Ebook - CISSP - Domain - 07 - Security Operations
Ebook - CISSP - Domain - 07 - Security Operations
Kevin, as a part of his preparation for the CISSP exam, read the
Operational Security policy of Nutri Worldwide Inc.
There were clear guidelines on the operations and escalation matrix
listed the steps that the operations personnel should follow when
they do not have the authorization to perform a specific action.
The policy also clearly outlined the roles and responsibilities with the
level and scope of the operations personnel authorization. It also
defined the disciplinary actions to be taken in case of breaches.
Kevin understood that the policy played an important role in acting
as a deterrent against deliberate misconfigurations.
Understand and Comply with Investigations
Introduction to Investigation
Investigation
Operational Criminal
investigation investigation
Types Of
Investigations
Regulatory
Civil investigation
investigation
Operational Investigation
Operational investigations
examine issues related to the Operational investigations
organization’s computing have the loosest standards
infrastructure and have the for collection of information.
primary goal of resolving
operational issues.
Criminal Investigation
Criminal investigations,
Most criminal cases must
typically conducted by law
have the evidence that
enforcement personnel,
proves the crime beyond a
investigate the alleged
reasonable doubt.
violation of criminal law.
2 Intangible information
A crime scene is the environment where the potential evidence may exist. The security professional
must understand the crime scene before starting to identify and collect the evidence.
Primary activities
of
investigations
Examine, analyze,
Establish a chain and preserve
of custody evidence
Crime Scene
Digital Forensics
Stage 3
of the investigation techniques to be used
• Identify the resources • Process data
required • Interpret the results of
the analysis
Stage 4
• Present findings
• Preserve digital
evidence
Functions of a Forensic
Forensic Disk Controller
Disk Controller
Hardware or
Network Analysis Media Analysis Software Analysis Embedded Device
Review
Timeline analysis
Firmware and
Malicious code
Log analysis dedicated memory
review
inspections
Registry analysis
Embedded operating
Path tracing Shadow volume Exploit review systems, virtualized
analysis software, and
hypervisor analysis
Evidence
Evidence
Evidence
Digital Evidence
Evidence
Authentic
Admissible in Accurate
court of law
Five Rules of
Evidence
Convincing Complete
Admissible Evidence
There are three basic requirements for evidence to be introduced in a court of law. To be considered
admissible evidence, it must meet all three of these requirements, as determined by the judge prior to
being discussed in an open court:
Discovery and
recognition
Presentation in Recording
the court of law Evidence
Lifecycle
Transportation Collection
Preservation Identification
Chain of Custody
• When dealing with digital evidence, one must apply all of the general
forensic and procedural principles.
• Upon seizing digital evidence, actions taken should not change that
evidence.
• When it is necessary for a person to access the original digital
evidence, that person should be first trained for the purpose.
Evidence Collection Guidelines
An Intrusion Detection System (IDS) detects any unauthorized intrusion in a network, server, or
system. The IDS tool is used to detect suspicious activity on the network and send an alarm to the
network administrator.
IPS is used to detect and prevent any malicious traffic or activity to gain access to the target.
IPS
SIEM
Security Information and Event Management
Security Security
Information Event
Management Management SIEM
(SIM) (SEM)
Components of SIEM:
• Data aggregation
• Correlation
• Alerting
• Dashboards
• Compliance
• Retention
• Forensic analysis
• Automated response
Continuous Monitoring
Data Loss or Leak Prevention (DLP) helps an organization to prevent the loss of its sensitive data.
Data Loss or Leak Prevention (DLP)
• Artifacts are forensic objects that may contain data or evidence relevant to the investigation.
• Artifacts can be a physical or a logical item such as a file in the laptop or the laptop itself.
• Investigators must identify and collect artifacts in their custody as evidence.
Examples include:
• Open-source intelligence
• Social media intelligence
• Human Intelligence
• Technical intelligence
• Intelligence from the deep and dark web
User and Entity Behavior Analytics (UEBA)
User UEBA technology can monitor user behavior for any peculiar or suspicious behavior.
UEBA technology can monitor other entities besides users such as routers, servers,
Entity applications, or even IoT devices.
It establishes baseline of normal behavioral profiles and patterns and then identifies
Behavior
anomalies that deviate from that baseline, which have security significance.
The analytics tools based on AI and machine learning algorithms do not require
Analytics signatures or human intervention and provide automated, accurate threat and anomaly
detection.
