CISSP Cornell Notes by Col
CISSP Cornell Notes by Col
Col Subhajeet Naha, Retd, CISSP, is one of the early adopters of Information and Cybersecurity Practices in
the Indian Army. He is an alumnus of Acharya Narendra Dev College, University of Delhi, Military College of
Telecommunications, JNU and Defence Services Staff College, Wellington. He has served in various war zone
operations and has vast military instructional experience. He has an ardent interest in Space technologies,
cybersecurity and software development. With over 25 years of technological experience, Col. Subhajeet
founded Protecte Academy (https://academy.protecte.io) and Protecte Technologies (https://protecte.io).
With his unique training technique, hundreds of students passed the CISSP exam and are working in some
great companies.
a , function
Key Question: What is the role of the security
a h
tN
Key Security Objectives:
• Reduce risk
e e
Protect information,aITj assets, and the organization's reputation
•
h
•
S ub and integrity
Preserve confidentiality
• Manage l availability of assets and services
othe
C
y compliance with laws and regulations
•
P BEnsure
ll N
goals and operational success of the business.
rn e Organizational Value:
Summary
• Security has expanded from protecting data to safeguarding a wide variety of assets, including mobile
devices and IoT.
• The role of security is to reduce risk, protect assets, and ensure compliance while supporting the
organization’s value and goals.
• Security professionals must align their efforts with corporate governance to contribute to organizational
value.
str
hardware, software, intellectual property, products, services, and the
organization’s reputation.
D i
for
• Key Point: Compliance with laws and regulations is a critical part of this
protection.
t
CEO’s Role in Governance:
No
a,
• The CEO is accountable for managing the organization to increase its value,
h
Na
through governance practices. Security must be aligned with this
governance to effectively protect the organization.
CISO vs. CSO:
jeet
ha
• The CISO (Chief Information Security Officer) often leads the security
b
Su
function and is responsible for protecting information. In some cases, the
l
CSO (Chief Security Officer) may report to the CIO, but this can hinder
y Co
security’s role in protecting all organizational assets.
B • Key Point: For security to be effective, it should report directly to the CEO or
SP
Board, empowering it to protect all assets.
for • Security must be empowered to protect the entire organization, not just IT.
This requires a reporting structure where security leads report to those who
es are accountable for the organization's value, like the CEO or the Board of
ot Directors.
orn • To be an effective security professional and pass the CISSP exam, you must
• Security has evolved into a role that supports business objectives and should not be limited to risk
minimization.
• A top-down approach to security, with direct input from upper management, is critical for aligning
security with the organization's goals.
• Security professionals must think from a management perspective to effectively support the business and
be an enabler for achieving organizational objectives.
CIA Triad:
• CIA Triad
• Confidentiality: Ensuring data is accessible only to those authorized.
• Organizational roles in security
• Accountability vs. responsibility • Integrity: Ensuring data accuracy and consistency.
• Corporate laws and policies • Availability: Ensuring data and systems are accessible when needed.
• Risk analysis • Example: Using encryption for confidentiality, hashing for integrity, and
• Governance and compliance redundancy for availability.
Organizational Roles in Security:
• Different roles within an organization relate to security responsibilities.
These roles ensure that security is maintained across different layers of the
organization, including IT, HR, legal, and executive management.
t i on
Accountability vs. Responsibility:
i b u
s r
t tasks are
• Accountability: Having the authority and answerability for ensuring
i
rD
completed.
fo
• Responsibility: Being assigned to perform specific tasks.
tprogram, while IT teams are
o
• Example: A CISO is accountable for the security
,N
responsible for implementing security controls.
a
Corporate Laws and Policies:
a h
N environment
tCompliance
• Policies and laws within a corporate dictate how security is
ell N • Compliance ensures that the organization meets regulatory and legal
• The first CISSP domain focuses on understanding the fundamentals of security, particularly the CIA triad,
and how organizations structure roles and responsibilities to manage risk.
• A key aspect of this domain is learning the distinction between accountability and responsibility, which is
crucial for implementing security practices.
• Governance and compliance play a critical role, and security must contribute to both to ensure the
organization's objectives are met while adhering to legal and regulatory frameworks.
jeet
• Example: Acting with integrity when dealing with security breaches and
ha
legal compliance.
b
• Provide diligent and competent service to principals.
Su
• Example: Delivering security solutions that meet the needs of clients and
l
Co
stakeholders.
r C Application of Canons:
rn
precedence.
• The ISC2 Code of Professional Ethics outlines fundamental principles for CISSP holders, stressing the
importance of protecting society and acting with integrity.
• The four Canons must be applied in a specific order, with the first canon —protecting society—taking
precedence over all others.
• Memorization of the Canons is essential for CISSP candidates, as these principles are vital for both the
certification exam and professional conduct in the security industry.
Ethics Foundation:
• Ethics foundation
• Ethics are based on the principle of doing nothing that harms others. This
• Codifying ethics in organizations
foundational belief drives ethical behavior in personal and professional
• Ethical challenges
settings.
• Consistent ethical behavior
• Role of management • Example: Ensuring that security measures do not unfairly harm individuals'
• Corporate policies privacy rights.
Codifying Ethics in Organizations:
• For consistent ethical behavior, ethics must be codified in corporate
policies. These policies ensure that all employees follow the same ethical
on
standards.
ti
• Key Point: Consistency in ethical behavior across the organization can only
u
be achieved through clear corporate laws or policies.
tr i b
Ethical Challenges:
D is
for
• Ethical beliefs vary widely due to individual differences, including culture,
t
upbringing, education, and religious beliefs. This diversity makes it difficult to
No
ensure that everyone follows the same ethical principles.
a,
• Example: In a diverse workplace, what one employee sees as ethical
h
Na
behavior might be different from another’s interpretation.
et
Consistent Ethical Behavior:
je
• To achieve consistent ethical behavior, an organization must prescribe
bha
specific guidelines through policies. These policies help align the diverse
Su
ethical views of employees with the organization’s standards.
l
Co
Role of Management:
fo decision-making processes.
es
ot
Corporate Policies:
ll N
• Corporate policies that promote ethical behavior make the organization a
C o management.
• Key Point: Ethical policies should be consistently communicated to all
employees to create an ethical organizational culture.
• Ethics in an organization are based on doing no harm, but consistent ethical behavior requires
codification through corporate policies.
• Ethical challenges arise from diverse individual beliefs, making it necessary for organizations to establish
clear ethical guidelines.
• Senior management must drive and enforce ethical behaviour, ensuring that policies promoting ethical
conduct are understood and followed at all levels of the organization.
on
Integration with Business Processes:
ti
• The role of security has expanded beyond data protection. For example,
u
i b
many years ago, physical security was often seen as separate from IT
tr
D is
security, but now both are considered integral to the security function.
• Key Point: The integration of security across various aspects of the business
is essential for comprehensive protection.
t for
No
Asset Protection Beyond Information:
a,
• Security should not focus only on protecting information or data but also on
h
all assets that represent value to the organization. These can include people,
Na
facilities, hardware, intellectual property, and services.
et
• Example: Protecting physical assets such as servers and employees is as
je
important as securing digital assets like databases.
ha
Key Focus of Security:
b
Su
• The primary focus of security is two fold:
l
Co
• Allow and enable the organization to achieve its goals and
objectives.
By • Increase the organization's value by protecting its assets.
I SSP • Security ensures that business operations can continue without disruptions
from threats.
r C Security as a Support Role:
fo
es • Security plays a supportive role in the organization, helping those
ot
accountable for business success (such as executives and managers) to
ll N
achieve their goals through proper governance and risk management.
C o
• Security’s role is to support the business in achieving its goals and increasing the value
of the organization by protecting all assets, not just data.
• Security has evolved to integrate with broader business processes and includes
protection of physical, intellectual, and human assets.
• By ensuring proper security governance, security professionals enable the organization
to achieve its objectives while minimizing risks..
t
Example: Using backups and redundancy measures to ensure system
availability during failures or cyberattacks.
No
Authenticity:
h a,
Na
Verifies the source and origin of assets, ensuring that they are legitimate
et
and come from trusted sources.
je
Example: Using certificates to validate the authenticity of
ha
communications or documents.
b
Su
Nonrepudiation:
l
Provides assurance that someone cannot deny having performed an
y Co
action or transaction, often through logging or digital signatures.
B Example: A user cannot deny sending an email if it has been digitally
SP
signed, ensuring accountability.
CI S CIA Triad:
for The CIA Triad consists of three core security principles: Confidentiality,
Integrity, and Availability. These are foundational in designing, structuring,
es
ot
and implementing security in an organization.
ll N
Key Point: Security today must focus on the CIA principles not just for
information security, but for all organizational assets that represent value.
rn e Goals of Asset Security (not just Information Security):
C o The principles of Confidentiality, Integrity, and Availability apply to all
assets, not just information. These core pillars are used to protect and
add value to any organizational asset that holds significance.10.3
• The CIA Triad forms the core of asset security, protecting organizational assets through
confidentiality (limiting access), integrity (ensuring accuracy), and availability (ensuring
access).
• Authenticity and nonrepudiation extend beyond the CIA Triad, ensuring that assets are
legitimate and actions are accountable.
• These security principles should be applied to all assets that hold value for the
organization, not just data or information.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Five Pillars of Information Security
Five Pillars of Information Security:
• Five Pillars of Information
In addition to the traditional CIA Triad (Confidentiality, Integrity, and
Security
Availability), the security framework now includes Authenticity and
• CIA Triad Nonrepudiation, making these the five key pillars of information security.
• Authenticity
• Nonrepudiation Confidentiality, Integrity, and Availability (CIA Triad):
• Proof of origin These three pillars form the foundation of information security, protecting
• Accountability and data and assets from unauthorized access, ensuring data accuracy, and
responsibility maintaining the availability of assets when needed.
Authenticity:
Ensures that assets, such as documents or communications, are
ti on
legitimate, trusted, and verified. It proves the source or origin of valuable
assets, ensuring they are genuine.
i bu
str
i
Example: Digital certificates or cryptographic signatures verify the
D
for
authenticity of emails or documents.
Nonrepudiation:
t
No
Guarantees that an individual cannot deny the validity of an action or
a,
transaction they performed. This provides accountability and ensures
h
Na
responsibility cannot be disputed.
jeet
Example: A user cannot deny sending a contract if it has been digitally
signed with their private key, providing an auditable trail.
bha
Proof of Origin:
Su
Authenticity is sometimes referred to as "proof of origin," meaning that it
l
Co
confirms the source of the asset, ensuring its legitimacy.
SP
signatures to ensure they haven’t been tampered with.
ll N
Example: Logging and audit trails ensure that users are held accountable
C o
on
Security must align with corporate governance, ensuring that its
ti
objectives and initiatives support the organization’s goals and objectives.
u
i
This alignment ensures security contributes to organizational value.
r
t to b
Example: Aligning security controls with the organization’s s
D i strategy
o r
protect intellectual property and ensure compliance with regulations like
GDPR or HIPAA.
o tf
Top-Down Management:
N
Security governance must be driven byaa,top-down structure. Senior
management, the Board, and the a h are accountable for corporate
t Nsecurity priorities to ensure alignment
CEO
e
governance, and they must drive
je
a
with the organization's goals.
h
ub must prioritize security to ensure alignment and
Key Point: Leadership
S
oandl Tailoring:
effective governance.
ScopingC
y objectives must be scoped and tailored to align with the specific
P B
Security
I SS goals and objectives of the organization. This ensures that security efforts
ell N
orn
C
on
The effectiveness of security in any organization depends on leadership.
The Board, CEO, and senior management must promote a security
uti
i b
culture, ensuring that security principles are communicated and enforced
tr
throughout the organization.
i s
D to security
r
Key Point: Leadership must demonstrate a strong commitment
o
for it to be adopted organization-wide.
otf
, orNoverseeing processes to
Governance Definition:
a
itshgoals and objectives. Corporate
Governance refers to the act of governing
ensure the organization achieves a
e t N organizational value, while security
governance focuses on increasing
jeby protecting valuable assets and enabling
business success. ha
governance supports this
I SS
r C
fo
es
ot
ell N
orn
C
• Security governance must align with corporate governance and be driven by a top-down
structure to effectively support the organization’s goals.
• Leadership plays a crucial role in promoting a security culture, and security should be
proactive, enabling business success rather than just reacting to threats.
• Scoping and tailoring of security initiatives ensure that security supports the specific
goals and objectives of the organization, contributing to overall organizational value.
on
Directors, CEO, and senior
sustainability, and viability of whatever entity is being governed. In an
management
uti
organization, governance ensures that the organization is operating in a
• Corporate policies
Accountability in governance way that achieves its goals and objectives. tr i b
•
• Top-down approach to
D is
Example: A government is elected to improve services, just as an
security
for
organization’s governance structure ensures business success.
t
No
Corporate Governance vs. Government Governance:
a,
Just as governments are elected to provide governance for a country,
h
Na
organizations also require governance to increase their value. Corporate
jeet
governance is provided by individuals such as the Board of Directors, the
ha
CEO, and senior management.
b
Su
Key Point: Corporate governance ensures that the organization prospers,
l
Co
meets goals, and sustains its viability over time.
SP
The Board of Directors sets the tone for governance by establishing goals
CI S and objectives for the organization. However, they cannot oversee all
ot Key Point: The CEO ensures that all activities and initiatives are aligned
orn
C
on
Directors, CEO, and senior
The CEO is directly accountable for corporate governance, ensuring that
management
uti
all initiatives and activities are aligned with the organization’s objectives.
• Corporate policies
Accountability in governance
tr i b
Senior management is responsible for implementing and overseeing these
•
• Top-down approach to activities. D is
security
for
Key Point: Accountability in governance ensures that there is clear
t
No
oversight of all corporate activities and that leadership drives value
creation.
h a,
Top-Down Approach to Security:
Na
jeet
Security in an organization must be driven by leadership. The Board, CEO,
ha
and senior management must promote and adopt good security
b
Su
practices for security to be effective. Without leadership commitment,
l
Co
employees may not recognize the importance of security.
SP
employees follow security protocols and the organization remains
CI S protected.
for
es
ot
ell N
orn
C
jeet
Key Point: Leadership must prioritize security to ensure alignment and
effective governance.
ha
Scoping and Tailoring:
b
Su
Security objectives must be scoped and tailored to align with the specific
l
Co
goals and objectives of the organization. This ensures that security efforts
ll N
security governance.
for
organization thrives and meets its strategic goals through effective
oversight. t
No
h a,
Na
jeet
bha
l Su
y Co
B
I SSP
r C
fo
es
ot
ell N
orn
C
• Security governance must align with corporate governance and be driven by a top-down
structure to effectively support the organization’s goals.
• Leadership plays a crucial role in promoting a security culture, and security should be
proactive, enabling business success rather than just reacting to threats.
• Scoping and tailoring of security initiatives ensure that security supports the specific
goals and objectives of the organization, contributing to overall organizational value.
on
structure Example: Legal helps security understand compliance with data privacy
• Alignment of security and laws like GDPR, guiding security controls.
uti
organizational goals Legal and Regulatory Compliance:
tr i b
Drawing on the expertise of the Legal team helps ensure that security
D is
measures comply with relevant laws and regulations. This is a crucial
for
aspect of aligning security governance with corporate governance.
t
Key Point: Legal expertise ensures that security initiatives meet regulatory
compliance standards.
No
Organization Governance Committee:
h a,
Establishing an Organization Governance Committee is the best way to
Na
maintain sound governance that aligns security with organizational goals.
jeet
This committee should include key stakeholders and meet regularly to
ha
discuss security goals and how they align with corporate governance.
b
Example: A governance committee that includes Legal, IT, and HR can
Su
regularly review the effectiveness of security policies and adjust them to
l
Co
meet organizational needs.
Top-Down Governance Structure:
By A top-down governance structure ensures that security objectives are
SP
promoted and aligned with corporate goals. Senior management must set
CI S the tone for governance and ensure that security is seen as a key part of
organizational success.
for Key Point: The governance committee helps reinforce the top-down
ll N
Alignment of Security and Organizational Goals:
on
Tailoring refines the in-scope security control elements to ensure they
ti
are aligned with the organization’s goals and are cost-effective. Controls
u
i
are customized based on the needs of different functional areas,
tr b
ensuring they provide the most value.
D is
for
Example: Customizing access controls to be stricter in departments
handling sensitive data (e.g., HR or Finance) while maintaining flexibility
t
No
in less sensitive areas.
a,
In-Scope vs. Out-of-Scope Controls:
h
Na
In-scope controls are those that directly support the organization’s
et
objectives and comply with applicable laws and regulations. Out-of-
e
scope controls are not relevant to the organization’s specific goals.
j
ha
Key Point: Scoping ensures that only necessary and relevant security
b
Su
controls are implemented, reducing complexity and cost.
l
y Co
B
I SSP
r C
fo
es
ot
ell N
orn
C
on
enabler being proportionate to the level of risk they address.
• Accountability in governance
ut
Key Point: Tailored security solutions balance protection with cost,i
r i b
avoiding unnecessary expenditure while ensuring adequate protection.
t
Security as a Proactive Enabler:
D is
t for
When security is aligned with business goals and fully supported by
senior management and the Board of Directors, it becomes a proactive
enabler rather than a reactive function.
No
h a,
Example: Regular security audits to prevent issues rather than only
Na
responding to incidents after they occur.
jeet
Accountability in Governance:
bha
While the CEO is accountable for guiding the organization, other roles,
such as the CFO or Data Controller, may also be accountable for
l Su
specific areas, such as financial reporting or data privacy. Security
Co
governance must integrate accountability across all relevant roles.
By Example: The CFO ensuring financial controls are in place and the Data
SP
Controller ensuring compliance with privacy regulations like GDPR.
CI S
for
es
ot
ell N
orn
C
• Scoping identifies which security controls are necessary based on legal, regulatory, and
organizational objectives, while tailoring customizes these controls to be cost-effective
and aligned with business needs.
• Security governance, when aligned with corporate governance, ensures that controls
support business goals and add value.
• Senior management’s commitment is critical to making security a proactive enabler
rather than a reactive function.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Organizational Processes and Security
Security Integration in Processes:
• Security integration in
Security needs to be an integral part of all organizational processes,
processes ensuring that the organization is protected across its operations. Security
• Risk in acquisitions and should not be a separate function but embedded within every process,
mergers from daily operations to strategic initiatives.
• Risk during divestiture Example: Implementing access controls for employees, contractors, and
• Governance committees and third parties involved in business processes.
security
Risk in Acquisitions and Mergers:
• Maintaining security and
compliance Organizations face increased risk during acquisitions and mergers due to
limited visibility and control over the other entity being acquired. The
ti on
security of the acquired company may not be at the same level, exposing
the acquiring organization to threats and compliance risks.
i bu
tr
Example: Conducting thorough security due diligence before finalizing an
s
i
acquisition to identify any vulnerabilities in the acquired company’s
D
for
infrastructure.
Risk During Divestiture:
t
No
Divestiture, or selling off parts of a business, can also pose security
a,
challenges. The process must ensure that sensitive information,
h
Na
compliance obligations, and security controls are maintained during and
et
after the sale of assets.
je
Key Point: Data that is being transferred to new ownership must be
ha
secured, and compliance with regulations must be ensured.
b
Su
Governance Committees and Security:
l
Co
Governance committees that focus on security play a crucial role in
protecting the organization during high-risk processes like acquisitions,
By mergers, and divestitures. They ensure that security policies and risk
ll N
During organizational changes like mergers or divestitures, it is critical
• Security must be embedded into all organizational processes, especially during high-
risk scenarios like acquisitions and divestitures, where visibility and control may be
limited.
• Governance committees with a security focus are essential to protect the organization
during such transitions, ensuring that security and compliance obligations are not
compromised.
a,
or security teams.
Responsibility Can Be Delegated:
h
Na
Responsibility refers to the execution of tasks or processes and can be
jeet
delegated to others. For example, a security team may be responsible
ha
for implementing security controls, but the CEO remains accountable
b
for ensuring overall security.
l Su
Example: The responsibility for data backups can be delegated to the IT
y Co
department, but the CEO is accountable for ensuring data availability.
SP
In terms of corporate governance, accountability typically lies with the
CI S
for
es
ot
ell N
orn
C
str
tasks are completed efficiently while maintaining accountability at the top
level.
D i
for
Significant Differences Between Accountability and Responsibility:
t
Accountability:
No
•
h
Where the buck stops a,
•
t Na and liability
Ultimate ownership
•
je e or group can be accountable
Only one person
a and policies
hrules
•
b
Sets
l Su
Responsibility:
ell N
orn
C
on
accountable.
Accountability for Data in the Cloud:
uti
Organizations that store data in the cloud are accountable for rthe
t i b
D is
protection of that data, even if the CSP is responsible for safeguarding it.
o r
The owner of the data is liable in the event of a data breach.
f
t
Key Point: Cloud service agreements often shiftoresponsibility but not
accountability. The data owner must ensureN
a , compliance with data
protection regulations.
a h
N
t the
Ultimate Accountability in the Organization:
e
jeevery asset
h a
Upper management, including Board of Directors and the CEO, are
u b
ultimately accountable for in the organization. Senior
S
management is also accountable for the assets they manage within their
ol
respective areas.
C
B y Thewhile
Example: CEO is accountable for the overall security of the
S P
organization, the VP of Finance is accountable for the security of
CIS
financial data.
for
tes
o
ell N
orn
C
je et
that are initiated or driven by upper management. The security function
ha
supports the governance framework but is accountable for ensuring that
b
security controls are effectively implemented.
u team is responsible for executing security
l S
Key Point: The security
Coaccountability for security governance lies with upper
policies, but
y
B
management.
P
I SS
C
for
tes
o
ell N
orn
C
• Organizations remain accountable for their assets, even when third-party providers are responsible
for managing them. Accountability for data protection, especially in the cloud, always lies with the
data owner.
• The CEO and Board are ultimately accountable for all organizational assets, but accountability for
specific systems may lie with senior management.
• The security function is accountable for ensuring security governance is implemented but reports to
senior management, who remain accountable for the organization's overall security.
je e
decisions made by the controller regarding the asset.
a
h processing payroll data is responsible for
u b
Example: An IT department
ensuring thatSthe data is handled securely, as per the decisions of the
C ol
finance department (controller).
B y
Organizational Security Structure:
s fo while the processor implements those rules, ensuring that the asset is
ll N
Key Point: Both the controller and processor play critical roles in
• The role of security is to be an enabler, supporting the organization in achieving its goals by
protecting assets and data.
• The owner/controller of an asset is responsible for making decisions about its protection, while
the processor is responsible for implementing those decisions.
• A clear structure for roles and responsibilities ensures that security governance is maintained
throughout the organization.
on
Information Systems Security Professionals/IT Security Officer
(Responsible for):
uti
r i
Designing, implementing, managing, and reviewing the organization’s
t b
is
security policies, standards, baselines, procedures, and guidelines.
rD
Example: The IT Security Officer develops a policy for password
complexity and reviews compliance regularly. fo
o t for):
,N
Information Technology (IT) Officer (Responsible
a
h solutions that support
Developing and implementing technology
organizational security.
N a
e t professionals
security strategies. aje
Collaborating with IT security to evaluate and implement
ll N
to follow encryption policies.
rn e
C o
on
Network Administrator (Responsible for):
Maintaining computer networks and resolving network issues. ti
uand
tr i
Installing and configuring networking equipment, such as routers b
switches. is
fo r D issues in
Example: A network administrator troubleshoots connectivity
o t systems.
the office’s wireless network and installs new firewall
Information Systems Auditors (Responsible
, N for):
a
h assurance that security
a
Providing management with independent
tN
objectives and controls are appropriate.
e
aje
Determining whether security policies, procedures, and guidelines are
effective in meetinghorganizational objectives.
b
l Suto senior
Example: An auditor reviews the organization’s security compliance and
C o
reports findings management.
B y (Responsible for):
Users
ell N
orn
C
• Owners/Controllers are accountable for setting access policies and ensuring the protection of
organizational assets, while Information Systems Security Professionals design and manage
security policies.
• Various IT roles (IT Officers, Administrators, Network Administrators) implement, manage, and
troubleshoot security solutions, while Information Systems Auditors provide independent
assurance of security effectiveness.
• Users are responsible for adhering to security policies and protecting the assets they use.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Custodians and Owners - 1
Custodian vs. Owner:
• Custodian vs. Owner
• Origin of custodian Custodians are responsible for the protection and maintenance of
• Responsibilities of assets, but they do not own the asset. Owners are accountable for the
custodians asset, including making decisions about its protection and use.
Key Point: Custodians are caretakers who manage assets, while owners
hold ultimate accountability for the asset's security.
Origin of Custodian:
The word custodian comes from "custody," meaning that custodians
hold and protect an asset that belongs to someone else. The custodian
ti on
i bu
is entrusted with protecting the asset's value while it is in their care.
Example: A database administrator (custodian) manages and
s tr ensures
i
rD
the availability of a database, but the data owner is ultimately
accountable for the database.
t fo
Responsibilities of Custodians: o
N assets in their care are
a , that
h the availability, confidentiality, and
Custodians are responsible for ensuring
a
t N or confidential information.
protected. This includes maintaining
e
integrity of assets like databases
je that a database remains accessible to
Example: A custodianaensures
h
S ub
users and that confidential information is not leaked.
C ol
B y
S P
CI S
for
es
ot
ell N
orn
C
r D for managing
functions to protect assets, while owners are accountable
the effectiveness of those security measures. fo
Key Point: Owners manage accountabilityN
ot
a,
by ensuring custodians are
h
well-equipped to handle their responsibilities.
Role of the Security Function:
t Na
je e the tools, architecture, security controls,
ha for custodians to protect the assets in their care.
The security function provides
b
and knowledge needed
Security makesuit easy for custodians to fulfill their roles and helps
o l S protect their assets.
owners efficiently
for
es
ot
ell N
orn
C
• Custodians are responsible for protecting assets in their care, while owners remain accountable for
the overall security and management of those assets.
• The security function equips custodians with the tools and resources they need to protect assets,
ensuring that the custodians can perform their responsibilities effectively.
• Owners must ensure that custodians are well-supported in their roles, as accountability for asset
protection remains with the owner.
ti on
Asset owners are accountable for identifying the value of the assets they
i bu
control and determining the appropriate security measures to protect
str
those assets. They are also responsible for communicating who should
protect the assets and how they should do so.
D i
for
Example: The IT manager is accountable for protecting an organization's
t
customer database and defines the security requirements for access.
No
a,
Role of Security Professionals:
h
Na
Security professionals provide advice and guidance on best practices
et
but are not directly responsible for securing assets. Their role is to equip
je
asset owners with the tools and knowledge they need to protect their
assets effectively.
b ha
u professionals enable asset owners but do not hold
Sfor
Key Point: Security
o l
accountability asset protection.
C
By
Importance of Communication in Security:
ell N
orn
C
on
corporate governance Security frameworks help ensure that the security function is aligned
uti
with the organization’s overall governance structure. This ensures that
r
security strategies support business objectives and regulatory
t i b
compliance.
D is
for
Example: Using the NIST Cybersecurity Framework to align data
t
protection strategies with business goals and ensure compliance with
regulations like GDPR. No
h a,
Na
jeet
bha
l Su
y Co
B
I SSP
r C
fo
es
ot
ell N
orn
C
• Everyone in an organization has a role in maintaining security, but asset owners hold the
accountability for determining security needs and communicating them.
• Security professionals provide guidance but are not responsible for securing assets.
• Security frameworks such as NIST, ISO, COBIT, and ITIL provide structured guidance for aligning
security practices with corporate governance, ensuring comprehensive protection and compliance.
on
the appropriate security controls for each part. Control selection is
driven by the value of the components and the risk associated with
them. uti
tr i b
its value to the organization and the potential risks it faces. is
Key Point: The security of each system component is determined based on
f o rD
t particularly in audits
COBIT (Control Objectives for Information Technologies):
o
, N that IT management aligns
• COBIT is useful for IT assurance and governance,
a
and gap assessments. It focuses on ensuring
h
with business objectives.
a
Example: COBIT helps auditors tNassess how well an organization’s IT
processes are supporting itsestrategic goals.
h aje Infrastructure Library):
ub for IT service management, focusing on aligning IT
ITIL (Information Technology
S
olwith business
• ITIL defines processes
y C
services
management,
goals. It includes guidelines for change
procurement, and access control, ensuring a well-run IT
Bdepartment.
I SSPExample: ITIL outlines the steps for implementing change management
ll N
recommendations for cybersecurity controls in US federal
on
for detailed control implementation.
COSO (Committee of Sponsoring Organizations):
u ti
• COSO focuses on improving organizational performance, rib
is
governance, and risk management, particularly in preventing t fraud
and ensuring effective internal controls.
fo rD
Example: COSO is used by organizations to assesst risks related to
financial fraud and improve internal controls.No
HIPAA (Health Insurance Portability and
h a,Accountability Act):
• HIPAA governs the protection N a
Ittmandates that healthcare organizations
of protected health information (PHI)
in the healthcare industry.e
ajeto ensure the confidentiality and security of
implement strict controls
h
ubmust comply with HIPAA to protect patient medical
patient data.
S
l data breaches.
Example: A hospital
records andoavoid
C
y(Federal Information Security Management Act):
B
FISMA
o Example: Federal agencies must follow FISMA guidelines to ensure that all
ll N
sensitive data and systems are properly secured.
rn e
C o
• Security control frameworks provide structured guidance for selecting and implementing
controls based on the value and risk of system components.
• Major frameworks such as COBIT, ITIL, NIST SP 800-53, PCI DSS, ISO 27001, and HIPAA help
organizations align their security practices with industry standards and regulations.
• Security frameworks enable organizations to ensure compliance, protect sensitive data, and
improve governance and risk management practices.
N ot • Due diligence involves regularly proving that due care has been
ell
exercised by showing evidence of actions taken to protect
rn
assets. This could include reports, audits, or other
C o documentation.
Example: A security team provides a vulnerability report and
evidence of remediation to stakeholders as part of due diligence.
• Due care is the responsible protection of assets, ensuring that security measures are aligned
with the organization’s goals.
• Due diligence is the proof provided to stakeholders that due care has been exercised, showing
that security measures are in place and effective.
• An example of due care is authorizing a penetration test, while due diligence is providing proof
that the vulnerabilities found were remediated.
t
No
Key Point: These questions guide the development of an effective
security strategy.
h a,
Na
Understanding the Threat Landscape:
je et
Organizations must stay informed about the current threat landscape
ha
and cybercrime trends to anticipate and defend against potential
attacks. Knowing the tactics used by cybercriminals helps deploy
u b
resources effectively.
l S
Example:oA company keeps track of the rise in ransomware attacks and
C
By its defenses accordingly.
prepares
I SSP
r C
fo
es
ot
ell N
orn
C
str
Preventing attacks may not always be possible, but reducing the
likelihood of being targeted is achievable.
D i
for
Example: Implementing strong encryption and regular security updates
t
No
makes an organization a less attractive target for cybercriminals.
a,
Collaboration with Compliance and Legal Functions:
h
Na
Security must collaborate with the compliance and legal functions to
jeet
understand regulatory and legal requirements globally. These factors
influence how security measures are designed and implemented.
a ensures compliance with GDPR regulations
hteam
b
Su data protection policies.
Example: A security
l
while developing
o
GlobalC
y Threat Awareness:
B professionals need to be aware of global threats that can affect
S PSecurity
CI S their organization. Understanding the broader cybercrime landscape
es Key Point: Cyber threats constantly evolve, and organizations must stay
ot informed of global risks and trends.
ell N
orn
C
• Organizations must assess how well their information and assets are protected and stay
informed about cybercrime trends and the threat landscape.
• Effective security strategies make attacks too costly, time-consuming, or not worthwhile, thus
reducing the organization’s risk of being targeted.
• Collaboration with compliance and legal functions is essential to ensure security measures
align with global regulations and legal requirements.
ell N
orn
C
on
Example: A pharmaceutical company holds a patent for a new drug,
preventing others from producing it for 20 years.
u ti
Copyrights:
r i b
t such
s
• Copyrights protect the expression of ideas fixed in aimedium,
as books, movies, music, or software. It grants the D
rights to reproduce, distribute, and display thefo
r creator exclusive
o t work.
h
• Term of Protection: Set period (e.g.,a
• Protects Against: Copying N or a
et protects their novel from being copied
creating substantially similar work
je
Example: An author’s copyright
without permission.ha
Trademarks: u
b
S
C ol protect symbols, sounds, colors, or designs that
• Trademarks
B y
distinguish one product or company from another, such as logos or
S P brand names.
C o
• Intellectual property laws protect intangible creations (inventions, literary works, symbols)
from unauthorized use to encourage innovation and creativity.
• Different forms of IP protection include trade secrets, patents, copyrights, and trademarks,
each offering unique protections based on the type of intellectual property.
• Trade secrets have no disclosure requirement and can be protected indefinitely, while patents,
copyrights, and trademarks have varying terms of protection and disclosure requirements.
D i
strength, but non-member countries are excluded from such exchanges.
Key Point: Cryptography plays a critical role in military and government
for
communications, making it a sensitive technology for international trade.
t
No
International Traffic in Arms Regulations (ITAR):
• ITAR is a US regulation that controls the export of military items listed
a,
on the United States Munitions List (USML), which includes weapons
h
Na
such as missiles, rockets, and bombs. The regulation is enforced by
et
the US Department of State, Directorate of Defense Trade Controls
(DDTC).
je
bha
Example: A US defense contractor must comply with ITAR when exporting
military-grade equipment to foreign governments.
l Su
Export Administration Regulations (EAR):
Co
• EAR regulates the export of commercial-use items like computers,
By lasers, and marine products. While the items are typically commercial,
they may have military applications, which brings them under the
Na
localization laws go further, requiring that data is stored and processed
et
locally within a country.
je
ha
Key Point: These laws are designed to protect the personal data of
b
citizens by keeping the data within regions with stronger privacy
Su
protections.
l
y Co
B
I SSP
r C
fo
es
ot
ell N
orn
C
Na
stringent laws that protect personal data, while others may have weaker
et
protections. This variation has led to the development of transborder data
je
flow laws to prevent data from being transferred to countries with weaker
a
bhan EU citizen may not be processed in a country with
privacy protections.
Example: Data u
S from
l protection
o
weaker data laws unless proper safeguards are in place.
B yC
S P
CI S
for
es
ot
ell N
orn
C
• Transborder data flow laws restrict the movement of personal data across borders to protect
privacy, often requiring that data remain within the country’s borders.
• Compliance with data residency and localization laws is critical when sharing data across
international borders, especially given the variability of privacy laws between countries.
• GDPR is an example of a strict data residency regulation that protects the personal data of EU
citizens by limiting cross-border data transfers.
on
Key Point: Personal data is valuable and must be protected to prevent
misuse.
uti
Importance of Privacy in Asset Protection:
tr i b
Privacy is a critical aspect of information security, especially in today's
is
digital age. Personal data collected from clients or website visitors is
D
for
considered an organizational asset and must be protected like any other
valuable asset.
t
No
Key Point: A privacy breach can lead to financial losses, legal
a,
consequences, and reputational damage for an organization.
Impact of Privacy Breaches:
h
Na
If personal information is disclosed due to a breach or negligence, it
jeet
harms the individual whose data was exposed and can also lead to
significant penalties or reputational damage for the organization. In some
ha
cases, the business may not recover from the breach.
b
Su
Example: A data breach exposing customer credit card information can
l
lead to regulatory fines and loss of customer trust.
Co
Privacy Laws and Regulations:
y
BPrivacy laws vary significantly across the globe, with different countries
SP
and regions having their own definitions of personal data and
ll N
When dealing with personal data, organizations must collaborate closely
rn e with their legal departments to identify all applicable privacy laws and
regulations. After consulting with legal experts, the security function is
C o responsible for implementing the appropriate security controls to ensure
privacy.
Key Point: Security is essential for achieving privacy—without strong
security controls, privacy cannot be guaranteed.
• Privacy is the state of being free from unwanted observation, and personal data includes any
information that uniquely identifies an individual.
• Protecting personal data is essential for compliance with privacy laws and to safeguard the
organization's reputation and value.
