right timings will result into Cost-effective and Optimum Security, which every management is looking for. But to have this achieved it is important to understand the components within these five layers. It is also important to note that while you are changing any layer, other layers will be affected. Therefore, change management is not one time activity, need to observe the impact in long term. The five layers includes ‘Infrastructure’, ‘Equipment’, ‘Application’, ‘Process’ and ‘Human Resource’. We will go in detail of each layer, understand the components and interconnections between the layers. All layers together should be seen like an engine, wherein each layer is individual gear, sho...

Breaking the Risk Chain

Finding the solution to break the Risk chain For Risk Mitigation the “Risk chain” needs to be broken in a cost-effective way. Risk chain components are required to be mapped with different Security layers i.e., Infrastructure, Equipment, Application, Processes, and Manpower to determine the optimal Security solution. Once a company starts mapping Security layers against Risk chain components, it will likely be possible to identify several measures that can be enhanced. It is important to involve Security as early in the planning process as possible. The best time to involve Security is in design phase where the 'Infrastructure', link (+) of 'asset', 'vulnerability' and 'weakness' can be broken or at least weaken. Examples include  : While designing factory layout, keep separation between core operational area(s) and areas where external vehicles/personnel are required to come. While designing the building Security, keep the visitor lobby outside core are...