Perform Configuration Management
Configuration Management
Manage changes
Configuration Management
Benefits:
Accounts with greater privileges are distinct from less privileged user accounts.
Ordinary user Assigned to most users with access limited by following the principles of
accounts least privilege and need-to-know
Monitoring Special Privileges
Information assets include all forms of information and types of intellectual properties. Information
assets are hard to evaluate and delineate.
Account
Changing the default passwords and disabling accounts
maintenance:
Diagnostic port Monitoring port usage by authorized personnel and block internal
controls: or external unauthorized access
Hardware
Securing the server room, data center, and media storage with locks
physical
and alarms
controls:
Controls for Protecting Assets: Software Controls
Some of the elements of controls on software are antivirus management, software testing, powerful
system utilities, and safe software storage.
Data remanence Refers to the data left on the media after the data has been erased
A practice of detecting a
Any observable occurrence in a Any event that negatively affects
problem, determining its cause,
system or a network the company and impacts its
minimizing the damage it
security posture
causes, resolving the problem,
and documenting each step of
the response for future
references
Incident Response Goals
An incident response team is a group of people who prepare for and respond to emergencies.
Lessons
Detection Response Mitigation Reporting Recovery Remediation Learned
• Automated detection capabilities include network-based and host-based IDPSs, antivirus software,
and log analyzers.
Lessons
Detection Response Mitigation Reporting Recovery Remediation Learned
• The triage process will ensure that only valid alerts are promoted to investigation or incident
status. False positives or incorrect alerts are identified and removed.
• Information is collected to investigate its severity and set priorities on how to deal with the incident.
• Incidents are categorized according to their severity level, level of potential risk, the source whether
it is internal or external, its rate of growth, and the ability to contain the damage.
• More data is gathered to try and figure out the root cause of the incident.
Incident Response Life Cycle
Lessons
Detection Response Mitigation Reporting Recovery Remediation Learned
• The goal of mitigation is to prevent or minimize any further loss or damage from this incident so
that you can begin to recover and remediate.
• Prioritizes the mitigation of most critical assets, followed by mitigation of less important assets.
• Isolation and containment can limit the exposure of your organization and prevent further damage.
• The response team needs to take its last forensic samples prior to commencing mitigation activities.
Incident Response Life Cycle
Lessons
Detection Response Mitigation Reporting Recovery Remediation Learned
The incident response team should document and maintain the status of the incidents to help ensure
that incidents are handled and resolved in a timely manner.
Incident Response Life Cycle
Lessons
Detection Response Mitigation Reporting Recovery Remediation Learned
Lessons
Detection Response Mitigation Reporting Recovery Remediation Learned
Recovery and repair phase is the process of restoring a system to its pre-incident condition. Recovery
and repair activities include:
Lessons
Detection Response Mitigation Reporting Recovery Remediation Learned
• Remediation involves measures to ensure that the particular attack will never again be successful
against the organization.
Incident Response Life Cycle
Lessons
Detection Response Mitigation Reporting Recovery Remediation
Learned
• This final stage is often skipped as the business moves back into normal operations but it’s critical to
look back and heed the lessons learned.
• Holding a lessons learned meeting with all involved parties after a major incident, and optionally
periodically after lesser incidents as resources permit, provides a chance to achieve closure with
respect to an incident by reviewing what occurred, what was done to intervene, and how well
intervention worked.
• A follow-up report for each incident provides a reference that can be used to assist in handling
similar incidents in the future.
Operate and Maintain Detective and Preventive Measures
Firewalls
Whitelisting Blacklisting
• Whitelisting allows access for only approved • Blacklisting blocks access to suspicious or
entities. malicious entities.
Vulnerability assessment
Threat intelligence and Physical security
penetration testing
Deep Learning
Artificial Intelligence:
Engineering of computers to
mimic human behavior
Machine Learning:
Automate Use machine learning to automate repetitive security tasks for higher levels of accuracy and
Tasks in a fraction of the time
Threat Hunting Search of recurrent patterns, anomalous behavior, and other outliers
Application
Automate code reviews with AI to help eliminate false negatives and false positives
Security
In 2019, Google integrated TensorFlow in Gmail to try and block the last 0.1% of spam emails from getting
through. TensorFlow is an open-source machine learning (ML) framework developed at Google in 2015.
TensorFlow’s advantage is that it allows Gmail’s team to refine its existing machine learning algorithms so
they’re even more accurate at detecting spam. With TensorFlow, Google can also better personalize its spam
protection for each user. The same email could be considered spam to one person but important information
to another.