• Organizations must work with legal departments to understand applicable privacy regulations,
while the security function ensures proper controls are in place to protect personal data.
ti on
and stringent around the world. These laws require organizations, both in
government and private sectors, to implement security controls to
i bu
protect personal data.
Example: GDPR mandates that companies must protect ithe s r
tpersonal
data of EU citizens and report data breaches within r 72D
hours.
t f o
Impact of Unauthorized Disclosure:
o
If personal data (PII) is disclosed, both theNindividual whose data was
h a, the breach are affected. The
exposed and the organization that allowed
Na and the organization may face legal
individual’s privacy is compromised,
t
je e suffering a data breach of patient
and reputational consequences.
Example: A healthcare a
hsignificant
provider
records could face
reputation. Su
b fines and lawsuits, damaging its
C ol value.
the organization’s
B y
S P
CI S
for
es
ot
ell N
orn
C
a h
protection measures to ensure that personal well protected.
e t N laws
Key Point: Compliance with privacy is crucial to protect both
aje
personal data and the organization’s value.
h
S ub
C ol
By
I SSP
r C
fo
es
ot
ell N
orn
C
• Privacy refers to the protection of personal data from unauthorized observation or disturbance,
and it is a key aspect of privacy laws like GDPR.
• Unauthorized disclosures of personal data impact both the individual and the organization,
leading to legal consequences and reputational harm.
• Protecting personal data is essential for compliance with privacy laws and maintaining the
value and trust of the organization.
CI S
for telephone numbers, and more. However, the classification of these
s items as personal data can change depending on the context.
rn
private and requires protection.
C o
t
Depending on the location or jurisdiction, what constitutes personali on
i bu
data can vary. This variation affects how organizations protect and
str
manage data globally, leading to complexities in compliance with local
regulations.
D i
t for
Example: A company operating in the European Union must treat IP
No
addresses as personal data under GDPR, while this might not be
required in other regions.
h a,
Na
jeet
bha
l Su
y Co
B
I SSP
r C
fo
es
ot
ell N
orn
C
•Personal data includes any information that can be used to identify an individual, but its
definition and classification can vary across regions and laws.
•Categories of personal data include PII, PHI, and SPI, with varying levels of sensitivity.
•Personal data can be direct (immediately identifying) or indirect (requiring combination
with other data), and its classification can depend on the legal context and location.
on
• Government ID (SIN, SSN)
• Biometric data
uti
• Account numbers
tr i b
D is
Indirect Identifiers:
fo r
t
Indirect identifiers are pieces of informationothat, when combined with
a ,andNgeographic
other data, can be used to identify an individual. This includes
a h
descriptors like age, gender, ethnicity, indicators.
Examples:
etN
• Age
h aje
ub
• Gender
S
•olCity, State, Zip Code
C
By • Employment information
I SSP • Medical information
C • Financial information
for
tes
o
ell N
orn
C
on
• Email address
• Certificate/license numbers
uti
tr i b
Importance of Collaboration with Legal Teams:
D is
for
As a security professional, it is crucial to work closely with legal teams
t
No
to clearly define what constitutes personal data and which jurisdictions
and regulations apply. This collaboration ensures that the appropriate
h a,
security controls are implemented in compliance with relevant laws.
a data differently, so clear
Nclassify
t
Key Point: Different regions may
eto align security measures with legal
communication is needed
je
requirements.
b ha
Examples ofS u Indirect, and Online Identifiers:
o l Direct,
DirectC
B y identifiers include easily recognizable personal data like names or
government IDs, while indirect identifiers include demographic data
• Direct identifiers uniquely identify individuals (e.g., name, SSN), while indirect identifiers
require combination with other data (e.g., age, gender).
• Online identifiers include data collected online (e.g., IP addresses, cookies) that, when
combined with other information, can identify individuals.
• Collaborating with legal teams is essential to ensure compliance with privacy regulations and
to define personal data accurately across regions.
on
GDPR Principles:
uti
The General Data Protection Regulation (GDPR) outlines key principles
tr
for data protection that must be followed by organizations handlingi b
personal data of EU citizens. These include:
D is
for
• Lawfulness, fairness, and transparency: Data must be
t
No
processed legally and transparently.
a,
• Purpose limitation: Data should only be collected for specified
purposes.
h
Na data necessary for the
• Data minimization: Only collect
t
intended purpose.
je e
h
• Accuracy: Personal a must be kept accurate and up to date.
data
u b
• Storage limitation: Data should not be kept longer than
S
ol and confidentiality: Ensure proper security measures
necessary.
C
Byare in place to protect personal data.
• Integrity
for
es
ot
ell N
orn
C
t
Key Point: OECD principles provide the foundation for data protection
laws in many countries, including GDPR.
No
Role of Supervisory Authorities:
h a,
a organizations comply with privacy
Nthat
t
Supervisory authorities ensure
eare responsible for investigating data
je
regulations like GDPR. They
a necessary.
bhwhen
breaches, handling privacy complaints, and enforcing penalties or
u
corrective measures
Example: IflaS
C othe supervisory authority in that country can issue fines or
company violates GDPR by not protecting personal data
y
properly,
B corrective actions.
demand
I SSP
r C
fo
es
ot
ell N
orn
C
• Supervisory authorities are independent bodies in each EU state that oversee compliance with
privacy regulations, investigate complaints, and enforce penalties.
• GDPR principles include lawfulness, data minimization, accuracy, and security, ensuring that
organizations handle personal data responsibly.
• OECD principles serve as the global foundation for data protection laws, focusing on limiting
data collection, ensuring quality, and protecting privacy.
str
the owners. They require tools, training, and resources, which are
typically provided by the data owners.
D i
for
Data Processors: Process personal data on behalf of the
t
controller/owner. They must have clearly defined responsibilities.
No
Data Subjects: The individuals to whom the personal data relates (e.g.,
customers, patients).
h a,
Na
Key Point: Each role plays a critical part in the protection and
jeet
management of personal data.
ha
GDPR Overview:
b
The General Data Protection Regulation (GDPR) applies a single set of
Su
rules across all EU member states. It establishes Supervisory
l
Co
Authorities (SAs) in each state to handle complaints and monitor
Bycompliance.
SP
Seven principles of lawful data processing:
es Data minimization
ot Accuracy
ll N
Storage limitation
C o Accountability
Privacy breaches must be reported within 72 hours.
Key Point: GDPR is considered a global benchmark for privacy laws.
h a,
Security's Role in Privacy Compliance:
Na
et
Security professionals must implement security controls to achieve
je
privacy compliance. Privacy cannot be attained without security, as it
ha
ensures that personal data is protected according to privacy laws.
b
Su
Key Point: Security is the foundation of effective privacy protection.
l
Co
Global Privacy Regulations:
By Privacy laws vary significantly from country to country, but many are
SP
modeled on GDPR. The GDPR is seen as the standard for privacy
CI S regulation and many other countries are shaping their privacy laws
ell N
orn
C
• Data owners, custodians, and processors have clearly defined roles in managing and protecting
personal data, with GDPR serving as a model for global privacy laws.
• Security professionals are essential to ensuring compliance with privacy regulations by
implementing appropriate security controls.
• GDPR is a global benchmark for privacy laws, and many other countries have or will model their
regulations on its principles.
t
Organizations should limit the collection of personal data to what is
i on
i bu
necessary for providing services. Data should be collected lawfully,
tr
with the knowledge or consent of the data subject when appropriate.
s
D i
Example: A company should only collect customer data needed for
for
processing an order and not request unnecessary details.
t
No
Data Quality Principle:
Personal data must be relevant, accurate, complete, and up to date.
a,
This ensures that organizations maintain high-quality data and prevent
h
Na
errors or misuse.
jeet
Example: A healthcare provider must keep patient records updated to
ensure accurate diagnoses and treatments.
ha
Purpose Specification Principle:
b
Su
The purpose for collecting personal data should be clearly stated at the
l
Co
time of collection. This ensures transparency and builds trust with data
subjects.
By Example: An online retailer should inform customers that their email will
I SSP be used for shipping notifications and not for unrelated marketing.
fo
es
ot
ell N
orn
C
on
modification. Effective security controls are essential to achieve
privacy.
uti
Key Point: Without security, privacy cannot be achieved—security
safeguards protect personal data from breaches. tr i b
Openness Principle:
D is
for
Organizations must maintain a culture of openness and transparency
t
No
regarding how personal data is used. This principle builds trust and
allows individuals to understand how their data is being handled.
h a,
Example: A company’s privacy policy should clearly explain how
Na
customer data is used and provide easy access to that information.
jeet
Individual Participation Principle:
ha
Individuals (data subjects) should have the right to access, update, or
b
request the removal of their personal data. This ensures that individuals
Su
remain in control of their personal information.
l
Co
Example: A customer should be able to request the deletion of their
I SSP Data controllers are accountable for ensuring compliance with the
ell N
orn
C
• The OECD guidelines provide a set of best practices for managing privacy, including principles
for data collection, quality, use, and security.
• These guidelines are not mandatory, but they offer a helpful starting point for developing
privacy policies and aligning with global privacy standards.
• Organizations must consult legal experts to ensure compliance with specific national laws, as
the OECD guidelines alone are insufficient for compliance in all jurisdictions.
ti on
A DPIA is required under Article 35 of GDPR for data processing
i bu
str
activities that pose a high risk to the privacy rights of individuals. It
i
provides a more specific assessment focused on data protection.
D
for
Example: A company using biometric data or large-scale surveillance
t
No
may require a DPIA to assess the privacy risks involved.
h
Importance of Conducting PIAs/DPIAs:a,
a
Norganizations
e t
Conducting a PIA or DPIA helps to:
a je to privacy breaches.
Identify risks related
Implement
u bhcontrols to mitigate those risks.
o l S compliance with privacy regulations (e.g., GDPR).
Ensure
Key y C PIAs and DPIAs are ongoing processes that must be updated
B Point:
Pwhen there are significant changes in data processing operations.
I SS
r C
fo
es
ot
ell N
orn
C
a,
signed off by relevant stakeholders (e.g., senior management, data
protection officer).
h
Na
et
8. Monitor and Review: Continuously review the PIA/DPIA, especially
je
when changes occur in data processing activities.
ha
Regulatory Guidance (GDPR, ISO/IEC 29134):
b
Su
GDPR Article 35 provides specific requirements for conducting DPIAs,
l
Co
such as assessing the necessity and proportionality of data processing
ll N
An evaluation of the necessity and proportionality of data
rn e processing.
• PIAs and DPIAs assess the risks to personal data and help implement controls to mitigate those
risks, ensuring compliance with regulations like GDPR.
• PIAs should be conducted whenever there are significant changes in data processing, and the
results must be documented, monitored, and reviewed regularly.
• Article 35 of GDPR outlines the minimum requirements for DPIAs, including risk assessments
and measures to protect data subjects.privacy assessment process.
h aje
for security and international trade.
Examples: b
uITAR
S
l export(International Traffic in Arms Regulations) for
C o control.
By EAR (Export Administration Regulations) for commercial
C
for
tes
o
ell N
orn
C
a,
These functions work together to ensure the organization remains
h
compliant with applicable laws and regulations.
Na
Legal function: Determines the organization’s compliance
needs.
jeet
ha
Privacy function: Oversees data protection requirements.
Audit/compliance function: Monitors and ensures compliance
b
Su
through regular audits and assessments.
l
Co
Key Point: Security professionals must collaborate with these functions
to implement the appropriate controls.
By Example of Implementation Process:
SP
Step 1: Legal and privacy teams determine the compliance
rn
monitoring.
C o
• Compliance requirements vary by industry, jurisdiction, and asset type. Legal and regulatory
standards must be met through appropriate security controls.
• Industry standards provide specific guidelines that help ensure security practices are aligned
with industry best practices (e.g., ISO, NIST).
• Collaboration between legal, privacy, and compliance teams is essential for identifying
compliance needs and implementing effective controls.
a,
with organizational goals and sets the right tone from the top.
h
Key Point: Effective security governance starts with management’s
Na
commitment to the security function and is communicated throughout
the organization.
jeet
ha
Role of Overarching Security Policy:
b
Su
The overarching security policy should clearly state that the CEO and
l
upper management are accountable for protecting all organizational
y Co
assets. It emphasizes that everyone is responsible for security and
asset protection, creating a security culture within the organization.
B
SP
Key Point: This policy should be simple, communicated by the CEO, and
for
es
ot
ell N
orn
C
for
how to create a secure password).
t
No
Baselines: Define minimum acceptable security measures (e.g.,
minimum patch levels or security configurations).
h a,
Guidelines: Offer suggestions for best practices in areas where
Na
flexibility is needed (e.g., guidelines for remote work security).
jeet
Example of Policy Flow:
ha
Step 1: The CEO communicates the overarching security policy,
b
emphasizing accountability and responsibility across the organization.
l Su
Step 2: Functional security policies are developed for specific areas
y Co
(e.g., access control, data protection).
SP
implemented to support these policies and ensure they are actionable.
es
ot
ell N
orn
C
• Security policies are critical to aligning security practices with organizational goals, and they
must be communicated top-down from the CEO or Board of Directors.
• Functional policies are supported by standards, procedures, baselines, and guidelines,
which detail how policies are enacted.
• Security policies must be reviewed and updated regularly, especially the standards and
procedures that support the functional policies.
a,
Supporting Documents:
h
Na
Standards: Define the technical details, such as software
et
versions.
je
Procedures: Provide step-by-step instructions (e.g., how to
ha
install anti-malware software).
b
Su
Guidelines: Offer recommendations for best practices (e.g.,
l
suggesting the use of heuristics in anti-malware software).
y Co
Baselines: Define minimum acceptable levels of security
B implementation (e.g., the minimum version of software
I SSP required).
Key Point: Each document supports the other to ensure the policy is fully
r C enacted and followed.
fo
es
ot
ell N
orn
C
h a,
Importance of Leadership and Supporting Functional Policies:
Na
The success of the security policy model depends on strong
jeet
leadership from the Board or CEO. They must work with security to
ha
develop policies and support the necessary functional policies for
b
effective implementation.
Su
Key Point: A lack of commitment from top management can result in
l
Co
failure to implement effective security policies (e.g., if the CEO does not
I SSP
r C
fo
es
ot
ell N
orn
C
• The Security Document Hierarchy ensures that overarching security policies are supported by
functional policies, standards, procedures, baselines, and guidelines, all of which work together
to make the policy actionable.
• Leadership from the Board or CEO is essential to the success of the security policy model, and
strong communication is necessary to ensure the entire organization understands its role in
security.
on
management.
Standards:
uti
r i b
Definition: Specific hardware, software, and security solutions that
t
is
must be used to comply with policies. Standards specify exact
D
for
technologies or processes to be implemented.
Examples:
t
No
Specific anti-virus software (e.g., McAfee).
a,
Specific access control system (e.g., Forescout).
h
Na
Specific firewall system (e.g., Cisco ASA).
jeet
Key Point: Published guidelines, like ISO 27001, can be adopted as
ha
organizational standards.
Procedures: b
l Su
Definition: Step-by-step instructions on how to perform specific tasks,
y Co
ensuring mandatory actions are followed. Procedures are essential for
operational consistency and compliance.
B
SP
Examples:
ell N mandatory.
orn
C
str
but are not mandatory. Guidelines help organizations align with best
practices without making them hard requirements.
D i
for
Examples:
t
Government recommendations on cybersecurity practices.
No
Security configuration recommendations for systems.
h a,
Organizational best practices for software development.
Na
Key Point: Guidelines allow for flexibility and are not binding, so they
jeet
don’t result in audit failures if not followed.
bha
l Su
y Co
B
I SSP
r C
fo
es
ot
ell N
orn
C
• Policies communicate management’s intent and provide authority for security actions,
while standards specify the technical details.
• Procedures provide detailed instructions for completing tasks, and baselines ensure
minimum acceptable security levels.
• Guidelines offer recommendations, providing flexibility without imposing mandatory
requirements.
on
BIA will help prioritize recovery of critical applications like customer
databases over non-essential systems.
u ti
External Dependencies:
r i b
t that
Definition: Refers to the third-party entities or externalis factors
D its direct
rpartners
are critical to an organization's operations but are beyond
t
control. These can include suppliers, vendors, and fo that
o
,N
provide necessary goods or services for the organization’s critical
functions.
h a
Key Point: Understanding external a dependencies is critical to mapping
out interdependencies between
e t Nrobust
internal functions and external
je
entities, which helps in creating
a
continuity plans.
t
As part of the BIA, organizations must map out the interdependenciesi on
i bu
between internal systems, processes, and external parties (e.g., vendors
str
or third-party services). Understanding these interdependencies is
D i
crucial for developing effective business continuity strategies.
t for
Example: A financial services company may have critical dependencies
No
on its cloud service provider for hosting its applications. Disruptions at
a,
the provider’s end could have a cascading impact on the company’s
services.
h
Na
jeet
bha
l Su
y Co
B
I SSP
r C
fo
es
ot
ell N
orn
C
• Business Impact Analysis (BIA) identifies critical functions and prioritizes recovery strategies in
the event of a disaster, forming a key part of Business Continuity Management (BCM).
• Understanding external dependencies (e.g., vendors, suppliers) and interdependencies
among internal and external processes is essential for creating a comprehensive business
continuity plan.
• Both BIA and external dependencies are covered in-depth in Domain 7, which focuses on BCM
and the role of security in ensuring continuity.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Contributing to and Enforcing Personnel
Security Policies and Procedures - 1
Personnel Security Policies and Procedures:
• Personnel security policies
and procedures Definition: Policies that govern the hiring, onboarding, monitoring, and
termination of employees with the aim of ensuring that personnel
• Hiring, onboarding, and
adhere to security standards and minimize the risk of insider threats.
termination processes
• Employment controls and Key Point: These policies help ensure that employees handle
cost-effectiveness organizational assets responsibly and comply with security protocols.
• Handling security violations Hiring, Onboarding, and Terminating Employees:
• Managing employee
Hiring Process: Implement background checks and validate employee
terminations and resignations
credentials to minimize the risk of hiring individuals who may pose a
on
• Employee duress
security threat.
uti
tr b
Onboarding: Ensure that new employees receive security training and
i
understand their responsibilities regarding organizational security (e.g.,
use of corporate assets, data handling).
D is
for
Termination Process: On termination, ensure that access to systems
t
No
is revoked immediately, and conduct an exit interview to recover all
company assets (e.g., laptops, ID badges, access cards).
h a,
Example: A terminated employee’s access to corporate networks should
Na
be revoked to prevent potential insider threats.
je et
Employment Controls and Cost-Effectiveness:
Employment controls a(e.g., background checks, security awareness
hshould
b
ucontrols mustbebeimplemented
training, monitoring) to mitigate personnel risks.
S
l risk appetite.
C o
However, these
organization’s
cost-effective and aligned with the
for
tes
o
ell N
orn
C
on
• Employee duress should follow.
Managing Employee Terminations and Resignations:
uti
Employee Terminations: When terminating an employee, follow r i b
t company
is
procedures to immediately revoke access to systems, retrieve
D risks.
assets, and conduct an exit interview to understand
f o r potential
Employee Resignations: Ensure that employees
o t sensitive
who resign are not left
, N
with lingering access to critical systems and that information
es
ot
ell N
orn
C
• Personnel security policies cover the lifecycle of employees from hiring to termination,
ensuring that security risks are mitigated through background checks, onboarding,
and offboarding processes.
• Handling security violations and managing terminations with effective procedures is
critical to reducing the risk of insider threats.
• Organizations should also be aware of employee duress situations and provide safe
mechanisms for reporting concerns.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Personnel Security Policies - 1
Importance of Personnel Security Policies:
• Importance of personnel
security policies Definition: Clearly documented and communicated personnel security
policies help address the risks associated with employee actions and
• Candidate screening and
ensure the protection of valuable organizational assets. These policies
hiring
are implemented through procedures and include a range of security
• Employment agreements and
controls.
policy-driven requirements
• Onboarding and offboarding Key Point: Security policies define acceptable behavior, responsibilities,
processes and access controls, ensuring the organization and employees work
• Involuntary vs. voluntary together to protect the business.
on
termination 1.8.1 Candidate Screening and Hiring:
• Employee duress
u
New Personnel Risks: Every new hire introduces security risks thatti
must be mitigated through thorough candidate screening and
tr i b
onboarding procedures.
D is
Personnel Security Controls: Examples of controlsrinclude
t o
background checks, access badges, ID cards, facceptable use
o
, Nto sensitive systems, they
policies, code of conduct, and employee handbooks.
a
Example: Before a new hire is given access
h use policies.
a
must agree to and sign off on acceptable
e
1.8.2 Employment Agreements t N and Policy-Driven Requirements:
je a new employee joins, they must review
Onboarding Process:aWhen
h
b policies
and agree to company such as security protocols and
S upolicies
ol of Duties and Job Rotation: These controls are used to
acceptable use before being granted system credentials.
C
Separation
By fraud or policy violations by limiting any one individual’s control
prevent
CI S
or
ensure employees have only the minimum access necessary to perform
ll N
assets and maintaining compliance with security policies.
rn e
C o
on
termination
Example: During involuntary termination, a physical security officer
• Employee duress may be present to prevent any attempts to harm company assets.
uti
Employee Duress:
t r i b
Definition: Employee duress refers to a situation where i
ans
D a employee is
forced to perform actions under threat or coercion
fo r
(e.g., bank
manager forced to open a vault under gunpoint). t
ohave mechanisms, such as
N
a,that an employee is acting under
Duress Management: Organizations should
keywords or code phrases, to indicate
h
Na to respond to duress situations is
duress. Training employees on how
t
crucial.
je e environment, employees might use pre-
b
agreed code phrases hato alert others that they are acting under duress,
Example: In a security-sensitive
u
similar to theSchallenge-response
l checks in The Bourne Identity.
y Co
S PB
CI S
for
es
ot
ell N
orn
C
• Personnel security policies address security risks from employees through comprehensive
screening, onboarding, and offboarding processes.
• Employment agreements (such as acceptable use policies) and access control mechanisms
(e.g., least privilege, need to know) are essential in limiting exposure to risks.
• Employee duress scenarios should be managed through training and predefined code phrases
to signal distress and prevent harm to the organization.
SPtransactions.
duties, identifying any hidden fraudulent
CI S
for
es
ot
ell N
orn
C
h a,
•Least Privilege: Grants employees only the minimum
Na
permissions necessary to perform their tasks, reducing
e et
unnecessary exposure to sensitive data.
j
a
hcontrols
•Key Point: These
u b limit the risk of unauthorized access
l S
to critical assets and protect sensitive data from being
Co by those who do not need it.
accessed
y
B
•Example: A financial analyst may have access to certain
h a,
require systematic removal of access to prevent
unauthorized use of company systems.
Na
jeet
•Example: A terminated employee should have their access to
ha
the organization's email and systems revoked immediately
b
upon departure.
l Su
y Co
B
I SSP
r C
fo
es
ot
ell N
orn
C
• Job rotation and mandatory vacation are personnel security controls designed to detect and
prevent fraud by requiring different employees to take over sensitive roles periodically.
• Separation of duties ensures critical tasks are split between multiple employees, reducing the
risk of fraud or unauthorized actions.
• The least privilege and need-to-know principles restrict access to sensitive information,
ensuring employees have only the access necessary to perform their job.
• Proper onboarding and offboarding processes ensure that employees are granted and removed
from access privileges in a secure and timely manner.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Enforcing Personnel Security Controls - 1
Enforcement of Personnel Security Controls:
• Enforcement of personnel
security controls Definition: Personnel security controls are enforced through policies,
• Role of contracts, NDAs, and contracts, NDAs, and monitoring tools such as attestation and audits.
agreements Enforcement starts at the hiring process, continues through the
• Attestation and audit for employment period, and ends after the employee leaves the
compliance organization.
• Extending personnel security Key Point: Security policies must align with organizational goals and
controls to third parties include acceptable use policies and other behavior guidelines to
• Organizational policies for ensure compliance.
on
employees and third parties
Role of Contracts, NDAs, and Agreements:
uti
r i
Contracts and NDAs serve as legal tools that help enforce personnel b
t parties
security controls by requiring employees, contractors, and
is third
D behavior
that could harm the organization.
f o r
to agree not to disclose sensitive information or engage in
By
attest to followed security policies, providing a formal record of
compliance.
orn
C
a,
Example: An organization may prioritize securing its financial data over
h
securing low-risk, non-critical systems.
Na
Application of Resources in Risk Management:
eet
Economical Application of Resources: Resources such as budget,
j
ha
personnel, and technology must be allocated strategically to minimize
b
risks. This means applying cost-efficient controls that balance the
Su
need for security with available resources.
l
y Co
Key Point: The goal is to implement the most effective controls within
the organization's resource limits, ensuring that critical assets are
B adequately protected without overextending resources.
I SSP
r C
fo
es
ot
ell N
orn
C
a,
balance between securing critical assets and maintaining operational
h
efficiency without unnecessary expenditure.
Na
Key Point: Risk management helps organizations determine where to
jeet
allocate resources effectively to achieve maximum protection for the
ha
most valuable assets.
b
l Su
y Co
B
I SSP
r C
fo
es
ot
ell N
orn
C
•Risk management involves identifying, assessing, and prioritizing risks to protect assets
within an organization's resource limitations.
•The process includes understanding the value of assets, analyzing potential risks, and
implementing cost-effective risk treatment measures.
•The main challenge in risk management is balancing limited resources with the need to
protect critical assets.
on
• Challenges faced by of revenue).
organizations
ti
ibu
Probability: The likelihood of a risk materializing (e.g., a data breach).
Key Point: Risks are ranked based on their potential impact tand r
likelihood using quantitative or qualitative analysis. is
Treatment: fo rD
ot must decide how to
,N
Definition: After identifying risks, the organization
treat them.
h a
Risk Treatment Methods: a
N (e.g., not moving to a cloud
e tentirely
aje
Avoid: Avoid the risky action
based system). h
S
Transfer: Shift uthebrisk to a third party (e.g., purchasing cyber
C ol
insurance).
B y Reduce the risk by implementing controls (e.g., using
Mitigate:
orn
C
• Risk management involves understanding asset value, performing risk and threat
analysis, and treating risks based on their severity and probability.
• Risk analysis includes assessing threats, vulnerabilities, impact, and probability,
which helps organizations determine how to prioritize and manage risks.
• Risk treatment options include avoiding, transferring, mitigating, or accepting risks,
depending on the cost-effectiveness and organizational strategy.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Asset Valuation - 1
Importance of Asset Valuation:
• Importance of asset valuation
• Types of assets: tangible and Definition: Asset valuation is the process of identifying and ranking the
intangible valuable assets of an organization, which is a critical first step in risk
• Qualitative analysis vs. management.
quantitative analysis Types of Assets: Assets include tangible items (e.g., buildings,
• Characteristics of qualitative equipment) and intangible elements (e.g., company reputation,
and quantitative analysis intellectual property).
Key Point: Before risks can be managed, an organization must first
understand which of its assets are the most valuable and prioritize their
protection accordingly.
ti on
i bu
Qualitative vs. Quantitative Analysis:
str
Qualitative Analysis:
D i
for
Characteristics: Focuses on relative ranking of assets using
t
No
subjective measures like "low," "medium," or "high." Does not assign
a,
monetary value to assets.
h
Efficiency: Qualitative analysis is generally faster and simpler to
Na
conduct, relying on professional judgment rather than detailed
calculations.
jeet
b hafor customer-facing
Example: Ranking business processes by criticality, assigning labels
S u
such as "high priority" systems and "low priority" for
ol Analysis:
internal tools.
C
By
Quantitative
Characteristics: Focuses on assigning objective monetary values to
I SSP assets, using data and calculations to quantify risks and asset worth.
r C Challenges: Fully quantitative analysis is time-consuming and difficult
o te valuation.
ll N
Example: Assigning a monetary value to company buildings and
calculating the potential financial loss from natural disasters or
rn e cyberattacks.
C o
tN
qualitative methods for efficiency.
e
h aje
Sub
C ol
B y
S P
CI S
for
es
ot
ell N
orn
C
for
es
ot
ell N
orn
C
a,
Vulnerability: Employees not trained on social engineering attacks
h
Na
• Operational/Process Risk:
et
Threat: Fraud
je
Vulnerability: No segregation of duties in financial processes
ha
• Technical Risk:
b
Su
Threat: Malware
l
Co
Vulnerability: Unpatched software
By • Physical Risk:
Threat: Power outage
es • Residual Risk:
ot Definition: The remaining risk after controls have been implemented to
orn Key Point: Even with security controls in place, there will always be some
level of residual risk that organizations must decide whether to accept
C or further mitigate.
• Risk analysis involves identifying threats and vulnerabilities, and assessing their
potential impact on assets.Asset owners and senior management must be involved to
accurately assess the value of assets and make risk management effective.
• Residual risk is the risk that remains after mitigation efforts, and it must be carefully
evaluated to determine if it is acceptable to the organization.
h
Risk: Represents the potential for harm to an a
and its vulnerabilities.
a
N exploit a vulnerability (e.g., cyberattacks,
Threat: Any potential danger thattcould
natural disasters). e
e a threat can exploit to cause harm (e.g., unpatched
jthat
Vulnerability: A weakness
h a
u b power).
systems, lack of backup
S
Impact: The lseverity of the consequences if the risk materializes (e.g., financial loss,
C odamage).
reputational
S PKey Point: These components fit together to help organizations assess the overall
CI S risk to each asset, enabling them to prioritize risks and implement appropriate
controls.
es
ot
Risk is present when a threat can exploit a vulnerability, leading to potential
damage to an asset. The impact of that damage and the likelihood of the event
ll N
occurring further help define the severity of the risk.
on
Definition: A weakness in an asset that could be exploited by a threat.
• Risk:
u i
Example: An unpatched server, lack of network segmentation, or insufficient employee training.
t
r i b
Definition: The exposure to a threat or vulnerability, where a weakness in an architecture,
t
process, or asset could be exploited, leading to negative consequences.
D is
Example: The risk of a data breach if there is no encryption or security measures in place.
for
• Asset:
t
Definition: Anything that has value to the organization and needs to be protected.
No
Example: Company data, intellectual property, customer records, physical infrastructure.
a,
• Exposure/Impact:
Definition: The negative consequences that occur if a risk is realized.
h
Na
Examples:* Loss of life, financial loss, reputational damage, legal liabilities, operational
et
downtime.
• Countermeasures and Safeguards:
je
ha
Definition: Controls or actions taken to reduce threats, vulnerabilities, and negative
impacts of risks.
b
Su
Example: Implementing firewalls, encryption, and employee training to mitigate the risk of
l
cyberattacks.
Co
• Residual Risk:
By Definition: The risk that remains after countermeasures and safeguards are implemented.
Key Point: Even after applying controls, some level of residual risk will still remain, which
SP
needs to be assessed to determine if it is acceptable.
CI S Example: After installing firewalls and encryption, there may still be residual risk from zero-day
vulnerabilities or insider threats.
es
ot
attacks that cause damage to valuable assets.
The impact or exposure of a risk materializing leads to negative consequences, such as
ll N
financial loss or reputational damage.
rn e Countermeasures are implemented to reduce risks, but residual risk remains even after
these measures are in place.
C o
• Key terms like threat agents, threats, vulnerabilities, and assets are essential in
understanding risk management.Countermeasures help mitigate risks, but residual
risk will always remain, even after implementing controls.Understanding these terms
and their relationships is crucial for effective risk management and mitigation efforts.
on
3. Example: If a voltage spike damages 3 cameras, resulting in a $200 loss, EF =
i
10% (since $200 is 10% of $2,000).
ut
b
3. Single Loss Expectancy (SLE):
1. Definition: The cost incurred each time a risk occurs.
tr i
2. Formula:
SLE = AV * EF
D is
for
3. Example: SLE = $2,000 * 10% = $200. This means each voltage spike causes
$200 worth of damage.
t
4. Annualized Rate of Occurrence (ARO):
No
1.
a,
Definition: The number of times a risk is expected to occur per year.
h
2.
a
Example: If voltage spikes happen 3 times a year, ARO = 3.
5. Annualized Loss Expectancy (ALE):N
t
e expected annual cost of a risk.
1.
je
Definition: The total
*a
hALE
2. Formula:
b
ALE = SLE ARO
u system is= $200
S
3. Example: * 3 = $600. The annual cost of voltage spikes for the
Importanceo
l CCTV $600.
• ALEy
C of ALE in Risk Management:
P B provides a quantitative measure of how much a specific risk will cost the organization
annually.
I SS • Key Point: ALE helps organizations decide which security controls are cost-effective and
fo Cost-Justified Controls:
es
ot
• Controls should only be implemented if their cost is less than or equal to the calculated ALE.
N • Example: If a control costs $800 to prevent a risk that has an ALE of $600, it would not be a
ell
good investment. The company might decide to accept the risk instead.
C • Risk acceptance is a valid option if the cost of mitigating controls exceeds the potential
annual loss (ALE).
• Key Point: Asset owners are responsible for making decisions regarding risk acceptance,
ensuring that resources are not spent on controls that are not cost-justified.
•The ALE formula is used to calculate the annual cost of risks by multiplying SLE (single
loss expectancy) by ARO (annual rate of occurrence).
•Understanding the value of assets (AV), exposure factor (EF), and ARO allows
organizations to make informed decisions about risk mitigation.
•Controls should be implemented only when cost-effective, and risks may be accepted
when the control cost exceeds the ALE.
on
valid option • Example: Avoid flying to eliminate air travel risks, but this may increase
driving risks, which could be higher.
uti
•
out on the fun.
tr i b
Diving Board Example: Don't jump off the diving board, but you miss
•
D is
Key Point: Risk avoidance is not usually the first option because
for
companies need to take risks to grow and innovate.
Risk Transfer:
t
•
No
Definition: Shifting the financial responsibility of the risk to another
a,
party, such as through insurance.
•
h
Pros: Can reduce the financial impact of a risk.
•
Na
Cons: Ultimate accountability for managing the risk remains with the
•
organization.
jeet
Example: Purchasing cyber insurance to cover financial losses from a
ha
cyberattack.
b
Su
• Diving Board Example: Get insurance or have someone else jump.
•
l
Key Point: Transferring responsibility does not transfer
y Co
accountability.
Risk Mitigation:
B Definition: Implementing controls to reduce risk to an acceptable
SP
•
level.
CI S • Pros: Reduces the risk to a manageable level; the focus of most risk
ot
• Example: Implementing security controls such as firewalls or
ll N
encryption to reduce the impact of cyberattacks.
• Diving Board Example: Jump from a lower diving board to reduce the
rn e risk of injury.
on
valid option • Key Point: Risk acceptance should only be decided by senior
management or the asset owner.
u ti
Risk Ignorance:
r i
t andb
• is
Definition: Ignoring a known risk, which is not a valid approach
violates due care and due diligence.
fo r Dthat multiple
•
servers lack antivirus software. This couldo
t
Example: A Chief Security Officer ignores a warning
uti
• Key Point: Each layer of defense should have preventive, detective,
and corrective controls for maximum security.
tr i b
Types of Controls (Table 1-21):
D is
for
1.Directive Controls:
t
1. Definition: Direct or encourage compliance with security
policies. No
h a,
2. Example: A fire exit sign directs people to safety in case of
a fire. Na
jeet
2.Deterrent Controls:
ha
1. Definition: Discourage violations of security policies.
b
Su
2. Example: A private property sign warns of potential danger
l
y Co (e.g., trespassing penalties) to deter unauthorized access.
B 3.Preventive Controls:
r C happening.
ll N
fires.
rn e
C o
on
type 2. Example: A fire suppression system that activates after a fire
has started to minimize its spread.
ut i
3.Recovery Controls:
r i b
t to normal
is
rD
1. Definition: Recover and restore a system or process
operations following an incident.
fo
t restoration of systems
2. Example: A data backup policy allows
o
after a failure.
a,N
4.Compensating Controls:
a h
1. Definition: Used in
t N conjunction with other controls to provide
added security e
jeHostorIntrusion
to replace another control if necessary.
h a
b
2. Example: A Prevention System (HIPS)
u on a critical server in addition to a Network
l Sdeployed
C o Intrusion Prevention System (NIPS).
B y of Controls:
Timing
S P•Before an Incident:
CI S • Directive, Deterrent, Preventive, and Compensating controls.
on
• Examples: Background checks, acceptable use policies, and
i
onboarding/offboarding policies.
