0% found this document useful (0 votes)
7 views

Ebook - CISSP - Domain - 07 - Security Operations

Uploaded by

selwyn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Ebook - CISSP - Domain - 07 - Security Operations

Uploaded by

selwyn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 193

Certified Information Systems

Security Professional (CISSP)


Certification Training Course
Domain 07: Security Operations
Learning Objectives

By the end of this lesson, you will be able to:

Understand and comply with investigations

Apply foundational security operations concepts

Apply resource protection

Operate detective and preventive measures

Implement disaster recovery (DR) processes

Test disaster recovery plans (DRP)

Participate in business continuity (BC) planning and exercises

Implement and manage physical security


Introduction to Security Operations
Importance of Security Operations: Case Study

Kevin, as a part of his preparation for the CISSP exam, read the
Operational Security policy of Nutri Worldwide Inc.
There were clear guidelines on the operations and escalation matrix
listed the steps that the operations personnel should follow when
they do not have the authorization to perform a specific action.

The policy also clearly outlined the roles and responsibilities with the
level and scope of the operations personnel authorization. It also
defined the disciplinary actions to be taken in case of breaches.
Kevin understood that the policy played an important role in acting
as a deterrent against deliberate misconfigurations.
Understand and Comply with Investigations
Introduction to Investigation

Investigation

• An investigation is a systematic, minute, and thorough


attempt to learn the facts about something complex
or hidden. It is often formal and official.
• Example: Investigation of a bank failure

• Digital investigations involve investigations of all


crimes conducted using computer and related
technologies where the evidence exists in an
electronic or a digital form or in a storage or on a wire.

• Investigation of computer crimes is also known as


computer forensics.
Introduction to Investigation

Operational Criminal
investigation investigation

Types Of
Investigations

Regulatory
Civil investigation
investigation
Operational Investigation

Operational investigations
examine issues related to the Operational investigations
organization’s computing have the loosest standards
infrastructure and have the for collection of information.
primary goal of resolving
operational issues.
Criminal Investigation

Criminal investigations,
Most criminal cases must
typically conducted by law
have the evidence that
enforcement personnel,
proves the crime beyond a
investigate the alleged
reasonable doubt.
violation of criminal law.

Criminal investigations may


result in charging suspects
with a crime and the
prosecution of those charges
in a criminal court.
Civil Investigation

Civil investigations typically do not involve law


enforcement but rather involve internal employees and
outside consultants working on behalf of a legal team.

Most civil cases do not follow the beyond a reasonable


doubt standard of proof. Instead, they use the weaker
preponderance of the evidence standard.

They prepare the evidence necessary to present a case


in a civil court resolving a dispute between two parties.
Regulatory Investigation

Government agencies may


Regulatory investigations vary
conduct regulatory
widely in scope and procedures
investigations when they
and are almost always
believe that an individual or a
conducted by government
corporation has violated
agents.
administrative law.
Investigation Challenges

1 Compressed time frame for the investigation

2 Intangible information

3 Difficulty in gathering the evidence

The investigation may interfere with the normal conduct of the


4
business of an organization

Data associated with the criminal investigation may be located on a


5
common computer that is used for the normal conduct of business

6 An expert or a specialist is required to retrieve data

Locations involved in the crime may be geographically separated by


7
long distances in different jurisdictions
Investigation: Primary Activities

A crime scene is the environment where the potential evidence may exist. The security professional
must understand the crime scene before starting to identify and collect the evidence.

Present findings Identify and


gather evidence

Primary activities
of
investigations

Examine, analyze,
Establish a chain and preserve
of custody evidence
Crime Scene

Best practices to handle evidence


at a crime scene

• Identifying the crime scene


• Protecting the environment
• Identifying evidence
• Identifying the potential sources of evidence
• Collecting evidence
• Reducing the degree of contamination
Digital Forensics

Digital Forensics

Digital forensics, sometimes The goal of digital forensics is to


known as digital forensic science, examine digital media in a
is a branch of forensic science forensically sound manner with
encompassing the recovery and the aim of identifying, preserving,
investigation of material found in recovering, analyzing, and
digital devices, often in relation to presenting facts and opinions
cyber crimes. about the digital information.
Forensic Process

Investigation Preparation Analysis of Evidence

• Identify the purpose • Identify tools and


Stage 1

Stage 3
of the investigation techniques to be used
• Identify the resources • Process data
required • Interpret the results of
the analysis

• Identify the sources • Report findings


of digital evidence
Stage 2

Stage 4
• Present findings
• Preserve digital
evidence

Evidence Acquisition Dissemination of Results


Forensic Investigation Guidelines

Best practices according to Forensic Australian Computer


Emergency Response Team

• Minimize handling or corruption of the original data


• Account for any changes and keep detailed logs of your actions
• Comply with the five rules of evidence
• Do not exceed knowledge and take the aid of experts and
specialists if required
• Follow local security policies and obtain written permission
• Capture an accurate image of the system as possible
• Be prepared to testify
• Ensure actions are repeatable
• Work fast and proceed from volatile to persistent evidence
• Do not run any programs on the affected system

Information source: https://www.auscert.org.au/publications/2017-09-11-collecting-electronic-evidence-after-sy


Forensic Disk Controller or Write Blocker

Functions of a Forensic
Forensic Disk Controller
Disk Controller

• A forensic disk controller or a hardware • A hardware write-block (HWB) device will


write-block device is a specialized type of not transmit a command to a protected
computer hard disk controller made for storage device that modifies the data on
the purpose of gaining read-only access to the storage device.
computer hard drives without the risk of
• An HWB device will return the data
damaging the drive's contents.
requested by a read operation.
• The device is named forensic disk
• An HWB device will return without
controller because its most common
modification any access-significant
application is used in investigations where
information requested from the drive.
a computer hard drive may contain
evidence. • Any error condition reported by the
storage device to the HWB device will be
reported to the host.
Forensics Investigative Assessment Types

Hardware or
Network Analysis Media Analysis Software Analysis Embedded Device
Review

Disk imaging Dedicated appliance


Traffic analysis Reverse engineering
attack points

Timeline analysis
Firmware and
Malicious code
Log analysis dedicated memory
review
inspections
Registry analysis
Embedded operating
Path tracing Shadow volume Exploit review systems, virtualized
analysis software, and
hypervisor analysis
Evidence

• The available body of facts or information indicating


whether a belief or proposition is true or valid.

• Evidence, broadly construed, is anything presented in


support of an assertion.

Evidence
Evidence

• Digital evidence or electronic evidence is any probative


information stored or transmitted in the digital form that
a party may use at a trial in court.

Digital Evidence
Evidence

• It is related to the crime.