Gmail has announced that with TensorFlow it is now able to detect 100 million more spam emails every day.
Implement and Support Patch and Vulnerability Management
Patch Management
Patch
Patch Management
Patch management:
Types of Patches
Small updates with a specific Tested and cumulative set of all Address a noncritical, non-
purpose that alter the behavior hotfixes, security updates, and security-related bug and are a fix
of installed applications in a critical updates for a specific problem
limited manner
Patch Management Activities and Cycle
• Compliance
Deploy Test
patch patch
Vulnerability Management
Equifax Inc., an American multinational consumer credit reporting agency, suffered a data breach
between May and July 2017 that affected at least 147 million individuals. The leaked data included
sensitive PII such as first and last names, Social Security numbers, birth dates, addresses, and
driver's license numbers.
An investigation revealed that Equifax had failed to implement basic security measures as it failed
to implement a policy to ensure that security vulnerabilities were patched, failed to segment its
database servers to block access to other parts of the network once one database was breached,
and failed to install robust intrusion detection protections for its legacy databases.
Real-World Scenario
Following the huge data breach, Equifax’s CIO, CSO, and CEO resigned.
Equifax Inc. agreed to pay at least $575 million, and potentially up to $700
million, as part of a global settlement.
The company was initially hacked via an unpatched server housing Equifax’s
online dispute portal.
After gaining the ability to issue system-level commands on the online dispute
portal, the attackers were able to access additional databases as these systems
were not isolated or segmented from each other.
Equifax discovered the breach on July 29, 2017, but they didn’t alert the public
until September.
Understand and Participate in Change Management Processes
Change Management
Changes to the system are tracked and approved through change control procedures. It includes
identifying, controlling, and auditing all changes made to the system.
Change control:
The procedures for change control process implementation and support are:
1. Request for Request is sent to the responsible individual or group who administers and
a change to approves changes
be introduced Mandatory vacation
2. Change
After proper analysis and justification for change, it is approved
approval
Mandatory vacation
3. Change
intended Change control log is updated and documented
cataloging Mandatory vacation
Information Security Management
The procedures for change control process implementation and support are:
5. Change
scheduling and Change is scheduled and implemented
implementation Mandatory vacation
6.Report to the
appropriate
parties about Change is summarized and reported to the management
the change Mandatory vacation
Change Types
Standard A pre-authorized, low-risk, and low-impact change that is well understood, fully
change documented, and can be implemented without needing additional authorization
Emergency A high-impact and urgent change that must be implemented as soon as possible
change without strictly following the standard process
Implement Recovery Strategies
Backup Methods
Backup methods ensure data integrity and network availability by protecting and restoring deleted,
corrupted, or lost information. The different methods are:
• It is the starting point for all • It contains all files • It stores all files that have
other types of backups. that have changed changed since the last full,
• It contains all the data in the since the last full differential, or incremental
folders and files that are backup, the latest full backup.
Methodology selected to be backed up. backup, and the • When restoring from an
• A single full backup can latest differential incremental backup, the most
provide the ability to backup is needed for recent full backup as well as
completely restore all a complete every incremental backup
backed-up files. restoration. made since the last full backup
are needed.
Backup speed Slow Medium Fast
Restoration speed Fast Medium Slow
Storage space
High Medium Low
required
Develop a Recovery Strategy
The way in which a subject will access an object is guided by an access control model. A model
must be chosen to fulfill the directives of the security policy.
• Hot site
• Warm site
• Cold site
Additional location options include reciprocal or mutual aid agreements, mobile sites,
multiple processing centers, service bureaus, self service, surviving sites, internal
arrangements, and work from home.
Recovery Partner Strategies
• Recovery contracts with an offsite service bureau helps to have the site ready
Service and available for the organization during emergencies
bureaus
• Offer expertise in processes, technology, and business-domains to customers
Backup Sites
Backup sites are locations where the business can be recovered in the event of a disaster at the primary site.
The different backup sites available are:
1
Mirror site
Backup sites are locations where the business can be recovered in the event of a disaster at the primary site.
The different backup sites available are:
1
Hot site
Backup sites are locations where the business can be recovered in the event of a disaster at the primary site.
The different backup sites available are:
1
Warm site
Backup sites are locations where the business can be recovered in the event of a disaster at the primary site.
The different backup sites available are:
1
Cold site
Backup sites are locations where the business can be recovered in the event of a disaster at the primary site.