Logical/Technical Controls:
ut
•
•
Focus on software and hardware mechanisms that protect systems.
tr i
Examples: Firewalls, IPS/IDS, antivirus software, and proxy servers.b
•
is
Key Point: Logical controls are software-based, while technical controls are
D
for
hardware-based.
Physical Controls:
•
t
Protect physical infrastructure and prevent unauthorized access to physical
No
spaces.
a,
• Examples: Fences, gates, guards, CCTV, and bollards.
Detailed Examples
h
Na
Administrative Controls:
• Directive: Policies, procedures, and configuration standards.
•
•
jeet
Deterrent: Guidelines like warning banners or “Beware of Dog” signs.
Preventive: User registration procedures and enforcing login mechanisms.
•
bha
Detective: Reviewing violation reports.
Corrective: Employee termination procedures.
Su
•
• Recovery: Disaster Recovery (DR) plans.
l
Co
• Compensating: Supervision and job rotation.
Logical/Technical Controls:
By •
•
Directive: Configuration standards.
Deterrent: Warning banners on networks.
I SSP •
•
Preventive: Login mechanisms and operating system restrictions.
Detective: SIEM systems (Security Information and Event Management).
s
• Compensating: Keystroke logging and layered defense.
ll N
• Deterrent: "Beware of Dog" signs.
rn e •
•
Preventive: Fences and RFID badges for access control.
Detective: CCTV systems for monitoring.
C o •
•
Corrective: Fire suppression systems.
Recovery: Rebuilding physical structures after damage.
• Compensating: CCTV and keystroke logging.
t Na
Combined Aspects at it is designed to do.
• jee that effectively filters network
Example: A firewall
traffic. ha
• Sub
Assurance: The control can be evaluated and tested to
l
Co
ensure it works properly.
ByExample:
• Regular monitoring and audit logs are used
to confirm the firewall continues to block unauthorized
I SSP access.
r C Importance of Combining Both Aspects:
fo
es • A security control should not only perform its intended
ot function but also be tested regularly to ensure it
ll N
continues to work effectively.
• Functional controls ensure the security measure performs its intended function.
• Assurance ensures the control is working correctly and can be tested and verified.
• Both aspects are crucial for an effective security control, ensuring it is both operational
and trustworthy over time.
No
• This ensures a balance between the security function and usability.
•
h a,
Determining Control Implementation:
Na
• How much security is enough?
et
• Striking a balance between security and usability is crucial.
je
Excessive security can hamper productivity, while too little can lead
ha
to vulnerabilities.
•
b
The goal is to optimize security to protect assets without negatively
Su Effectiveness:
impacting the organization's daily operations.
l
CoMetrics:
Measuring Control
•
yUsing
ot
tasks (e.g., uptime, number of incidents).
ell
auditors, and third-party reports.
C •
•
Incident reduction rates, system downtime, compliance levels,
and cost savings due to improved security.
Each metric should give the audience clear information on the
effectiveness of the controls in place.
CIS
risk matrix and prompt reevaluation.
No
systems and organizations.
• ISO 31000:
h a,
Na
• Offers a set of standards for best practices in risk
et
management for any organization.
je
ha
• COSO:
b
Su
• Focuses on enterprise risk management (ERM), providing
l principles and guidelines to manage risks at the enterprise
Co level.
yISACA Risk IT Framework:
B •
s fo
ote
ell N
orn
C
• Risk management frameworks offer structured best practices for identifying and
addressing risks in organizations.
• Common frameworks include NIST SP 800-37, ISO 31000, COSO, and ISACA Risk IT,
each providing different approaches depending on organizational needs.
• Frameworks provide the foundation for efficient, effective, and organized risk
management.
on
2.Categorize Information Systems:
1.
ti
Identify and categorize information systems based on impact on
u
b
confidentiality, integrity, and availability (CIA).
2.
tr i
Questions: "What systems do we have?" "Who owns the data?" "How
sensitive is it?"
D is
for
3.Select Security Controls:
1.
t
After risk assessment, select and tailor security controls
No
(management, operational, technical).
a,
2. Controls are chosen based on system categorization and
organizational needs.
h
Na
4.Implement Security Controls:
1.
je et
Implement selected security controls, ensuring they are documented
in security and privacy plans.
2.
ha
Controls are incorporated into the organization's operational
b
framework.
SuControls:
1.ol Determine whether controls are working as intended through testing
5.Assess Security
ell
1. Continuous monitoring of controls to ensure they remain effective
rn
over time.
C o 2.
3.
Adapting to new threats, vulnerabilities, and business changes.
Risk management evolves towards real-time processes.
• NIST SP 800-37 RMF consists of 7 steps that provide a comprehensive approach to risk
management for information systems.
• The steps cover everything from preparing to implementing, assessing, authorizing, and
monitoring security controls.
• Continuous monitoring ensures systems adapt to new vulnerabilities and maintain
security.
1.STRIDE:
i bu
1.
str
Dev eloped b y Microsoft to categoriz e d iffer ent types of secu rity threats.
2. Spoo fing iden tity
D i
for
3. Tampering with data
t
4. Repud iation
No
5. Information disclosure (p rivacy breach)
a,
6. Denial of service (DoS)
7. Elevation of priv ilege
h
Na
8. Exam ple: STRIDE can be applied to a web app lication to assess differen t ar eas where
these types of threats may manifest.
eet
2.PASTA (Process f or Attack Simulation and Thre at Analysis):
j
ha
1. Risk-centric threat modeling method ology with seven stages focused on assessing th e
impa ct of thre ats and business objectives.
b
Su
2. Seve n Stages:
l
1. Definition of Obj ectives
Co
2. Definition of the Technical Scope
3. Applicati on Decomposi ti on
By 4. Threat Analys is
SP
5. Weakness and Vulnerabi lity Analysis
6. Attack Modeling & Simulati on
r
3. Exam ple: Useful in envir onments with a focus o n mitigating business impact.
fo 3.DREAD:
N ot 2. Damage p otential
ell
3. Repro ducibility
4. Exploitability
C
6. Discoverability
7. Exam ple: Can be used in threat modeling for iden tifying which vu lnerab ilities pose the
most significant risk to business oper ations.
on
• Denial of Service: Prevents legitimate use of services (Availability violation).
•
violation).
u t i
Elevation of Privilege: Gaining unauthorized admin/root access (Authorization
•
tr i b
Use Case: Can be used for applications, networks, and various system components.
is
rD
PASTA (Process for Attack Simulation and Threat Analysis):
• Attacker-focused, risk-centric methodology.
fo
t perspective.
•
o
Focuses on business and technical viewpoints for a strategic
Narchitecture.
•
a ,
Includes input from governance, operations, and
More detailed than STRIDE: Includes ah
•
a broader range of considerations like business
tN
impact.
e
aje Scope:
• Seven Stages:
• Define Objectives: Focuses on business risks and impact early.
•
b h
Define Technical Identifies all technical components that support
u
business objectives.
•
l SApplication Decomposition: Understand data flows within the application.
• o Threat Analysis: Use internal and industry threat intelligence to assess risks.
By C• Vulnerability/Weakness
threats.
Analysis: Correlates vulnerabilities with identified
CI S •
exploited.
Risk/Impact Analysis: Assess risk and decide on mitigation or risk
for acceptance.
es Key Differences:
ell N • PASTA is attacker-focused and risk-centric, performing analysis from both business
and technical perspectives with more detail.
orn • STRIDE is easier to apply to specific threats, while PASTA integrates the larger business
C context and technical risk modeling.
• STRIDE is a straightforward threat modeling tool that identifies specific types of security
threats.
• PASTA is more detailed and integrates business risk analysis with technical threat
modeling.
• Both methodologies help systematically assess and prioritize security risks, but PASTA
provides a broader, risk-centric approach compared to the threat-focused STRIDE.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
DREAD Threat Modeling
DREAD:
• DREAD Overview
• Purpose: Used to measure and rank the severity of threats.
• Five Key Points in DREAD
• Using DREAD with STRIDE • Used with STRIDE: STRIDE identifies the threats, and DREAD ranks
them by severity.
• Calculating DREAD Scores
• Scoring: Each key point (D, R, E, A, D) is scored from 1 to 10, where 1 is
low-risk and 10 is high-risk.
• Final Score: The sum of the five key point scores is divided by 5, giving
a score out of 10.
• Interpretation: The higher the score, the more severe the threat.
• Example: If a threat is easy to exploit and affects a large number of
users, it will have a high DREAD score.
ti on
i bu
Five Key Points of DREAD:
Damage: How much damage can the threat cause? is
tr
r D or system
•
•
compromise). t fo
Score: 1-10 (e.g., 10 for major data breaches
o
N be reproduced?
•
a ,
Reproducibility: How easily can the attack
by many attackers).ah
• Score: 1-10 (e.g., 10 if the attack can be repeated easily
N
Exploitability: How easytis it to exploit the vulnerability?
•
e
•
h aje(e.g., 10 for simple attacks requiring no
Score: 1-10
y C system).
B
P• Discoverability: How easily can the threat be discovered?
I SS • Score: 1-10 (e.g., 10 if the attack is highly visible or easily
r C detected).
fo
es Using DREAD with STRIDE:
rn
Tampering), use DREAD to rank the severity of each identified threat.
• DREAD is used to measure and rank the severity of threats, based on Damage,
Reproducibility, Exploitability, Affected Users, and Discoverability.
• STRIDE helps identify threats, and DREAD ranks them by severity.
• DREAD Score: Calculated by averaging the scores of the five key points, the higher the
score, the more severe the threat.
,N
or authority figure, handing over information
Techniques Used in Social Engineering:
h a
Phishing: Sending fraudulenta
t Ninformation.
• emails that appear legitimate to trick
e
users into giving up personal
je to beinformation.
•
h asensitive
Pretexting: Pretending someone trustworthy, like a manager or IT
• Definitions of Social • Manipulation of people through intimidation, deception, or rapport-building to gain unautho rized
infor mation or access.
Engineering
• Exp loits human emotio ns like fear, trust, or curio sity.
• Phishing Variants
• Common Social Engineering • Exam ple: Pretending to be IT su pport and conv incing someone to rev eal their password .
• Spear Phishing: Targeted phishing attacks aimed at specific individuals or gr oups, often with
personalized content.
• Exam ple: A fraudulent invo ice sent to accounts p ayable.
•
ti on
Whaling: Targeting h igh-level executiv es (CEO, CFO) to gain access to sensitive information.
• Exam ple: A fake urgent email to a CEO asking for wire transfers.
i bu
• Smishing: Phishing via SMS/text messages sent to mobile u sers.
str
•
D i
Exam ple: A text from a "ban k" asking for login cred entials via a lin k.
for
• Vishing: Phishing through voice calls/VoIP, pretendin g to be from a trusted entity.
•
t
Exam ple: A fraudulent phon e call asking for sensitive account in fo rmation.
Na
• Exam ple: Posing as a b ank repr esentativ e asking abou t "su spicio us activity " in the
account.
•
eet
Baiting: Using a physical objec t (e.g., a US B drive) to lure the victim into comp romising their system.
j
ha
• Exam ple: Dropp ing in fected USBs in pub lic places, h oping someon e p lugs them in.
•
b
Tailgating: Fo llowing someone with a fake badge into a restricted ar ea.
•
l Su
Piggybacking: Gain ing un authoriz ed access by following someo ne into a secure area withou t a
Co
badge.
SP
• Training and Aw areness: Educate emplo yees on recognizing phishin g emails, suspicious requests,
and ver ification methods.
CI S • Identity Verif ication: Requ ire proof of identity before gran ting sensitive informatio n or network
access.
for • Out-of-Band Verific ation: Contact legitimate entities via ver ified methods (e.g., official websites or
es known co ntact n umbers) instead of lin ks/numbers provided in su spicio us emails or texts.
ot • Callback Authorization: Fo r any sensitive req uests via email or p hone, verify via an alternative
ll N
method , such as calling a tru sted numb er.
e
• Strong Sec urity Policies: Implement clear guidelines and p olicies that disco urage risky behav ior,
rn
such as clicking o n unverified links.
C o
• SCRM Overview • SCRM applies risk management methodologies to vend ors, su ppliers, and ser vice provid ers.
• Risk Management for • Risk managemen t should consider external entities like suppliers, clou d provid ers, contractors, etc.
Vendors and Suppliers Responsibility vs Accountability in SCRM:
• Key SCRM Assessment
• Responsibility: Vendo rs and suppliers may b e r espon sible for managing certain data or services.
Areas
• Accountability: However, the data ow ner (the organization ) remain s acc ountable for any
• Accountability in SCRM compliance, legal, o r security failures.
• Examp le: If a cloud service provider hand les d ata, the organization using that service must ensure
compliance with data protection laws.
Key Aspects of Vendor/Supplier Risk Management:
on
• Risk managemen t p rocesses should be extended to all third p arties.
• Are as to assess:
uti
•
r i b
Governance Review: Ensu re that vendors/suppliers follow prop er gover nance protocols.
t
•
•
D is
Site Security Re view: Evalu ate th e p hysical security measures in place at vend or sites.
Formal Security Audit: Cond uct au dits to ver ify that security con trols meet expectations.
for
• Penetration Te sting: Test th e security of the vend or's systems to identify vu lnerab ilities.
•
t
Security Baselines: Ensu re supp liers adhere to the organization’s defined secu rity
No
baselin es.
Hardware/Software Evalua tion: Ensu re that third-party h ardware and software meet
a,
•
secu rity stan dards.
•
h
Security Policies: Vendo rs should adhere to your o rganization's security p olicies.
Na
• Assessm ent Plan: Develop a structur ed plan for cond ucting risk assessmen ts on
et
vend ors.
e
• Reporting Templates: Prepare standardized templates for assessment reports.
j
ha
SCRM Be st Practices:
b
Su
• Organization s must communicate specific security and comp liance requ irements to v endors.
l
Co
• Vendor Assessment Pla ns should includ e:
• Who will perform the assessments (in ternal/ external teams).
SP
• Templates for Reporting: Standard ize reports to maintain clarity and comparab ility .
for • Accountability can’t be outsourced: Even if serv ices are outsourced to vend ors, the hiring
organization remains accou ntable for the security and compliance of the processes/data.
es
ot
• Examp le: A company ou tsour cing HR functio ns to a third -party p rovider mu st still en sure that
personnel da ta is managed securely an d in compliance with app licable laws.
ell N
orn
C
or
• Long-term espionage by allowing continued access to
s f critical systems.
ell N
orn
C
• Risks such as product tampering, counterfeits, and implants can significantly affect
the security, performance, and integrity of products acquired from suppliers.
• These risks necessitate stringent vendor assessments, product inspections, and
supply chain security measures to mitigate the chances of unauthorized alterations or
malicious components being introduced.
on
(SBOM) Service-level Requirements:
uti
availability, and responsiveness.
tr b
•Definition: Specifications in contracts that dictate expected performance,
i
is
rD
•Example: A contract clause ensuring 99.9% uptime for a cloud service
provider and a 2-hour response time for incident management.
Silicon Root of Trust:t f o
N oembedded in hardware that
a, in a trusted state.
•Definition: A secure cryptographic identity
h
ensures the hardware starts
•Example: A cryptographic chipa
t Nsystem
in hardware that checks the firmware is
e
genuine, ensuring the starts securely every time.
C
•Example:
y prevent counterfeit hardware from imitating authentic devices.
P B
I SS Software Bill of Materials (SBOM):
ot
hidden vulnerabilities like backdoors or untrusted code are introduced in
ll N
updates.
rn e
C o
• Risk mitigation strategies for supply chain management include monitoring third
parties, ensuring they meet minimum security standards, and specifying service-
level requirements.Technological measures like Silicon Root of Trust and Physically
Unclonable Functions add layers of protection to hardware, preventing counterfeiting
and ensuring secure operations.SBOM helps track software changes, ensuring
transparency in software development and mitigating risks like hidden vulnerabilities.
No
the service provider, defining specific service levels, security, and
compliance obligations.
• Key Points:
h a,
•
Na
Performance levels required.
•
je et
Governance: Defines responsibilities.
ha
• Security controls: Customer data protection.
• b
Compliance: Adheres to laws and regulations.
l
• Su Liability for unmet service standards.
•
y Co Anand
Example: SLA for a cloud service provider includes a 99.9% uptime
B requirement clear cybersecurity standards.
P• Service Level Reports (SLR):
I SS
r C • Definition: Reports issued by service providers to track their
performance against SLA requirements, helping the customer assess
fo the vendor's effectiveness.
es
ot • Components:
ll N
• Achievement of metrics in the SLA.
• SLR defines the service expectations before procurement, helping to select the right
vendor.
• SLA formalizes the security, performance, and compliance requirements and is legally
binding.
• Service Level Reports (SLRs) provide a measurement tool to ensure vendors are
meeting the agreed-upon terms, offering accountability through metrics and third-party
audits.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Security Awareness, Training, and Education
Who is Re sponsible for Security?
• Who is Responsible for • EVERYONE in an or ganiz ation is r espon sible for security.
Security? • However, emp loyees need to know their r espon sibilities through prop er awaren ess, train ing, and
educatio n programs.
• Purpose of Security
Awareness • Purpose of Sec urity Awareness:
• Awareness vs. Training vs. • Goal: To create cultural sensitivity to secu rity issues and ensu re all emp loyees understand the
impo rtance of security.
Education
• Exam ples:
• Methods to Provide • Phishing ca mpa igns to simulate and ed ucate emp loyees about phishin g attacks.
Awareness and Training • Posters and visual reminders arou nd the office.
• Lunch and learn sessions to d iscuss secu rity best p ractices.
• Training:
t
•
No
Purpose: Providing te chnical skills needed for security-related tasks.
jeet
ha
• Purpose: Helps employees understand fundamental concepts and dev elop decision-ma king skills.
b
Su
• Foc us: Conceptu al, encourages under standing and app lication .
l
Exam ple: Teaching decision-making skills for resp onding to security incidents.
Co
•
fo • Gamific ation: Using rewards or game s to make learnin g engaging and fun.
es
ot
• Security Cham pions: Appo inting employ ees who actively p romote secur ity awar eness with in their
teams.
N
ell
• Regular com munica tions: On goin g em ail cam paigns or bulletins to keep security at the forefro nt.
rn
Exam ple: Developers working closely with the secur ity team and promoting secu re co ding p ractices among
their p eers.
C o
• Periodic content reviews ensure that training programs stay relevant to the latest
technologies and threats.
• Metrics such as completion rates, performance scores, and engagement help track
program effectiveness.
• Simulations and feedback loops ensure continuous improvement of security
awareness programs.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Domain 2 : Asset Security
ASSET SECURITY
Definition and Importance:
• Definition and Importance • Asset Security involves concepts, structures, principles, and controls
• Systematic Approach to Asset designed to protect organisational assets—anything of value to the
Security organisation.
• Challenges in Implementation • Security professionals must be vigilant because even a minor
• Overview of Asset Security Steps vulnerability can expose an entire system, leading to financial loss, data
breaches, or compromising the entire organization.
Systematic Approach to Asset Security:
• The fundamental approach to asset security involves three key steps:
• Identify Assets: Know what assets the organization has,
on
including both tangible (e.g., hardware, buildings) and
intangible (e.g., intellectual property, reputation).
uti
•
tr i b
Classify Assets: Categorize assets based on their value
and sensitivity to the organization. This could be levels
is
like Public, Internal Use Only, Confidential, or Top
D
for
Secret.
•
t
Protect Assets: Implement security measures based on
No
the classification level of the asset. Higher-value assets
require more stringent security controls.
h a,
Challenges in Implementation:
N a Difficult to keep track of all assets,
t
• Complexity in Large Organizations:
e with diverse and numerous assets.
e
especially in large organizations
j
b ha monitoring
• Dynamic Asset Landscape: Assets and their values may change over
S u
time, requiring continuous and reclassification.
• Balancingl Security and Usability: Overprotecting assets can hinder
business o
risks. C
operations, while under-protecting exposes the organization to
B y
SP• Asset Inventory: Create and maintain a comprehensive list of all
Overview of Asset Security Steps:
CI S
or
organizational assets.
ll N
• Labeling and Handling: Implement appropriate handling measures for
on
• Organizational • Large multinational organizations face significant challenges due to the
Accountability
ti
diversity and volume of assets, including assets that are created, purchased,
u
rented, or acquired.
Steps for Effective Asset Classification:
tr i b
D is
1. Asset Inventory: Identify and catalog all assets within the organization.
for
2. Identify Asset Owners: Determine who is responsible for each asset.
t
No
3. Classify Assets: Assign a classification level based on the asset’s value to
the organization (e.g., Top Secret, Confidential, Public).
a,
4. Apply Controls: Implement security controls based on the classification
h
Na
level to ensure appropriate protection.
et
Classification Based on Asset Value:
je
• Protecting assets should always be based on their value to the organization.
ha
• More valuable assets require more stringent security measures.
b
Su
• Example Classification Levels:
l• Top Secret/Proprietary: Highest level of protection.
SP
to be shared.
rn
•Owners may sometimes challenge their responsibility to avoid
C o accountability.
•The governance committee must enforce that asset owners are accountable
for the classification and protection of their assets.
•Security is there to support but not to take over ownership responsibilities.
• Asset classification is crucial for aligning the level of protection with the asset’s value to the
organization.
• A systematic approach involves identifying assets, determining ownership, classifying them, and
applying appropriate controls.
• Owners are accountable for ensuring their assets are protected, while security provides the
necessary support and implementation of controls.
• Proper governance and top-down enforcement are essential to the effectiveness of asset
classification.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
INFORMATION CLASSIFICATION BENEFITS
Benefits of Information Classification:
• Benefits of Information • Information classification plays a vital role in ensuring that data is
Classification managed and protected according to its value and sensitivity.
• Identification of Critical • It offers several advantages that help organizations safeguard their
Information information effectively.
• Identification of Sensitivity to
Identification of Critical Information:
Modification
• Classification aids in pinpointing information that is essential for the
• Commitment to Protect Valuable
organization’s success.
Assets
• Commitment to Confidentiality • Examples: Intellectual property, financial data, customer data, and
proprietary research.
• Helps prioritize protection efforts and resource allocation towards
ti on
safeguarding crucial information.
i bu
Identification of Sensitivity to Modification:
str
D i
• Classification helps identify data that must be protected from
for
unauthorized changes.
t
No
• Ensures data integrity by restricting modification rights only to authorized
personnel.
h a,
• Examples: Financial records, contracts, and regulatory compliance
Na
documents.
jeet
Commitment to Protect Valuable Assets:
ha
• Classification demonstrates an organization’s dedication to protecting its
b
information assets.
Su
• Creates awareness among employees and stakeholders about the
l
Co
importance of securing sensitive data.
ell N • Helps prevent data breaches and loss of sensitive information, thereby
• Information classification provides a structured approach to identifying and protecting critical and
sensitive data.
• It helps in the identification of critical and sensitive information, ensuring only authorized access
and modification.
• The process demonstrates an organization's commitment to safeguarding valuable assets and
maintaining confidentiality.
• Creates a security-aware culture, reinforcing the importance of data protection among employees
and stakeholders.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Classification Process
Definition and Purpose of Asset Classification:
• Definition and Purpose of • Asset classification is the process of assigning a level of protection to assets
Asset Classification based on their value to the organization.
• Importance of • The goal is to ensure that each asset receives an appropriate level of security,
Comprehensive Asset reflecting its importance and sensitivity.
Classification Importance of Comprehensive Asset Classification:
• Classification • It’s essential to include all types of assets (data, physical assets, intellectual
property, etc.), not just data, in the classification system.
Characteristics
• Challenges in the •Expanding classification systems beyond just data helps protect the organization
comprehensively.
Classification Process
Classification Characteristics:
on
• Role of Asset Owners and
Classification Committees
• Assets should be classified based on three key characteristics:
•
uti
Confidentiality (Sensitivity): How sensitive is the asset? Who
• Ongoing Nature of should have access?
tr i b
•
Classification
Archiving and Retention
•
D is
Integrity (Accuracy): How important is it to ensure the asset is not
for
altered?
Requirements Availability (Criticality): How crucial is it for the asset to be
t
•
No
available when needed?
a,
• Using all three classifications helps in providing a balanced security approach.
h
Challenges in the Classification Process:
Na
• Asset owners may tend to overprioritize or under classify their assets, creating
inconsistencies.
jeet
• Owners might claim their assets are of higher value to secure more resources
ha
for protection or might downplay the value to reduce security costs.
b
Su
Role of Asset Owners and Classification Committees:
l
Co
• Owners are responsible for the initial classification but need guidance and
oversight to ensure objectivity.
SP
classification decisions to maintain consistency across the organization.
ll N
Archiving and Retention Requirements:
rn e • Classification impacts how long assets should be retained and when they
o
should be destroyed.
C • Compliance with laws, regulations, and organizational policies is crucial for
determining retention periods and destruction timelines.
• Example: Financial records might need to be retained for 7 years, whereas
certain project documents can be deleted after 3 years.
on
asset to the organization.
ti
• Owners classify assets based on their value, determining the necessary
u
security controls.
tr i b
• Example: The head of the finance department owning financial data assets,
while the IT director owns the network infrastructure.
D is
for
Classification Based on Value:
• Asset classification assigns protection levels based on the asset’s value,
t
No
which could be due to sensitivity, criticality, or regulatory requirements.
• Example: Customer personal data might be classified as “Highly Sensitive”
a,
due to privacy laws, while public-facing website content might be classified
h
Na
as “Public.”
et
Protection Based on Classification:
e
• Once classified, each asset should have security controls aligned with its
j
ha
classification level.
b
• Higher classification levels (e.g., Top Secret) will have more stringent
Su
controls than lower levels (e.g., Public).
l
Co
• Example: A “Confidential” classification might require encryption and
access controls, while a “Top Secret” classification might also include
By physical security and monitoring.
SP
Periodic Review and Reassessment:
CI S • Asset values can change over time due to aging, new compliance
requirements, or changes in business priorities.
for • Periodic reviews ensure that classifications remain accurate and that the
ll N
reclassified to “Internal Use Only” after the project concludes.
for
classification levels.
t
No
• Table Example:
a,
• Classification: A system of levels (e.g., Top Secret,
Confidential).
h
•
Na
Categorization: Assigning assets to those levels (e.g., sorting
jeet
sensitive financial reports into the "Top Secret" category).
ha
Examples of Classification:
b
• Classification systems may use different labels depending on the
Su
organization's needs:
l
y Co • Top Secret, Secret, Confidential, Unclassified
SP
Identifiable Information (PII)
ll N
consistently across the organization.
C o appropriately.
• Example: The label "Top Secret" could mean something different in various
organizations. Proper training ensures everyone follows the same
understanding.
on
be easily understood and executed by people.
ti
• It extends the intent of labeling by translating system-readable information into a format
u
b
useful for human interpretation.
• Examples include:
tr i
is
• Instructions like “Do not remove from premises” on documents labeled as “top
secret”.
D
for
• Signs such as “For Internal Use Only” on confidential documents.
Key Differences:
t
No
• Labeling:
a,
• Targets system-based enforcement of security policies.
h
• Varies based on organizational security requirements.
Na
• Uses system-readable identifiers like metadata, barcodes, or RFID tags.
et
Marking:
•
e
Aims for process-based enforcement of security policies.
j
ha
• Instructs how an asset should be handled according to its classification.
•
b
Translates labeling into actionable handling instructions for humans.
Su
Characteristics of Labeling:
l
• System-readable formats for automation and enforcement of security policies.
Co
• Enables the association of security attributes with assets, helping systems manage and
B y enforce controls.
Examples of Labeling Technologies:
SP
• Metadata: Additional data attached to files for system interpretation.
for • GPS tags: Location-based tagging for asset movement and location tracking.
es
ot
ll N
Labeling Marking
rn e System-readable Human-readable
a,
maintenance costs.
RFID Tags:
h
Na
• Moderate Cost: Cheaper than GPS tags but more expensive than barcodes and
et
QR codes.
je
• Use Case: Ideal for inventory management in environments like warehouses
ha
where items need to be tracked quickly and without direct line-of-sight scanning.
b
• Example: Automated inventory tracking in large retail stores or manufacturing
plants.
l Su
Co
• Benefit: Can read multiple tags simultaneously, making bulk scanning efficient.
• Drawback: Still relatively costly for low-value assets or small-scale use.
By Barcodes:
SP
• Low Cost: Very inexpensive to implement; can be printed on packaging or labels.
CI S • Use Case: Low-cost labeling for items that need to be scanned individually.
• Example: Commonly used in retail for pricing and inventory control, such as in
for supermarkets.
ot
information.
ll N
QR Codes:
• Low Cost: Similar to barcodes but can store more information.
rn e • Use Case: Useful for situations where more data needs to be encoded and easily
C o scanned.
• Example: Product information links on consumer goods or visitor check -in codes.
• Benefit: Can be scanned with a smartphone app, making them versatile for a
range of uses.
• Limitation: Like barcodes, requires line-of-sight scanning.
• Choice of labeling approach should align with the value of assets and organizational needs.
• GPS tags are cost-effective only for tracking high-value, mobile assets requiring real-time monitoring.
• RFID tags are ideal for environments like warehouses where efficiency and bulk tracking are required,
despite higher costs.
• Barcodes and
• QR codes provide a low-cost, versatile solution for labeling and tracking low-value or consumer-facing
assets.Always consider the cost-to-benefit ratio when selecting a labeling method.
on
• Asset owners are accountable for the protection of their assets and
must communicate handling requirements to those who use them.
u ti
• They determine who may access sensitive media, ensuring only
tr i b
designated individuals have access.
D is
handle the media based on its classification. or
• Authorization: Owners must define specific individuals authorized to
o tf
, N clear procedures for how
Media Handling Policy:
An effective media handling policyaincludes
•
a
to manage assets on various mediah types, aligned with asset
classification.
e tN
•
h ajeshouldforcover:
Handling procedures
•
u b
Access controls sensitive media.
•
ol SStorage requirements: Ensuring the media is stored
securely and according to its classification.
ll N
handle media securely.
rn e • Example: Use of shredders for paper disposal, secure wipe tools for
C o digital media.
• Ensure that these tools are accessible and that users are trained in
their proper use to avoid mishandling.
• Media handling requirements are based on the asset's classification and must be clearly defined.
• Asset owners are responsible for defining who can access and handle sensitive media.
• Media handling policy should include detailed procedures for access, storage, transfer, and destruction
of media.
• Provide appropriate tools and technologies for secure handling of media based on its classification level.
• Sensitive data must be encrypted both at rest and in transit to ensure its confidentiality
and integrity.
• AES-256 is recommended for high-security data due to its strength and reliability.
ti on
Physical Security:
i b u
Media should be stored in a secure, access-controlled environment.st
r
Di
•
• Use locked cabinets or vaults for physical storage.
o r
fonly.
•
o
Control access to storage areas to authorized personnel t
, N
haclassification and organizational policies.
Media Retention:
•
e
je audit logs to be retained for a minimum of one year.
Regulatory requirements can dictate
•
h aavailability
PCI DSS requires
•
u b
Immediate of audit logs for the past ninety days is required for
lS
analysis.
o
C policies must comply with organizational and regulatory standards.
Media Destruction:
•
B yDestruction
S P
S
• For PCI DSS, credit and payment card information must be destroyed as soon as it's no
for • Destruction methods include shredding for physical media and secure wiping for digital
es media.
ot Regulatory Requirements:
orn • PCI DSS mandates strict retention and destruction policies for financial data.
C • Ensure compliance with all applicable regulations based on the type of data.
• Storage and encryption of media are dictated by the data's classification level, with high-security
data requiring robust encryption and secure physical storage.
• Retention and destruction policies must align with organizational and regulatory requirements.
• Organizations must be aware of and comply with regulatory mandates like PCI DSS when storing,
retaining, or destroying sensitive information.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Data Classification Roles and Responsibilities -1
Asset Owners and Accountability:
• Asset Owners and
Accountability • Owners are the individuals who are ultimately accountable for ensuring
• Importance of Assigning that assets are properly classified and protected.
Ownership • They directly interact with the assets, making them the best people to
• Roles and Responsibilities assess and communicate the asset's value.
of Owners • Owners are responsible for making sure that the appropriate controls are
• Delegation vs. in place to protect their assets.
Accountability
• Types of Owners Importance of Assigning Ownership:
on
• Owner’s Role Throughout • If no owner is assigned, no one is accountable, leading to potential
Asset Lifecycle security breaches.
ti
• Owners drive the data classification process and are pivotal tob itsu
tr i
success.
i s
• Organizational leadership (CEO, upper management)
fo r Dshould promote
the importance of asset ownership.
o t
Roles and Responsibilities of Owners: N
,Assigning
h
• Classifying and Categorizing Assets: a a classification level
a
tN
based on the asset’s value to the organization.
je
• Managing Access: Decidinge who can access the asset and under what
circumstances.
b haImplementing appropriate security measures based
Su level.
• Ensuring Controls:
l
Co vs. Accountability:
on the classification
y
Delegation
ot
ell N
orn
C
• Owners are accountable for the classification and protection of assets throughout their lifecycle.
• Assigning ownership is essential to ensure proper asset management and security.
• Owners play a crucial role in managing access, implementing controls, and adhering to policies and
regulations.
• Different types of owners exist, but all share the same accountability for protecting the value of their
assets.
on
• Handles data according to the instructions and policies set by the
owner.
uti
•
agreement.
tr i b
Ensures the data is processed securely and in compliance with the
is
• Example: A cloud service provider that hosts and processes data but does not
D
for
own the data itself.
Data Custodian:
t
No
• Definition: Holds technical responsibility for the data's security, availability, and
integrity.
• Responsibilities:
h a,
Na
• Manages technical aspects like data security, backup, restore, and
system administration.
•
jeet
Operates and maintains the systems that store and process data.
ha
• Protects data in their custody but does not own it.
b
• Example: An IT administrator responsible for maintaining a database server and
Su
ensuring its security.
l
Co
Data Steward:
• Definition: Responsible for the business aspects of data management and
By governance.
SP
• Responsibilities:
• Defines metadata and ensures data quality.
for • Collaborates with both technical and business teams to maintain data
s
integrity and usability.
ote • Example: A business analyst who defines data standards and ensures data
quality across the organization.
rn
• Definition: The individual to whom the personal data pertains.
C o • Responsibilities:
• May not have direct responsibilities within the organization but has
rights under privacy laws.
• Can request access, correction, or deletion of their personal data.
• Example: A customer whose personal information is collected and stored by a
company.
• Data Owner/Controller: Accountable for data protection, policy creation, and compliance.
• Data Processor: Manages data processing activities as directed by the data owner.
• Data Custodian: Ensures the technical aspects of data management, such as security and system
administration.
• Data Steward: Focuses on data governance, quality, and compliance from a business perspective.
• Data Subject: Individual whose personal data is being managed; has legal rights concerning their
data.
on
Key Considerations for Data Classification Policy:
• ti
Laws and Regulations: Compliance with legal requirements is
u
fundamental.
tr i b
•
is
Privacy Requirements: Protecting personal and sensitive
D
for
information based on privacy laws.
•
t
Customer Requirements: Meeting contractual obligations
No
and customer expectations for data protection.
•
h a,
Cost of Creation: Consideration of the resources required to
Na
create the asset.
et
• Operational Impact: Understanding the impact on business
je
operations if the asset is compromised.
•
bha
Liability: Assessing potential liabilities if assets are not
l Su
adequately protected.
Co
• Reputation: Impact on the organization’s reputation in case of
By a data breach.
I SSP
r C
fo
es
ot
ell N
orn
C
•The Data Classification Policy is crucial for protecting sensitive and valuable
information.
•It must be consistent, regularly updated, and communicated across the organization.
•Senior management should lead the initiative, with security teams providing support and
asset owners taking responsibility.
•An effective policy should cover all types of assets and include guidelines for retention,
destruction, and archiving.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Data Classification Policy
Components of an Effective Policy:
• Purpose of Data
• Governance by Senior Management: Policy must be driven
Classification Policy
from the top.
• Key Considerations for Data
Classification Policy • Applies to All: The policy should apply to everyone in the
• Components of an Effective organization.
Policy • Clear Definitions:
• Factors Determining Asset • Accountability and Responsibility: Who is
Value accountable and responsible for asset protection?