• It can provide information describing the crime.
• It can provide information regarding the motives of the
perpetrator.
• It can verify what has occurred.
• It can determine the time of occurrence of the crime.
Evidence is
relevant when:
Evidence

Authentic

Admissible in Accurate
court of law
Five Rules of
Evidence

Convincing Complete
Admissible Evidence

There are three basic requirements for evidence to be introduced in a court of law. To be considered
admissible evidence, it must meet all three of these requirements, as determined by the judge prior to
being discussed in an open court:

Relevant: Material: Competent:

The evidence must be


competent which means it must
The evidence must be relevant to The fact that the evidence seeks have been obtained legally.
determining a fact. to determine must be material, Evidence that results from an
that is, related to the case. illegal search would be
inadmissible, because it is not
competent.
Evidence Life Cycle
The gathering, control, storage, and preservation of evidence are extremely critical in any legal
investigation. The major components of an evidence life cycle are given below:

Discovery and
recognition

Returning the evidence


to the owner Protection

Presentation in Recording
the court of law Evidence
Lifecycle

Transportation Collection

Preservation Identification
Chain of Custody

Chain of Custody (CoC)

• In legal context, it refers to the chronological documentation or


paper trail that records the sequence of custody, control,
transfer, analysis, and disposition of physical or electronic
evidence.

• Chain of custody shows how the evidence was collected,


analyzed, transported, and preserved to be presented in court.
Chain of Custody

Major components of the Chain of Custody

• Location of evidence when it was obtained


• Time at which evidence was obtained
• Identification of individual(s) who discovered evidence
• Identification of individual(s) who secured evidence
• Identification of individual(s) who controlled evidence and
individual(s) who maintained possession of that evidence
Evidence Collection Guidelines

Scientific Working Group on Digital Evidence


(SWGDE) Guidelines:

• When dealing with digital evidence, one must apply all of the general
forensic and procedural principles.
• Upon seizing digital evidence, actions taken should not change that
evidence.
• When it is necessary for a person to access the original digital
evidence, that person should be first trained for the purpose.
Evidence Collection Guidelines

Scientific Working Group on Digital Evidence


(SWGDE) Guidelines:
• All activities related to the seizure, access, storage, or transfer of
digital evidence must be fully documented, preserved, and available
for review.
• An individual is responsible for all actions taken with respect to digital
evidence while the digital evidence is in his possession.
• Any agency that is responsible for seizing, accessing, storing, or
transferring digital evidence is responsible for compliance with these
principles.
E-Discovery

Electronic discovery, also called


e-discovery, refers to any process
in which electronic data is sought, This discovery process applies to
located, secured, and searched both paper records and electronic
with the intent of using it as records.
evidence in a civil or criminal
legal case.

Electronic discovery process


facilitates the processing of
electronic information for
disclosure.
Conduct Logging and Monitoring Activities
Intrusion Detection System

An Intrusion Detection System (IDS) detects any unauthorized intrusion in a network, server, or
system. The IDS tool is used to detect suspicious activity on the network and send an alarm to the
network administrator.

IDS Types HIDS and NIDS Types


• Network-based IDS (NIDS): Dedicated • Signature-based
appliances or a system having its
• Statistical anomaly-based: Traffic
Network Interface Card (NIC) in
anomaly, protocol anomaly
promiscuous mode and with the
• Rule-based: Model-based,
necessary software installed
stateful matching
• Host-based IDS (HIDS): Monitors for
malicious or anomalous activity on a
workstation or a server
Intrusion Prevention System

IPS is used to detect and prevent any malicious traffic or activity to gain access to the target.

IPS

Firewall Router Internet


IDS

Firewall Router Internet


Security Information and Event Management

• It is a term for software products and services combining


security information management (SIM) and security
event management (SEM).

• SIEM technology provides real-time analysis of security


alerts generated by network hardware and applications.

SIEM
Security Information and Event Management

Security Security
Information Event
Management Management SIEM
(SIM) (SEM)

FIGURE 2.13 The SIEM system


Security Information and Event Management

Components of SIEM:

Security event management (SEM): Security information management (SIM):

The segment of security management The second area provides long-term


that deals with real-time monitoring, storage, analysis, and reporting of log
correlation of events, notifications, and data.
console views is commonly known as
SEM.
SIEM Functionality

Security Information and Event


Management

• Data aggregation
• Correlation
• Alerting
• Dashboards
• Compliance
• Retention
• Forensic analysis
• Automated response
Continuous Monitoring

A continuous monitoring system must The security practitioner must be


meet the organization’s security acquainted with Continuous
requirements. The security architect Monitoring as a Service (CMaaS).
must design and implement a There are many agencies that offer
continuous monitoring program that CMaaS such as, General Services
protects the organization’s critical Administration (GSA) and Federal
information assets. Acquisition Service (FAS).
Egress Filtering

Egress filtering prevents any unauthorized or malicious traffic to


leave the internal network. Information flowing from the internal
network to the internet is monitored and controlled. TCP/IP
packets that are being sent out of the internal network are
examined through a router, firewall, or a similar edge device.
Egress filtering should comply with the standards and regulations

Example: Payment Card Industry Data Security Standard (PCI DSS)


requires egress filtering from any server in the cardholder
environment.
Data Loss or Leak Prevention (DLP)

Data Loss or Leak Prevention (DLP) helps an organization to prevent the loss of its sensitive data.
Data Loss or Leak Prevention (DLP)

The key objectives of DLP Some of the benefits of DLP


include: include:
• Locating and cataloging critical • Protects sensitive data and intellectual
information stored throughout the property of an organization
enterprise
• Meets compliance requirements
• Monitoring and controlling the sensitive
information flow across enterprise • Reduces security breaches
networks and end-user systems
Digital Forensics Tools, Tactics, and Procedures

The diagram given below shows the forensic computing process.

Identifying Preserving Analyzing Reporting

Information source: https://www.auscert.org.au/publications/2017-09-11-collecting-electronic-evidence-after-sy


and
https://www.sans.org/reading-room/whitepapers/incident/computer-forensics-weve-incident-investigate-652
Artifacts

• Artifacts are forensic objects that may contain data or evidence relevant to the investigation.
• Artifacts can be a physical or a logical item such as a file in the laptop or the laptop itself.
• Investigators must identify and collect artifacts in their custody as evidence.

Examples include:

Computer Network device Mobile device

Event logs Registry keys


Threat Intelligence

Threat intelligence is the


process of planning, collecting, Threat intelligence helps to
Threat intelligence collects process threat data to better
processing, analyzing, and
information generated from
disseminating information that understand the attackers,
a variety of internal and
poses a threat to an respond faster to incidents,
organization and the external sources in real-time
and proactively get ahead of
application of this knowledge for identifying threats.
the attacker’s next move.
in mitigating the threat.
Threat Intelligence

Cyber threat intelligence sources include:

• Open-source intelligence
• Social media intelligence
• Human Intelligence
• Technical intelligence
• Intelligence from the deep and dark web
User and Entity Behavior Analytics (UEBA)

User and Entity Behavior Analytics (UEBA) is


a cyber threat detection technology that UEBA can identify abnormal behavior,
uses machine learning and deep learning determine if it has security implications,
technologies to model the behavior of and accordingly alert the security team.
users and devices on corporate networks. Malware
Event

SIEM UEBA SOAR


User and Entity Behavior Analytics (UEBA)

User UEBA technology can monitor user behavior for any peculiar or suspicious behavior.

UEBA technology can monitor other entities besides users such as routers, servers,
Entity applications, or even IoT devices.

It establishes baseline of normal behavioral profiles and patterns and then identifies
Behavior
anomalies that deviate from that baseline, which have security significance.