The different backup sites available are:
1
Mobile site
Fault tolerance is provided by redundant items within a system. The usage of the spare components will
determine if it is a cold, warm, or hot spare. In the event of component failure, the fault tolerant system can
continue to operate through:
Automatic
Redundant power supplies: Redundant or dual power supplies are common in systems
where failures cannot be tolerated.
Example: Core network switches
Redundancy and Fault Tolerance
Fault tolerance is provided by redundant items within a system. The usage of the spare components will
determine if it is a cold, warm, or hot spare. In the event of component failure, the fault tolerant system can
continue to operate through:
Website
servers
Write Queries
Read Queries
Master Node
Load
Replication Balancer
Cluster
Server 1 Server 2
Redundancy and Fault Tolerance Methods
Active-passive mode
• One (or more) server actively services requests and one (or
more) server remains in a standby state to be able to switch
immediately to active mode when the active server fails.
Server 1 Server 2
Redundancy and Fault Tolerance Methods
The types of Redundant Arrays of Inexpensive Disks or Redundant Arrays of Independent Disks
(RAIDs) are:
Training
Lessons learned Personnel Assessment And
awareness
• The BCDR plan must provide for both major and minor
disasters.
The effective execution of these plans will depend on the employees knowing what they have to do and
under which circumstances.
• Awareness is less formal than training and is generally targeted at all employees in the organization.
• Awareness includes frequent distribution of information (newsletter, email, posters, flyers).
Training
Training programs should be designed and developed by the organizations for all the BCP or DR activities
A review:
Step 2: Identify potential • Identify important personnel, systems, and equipment that are
disasters required for recovery
• Define the roles and responsibilities of the team members
Step 3: Define the BCP • Document the continuity strategy, which includes guidance on
strategy declaring a disaster
Employee Parking
access into the facility. Rack
Delivery
Service
Room
• It employs the defense-in-depth concept.
Data Center
Barriers define how an area should be designed in order to obstruct or deny access.
Fences are perimeter identifiers that are designed and installed to keep intruders out.
Height Effectiveness
The various types of fences include: Deters casual
3 -4 ft.
trespassers
• Chain link
Too difficult to climb
• Barbed wire 6 – 8 ft.
easily
• Barbed tape
• Concertina wire 8 ft. plus 3 Strands of barbed Deters determined
or razor wire trespassers
Walls and Bollards
Perimeter sensors alert security when any intruders attempt to gain access across the open space or
attempt to breach the fence line.
• Infrared
• Microwave systems
• Time-domain reflectometry (TDR) systems
• Video content analysis and motion path analysis
Business Scenario
Hilda Jacobs, general manager, was assigned the task of designing perimeter security for a
new office in India. Kevin travelled to India on a short trip to understand the surroundings
of the new office.
The location had already been fixed, but Kevin found that the surrounding
area had recently seen a spike in the crime rate and thus had a high potential
of unauthorized intrusions. The site had many concrete and steel structures in
the open compound. Kevin submitted his report to Hilda.
Question: Which perimeter intrusion detection system should Hilda choose based on Kevin’s report?
Business Scenario
Hilda Jacobs, general manager, was assigned the task of designing perimeter security for a
new office in India. Kevin travelled to India on a short trip to understand the surroundings
of the new office.
The location had already been fixed, but Kevin found that the surrounding
area had recently seen a spike in the crime rate and thus had a high potential
of unauthorized intrusions. The site had many concrete and steel structures in
the open compound. Kevin submitted his report to Hilda.
Question: Which perimeter intrusion detection system should Hilda choose based on Kevin’s report?
Answer: Microwave sensors can be used since they can pass through concrete and steel structures.
Importance of Lighting
Continuous Light
Standby light
Lighting Systems
Emergency light
Movable light
Types of Lights
Types of Lights
Door Contact
The different types of access cards are magnetic stripe, proximity card,
Access cards
and smart card.
CCTV color CCTV color cameras offer additional information, such as the color of a
cameras vehicle or a subject’s clothing.
Types of Access Control Systems
Digital video
It is used to download camera footage to a hard drive for storage of
recorder (DVR) and
historical information.
monitor displays
Guard dogs Guard dogs are a form of physical control that can serve as detective,
preventive, and deterrent controls.
Securing a Building
The purpose of security training and awareness is to equip the learner with the knowledge, skill, and
competence to recognize security threats and maintain safety practices.
Emergency management is the organization and management of the resources and responsibilities
needed to withstand, respond to, and recover from all types of emergencies and disasters.
Mitigation
Preparedness
Recovery
Emergency
Management
Responses
Duress