• Asset Media Types: Define digital, tape, paper, etc.
•
ti on
Supporting Policies: Should include retention, destruction,
and archiving policies.
i bu
•
tr
Alignment with Organizational Goals: The policy structure
s
i
should be driven by the organization’s goals and objectives.
D
for
• Security Involvement: Security teams should consult and
t
provide expertise, while asset owners drive the process.
Factors Determining Asset Value: No
•
h a,
Laws and Regulations: Compliance requirements determine
Na
the need for protection.
•
jeet
Privacy Requirements: Ensuring personal data is protected
ha
as required by law.
•
b
Creation Cost: The cost incurred in creating the asset
l Su
influences its classification.
y Co
• Operational Impact: The impact on operations if the asset is
B lost or compromised.
SP
• Liability: Legal and financial liabilities if the asset is not
CI S properly protected.
•The Data Classification Policy is crucial for protecting sensitive and valuable
information.
•It must be consistent, regularly updated, and communicated across the organization.
•Senior management should lead the initiative, with security teams providing support and
asset owners taking responsibility.
•An effective policy should cover all types of assets and include guidelines for retention,
destruction, and archiving.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Information Life Cycle - 1
Phases of the Information Life Cycle:
• Phases of the Information Life • Create:
Cycle • Definition: Generation of new digital content or modification of
• Protection Requirements at existing data.
Each Phase • Examples: Creating a new document, updating a database
• Impact of Classification on entry.
Data Handling • Requirements: Data classification should be assigned
• Data States and Handling immediately by the owner.
Procedures • Store:
• Definition: Committing digital data to a storage repository.
on
• Examples: Saving files on a server or database.
• Requirements: Use encryption and secure storage methods
uti
• Use:
based on data classification.
tr i b
•
D is
Definition: Viewing, processing, or using data without
for
modification.
•
t
Examples: Accessing a customer database for reporting.
•
No
Requirements: Ensure data access is restricted to authorized
users only.
h a,
Na
• Share:
Definition: Making data accessible to others, such as
et
•
e
employees or partners.
j
ha
• Examples: Sending data via email, sharing through cloud
b
services.
•
l SuRequirements: Secure transmission methods like encryption
Co
should be employed.
By • Archive:
• Definition: Data leaves active use and enters long-term
I SSP •
storage.
Examples: Moving old project files to an archive server.
r C • Requirements: Apply long-term preservation techniques; limit
fo access.
es
ot
• Destroy:
ll N
• Definition: Permanent destruction of data using physical or
digital means.
C o •
shredding.
Requirements: Ensure complete destruction to prevent
unauthorized recovery.
on
• Classification level (e.g., Top Secret, Confidential) drives the security
controls applied.
u t i
r i
• Higher classification levels require stronger protections and more
t b
restrictive handling procedures.
is
Data States and Handling Procedures:
fo rD
o t or viewed by users.
, Ninformation on a dashboard.
• Data in Use: Data being processed by applications
•
a
Example: Displaying customer
h controls and real-time
• Requirements: Securea access
monitoring.
e tN
a je in databases or file systems.
• Data at Rest: Data stored
h
b Archived files on a backup server.
•
S u
Example:
• l Requirements: Encryption, access controls, and secure
y Co physical storage.
• BData in Transit: Data moving across networks.
S P
CI S • Example: Sending sensitive information over the internet.
or
• Requirements: Use of secure protocols like HTTPS or VPNs.
s f
o te
ell N
orn
C
• The information life cycle encompasses creation, storage, use, sharing, archiving, and
destruction.
• Each phase requires tailored security measures based on data classification.
• Proper classification at the creation stage ensures appropriate handling throughout the
life cycle.
• Awareness and training on data handling procedures for each phase are crucial for data
security.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Data Destruction
Data Remanence:
• Data Remanence • Definition: Residual representation of data that persists even after attempts to
• Defensible Destruction delete or remove it securely.
• Categories of Sanitization • Importance: Data remanence can lead to unauthorized data recovery, posing
• Secure Data Removal in the significant security risks.
Cloud • Example: Deleted files on a hard drive that can still be recovered using
specialized software.
Defensible Destruction:
• Definition: The ability to prove that data has been securely and completely
destroyed, leaving no possibility of recovery.
• Purpose: Ensures compliance with data protection regulations and prevents
data breaches.
ti on
i b u
•
securely destroyed.
s tr
Responsibility: Data owners are accountable for ensuring their data is
i
Categories of Sanitization:
fo rD
Destroy:
Description: Physical destruction ofo t
1.
N completely destroys data.
media.
, burning
2.
a
Effectiveness: Most effective method;
h
3.
a
Example: Shredding hard drives, paper documents.
Purge:
e t Nor physical techniques used to sanitize data so
a e Effective but less reliable than destruction.
it cannot bejreconstructed.
1. Description: Logical
2. h
b Overwriting data multiple times, degaussing magnetic
Effectiveness:
3.
S u
Example:
Clear: C
ol media.
By 1. Description: Logical techniques used to remove data, but it may be
SP
reconstructed.
ell
multiple locations and devices, making secure destruction complex.
orn • Methods: Use of cloud provider tools for secure deletion, encryption before
storing data, and ensuring cloud contracts include data destruction policies.
C
on
tools and techniques.
2.Disintegrating:
uti
1.
i b
Process: Reduces media to even smaller fragments than shredding.
tr
2.
3.Drilling:
D is
Effectiveness: More secure than shredding but still not infallible.
1.
for
Process: Physically drilling holes through the media.
t
No
2. Limitations: Although the drive is rendered unusable, data on
undamaged portions may still be accessible.
Degaussing:
h a,
Na
• Definition: Application of a strong magnetic field to erase data on magnetic media
(e.g., hard drives, tapes).
eet
• Effectiveness: Destroys data but may also render the media unusable.
j
ha
• Position in Sanitization Spectrum: Sits between destruction and purging.
b
Crypto Shredding/Erasure:
Su
• Definition: Encrypts data with a strong algorithm (e.g., AES-256), then destroys
l
Co
the encryption key.
SP
• Position in Sanitization Spectrum: Between purging and clearing. If the key is
for • Definition: Writing zeroes, ones, or a combination to all sectors of the storage
ll N
recoverable.
rn e • Limitations: Multiple overwrite passes may not fully eliminate data remnants.
C o • Formatting:
• Definition: Resets the file system and data structures of a storage device.
• Effectiveness: Least effective method; most data remains on the disk until
overwritten.
• Example: Windows “Quick Format” resets the file address table, but data is still
accessible using recovery tools.
• Incineration is the most secure method of data destruction, followed by other physical methods like
shredding and drilling.
• Degaussing is effective for magnetic media but can damage the media itself.
• Crypto shredding offers a strong logical method if the encryption key is never compromised.
• Overwriting and formatting are the least secure methods and should only be used when physical or
crypto methods are unavailable.
on
the overwritten media.
ti
• Example: Using a software tool to overwrite each sector of a hard drive
u
multiple times.
tr i b
Object Reuse and the Orange Book:
D is
for
• Origin: The concept comes from the Orange Book (Trusted Computer System
Evaluation Criteria - TCSEC).
t
No
• Requirement: Orange Book standards required certain levels of secure
reassignment of system resources, including memory and internal storage.
h a,
• Implementation: The most common method was overwriting memory
Na
spaces to eliminate data remnants.
jeet
Overwriting Guidance Evolution:
ha
• Historical Guidance: Organizations like NSA and DoD have issued
b
guidelines on how many overwrite passes are required to ensure secure data
Su
removal.
l
Co
• Change Over Time: Recommendations have evolved as data recovery
technologies have improved, making it more challenging to prevent data
By recovery.
SP
• Current Best Practice: Acknowledgement that even multiple overwrite
ll N
method, meaning it reduces the risk of data recovery but does not
guarantee that data is completely irrecoverable.
• Object Reuse aims to prevent unauthorized access to data remnants on reassigned storage media.
• Overwriting is the primary method used but is considered "clearing" rather than "purging.
• "Secure Reassignment requires that no residual data be accessible to new users of the media.
• Evolving Standards reflect the need for more robust data destruction techniques as technology
advances.
on
techniques to securely erase data.
uti
•
tr i b
Unique Architecture: SSDs distribute data across multiple cells and use
techniques like wear leveling, complicating the data destruction
process.
D is
Vendor-Specific Tools for SSDs:
t for
• Manufacturer Tools: Many SSD manufacturers
N o provide specific tools or
commands (e.g., Secure Erase, sanitize
securely remove data. h a, functions) that are designed to
S P•
hardware.
CI S Physical Destruction:
• SSDs present unique challenges for data destruction due to their use of flash memory.Traditional
overwriting methods are ineffective for SSDs.
• Manufacturer-specific tools should be used first for secure erasure.
• The most secure method for SSD data destruction remains physical destruction, such as shredding
or incineration.
r D for secure
data destruction.
•
fo
Legal and Compliance: Meets compliance requirements
t destruction is
data destruction in scenarios where physical
o
,N
impractical.
Best Practices in Cloud Environments: a
h storing data in the cloud, encrypt it
• a
N as AES-256.
Encrypt All Sensitive Data: Before
using a strong algorithm,tsuch
e
je are Use
•
h akeys
Secure Key Management: secure key management practices to
ub
ensure encryption protected and can be securely destroyed
when necessary.
S
•
C olProvider
Cloud
shredding
Policies: Verify that cloud providers support crypto
and have secure methods for key destruction.
By with Physical Destruction in Cloud:
Challenges
• Crypto shredding is a practical and effective method for securely removing data from third-party
environments, particularly cloud services.
• Physical destruction, while the most secure, may not always be feasible in cloud scenarios.
• Proper encryption and secure key management are crucial for effective crypto shredding.
• Crypto shredding ensures data is unrecoverable by securely destroying the encryption key,
providing a viable solution for cloud data management.
i
D periods based
•
on business needs or risk management strategies.
fo r
Organizational Policies: Internal policies may dictate retention
S Media Type: Specify the types of media suitable for archiving based on
CIS
longevity and cost-effectiveness (e.g., cloud storage, magnetic tape, optical
discs).
for • Data Protection: Ensure proper encryption and access controls for archived
ll N
recovery processes to ensure data can be restored if needed.
• Data archiving is crucial for meeting legal, regulatory, and business continuity requirements.
• Retention policies must consider long-term accessibility and protection of data.
• A robust archiving policy should address retention periods, media types, data protection, and
recovery procedures to ensure the integrity and availability of archived data over time.
• Continuous review and updates to archiving policies are necessary to adapt to changing regulations
and technological advancements.
on
• Retention Period: Determine how long data should be kept based on legal,
ti
regulatory, and business requirements. Different types of data may have different
u
b
retention periods (e.g., financial records vs. employee records).
tr i
• Associated Costs: Consider the cost implications of long-term storage
is
solutions, including media costs, management, and retrieval expenses.
D
for
Balancing cost with the required protection and availability is crucial.
Considerations for Data Archiving:
t
No
• Compliance Needs: Ensure that archived data meets all applicable legal,
a,
regulatory, and industry standards, such as PCI DSS, GDPR, or HIPAA.
h
• Data Format: Data should be archived in a format that remains accessible and
Na
usable over time, despite changes in technology. It’s important to consider
et
whether the format will be supported in the future.
je
• Data Integrity: Regular checks should be conducted to ensure that the data has
ha
not been corrupted or altered during the archiving process.
b
• Policy Awareness: Employees must be educated on the importance of following
Su
archiving and retention policies to ensure compliance and data integrity.
l
Co
Data Archiving Policies:
SP
periods, protection measures, and procedures for archiving and retrieval.
ot importance of following policies, and the tools available to them for proper data
ll N
management.
rn e .
C o
on
for data once it is no longer needed. This could involve physical destruction, data
wiping, or crypto shredding to ensure data is not recoverable.
uti
tr i b
D is
t for
No
h a,
Na
jeet
bha
l Su
y Co
B
I SSP
r C
fo
es
ot
ell N
orn
C
• Data archiving is a critical component of data management that ensures long-term data protection,
accessibility, and compliance with regulatory requirements.
• Proper archiving policies must address media type, security, availability, retention periods, and
associated costs.
• Effective policies are based on comprehensive considerations, including legal compliance, data
integrity, and future-proofing data access.
• Employees should be educated on archiving policies and procedures to ensure adherence and
proper data handling throughout the data life cycle.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Data Security Controls and Compliance Requirements - 1
Classification and Baseline Security Controls:
Classification and Baseline
•Definition: Security controls must be aligned with the classification level of the
Security Controls asset, ensuring that data receives protection based on its value and sensitivity.
Data States and Security
Requirements •Importance: Without proper baseline security controls, sensitive data may be
vulnerable to unauthorized access or breaches.
Data at Rest Security Controls
Data in Transit Security Controls •Baselines for Different Classifications: Each classification level (e.g., top secret,
Data in Use Security Controls secret) has a predefined set of security controls that must be met to protect data
appropriately.
•Example: A top secret document might require encryption, multi-factor
on
authentication, and restricted access, whereas a less sensitive document might only
require basic access controls.
uti
Data States and Security Requirements:
tr i b
•Three States of Data:
D is
•
o r
Data at Rest: Inactive data stored on physical or digital media.
f
•
o t
Data in Transit: Data actively moving across networks.
, N
• Data in Use: Data actively being
h a processed by applications or users.
je
a and not actively moving or being used. Examples
Data at Rest Security Controls:
b hstored
include files on a u
•Definition: Data that is
ell N •Example: A financial database stored on a server should be encrypted and only
je
modified. It is most vulnerable unencrypted.
• Security Measures:
b ha
u
SHomomorphic
•
l Encryption: Allows computations to be carried out
y
S P B • Role-Based Access Control (RBAC): Assigns permissions based on
roles within the organization, restricting access to data based on job
CI S functions.
for • Data Recovery Plan (DRP): Ensures that data can be recovered if it is
orn • Example: A user viewing sensitive HR data in a secure application should have
C
RBAC controls that limit what they can see or edit.
• Security controls must be adapted based on the state of the data —at rest, in transit, or in use.
• Baseline security controls aligned with the data’s classification level ensure effective protection.
• Data at rest requires encryption and access controls, data in transit needs network encryption and
secure transmission methods, and data in use requires advanced measures like homomorphic
encryption and DLP.
• Proper implementation of security controls for each data state mitigates risks and ensures
compliance with regulatory requirements.
on
• Availability Requirements: Define the expected recovery time for
t
archived data. For example, some data may need to be retrievable within
u i
hours, while other data can be restored within days or weeks.
r i b
tbased on
• Retention Period: Determine how long data should be kept
is
Dvs. employee
o r
legal, regulatory, and business requirements. Different types of data may
tf
have different retention periods (e.g., financial records
records).
N o
• Associated Costs: Consider the cost ,implications
solutions, including media costs, h a of long-term storage
for • Data Integrity: Regular checks should be conducted to ensure that the
data has not been corrupted or altered during the archiving process.
es
ot • Policy Awareness: Employees must be educated on the importance of
ll N
following archiving and retention policies to ensure compliance and data
rn e integrity.
C o
ti on
procedures, the importance of following policies, and the tools available
to them for proper data management.
i bu
Questions to Consider for Policy Creation:
s tr
i
D level of access
fo
accessing archived data. Not all users will need the r
• Who Needs Access to the Data? Define roles and responsibilities
same
for
to archived information.
o t
, N
permissions will change as the data a
• Do Access Requirements Change Over Time? Consider if access
tN
once highly sensitive may not need
certain period.
e
e to be Kept? Determine the appropriate
jNeed
• How Long Does Data
h a
retention periodbbased on legal, regulatory, and business requirements.
Some dataS u to be kept indefinitely, while other data may have
l may need
shorteroretention needs.
C
y are the Data Disposal Requirements? Define secure disposal
B
• What
CI S recoverable.
for
tes
o
ell N
orn
C
a,
authorization.
2.
h
Techniques: Implementing role-based access control (RBAC) and
Na
least privilege principles to ensure only necessary personnel can
access sensitive information.
3.
je et
Example: Restricting access to a company's customer database to
only members of the customer service and IT departments.
PB
3. Example: Daily backups of a company’s financial transactions,
ot
unauthorized access during transit and storage.
ell
•
confidentiality and integrity.
• Protecting data at rest is crucial for maintaining its confidentiality, integrity, and availability.
• Key protection methods include encryption, access control, and backup/restoration.
• Encrypting data before migrating to the cloud is the best way to ensure its security during and
after the transfer.
• Organizations should establish a comprehensive data protection strategy tailored to their
specific needs and compliance requirements.
No
it during transmission.
2.
a,
Techniques: Various encryption methods such as TLS/SSL, VPN
h
encryption, and secure email encryption.
Na
et
End-to-End Encryption:
je
ha
• Definition: Encrypts the data portion of a packet from the source to the
b
destination. The data remains encrypted through every node it passes, only being
Su
decrypted at the destination.
l
C• o Ensures data confidentiality throughout transmission.
• Advantages:
By
I SSP• • Data remains protected even if intercepted by unauthorized nodes.
C Limitations:
ell
communication between a user and a remote network.
orn
C
a h
multiple nodes, each of which decrypts only before passing it to the
tN
next.
e
aje by concealing both the sender's and receiver's
• Advantages:
•
b h
Provides anonymity
S u
identities.
• l Data is encrypted in layers, with each node only knowing the previous
for
s
• Increased complexity in implementation.
ll N
communication.
rn e
C o
• Protecting data in transit is crucial to ensure its confidentiality and integrity during transmission.
• End-to-end encryption is effective for secure communication, but does not conceal routing
information.
• Link encryption hides routing information between nodes but exposes data at each node.
• Onion networks provide enhanced anonymity but can be complex and slow.
• Choosing the right encryption method depends on the security requirements and potential risks
associated with the data in transit.
the network.
i bu
each layer designed to be decrypted by a subsequent node in
s t r
Node-by-Node Decryption:
i
•
f o r Dof thelayer
As data moves through each node, the outermost of
or
• Ensures anonymity for both sender and receiver, as only
ll N
• The layered encryption and address hiding prevent tracking
C o Example:
data.
h aje
2.Complex Implementation:
C
y 2. Maintenance and management of such a network can be
P B resource-intensive.
S
CIS
for
tes
o
ell N
orn
C
• The onion network is an advanced encryption method that provides both confidentiality and
anonymity for data in transit.
• It uses multiple layers of encryption, with each node only able to decrypt one layer, revealing the next
node's address.
• TOR is a prime example of an onion network, widely used for anonymous communication.
• Although highly effective in protecting data and identities, it comes with performance and complexity
challenges.
ol
Common Obfuscation Methods:
y C• Data:
1.Concealing
B
S P Description: Completely removes access and visibility to sensitive
ll N
certain data fields exist.
rn e
C o
je
(e.g., XXXX-XXXX-XXXX-1234).
•
whileb
haProvides sufficient information for identification purposes
Use Case:
Su
protecting the full value.
4.EncryptinglData:
r
numbers stored in a database.
es
ot
without proper decryption keys.
ell N
orn
C
Su
difficult to implement and maintain.
2. l Performance Impact: Methods like encryption can slow down
y Co system performance.
S P B 3. Not Foolproof: Skilled attackers may still bypass certain obfuscation
CI S methods, so it must be used as part of a layered security approach.
for
es
ot
ell N
orn
C
1.
h ajeunauthorized copying and sharing of movies on
DRM prevents
ol Services like Apple Music and Spotify use DRM to ensure only paying
2.Digital Music:
C
By
1.
SP3.eBooks:
subscribers can access their music libraries.
CI S
for 1. Platforms like Kindle or Google Books restrict copying, printing, and
sharing of eBooks to protect the rights of authors and publishers.
s
ote
4.Video Games:
ll N
1. DRM prevents the installation and use of pirated copies of games,
fo
to a specific user or license, preventing unauthorized
t that identifies the rightful
2. o
Example: A watermark or digital fingerprint
N
owner.
a ,
4.Copy Protection Technologies:
a h
1.
t N that restrict the ability to copy or transfer
Description: Technologies
e
content.
Example:a
je
2.
h Blu-ray discs that use Advanced Access Content System
S P • Enacted: 1998
N
ell
Information Rights Management (IRM):
rn
1.Definition: A subset of DRM focused on protecting sensitive documents within an
• DRM protects intellectual property assets and the rights of their owners by controlling and restricting
access and usage.
• Techniques include licensing agreements, encryption, digital tags, and copy protection technologies.
• Legal support is provided by the DMCA in the United States, which outlaws the circumvention of DRM
protections.
• Information Rights Management (IRM) applies similar principles to protect organizational documents.
• While DRM effectively protects IP, it can also present challenges such as user frustration and potential
circumvention.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Data Loss Prevention (DLP) -1
Definition of DLP:
• Definition of DLP • Definition: Data Loss Prevention (DLP) refers to a system’s ability to identify,
• DLP Data Activities monitor, and protect data through deep packet content inspection and
• Purpose and Importance of contextual security analysis.
DLP • Source: Defined by NIST, DLP focuses on data in use, data in motion, and data
at rest.
• DLP in Different Data
• Scope: Unlike DRM, which is specific to intellectual property, DLP is more all-
Contexts encompassing and covers a broader range of data types.
• DLP Tools and Techniques DLP Data Activities:
• Regulations and 1.Data in Use:
Compliance Requirements 1. Description: Data actively being processed or used on endpoints
on
(e.g., copying data to external devices).
ti
2. Protection Techniques: Monitoring and controlling user actions
u
2.Data in Motion:
tr b
like copy-paste, print screen, or data transfer to USB drives.
i
D is
1. Description: Data being transmitted across networks, including
for
internal and external networks.
t
2. Protection Techniques: Network monitoring, deep packet
No
inspection, and encryption to detect and prevent unauthorized
a,
data transfer.
3.Data at Rest:
h
Na
1. Description: Data stored on devices like hard drives, databases,
jeet
or cloud storage.
2. Protection Techniques: Scanning storage devices, encryption,
bha
and monitoring of access to stored data.
Su
Purpose and Importance of DLP:
l
1.Prevent Data Breaches:
y Co1. Goal: DLP aims to detect and prevent unauthorized access, use,
SP
2. Example: Blocking an employee from sending confidential
company data via personal email.
ot
employee data (PII).
ll N
2. Example: Preventing unauthorized access to customer credit
card information stored in the database.
y Co timing, recipient/destination.
PB
2. Example: Blocking a file transfer based on the context, such
r C 3.Encryption:
rn e
C o
o t
1. Requirement: Secure handling of credit information.
S ub
reducing o l and financialSupports
2.Compliance
legal
Assurance: adherence to regulatory requirements,
penalties.
P B
I SS
r C
fo
es
ot
ell N
orn
C
ell N • It ensures that security is not just an add-on but a core part of the
system.
on
• Flexibility: There is no single framework that mandates a specific design;
ti
rather, multiple principles can be applied depending on the context.
u
tr i b
Examples of Secure Design Principles
D is
1.Threat Modeling
t for
No
• Systematically identify, enumerate, and prioritize threats.
a,
• Helps in understanding potential attack vectors and mitigating
them effectively.
h
2.Least Privilege Na
•
eet
Users and systems should have the minimum level of access
j
bha
necessary to perform their functions.
Su
• Limits potential damage in case of a breach.
l
3.Defense in Depth
es 5.Fail Securely
ll N
integrity.
C o data.
on
• Assume all users and devices are untrusted until proven
otherwise.
uti
• Regularly verify and monitor access controls.
tr i b
9. Privacy by Design
D is
for
• Incorporate privacy considerations into the design and
architecture of systems.
t
No
• Ensure that personal data is protected from the outset.
a,
10. Shared Responsibility
h
Na
• Security is a collective responsibility between service
providers and customers.
•
eet
Particularly relevant in cloud environments where both parties
j
bha
share security duties.
Su
11. Secure Access Service Edge (SASE)
l
• Combines network security functions with wide area
y Co networking capabilities.
B • Provides secure access to cloud services, applications, and
SP
data.
ot
requirements, and risk tolerance.
ll N
• Security controls should be selected based on the value they provide
C o
• The risk management process is crucial for identifying valuable assets and determining
appropriate security controls.
• Multiple secure design principles exist, and they can be adapted based on the specific context
and requirements.
• A flexible approach using various frameworks and methodologies ensures a comprehensive and
effective security architecture.
• Principles like least privilege, defense in depth, and zero trust are fundamental to a robust
security design.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Secure Defaults, Fail Securely, and Keep It Simple and Small
Secure Defaults
• Secure Defaults
• Definition: Systems should be configured with security as the default
• Fail Securely setting to avoid easy compromises.
• Keep It Simple and Smal
• Example: An operating system that allows an administrator account to
exist with no password can easily be exploited. Default configurations
should always include strong security measures like requiring
passwords for admin accounts.
• Key Point: Secure default settings minimize the risk of system
exploitation due to overlooked configurations.
on
Fail Securely
•
u ti
Definition: When a system or its components fail, they should do so in
a way that doesn’t compromise security.
tr i b
Example: A safe with an electronic lock should remainis
r D its contents.
• locked if the
building loses power, rather than opening and exposing
fo
tmalfunctions.
•
o
Key Point: Secure failure mechanisms ensure that a system remains
,N
protected even under adverse conditions or
Keep It Simple and Small
h a
a
•
e t N andofoperational
Definition: Reducing the complexity systems helps in minimizing
je
potential security vulnerabilities issues.
• Benefits:
b ha
• u Attack Surface: Fewer components and
SSmaller
l
C•o Less Errors and Vulnerabilities: Simpler systems are
interactions reduce points of vulnerability.
y
PB
easier to understand, test, and secure.
ell
misunderstood mechanisms, making configuration and maintenance
rn
more difficult and prone to errors.
• Secure Defaults: Systems should start with secure configurations to avoid easy compromises from
default settings.
• Fail Securely: Systems should be designed to maintain security integrity even when they fail.
• Keep It Simple and Small: Simplifying system design minimizes vulnerabilities, facilitates testing,
and improves troubleshooting efficiency.
• These principles are fundamental in creating secure and resilient systems, helping to mitigate risks
and prevent security breaches.
ha agreed-upon
and cloud providers where be constantly verified.
•
u b
Example: Using ongoing monitoring and audits to validate that a trusted
l S
vendor is maintaining security controls.
oYour
Zero Trust Principles
C
•
B y Know Architecture: Understand your users, devices, and services.
S P•• Know Identities: Verify the identities of users, devices, and services.
CIS
Check Health: Assess the security health of users, devices, and services
or
before granting access.
rn ell • Monitor Devices and Services: Focus on tracking and logging device and
service activity.
C o • Don’t Trust Any Network: Treat all networks, including your own, as
potentially hostile.
• Select Zero Trust Solutions: Use services and solutions built with zero trust in
mind.
et
be challenging.
je
b ha
l Su
y Co
P B
I SS
C
for
tes
o
ell N
orn
C
• Zero Trust: Trust nothing, verify everything. Requires rigorous authentication, authorization, and continuous monitoring.
• Trust but Verify: Balances trust with continual verification through mechanisms like audits and monitoring.
• Zero Trust Principles: Focus on knowing, verifying, and securing identities, devices, and services.
• Security Measures: Strong authentication, device verification, and comprehensive logging are crucial for effective zero
trust implementation.
• Challenges: Implementing zero trust can be complex and may impact performance and user experience.
• Zero trust and "trust but verify" are essential approaches for modern security architectures, emphasizing the need for
rigorous and continuous verification to safeguard organizational assets.
on
• Privacy Embedded into design to limit the collection and storage of personal data.
Design •
emerge.
uti
Key Point: PbD is not reactive; it addresses privacy risks before they
• Full Functionality of Solutions 2.Privacy as Default Setting:
tr i b
•
End-to-End Security
Visibility and Transparency
•
D is
Focus: Ensure that privacy is the default setting in all systems and
for
processes.
Respect for User Privacy • Example: Applications should be configured by default to require the
t
No
least amount of personal data from users.
• Key Point: Users should not have to take action to protect their
a,
privacy; it should be inherent in the system.
h
Na
3.Privacy Embedded into Design:
• Focus: Embed privacy into the design, development, and deployment
jeet
of systems.
ha
• Example: Incorporating encryption and access controls during the
initial development phase of an application.
b
Su
• Key Point: Privacy is a core feature of the system, not an add-on.
l
4.Full Functionality within a Given Solution:
y Co• Focus: Provide solutions that offer full functionality without requiring
a trade-off between privacy and security.
B • Example: Designing a data-sharing application that allows secure
I SSP •
data exchange without compromising user privacy.
Key Point: Achieve a balance that meets both privacy and
r C organizational needs.
fo 5.End-to-End Security:
ll N
• Example: Using encryption for data at rest and in transit, and
rn e •
securely disposing of data when no longer needed.
Key Point: Protect data from creation to deletion, ensuring privacy is
on
• Privacy Embedded into Integration of Privacy in Architecture
Design
ti
• Integration: Privacy should be a priority in all organizational and project goals, becoming an
u
b
essential part of design activities and planning.
• Full Functionality of Solutions
tr i
• Implementation: Embed privacy into every standard, protocol, and process that involves
•
End-to-End Security
Visibility and Transparency
D is
handling personal data, ensuring compliance with privacy laws and regulations.
• Key Point: Privacy is not just a technical requirement; it must be a fundamental
for
organizational value.
Respect for User Privacy
Privacy as Proactive and Preventive
t
No
• Approach: Design systems to anticipate and prevent privacy breaches before they happen.
a,
• Example: Regularly updating security measures and privacy settings in response to
evolving threats and vulnerabilities.
h
Na
Privacy as Default Setting
et
• Application: Privacy should be the standard, not an option. Users should have their data
protected without having to adjust settings or opt-out of data collection.
je
ha
• Example: Social media platforms setting profiles to private by default and allowing users to
opt-in to sharing.
b
Su
Full Functionality of Solutions
l
• Balance: Aim to create solutions that do not compromise on usability, security, or privacy.
Co
• Example: Designing multi-factor authentication (MFA) systems that provide strong security
while maintaining ease of use.
By End-to-End Security
SP
• Lifecycle Protection: Implement controls that secure data from creation to destruction,
ensuring there are no gaps in security coverage.
CI S • Example: Using secure deletion methods for sensitive data that is no longer needed.
ot
• Example: Publishing transparency reports that outline how user data is collected, used,
ll N
and protected.
Respect for User Privacy
rn e • User-Centric Design: Prioritize user needs and preferences, making it easy for them to
• Privacy by Design (PbD) ensures privacy is built into systems and processes from the start, focusing
on proactive and preventive measures.
• Seven Principles include embedding privacy, ensuring it is the default, maintaining full functionality,
and respecting user privacy throughout the data lifecycle.
• Implementation requires strong security measures, transparency, and a commitment to treating
user data with care.
• Key Focus: PbD should be integral to the organization's culture, policies, and technologies to protect
user data effectively and maintain trust.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Shared Responsibility
Cloud and Third-Party Reliance
• Cloud and Third-Party • Context: The adoption of cloud services and third-party providers has become a critical
Reliance part of business operations worldwide. This trend has shifted some traditional
responsibilities from internal IT departments to external cloud service providers.
• Shared Responsibility Model • Example: An organization using an IaaS model for hosting its applications on a cloud
• Accountability vs. platform relies on the cloud provider for infrastructure security, while the organization itself
Responsibility manages application security.
Shared Responsibility Mod el
• Importance of Clear
• Definition: In the cloud, the responsibility for security is shared between the cloud provider
Communication and the customer, depending on the type of cloud service model being used—SaaS, PaaS,
• Contracts and Agreements or IaaS.
• Breakd own:
on
• IaaS (Infrastructure as a Service): The provider is responsible for the
i
infrastructure's security, while the customer handles the security of the data,
applications, and user access.
ut
•
r i b
PaaS (Platform as a S ervice): The provider manages the platform security, and
t
s
the customer is responsible for securing the applications built on the platform.
•
D i
SaaS (Software as a Service): The provider manages most of the security
for
controls, while the customer focuses on user data, access, and configuration
settings.
t
No
Accountability vs. Responsibility
• Accountability: Always remains with the cloud customer; they are ultimately accountable
a,
for ensuring their data and systems are protected, regardless of the cloud deployment
model.
h
Na
• Responsibility: Divided based on the service model. Responsibilities can be shared or
et
solely managed by the customer or the provider.
•
je
Key Point: Even when responsibility for certain aspects is transferred to the provider, the
ha
customer remains accountable for the security of their data.
b
Importance of Clear Communication
•
l Su
Expectation Setting: Both parties must have a clear understanding of who is responsible
Co
for what to avoid any gaps in security. This involves explicitly stating roles and
responsibilities in service agreements.
By • Example: Clearly defining who manages incident response for data breaches in a cloud
environment can prevent confusion and ensure timely action.
r C Level Requirements (SLRs) should outline the security expectations, roles, and
ot
• Security controls to be implemented by both parties.
ll N
• Incident response procedures.
• Data ownership and protection standards.
• Shared Responsibility Model: Defines how security responsibilities are divided between the cloud
provider and the customer based on the cloud service model (IaaS, PaaS, SaaS).
• Clear Communication: Essential for defining expectations and responsibilities to avoid security
gaps.Accountability: Always lies with the customer, even when certain responsibilities are handled by
the provider.
• Contracts and Agreements: SLAs and SLRs should clearly state the roles, responsibilities, and security
expectations for both parties.
• Policies and Procedures: Must be well-documented and implemented to enforce shared responsibilities
effectively.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
The Cyber Kill Chain -1
Cyber Kill Chain Overview
• Cyber Kill Chain Overview • Definition: The Cyber Kill Chain is a model developed by Lockheed Martin that
• Reconnaissance describes the stages of a cyber attack. It helps defenders understand and break
• Weaponization down the attack process into identifiable and actionable stages to prevent
successful attacks.
• Delivery
• Purpose: By identifying and disrupting any link in the chain, security
• Exploitation professionals can potentially prevent an attack from succeeding.
• Installation • Key Point: Understanding each stage allows for better detection, prevention, and
• Command and Control response strategies.
• Actions on Objectives Reconnaissance
• Description: The attacker identifies and gathers information about the target to
on
find potential vulnerabilities. This step involves passive or active methods to
ti
collect data such as network information, email addresses, usernames, and
technology stack.
u
tr i
• Example: Scanning a company's website for open ports or using socialb
engineering to gather employee information.
D is
for
• Key Point: Early detection in this phase can prevent attackers from gathering
valuable information.
t
No
Weaponization
a,
• Description: The attacker creates a malicious payload, such as a virus or exploit,
to target the vulnerabilities identified during the reconnaissance phase.
h
Na
• Example: Creating a phishing email with a malicious attachment designed to
et
exploit a software vulnerability.
je
• Key Point: Security tools like sandboxing and malware analysis can identify and
ha
neutralize weapons at this stage.
b
Su
Delivery
l
• Description: The attacker sends the payload to the target. Common methods
Co
include phishing emails, malicious websites, or exploiting network
By vulnerabilities.
• Example: Sending a malicious email attachment or link to a target employee.
I SSP • Key Point: Effective email filtering, secure browsing, and user training can
mitigate delivery risks.
r C Exploitation
fo • Description: The malicious code is executed on the target system, exploiting the
es vulnerability to gain unauthorized access.
ot • Example: An employee opens a malicious attachment, triggering the execution
ll N
of the exploit on their system.
rn e • Key Point: Endpoint protection and intrusion detection systems can detect and
on
• Example: The malware connects to a command and control (C2) server to
receive instructions from the attacker.
uti
b
• Key Point: Network monitoring and anomaly detection can help identify and
block C2 communications.
tr i
Actions on Objectives
D is
for
• Description: The attacker performs their final objective, which could include
t
data exfiltration, system destruction, or encrypting files for ransom.
No
• Example: Stealing sensitive data or deploying ransomware to encrypt the target’s
a,
files.
h
• Key Point: Implementing robust data loss prevention (DLP) and incident
Na
response procedures can help mitigate the impact of these actions.
jeet
bha
l Su
y Co
B
I SSP
r C
fo
es
ot
ell N
orn
C
• Cyber Kill Chain: A structured approach to understanding the stages of a cyber attack, helping
organizations to detect and prevent attacks effectively.
• Breaking the Chain: Disrupting any stage in the kill chain can prevent the attack from progressing
and achieving its objectives.