The analytics tools based on AI and machine learning algorithms do not require
Analytics signatures or human intervention and provide automated, accurate threat and anomaly
detection.
Perform Configuration Management
Configuration Management

• Configuration management is a formalized


higher-level process of managing changes in a
complicated system.

• Change control falls under configuration


management.
Configuration Management

Configuration management applies technical and administrative directions to:

Identify and document the


functional and physical Report the status of change
characteristics of each processing and implementation
configuration item

Manage changes
Configuration Management

An organized and consistent plan should cover


the following items:

• Description of physical and media controls


• Electronic transfer of software
• Communication software and protocols
• Encryption methods and devices
• Security features and limitations of software
• Hardware requirements, settings, and protocols
• System responsibilities and authorities
Baselining

A baseline defines the common minimum


requirements of a service, product, or
infrastructure that has been formally reviewed
and accepted as the basis for further activities.

Baseline controls can be applied to policies,


standards, procedures, responsibilities,
requirements, impact assessments, and
software-level maintenance.
Provisioning

Provisioning is the Infrastructure as code


process of setting up IT is the approach of
infrastructure. automating the
provisioning of
infrastructure through
code instead of manual
processes.
Configuration Automation

Configuration automation is the process of automating the deployment and configuration of


applications, servers, middleware, databases, and other IT infrastructure for both on-premises and
cloud data centre environments.

Benefits:

• Increases operational efficiency

• Enforces compliance policies and reduces risks

• Prevents data center outages caused by


configuration drifts

• Establishes best practices to change life cycle


management
Apply Foundational Security Operation Concepts
Controls for Protecting Assets: Administrative Controls

The administrative controls include:

Mandatory Vaccination Personnel security Separation of duties and


Personnel security
responsibilities
Ensure quality levels of Detect evidence of Action taken when Divide the security-
the personnel; fraud employees violate the sensitive tasks in
employment screening published computer various parts and
or background checks behavior standards assign to several
refer to pre- individuals
Mandatory vacation Mandatory vacation Mandatory vacation Mandatory vacation
employment screening
Controls for Protecting Assets: Administrative Controls

The administrative controls include:

Least privilege Need to know Change control Record retention and


documentation control

Restrict the set of Provide minimum Protect a system Administer security


privileges information to from unauthorized controls on
perform an assigned changes documentation and
task procedures
Mandatory vacation Mandatory vacation Mandatory vacation Mandatory vacation
Need for Controlling Privileged Accounts

Accounts with greater privileges are distinct from less privileged user accounts.

• Have extensive powers on a given system


• If compromised, the attacker could damage the system
• Need regular monitoring as they can be misused
• Are controlled by security operations
• Require a defined procedure

The privileged accounts:


Identity and Access Management

Identity management controls the life cycle process of


every account in a system, from provisioning of the
account to its eventual removal from the system.

Access management refers to the assignment of rights or


privileges to accounts, which will allow them to perform
their intended function.

Identity and access management (IAM) solutions focus


on harmonizing the user provisions and access
management across multiple systems with different
native access control systems.
Types of User Accounts

The two types of user accounts are:

Possess extensive powers on a given system


Privileged The four types of accounts with different levels of privilege are root or
accounts built-in administrator accounts, service accounts, administrator accounts,
and power user accounts

Ordinary user Assigned to most users with access limited by following the principles of
accounts least privilege and need-to-know
Monitoring Special Privileges

A security practitioner needs to validate and


review the privileges granted to accounts.

• Only authorized users should be granted access for a required


period of time.
• Access should only be granted based on user’s clearances,
thorough background checks, and the user’s suitability for
the role.
• Accounts should be validated and inactive accounts should be
removed from the system based on the organization’s policy.
Apply Resource Protection
Protecting Valuable Assets

Security operations should: Assets can be:

• Provide regular protection to human • Tangible


and material assets
• Intangible
• Maintain the security controls to
• Both
protect sensitive or critical resources
from being compromised
Protecting Physical Assets

The security professional


confirms the asset ownership, The IT department plays the
and security operations ensure role of the owner as well as
the protection of physical custodian of physical assets.
assets.
Protecting Physical Assets

The various types of physical assets are:

Facilities Hardware Software Media


Protecting Information Assets

Information assets include all forms of information and types of intellectual properties. Information
assets are hard to evaluate and delineate.

The important factors in protecting information assets are:

Information Information labeling


Access control Accountability
classification and handling
Protecting Resources

Resource protection is the concept of protecting an


organization’s computing resources and assets
from loss. Any software, hardware, or data owned
and used by the organization are known as
computing resources.
Protecting Resources

The resources that need protection are:

• Hardware resources: Routers, firewalls, switches,


removable drives, file servers, workstations,
disks, gateways, and printers
• Software resources: Program libraries, source
code, vendor software, proprietary software,
and operating system software
• Data resources: Backup data, user data files,
password files, operating data directories,
system logs, and audit trails
Controls for Protecting Assets: Hardware Controls

The hardware controls include:

Hardware Background investigations and escorting maintenance and service


maintenance: personnel as they have logical and physical access to the system

Account
Changing the default passwords and disabling accounts
maintenance:

Diagnostic port Monitoring port usage by authorized personnel and block internal
controls: or external unauthorized access

Hardware
Securing the server room, data center, and media storage with locks
physical
and alarms
controls:
Controls for Protecting Assets: Software Controls

Some of the elements of controls on software are antivirus management, software testing, powerful
system utilities, and safe software storage.

The software controls include:

Transaction Change controls Test controls Backup controls


controls

Controls all phases Preserves data Prevents Allows users to back


of a transaction integrity in a system confidentiality up their own data in
Example: Input while changes are violation and a distributed
controls, processing being made to the ensures the integrity environment
controls, and output configuration of a transaction
controls
Controls for Protecting Assets: Media Controls

The media controls include:


• Refers to the duration for which transactions and other types of
records, such as legal documents, audit trails, and emails, should be
Record retention retained
• This can be done according to management, legal, and audit or tax
compliance requirements

Data remanence Refers to the data left on the media after the data has been erased

• Refers to the reassignment to some subject of a storage medium,


such as page frame, disk sector, and magnetic tape, that contains
Object reuse one or more objects
• To be securely reassigned so that no residual data is available to
the new subject through standard system mechanisms
Conduct Incident Management
Incident Management

Event Incident Incident response

A practice of detecting a
Any observable occurrence in a Any event that negatively affects
problem, determining its cause,
system or a network the company and impacts its
minimizing the damage it
security posture
causes, resolving the problem,
and documenting each step of
the response for future
references
Incident Response Goals

The goals of incident response are:

Reduce the potential impact Provide management with


to the organization sufficient information

Deter attacks through Maintain or restore business


investigation and prosecution continuity

Defend against future attacks


Incident Response Team

An incident response team is a group of people who prepare for and respond to emergencies.

