The three security posture

What is security posture? The three postures in cybersecurity


In this post, you will learn the security posture and the three postures in cybersecurity which is often spoken in the books and also the cybersecurity experts.

What is security posture?

Security posture term means overall cybersecurity strength of an organisation. The security system is very important in an organisation. Three pillars hold the security posture. The three pillars are protection, detection and response.

The security of an organisation will reduce the cyberattacks against the company. When I say the term security posture it includes network, Internet, Infrastructure of a network, data security, red team, penetration testing, incident response team, assets etc.,

Without a security structure, the employee and the company and also the client’s data are very vulnerable. The client data is vulnerable and also it is very valuable If there is a breach of the client data. There is going to be a big headache for the company. Because the company should be responsible and also compensate the client.

So, the company should ensure security and give end-to-end encryption for the client.

Also Read: What is prismdump

The three security posture

  1. Protection
  2. Detection
  3. Response
Security posture protection or prevent detection , respond

Protection – security posture

The protection ensures the client’s assets and the company assets are safe. So, protection includes firewall, 2FA and MFA and also VPN, TOR, Encryption, HTTPS, Patching, SSH, SSL/TLS etc.,

Here asset means valuable data’s such as a file, email, identity, anonymity, privacy. Anything which is valuable data for the users is an asset.


Suppose the organisation or the targeted user is affected because of the cyberattacks and the detection is one of the security postures. The incident response(IR) team should be ready for an incident response attack at any time. And ready to detect any time of malware or attack.


Responding is the final in security infrastructure. The blue and the red team should be able to give a proper response to the press and the clients in a neat report. Responding to the attack also giving a transparent response to their clients and the press.

Also Read: What is PCPdump

Also Read: What is Nessus an overview

Read: Cain and Abel windows password cracking tool

Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions or brave browser to block ads. Please support us by disabling these ads blocker.Our website is made possible by displaying Ads hope you whitelist our site. We use very minimal Ads in our site


Scroll to Top