Open-Source Cybersecurity Infrastructure

The increased maturity and level of support of open source solutions make the deployment of an open-source based security architecture a potentially viable solution for more and more organizations.

While some solutions lack the full bells and whistle that some commercial products offer, a serious analysis may prove that the extra functionality does not justify the costs of the initial purchase and subsequent maintenance and upgrade expenses. A focus on efficient use of an open-source security control may end up with a much better security posture than having an advanced commercial product that is not properly put at use and unfortunately, this is not an unusual scenario.

Many open-source solutions are now basing their business model around support contracts (optional, of course) and that may alleviate the concerns of cybersecurity managers along their ability to obtain professional support for open-source solutions. There is also a solid base of training platforms for almost any open-source products, allowing the proper training of information security staff that may have to maintain these platforms.

This chart is the first draft and it may have many gaps or it may have missed some important solution. Any feedback is appreciated as it will allow me to improve it. Some of the products/solutions mentioned are not exactly open-source (for example, the threat intelligence platforms such as IBM’s X-Force Exchange), but they do allow for free use and almost full functionality similar with paid services/products.

No alt text provided for this image

Online version with links to each product: http://www.eventid.net/docs/open_source_security_controls.asp

High-definition PDF: www.eventid.net/downloads/open_source_security_controls_v1.pdf

Vector image format (SVG): www.eventid.net/downloads/open_source_security_controls_v1.svg

猜你喜欢

转载自www.cnblogs.com/dhcn/p/10792364.html