• Proactive Defense: By focusing on reconnaissance and weaponization stages, organizations can
prevent attacks before they even begin.
• Comprehensive Security: Requires addressing all stages with appropriate controls, monitoring, and
response strategies.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Security Models
Definition of a Model
• Definition of a Model Model: A representation or abstraction of something real, often used to simplify
• Definition of a Security Model complex systems or concepts.
Purpose: Models help in visualizing, understanding, and designing complex systems
• Importance of Security or concepts by providing a simplified framework.
Models Definition of a Security Model
• Examples of Security Models • Security Model: A conceptual representation of what security should look like
• Relevance of Security Models in an architecture being built.
Today • Purpose: Security models provide the foundational principles and rules that
guide the implementation of security within an architecture.
Importance of Security Models
• Foundation for Security: They define how core security principles like
on
confidentiality, integrity, and availability should be integrated into systems.
• Consistency: Security models ensure a standardized approach to
implementing security across different systems and architectures.
uti
•
tr i b
Guidance: They serve as a guideline for designing security controls and
mechanisms to protect information assets.
D is
for
Security Models
• Bell–LaPadula Model:
t
No
• Focus: Confidentiality.
a,
• Key Principle: No read-up, no write-down (ensures that users do not
read data at a higher classification level than they are cleared for and
h
Na
do not write data to a lower classification level).
• Biba Model:
•
jeet
Focus: Integrity.
ha
• Key Principle: No write-up, no read-down (prevents data corruption
by ensuring that users cannot write information to a higher integrity
b
Su
level and cannot read information from a lower integrity level).
•
l
Clark–Wilson Model:
y Co•
•
Focus: Integrity.
Key Principle: Uses well-formed transactions and separation of
B duties to enforce data integrity.
ll N
outlined by these models remain relevant and applicable.
C o •
landscape.
Adaptability: These models can be adapted to modern security frameworks
and systems to ensure robust security design.
• Security Models: Represent conceptual frameworks for implementing core security principles like
confidentiality and integrity in systems and architectures.
• Examples: Bell–LaPadula, Biba, Clark–Wilson, and Brewer–Nash models are foundational to
understanding and implementing security.
• Relevance: Despite being developed decades ago, these models continue to provide the basis for
modern security architectures, proving their enduring value and applicability.
B
S P•
Value-Driven Security
ote
elements.
ll N
• Example:
C o •
access control.
Lower-Value Components: Publicly available information might not
need stringent security measures.
• Security in Architecture: Effective security requires breaking down the architecture into
components and securing each one based on its unique requirements.
• Weakest Link Principle: The overall security of a system is determined by its weakest component,
highlighting the need for comprehensive security across all elements.
• Value-Driven Approach: Security efforts should focus on protecting components according to their
value, ensuring a cost-effective and strategic allocation of resources.
,N
Sherwood Applied Business Security Architecture (SABSA)
Overview: A newer framework adopted in a
•
a h architecture risk.
within IT functions and addressing security
1995, SABSA focuses on embedding security
• Key Features:
et NAllows organizations to focus on security risks specific
•
h aje
Risk-Based Approach:
to their business.
•
to u
b and Implementation: Open-source, scalable, and relatively easy
Scalability
S
• ol Compliance Facilitation: Helps organizations align their security architecture
implement.
CI S
or
• Overview: Emphasizes resource efficiency and cost minimization while providing a
o te • Key Features:
ell
framework in parts, making it more adaptable.
rn
• Consistency: A content framework that ensures a consistent approach
C o •
across various architectural components.
Flexibility: A style that accommodates different architectural needs,
providing flexibility in how security is integrated.
• Security Architecture: Involves protecting each component of an architecture based on its value, ensuring
comprehensive security.
• Frameworks: Various frameworks like Zachman, SABSA, and TOGAF provide structured approaches for
implementing enterprise security architecture.
• Framework Comparison:
• Zachman: Focuses on classification and organization, suitable for static environments.
• SABSA: Risk-based, scalable, and compliance-friendly, making it versatile for modern IT needs.
• TOGAF: Emphasizes resource efficiency and flexibility, ideal for complex and modular architectures.
• Choosing the Right Framework: Organizations should choose the framework that best aligns with their security
requirements, business goals, and IT environment dynamics.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Security Models
Definition and Purpose of Security Models
• Definition and Purpose of • Security Models: Representations or frameworks defining the rules and principles that must be
implemented to achieve specific security objectives within an architecture.
Security Models
• Purpose: To provide a structured approach to implementing security controls that address
• Types of Security Models different aspects of the CIA triad (Confidentiality, Integrity, Availability).
• Lattice-Based ModelsRule- Types of Security Models
Based Models • Lattice-Based Models: These models use layers or levels to define security. They are structured
like a ladder, representing different layers of security that need to be navigated to meet security
• Key Lattice-Based Models: requirements.
Bell–LaPadula, Biba • Rule-Based Models: In these models, specific rules dictate how security is enforced, regardless
of layers. They focus on the interactions and rules that govern access control and data
• Key Rule-Based Models: management.
Clark–Wilson, Brewer–Nash Lattice-Based Models
•
level or layer has specific rules and constraints.
ti on
Characteristics: Layered, hierarchical structures that use levels to define security protocols. Each
• Examples:
i bu
• Bell–LaPadula Model:
str
• Focus: Confidentiality.
D i
for
• Main Rule: “No Read Up, No Write Down” – Subjects at lower levels cannot
access information at higher levels.
t
No
• Application: Commonly used in military and government contexts to
prevent unauthorized access to classified information.
• Biba Model:
h a,
Na
• Focus: Integrity.
et
• Main Rule: “No Write Up, No Read Down” – Subjects at lower integrity
levels cannot modify information at higher levels and cannot read from
Su
Rule-Based Models
l
Co
• Characteristics: Use specific rules that define how security controls are implemented, focusing
on relationships and permissions between entities.
By • Examples:
SP
• Clark–Wilson Model:
CI S •
•
Focus: Integrity.
Main Rule: Enforces well-formed transactions and separation of duties.
es
ot
• Brewer–Nash (Chinese Wall) Model:
Focus: Conflict of interest.
ll N
•
• Main Rule: Prevents users from accessing conflicting information, ensuring
o
• Application: Commonly used in financial and consultancy firms to prevent
• Security Models: Provide structured frameworks for implementing security principles within an organization.
• Lattice-Based Models: Focus on hierarchical layers, with Bell–LaPadula ensuring confidentiality and Biba ensuring
integrity.
• Rule-Based Models: Depend on explicit rules to enforce security, with Clark–Wilson focusing on integrity through
well-formed transactions and Brewer–Nash preventing conflicts of interest.
• Choosing a Model: Organizations should select a security model based on the specific security requirements and
the nature of the data and operations being protected.
on
security level.
•
security level.
uti
No Write Down: Subjects at a higher security level cannot write to a lower
•
r i b
Use Case: Military and government applications where preventing unauthorized access
t
s
to classified information is critical.
•
D i
Layer-Based Perspective: Each security level (e.g., Confidential, Secret, Top Secret)
for
represents a distinct layer. Access is restricted based on the subject's clearance level
relative to these layers.
Biba Model
t
• Focus: Integrity.
No
a,
• Core Principle: “No Write Up, No Read Down.”
•
h
No Write Up: Subjects at a lower integrity level cannot modify data at a higher
Na
integrity level.
et
• No Read Down: Subjects at a higher integrity level cannot read data from a
lower integrity level.
•
je
Use Case: Ensures data integrity in environments where data corruption or unauthorized
ha
modification must be prevented.
•
b
Layer-Based Perspective: Integrity levels (e.g., high integrity, low integrity) form layers
Su
that dictate how data can be accessed and modified based on the subject's integrity
level.
l
Co
Lipner Implementation
• Definition: Lipner is not a separate security model but rather an implementation that
By combines elements of both Bell–LaPadula (for confidentiality) and Biba (for integrity).
Purpose: To create a more comprehensive security framework that addresses both
SP
•
confidentiality and integrity by leveraging the strengths of both Bell–LaPadula and Biba.
CI S • Implementation Strategy:
• Combines Confidentiality and Integrity Controls: Uses the confidentiality
for controls of Bell–LaPadula and the integrity controls of Biba to create a hybrid
security solution.
ot
(confidentiality) and ensure the accuracy and consistency of financial records
(integrity).
ll N
Layer-Based vs. Lattice-Based Terminology
rn e • Layer-Based: Refers to the hierarchical levels that must be navigated to apply security
controls.
• Layer-Based (Lattice-Based) Models: Define security controls using hierarchical levels or layers, with specific rules
for each layer.
• Bell–LaPadula: Focuses on confidentiality, preventing unauthorized access to higher security levels.
• Biba: Focuses on integrity, ensuring data is not corrupted by lower integrity levels.
• Lipner Implementation: Combines the best aspects of Bell–LaPadula and Biba to create a more robust security
framework.
• Terminology: "Layer-based" and "lattice-based" are terms used interchangeably, both describing models that use
hierarchical layers to enforce security.
on
(Read/Write at Same Level) Simple Security Property ("No Read Up")
•
u t i
Definition: Also known as the "no read up" property, this principle dictates that a subject
at a lower security level cannot read an object at a higher security level.
tr i b
• Example:
s
If a user has a "Confidential" clearance, they cannot readiinformation labeled
r D that they are not
•
•
as "Secret" or "Top Secret."
t f o
This prevents users from accessing sensitive information
authorized to view.
o
•
a , N needs to be compartmentalized
Application: Used in environments where information
h
and access is restricted based on security clearance.
Star Property ("No Write Down")
N a
Definition: Also referred to as t
•
je
subject at a higher security e the "no write down" property, this principle states that a
level cannot write to an object at a lower security level.
h a
• Example:
u b
•
Slabeled as "Confidential."
A user with "Top Secret" clearance cannot write or add information to a file
• ol This prevents data from leaking to lower security levels where unauthorized
y C individuals could access it.
• B Application: Ensures that sensitive information does not get inadvertently or maliciously
CI S
for • Definition: This property allows a subject to read and write only at their own security
level, but not at levels above or below.
tes Example:
o
•
ll N
• A user with "Secret" clearance can only read and write within the "Secret"
classification level and not access "Confidential" or "Top Secret" data.
rn e • Purpose: This principle is more restrictive and ensures that users cannot
o
manipulate data in a way that could bypass other security rules.
• Bell–LaPadula Model: Aims to enforce confidentiality by applying strict rules on how information can be accessed
and modified.
• Simple Security Property: Prevents lower-level subjects from accessing higher-level information ("no read up").
• Star Property: Prevents higher-level subjects from writing down to lower-level objects ("no write down").
• Strong Star Property: Restricts subjects to read and write only within their own security level, providing additional
security controls.
• Overall Purpose: Designed primarily for environments where confidentiality is the highest priority, such as military or
governmental settings.
i
r Dread data from a "Low
• Example:
•
Integrity" file.
f o
A user or process with "High Integrity" clearance cannot
h
reliability, such as financial systems or research
a
data might contain errors or inconsistencies.
Star Integrity Property ("No Write Up")N
t
ethe "no write up" property, this principle states that a
Definition: Also referred to
je as
ha
•
subject at a lower integrity level cannot write to an object at a higher integrity level.
• Example: b
u with "Low Integrity" access cannot modify or add information to a "High
•
l SAIntegrity"
user
o document.
C contaminatingunreliable
B y • This prevents or potentially corrupted users/processes from
high-integrity data.
CI S
or
Invocation Property
s f • Definition: The invocation property states that a subject cannot request or send
o te •
information to an object or subject that is at a higher integrity level than itself.
Example:
ell N • A "Low Integrity" application cannot invoke or request services from a "High
Integrity" application.
orn • This prevents lower integrity subjects from influencing or compromising the
operations of higher integrity subjects.
C • Purpose: This property is designed to enforce strict controls over how processes
interact, preventing lower integrity levels from impacting or controlling higher integrity
operations.
• Biba Model: Focuses exclusively on ensuring data integrity by regulating how data is accessed and modified.
• Simple Integrity Property: Prevents subjects from reading down to lower integrity levels ("no read down"), ensuring
that high-integrity subjects are not influenced by low-integrity data.
• Star Integrity Property: Prevents subjects from writing up to higher integrity levels ("no write up"), safeguarding high-
integrity data from being contaminated.
• Invocation Property: Ensures that subjects at lower integrity levels cannot influence or send requests to higher
integrity subjects.
• Overall Purpose: The Biba Model is crucial in environments where the trustworthiness and accuracy of data are of
utmost importance, such as in medical, financial, or critical infrastructure systems.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Lipner Implementation
Overview of Lipner Implementation
• Overview of Lipner • Definition: The Lipner Implementation is not a distinct security model but rather an
Implementation approach to combining the principles of two established lattice-based models: Bell–
LaPadula (focusing on confidentiality) and Biba (focusing on integrity).
• Combining Bell–LaPadula
• Objective: To provide a comprehensive security framework that addresses both
and Biba Models confidentiality and integrity within the same system.
• Purpose and Benefits Combining Bell–LaPadula and Biba Models
• How Lipner Implementation
• Bell–LaPadula: Enforces confidentiality by preventing unauthorized reading or writing of
Works data based on sensitivity levels.
• Separation of Objects and • Biba: Ensures integrity by controlling how data is modified and accessed, preventing
Application data corruption.
on
• Lipner's Approach: By integrating both models, Lipner seeks to apply a unified set of
rules that govern both the confidentiality and integrity of data.
u ti
Purpose and Benefits
t r i b
•
is
Dual Protection: Achieves a balance between protecting data from unauthorized
r D by addressing
access (confidentiality) and ensuring its accuracy and trustworthiness (integrity).
•
t
multiple facets of data security within the same framework. f o
Comprehensive Security: Provides a more robust security posture
o
,N
How Lipner Implementation Works
• Separation of Data and Programs:
Data: Classified accordinga toh
a
Bell–LaPadula principles, focusing on the
N
•
etexecute
sensitivity and confidentiality of the information.
e
• Programs: Governed by Biba principles, ensuring that only trusted subjects
a j
can modify data and critical processes.
•
b h Levels: Applied to subjects
Application of Sensitivity Levels and Job Categories:
Sonu
• Sensitivity and objects to control access based
r
controls more effectively.
fo Application: The combined principles are applied across the system to maintain a high
s
•
ell N • Scenario: In a military information system, highly sensitive operational data needs to be
rn
protected from unauthorized access (confidentiality), while ensuring that only authorized
o
and trustworthy users can update or modify this information (integrity).
• Lipner Implementation: Combines Bell–LaPadula’s confidentiality controls with Biba’s integrity controls, offering a
comprehensive security framework.
• Dual Focus: Provides security against unauthorized access (confidentiality) and unauthorized modifications
(integrity).
• Data and Programs: Treated separately, with sensitivity levels and job categories applied to ensure appropriate
controls.
• Practical Use: Effective in environments where both data confidentiality and integrity are paramount, such as
military, healthcare, and financial systems.
• Not a Standalone Model: Lipner is an implementation strategy that leverages two existing models to provide
enhanced security.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Rule-based Models
Overvi ew of Rule-based Models
Overview of Rule-based •Definition: Rule-based models e mploy a se t of pre defined rules to control interactions between subjects (users, processes)
and objects (files, data).
ModelsInformation Flow
•Purpose: These models aim to enforce se curity polic ie s by de fining how data should be acc esse d and modified based on
ModelsCovert ChannelsClark– specific rules, enhancing the integrity, confidentiality, and availability of data.
Wilson ModelBrewer–Nash •Applicati on: Used in scenarios where precise and well-defined access controls are necessary, such as financial systems or
government databases.
Model (Chinese Wall)
Inform ation Flow Models
•Definition: These models track the flow of information between different entities within a system, ensuring data moves only in
authorized ways.
•Purpose: They help to monitor and control how information is transferred between subjects and objects, preventing
unauthorized information leakage .
on
•Key Point: Information flow models are crucial for detecting and preventing covert channels.
Covert Channels
uti
violates the sec urity policy of a system.
tr i b
•Definition: Covert channels are uninte nde d communication paths that can be exploited to transfer information in a way that
•Types:
D is
for
• Storage Channels: Use shared storage areas to transfer information covertly (e.g., manipulating a file’ s
metadata).
t
• Timi ng Channels: Use the timing of operations to transmit information (e.g., varying response times).
No
•Example: An attacker using file creation timestamps to communicate with another system user without detection.
a,
Clark–Wilson Model
h
Na
•Focus: Integ rity
et
•Purpose: Ensures that data is modified only in authorized ways and by authorized subjects. This model is particularly relevant
in commercial systems where data integrity is c ritical.
je
ha
•Three Goals:
b
• Prevent Unauthori zed Users from making modifications.
Su
• Prevent Authorized Users from making improper modifications.
l
• Maintain Internal Consistency of the data.
Co
•Three Rules:
By •
•
Well-form ed Trans actions: Ensures that only legitimate processes c an modify data.
Separation of Duties: No single user has c omplete control over a transaction.
SP
• Audi t Trai l: All modifications must be logged and verified.
CI S •Example: In a banking system, a cashier can enter transactions, but only an accountant can approve them.
ot
•Purpose: Prevents users from accessing conflicting information, thereby preventing conflicts of interest.
ll N
•Core Concept: A user with access to sensitive information in one area (e.g., a financial advisor to Company A) cannot access
sensitive information in a conflicting area (e.g., a financial advisor to Company B in the same sector).
rn e •How i t Works:
C o •
• User Profiles: Define what users can and cannot acce ss based on pre vious interac tions.
Dynamic Access Control: Access permissions change dynamically based on the user’s actions.
•Example: A consultant working with two competing companies cannot access the business strategies of both, thereby
avoiding potential conflicts of interest.
• Rule-based Models: Govern access using predefined rules, focusing on specific security goals like integrity or
preventing conflicts of interest.
• Information Flow Models: Track the flow of information to ensure data moves as intended, aiding in the detection of
covert channels.
• Covert Channels: Unintentional paths for unauthorized data transfer; must be mitigated to protect data integrity and
confidentiality.
• Clark–Wilson Model: Integrity-focused with rules to prevent unauthorized modifications and ensure data
consistency through well-formed transactions and separation of duties.
• Brewer–Nash Model: Prevents conflicts of interest by dynamically changing access based on user interactions,
ensuring sensitive information isCornell
not misused.
Notes by Col Subhajeet Naha, Retd, CISSP 2024
Information Flow Models
Definition of Information Flow Models
• Definition of Information Flow • Concept: Information flow models are designed to track and manage the
Models movement of data throughout its entire life cycle.
• Purpose of Information Flow • Function: They monitor the flow of information from its origin (creation or
Models collection), through its various states (storage, usage, dissemination), to its
final state (archiving or destruction).
• Application in Security
Models Purpose of Information Flow Models
• Importance in Vulnerability • Control Data Movement: By tracking information flow, these models help
Detection ensure that data moves only in authorized and secure ways.
• Data Life Cycle Management: Information flow models provide visibility into
how data is handled, shared, and stored throughout its life cycle.
•
ti on
Security Enforcement: They ensure that data flow adheres to security policies
and that unauthorized data flows are identified and blocked.
i b u
Application in Security Models
s tr
D i
•
lattice-based models like Bell–LaPadula and Biba.
o r
Basis for Security Models: Information flow models are foundational to
•
o t fflow of data to maintain
Bell–LaPadula: Focuses on controlling the
e e
Importance in VulnerabilityjDetection
b ha areChannels:
•
S u
Identification of
covert channels,
Covert
which
Information flow models can uncover
unintended communication paths that can be
exploitedl for unauthorized data transfer.
•
y Co Unauthorized Flows: By tracking data flows, these models can
Tracking
P BFlow Analysis: They help analyze data flow to ensure that information is not
identify anomalies that may indicate data leaks or breaches.
C Example:
for
tes • In an organization, an information flow model might track sensitive customer
data from when it is collected through a web form, stored in a database,
o processed for business analytics, shared with authorized users, and finally
ll N
archived or deleted according to data retention policies.
rn e
C o
• Information Flow Models: Essential for monitoring and controlling the movement of data
throughout its life cycle, ensuring adherence to security policies.
• Foundational Role: Serve as the basis for lattice-based models like Bell–LaPadula (confidentiality)
and Biba (integrity).
• Vulnerability Detection: Useful for identifying and mitigating covert channels and unauthorized data
flows, enhancing overall security.
on
• Timing Covert Channel:
•
ti
Involves exploiting the timing capabilities of a system to signal information.
u
•
of pizza deliveries indicated impending military action.
tr i b
Example: The "pizza index" during the Gulf War, where the timing and quantity
a,
has access to RAM can unintentionally read this data.
h
• Implication: Other processes or users can unintentionally access and
a
possibly misuse sensitive information stored in memory.
N
• Timing Covert Channel Example:
Scenario: A web e t
•
je server’s response time varies based on whether a provided
a existing username can allow an attacker to infer valid
username exists or not. A shorter response for a non-existing username versus
b h
a longer one
usernames.
for an
•
S u Attackers can deduce valid usernames, making it easier to
Implication:
ol
launch further attacks like brute-forcing passwords.
C
• ByUnintentional Disclosure: Because covert channels are not intentionally created, they
Security Implications
for • Difficult to Detect and Mitigate: Since they are not part of the intended system design,
es covert channels are challenging to detect and often require specialized techniques for
ot
mitigation.
N
ell
Example of a Timing Covert Channel in History:
rn
• "Pizza Index" Incident:
• Covert Channels: Unintentional and inadvertent communication paths that can lead to the unintended
disclosure of sensitive information.
• Two Types: Storage and timing, each with its own way of exploiting system capabilities to leak
information.
• Security Implications: Covert channels can severely compromise confidentiality and are difficult to
detect and mitigate.
• Focus of Clark–Wilson Model • Conc ept: The Clark–Wilson model is a rule-based security model that focuses solely on integrity.
• Context: Unlike other mo dels, such as Biba, Clark–Wilson not only prevents unautho rized changes
• Goals of Integrity in Clark– but also ensures that authoriz ed subjects do not make incorrect or harmful modifications, an d it
maintains the consisten cy o f the system.
Wilson
Goals of Inte grity in Cla rk–Wilson
• Rules for Achieving Integrity
1. Prevent Unauthorized Subjects f rom Making Changes :
• Comparison with Biba Model • Expla nation: This goal ensu res that ind ividuals who are not auth orized to make
modifications canno t d o so.
• Exam ple: A user with out admin rights cann ot modify sy stem files.
• Relation to Biba: This is the on ly goal that the Biba model also addresses.
2. Prevent Authorize d Subjects from Making Bad Change s:
on
• Expla nation: Even if a user has permissio n, they should not be able to make changes that
would co rrupt or degrade system integrity.
•
perfor m u nauthorized transactions.
uti
Exam ple: An accountant can enter finan cial data but cannot alter previo us record s or
for
• Exam ple: Database con strain ts that enforce consistent and v alid data entr ies.
t
No
Rules for Achieving Inte grity
a,
Clark–Wilson achieves its integrity goals usin g three specific r ules:
h
1. Well-Formed Transac tions:
Na
• Definition: Transactions must be design ed so that they ensure data integrity and
et
consisten cy .
e
• Exam ple: An application on ly allows validated and ap proved entr ies to be submitted to a
j
database, p reventing inconsisten t o r invalid data.
•
bhaKey Point: This rule man dates that all operations per fo rmed on data must b e p roperly
autho rized and validated to pr event corruption.
2.
Su
Separation of Duties (SoD):
l
Co
1. Definition: No single individual shou ld be allowed to perform all critical fu nctions r elated
to a process.
By 2. Exam ple: On e emp loyee can initiate a fin ancial transaction, but another mu st appro ve it.
SP
3. Key Point: This rule r educes the risk of fraud and er ror by ensuring that tasks are div ided
among multiple peop le.
r
1. Definition: Direct access to o bjects (data) is not allowed; subjects (u sers) must go
o
thro ugh an in termediary pr ogram that enfor ces access ru les.
s f 2. Exam ple: User s cannot dir ectly modify datab ase tables; instead , they must use an
ote 3.
application that enfor ces business rules and validation .
Key Point: This rule en sures that all actions taken on objects are co ntrolled and
ll N
monitored.
e
Comparison w ith Biba Model
orn • Biba Focus: Prevents unautho rized subjects from making chan ges (Goal #1).
C
• Clark–Wilson Focus: Prevents unautho rized and bad chan ges an d maintains system co nsistency
(Go als #1, #2, an d #3).
• Key Difference: Clark–Wilson offers a more compreh ensiv e ap proach to integrity by cover ing all
aspects, includ ing pr oper transactions, separation of duties, and controlled access.
• The Clark–Wilson model focuses on data integrity through three main goals: preventing
unauthorized changes, preventing harmful authorized changes, and maintaining system
consistency.
• It achieves these goals through three rules: well-formed transactions, separation of
duties, and the access triple model.
• Compared to the Biba model, Clark–Wilson provides a more complete and practical
approach to maintaining system integrity.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Brewer–Nash (The Chinese Wall) Model
Purpose of the Brewer–Nash Model
• Purpose of the Brewer–Nash • Concept: The Brewer–Nash model, also known as "The Chinese Wall," is an information
Model flow model designed to prevent conflicts of interest within an organization.
• Primary Goal: Conflict of • Definition: The model restricts information flow between different subjects and objects
Interest Prevention to ensure that access is only granted if it does not create a conflict of interest.
• Examples of Implementation • Key Point: It focuses on controlling access based on the context of the information and
the user's role to avoid situations where conflicts of interest may arise.
• Relation to Other Models
Primary Goal: Conflict of Interest Prevention
• Goal: The Brewer–Nash model is primarily concerned with confidentiality and is
specifically designed to prevent conflicts of interest.
on
• Explanation: The model stipulates that users (subjects) can only access certain pieces
access.
u ti
of information (objects) if there is no potential for a conflict of interest to occur from such
•
r i
t in b
Example: A user who has access to sensitive financial information in one department,
rD
a conflict of
o
interest.
t f
o
Examples of Implementation
tN
unauthorized changes or tampering.
Implementation:e
•
Productiona
j
isolated accesse The Brewer–Nash model ensures these departments have
controls that prevent the Development team from influencing
SP
• Implementation: Brewer–Nash enforces a “Chinese Wall” between these
o
ll N
• While both models address confidentiality, Bell–LaPadula focuses on
preventing unauthorized access based on security levels (e.g., “no read up, no
• The Brewer–Nash model, also known as "The Chinese Wall," is an information flow model designed to prevent
conflicts of interest within an organization by restricting information flow between subjects and objects based on
context and role.
• It is primarily concerned with confidentiality and is implemented to prevent situations where access to sensitive
information could create unfair advantages or conflicts between different departments.
• This model is particularly useful in environments such as banking or software development, where distinct teams
should not have overlapping access that could influence their actions or decisions.
on
Overview of Harrison–Ruzzo–Ullm an (HRU) Model
i
• Concept: Like th e Grah am–Denning mod el, the HRU model is a rule-based se curity m odel bu t it
ut
focuses more on th e integrity of access rights and ex tends capabilities by allowing mo dification of
•
access r ights d ynamically.
tr i b
Definition: The HRU mod el u ses a finite se t of rule s to ed it and co ntrol the access rights of a subject
•
to an o bject.
Key Feature:
D is
for
• It introd uces the concep t of generic rights that can b e applied to gr oups, making it
t
easier to man age access controls for multiple su bjects at once.
No
• Purpose: The mo del p rovides a more dy namic and scalable way to manage access righ ts, allowing for
the ad justment of per missions as need ed while maintaining the integr ity of the access control system.
a,
• Exam ple:
•
h
In an enterp rise setting, the HRU mod el can b e used to assign "read " righ ts to a grou p of
Na
users called "Managers" for all documen ts in the "Repo rts" fold er. This simp lifies
access co ntrol managemen t compared to assigning r ights individ ually to each manager .
• Rule Structure:
j et
Key Diffe re nce s Be twee n Graham –Denning and HRU
e
ha
• Gra ham–Denning: Focuses on ind ividual access righ ts and operations on subjects an d
b ob jects.
Su
• HRU: Focuses on integrity and introd uces rules for m anaging generic rights for grou ps.
•
l
Scalability:
Co
• Gra ham–Denning: Best suited for environments where indiv idu al access control is
y
need ed.
B • HRU: Offer s b etter scalability throu gh th e use of gener ic rights, making it more suitab le
SP
for large-scale env iron ments.
• Focus Are a:
CI S • Gra ham–Denning: Primarily deals with the creation, de letion, and modific ation of
subjects an d objects.
for • HRU: Emph asizes o n maintaining the in tegrity of access r ights an d dy namically
managing per missions.
ot
• Lattice-Based Models:
ll N
• Focu s on hierarch ical levels an d structur ed access con trol (e.g., Bell –LaPad ula for
confidentiality , Bib a fo r integrity ).
rn e • Rule-Based Models:
o
• Focu s on sp ecific ru les that mediate access between sub jects and ob jects.
C • Ex amples in clud e:
•
•
Gra ham–Denning: Focus on d etailed access contr ol op eration s.
HRU: Focus on managin g and modify ing access righ ts d ynamically with
supp ort for grou p rights.
• Both the Graham–Denning and Harrison–Ruzzo–Ullman models are rule-based security models used to
control access rights between subjects and objects.
• The Graham–Denning model is more basic, focusing on eight rules for managing access controls, while
the HRU model introduces the concept of generic rights for better scalability.
• Understanding these models is crucial for designing and implementing secure systems that require
precise access control and permission management.
• Definition of Certification • Concept: Certification is a comprehensi ve technical analysi s of a solution or product to confirm that it meets the
desired security requirements and needs of the organization.
• Definition of Accreditation
• Purpose: It ensures that the solution meets specific securi ty standards before being implemented in an operational
• Purpose of Evaluation Criteria environment.
Systems • Example:
• An organization needs to select a firewall that meets their security requirements. Certification involves
• Key Evaluation Criteria Systems evaluating different firewall products to see which one aligns with their needs in terms of security
features, performance, and compliance.
• Differences between
Definition of Accreditation
Certification and Accreditation
• Concept: Accreditation is the official management sig n-off on the certification for a set period of time, indicating that
the solution can be used within the organization.
• Purpose: This is a management decision to use a certified solution in the operational environment and accept the
on
associated risks.
• Example:
uti
b
• After certifying a firewall, management reviews the results and accredits it for use within the organization
r i
for 18 months. After this period, the certification and accreditation process is repeated to ensure
continued compliance and effectiveness.
t
Purpose of Evaluati on Criteria Systems
D is
for
• Objecti ve: These systems provide a way to independently and objectively evaluate the security capabilities of
vendor products. They help organizations make informed purchasing decisions based on standardized criteria rather
than vendor claims.
t
• Vendor and Consum er Benefit:
No
a,
• Vendors gain credibi lity and marketability when their products are evaluated and rated positively.
•
h
Consumers can compare products based on an independent assessment, ensuring that they choose
Na
solutions that truly meet their security needs.
et
Key Evaluati on Criteria Systems
1.
je
Trusted Computer System Evaluation Criteria (TCSEC)
ha
• Also known as the Orange Book, it is one of the earliest systems for evaluating the security of
b
computer systems.
Su
2. Inform ation Technology Security Evaluation Criteria (ITSEC)
l
Co
• The European equivalent of TCSEC, focusing on the evaluation of IT security.
By • The most widely accepted and used evaluation criteria system today.
SP
• Evaluation As surance Levels (EALs ) range from EAL1 to EAL7, indicating the depth of testing and
assurance.
CI S • A firewall with an EAL4 rating would be considered more secure than one with an EAL3 rating.
r
Differences between Certification and Accreditation
fo • Certification:
es • Technical: Focuses on the detailed technical evaluation of a product or solution against predefined
ot
security requirements.
Who Performs ?: Usually performed by security professionals or independent evaluation bodies.
ll N
•
• Purpose: To confirm that a product or system meets the security needs of the organization.
rn e • Accreditation:
o
• Managerial: A formal approval by management to use the certified product or system in the ope rational
C
environment.
• Who Performs ?: Performed by management or asset owners, not by the security function.
• Purpose: To officially authorize the use of a certified solution for a defined period, accepting the
associated risks.
• Certification is a thorough technical analysis of a solution to ensure it meets security needs, while Accreditation is
the management's formal approval to use the certified solution for a specific period.
• Evaluation criteria systems like the Common Criteria provide a standardized method for assessing the security
capabilities of products, making it easier for organizations to select appropriate solutions.
• Certification and accreditation together ensure that solutions not only meet technical security requirements but are
also officially authorized for use, considering the organization's risk tolerance.
on
• Importance of Evaluation Criteria • Classification Levels:
•
•
uti
A1: Verified Design – The highest level with mathematically verified security.
B3: Security labels, verification of no covert channels, secure during start-up.
• B2: Security labels and verification of no covert channels.
tr i b
• B1: Security labels only.
D is
for
• C2: Strict login procedures.
• C1: Weak protection mechanisms.
t
No
• D1: Failed or was not tested (no security).
• Legacy: Although outdated and limited to confidentiality, TCSEC is still useful when
confidentiality is the primary concern.
h a,
Na
Information Technology Security Evaluation Criteria (ITSEC)
Introduction: Developed by Europeans as an extension and improvement of TCSEC to
et
•
address its shortcomings, especially for networked environments.
je
ha
• Focus: Measures both confidentiality and other security aspects like integrity and
availability. It works well in complex, networked environments.
b
Su
• Dual Ratings: ITSEC provides separate ratings for functionality and assurance:
•
l F Levels (Functional Levels): Similar to the Orange Book's approach to
Co
measuring functionality.
SP
code reviews).
for • E5: Semi-formal system + unit tests and source code reviews.
ot
• E3: Informal system + unit tests.
ll N
• E2: Informal system tests.
E1: System in development.
e
•
orn •
• E0: Inadequate assurance.
Advantages over TCSEC:
C •
•
Includes network environments.
Measures functional and assurance elements separately, offering a more
comprehensive evaluation.
on
• Importance of Evaluation Criteria
• Vendors can demonstrate their products' security capabilities through
standardized evaluation.
uti
•
objective evaluations.
tr i b
Consumers can make informed decisions based on independent and
•
is
Industry Standardization: Evaluation criteria systems like TCSEC and ITSEC (now
D
for
replaced by Common Criteria) provide a common language and standard for discussing
and comparing security features.
t
No
h a,
Na
jeet
bha
l Su
y Co
B
I SSP
r C
fo
es
ot
ell N
orn
C
• TCSEC (Orange Book) is the foundational evaluation criteria system focusing on confidentiality,
primarily for standalone systems, and is now considered limited and outdated.
• ITSEC improved upon TCSEC by including functional and assurance measurements, making it more
applicable to modern, networked environments.
• Understanding these systems helps organizations evaluate and choose appropriate security
solutions, fostering transparency and trust in security product capabilities.
str
•
D i
The specific product being evaluated. For example, a firewall that a
vendor wants to certify according to Common Criteria standards.
for
3. Security Targets (ST):
•
t
A document created by the vendor describing how their product
No
meets the requirements in the Protection Profile.
a,
• Each security capability is scrutinized and evaluated against the
h
standards listed in the PP.
4. Evaluation Process:
Na
•
jeet
The process of assessing the TOE against the security targets and
protection profile.
•
bha
It produces documentation that helps potential consumers
Su
understand the security capabilities and weaknesses of the product.
5.
l
Assigning EAL Levels:
Co
• After evaluation, the product is assigned an EAL level from 1 to 7
I SSP •
•
EAL1: Functionally tested – Basic testing and documentation.
EAL2: Structurally tested – More structured testing, including design and
r C security documentation.
es security functionality.
ot • EAL4: Methodically designed, tested, and reviewed – More rigorous design and
ll N
testing; most commonly used level.
rn e • EAL5: Semi-formally designed and tested – Advanced testing with some formal
analysis.
for
significant changes are made. Minor updates and patches do not affect the
EAL rating unless re-evaluated.
t
No
h a,
Na
jeet
bha
l Su
y Co
B
I SSP
r C
fo
es
ot
ell N
orn
C
on
• Mitigating Controls: Contr ols shou ld not on ly pro tect against identified risks but also prov ide
mitigation strategies for potential risks, ensurin g a balan ced security app roach.
uti
b
Major Security Control Frame works
1. ISO 27001/27002:
tr i
•
Information S ecu rity Management System (ISM S).
