Ism Reviewer
Ism Reviewer
● Key audit issue: to ensure all applications c) all data elements are subject to
have been identified/defined within the the logical access control
software, and optional telecommunication ● the application now can be
control and processing features used are accessed in this sequence
appropriate and approved by management
7) Seventh
● Analysis here needs the aid of a system • The access control software may
software analyst wrap logical access security around all
of the above components
4) Fourth - Done via internal security tables
● Transaction processing software may • Audit issues: ensure that-
be the next component in the access a) all the above or previous
path components are defined to
● Transaction processing software the access control software,
routes transactions to the proper providing access rules that
define who can access what
application software
on a need-to-know basis
● Key audit issues: ensure appropriate
b) security table access is
identification/authentication (log-on
restricted to the security
ID & password) and authorization of
administrator
the user to gain access to the
NOTE:
application
• Discipline is needed in developing
● Analysis here is by reviewing internal
application systems
tables that reside in the transaction
processing software or to a separate • IS auditor:
security software (access restricted ● Should evaluate the control
to security administrator) objectives referring to the origination
and authentication of the application
5) Fifth data
● Should evaluate the control measures
● Application software is encountered used in data input and processing
and processes transactions ● What is the effect of omitting control
according to the program logic objectives and measures?
● Audit issue: restrict access to ○ Makes the application
production software library to ONLY vulnerable to attacks either
from within or without
the implementation coordinator
(especially from the Internet)
6) Sixth
● Firewalls do not protect applications
● DBMS directs access to computerized against the types of attacks that come
Information from the HTTP (hypertext transfer protocol)
communication, that is usually permitted
● Audit issues: ensure that-
on applications
a) all data elements are identified in
○ HTTP: this is the protocol, standard,
the data dictionary
rule, or guideline used to transfer data confidentiality
over the web. It is part of the internet
protocol suite that defines the
commands and services used for
Auditing Logical Access — REVIEWING
transmitting webpage data
REPORTS FROM ACCESS CONTROL
SOFTWARE
● Do firewalls protect, in this case
○ Nonrepudiation/Non-denial:
a. Data integrity: changes in plaintext message
because the private key is known will result in failed computing of the same
only by the owner of the key pair, hash value or digest
one can ensure that if a ciphertext - Any chanqe to the plaintext messaqe
is correctly decrypted using a will result in the recipient failinq to
public key, the owner of the public compute the same document
key cannot deny having performed b. Authentication: document is ensured to be
the encryption process sent by the sender since only the sender has
the private key
- Recipient can ensure that the
document has been sent by the plain a) TRANSPORT LAYER SECURITY
sender, because only the plain sender ● Transport layer security (TLS): a
has the private key cryptographic protocol that provides secure
c. Nonrepudiation: sender cannot later deny communications on the Internet
generating the document
○ Is a connection-layered protocol
partly used for communications
3. DIGITAL ENVELOPE
between browsers and web servers
● Digital envelope: electronic container used ● TLS provides endpoint authentication, aside
to protect data or a message through the from communication privacy
use of encryption data authentication ○ TLS allows client-server application
○ Similar to a digital signature communication in a way designed to
● Message is encrypted using symmetric prevent eavesdropping, tampering,
encryption; code or key to decode and messaqe forgery
message is secured using public b) IP SECURITY
(asymmetric) key encryption ● IP security or IPSec: used to secure
○ A more convenient option for communications at IP level among two or
encryption more hosts, subnets, or hosts & subnets
● Combination of encrypted message and ○ This IP layer packet security protocol
encrypted secret key establishes VPNs via transport and
7.4 Applications of Cryptographic Systems tunnel-mode encryption models
● Sender uses digital certificates for
INTRODUCTION authentication
○ The connection is made secure by
● Asymmetric and symmetric systems can be
combined to leverage on each system’s supporting the generation,
peculiarity authentication, and distribution of
● Common scheme: encrypt data using a SAs and those of the cryptographic
symmetric algorithm with the secret key which keys
is randomly generated, then the secret key is ● Security Associations (SAs): define the
encrypted using an asymmetric algorithm security parameters that should be applied
○ It allows the secure distribution between communicating parties as
among those parties who access encryption algorithms, keys, lifespan of keys,
among the encrypted data
etc.
