L5 Security Operations
L5 Security Operations
Data Handling
Data itself goes through its own life cycle as users create, use, share
and modify it. The data security life cycle model is useful because it
can align easily with the different roles that people and
organizations perform during the evolution of data from creation to
destruction (or disposal). It also helps put the different data states of
in use, at rest and in motion, into context.
2|Page
o Data Sensitivity Levels and Labels: unless otherwise
mandated, organizations are free to create classification
systems that best meet their own needs. In professional
practice, it is typically best if the organization has enough
classifications to distinguish between sets of assets with
differing sensitivity/value, but not so many classifications
that the distinction between them is confusing to individuals.
Typically, two or three classifications are manageable, and
more than four tend to be difficult.
3|Page
For the security professional to succeed in this assignment, an accurate
inventory must be maintained, including the asset location, retention
period requirement, and destruction requirements. Organizations should
conduct a periodic review of retained records in order to reduce the
volume of information stored and to ensure that only necessary
information is preserved.
4|Page
o Clearing the device or system, which usually involves
writing multiple patterns of random values throughout all
storage media. This is sometimes called “overwriting” or
“zeroizing” the system, although writing zeros has the risk
that a missed block or storage extent may still contain
recoverable, sensitive information after the process is
completed.
o Purging the device or system, which eliminates (or greatly
reduces) the chance that residual physical effects from the
writing of the original data values may still be recovered,
even after the system is cleared. Some magnetic disk storage
technologies, for example, can still have residual “ghosts” of
data on their surfaces even after being overwritten multiple
times. Magnetic media, for example, can often be altered
sufficiently to meet security requirements; in more stringent
cases, degaussing may not be sufficient.
o Physical destruction of the device or system is the ultimate
remedy to data remanence. Magnetic or optical disks and
some flash drive technologies may require being
mechanically shredded, chopped or broken up, etched in acid
or burned; their remains may be buried in protected landfills,
in some cases.
o In many routine operational environments, security
considerations may accept that clearing a system is sufficient.
But when systems elements are to be removed and replaced,
either as part of maintenance upgrades or for disposal,
purging or destruction may be required to protect sensitive
information from being compromised by an attacker.
5|Page
Logging imposes a computational cost but is invaluable when
determining accountability. Proper design of logging environments
and regular log reviews remain best practices regardless of the type of
computer system.
Log reviews are an essential function not only for security assessment
and testing but also for identifying security incidents, policy
violations, fraudulent activities and operational problems near the
time of occurrence. Log reviews support audits – forensic analysis
related to internal and external investigations – and provide support for
organizational security baselines. Review of historic audit logs can
determine if a vulnerability identified in a system has been previously
exploited.
6|Page
Controls are implemented to protect against unauthorized changes to log
information. Operational problems with the logging facility are often
related to alterations to the messages that are recorded, log files being
edited or deleted, and storage capacity of log file media being exceeded.
Organizations must maintain adherence to retention policy for logs as
prescribed by law, regulations and corporate governance. Since attackers
want to hide the evidence of their attack, the organization’s policies and
procedures should also address the preservation of original logs.
Additionally, the logs contain valuable and sensitive information about
the organization. Appropriate measures must be taken to protect the log
data from malicious use.
Different tools are used depending on whether the risk from the attack is
from traffic coming into or leaving the infrastructure.
7|Page
Encryption Overview
8|Page
Module 2: Understand System Hardening
Domain D5.2.1
Configuration Management
1. Identification: baseline identification of a system and all its
components, interfaces and documentation.
2. Baseline: a security baseline is a minimum level of
protection that can be used as a reference point. Baselines
provide a way to ensure that updates to technology and
architectures are subjected to the minimum understood and
acceptable level of security requirements.
3. Change Control: An update process for requesting changes
to a baseline, by means of making changes to one or more
components in that baseline. A review and approval process
for all changes. This includes updates and patches.
4. Verification & Audit: A regression and validation process,
which may involve testing and analysis, to verify that nothing
in the system was broken by a newly applied set of changes.
An audit process can validate that the currently in-use
baseline matches the sum total of its initial baseline plus all
approved changes applied in sequence.