Basic checklist of an incident response team

• A list of outside agencies and resources to contact or report to


• An outlined list of roles and responsibilities
• A call tree to contact the defined roles and outside entities
• A detailed procedure to secure and preserve evidence
• A list of items that should be included in the report for the
management and the courts
• A description of how different systems should be treated in a
particular situation
Incident Management: Planning and Preparation

Incident response policy


and procedures

Collection of threat and Incident response


vulnerability intelligence 1 handling
methodologies
7 2

Incident response plan tests 6 3


Communication plan for
and team drills
internal and external parties
5 4

Regular skill development, Call tree and notification


improvement, and training for processes for solutions,
information security staff products, and support teams
Incident Response Life Cycle

Lessons
Detection Response Mitigation Reporting Recovery Remediation Learned

• Automated detection capabilities include network-based and host-based IDPSs, antivirus software,
and log analyzers.

• Manual detection includes problems reported by end users.


Incident Response Life Cycle

Lessons
Detection Response Mitigation Reporting Recovery Remediation Learned

• The triage process will ensure that only valid alerts are promoted to investigation or incident
status. False positives or incorrect alerts are identified and removed.

• Information is collected to investigate its severity and set priorities on how to deal with the incident.

• Incidents are categorized according to their severity level, level of potential risk, the source whether
it is internal or external, its rate of growth, and the ability to contain the damage.

• More data is gathered to try and figure out the root cause of the incident.
Incident Response Life Cycle

Lessons
Detection Response Mitigation Reporting Recovery Remediation Learned

• The goal of mitigation is to prevent or minimize any further loss or damage from this incident so
that you can begin to recover and remediate.

• Prioritizes the mitigation of most critical assets, followed by mitigation of less important assets.

• Isolation and containment can limit the exposure of your organization and prevent further damage.

• The response team needs to take its last forensic samples prior to commencing mitigation activities.
Incident Response Life Cycle

Lessons
Detection Response Mitigation Reporting Recovery Remediation Learned

The incident response team should document and maintain the status of the incidents to help ensure
that incidents are handled and resolved in a timely manner.
Incident Response Life Cycle

Lessons
Detection Response Mitigation Reporting Recovery Remediation Learned

The document could contain the following information:


• The current status of the incident (new, in progress, forwarded for investigation, or resolved)
• Summary of the incident
• Related incidents
• Actions performed
• Chain of custody (if applicable)
• Impact assessment report
• List of evidence gathered
• Comments of incident handlers
• Next actions
Incident Response Life Cycle

Lessons
Detection Response Mitigation Reporting Recovery Remediation Learned

Recovery and repair phase is the process of restoring a system to its pre-incident condition. Recovery
and repair activities include:

• Repairing or replacing hardware

• Reinstalling, reconfiguring operating system, or application software

• Removing unwanted programs and data

• Restoring damaged or missing data from the backup media


Incident Response Life Cycle

Lessons
Detection Response Mitigation Reporting Recovery Remediation Learned

• Remediation is the post-incident repair of affected systems, communication and instruction to


affected parties, and analysis that confirms the incident has been contained.

• Remediation involves measures to ensure that the particular attack will never again be successful
against the organization.
Incident Response Life Cycle

Lessons
Detection Response Mitigation Reporting Recovery Remediation
Learned

• This final stage is often skipped as the business moves back into normal operations but it’s critical to
look back and heed the lessons learned.

• Holding a lessons learned meeting with all involved parties after a major incident, and optionally
periodically after lesser incidents as resources permit, provides a chance to achieve closure with
respect to an incident by reviewing what occurred, what was done to intervene, and how well
intervention worked.

• A follow-up report for each incident provides a reference that can be used to assist in handling
similar incidents in the future.
Operate and Maintain Detective and Preventive Measures
Firewalls

Network These are purpose-built appliances for securing enterprise


Firewall corporate networks.

Web WAF is designed to protect web applications and APIs from


Application a variety of attacks, including automated (bots), injection
Firewall (WAF) and application-layer denial of service (DoS).

Next NGFW is a deep-packet inspection firewall that moves beyond


Generation port or protocol inspection and blocking to add application-level
Firewall inspection, intrusion prevention, and bringing intelligence from
(NGFW) outside the firewall.
Whitelisting and Blacklisting

Whitelisting Blacklisting

• Whitelisting allows access for only approved • Blacklisting blocks access to suspicious or
entities. malicious entities.

• The default is to block access. • The default is to allow access.

• Whitelisting is trust-centric. • Blacklisting is threat-centric.


Third-Party Provided Security Services

Security services provided by third-party are:

Vulnerability assessment
Threat intelligence and Physical security
penetration testing

Network management Audits and forensics


Sandboxing

Sandboxing is a technique used to safely evaluate the


threat in an isolated test environment (sandbox).

• Sandboxing is used to test suspicious programs that


may contain a virus or other malicious code in an
isolated environment, without allowing the software
to harm the host device.

• It provides effective protection against zero-day


attacks and advanced threats.

• Suspicious email attachments are sent to a virtual


sandbox that performs deep analysis for malicious
activity.
Sandboxing

Virtualization Hardware or Full System


Operating Systems Emulation
Emulation
Physical controls
This approach uses a The sandbox emulates the The sandbox emulates the
virtual machine (VM) entire hardware, including operating system but not
based sandbox to contain CPU and memory, and I/O the machine hardware
and test suspicious devices, providing deep which allows for greater
programs in an isolated visibility into program visibility into what the
environment. behavior and impact. malware is doing.
Honeypots and Honeynets

A honeypots is a decoy system intended to mimic likely targets


for cyberattacks.

It is not hardened or locked down and has services enabled


and open ports.

It is designed to confuse the attacker into thinking that it is


a production server.

It does not contain anything sensitive or valuable data.

A honeynet is a decoy network that contains one or more


honeypots.
Anti-Malware Systems

It is important to assess the risk of


exposure to infection by malicious code
or malware (viruses, worms, Trojan
horses, and spyware), and respond to the
risk by implementing anti-virus and anti
spyware controls.
Anti-Malware Systems

Malware has the capacity to disrupt the operation of user


workstations as well as servers, which could result in:

• Loss of business information


• Disclosure or compromise of business information
• Corruption of business information
• Disruption of business information processing
• Inability to access business information
• Loss of productivity

Protection against malware can be achieved by applying defense-in-depth and


installing central anti-malware management.
Machine Learning and Artificial Intelligence (AI)

Artificial Intelligence Machine Learning

Engineering of computers Ability to learn without


to mimic human behavior being explicitly
programmed

Deep Learning

Learning based on deep


neural network that can
learn and make intelligent
decisions on its own
Machine Learning and Artificial Intelligence (AI)

Artificial Intelligence:

Engineering of computers to
mimic human behavior
Machine Learning:

Ability to learn without being


explicitly programmed
Deep Learning:

Learning based on deep neural


network that can learn and make
intelligent decisions on its own
ML and AI for Cybersecurity

Automate Use machine learning to automate repetitive security tasks for higher levels of accuracy and
Tasks in a fraction of the time

Threat Hunting Search of recurrent patterns, anomalous behavior, and other outliers

Application
Automate code reviews with AI to help eliminate false negatives and false positives
Security

Incident Automatically investigate indicators of compromise and gain critical insights, to


Investigation accelerate threat response times

Orchestrate and automate hundreds of time-consuming, repetitive and complicated


Incident Response
response actions that previously required significant human intervention
Real World Scenario

Google tackles Gmail spam with Machine Learning:


Since its launch in 2004, Gmail has employed machine learning techniques such as neural networks to filter
emails in its spam filters. Unlike rule-based spam filters, machine-learning models can adapt to varying
conditions and hunt for patterns in unwanted emails that people may not catch. The machine learning model
used by Google reportedly can detect and filter out spam, phishing emails, and malware with about 99.9
percent accuracy.