D is
ISO 27001: Fo cu ses o n establish ing, implementing, main taining, and improvin g an
for
• ISO 27002: Provides best practice recommendation s for information security
t
management, including guidelines on implementing specific security contr ols.
No
• Inte rna tional Recognition: ISO 27001/02 is globally recognized and widely adopted,
a,
making it a found ational framework for many organizatio ns.
h
2. NIST SP 800-53:
Na
• Dev eloped b y the Natio nal Institu te o f Standards and Techno logy (NIST).
et
• Pr ovides a catalo g of secur ity and priv acy con trols for federal in fo rmation systems and
e
organizations.
j
ha
• Includes comprehensive guidelines on implementing, assessing, and managing security
contro ls.
b
Su
3. COBIT:
•
l Focuses on governance and management of enterprise IT.
Co
• Helps organization s achieve their b usin ess goals by managing an d optimizing IT
y
resources an d processes.
B 4. CIS Controls:
SP
• A set of prioritized actions that provid e specific and actionable way s to sto p today's mo st
CI S •
perv asive and d angero us cyber attacks.
Focuses on iden tifying an d implemen ting effective secur ity controls.
es • A security standard designed to ensu re that all comp anies that pr ocess, store, o r transmit
ot
credit card in fo rmation maintain a secure envir onment.
Pr ovides guid elines specifically for pr otecting pay ment car d data.
ll N
•
Applica tion of Multiple Frame works
rn e • Flexible Approac h: Or ganiz ations may u se features fro m mu ltiple framewo rks to build a custom
o
secu rity str ategy tailored to their specific needs.
C •
•
Best Prac tic es: By in tegratin g elemen ts from different frameworks, organ izations can benefit from a
bro ad spectrum of best practices that addr ess a wide range of security r equirements.
Holistic Security: Combining mu ltiple framewo rks can p rovide a more compr ehensive and holistic
appr oach to security man agement, covering both technical and organization al asp ects.
• Security control frameworks provide structured guidance for selecting appropriate security controls based on best
practices and risk management principles.
• ISO 27001/02, NIST SP 800-53, COBIT, CIS Controls, and PCI DSS are some of the major frameworks used to ensure
robust security across various systems and processes.
• Multiple frameworks can be used together to create a tailored, comprehensive security approach that aligns with an
organization's specific needs and objectives.
• Proper control selection and application of frameworks enhance the overall security posture and protect the
organization from potential threats and vulnerabilities.
on
• SOX
• Focus: Aligning IT services with business goals and objectives.
• Processes Covered: Onboarding, procurement, change management, u
t i
strib
Di delivery and
configuration management, access control, etc.
r
• Use Case: Ideal for organizations looking to optimize IT service
fo
management processes.
ot
NIST SP 800-53 N
h a,and recommendations for
• Purpose: Set of best practices, standards,
cybersecurity controls.
N a
t
e of Standards and Technology (NIST).
je
• Developed by: National Institute
b ha
• Focus: Improving cybersecurity posture of organizations.
l Sucompliance
• Use Case: Widely used by US federal agencies and private organizations to meet
C o
regulatory and requirements.
for • Focus: Data security for organizations handling credit card transactions (e.g.,
N o
ell
• Use Case: Mandatory for businesses handling payment card data to ensure
secure processing and compliance.
orn
C
on
• SOX
i
practices.
• Supportive to ISO 27001: Helps implement and manage controls in ISO 27001.
ut
r i b
• Use Case: Used to provide detailed guidance for organizations implementing the ISO
t
27001 controls.
D is
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
for
• Purpose: Improves organizational performance and governance through effective internal
control and risk management.
t
No
• Focus: Enterprise risk management (ERM) and fraud deterrence.
a,
• Use Case: Commonly adopted by organizations seeking to enhance governance and risk
management practices.
h
Na
HIPAA (Health Insurance Portability and Accountability Act)
et
• Purpose: Focuses on the protection of protected health information (PHI) of individuals.
je
• Industry: Healthcare.
ha
• Use Case: Mandatory for healthcare providers, health plans, and business associates to
b
Su
ensure the confidentiality, integrity, and availability of PHI.
l
FISMA (Federal Information Security Management Act)
Co
• Purpose: Requires US federal agencies to develop and implement comprehensive security
y
programs.
B • Scope: Applies to federal agencies and contractors handling federal data.
SP
• Use Case: Ensures that federal information systems are protected against security threats
CI S and vulnerabilities.
FedRAMP (Federal Risk and Authorization Management Program)
for • Purpose: Provides a standardized approach for security assessment and authorization of
ot
• Requirement: Mandatory for cloud services holding US federal government data.
ll N
• Use Case: Ensures that cloud service providers meet strict security requirements to
protect federal data.
• Security control frameworks offer structured guidance for implementing and managing security
controls based on best practices and compliance requirements.
• ISO 27001/02, NIST SP 800-53, and COBIT are some of the most commonly used frameworks for
information security management and governance.
• Specialized frameworks like PCI DSS, HIPAA, and FISMA cater to industry-specific regulatory
requirements.
• Combination of frameworks may be used to address both technical security and broader business
governance needs effectively.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Security Capabilities of Information Systems
Memory Protection
Memory Protection • Purpose: Prevents unauthorized access and corruption of system memory.
Trusted Platform Module (TPM) • Techniques Used:
Encryption/Decryption • Segmentation: Divides memory into different segments, each with specific
access permissions (e.g., read, write, execute).
• Paging: Breaks memory into fixed-size pages, which are mapped to physical
memory frames. This isolates processes, preventing one process from
accessing another’s memory.
• Address Space Layout Randomization (ASLR): Randomizes the memory
addresses used by system and application processes, making it difficult for
attackers to predict target addresses during an attack.
• Use Case: Essential for operating systems to maintain process isolation and system
ti on
stability, protecting against buffer overflow attacks and memory corruption.
i bu
Trusted Platform Module (TPM)
s r
t operations
•
i
Purpose: A hardware-based security module used for secure cryptographic
and storing sensitive information.
fo rD
t
• Capabilities:
o
Key Storage: Stores cryptographic keys securely.
u
l S secure boot, and remote attestation.
• Use Case: Widely
disk encryption,
o
C Converts data into a secure format that cannot be read by unauthorized
Encryption/Decryption
•
ByPurpose:
S P•
parties. Decryption reverses the process, making the data readable again.
CI S Techniques:
for • Symmetric Encryption: Uses a single key for both encryption and decryption
(e.g., AES, DES). Efficient for large data volumes but requires secure key
es management.
ot • Asymmetric Encryption: Uses a pair of keys—a public key for encryption and
ll N
a private key for decryption (e.g., RSA, ECC). Ideal for secure key exchange
o
• Hybrid Encryption: Combines symmetric and asymmetric encryption, using
C •
asymmetric encryption to securely exchange a symmetric key.
Use Case: Protects data in various states (at rest, in transit, in use), ensuring
confidentiality and integrity. Used in SSL/TLS for secure communications, file encryption,
and digital signatures.
• Memory protection techniques like segmentation, paging, and ASLR are critical for safeguarding system
stability and preventing unauthorized access.
• Trusted Platform Module (TPM) provides hardware-based security for cryptographic operations,
enhancing the security of key management, secure boot, and system integrity.
• Encryption and decryption are fundamental security mechanisms used to protect data confidentiality
and integrity, with symmetric and asymmetric techniques serving different use cases.
on
security policy.
• Protected from Modification: The rules and mechanisms should not be
uti
b
alterable by unauthorized users.
• Verifiable: Must be auditable and provable as correct.
tr i
•
without exception.
D is
Always Invoked: The RMC should be in action for every access attempt,
•
t for
Example: Logging into a system involves checking user credentials before granting
No
access to files.
a,
Security Kernel
•
h
Definition: Implementation of the Reference Monitor Concept.
Na
et
• Properties:
e
• Completeness: It is impossible to bypass the kernel for accessing objects.
j
ha
• Isolation: Security rules are tamper-proof and only accessible by authorized
personnel.
•
u b
Verifiability: The kernel’s functioning can be monitored and verified through
l Soperating
logging and testing.
•
C o
Example: An system’s kernel enforcing access control rules on system
SP• Definition:
Trusted
for • Components:
o
• Memory
ll N
• Primary and secondary storage
rn e •
•
Virtual memory
Firmware
C o •
•
Operating systems
System kernel
• Example: All security measures like authentication systems, encryption processes, and
access control policies that protect a corporate IT environment.
• RMC is a concept ensuring all access is mediated, protected, verifiable, and always enforced.
• Security Kernel is the practical implementation of RMC, focusing on completeness, isolation, and
verifiability.
• TCB refers to all security mechanisms within an architecture, covering hardware, software, and
procedural controls.
• These notes provide a structured understanding of the foundational concepts in securing information
systems, highlighting their implementation and practical implications
fo
•
• Allows execution of privileged instructions.
o t
• Problem State:
N
•
h a, andCPUuserinstructions.
Lower privilege level with limited access to
•
a
Standard operating mode for applications processes.
•
e t Nbecause the CPU is focused on solving
Known as “problem state”
je
computational problems.
Example: An operatinga
h
ubwhile user applications run in problem state with restricted access.
• system running in supervisor state can manage hardware
resources directly,
S
C ol
By
I SSP
r C
fo
es
ot
ell N
orn
C
• CPU: Central component for processing instructions; operates through fetch, decode, execute, and store cycles.
• Processor States: CPU operates in supervisor (high privilege) and problem (low privilege) states.
• Process Isolation: Crucial for preventing unauthorized access and data corruption; achieved through memory
segmentation and time-division multiplexing.
• Memory Segmentation: Allocates separate memory segments to different processes.
• Time-Division Multiplexing: CPU allocates time slices to processes, simulating simultaneous execution.
i
seem like multiple processes are running simultaneously.
Example: Multitasking on a single CPU whereD
•
f o r switching between
t
applications appears seamless to the user.
o
Memory Segmentation
, N to specific processes,
•
a
Definition: Separation of memory into segments
hloaded
assigned
a
ensuring that each process can only access its designated segment.
•
e t N segment ofintoanother
Use Case: When multiple applications are RAM, segmentation prevents one
je
application from accessing the memory application.
•
b hamemory.
Example: Running a video game and a music player concurrently without them
u
accessing each other’s
S
l
Time-Division Multiplexing
Definition: Ao
ofC
method where the CPU allocates small time slots to each process, enabling the
UseB
y
illusion concurrent execution.
S P Case: Ensures that processes are executed without interference, enhancing security and
CIS Example: A user can work on a document while listening to music; the CPU switches between
stability.
tes
o
ell N
orn
C
• CPU: Central component for processing instructions; operates through fetch, decode, execute, and store cycles.
• Processor States: CPU operates in supervisor (high privilege) and problem (low privilege) states.
• Process Isolation: Crucial for preventing unauthorized access and data corruption; achieved through memory
segmentation and time-division multiplexing.
• Memory Segmentation: Allocates separate memory segments to different processes.
• Time-Division Multiplexing: CPU allocates time slices to processes, simulating simultaneous execution.
t fo
CPU Registers: Small, fast storage locations within the CPU used for
o
immediate data processing.
,N
• RAM (Random Access Memory): Temporary storage for running processes
and active data.
h a
• Usage:
N a
•
e t
Stores data and instructions currently being used by the CPU.
aje
• Ensures quick access and execution of tasks.
h
ub is lost, all data stored is also lost.
• Disadvantage:
S
• If the power
C ol
By
I SSP
r C
fo
es
ot
ell N
orn
C
on
• SSDs (Solid State Drives): Faster and more reliable non-volatile storage compared
to hard drives.
uti
b
• Usage:
•
tr i
Used for long-term storage of files, applications, and data backups.
• Retains data even when not powered.
D is
for
Volatile vs. Non-Volatile Memory
t
• Volatile Memory (Primary Storage):
No
• Data is temporary and lost when power is cut.
a,
• Example: RAM, where active programs and data are stored temporarily.
•
h
Non-Volatile Memory (Secondary Storage):
Na
• Data remains even when power is cut.
et
• Example: Hard drives, SSDs, and other storage devices for long-term data retention.
je
Paging and Virtual Memory
•
bha
Definition: A technique used to extend primary memory by using a portion of secondary
Su
storage.
l
• Process:
Co
• When RAM is full, the operating system moves less frequently accessed data to a
By •
portion of the hard drive called the paging file or virtual memory.
This process allows for more efficient memory management and prevents system
SP
crashes.
CI S • Usage:
r
• Virtual Memory: Acts as an overflow for RAM, allowing the system to handle more
fo applications simultaneously.
es • Paging File: The area on the hard drive used to store data temporarily moved from
ot
RAM.
ll N
• Disadvantage: Can cause latency and slower performance due to the slower speed of
secondary storage compared to RAM.
rn e • Advantage: Prevents system crashes due to insufficient RAM and allows for multitasking.
C o
• Primary Storage: Fast, volatile memory used for immediate processing; includes RAM, cache, and CPU registers.
• Secondary Storage: Slower, non-volatile memory for long-term data retention; includes hard drives, SSDs, and
optical media.
• Volatile vs. Non-Volatile: Primary storage loses data on power-off (volatile), while secondary storage retains data
(non-volatile).
• Paging and Virtual Memory: Extends RAM using hard drive space to prevent system crashes but can cause latency.
on
• Role: Manages and controls the entire operating system, ensuring
smooth operation and functionality.
u ti
b
• Access: Directs system-level operations like memory management,
file systems, and hardware interactions.
t r i
• Security Kernel:
is
• Role: Implements the Reference Monitor Concept
fo r D (RMC),
that all accesses to objects by subjects are monitored
ensuring
and controlled
based on security rules.
o t unauthorized access
,N
• Purpose: Enforces security rules and prevents
to system resources.
Difference: The system kernelacontrols the OS, while the security
•
a
kernel focuses on securing haccess to objects within the system.
N
Role of Privilege Levels in SystemtKernel
e
je kernel relies on privilege levels to control access
Privilege Levels: Theasystem
•
h
b The system kernel operates in the highest privilege level,
to system resources and ensure safe operations.
u
SupervisorSMode:
•
o l to as supervisor mode, where it has unrestricted access to all
often referred
CMode: In contrast, processes running in user mode have limited access
system instructions and operations.
yto system
• BUser
S P system’s core resources, ensuring that they cannot interfere with or harm the
operations.
I S
C Protection of the System Kernel
for Importance: From a security perspective, protecting the system kernel is
s
•
ell
control over the entire system, leading to serious breaches.
• The system kernel is the core of the operating system, responsible for managing all system resources and processes.
• It operates at the highest privilege level and ensures the smooth functioning of the system.
• The system kernel is distinct from the security kernel, which focuses on implementing security controls and access
monitoring.
• Protecting the system kernel is critical to maintaining the overall security and stability of the operating system.
l S Privileged/Kernel Mode):
of a system.
Ring 0o(Most
•
C
By • Access to Firmware & Critical Processes: This level
SP
controls essential system operations like managing the
system’s memory, processes, and executing machine-
CI S level instructions.
ha
operate here, with the least access to system resources.
b
Su
• Protection Mechanism: Limits direct access to
l hardware, protecting the system from potential threats,
ll N
rings (like Ring 0). This prevents unauthorized access to critical
rn e system processes.
C o
• The ring protection model is a security framework that isolates system processes based
on their level of trust.
• Ring 0 is the most trusted and critical layer, protecting the system’s kernel and firmware,
while Ring 3 has the least access, primarily running user applications.
• Communication between rings is tightly controlled to prevent unauthorized access to
the inner, more secure rings.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Firmware
Definition of Firmware:
• Definition of Firmware
• Role of Firmware in Systems • What is Firmware?: Firmware is a type of software that provides low-
• Vulnerabilities in Firmware level control for a device's hardware.
• Boot Process: It is the code responsible for initializing hardware
components and ensuring they are ready for operation when the system
boots up.
Role of Firmware in Systems:
• Hardware Control: Firmware manages essential tasks, like starting the
on
hardware and communicating between the hardware and software
layers.
ut i
t r
• Examples: Devices such as BIOS in computers or firmware in printersi b
and network routers depend on this code to function. is
Vulnerabilities in Firmware:
fo rD
• Modifiable Nature: Unlike in earlier systems,o
t
, N but also introducing
modern firmware can be
security risks. h a
updated or modified, making it more dynamic
a
e tN
• Attack Surface: Since firmware
target these updates to e
updates can be exploited, hackers may
B yC
ineffective.
I SSP
C
for
tes
o
ell N
orn
C
on
• Communication Layer: Middleware operates as a "glue" between
ti
applications, translating and facilitating interaction between systems
u
with different architectures or protocols.
r i b
t (e.g.,
• is
Use Cases: It is essential in scenarios where legacy systems
o t
, N app might need to interact
Example of Middleware in Banking:
Mobile Banking: A modern mobile h a
banking
with a bank's older mainframe a
•
tN
system. The mobile app and the
je e
mainframe use different communication methods.
•
b ha with the Middleware
Middleware as a Translator: enables the mobile banking
y Co
P B
I SS
C
for
tes
o
ell N
orn
C
ti on
(steering wheel, pedals, etc.) while the complexity of the engine,
electrical system, and other mechanics is hidden from them.
i bu
•
s
Example: A driver doesn’t need to understand the internaltr
i
rD
combustion process to drive; they just need to operate the car’s
controls.
t f o
o
, Nwith binary code (1s and 0s),
Abstraction in Computing:
Programming Languages: CPUs a
•
a hprogramming languages that
work
jee
•
ha developers
Software Development:
Python or Javaballow
High-level programming languages like
ol
formats, which into machine-readable binary.
B yC
I SSP
C
for
tes
o
ell N
orn
C
str
manages and runs virtual machines by acting as an intermediary
i
between the physical hardware and the virtual machines.
D
• Types of Hypervisors:
t for
No
• Type 1 (Bare-metal): Runs directly on the hardware (e.g.,
a,
VMware ESXi, Microsoft Hyper-V).
h
Type 2 (Hosted): Runs on top of a host operating system
Na
•
(e.g., VMware Workstation, Oracle VirtualBox).
je et
Benefits of Virtualization:
C
or
• Isolation: Each VM operates independently, providing isolation
o te
ell N
orn
C
ote
• Independent of OS: TPMs are independent and do not rely on the
operating system or external components.
ell N • Unique Endorsement Key: Every TPM has a unique endorsement key
orn burned into it, which is used for encryption and ensuring TPM
authentication.
C • Black Box Security: The information within the TPM is protected and
cannot be extracted, adding to its security.
• TPM is a hardware-based security chip that performs cryptographic operations and ensures system
integrity.
• Binding ties encryption keys to specific TPM configurations, while sealing only allows data to be
decrypted under specific conditions.
• TPM operates independently of the operating system, enhancing its security and reliability.
s r
t critical
• Example: An admin account without proper monitoring, allowing access to
i
rD
systems.
• Mitigation:
f o
t has full control over critical
•
•
a , and detect any unauthorized
attempts.
a h access to sensitive systems.
Physical Security: Limit physical
tN
•
Time-of-Check Time-of-Use (TOCTOU):
Definition: Also known asjae
e
action is authorized anda
• race condition, it refers to the time gap between when an
h
ub changes the conditions after authorization but before execution.
when it is executed, which can be exploited by attackers.
•
S
Example: An attacker
•
C ol Frequent
Mitigation: access or authorization checks help reduce the risk by narrowing
y
the window for attack.
B
Emanations:
I SSP• Definition: Unseen elements (such as electromagnetic signals) that leak from systems,
potentially exposing sensitive information.
C
for • Example: Intercepting data through leaked signals from a computer.
tes • Mitigation:
ll N
• White Noise: Adding background noise to mask signals.
C o
• Redundancy helps mitigate single points of failure, and bypass controls need to be managed through
segregation, logging, and monitoring.
• TOCTOU or race conditions can be addressed by frequent authorization checks.
• Emanations pose a risk to sensitive data, but can be mitigated through shielding, noise masking, and
control zones.
• A single point of failure can disrupt an entire system if a critical device fails. Implementing redundancy
through multiple firewalls and routers can mitigate this risk, but it should be done only when cost-
justified.
• High availability ensures smooth operations even if a device fails.
ot
provide a way to circumvent primary security mechanisms.
N access to a device
a, reset the device and
• If someone gains unauthorized physical
like a router or firewall, theyhcould
exploit the bypass control
t Nato gain access.
jeebypass controls must be managed
ha unauthorized use.
• Although necessary,
b
carefully to prevent
l Su Bypass Control Risks:
Methods to
C o Mitigate
y
• BSegregation of Duties: Ensure that no single person has
S P complete control over the system to prevent misuse of
CIS
bypass controls.
• TOCTOU represents a short window between checking access or authorization and using a resource,
creating potential security risks.
• Race conditions can be reduced by frequent access checks and re-authentication, but striking a
balance between usability and security is essential.
Di information
information.
•
fo r
Even simple actions like shoulder surfing could expose sensitive
from a screen or device.
t
ocan capture emanations
from wireless signals or electronic devices. N
• More advanced interception techniques exist that
•
u
TEMPESTbhistoa prevent
specification that outlines techniques for shielding
l S
equipment detection of emanations.
B y •
data is being processed to obscure weaker emanations from devices.
CI S computers.
or
3. Control Zones:
o te •
emitting sensitive information.
Most emanations are short-range, so restricting physical access to
ll N
equipment can effectively prevent interception.
C o
• Emanations are invisible signals that can leak sensitive information from systems and devices.
• Protection methods include shielding (e.g., Faraday cages), white noise, and control zones to
prevent interception of emanated data.
on
• By reducing vulnerabilities, the overall system becomes more resilient to
threats.
u ti
Steps in Hardening:
r i b
t that are
1. Remove unnecessary services: Disable services and applications
is
r D and operating
not essential to the system’s operation, reducing the chances of exploitation.
2.
fo
t to address known
Apply patches and updates: Ensure all software, firmware,
vulnerabilities.
N o
systems are up-to-date with the latest security patches
t N intrusion
system.
Configure firewalls and e
4.
a je
host-based firewalls, and
intrusion
enable
detection systems: Set up network and
detection/prevention systems to
PImportance of Hardening:
to detect and respond to potential security incidents.
S
CIS • Reduces vulnerabilities: Hardening ensures that individual system
or
components are less likely to be exploited by cyber attackers.
ell
part of compliance with data protection regulations (e.g., PCI DSS, HIPAA).
orn
C
tf
endpoint, such as an SFTP server that’s not needed.
Hardening Examples:
o
•
a , N surface by ensuring only essential
Disabling unnecessary services: Reduces the attack
services are running.
a h that only required programs are installed.
t N malware and viruses.
• Uninstalling unnecessary software: Ensures
• e
je Helps detect and prevent malicious activities.
Antivirus installation: Protects against
•
h
Host-based IDS/IPS and afirewalls:
u b Protects data at rest.
S
• Full-disk encryption:
•
o l policies: Reduces the likelihood of unauthorized access.
Strong password
•
y C system backups: Ensures data recovery in case of a breach or failure.
Routine
B
P•FactorsLogging and monitoring: Tracks system activities for signs of malicious activity.
S
CIS
Driving Hardening Decisions:
or
• Business requirements: Understanding what a system is intended to do helps drive
s f hardening efforts. For instance, a web server should have limited services and open
ports.
o te • Hardening checklists: These are crucial to ensure configurations are set up correctly.
ell N • Vendors often publish hardening guides. When unavailable, organizations like the
Center for Internet Security (CIS) provide widely-used checklists.
• Vulnerabilities in systems exist across various device types (mobile, desktop, server), and hardening
is a crucial process to reduce risks.
• Hardening steps include disabling unnecessary services, using firewalls, implementing encryption,
and enforcing strong authentication.
• The level of security applied depends on the value or organizational relevance of the system, and
vendors often provide guides to help with the hardening process.
a ,N
h
Policies and Processes for Lost/Stolen Devices:
Organizations can reduce risks bya
tN
• implementing policies such as Acceptable
Use, BYOD/CYOD (Bring Your
Education and Awareness e Own Device/Choose Your Own Device), and
je for lost or stolen devices, including notifying
Training.
•
h a
Establish a clear process
dependent onuthe
IT/security teamsband initiating remote wipe functions (though this is
S device being online).
S P unauthorized
devices to secure remote access to corporate networks. This prevents
access when users connect from untrusted locations (e.g.,
for mobile devices, just like on standard computers, to protect against malware
ll N
attack surface by disabling unnecessary services and securing configurations.
rn e Application Whitelisting:
• Mobile devices present significant security risks due to their portability and data storage capabilities.
• Organizations can mitigate these risks through Mobile Device Management (MDM) and Mobile
Application Management (MAM) solutions, which help secure devices and applications.
• Policies such as BYOD and processes for dealing with lost or stolen devices further reduce risks.
• VPN, 2FA, and application whitelisting are critical for securing remote access and controlling app
installations.
• OWASP Foundation • Ope n Web Applica tion Se curity Project (OWASP) is a commu nity-led organ ization focused on
impr oving software security, par ticularly for web and mobile applications.
• OWASP Mobile Top 10
• They produ ce glob ally recognized lists of vulnerabilities such as the OWASP Top 10 and OWASP
• Common Weakness Mobile Top 10, based on r eal-world data and community in put.
Enumeration (CWE) • The fo undation also r eleases gu idelines for mobile secur ity testin g and secu re app development.
• OWASP Mobile Security
OWASP Mobile Top 10:
Testing Guide (MASTG)
• The OWASP Mobile Top 10 highlights the most critical mobile app security risks and v ulner abilities.
• OWASP Mobile Top 10
Categories • It u ses d ata fro m v endors, consultancies, bug b ounties, and o ther organization s, fo cu sing on
Comm on Weakness Enumeration (CWE).
• Mobile Application Security
• The list is upd ated regularly based on industry feedback and glob al secur ity trends.
on
Verification Standard
(MASVS)
OWASP Mobile Top 10 Categories:
uti
1.
i b
M1 - Improper Credential Usage: Insecure storage o r handling of credentials th at attackers can
exploit.
tr
2.
is
M2 - Inadequate Supply Chain Security: Vulner abilities intr oduced throu gh thir d-party
D
for
compon ents or libraries.
t
3. M3 - Insecure Authentication/Authorization: Po or implementation of authentication or
No
autho rization mechan isms.
4. M4 - Insuf ficient Input/Output Validation: Improper han dlin g of user input, leadin g to
a,
vulnerabilities like injection attacks.
h
Na
5. M5 - Insecure Com munica tion: Lack of secure commun ication proto co ls, expo sing sensitive data
dur ing tran smissio n.
6.
jeet
M6 - Inadequate Privacy Controls: Weak or absent measures to protect users’ perso nal and
sensitive data.
7.
ha
M7 - Insuf ficient Binary Protec tions: Lack of protection s against rever se engineering or tamperin g
b
of the app.
8.
l Su
M8 - Security Misconfiguration: Po orly con figured ap ps that leave them vuln erable to exp loitation.
y
9.
Co
M9 - Insecure Data Storage: Weak data stor age mechanisms that could allow u nauthorized access
to sensitive data.
B
SP
10. M10 - Insuf ficient Cryptography: Weak or misco nfigur ed cr yptographic mechanisms leading to
data leakage.
for • The Mobile Application Sec urity Testing Guide (MASTG) pro vides a compr ehensive manual for
testing the security of mobile applications.
es
ot
• It includes reverse engin eering techn iques an d testing methodologies, makin g it invaluable fo r mobile
secu rity tester s.
ll N
Mobile Application Sec urity Verification Standard (MASVS):
rn e • MASVS is another OWASP pr oject that sets a standard for mob ile application security, guiding b oth
o
development and security testing to en sure mob ile apps are secure from design to deplo yment.
• The OWASP Mobile Top 10 lists critical vulnerabilities in mobile applications, such as
Improper Credential Usage and Insecure Data Storage. Security professionals can
use this list to address key weaknesses in mobile applications. Additionally, the Mobile
Application Security Testing Guide (MASTG) provides a framework for testing mobile
app security, while the Mobile Application Security Verification Standard (MASVS)
helps guide secure app development and testing. These resources are invaluable for
ensuring the security of mobile applications.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Distributed Systems
Distributed Systems:
• Distributed Systems
• These are systems that are networked together, enabling them
• Distributed File Systems to communicate and share resources across a network.
(DFS)Grid Systems
• Risks of Distributed File • The internet is a prime example of a large-scale distributed
system, connecting countless devices globally.
Systems
• Internet as a Distributed • Within a company, distributed systems enable the
System communication between various networked devices, improving
operational efficiency but also introducing risks.
Distributed File Systems (DFS):
• DFS involves files hosted across multiple systems within a
ti on
network, making them accessible as if they are stored in a single
location.
i bu
s r
t across
• DFS software helps organize and manage files spread
D i
hosts, presenting them as unified storage for easier access and
management.
fo r
Grid Systems: o t
N
•
h a,complex
Grid systems are designed to combine computing power from
a
interconnected systems to tackle problems.
•
simulations or datae e t N where multiple
Examples include high-performance computing tasks, like
together to solvea j challenges.
analysis,
specific
systems work
r D people around
data in their search for alien communications.
• SETI at Home was a screensaver program that allowed
fo
t on their home
o
the world to process small chunks of SETI’s data
tes submitted false or incorrect data, which might skew the overall
analysis.
o
ell N • Misuse of Grid Computing Resources Example:
f o rD
Example of Inference:
An attacker may analyze access patterns, sucho
t
,it'sNpublicly
• as how often a certain
database is queried, and infer business-critical information, like a
company’s quarterly performance before
h a released.
Example of Aggregation:
N a
t
In aggregation, an attackeremay combine public data with internal company
data to uncover privateje
•
h
employee information awith
details. For instance, aggregating publicly available
internal HR data may reveal confidential salaries.
Risk Mitigation: ub
S risk of unauthorized inference and aggregation, the following
l the
•
C o
To reduce
B y
measures
•
can be implemented:
Access Controls: Implement strict access controls to limit who can
SP • Data
view or query certain datasets.
tes • Query Controls: Limit the types of queries that can be performed on
o sensitive data and filter results to prevent leakage through
ll N
aggregation.
C o
• Inference is deducing sensitive information from non-sensitive data, while aggregation is combining
individual data points to form sensitive insights.
• In environments like data warehouses and big data analytics, these risks can be mitigated using
access controls, encryption, monitoring, and query filtering, preventing unauthorized exposure of
sensitive information.
o
,N
• Examples of big data tools include Hadoop and MongoDB.
Data Mining & Analytics:
h a
Both data warehouses and big data aima
using data mining and analytics. N
• to extract valuable insights from vast datasets
e t
•
not be evident initially. a
These techniques can uncover
je patterns, trends, and relationships, some of which might
u bh
Inference and Aggregation:
•
points. o
S to deducing sensitive information from unrelated or non-sensitive data
Inferencelrefers
•
B y C involves gathering different pieces of data to form a clearer picture, which
Aggregation
SP• Both
could reveal sensitive information when combined.
CI S inference and aggregation can expose organizations to risks if not handled properly.
For example, in retail, analyzing purchasing patterns could inadvertently reveal private
or
customer information, such as pregnancy.
ll N
classification levels.
rn e • Access controls, encryption, and segregation of duties are necessary to limit data
visibility and manipulation.
C o • Audit trails and monitoring should be used to track data access and detect anomalies
that could lead to unauthorized inference.
• Implement data masking to protect sensitive information during aggregation.
• Data warehouses and big data both consolidate vast amounts of data for analysis but pose
significant security risks related to aggregation and inference.
• Effective risk mitigation strategies include polyinstantiation, strict access controls, and data
masking to prevent unauthorized access and exposure of sensitive information.
• Industrial Control Systems • ICS refers to systems used for controlling and auto mating critical infrastructure like power grids,
nuclear plants, and ma nuf acturing facilities.
(ICS)
• ICS are often bu ilt with spe cialized softwa re and can run o n outdated hard ware and software, making
• Operational Technology (OT) them vulne rable to secu rity threats.
• Air Gapping • Up grading or patching ICS systems can be risky due to high customization and the mission-critical
• SCADA, DCS, PLC na ture of their functio ns.
• Patching ICS Systems • ICS are a subset of Opera tional Technology (OT), which en co mpasses all technologies for monito ring
and contr olling industrial pr ocesses.
• Risk Reduction in ICS
Types of ICS:
on
• A comb ination of computers, networking, and proprietary de vices that monitor and
contro l remote infrastructure.
•
scale processes like energy distribution.
uti
SCADA systems have loca l and remote management capabilities and are used in large-
t
a sp ecific facility.
No
3. PLC (Programma ble Logic Controller):
a,
• A specialized industrial com puter used for controllin g sp ecific manu factur ing pr ocesses.
•
h
PLCs are often networked with o ther PLCs and SCADA systems for effective control of
Na
manufacturing environments.
et
Air Ga pping:
je
ha
• Air gapping is the practice of keeping ICS sy stems of fline and disconnected from the in ternet and
corpo rate netwo rks to prevent extern al access an d cy berattacks.
b
Su
• It is one of the best ways to protect ICS sy stems fro m p otential n etwor k-based threats.
l
Co
Patching ICS System s:
y
• Patching ICS is often avoided d ue to the risk of disruption or ma lf unc tion. However, modern
B
inter co nnected networks increase th e n eed fo r patching.
SP
• Alternatives to patching: Implement logging, m onitoring, anoma ly de tection, and vulne rability
assessments to mitigate risks. Use VLANs and zoning to isolate systems from attacks.
for • Nonstop logging and m onitoring can help detect suspicious activity early.
es
ot
• Segmentation of ICS systems usin g VLANs to prev ent attackers fro m mo ving laterally within the
network.
N
ell
• Vulnerability asse ssm ents focused on external co nnections and weak authenticatio n mech anisms.
rn
• Privileged ac cess m anagem ent tools and r egular reviews can redu ce risks associated with legacy
systems.
C o
• Industrial Control Systems (ICS) are essential for controlling critical infrastructure, but they are vulnerable
due to outdated systems and complex customization.
• The air-gapping strategy, combined with logging, monitoring, and zoning techniques, helps protect these
systems from cyberattacks.
• Understanding different ICS types, such as SCADA, DCS, and PLC, and implementing a strong patch
management process are crucial for reducing risks.
a h
security cameras was exploited. The attacker
of millions of cameras, leading to the attack.
used this vulnerability to create a botnet
•
e t N devices can be weaponized for large-scale
These attacks highlight how insecure IoT
e
cyberattacks.
h
Security Challenges with IoTajDevices:
•
S uorbupgrade
IoT devices are often overlooked in terms of security, with users rarely considering the
l
need to patch them.
•
y Co refresh
The long
connected
cycles of appliances, coupled with the fact that many devices are
to networks (both home and business), make them easy targets for
P• B The lack of security in these devices means that even something as simple as a
attackers.
fo
s
• Avoid using IoT devices if possible, especially if they are not essential.
ote • If IoT devices must be used, ensure careful installation and maintenance.
ell N • Keep IoT technology up to date by applying patches and upgrades whenever available.
orn • Segment the network to isolate IoT devices from critical systems.
C • Regularly scan the network for vulnerabilities and take necessary steps to mitigate
risks.
• Be thoughtful about the placement of security controls and firewalls around the
network that houses IoT devices.
• The Internet of Things (IoT) consists of various devices that are often insecure and vulnerable to attacks.
• The main risks stem from outdated firmware and poor security features, which allow attackers to exploit
these devices.
• DDoS attacks, such as the 2016 security camera botnet, highlight the dangers of insecure IoT systems.
• To reduce risk, users should limit IoT use, keep devices updated, and segment IoT devices from critical
parts of their networks.
• 4
a h
by the general public. Example: Google AWS.
•
e tAnNorganization's
Private Cloud: Cloud infrastructure is operated solely for a single
je services.
organization. Example:
providing privateacloud
internal data center
h Shared by several organizations with common
bCloud:
u
l S Example:
• Community
interests. A cloud infrastructure used by different
C o
government agencies.
• ByHybrid Cloud: A combination of two or more cloud types (public,
S P private, or community). Example: A business using both AWS for
CI S public cloud services and a private cloud for sensitive data.
es
ot
• Protecting data in the cloud requires encryption, access control
mechanisms, and careful monitoring.