9|Page
Effective use of configuration management gives systems owners,
operators, support teams and security professionals another important set
of tools they can use to monitor and oversee the configuration of
the devices, networks, applications and projects of the organization. An
organization may mandate the configuration of equipment through
standards and baselines. The use of standards and baselines can
ensure that network devices, software, hardware and endpoint
devices are configured in a consistent way and that all such devices
are compliant with the security baseline established for the
organization. If a device is found that is not compliant with the security
baseline, it may be disabled or isolated into a quarantine area until it
can be checked and updated.
10 | P a g e
Patches: The challenge for the security professional is
maintaining all patches. Some patches are critical and should
be deployed quickly, while others may not be as critical but
should still be deployed because subsequent patches may be
dependent on them. Standards such as the PCI DSS require
organizations to deploy security patches within a certain time
frame. An organization should test the patch before rolling it
out across the organization. If the patch does not work or has
unacceptable effects, it might be necessary to roll back to a
previous (pre-patch) state. Typically, the criteria for rollback
are previously documented and would automatically be
performed when the rollback criteria were met. The risk of
using unattended patching should be weighed against the risk of
having unpatched systems in the organization’s network.
Unattended (or automated) patching might result in unscheduled
outages as production systems are taken offline or rebooted as part
of the patch process.
11 | P a g e
Module 3: Understand Best Practice Security Policies
Domain D5.3, D5.3.1, D5.3.2, D5.3.3, D5.3.4, D5.3.5, D5.3.6
13 | P a g e
Letting employees choose the device that is most comfortable for them
may be good for employee morale, but it presents additional challenges
for the security professional because it means the organization loses
some control over standardization and privacy. If employees are allowed
to use their phones and laptops for both personal and business use, this
can pose a challenge if, for example, the device has to be examined for a
forensic audit. It can be hard to ensure that the device is configured
securely and does not have any backdoors or other vulnerabilities that
could be used to access organizational data or systems.
All employees must read and agree to adhere to this policy before any
access to the systems, network and/or data is allowed. If and when the
workforce grows, so too will the problems with BYOD. Certainly, the
appropriate tools are going to be necessary to manage the use of and
security around BYOD devices and usage. The organization needs to
establish clear user expectations and set the appropriate business rules.
14 | P a g e
This can include national and international laws, such as the GDPR in
the EU and Personal Information Protection and Electronic Documents
Act (PIPEDA) in Canada; laws for specific industries in certain
countries such as HIPAA and Gramm–Leach–Bliley Act (GLBA); or
local laws in which the organization operates.
The organization should also create a public document that explains how
private information is used, both internally and externally. For example,
it may be required that a medical provider present patients with a
description of how the provider will protect their information (or a
reference to where they can find this description, such as the provider’s
website).
Policies will be set according to the needs of the organization and its
vision and mission. Each of these policies should have a penalty or a
consequence attached in case of noncompliance. The first time may be a
warning; the next might be a forced leave of absence or suspension
without pay, and a critical violation could even result in an employee’s
termination.
15 | P a g e
All of this should be outlined clearly during onboarding, particularly for
information security personnel. It should be made clear who is
responsible for enforcing these policies, and the employee must sign off
on them and have documentation saying they have done so. This process
could even include a few questions in a survey or quiz to confirm that
the employees truly understand the policy. These policies are part of the
baseline security posture of any organization. Any security or data
handling procedures should be backed up by the appropriate policies.
16 | P a g e
Module 4: Understand Security Awareness Training
Domain D5.4, D5.4.1, D5.4.2, D5.3.2
Purpose
18 | P a g e
Training will help users increase their proficiency in recognizing a
potential phishing or similar attempt, while also helping them practice
the correct responses to such events. Training may include simulated
phishing emails sent to users on a network to test their ability to identify
a phishing email. Raising users’ overall awareness of the threat posed by
phishing, vishing, SMS phishing (also called “smishing) and other social
engineering tactics. Awareness techniques can also alert selected users
to new or novel approaches that such attacks might be taking. Let’s look
at some common risks and why it’s important to include them in your
security awareness training programs.
Phishing
Social Engineering
19 | P a g e
One of the most important messages to deliver in a security awareness
program is an understanding of the threat of social engineering. People
need to be reminded of the threat and types of social engineering so that
they can recognize and resist a social engineering attack.
Most social engineering techniques are not new. Many have even been
taught as basic fieldcraft for espionage agencies and are part of the
repertoire of investigative techniques used by real and fictional police
detectives. A short list of the tactics that we see across cyberspace
currently includes:
Password Protection
21 | P a g e