In 2019, Google integrated TensorFlow in Gmail to try and block the last 0.1% of spam emails from getting
through. TensorFlow is an open-source machine learning (ML) framework developed at Google in 2015.

TensorFlow’s advantage is that it allows Gmail’s team to refine its existing machine learning algorithms so
they’re even more accurate at detecting spam. With TensorFlow, Google can also better personalize its spam
protection for each user. The same email could be considered spam to one person but important information
to another.

Gmail has announced that with TensorFlow it is now able to detect 100 million more spam emails every day.
Implement and Support Patch and Vulnerability Management
Patch Management

• A patch is a piece of software designed to fix problems and


update a computer program.

• This includes fixing security vulnerabilities and bugs and


improving usability and performance.

Patch
Patch Management

Patch management is the process of applying proper


patches to a system at a specified time using a strategy
and plan.

Patch management:
Types of Patches

Hotfixes Service packs Updates

Small updates with a specific Tested and cumulative set of all Address a noncritical, non-
purpose that alter the behavior hotfixes, security updates, and security-related bug and are a fix
of installed applications in a critical updates for a specific problem
limited manner
Patch Management Activities and Cycle

Patch management involves: New patch


available

• Scheduling and prioritizing patches

• Testing the patches Review Acquire


deployment patch
• Changing management
Patch Management
• Installing and deploying patches Phase

• Auditing and assessment

• Compliance
Deploy Test
patch patch
Vulnerability Management

With increasing attacks on the systems and


networks, identifying their vulnerabilities provides
enough knowledge to defend against these attacks.

• Flaws, system misconfigurations, and policy


failures give rise to vulnerabilities

• Examples: Buffer overflow, unpatched system

• Vulnerabilities can be fixed with new code, by


changing hardware, with security patches, and
by reconfiguring systems
Real-World Scenario

Equifax data breach

Equifax Inc., an American multinational consumer credit reporting agency, suffered a data breach
between May and July 2017 that affected at least 147 million individuals. The leaked data included
sensitive PII such as first and last names, Social Security numbers, birth dates, addresses, and
driver's license numbers.

An investigation revealed that Equifax had failed to implement basic security measures as it failed
to implement a policy to ensure that security vulnerabilities were patched, failed to segment its
database servers to block access to other parts of the network once one database was breached,
and failed to install robust intrusion detection protections for its legacy databases.
Real-World Scenario

Following the huge data breach, Equifax’s CIO, CSO, and CEO resigned.

Equifax Inc. agreed to pay at least $575 million, and potentially up to $700
million, as part of a global settlement.

In addition to the monetary relief to its consumers, Equifax was required


to implement a comprehensive information security program.
Real-World Scenario

How did the Equifax breach happen?

On March 9, 2017, Equifax was made aware of a critical vulnerability in the


Apache Struts Web Framework, but the company had failed to apply the
patch even after 2 months.

The company was initially hacked via an unpatched server housing Equifax’s
online dispute portal.

After gaining the ability to issue system-level commands on the online dispute
portal, the attackers were able to access additional databases as these systems
were not isolated or segmented from each other.

* The Apache Struts Web Framework is a commonly-used, open-source software


suite for developing web applications.
Real-World Scenario

How did the Equifax breach happen?

The attackers gained access to a database that contained unencrypted


credentials which allowed them to access other databases containing PII.
They were able to steal data over an encrypted connection and were
undetected for months as Equifax had failed to renew the digital certificate
of their network detection tool.

Equifax discovered the breach on July 29, 2017, but they didn’t alert the public
until September.
Understand and Participate in Change Management Processes
Change Management

Changes to the system are tracked and approved through change control procedures. It includes
identifying, controlling, and auditing all changes made to the system.

Change control:

• Ensures the implementation of change in an orderly


manner through formalized testing
• Ensures creation of awareness regarding the impending
change among the users
• Analyzes the effect of the change on the system after
implementation
• Reduces the negative impact of the change on the
computing services and resources
Information Security Management

The procedures for change control process implementation and support are:

1. Request for Request is sent to the responsible individual or group who administers and
a change to approves changes
be introduced Mandatory vacation

2. Change
After proper analysis and justification for change, it is approved
approval
Mandatory vacation

3. Change
intended Change control log is updated and documented
cataloging Mandatory vacation
Information Security Management

The procedures for change control process implementation and support are:

4. Change testing Change is formally tested


Mandatory vacation

5. Change
scheduling and Change is scheduled and implemented
implementation Mandatory vacation

6.Report to the
appropriate
parties about Change is summarized and reported to the management
the change Mandatory vacation
Change Types

According to ITIL, changes can be broadly divided into three types:

Standard A pre-authorized, low-risk, and low-impact change that is well understood, fully
change documented, and can be implemented without needing additional authorization

• A change that must follow the entire change process


Normal
change • It should be scheduled, assessed, and authorized following a standard process
• It includes both minor (low to medium impact) and major (high impact) changes

Emergency A high-impact and urgent change that must be implemented as soon as possible
change without strictly following the standard process
Implement Recovery Strategies
Backup Methods

Backup methods ensure data integrity and network availability by protecting and restoring deleted,
corrupted, or lost information. The different methods are:

Full backup Differential backup Incremental backup

• It is the starting point for all • It contains all files • It stores all files that have
other types of backups. that have changed changed since the last full,
• It contains all the data in the since the last full differential, or incremental
folders and files that are backup, the latest full backup.
Methodology selected to be backed up. backup, and the • When restoring from an
• A single full backup can latest differential incremental backup, the most
provide the ability to backup is needed for recent full backup as well as
completely restore all a complete every incremental backup
backed-up files. restoration. made since the last full backup
are needed.
Backup speed Slow Medium Fast
Restoration speed Fast Medium Slow
Storage space
High Medium Low
required
Develop a Recovery Strategy

The way in which a subject will access an object is guided by an access control model. A model
must be chosen to fulfill the directives of the security policy.

According to NIST 800-34, Recovery strategies are A key element of a


predefined actions recovery strategy is the
recovery strategy is the
approved by recovery time of critical
fourth phase to achieve a
business systems.
comprehensive business management and
The recovery strategies
continuity plan (BCP) or executed in are formulated based
disaster recovery plan emergencies, leading to on the maximum
(DRP). the development of a tolerable downtime
DRP. (MTD).
Develop a Recovery Strategy

The focus of the recovery process should be on:

• Responding to the disaster

• Recovering critical functions

• Recovering noncritical functions

• Salvaging and repairing hardware and software

• Returning to the primary site for operations


Types of Recoveries: Business Recovery

Identification of critical systems, In the event of a disaster,


data, equipment, materials, major corporate applications
office space, and key business and the related components
support personnel would be restored first
Types of Recoveries: Facility and Supply Recovery

Focuses on the main facility, remote sites, and


needed equipment such as networks, servers,
telecommunication, HVAC systems, technical
documents, required supplies, and the
transportation of equipment and staff
Types of Recoveries: User Recovery

Documentation of procedures for employees to follow during emergency situations. It includes:


Responsibilities of the
team: Who does what?