• Cloud computing provides on-demand resources with characteristics like scalability and broad
access.
• Service models include IaaS, PaaS, SaaS, CaaS, and FaaS.
• Deployment models vary between public, private, community, and hybrid clouds.
• Data protection and privacy in the cloud require strong encryption, regulatory compliance, and
access control.
on
• Measured Service 2. Broad Network Access:
• Multitenancy
uti
• Cloud services are accessible from a nywhere via va rious devices like
• Private Cloud vs. Public sma rtphones, ta blets, and laptops.
tr i b
• Most Sa aS applica tions a re accessed through web browsers over the
Cloud internet.
D is
for
• Exa mple: Accessing Google Drive from any device with an internet
connection.
t
No
3. Resource Pooling:
• Cloud providers pool resources like processors, disk spa ce, and networks
among multiple users.
h a,
Na
• Users share computing resources, providing significa nt economies of
scale.
jeet
• Exa mple: AW S hosts multiple clients on the same infra structure, though
each client is logically separated.
ha
4. Rapid Elasticity and Scalability:
b
Su
• Resources can be scaled up or down quickly in the cloud, often
l
automa tically or with minimal effort.
Co
• Exa mple: Auto-scaling servers during a traffic surge for an e-commerce
y
site.
B 5. Measured Service:
SP
• Cloud providers track usage closely, and users only pay for the
for • Exa mple: Paying for exa ctly how many CPU hours were used in AWS.
s
6. Multitenancy:
ll N
• Cloud providers must implement strong isolation and security controls.
rn e • Exa mple: A public cloud server hosting da ta for multiple organizations, with
o
each tenant logically separated.
• Cloud computing offers scalable, on-demand resources accessible over the internet.
• Key characteristics include on-demand self-service, broad access, resource pooling, elasticity,
measured services, and multitenancy.
• The distinction between public and private clouds lies in resource access and security —private
clouds are exclusive to one user, while public clouds involve shared resources among multiple
tenants.
on
Responsibilities • Used by developers to build, test, and run applications without needing to manage the
underlying infrastructure.
uti
•
customer needs.
tr i b
Ideal for custom application development when existing software doesn’t meet
a,
• Enables DevOps teams to work more efficiently, with agile and faster testing/deployment
cycles.
h
Na
• Example: Docker/Kubernetes environments for quick application deployment.
et
Function as a Service (FaaS):
e
• Serverless computing where developers focus solely on their code without managing
j
ha
infrastructure.
b
• Based on microservices, FaaS uses self-contained services for specific business
Su
functionalities.
•
l
Resources are only consumed when a function is executed, making FaaS more cost-
Co
efficient.
y
• Example: AWS Lambda allows execution of functions only when called, avoiding idle
B costs.
SP
Cloud Service Provider vs. Cloud Customer Responsibilities:
S
• SaaS: Provider is responsible for almost everything (data, applications, runtime, OS,
CI etc.), while the customer manages access control, user accounts, and permissions.
for • PaaS: Provider manages the platform and infrastructure, while the customer is
responsible for their applications and data.
es • IaaS: Customer has the most control, managing their own networks, operating systems,
ot
and configurations. The provider still handles the physical infrastructure and security of
ll N
the environment.
• Shared Responsibilities: Security is often a shared responsibility between cloud
rn e provider and customer. For example, in SaaS, the provider creates the security kernel,
o
while the customer manages user access.
• Cloud service models include SaaS (providing software access), PaaS (providing a platform for
application development), IaaS (providing virtual infrastructure), CaaS (containerized environments),
and FaaS (serverless, event-driven functions).
• Cloud provider and customer responsibilities vary, with shared responsibilities requiring clear
communication and agreement.
• Ultimately, the cloud customer remains accountable for their data and assets in any cloud
environment.
o t
Community Cloud:
, N
h a
a
• Shared by a group of users or organizations with common needs or
interests.
e tN
• Example: GovCloud jby
a e which is FedRAMP-compliant and used
AWS,
u bh
by US Government agencies.
lS
Hybrid Cloud:
o
y C elements of public, private, or community clouds.
• Combines
B
S P• Often used for storing low-sensitivity data in the public cloud while
CI S keeping high-sensitivity data in the private cloud.
ell N
orn
C
• 4
• Cloud deployment models include public, private, community, and hybrid clouds.
• Public clouds are open to everyone, private clouds are exclusive to one user, community clouds are
shared by organizations with common needs, and hybrid clouds combine aspects of the other
models.
• Organizations must ensure strong encryption and access controls to protect data when transitioning
to the cloud.
e tN
surface by isolating functions on VMs (e.g., web server,
b h
• Security benefits:
S
based on the u sensitivity of the data it processes, making it harder for
o l
attackers to compromise multiple VMs.
B yC
S P
CI S
for
es
ot
ell N
orn
C
o t
specific function, reducing the risk of a wide-scale attack.
ell N
orn
C
• A hypervisor allows multiple operating systems to share resources, creating and managing virtual
machines (VMs). VMs are isolated, emulated environments that enhance security by segregating
business functions.
• Compromising the hypervisor could expose all VMs, making it crucial to secure the hypervisor.
• Cloud compute resources include VMs, containers, and FaaS, each offering different levels of
virtualization and efficiency.
a h
communicate via APIs. This architecture allows for better
tN
modularity and faster updates.
•
je e
Advantages: Microservices allow for quick scaling,
rn
charges for the actual compute time used, leading to significant
C o cost savings.
• Benefits: High availability, scalability, cost savings (no charges for
idle services).
on
Forensic Data by Cloud Model:
• SaaS: Consumer relies entirely on the Cloud Service Provider (CSP) for
ut i
forensic data.
r i b
t evidence
but is responsible for application-level logging and code. is
• PaaS: The consumer must rely on the CSP for infrastructure-related
, N Forensic Science
or disk images.
Challenges):
h a
Cloud Forensics Challenges (NIST Cloud Computing
a
1.
forensic challenges.
e tN
Architecture: Issues like data segregation and multitenancy create unique
S
ol
3. Analysis: Analyzing
4.
y C
Anti-Forensics:
evidence.
Malicious actors may attempt to delete or hide forensic
B
SP
5. Incident First Responders: Responders must understand cloud-specific
CI S forensics processes.
or
6. Role Management: CSPs and clients must clearly define roles and
responsibilities.
s f
o te 7. Legal: Legal frameworks for cloud forensics are still developing.
orn
challenges.
on
• Service Arbitrage • Cloud Partner: An organization that supports either the provider or
the customer (e.g., cloud auditors, cloud service brokers). ti
ufrom
t
• Cloud Broker: An intermediary that aggregates cloud services r i b
s
multiple providers and offers them to customers as a ipackage.
•
fo r Da cloud broker,
Example: A small business contracts with
o t with multiple cloud
which in turn manages relationships
,N
providers.
Service Arbitrage: h a
a
e t Nbetter
• Cloud brokers can negotiate prices with cloud providers by
a je
leveraging volume discounts for multiple customers.
yC
what the earning a margin.
P B
Accountability vs. Responsibility:
ll N
brokers, etc.) and refers to the execution of tasks.
• Cloud computing roles include the cloud consumer, provider, partner, and broker. While
responsibility for various tasks can be delegated to different cloud providers or partners,
accountability for data remains with the cloud consumer.
• The relationship between the data controller (consumer) and data processor (provider) is key, and
roles like brokers provide service aggregation and arbitrage opportunities.
• Accountability vs. responsibility must be clearly understood to ensure proper delegation in cloud
services.
Cloud identities are managed by third-party identity providers, with identity federation
enabling seamless access across multiple organizations and services. Traditional on-
premise IAM solutions like AD and LDAP have been extended by cloud-based IAM (IDaaS)
solutions, which offer centralized management and automation. Identity technologies
such as SPML, SAML, and OAuth facilitate secure identity management and access control
in cloud environments.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Migrating to Cloud
Benefits of Cloud Migration:
• Benefits of Cloud Migration
• Risks of Cloud Migration • Cost Shifting: Cloud migration shifts costs from a Capital
• CapEx vs. OpEx Expenditure (CapEx) model, where an organization owns its
• Vendor Lock-In networking and computing equipment, to an Operational
• Cloud Security Best Practices Expenditure (OpEx) model, where the cloud provider bears the
infrastructure costs, and the organization pays as needed.
• Example: Instead of buying and maintaining servers, an
organization rents cloud resources, paying for what they
use.
• Flexibility and Accessibility: Applications, services, and data
ti on
become accessible from anywhere, using virtually any internet-
i bu
connected device.
s t r
• i
This enables better collaboration between employees,
vendors, and customers.
fo rD
• Centralization and Backup: Cloud migration o t facilitates centralized
, N
data storage and easier backup solutions, which improves data
safety and recovery options.
a ha
•
e t N providers
Reliability and Support: Cloud often offer high-quality
aje
support and reliable infrastructure, allowing organizations to focus
h
on core business activities.
S ub
Risks of Cloud Migration:
• C olLock-In: One of the biggest risks is the possibility of being
Vendor
B y"locked in" to a specific cloud provider, making it difficult to switch
S P to another provider later.
CIS
• Mitigation: Some larger organizations mitigate this by using
or
multiple cloud providers for different segments of their
s f business.
ell N typically lose control over the infrastructure, relying on the cloud
provider to manage it.
orn
C
• Cloud migration offers benefits like cost shifting from CapEx to OpEx, improved flexibility, and better
collaboration.
• However, risks such as vendor lock-in and loss of control over infrastructure need careful
consideration.
• Security remains a key focus, and organizations must collaborate with cloud providers to ensure
robust protection of their data and assets.
on
• Increased Bandwidth Availability: By offloading some
ti
data processing to the edge, less bandwidth is used for
u
sending data to central locations.
tr i b
•
D is
Cost Savings: Reduces IT and cloud service costs by
minimizing the amount of data sent to the cloud for
processing, storage, and transport.
t for
No
Key Concepts:
• Ingress Traffic:
•
h a,
Traffic entering a network.
•
Na
In edge computing, ingress traffic is generated by users
jeet
accessing services hosted at the edge.
ha
• Example: A user accessing a local application on an edge
server creates ingress traffic.
b
•
l Su
Egress Traffic:
Co
• Traffic exiting a network.
ot
traffic.
ll N
• Peering agreements between ISPs allow them to exchange
rn e •
data directly, bypassing the internet.
Example: Two ISPs exchanging traffic without routing it
C o through the public internet for faster data transfer.
• Edge computing processes data closer to its source, leading to reduced latency, faster response
times, and more efficient bandwidth use.
• Key concepts such as ingress, egress, and peering play important roles in the flow of data within and
between networks.
• By minimizing reliance on centralized cloud services, edge computing helps reduce costs and
improve performance.
B y
applications SASE helps secure these environments.
for • Remote Work: The rise of remote work has created a need for more
ell N
orn
C
• SASE integrates network security and wide area networking into a cloud-based solution that provides
fast, secure access to data and services.
• It is driven by trends like cloud migration, edge computing, and the growth of remote work, offering
an efficient and secure way to handle modern networking challenges.
No
the victim’s browser when they click the link (commonly
a,
used in phishing attacks).
h
Example: An attacker sends a malicious link to a user, and
Na
•
when clicked, the code is reflected and executed in the
je et
user’s browser.
3. DOM-based XSS:
b ha
• u code is injected into the Document Object Model
SMalicious
l
C•o Can be either stored or reflected, but it is much rarer.
(DOM) of the browser.
B y
I SSP
r C
fo
es
ot
ell N
orn
C
• 4
• XSS attacks target the user’s browser by injecting malicious scripts, while CSRF attacks exploit the
trust between the web server and the user’s browser to execute unauthorized actions.
• Preventing XSS requires server-side input validation, while CSRF attacks can be mitigated with anti-
CSRF tokens and short-lived session cookies.
je et SQL code.
ha submits SQL code in an input field (e.g., login
2. Attacker injects malicious
• The battacker
u that the web server passes directly to the database
Sfield)
o l without validation.
3.By
C
Malicious code is executed.
I SSP • The database executes the SQL code, which can result in
unauthorized access, data theft, or manipulation.
r C
fo
es
ot
ell N
orn
C
l Su
('rob', 'Pass123'); adds a new user with the specified
Co
credentials.
rn
Adds a new user with the username "rob" and password "Pass123."
• SQL Injection is a common attack where malicious SQL code is injected into input fields, allowing
attackers to manipulate a database.
• Preventing SQL injection involves input validation, using prepared statements, and employing stored
procedures.
• Recognizing SQL commands and understanding how they work helps in securing databases from
such attacks.
str
that meets specific criteria (e.g., length, characters, data type).
•
•
D i
Example: Only allowing numeric values in a "Phone Number" field.
Blacklist Validation (Deny List): Blocks specific malicious characters or
for
inputs considered signs of an attack (e.g., = or -- in a "First Name" field).
•
t
Example: Discarding any input with characters like = or - in fields
where they are not expected.
No
a,
Client-Side Input Validation Risks:
•
h
Client-Side Validation: Validating data on the client side (e.g., using
Na
JavaScript) can be bypassed by attackers, making it less secure.
•
jeet
Risk: Client-side validation can be easily disabled or manipulated, allowing
malicious input to reach the server.
ha
Lack of Input Validation Risks:
b
Su
• Without input validation, numerous attacks like XSS and SQL injection can
l
succeed, compromising the application and its underlying systems.
Co
• Impact: The lack of validation increases the attack surface, allowing attackers
I SSP • Goal: Hardening reduces the potential attack surface and minimizes security
risks.
ot
authentication mechanisms, and applying patches regularly.
ll N
• Documentation: Organizations should document their hardening processes
rn e and update them regularly for both new and existing systems to ensure
compliance and security.
C o
• Input validation, particularly server-side, is crucial for securing web applications and preventing
vulnerabilities such as XSS and SQL injection.
• Whitelist validation allows only acceptable input, while blacklist validation blocks malicious
characters.
• Client-side validation should not be relied upon due to its susceptibility to bypass.
• Hardening systems further reduces the attack surface by applying best practices and security
configurations.
r Di through
• Mechanical Era: Cryptography became more efficient
mechanical devices like the Spartan Scytale,fwhich
t o involved
wrapping a message around a rod.
N o
a, as the Enigma machine were
hsecure
• Electromechanical Era: Devices such
developed during World War IIa
t N for communication.
j
• Electronic Era: Moderne ecryptography uses software-based systems
b ha
(cryptosystems) with algorithms like DES, AES, and RSA.
l Sucryptographic
• Quantum Era: Though still experimental, quantum cryptography may
B y
algorithms keys.
S P
CI S
for
es
ot
ell N
orn
C
with. ti on
2. Integrity: Verifies that information has not been altered or tampered
i bu
tr
3. Authenticity: Confirms the identity of the sender, ensuring
s
the
message came from a legitimate source.
D i
4. Nonrepudiation: Prevents denial of actions: for
o t cannot deny sending
,N
• Nonrepudiation of Origin: The sender
the message.
a
h The receiver cannot deny
• a
Nonrepudiation of Delivery:
tN
receiving the message.
e
e who can access encrypted data by
ajthe
5. Access Control: Controls
b h
managing who holds decryption keys.
u
ol Sof Cryptography:
Everyday Uses
• Cryptography, meaning "secret writing," has evolved from simple manual techniques to complex
electronic and quantum-based systems.
• Key management is critical to maintaining security.
• Cryptography provides five services: confidentiality, integrity, authenticity, nonrepudiation, and
access control.
• It is widely used in everyday activities such as online transactions, digital rights management, and
secure communications.
ol
decrypted.
• KeyC
y Clustering: When two different keys produce the same
Bciphertext for the same plaintext. This reduces security as it
for attacks.
tes
o
ell N
orn
C
• 4
a,
approximately half of the ciphertext.
h
Example: A minor change in the key should drastically
Na
•
change the ciphertext to avoid predictability.
jeet
• Diffusion: Hides the relationship between the plaintext and
ha
ciphertext. Changing one bit of the plaintext should alter half of the
b
Su
ciphertext.
l
Co
• Example: A small change in plaintext should result in
ote
• Ideal Case: A secure cryptographic algorithm should
ll N
display strong avalanche effects to ensure robustness.
rn e
C o
• Cryptographic systems transform plaintext into ciphertext using keys and algorithms.
• Key cryptographic properties include confusion (hiding key-ciphertext relationships), diffusion (hiding
plaintext-ciphertext relationships), and the avalanche effect (ensuring significant changes in
ciphertext from small changes in input).
• The effectiveness of a cryptosystem is also determined by factors like key management, IV usage,
and the work factor needed to break the system.
ti on
• Key Strength: The strength of encryption is directly related to the
length of the key.
i bu
•
str
Example: A 56-bit key (as used in DES) offers 2^56 unique
D i
keys (72 quadrillion keys), but modern computers can
for
brute-force this key length in a matter of hours or days.
t
N o
Examples of Key Space in Cryptographic Algorithms:
h
• Data Encryption Standard (DES): Usesa, a 56-bit key, which equates
N a keys). Despite the large number of
to 2^56 unique keys (72 quadrillion
tes
o • Work Factor: The amount of time and computational effort required
ll N
to break a key using brute-force methods.
• Key space refers to the number of unique keys possible based on the length of the cryptographic key.
• Larger key spaces result in stronger encryption, as they are more resistant to brute-force attacks.
• Modern encryption standards like AES and RSA use longer keys (128-bit, 256-bit, and 2048-bit) to
increase security by significantly increasing the work factor needed to break the encryption.
e t
• Rail Fence Cipher: Characters
je
haWriting "HELLO WORLD" across two rows in a
multiple rows and then read row by row to create ciphertext.
b
Su pattern.
• Example:
l zigzag
y Co
• Columnar/Diagonal Transposition: Characters are rearranged into
B
columns or diagonals, providing different transpositions based on the
P key.
S
CIS Synchronous vs. Asynchronous Encryption (Table 3-36):
for
tes • Synchronous Encryption: Bits are encrypted/decrypted in real-time
o using a timing mechanism (e.g., clock).
on
• Polyalphabetic Ciphers and make frequency analysis more difficult.
• Running Key Ciphers • Example: The key 4312 transforms GUBBINS into
uti
• One-Time Pads
r i b
CRAZEKR, where B is encrypted as A and Z due to different
t
key shifts.
D is
Running Key Ciphers:
t for
N
• Running Key Cipher: The message is encryptedo using text from a
a,
book known to both the sender and receiver.
Example: Using a bookh
•
a numeric values of the message
Nthe
as the key, a message can be
t
encrypted by adding
e
je
letters to the corresponding letters from the book text.
a key ciphers create a large key space,
• Benefit:
b htheRunning
u cipher more secure as long as the key is not
making
S
l reused.
oPads:
y C
One-Time
B
P• One-Time Pad: A cipher in which the key is never reused and is the
S
CIS unique key.
same length as the message. Each message is encrypted with a
for
tes • Example: After every message is encrypted, the key is
changed and discarded, making one-time pads the only
o
ll N
unbreakable cipher when used correctly.
rn e
C o
• Encryption methods use substitution and transposition to obscure plaintext, but simple ciphers can
be vulnerable due to patterns.
• More advanced techniques like polyalphabetic ciphers, running key ciphers, and one-time pads
eliminate patterns and provide stronger encryption.
• Synchronous and asynchronous encryption manage how bits are processed, while frequency
analysis helps break weak ciphers.
• One-time pads, when implemented properly, are the only unbreakable cipher.
ti
• Advantages: Stream ciphers are faster because they operate on a bit- on
by-bit basis, making them ideal for network encryption.
i bu
str
• Common Example: RC4 is the most widely used stream
i cipher.
Block Ciphers:
f o rD
o t blocks (e.g., 128-
Nis transformed into
• Definition: Block ciphers encrypt data in fixed-size
,
a
bit blocks in AES). Each block of plaintext
h
ciphertext.
a
• Example: GUBBINS
e tN encrypted with a block cipher
aje
becomes JXEELQV.
• Comparison withhStream Ciphers:
S ub Ciphers: Faster, suitable for real-time encryption
ollike networks.
• Stream
C
y • Block Ciphers: More secure due to high diffusion but
P B slightly slower since they operate on larger chunks of data.
S
CIS
for
tes
o
ell N
orn
C
u b
l S and Null Ciphers (Table 3-39):
Steganography
o
y C• Definition: Hiding information within another file (e.g.,
• Steganography:
B
I SSP hiding a message inside an image or sound file).
C
or
• Example: Slack space on a hard drive could be used to hide
s f a message.
o te • Null Cipher:
rn
message could be concealed by embedding it in a large text
• Stream ciphers encrypt data one bit at a time and are faster for network applications, while block
ciphers operate on chunks of data and provide higher security.
• Symmetric block cipher modes like ECB, CBC, and CTR balance speed and security for different
applications.
• Steganography and null ciphers involve hiding messages in non-cryptographic formats like images or
text, adding an extra layer of concealment.
on
• Key Length and Security • Key Distribution: Securely sharing the symmetric key between
t
parties can be difficult, especially over long distances. Out-of-band
u i
i
methods (e.g., phone calls, in-person meetings) can be used to
tr b
exchange keys, but this can be impractical.
is
o rD
• Scalability: The number of keys required grows exponentially
f
as the
number of participants increases.
o tkeys, where n is the
,N
• Formula: n * (n - 1) / 2 = number of
number of participants.
a
h 499,500 keys would be
a
required, makingtitN
• Example: For 1000 people,
e difficult to manage.
je of Symmetric Cryptography (Table 3-
h a
Advantages and Disadvantages
40):
S ub
ol
• Advantages:
C
B y • Fast and efficient for large data volumes.
S P • Provides strong encryption.
CIS • Disadvantages:
for • Key distribution is challenging.
C o
•
S ub (AES): The most widely used symmetric algorithm,
Rijndael
ell N
orn
C
• Symmetric cryptography is fast and efficient, making it ideal for large-scale encryption.
However, it faces challenges with key distribution and scalability.
• The strength of symmetric algorithms increases with key length, with DES being one of
the weakest and AES being among the strongest.
• Symmetric cryptography does not provide integrity, authenticity, or nonrepudiation, but
it offers strong confidentiality.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
DES/3-DES
Overview of DES, 2-DES, and 3-DES:
• Overview of DES, 2-DES, and
3-DES • DES (Data Encryption Standard): Uses a 56-bit key, 16 rounds of
• Key Structure and Encryption substitution and transposition, and a 64-bit block size.
Process • DES was widely regarded as one of the best cryptographic
• Meet-in-the-Middle Attack algorithms due to its multiple rounds of confusion and
• Effective Key Length of 3-DES diffusion.
• Transition from DES to AES
• 2-DES (Double DES): Extends DES by using two 56-bit keys,
theoretically offering 112-bit security, but vulnerable to meet-in-the-
middle attacks.
• 3-DES (Triple DES): Uses three iterations of the DES algorithm, ti on
i bu
providing stronger encryption by using either two or three 56-bit keys.
str
• 3-DES Characteristics:
D i
for
• 56-bit key length.
t
No
• 16 rounds of substitution and transposition.
a,
• 64-bit block size.
h
• Effective key length of 112 bits due to meet-in-the-
middle attack.
Na
je et
Key Structure and Encryption Process:
b ha
Su is processed through 16 rounds of substitution
• DES Encryption Process:
• l Plaintext
y Co and transposition.
P B • Example: Plaintext (e.g., "CISSP") is encrypted to ciphertext
S through this process.
ote
decrypting with key2, and encrypting with key3.
ll N
• If two keys are used, the same key is applied twice.
rn e
C o
je et
Transition from DES to AES:
b
• Current Standard:haNIST no longer recommends 3-DES for secure
S u to the reduced effective key length.
encryption due
l
y C• o AES-256 (Advanced Encryption Standard) has replaced
DES and 3-DES as the preferred symmetric encryption
P B standard.
s fo
ote
ell N
orn
C
• DES, 2-DES, and 3-DES were significant advancements in cryptography, but they are
now considered outdated due to vulnerabilities like the meet-in-the-middle attack,
which reduces the effective key length of 2-DES to 56 bits and 3-DES to 112 bits.
• While 3-DES extended the life of DES, it has been replaced by AES-256, which provides
much stronger encryption and is now the NIST standard.
u b
• Number ofSRounds:
making it highly secure.
l
y C••o 10 rounds for 128-bit keys.
ot
variable key sizes.
ell N • AES: The US government adopted only the 128-bit block size for AES,
though it supports key lengths of 128, 192, and 256 bits.
orn The limitation to the 128-bit block size in AES was primarily to simplify
C
•
standardization and implementation for broad use in government and
commercial sectors.
• AES, based on the Rijndael algorithm, is the current US encryption standard and supports key sizes
of 128, 192, and 256 bits with a block size fixed at 128 bits.
• Although Rijndael can support larger block sizes, AES focuses on the 128-bit block size for simplicity
and widespread application.
• AES is highly secure due to its multiple rounds of encryption and variable key lengths.
on
Salsa20/8.
•
u ti
ChaCha12: Uses 12 rounds of encryption, offering a balance between
security and performance.
tr i b
s
• ChaCha20: The most secure version, with 20 rounds of iencryption.
• On many systems, ChaCha20 can o
f r D AES,
outperform
o t
making it a popular choice for high-performance
cryptography.
a ,N
ChaCha vs. AES Performance:
ah
e t NAES, especially on systems that lack
• ChaCha20 is often faster than
jefor AES.
ha
hardware acceleration
• Thisbperformance advantage has led organizations like
u
Sservices, particularly in secure
Cloudflare and Google to adopt ChaCha20 in their
o l communications.
y C
P B
ChaCha20-Poly1305 AEAD:
r C Associated Data):
• The ChaCha family of stream ciphers, including ChaCha8, ChaCha12, and ChaCha20, are advanced
cryptographic algorithms developed from the Salsa family.
• ChaCha20, in particular, offers both strong security and performance advantages over AES in certain
systems.
• The ChaCha20-Poly1305 AEAD cipher suite is now supported in TLS, providing authenticated
encryption with data integrity and authenticity.
on
• If the same communication channel is used to send both
t
the message and the key, an attacker could intercept the
u i
key and decrypt the message.
tr i b
Reasons for Out-of-Band Distribution:
D is
for
• Out-of-band key distribution is necessary because sending the key
t
No
along with the message makes it vulnerable to interception.
•
h a,
To maintain the confidentiality of the encrypted message,
the key must be delivered using a different, more secure
method.
Na
jeet
Methods of Out-of-Band Key Distribution:
y Co physically.
B • Phone calls where the key is verbally shared.
• Out-of-band key distribution is crucial in symmetric cryptography to prevent the key from being
intercepted along with the encrypted message.
• Different secure methods, such as in-person meetings, phone calls, or sending letters, can be used
to share the key in a way that ensures the confidentiality of the communication.
No
organizations.
a,
• Authenticity and nonrepudiation: Provides nonrepudiation
h
of origin (the sender cannot deny sending the message) and
Na
nonrepudiation of delivery (the receiver cannot deny
jeet
receiving the message).
Key Pairs: Public and Private Keys:
•
bha
Public key: Can be freely shared and used to encrypt messages.
•
l Su
Private key: Must be kept secret and is used to decrypt the message.
Co
• A message encrypted with the public key can only be
decrypted by the corresponding private key.
By Mathematical Foundations: Factoring and Discrete Logarithms:
SP
• Factoring problem: The basis of RSA, where the security relies on the
ell N • RSA: One of the most widely used asymmetric algorithms, based on
rn
the factoring problem.
on
• Hybrid Cryptography
(Symmetric + Asymmetric)
Digital Signatures and Authenticity:
u ti
(proof of origin).
tr i b
• Asymmetric cryptography enables digital signatures for authenticity
is
D was sent
fo r
• A sender can encrypt a message using their private key.
public key can decrypt the message, proving the message
Anyone with the
by the
owner of the private key (authenticity).
o t
• Confidentiality is achieved when a senderN
a, private key can decrypt
encrypts the message using
h
the recipient’s public key. Only the recipient’s
Na
the message.
Speed vs. Security: e t
je
bhain key
• Slower than symmetric cryptography because of the mathematical
S u
complexity involved pair generation.
• Requires llarger key sizes (e.g., RSA) to remain secure against
y Co needinstronger
advancements computing power. As processors get faster, asymmetric
B
algorithms keys, which further slows them down.
I SSPHybrid Cryptography:
C • Hybrid mode (e.g., SSL/TLS) combines symmetric cryptography for
for speed and asymmetric cryptography for secure key exchange.
• Asymmetric cryptography solves the key distribution problem inherent in symmetric cryptography by
using mathematically linked public and private key pairs.
• It enables important services such as digital signatures, authenticity, and nonrepudiation. However,
it is significantly slower and requires larger key sizes compared to symmetric cryptography.
• To balance the advantages and disadvantages, hybrid cryptography is often employed, combining
the strengths of both approaches.
ti on
cryptographic method due to the difficulty of factoring large numbers.
Discrete Logarithms (ECC, Diffie–Hellman):
i bu
s r
t of
• Discrete logarithms use a prime number raised to the power
i
another prime number to generate a result.
• As with factoring, quick forward calculationtisfo
rD
easy, but working
backward from the result to determine theo
extremely difficult. , N original prime numbers is
h aand
• Elliptic Curve Cryptography (ECC)
N a Diffie–Hellman use this type
e t
of math problem to ensure cryptographic security.
Prime Numbers:
h aje
• Prime numbers
S ubare crucial because they can only be divided by 1 or
• B
C
problem
y prime numbers increase security and make it computationally
Larger
S P infeasible to determine the original values used in key generation.
CIS Knapsack Problem (Deprecated):
for • The Knapsack problem was previously used in cryptographic
tes algorithms, but it has been deprecated due to vulnerabilities.
o
ll N
• Attacks have been developed that can solve the Knapsack problem,
• Two primary hard math problems—factoring and discrete logarithms—are used in asymmetric
cryptography for key generation.
• Both methods rely on the computational difficulty of reversing the process once a result is known,
especially when using large prime numbers.
• While factoring is used in RSA, discrete logarithms power algorithms like ECC and Diffie–Hellman.
• The Knapsack problem has been deprecated due to identified vulnerabilities that make its use in
cryptography insecure.
ll N
• Diffie-Hellman does not provide encryption or digital signatures
C o
• RSA and ECC are two of the most popular asymmetric algorithms. RSA relies on factoring large
prime numbers for key generation, while ECC uses discrete logarithms, offering an advantage in key
length efficiency.
• ECC is particularly useful in resource-constrained environments because it provides faster, more
efficient security.
• The Diffie-Hellman algorithm also uses discrete logarithms and is widely used for symmetric key
exchange.
y CChallenges:
Current
B
I SSP• Although promising, QKD is still experimental and faces several
practical challenges.
C
for • These challenges need to be addressed before QKD can be widely
tes adopted.
o
ll N
• Meanwhile, NIST is working on developing quantum-resistant public-
rn e key algorithms.
C o
• Quantum Key Distribution (QKD) offers a solution to the key distribution problem by leveraging the
unique properties of quantum systems.
• If someone tries to intercept the key exchange, it will be immediately detected. However, QKD is still
in the experimental phase and has challenges to overcome.
• As quantum computing advances, current public-key algorithms may be vulnerable, so NIST is
working on post-quantum cryptographic solutions.
ot
Diffie–Hellman Key Exchange:
, N
h a
a
• Also uses discrete logarithm mathematics for key generation.
o l
channel without a prior shared key.
B yC
I SSP
C
for
tes
o
ell N
orn
C
• RSA, ECC, and Diffie–Hellman are three commonly used asymmetric cryptography algorithms.
• RSA relies on factoring for key generation but is slower due to the need for large keys.
• ECC is more efficient, using discrete logarithms to generate keys, offering the same security as RSA
with shorter keys.
• Diffie–Hellman is used mainly for the secure exchange of symmetric keys using discrete logarithms
as well.
• Hybrid cryptography offers the best of both worlds by using asymmetric cryptography (like Diffie–
Hellman) to securely exchange symmetric keys, and then leveraging symmetric encryption for fast
and efficient data encryption.
• This approach ensures both security and performance in communication systems.
ll N
over the network, so it's safe from interception.
• The Diffie–Hellman Key Exchange Protocol securely generates a symmetric session key used in
each VPN session.
• By performing mathematical operations on random numbers and never transmitting the actual
key, it ensures secure communication without the need to send sensitive keys over the network.
• This is why Diffie-Hellman is widely used for key management in encrypted communications like
VPNs.
on
integrity and support digital and bulk encryption.
signatures • Asymmetric cryptography is used to securely exchange the
uti
symmetric keys.
tr i b
• This combination ensures both efficiency (fast
D is
for
encryption/decryption) and security (safe key exchange).
Example of Hybrid Cryptography:
t
•
No
Alice wants to send a large message to Bob.
•
h a,
Alice uses a symmetric algorithm (e.g., 3-DES) to encrypt
Na
the message due to its speed for processing large data.
•
jeet
Alice knows that Bob will need the same symmetric key to
decrypt the message.
•
bha
Alice securely sends the symmetric key by encrypting it
Co
• Bob uses his private key to decrypt the symmetric key.
By • Bob now has the symmetric session key and can quickly
SP
decrypt Alice's large message.
• Hybrid cryptography combines the speed of symmetric cryptography with the secure key
exchange of asymmetric cryptography.
• Symmetric encryption is used for encrypting large data, while asymmetric encryption handles key
distribution.
• This approach optimizes security and efficiency, making hybrid cryptography a common choice for
modern encryption solutions.
on
• Hashing: Used for message
How MICs Work:
integrity checks with fixed-
ti
u(or
length digests • Before a message is sent, the sender creates a representation
tr i b
digest) of the message using a MIC algorithm.
is
• Both the message and the representation are sent
fo rDto the recipient.
o t to recompute the
• The recipient uses the same integrity algorithm
,N
representation from the received message.
a
a
• If the recomputed representation hmatches the one sent by the
et N confirmed.
sender, the message integrity is
Types of MICs:
h aje
u b Check (CRC) and Checksums: Use simple
S
• Cyclical Redundancy
l operations to create a representation.
o
mathematical
C Algorithms: Use complex mathematics to create a fixed-
B y
• Hashing
CIS
Examples of hashing algorithms include SHA-256 and MD5.
for Collisions:
tes • A collision occurs when two different messages result in the same
o
ll N
representation or digest.
C o susceptible to collisions.
• Hashing algorithms are much more resistant to collisions because
they use more complex calculations, making them more reliable for
message integrity checks.
on
• Hashing: Used for message
• Message integrity is one of the five core services that cryptography
integrity checks with fixed- provides, along with:
uti
length digests
• Confidentiality
tr i b
• Integrity
D is
• Authenticity (proof of origin)
t for
• Nonrepudiation
No
• Access control
h a,
Na
jeet
bha
l Su
y Co
B
I SSP
r C
fo
es
ot
ell N
orn
C
• Message Integrity Checks (MICs) are critical in ensuring that messages remain
unchanged from creation to reading.
• While basic integrity checks (e.g., CRC or checksums) can lead to collisions, more
robust methods like hashing algorithms (e.g., SHA-256) provide stronger integrity
verification.
• MICs are one of the key services provided by cryptography, ensuring that data remains
intact and unaltered during transmission.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Hashing Algorithms and Key Properties
Hashing Fundamentals:
• Hashing: Converts data into a • Hashing algorithms generate a fixed-length message digest or hash
fixed-length digest value regardless of the size of the input data.
• Collision: When two different • This is critical for verifying message integrity and preventing
inputs produce the same tampering in communication.
hash value
Key Properties of Hashing:
• Key Properties of Hashing:
1. Fixed-Length Digest:
Fixed length, one-way,
deterministic, collision- • No matter the size of the input (e.g., a short message or
resistant large file), the resulting digest is always the same length.
• For example:
on
• Popular Hashing
Algorithms: MD5, SHA-1, • MD5 produces a 128-bit digest
uti
SHA-2, SHA-3 • SHA-1 produces a 160-bit digest
tr i b
• Birthday Attack: Theoretical
probability of finding 256, 384, 512 bits). D is
• SHA-2 and SHA-3 offer variable digest lengths (224,
a,
hashed, it’s impossible to reverse the process to discover
h
the original input from the hash.