● Benefits: Secure communication; speed of
● Digital Certificates: authenticates the web
symmetric systems and ease of key
credentials that of the sender and lets the
distribution of asymmetric systems
recipient of an encrypted message know
● Creating secret key is effortless; hence, this
can be employed to a limited amount of data that the data is from a trusted source or a
after which a new secret key can be chosen sender who claims to be one
○ limit malicious third-party to decrypt ○ Is issued by a certification authority
the whole set of data, because they (CA)
would be required to attack multiple ○ Used to install signatures and
secret keys message encryption
c) SECURE SHELL ● Creates layer between hardware and guest
● Secure Shell (SSH): a client-server program OSs, to manage their processing and memory
that opens a secure and encrypted shell resources on the host
session from Internet for remote logon ● Management console: often provides
● SSH uses strong cryptography to protect data administrative access in managing the
(passwords, binary files, and administrative virtualized system
commands) transmitted between systems ● Data centers in many other organizations use
○ Similar to a VPN virtualization techniques to create an
● SSH is implemented to validate credentials abstraction of the physical hardware and
between two parties by validating each make large pools of logical resources
other’s credentials using digital certificates consisting of:
● SSH is useful in replacing Telnet and 1) CPUs
implemented at the application layer 2) Memory
○ as opposed to operating at the
3) Disks
network layer, like that of the IT
4) File Storage
Security implementation
5) Applications
d) SECURE MULTIPURPOSE INTERNET 6) Networking
MAIL EXTENSIONS (S/MIME) - the approach enables greater availability of
Secure Multipurpose Internet Mail Extensions resources to the user base
(S/MIME):
● MAIN FOCUS: to enable a single physical
● A standard secure email protocol
computing environment to run multiple
● Authenticates identity of sender and
logical, yet independent systems of the same
receiver
kind
● Verifies integrity of message
● Most common use: operational efficiency —
● Ensures privacy of a message’s content,
uses existing hardware more efficiently by
including the attachments
placing greater loads on each computer
● Second use: using full virtualization of
Chapter 8: desktops enables end-users to have one
computer hosting multiple OSs, if needed to
VIRTUALIZED ENVIRONMENTS support various dependent OS applications
● Further use: an IT organization can better
control deployed OSs, to ensure that they
Introduction
meet the organization’s security requirements
VIRTUALIZATION ○ Security threat and respective contro
requirements are dynamic
● Provides an enterprise with significant ● Virtual desktop images can be changed to
opportunities to; respond to new threats
● Increases efficiency and decreases costs
in IT operations
● Introduces additional risk; a high-level
virtualization allows multiple OSs to coexist ELEMENTS OF A VIRTUALIZED COMPUTING
in the same physical server or host in ENVIRONMENT
isolation of one another
a. Server or other hardware parts
b. Virtualization hypervisor: a piece of guest OS that provides utilities to control
computer software, firmware, or hardware that virtualization, while in a guest OS
creates/runs the virtual machine environment; - Ability to share files with the host OS
“HOST“ 3. Containerization: containers include the
● HYPERVISOR: a hardware virtualiz ation application and its dependencies but share
technique that allows multiple guest
the kernel with the other containers;
operating systems or OSs to run on a
● Containers run as an isolated
single whole system at the same time
process in user space on the host
- the guest OS shares the hardware
of the host computer, such that operating system
each OS appears to have its own
processor, memory, and other
hardware resources
- AKA Virtual Machine Manager
(VMM)