Personnel requirements: Manual processing


Computers, desks, and 1 techniques: Most tasks
phones for users must be done manually
7 2

Employee accessibility and


6 3
transportation: Pick-up and Procedures for notification:
drop facilities for the How are employees notified?
employees
5 4

Staff information: Includes Policies for disaster: Safety


contact information and vital first should be the company’s
records storage first policy
Types of Recoveries: Operational Recovery

Operational recovery includes:

• Mainframes, systems, servers, LANs,


peripherals, switches, routers, and other
data communication equipment's needed
for recovery

• Determining alternative recovery locations


based on MTD and acceptable costs
Types of Recoveries: Operational Recovery

Businesses have the following


options for a secure facility:

• Mirror or redundant site

• Hot site

• Warm site

• Cold site

Additional location options include reciprocal or mutual aid agreements, mobile sites,
multiple processing centers, service bureaus, self service, surviving sites, internal
arrangements, and work from home.
Recovery Partner Strategies

The recovery partner strategies are:

• Mutual or bidirectional arrangements between two organizations where one


Reciprocal organization can move its operations to other organization in case of disaster
agreements
• Also known as mutual aid agreements (MAAs)

Multiple • Processing centers spread across different geographical locations


processing
centers • Handle the business’ operational requirements during recovery

• Recovery contracts with an offsite service bureau helps to have the site ready
Service and available for the organization during emergencies
bureaus
• Offer expertise in processes, technology, and business-domains to customers
Backup Sites

Backup sites are locations where the business can be recovered in the event of a disaster at the primary site.
The different backup sites available are:

1
Mirror site

• Mirror or redundant site is a duplicate production


of a system capable of seamlessly conducting IT
operations without loss of services to the
system’s end user.

• A redundant site is configured like the primary


site and is the most expensive recovery option.

• Example: Regulatory bodies have made it


mandatory for commercial banks to have
redundant sites.
Backup Sites

Backup sites are locations where the business can be recovered in the event of a disaster at the primary site.
The different backup sites available are:

1
Hot site

• Hot site is where an organization relocates its


data center following a major disruption or
disaster.

• It consists of servers, raised floors, power,


utilities, fully configured computers, hardware,
and critical applications’ data mirrored in real
time.

• It helps resume critical operations within a very


short period.

• Hot sites can be internal (owned) or external


(outsourced).
Backup Sites

Backup sites are locations where the business can be recovered in the event of a disaster at the primary site.
The different backup sites available are:

1
Warm site

• Warm site has hardware and connectivity but


lacks the real-time data.

• It relies on backup data to rebuild a system


after a disruption.

• It consists of raised floors, power, utilities,


computer peripherals, and fully configured
computers.

• It is less expensive, more flexible, and requires


fewer resources for maintenance.

• It requires more time and resources to


activate the site.
Backup Sites

Backup sites are locations where the business can be recovered in the event of a disaster at the primary site.
The different backup sites available are:

1
Cold site

• A cold site does not have data backups and


immediately available hardware.

• Configuring cold sites and restoration of


critical IT services take more time. It has a
raised floor, power, utilities, and physical
security.

• It has no resources or geographic constraints.


Backup Sites

Backup sites are locations where the business can be recovered in the event of a disaster at the primary site.
The different backup sites available are:

1
Mobile site

• Mobile sites are also called data centers on


wheels.

• It has towable trailers that contain computer


equipment as well as HVAC, fire suppression
equipment, and physical security.

• It keeps the facility intact despite the data


center being damaged.
Importance of Maintaining Resilient Systems

The mechanisms used for controlling the behavior


of a system when it fails are:

• Fail-safe mechanisms that focus on failing with


minimum harm to personnel

• Fail-secure mechanisms that focus on failing in a


controlled manner to block access while the
systems are in an inconsistent state
Redundancy and Fault Tolerance

Fault tolerance is provided by redundant items within a system. The usage of the spare components will
determine if it is a cold, warm, or hot spare. In the event of component failure, the fault tolerant system can
continue to operate through:

Automatic

Redundant power supplies: Redundant or dual power supplies are common in systems
where failures cannot be tolerated.
Example: Core network switches
Redundancy and Fault Tolerance

Fault tolerance is provided by redundant items within a system. The usage of the spare components will
determine if it is a cold, warm, or hot spare. In the event of component failure, the fault tolerant system can
continue to operate through:

Website
servers
Write Queries

Read Queries

Master Node
Load
Replication Balancer

Node 1 Node 2 Node 3

Replication: Data changes are transmitted to a counterpart storage system which is an


adjunct to clustering and makes current data available to all cluster nodes.
Redundancy and Fault Tolerance Methods

The following are the redundancy and fault tolerance methods:

Cluster

• Cluster refers to a group of two or more servers that function


as a single logical server.
• Clusters generally operate in one of the following modes:
1. Active-active mode
o Both servers actively operate and service incoming
requests.

Server 1 Server 2
Redundancy and Fault Tolerance Methods

Active-passive mode

• One (or more) server actively services requests and one (or
more) server remains in a standby state to be able to switch
immediately to active mode when the active server fails.

• A failover is an event in a server cluster running in active-


passive mode.

• Geographical cluster or geo-cluster systems is a cluster that


can be located anywhere.

Server 1 Server 2
Redundancy and Fault Tolerance Methods

The types of Redundant Arrays of Inexpensive Disks or Redundant Arrays of Independent Disks
(RAIDs) are:

RAID 0: Striping RAID 1: Mirroring RAID 3: Byte-level parity

• Data striping is done over


• Parity data is held on one
many drives • The data is written
drive while data is striped
• Redundancy or parity is simultaneously on two
over all drives
not provided drives
• A drive can be
• All volumes become • If one drive fails, the other
reconstructed from the
unusable if one volume one has the data
parity drive if it fails
fails
Redundancy and Fault Tolerance Methods

RAID 4: Striped set RAID 5: Interleave RAID 6: Second or


parity double-parity data
• It has dedicated parity or • It ensures that there is no • It has more fault tolerance
block level. single point of failure. than level 5 with a second
• It stripes data at the block • It writes data along with set of parity data written
level. parity on all drives. on all drives.

RAID 10: Striping and


mirroring
• It supports multiple disk
failures by simultaneously
mirroring and striping
data across several drives.
Best Practices for Backup and Recovery
In software and data recovery, data recovery is the prime focus. To create a level of fault
tolerance and redundancy, the following concepts are used.

Database Database information is simultaneously written or


Shadowing duplicated to another server

Electronic Copies the backup data in a batch process to an offsite


Vaulting location

Remote Allows full synchronization of sites by transferring live


Journaling data to offsite locations
Best Practices for Backup and Recovery

Backups and offsite storage

• Frequency of backups, as required by


the business for optimum recovery,
needs to be ensured
• As a security measure, the backup tapes
are stored at an offsite location
Implement Disaster Recovery (DR) Processes
Implement Disaster Recovery Processes

The general process of disaster recovery includes:

Training
Lessons learned Personnel Assessment And
awareness

Response Communications Restoration


Response

• The BCDR plan must provide for both major and minor
disasters.

• Personnel health and safety must be top-most priority.

• BCDR plan should also define, in terms of business


interruption, what constitutes a disaster. Thus, authorizing
the activation of the disaster recovery plan.

• It must address individual and organization-wide natural


disasters, fire, and physical damage.
Personnel

BCDR plan should include a Appoint a disaster recovery


prioritized contact list of team who will be responsible
people who should be notified for taking action when a
if a disaster occurs. disaster does strike.
Personnel

BCDR team includes:

Incident response Emergency action Information security Human Resources


team team team (HR) team

Administrative Public relations and


Damage assessment Legal affairs team communication
team support team
team
Communications

• After BCP and DRP have been written, they must be


communicated to the entire staff of the organization.

• This information should be tailored to individuals and


groups to ensure.

• The conveyed information should be relevant, clear, and


easily understandable for the target audience.

• Crisis communication plan provides procedures for


disseminating internal and external communications.
Assessment

• Assessment is the process of determining the nature, source,


and impact of a disaster.

• This assessment is carried out by the disaster response team


with input from subject matter experts.

• Disaster assessments will facilitate the recovery process by


estimating the extent of damage, what can be replaced,
restored, or salvaged.

• It may also help estimate the time required for repair,


replacement, and recovery.
Restoration

Restoration means bringing a Recovery means bringing


business facility and business operations and
environment back to its processes back to the normal
original capabilities. working condition.
Restoration

• The ultimate goal of BCDR is to resume full normal


operations.

• If the primary site is completely destroyed or severely


damaged, then an alternate recovery site will function as
the primary site.

• Ensure that the recovery site is safe for people before


restoration process begins.

• The order of restoration of critical business functions is


determined during the BIA.

• The disaster is considered to be officially over when all the


business operations and processes return to normal at the
primary site.
Training and Awareness

The effective execution of these plans will depend on the employees knowing what they have to do and
under which circumstances.

Refresher trainings at regular intervals

Formal training at the


time of hiring
Training includes professional seminars,
special in-house educational programs,
the use of consultants, and vendors
tailored to the needs of individual groups
Training and Awareness

• Awareness is less formal than training and is generally targeted at all employees in the organization.
• Awareness includes frequent distribution of information (newsletter, email, posters, flyers).
Training

Training programs should be designed and developed by the organizations for all the BCP or DR activities

Trainings ensure employees:

Know the course of action in Are provided basic first aid


the event of an emergency and CPR training

Are interested in business


continuity activities through
periodic awareness programs
Training

The various training carried out are:

• Specific training for operating emergency


power supplies

Starting Emergency • Regular testing of operation of the emergency


Power power supplies

• Answering the call and taking necessary steps


• Ensuring the calling tree process is successful
Call Tree Training
or Testing
Lessons Learned

Lessons learned and gaps identified in the


Their recommendations should be
plan when either recovering at the disaster
implemented to continuously improve the
recovery site or restoring the primary site
effectiveness of the disaster recovery plan.
should be recorded.
Test Disaster Recovery Plans (DRP)
Importance of Testing

Testing is important because it:

• Helps to keep the plans updated


• Identifies the shortcomings of the plans
• Tests the readiness of the organization to
face disasters
• Refines the existing controls
• Satisfies the requirements of regulatory
bodies
Types of Tests

Review is the initial, and most basic, DRP test.

A review:

• Ensures the complete coverage of the plan

• Is performed by the team that had developed


the plan

• Helps discover any flaws in DRP

• Ensures that there are no obvious shortcomings


and omissions in the plan
Types of Tests

Checklist testing is also known as consistency


testing. A checklist test:

• Is a list of important and necessary components


required in the process of recovery

• Ensures necessary components are and will be


available in the event of a disaster

• Is an easy and cost-effective method of testing


the plan
Types of Tests

Structured walkthrough or tabletop is usually


performed prior to in-depth testing. A structured
walkthrough is used to:

• Review the overall approach of targeted recovery


of systems and services

• Help the group discuss and perform the


proposed recovery procedures in a structured
manner

• Identify gaps, omissions, technical missteps, or


erroneous assumptions in the process
Types of Tests

Simulation test is also known as walkthrough drill.


A simulation test:

• Helps team members carry out a recovery


process

• Simulates a disaster, and the teams need to


respond as directed by the DRP
Types of Tests

Parallel processing is used in a business where


critical processes involve transactional data. The
parallel processing test:

• Involves the usage of alternate computing sites


to recover crucial processing components and
restore data from the latest backup

• Does not interrupt the regular production


systems
Types of Tests

Partial and complete business interruption test


has the highest fidelity of all DRP tests. Partial and
complete business interruption test:
• Should be exercised with extreme caution as it
can actually cause a disaster

• Makes the organization use the alternate


computing facilities and stops normal business
processing at the primary location

• Can only be conducted in organizations with fully


redundant and load-balanced operations
Discussion
Discussion

Full-interruption tests present the highest risk to the business if not


managed properly.

What could be done before performing a full-interruption test to mitigate


this risk?
Participate in Business Continuity (BC) Planning and Exercises
Disaster Recovery: Planning Design and Development

According to NIST 800-34, planning design and development is the


fifth phase to achieve a comprehensive BCP or DRP.

For the recovery of critical business systems, a detailed plan is:

• Prepared and documented by the BCP team

• Inclusive of long-term and short-term goals, such as recovery plans,


employee training, plan maintenance, and testing procedures
Steps for Plan Design and Development

Step 1: Define the scope


of the plan

Step 2: Identify potential


disasters • Identify critical sites, systems, and business processes
• Set priorities for restoration

Step 3: Define the BCP


strategy

Step 4: Calculate funding


Steps for Plan Design and Development

Step 1: Define the scope


of the plan

Step 2: Identify potential


disasters • Identify the potential disasters which may impact the site
• Identify the resources needed to recover
• Identify actions that might eliminate risks in advance
Step 3: Define the BCP
strategy

Step 4: Calculate funding


Steps for Plan Design and Development

Step 1: Define the scope


of the plan
• Select the recovery strategies

Step 2: Identify potential • Identify important personnel, systems, and equipment that are
disasters required for recovery
• Define the roles and responsibilities of the team members
Step 3: Define the BCP • Document the continuity strategy, which includes guidance on
strategy declaring a disaster

Step 4: Calculate funding


Steps for Plan Design and Development

Step 1: Define the scope


of the plan

Step 2: Identify potential


disasters
• Identify the long-term and short-term goals to calculate the
funding needs
Step 3: Define the BCP
strategy

Step 4: Calculate funding


Disaster Recovery Phases: Maintenance

The BCP (or DRP) must be


According to NIST 800-34, updated once it is
BCP (or DRP) maintenance completed, tested, trained,
is the seventh phase to and implemented. The
achieve a comprehensive plan must incorporate all
BCP (or DRP). business and IT system
changes as they become
obsolete quickly.
Disaster Recovery Phases: Maintenance

Change management ensures:

• Security is not adversely affected when new


systems are introduced, modified, and updated
• All planned changes are documented and
tracked
• Substantial changes are formally approved and
documented
Disaster Recovery Phases: Maintenance

The strategies to maintain the


plan and ensure it is valid are:

• Make BC planning a part of every business


decision
• Insert BCP maintenance responsibilities into
job descriptions
• Include maintenance in personnel evaluations
• Perform internal audits that include disaster
recovery and BCP procedures
• Test the plan annually
Implement and Manage Physical Security
Perimeter Security Controls

Perimeter defenses help prevent, detect, and Offices Data vault


Mech.
correct unauthorized physical access and control room
Deliveries and

Employee Parking
access into the facility. Rack
Delivery
Service

Room
• It employs the defense-in-depth concept.
Data Center

• With layered architecture for barriers, the Buildings Common area


center or the most protected area has the Employee car Foot entrance for
highest level of security. Grounds entrance visitors
Fence

• Security systems are designed utilizing


multiple barriers called rings of protection.
Visitor parking

• The layered design can reduce the likelihood


of a successful attack. “Depth of Security”

Concentric areas to = Access Point


protect data center

Darker = More Secure


Barriers

Barriers define how an area should be designed in order to obstruct or deny access.