- The hypervisor installed in the
server hardware consults the guest
operating system running on the
host machine. ● Bare metal: hypervisor runs directly on the
- Main job is to cater to the needs of underlying hardware without a Host OS
the guest operating system & ● Hosted: the hypervisor runs on top of the host
effectively manage it, such that the OS
instances of multiple operating
systems do not interrupt with one
Advantages and Disadvantages of Virtualization
another
c. Guest machine: virtual environmental Advantages Disadvantages
elements residing in the computer on
which a hypervisor host machine has been
-Server hardware costs -Inadequate
installed may decrease for both confiquration of the host
1. OS server builds and server could create
2. Switches maintenance vulnerabilities that affect
3. Routers not only the host, but
-Multiple OSs can also the quests
4. Firewalls, etc.
share processinq
capacity and storaqe -Exploits vulnerabilities
METHODS OF DEPLOYING A VIRTUALIZED
that often goes to Within the host’s
ENVIRONMENT configuration, or a
waste in traditional
servers, thereby denial-Of-service
1. Bare metal/native virtualization: attack against the host,
reducinq operatinq
hypervisor runs directly on the underlying costs could affect all of the
hardware, without a host OS; host’s quests
-The physical footprint
2. Hosted virtualization: hypervisor runs on of servers may - A compromise of the
top of the host OS (Windows, Linux, or decrease within the management console
MAC OS) data center
could qrant
● Its architecture has an additional layer of -A single host can have unapproved
software (virtualization application) in the multiple versions of the administrative access
same OS, or even to the host’s quests
different OSs, to
facilitate testing of -Performance issues of
applications for the host’s own OS
● To determine whether the enterprise has
performance could impact each of
considered the applicable risk in its decision
differences the host’s quests
to adopt, implement, and maintain this
-Creation of duplicate technology
copies in alternate -Data could leak
● Risks must be managed effectively; the host
locations can support between quests if
in a virtualized environment represents a
business continuity memory is not released
potential, single-point of failure in the system
and allocated by the
efforts ○ A successful attack on the host could
host in a controlled
-Application support result in a compromise that is larger in
manner
personnel can have both scope and impact
-Insecure protocols for
multiple versions of the
remote access to the PRINCIPLES AND GOOD PRACTICES FOR A
same OS, or even
management console VIRTUALIZED ENVIRONMENT
different OSs, on a
and quests could result
sinqle host to more ● To address the risks, an enterprise can often
in exposure of
easily support users implement or adapt the same principles and
administrative
operating in different good practices for a virtualized server
credentials
environments environment, that it will use for a server form
- a single machine can a. Strong physical and logical access controls,
house a multitier especially over the host and its management
network in an console
b. Sound configuration management practices
educational lab
and system hardening for the host including:
environment without
i. Patching
costly reconfigurations
ii. Antivirus
of physical equipment
iii. Limited services
iv. Logging
-smaller organizations v. Appropriate permission
that had performed vi. Other configuration settings
tests in the production c. Appropriate network segregation including the
environment may be avoidance of virtual machines in the DMZ and
better able to set up the placement of management tools on a
logically separate, separate network segment
d. Strong change management practices
cost-effective
development & test
Key Risk Areas
environments
-if set up correctly, a ● Migrating computer resources to virtualized
well-built, single access environment DOES NOT change the threats
control on the host can plane for most of the system’s vulnerabilities
provide tighter control and threats
for the host’s multiple ○ If a service has inherent vulnerabilities
on a physical server/network products
guests
and it is migrated to a virtualized
server, the server remains vulnerable contents of randomaccess
to exploitations memory (RAM) at the time the
● The use of virtualization: increase in likelihood snapshot was taken; include
of attacks due to additional virtual sensitive information that was
environment attack paths (vectors; hypervisor no stored on the drive itself
configuration or security flaws, memory 4. Absence of hypervisor controls in hosted
leakage, etc.) virtualization: anyone who can launch an
application on host OS can run hypervisor
● In contrast to bare-metal installations,
hosted virtualization products rarely
HIGH-LEVEL RISKS IN VIRTUALIZED SYSTEMS have hypervisor access controls
● The only access control to address
(representative of the majority of virtualized systems in
this is whether someone can log into
use)
the host OS
1. Rootkits on the host: installing themselves as
Typical Controls
a hypervisor below the OS enables
interception of operations of any of the guest An IS auditor should understand the following
OS (logging password entry, etc.) concepts:
a. Antivirus may not detect this because
the malware runs below the entire OS a. Securely configure hypervisors and guest
2. Improper configuration of hypervisor images (OS & networks) according to industry
partitioning resources: standards
a. CPU ● Apply hardening to these virtual
b. Memory components, as closely as one would
c. disk space do to a physical server (switch,
d. Storage firewall, or other
- Leads to unauthorized access b. Protect hypervisor communications on a
to resources, wherein one dedicated management network
guest OS injecting malware to ● Management communications carry
another or placing malware on a trusted network, should be
code into another guest OS encrypted and encryption should
memory encapsulate the management traffic
3. Guest tools: this mechanism enable guest OS c. Patch the hypervisor, as the vendor releases
to access files, directories, the copypaste the fixes
buffer, and other resources on the host OS or d. Synchronize the virtualized infrastructure to
another guest OS trusted authoritative timeserver
- this functionality can inadvertently e. Disconnect unused physical hardware from
provide attack paths (vector) for the host system
malware or allow an attacker to gain f. Disable all hypervisor services (flipboard or file
access to particular resources sharing between guest OS or host OS), unless
- snapshots or images of test needed
environments containing sensitive g. Enable host inspection capabilities to monitor
data (password, personal data, etc.) security of each guest OS
make a physical hardware h. Enable host inspection capabilities to monitor
- Snapshots are a holder of security of activities occurring between guest
risks than images because the OSs
snapshots contain the
● Of special focus is communications in a
non-virtualized environment carried and
monitored over networks by network security
controls such as:
○ Network firewalls
○ Security appliances
○ Network IDPS sensor
I. Use file integrity monitoring of the hypervisor
to monitor for signs of compromise
REFERENCES:
ISACA. (2019). CISA review manual (27th ed.).
Prepared By:
Krishia Angeles
Justine Angela Cureg
Marian Martina Firme
Jyruenth Llausas
Pam Porciuncula
Jenny Rose Villegas
Nicole Vinuya