Objectives of barriers include:

• Keep intruders out


• Cause delays in intrusion
Fences

Fences are perimeter identifiers that are designed and installed to keep intruders out.

Height Effectiveness
The various types of fences include: Deters casual
3 -4 ft.
trespassers
• Chain link
Too difficult to climb
• Barbed wire 6 – 8 ft.
easily
• Barbed tape
• Concertina wire 8 ft. plus 3 Strands of barbed Deters determined
or razor wire trespassers
Walls and Bollards

• Walls are man-made barriers but are usually more expensive to


install than fences.

• Common types of walls are:


o Cinder block
o Masonry
o Brick
o Stone

• Bollards are small concrete pillars outside a building.


o Example: Traffic bollard
Perimeter Intrusion Detection

Perimeter sensors alert security when any intruders attempt to gain access across the open space or
attempt to breach the fence line.

Open-terrain sensors include:

• Infrared
• Microwave systems
• Time-domain reflectometry (TDR) systems
• Video content analysis and motion path analysis
Business Scenario

Hilda Jacobs, general manager, was assigned the task of designing perimeter security for a
new office in India. Kevin travelled to India on a short trip to understand the surroundings
of the new office.

The location had already been fixed, but Kevin found that the surrounding
area had recently seen a spike in the crime rate and thus had a high potential
of unauthorized intrusions. The site had many concrete and steel structures in
the open compound. Kevin submitted his report to Hilda.

Question: Which perimeter intrusion detection system should Hilda choose based on Kevin’s report?
Business Scenario

Hilda Jacobs, general manager, was assigned the task of designing perimeter security for a
new office in India. Kevin travelled to India on a short trip to understand the surroundings
of the new office.

The location had already been fixed, but Kevin found that the surrounding
area had recently seen a spike in the crime rate and thus had a high potential
of unauthorized intrusions. The site had many concrete and steel structures in
the open compound. Kevin submitted his report to Hilda.

Question: Which perimeter intrusion detection system should Hilda choose based on Kevin’s report?
Answer: Microwave sensors can be used since they can pass through concrete and steel structures.
Importance of Lighting

Lighting plays a vital role in the security function. It:

• Provides security personnel the ability to visually assess


their surroundings at night
• Helps notice and identify individuals at night
• Increases the effectiveness of guard forces and CCTV
• Reduces the need for security personnel
• Provides real and psychological deterrents against
intruders
• Provides illumination where natural light is insufficient
• Is inexpensive to maintain
Types of Lighting Systems

Continuous Light
Standby light

Lighting Systems

Emergency light
Movable light
Types of Lights

Fluorescent lights Mercury vapor lights

Types of Lights

Infrared Quartz lamps Sodium vapor


illuminators lights
Access Control
To control panel

Door Contact

• The primary function of an access control system


(ACS) is to allow only authorized personnel inside
a controlled area.

• The goal of an access control program is to limit


the opportunity for a crime to be committed.

• The basic components of an ACS include:


o Card readers
o Electric locks
o Alarms
o Computer systems
Reader (card, keypad
or biometric)
Exit button
Electric Strike
Types of Access Control Systems

The different types of access cards are magnetic stripe, proximity card,
Access cards
and smart card.

The types of biometrics include fingerprint, facial image, hand geometry,


Biometrics voice recognition, iris patterns, retina scanning, signature dynamics, and
keystroke dynamics.

Closed circuit It is a collection of cameras, recorders, switches, keyboards, and


television monitors that allow one to view and record security events.

CCTV color CCTV color cameras offer additional information, such as the color of a
cameras vehicle or a subject’s clothing.
Types of Access Control Systems

Digital video
It is used to download camera footage to a hard drive for storage of
recorder (DVR) and
historical information.
monitor displays

Security guards or officers patrol and inspect a property to protect it


Guards
against fire, theft, vandalism, terrorism, and illegal activity.

Guard dogs Guard dogs are a form of physical control that can serve as detective,
preventive, and deterrent controls.
Securing a Building

These are the various means to secure a building:

Doors: Solid core, Windows: Bulletproof


hollow core, and glass and laminated

Interior intrusion detection


Locks: Rim, mortise,
systems: Infrared and
and cipher
ultrasound

Piggybacking: Mantrap Escort and visitor


and turnstile controls
Address Personnel Safety and Security Concerns
Travel

Information about technical controls along with


personnel training will ensure the safety of employees
when they travel

Employees must understand the dos and don'ts about


using IT systems when they go abroad

Encrypt the devices, use strong passwords, and follow


other due care processes
Security Training and Awareness

The purpose of security training and awareness is to equip the learner with the knowledge, skill, and
competence to recognize security threats and maintain safety practices.

Incident reporting procedures

Risks, hazards, and


controls associated with Emergency procedures
the workplace
Emergency Management

Emergency management is the organization and management of the resources and responsibilities
needed to withstand, respond to, and recover from all types of emergencies and disasters.

Human safety should be the top priority.

Mitigation

Preparedness
Recovery
Emergency
Management

Responses
Duress

Duress is defined as any unlawful threat or coercion used to induce another to


act [or not act] in a manner they otherwise would not [or would].

Employees should undergo


These situations can be training on how to handle a
life-threatening or deadly. stressful situation and what to
do when under duress.
Duress

Lone workers, security guards, or


A duress code (covert signal) should be
healthcare providers may also use duress
used by an individual that is under duress
or panic alarms if urgent assistance is
to convey their state.
needed.

While designing and implementing duress


mitigation controls or training, it is always
advisable to seek the assistance of law
enforcement or other professionals.
Key Takeaways

Intrusion detection and prevention, security information,


event management, continuous monitoring, and egress
monitoring can be used to log and monitor activities.

The three important concepts of the security operations


domain are threats, vulnerabilities, and assets.

Incident response is the practice of detecting, determining,


minimizing, and resolving a problem.

The focus of the recovery process should be on


responding to the disaster, recovering critical and
noncritical functions, salvaging and repairing hardware
and software, and returning to the primary site of
operations.
This concludes Security Operations.

The next domain is Software Development Security.

CISSP® is a registered trademark of (ISC)²®

You might also like