3. Deterministic:
Na
•
jeet
Hashing the same input with the same algorithm will
ha
always produce the same output.
b
4. Calculated on Entire Message:
•
l SuThe hash must be calculated over the entire input,
B 5. Uniform Distribution:
SP
• A good hashing algorithm distributes input values evenly
ll N
generate the same hash value.
a,
• The birthday paradox is used to explain how collisions can occur.
h
• The probability of two people in a room sharing the same birthday
Na
rises exponentially with each new person added.
•
jeet
With 23 people, there’s a 50% chance of a shared birthday.
•
bha
With 60 people, there’s a 99% chance.
Su
• Similarly, in hashing, as more inputs are processed, the chances of
l
finding a collision increase exponentially, leading to a birthday
y Co
attack.
B
I SSP
r C
fo
es
ot
ell N
orn
C
• Hashing algorithms are crucial for ensuring message integrity, offering a fixed-length digest for any
size input.
• Collision resistance is essential, as collisions can compromise the reliability of the hash function.
• Modern algorithms like SHA-2 and SHA-3 are highly secure, while older ones like MD5 and SHA-1
have been deprecated due to vulnerabilities.
• The birthday paradox demonstrates the potential for collisions, highlighting the importance of
strong, collision-resistant hashing algorithms in cryptography.
No
key, and the receiver can decrypt it with the sender’s
public key, proving the sender’s identity.
3. Nonrepudiation:
h a,
•
Na
Since only the sender has access to the private key, they
jeet
cannot deny creating the signature, ensuring proof of
origin.
bha
Digital Signature Creation:
Su
1. Hashing the message:
l
Co
• A fixed-length message digest is generated from the
By message.
2. Encrypting the hash:
Digital signatures are essential for verifying integrity, authenticity, and nonrepudiation in
digital communication. By combining hashing and asymmetric encryption, digital
signatures ensure that messages or documents have not been altered, that the sender's
identity can be confirmed, and that the sender cannot deny having sent the message.
Applications include document signing and code signing, making digital signatures
widely used in modern cybersecurity practices.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Digital Signatures
Using Digital Signatures:
• Digital Signature Services: 1. Sender:
Integrity, authenticity,
• Creates a hash of the message and encrypts it with their
nonrepudiation private key, generating the digital signature.
• Hashing for Integrity
• The signature is attached to the message and sent.
• Digital Signature Creation
and Use 2. Receiver:
• Public Key and Private Key • Decrypts the signature using the sender’s public key,
Usage confirming authenticity.
• Uses of Digital Signatures: • The receiver then hashes the message and compares it to
the decrypted hash to confirm integrity.
on
Document signing, code
signing, software verification Important Notes:
uti
• Nonrepudiation • Digital signatures do not provide confidentiality. The message
tr i b
remains readable unless it is separately encrypted.
D is
• Public key ensures anyone can verify authenticity, while the private
for
key ensures only the sender can create the signature.
t
No
Uses of Digital Signatures:
a,
1. Document Signing:
•
h
Digital signatures are often used for signing important
Na
documents. They provide greater security than handwritten
jeet
signatures, which can be forged.
ha
2. Code Signing:
• b
Software developers and companies like Apple use digital
l Su
signatures to ensure the authenticity and integrity of
Co
software updates.
r C
fo
es
ot
ell N
orn
C
Digital signatures are essential for verifying integrity, authenticity, and nonrepudiation in
digital communication. By combining hashing and asymmetric encryption, digital
signatures ensure that messages or documents have not been altered, that the sender's
identity can be confirmed, and that the sender cannot deny having sent the message.
Applications include document signing and code signing, making digital signatures
widely used in modern cybersecurity practices.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Digital Certificates
Digital Certificate Fundamentals:
• Digital Certificate Basics:
• Digital certificates bind individuals to their public keys and are
Public key binding, issued by
issued by Certificate Authorities (CAs).
Cas
• X.509 Standard: Certificate • CAs confirm the individual’s identity, ensuring the authenticity of the
format used by all Cas public key.
• Root of Trust: Root CA and • A CA signs the digital certificate with its private key, allowing anyone
Intermediate CA roles with the CA’s public key to verify the certificate’s authenticity.
• Certificate Replacement
X.509 Standard:
and Revocation
on
• CRL vs OCSP: Methods of • All digital certificates follow the X.509 standard, ensuring
checking revocation status interoperability.
u t i
• Certificate Life Cycle:
r i
• Certificates include information such as version, serial number,
t keyb
Enrollment, Issuance,
is
encryption algorithm, issuing CA, validity period, and public
rD
Validation, Revocation, value.
Renewal
Root of Trust:
t fo
• Certificate Pinning: Securing
N
• Root CA: The foundation of the certificate ohierarchy. It is offline for
security, and Intermediate CAs sign, certificates on its behalf.
certificates for subsequent
visits
a ha key is critical for the security of
tN
• The integrity of the Root CA’s private
the entire system.
e
aje and Revocation:
Certificate Replacement
h
• Replacement:bHappens when the public/private key pair is
Suto expiration or key rotation.
replacedl due
C o Necessary if the private key is compromised. The CA
y
• Revocation:
Brevokes the certificate, and it can no longer be trusted.
I SSPChecking Revocation Status:
r C 1. Certificate Revocation List (CRL):
fo
s 1. An outdated method where a client downloads a list of all
ote
revoked certificates from the CA and searches for the
ll N
certificate in question.
• Digital certificates are essential for binding public keys to individuals and ensuring secure,
authenticated communication over the internet.
• They are managed by Certificate Authorities (CAs) and follow the X.509 standard for consistency.
• Key management practices like replacement, revocation, and pinning enhance the security and
reliability of certificates.
• Checking revocation status can be done via CRL or the more efficient OCSP.
• The lifecycle of a certificate includes phases like enrollment, issuance, validation, and renewal,
making them vital in maintaining secure communications online.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Key Management
Kerckhoffs' Principle:
• Kerckhoffs' Principle: •Kerckhoffs' Principle states that a cryptosystem should remain secure even if all
Security is in the key, not the system details (algorithm, IV, etc.) are known, except for the key.
system Key Management Activities:
• Key Management Activities:
•Activities like key generation, distribution, storage, rotation, destruction, and
Generation, distribution,
recovery are critical to maintaining the security of cryptographic systems.
storage, rotation,
Key Creation:
destruction, recovery
• Key Creation: Automated •Key creation should be automated to avoid human error and patterns.
processes to avoid patterns •Keys must be randomly chosen from the key space (e.g., DES has a key space of 72
on
• Key Distribution: Out-of- quadrillion).
band and key wrapping (KEK)
u
•Pseudorandom number generators are used to create keys that avoid patterns.ti
• Key Storage: Trusted Key Distribution:
r i b
tsending keys
Platform Module (TPM) and
is
rD
•Out-of-band distribution (e.g., phone call, in-person meeting) avoids
Hardware Security Module over the same communication channel.
(HSM)
t f
•Key wrapping (Key Encrypting Keys, KEK) involves wrappingo many keys inside
• Key Rotation: Frequency of
o
,N
another key for secure distribution.
changing encryption keys
• Key Recovery: Split Key Storage:
a
h on the motherboard that
•TPM (Trusted Platform Module): A chipainstalled
knowledge, dual control, key
t N laptops).
securely stores keys for a single device (e.g.,
escrow
e
je A hardened physical device that stores and
manages keys for an entireaorganization.
• Key •HSM (Hardware Security Module):
Destruction/Disposition:
u bh
l S to how often encryption keys are replaced.
Crypto shredding and key Key Rotation:
destruction
o
•Key rotation refers
I SSPKey Recovery:
C 1.Split Knowledge: The key is split among multiple parties.
for
tes 2.Dual Control: Requires two individuals to access the key (e.g., missile launch
protocols).
N o 3.Key Escrow: A trusted third party stores the keys (e.g., government-mandated
o
Key Destruction/Disposition:
C •Crypto shredding: Encrypt sensitive data, then destroy the encryption key, making
the data unreadable.
•Key destruction: Physically destroy the media (e.g., hard drives) to ensure the data
cannot be recovered.
• Key management is essential to the security of any cryptographic system, with the key being the
most critical element, as highlighted by Kerckhoffs' Principle.
• Key management activities include key creation, distribution, storage, rotation, and destruction.
• Techniques such as out-of-band distribution, TPM and HSM for storage, and crypto shredding for
destruction ensure the security of keys.
• Key recovery and rotation methods provide added layers of protection, helping maintain data
integrity and security in cryptographic systems.
on
secure mailing lists. Message integrity: Ensures that the message has not been
• S/MIME vs. MIME: Adds
•
altered.
u ti
Confidentiality: Encrypts the message to protect itsi b
security to MIME's
multimedia messaging.
•
s tr content.
i
rD
• PKI Dependency: Requires Optional Services:
Public Key Infrastructure (PKI)
• Signed receipts: Confirms message receipt.
t fo
for encryption.
o
, N purposes.
• Security labels: Classifies emails for security
a
a
• Secure mailing lists: Protects mailing h lists with encryption.
N
t identification:
e
• Extended signer certificate
j e Provides additional methods
ha
to verify the signer's certificate(s).
b
Su Internet Mail Extensions) supports email messaging
S/MIME vs. MIME:
o l
withC
• MIME (Multipurpose
y attachments (images, files, sound clips, etc.), but it does not
Bprovide security.
P
S • S/MIME was developed to add security to MIME.
CI S
for • S/MIME services include:
• S/MIME enhances MIME by adding public key encryption and security services like authentication,
nonrepudiation, message integrity, and confidentiality to email messaging.
• S/MIME requires PKI for key management and distribution, making it a robust solution for secure
digital communications.
• Optional services like signed receipts and security labels further extend its capabilities in secure
communication.
on
• Digital Signatures: Proof of
origin and nonrepudiation.
• Alice encrypts her large file with a symmetric key (e.g., AES) for speed.
uti
• Hashing: Ensuring integrity. •
sends it.
tr i b
To securely send the symmetric key, Alice encrypts it with Bob’s public key and
a,
Bob.
•
Access control is established N
h
Confidentiality is achieved since only Bob can decrypt it.
a the ciphertext and symmetric key only
•
to Bob. t by sending
e and Nonrepudiation:
je
ha
Step 4: Digital Signature for Integrity
b
Su
• Alice hashes the file and encrypts the hash with her private key, creating a
l
digital signature.
•
y Co Alice’s digital signature with her public key to confirm
Bob decrypts
P BBob hashes the file and compares it to Alice’s hash to confirm integrity.
authenticity.
CI S
or
file.
o te • Bob sends his digital signature back to Alice by hashing the file and encrypting
ll N
the hash with his private key.
rn e • Alice decrypts Bob’s signature with his public key to confirm authenticity.
• In this example, Alice and Bob use hybrid cryptography to achieve confidentiality and
access control with symmetric encryption and asymmetric key exchange for secure
key distribution.
• Digital signatures provide integrity, authenticity, and nonrepudiation. This approach
ensures that their communication is secure and verifiable.
a, Advanced mathematical
deduce the key.
h
Na algorithms and find patterns to
• Linear and differential cryptanalysis:
techniques used to analyze encryption
t
jee
deduce the key.
Types of CryptographicaAttacks:
b h
u
•Man-in-the-middle attack: An attacker intercepts communication
S to manipulate or eavesdrop on messages.
l
between two parties
o
as C
• Replay attack: The attacker captures and retransmits valid data, such
y
BSide-channel attack: Exploits physical characteristics of encryption,
an authentication token, to gain unauthorized access.
P
S such
•
CI S key.
as power consumption or electromagnetic leaks, to deduce the
tes keys and tries each until the correct one is found.
ell
corresponding plaintext, speeding up the cracking process.
on
Attacks: Linear/Differential
cryptanalysis, Factoring •
55):
u i
Attack times grow exponentially with longer key lengths (see Table 3-
t
attacks.
• 56-bit key: 20 hours
tr i b
• 80-bit key: 54,800 years
D is
• 128-bit key: 1.5 × 10^19 years
t for
No
• 256-bit key: 5.2 × 10^57 years
Cryptanalytic Attack Types:
h a,
•
t Na type ofonlyattack.
Ciphertext-only attack: The attacker has access to ciphertext,
By
to find
CIS
obtains the corresponding plaintext, which can reveal the key.
• Cryptanalytic attacks focus on deducing the encryption key using various techniques such as
brute-force, linear, and differential cryptanalysis.
• While brute-force attacks rely on trying all possible keys, more advanced techniques like factoring
and chosen-plaintext attacks exploit mathematical weaknesses in encryption algorithms like RSA.
• The goal is to break encryption and access protected information.
for
user.
•
t
Bypasses standard password authentication mechanisms.
• Temporary Files Attack:
No
•
h a,
Encryption/decryption processes require plaintext, ciphertext, and
Na
keys.
et
• Keys are temporarily stored in RAM or other volatile memory.
•
je
Attacker may access these stored keys by reading memory.
•
bha
Implementation Attack:
Su
• Targets weaknesses in how an algorithm is implemented.
l
Co
• Example: WEP's use of RC4 is flawed due to short, repeated IVs.
• Attack exploits flaws in the cryptographic implementation rather than
By the algorithm itself.
SP
• Side-Channel Attack:
ot
agencies).
ll N
• Types:
rn e •
•
Timing: Measures how long activities take.
Power: Measures how much power is consumed during
C o operations.
• Radiation Emissions: Monitors electromagnetic emissions.
i bu
Based on the birthday paradox, where a small group has a high
r
•
chance of shared birthdays.
ist
•Social Engineering Attack:
D
•
t for
Non-technical attack to obtain cryptographic keys.
No
• Examples:
a,
• Purchase key attack: Bribing someone for the key.
•
h
Rubber hose attack: Using force or threats to obtain the key.
•Kerberos Attacks:
Na
•
eet
Exploits weaknesses in the Kerberos authentication system.
j
ha
• Examples:
b
Su
• Pass-the-hash to generate valid Kerberos tickets.
Co
account, allowing for forging tickets.
SP
•Ransomware Attack:
for •
•
Relies on the secrecy of cryptocurrency for anonymity.
Payment does not always guarantee decryption or file recovery.
es
ot
•Fault Injection Attack:
ll N
• Deliberately introduces faults into hardware or software.
• Cryptographic attacks vary from direct attacks on the encryption keys to exploiting
weaknesses in implementation and user behavior.
• Common attacks include MitM, replay, pass-the-hash, and social engineering, each
with unique strategies for compromising secure systems.
• Some attacks like rainbow tables and birthday attacks exploit hashing vulnerabilities,
while others, like ransomware, leverage encryption for malicious purposes.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Physical Security
Physical Security Goals:
• Physical security goals • Physical security aims to protect assets both inside and outside the
• Importance of availability in organization, including ensuring confidentiality, availability, and
physical security integrity.
• Relationship between • Example: Maintaining a clean power supply helps ensure availability.
physical and logical security Importance of Availability in Physical Security:
• Primary goal of physical • Physical security ensures availability by maintaining environmental
security factors like temperature and power consistency, preventing downtime of
critical systems.
• Deter/Prevent controls
• Delay controls • Example: Keeping server rooms at optimal temperatures helps prevent
on
overheating.
• Detect controls
• Assess and respond
Relationship Between Physical and Logical Security:
uti
controls
•
tr i b
Physical and logical security share common goals—confidentiality,
D is
integrity, and availability. However, they implement controls differently.
for
• Example: Logical security uses preventive, detective, and corrective
controls, while physical security uses deter, detect, and correct controls.
t
No
Primary Goal of Physical Security:
a,
• The primary goal of physical security is the safety and protection of
h
human life. All physical security decisions are made to ensure that no one
Na
is endangered.
jeet
Deter/Prevent Controls:
ha
• These controls aim to deter or prevent intrusions before they occur.
•
b
Example: A fence around the property acts as a preventive measure.
Su
Signage like "Trespassers will be prosecuted" acts as a deterrent.
l
Co
Delay Controls:
SP
• Example: Locks delay access, but they are not foolproof and should be
used with other controls like CCTV and security personnel.
CI S Detect Controls:
orn • Once a threat is detected, assessment and response actions are taken to
mitigate it.
C • Example: Security guards assess the situation after an alert and respond
by intervening or contacting authorities.
• Physical security ensures the safety and protection of assets and human life by
implementing controls that deter, delay, detect, assess, and respond to threats.
• It plays a crucial role in maintaining the availability of critical resources and works in
alignment with logical security to protect confidentiality, integrity, and availability.
• Controls are designed to safeguard the organization without endangering individuals.
t fo
Dumpster Diving:
o
• Attackers inspect discarded trash to recover
a , Nsensitive information that
wasn’t disposed of securely.
• Example: A discarded document a
h
tN
with passwords or company data found
in a dumpster.
e
Social Engineering:
h aje
S ub actions
• Leveraging the human element, attackers persuade an employee to
l
perform unauthorized or reveal sensitive information.
y CoPretending
• Example: to be IT support to get an employee to reset their
P B
password for an attacker.
C
or
someone's shoulder while they access sensitive information.
o te credentials.
• Physical security threats encompass a variety of tactics, from straightforward theft to more complex
attacks like espionage and social engineering.
• These threats exploit both physical vulnerabilities (such as HVAC systems) and human weaknesses
(such as shoulder surfing or social engineering), which highlights the importance of comprehensive
security measures.
emergencies.ub
ha is one, but this may impact safety in
• The next best number
o lS
y C The ideal number of doors should be “as close to zero as
B
• Key Point:
P possible” while ensuring there are enough emergency exits to
S
CIS
protect human life.
ell N emergency.
orn
C
• The layered defense model in physical security emphasizes the use of multiple layers of protection,
starting from the outer perimeter.
• While security is essential, the safety of human life must always be prioritized, especially when
determining access points like doors.
• The optimal security solution balances access control with emergency egress needs.
on
• High-value areas and Before implementing security controls, the most valuable assets and
examples
•
t
associated risks must be identified. The process involves assessing
u i
tr i b
risks and vulnerabilities to determine the best risk treatments.
Threat Definition:
is
•
fo
Example: A threat could be theft, natural disasters, rorDsabotage.
Applicable threats that may impact the site are identified.
o t
, Nto be targeted by the
Target Identification:
Determines which assets are mosta
•
identified threats.
a h likely
tN
Example: High-value assets like server rooms or sensitive data centers.
Facility Characteristics: e
h ajevulnerabilities and considers factors like
ub potential threats.
• Identifies each asset’s
accessibility and
S
ol
High-Value Areas:
C
•
B yHigh-value areas are identified based on their importance to the
organization. Security controls should be implemented to protect
S P these areas.
CIS
Examples:
or
• Wiring Closets: Contain networking equipment on each floor.
ll N
• Evidence Storage: Stores important legal or regulatory evidence.
• A security survey helps identify potential threats, valuable assets, and vulnerabilities within a
facility.
• It is essential to prioritize human safety and ensure that appropriate physical security controls are
put in place to protect high-value areas such as wiring closets, server rooms, and evidence storage.
• Techniques like CPTED guide the design of environments to reduce risks, while operational
considerations like Business Continuity Plans (BCP) and Disaster Recovery Plans (DRP) ensure
ongoing protection during crises.
o
ell N
orn
C
• Perimeter controls such as landscaping, grading, and bollards are essential for protecting a facility.
• Proper landscaping and grading can prevent easy access to critical areas and protect against
environmental risks like flooding.
• Bollards are crucial for preventing vehicle-based attacks, especially in high-risk areas like
government buildings.
• Together, these controls help maintain a secure perimeter while balancing functionality and
aesthetics.
ot be positioned at
• N easy identification.
Example: Cameras at entry points should
, for
a
angles that capture facial features
h
a
tN
Image Quality and Its Importance:
Image quality shouldebe
•
je sufficient to capture clear details in all
haimage quality is too poor to recognize
conditions, including day, night, and varying weather.
Key Point: Ifb
Su the system is ineffective.
• the
l
individuals,
Co Media and Storage Considerations:
Transmission
y
S P• B Consider how the video feeds are transmitted to monitoring
stations and stored. Determine whether the footage is reviewed
CI S live (24x7 monitoring) or archived for later use.
orn • Local laws may dictate the length of storage, who can view the
footage, and whether cameras can record public areas.
C • It's important to ensure compliance with privacy regulations
when installing CCTV systems.
• CCTV cameras primarily function as detective controls, but they also act as deterrents
and tools for security audits.
• Key considerations include proper placement, ensuring image quality, and addressing
transmission and storage needs.
• Legal requirements and privacy laws play a significant role in determining the use and
storage duration of video footage.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Passive Infrared Devices
Definition of Passive Infrared Device:
• Definition of passive infrared
device • A passive infrared device (PIR) is a motion detector that identifies
• How passive infrared devices
motion by detecting infrared light emitted by objects and humans.
detect motion How Passive Infrared Devices Detect Motion:
• Sensitivity to temperature
changes • The device functions like a low-resolution infrared camera, taking
• Calibration of passive continual snapshots of a room and comparing them.
infrared devices • Human bodies emit more heat than typical room temperatures,
• Example of operation in hot allowing PIR devices to notice changes when someone enters a room.
on
climates Example:
t i
uthe
• When a person moves, the infrared signature changes, triggering
device to send an alert. tr i b
is
Sensitivity to Temperature Changes:
fo rD
o
• PIR devices are extremely sensitive to changes t in temperature, which
can affect their accuracy.
, N
a
h differences between objects and
a
• They work by detecting temperature
the environment.
e tN
aje Devices:
Calibration of Passive Infrared
h
• Because ambient
S ub temperatures fluctuate, especially in environments
need too
l
where temperatures may rise above human body heat, PIR devices
yC
constantly recalibrate to ensure accurate detection.
• B
Example: In hot climates like Texas, where the outdoor temperature
I SSP exceeds the warmth of a human body, PIR devices detect cooler
C objects instead of warmer ones.
• A passive infrared device is a motion detector that works by detecting infrared light and
comparing snapshots of a room to notice temperature changes.
• It is highly sensitive to ambient temperature fluctuations, especially in hot climates, and must
continually recalibrate to maintain accurate motion detection.
• External lighting is a key deterrent that enhances both security and safety by making it
difficult for criminals to operate in the dark.
• It also improves the effectiveness of camera systems by providing better visibility and
ensuring clearer footage.
ell N
orn
C
• The security of doors depends on both their composition and the construction of the
frame. While outward-swinging doors are less secure, they are critical for safety in
emergencies.
• Mantraps are essential for preventing tailgating, using a double set of doors or
turnstiles to control access and ensure that only authorized individuals enter secure
areas.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Locks
Locks as Delay Controls:
• Locks as delay controls • Locks, regardless of type (keyed, card reader, biometric), act as delay
• Types of locks: mechanical controls.
and electronic
• Given enough time, any lock can be defeated, meaning they delay
• Privacy concerns with
access rather than prevent it.
biometric locks
• Weaknesses of different Types of Locks: Mechanical and Electronic:
locks • There are two primary categories of locks:
• Keypad and combination lock • Mechanical locks: Include keyed and combination locks.
precautions • Electronic locks: Include magnetic, proximity/RFID, and
on
• Lock types: key, combination, biometric locks.
magnetic, proximity,
Privacy Concerns with Biometric Locks:
uti
biometric
tr i b
• Biometric locks are growing in use due to their accuracy and security,
• Security of combination locks
is
but employees may have privacy concerns related to sharing personal
D
for
data like fingerprints or retinal scans.
Weaknesses of Different Locks: t
No
• Keypad locks: Susceptible to shoulder-surfing, where someone
watches the code being entered.
h a,
Na
• Combination locks: Can be vulnerable to brute-force attacks,
jeet
depending on the complexity of the combination.
ha
• Example: Weak metal composition can make locks easier to physically
break.
b
Su
Keypad and Combination Lock Precautions:
l
y Co
• For keypad locks, it's wise to install a cover to block the view of others
when entering a code.
B
SP
• Codes should be changed regularly and access privileges reviewed
ll N
to unlock.
• Locks serve as delay controls, and their effectiveness depends on their type and the precautions
taken to prevent weaknesses like shoulder-surfing or brute-force attacks.
• Mechanical and electronic locks come in various forms, such as key locks, magnetic locks, and
biometric locks, each with different security features.
• The complexity of combination locks is crucial to their overall security.
h aAccess
ub
Safety Benefits of Card
• Card access
l S control systems log movements of individuals when they
enter oroexit a building, which can help ensure employee safety by
C
y who is inside the building during an emergency.
B
knowing
ell N
orn
C
• Card access systems are inexpensive but less secure due to risks like lost or shared cards.
• Biometric systems offer stricter control and greater accuracy, but they are more costly and raise
privacy concerns.
• The combination of both methods can ensure higher security while offering some level of
convenience in monitoring movements, which enhances employee safety in emergencies.
• Windows are a major vulnerability in physical security. Both shock sensors and glass break
sensors can mitigate this risk, with shock sensors excelling in noisy environments and glass break
sensors being more suitable for quiet areas.
• Glass break sensors, which function like microphones, offer broader coverage by detecting the
sound of shattering glass.
breaches. a
sections to reduce the attack surface of security
N for different departments or isolating
e tVLANs
ajegeneral user networks.
• Example: Creating separate
h
sensitive systems from
b
Redundancy:
S u
o lremain available
• Building redundancy into the network ensures that critical systems and
for • Using secure communication protocols like HTTPS, SSL/TLS, and IPsec
orn helps detect anomalies, unauthorized access, and potential security threats
in real-time.
C • Example: Utilizing SIEM (Security Information and Event Management)
systems to log and analyze network activity.
• Implementing secure design principles in network architecture ensures the protection of systems
through defense in depth, least privilege, segmentation, and redundancy.
• Utilizing secure protocols and continuous monitoring helps maintain security and detect threats
early. These practices enhance the overall resilience of the network.
o
7.Application Layer: Interfaces with end-user applicationst (e.g., HTTP, FTP, DNS).
Devices and Protocols at Each OSI Layer:
a ,N
•
a
Physical Layer: Hubs, cables, wirelessh signals.
•
e
Data Link Layer: Switches, MACt Naddresses.
•
a
Network Layer: Routers, jeIP, ICMP.
h
bTCP, UDP.
•
S u
Transport Layer:
Session lLayer: Session management protocols.
Co Layer: Encryption and data translation.
•
•
y
Presentation
• BApplication Layer: Web browsers, HTTP, DNS, FTP.
P
S Encapsulation and Decapsulation:
CI S
for • Encapsulation refers to the process of adding headers (control information) to
data as it moves down the OSI layers, preparing it for transmission.
tes Decapsulation is the reverse process, where headers are stripped as data
moves up the OSI layers, making it readable for the application.
o
ll N
Role of Networking in Organizational Objectives:
• The OSI Model provides a layered framework for understanding how data is transmitted across
networks. Each layer has specific responsibilities, with various devices and protocols functioning at
different layers.
• The processes of encapsulation and decapsulation ensure data is properly transmitted and
received. Networks are essential to organizational success, requiring robust security measures to
protect their integrity.
SP• Example: The HTTP protocol operates at the Application Layer of the
data is properly sent and received.
CI S
for OSI model to enable web communication.
tes
o
ell N
orn
C
• A network is a connection between two or more devices, and protocols are the standardized rules
that enable communication between these devices.
• The OSI Model helps structure these communications, with different protocols operating at various
layers to ensure successful data exchange.
CI S Encapsulation: As data moves down the OSI layers, each layer adds
ell N
orn
C
on
layers Devices and Protocols at Each OSI Layer:
• Importance of security at
• Physical Layer: Hubs, NICs, cables.
u ti
different layers
• Data Link Layer: Switches, MAC addresses, L2TP, PPTP. t r i b
D is
• Network Layer: Routers, IP addresses, ICMP, NAT.
t for
• Transport Layer: TCP, UDP, iSCSI.
N o
,
• Application Layer: HTTP, DNS, FTP,aSSH.
h
t Na
Firewalls at Multiple OSI Layers:
je e
h a
• Network Layer: Packet-filtering firewalls provide basic filtering with
I SSP• Lower layers (Physical, Data Link, Network) offer high efficiency and
C
or
speed but limited security.
s f
o te • Higher layers (Session, Presentation, Application) provide advanced
security features but introduce complexity and slower processing.
ell N
orn
C
The OSI Model structures network communication into seven layers, with specific roles
for each layer. Encapsulation and decapsulation enable data to move between devices.
The TCP/IP model is a simplified four-layer version used to implement OSI concepts.
Security decisions vary across OSI layers, with a balance between speed and complexity
needed at each level.
CIS • Fiber Optic: Offers high security and speed; not as prone to
for interference or eavesdropping.
tes
o
ell N
orn
C
• The Physical layer handles the transmission of raw bits using wired or wireless media. Different
network topologies dictate how devices are connected, with hubs, repeaters, and NICs being key
devices at this layer.
• Transmission methods like unicast, multicast, and broadcast define how data flows, while
collision avoidance is crucial for network efficiency. The choice between cut-through and store-
and-forward switching balances speed and error checking.
on
methods: unicast, multicast,
broadcast
•
to avoid collisions.
u i
Ring Topology: Devices connected in a closed loop, with token passing
t
• Collision avoidance and
tr i b
•
CSMA
Cut-through vs. Store-and-
Layer 1 Devices:
D is
for
• Devices at Layer 1 include:
forward switching
• t
o distance.
Hubs: Simple devices that broadcast data to all connected devices.
N
a, between computers and
• Repeaters: Amplify signals to extend transmission
h
Na
• NICs (Network Interface Cards): Interface
networks.
e t
je
hatransmitting data:
Transmission Methods:
b
Su communication.
Three primary methods for
l
Co One-to-many communication.
• Unicast: One-to-one
B y
• Multicast:
P
S Collision Avoidance and CSMA:
• Broadcast: One-to-all communication within the network.
CI S
for
tes • In shared media, collisions occur when two devices send data at the same time.
Collision avoidance is managed using CSMA (Carrier Sense Multiple Access)
o protocols to prevent simultaneous transmissions.
orn • Cut-through: Switch starts forwarding data immediately after reading the
C destination address. Low latency, but error checking is minimal.
• Store-and-forward: Switch waits for the entire packet, checks for errors, and
then forwards it. Higher latency, but error-free transmission.
• The Physical layer handles the transmission of raw bits using wired or wireless media. Different
network topologies dictate how devices are connected, with hubs, repeaters, and NICs being key
devices at this layer.
• Transmission methods like unicast, multicast, and broadcast define how data flows, while
collision avoidance is crucial for network efficiency. The choice between cut-through and store-
and-forward switching balances speed and error checking.
a,
in modern networks.
h
Na
CSMA/CA vs. CSMA/CD:
et
1. CSMA/CA (Collision Avoidance):
•
je
Used in wireless networks, this method prevents collisions
bha
by using two communication lanes: one for sending and one
for receiving data.
•
l SuWireless networks use CSMA/CA to communicate with
Co
access points and avoid collisions entirely.
SP
• Used in older wired networks, like Ethernet networks with
ot CSMA/CD Process:
ell N 1. The device checks if the line is idle before sending a frame. If the line is
busy, it waits until the line is free.
orn 2. After sending, the device monitors for collisions. If a collision occurs, a
C jam signal is sent.
3. The device waits for a random amount of time before attempting to
send the data again.
• Collisions occur in shared media networks, and several methods—token-based, polling, and
CSMA—are used to handle them.
• CSMA/CA is used in wireless networks to avoid collisions, while CSMA/CD was used in older wired
networks to detect and correct collisions.
• Modern Ethernet networks now use switches to avoid collisions altogether, making CSMA/CD less
relevant.
•
o
Example: Sending an ARP request across t a local network to identify
,N
connected devices.
4. Anycast (One-to-Nearest/Best):
a
h or best-performing server.
•
a
Routes requests to the nearest
N Networks (CDNs) to direct users to
the closest or mosttoptimal server for content delivery.
• Used in Content Distribution
e
•
h aje and security by connecting to the best
Improves performance
available server.
5.
S ub
Geocast (One-to-Geographic Region):
•
olDelivers messages to devices within a specific geographical area.
y C systems.
• Often used in location-based services or emergency notification
P B
I SS • Unicast is the most secure, as it limits communication to specific devices.
Security Considerations for Transmission Methods:
C
for • Broadcast exposes data to all devices, making it less secure in comparison.
rn e This is ideal for CDNs, where data is delivered from the server nearest to the
user to enhance performance and security.
C o Geocast Explained:
• Geocast targets devices in a specific geographical location. It is useful for
applications like emergency alerts or localized services.
• Transmission methods define how devices communicate on a network. The most common methods
are unicast (one-to-one), multicast (one-to-many), broadcast (one-to-all), and anycast (one-to-
nearest/best).
• Unicast offers the best security, while anycast enhances performance and security by directing
users to the nearest or best server.
• Geocast is used for location-specific messaging.
D i
for
3. Signal-to-Noise Ratio (SNR):
• The comparison of the desired signal strength to the amount of
t
No
background noise.
• A higher SNR indicates better signal quality, leading to fewer lost
a,
packets and less corrupt data.
h
Example: In a wireless network, a high SNR means a clearer signal,
Na
•
allowing faster data transfer rates.
4. Latency:
je et
ha
• The time it takes for a signal to travel from the source to the
destination and back, measured in milliseconds (ms).
b
Su
• Example: If it takes 50 ms for a data packet to reach its destination
Jitter:o
l and return, the latency is 50 ms.
5.
y C
P B • The variation in time delay between data packets. It measures the
inconsistency of latency over time, which can lead to
I SS •
communication issues in real-time applications.
Low jitter is preferred for a smooth and consistent network
r C experience.
fo • Example: In VoIP calls, high jitter can result in poor audio quality and
es delays.
ot
ell N
orn
C
• Key performance metrics include bandwidth (maximum data capacity), throughput (actual data
transfer), signal-to-noise ratio (signal quality), latency (round-trip time for data), and jitter
(variation in packet delay).
• Understanding these metrics is crucial for optimizing network performance and ensuring efficient
communication.
• North-south traffic moves in and out of the data center, while east-west traffic moves within the
data center between devices.
• These traffic flows are critical in designing the data center's network architecture, routing, and
security strategies.
et
exposure to threats, providing an added layer of security.
3.
je
Air-gapped Management:
1.
bha
Complete physical isolation: The network is entirely
Su
disconnected from other networks, making it inaccessible
l from outside networks.
y Co
2. Example: Industrial control systems that need to be physically
B managed onsite.
SP
3. Most secure: Air-gapped networks are often used for
for network.
• Physical segmentation improves network security by isolating traffic and devices. In-band
management uses the same network for both management and user traffic, while out-of-band
management uses a dedicated management network.
• Air-gapped networks provide the highest level of security through complete physical isolation but
may introduce management challenges.
l
Co
• Advantage: It allows greater network scalability and segmentation without
additional
y
BVirtual domains allow for the creation of multiple separate security domains
Virtual Domains:
P
S within a single physical device.
•
CI S
or
• Example: A firewall can be partitioned into multiple virtual firewalls, each
orn • Benefits: Logical segmentation is cheaper and more flexible than physical
C •
segmentation, allowing easier management and scaling.
Risks: If not properly configured, logical segmentation may not provide
effective isolation, leading to potential security vulnerabilities.
• Logical segmentation enables the division of a network into virtual segments through methods like
VLANs, VPNs, VRF, and virtual domains.
• This approach offers flexibility, cost-effectiveness, and scalability. However, proper configuration is
essential to ensure network isolation and security.
a h
clear communication during calls, even during periods of high
tN
network usage.
Capacity Management: ee
h aj involves monitoring the current usage of
ub and planning for future needs.
• Capacity management
S
network resources
C
• Example: olIn cloud environments, rapid elasticity allows resources to
beyscaled up or down based on demand, helping reduce the
B
P complications of capacity management.
S
CIS • Goal: Ensure that the network can meet both present and future
for demands.
rn
followed by handling those issues using appropriate methods.
• Monitoring and management are critical for ensuring network performance and reliability.
• Key concepts include network observability (understanding network behavior), traffic shaping
(controlling and prioritizing data flows), capacity management (planning resource usage), and fault
detection (identifying and resolving issues efficiently).
tr
collisions because all devices share the same collision
s
domain.
D i
for
• Example: Older Ethernet networks often used hubs to connect
t
devices, but they are now replaced by switches.
2. Repeaters:
No
•
h a,
A repeater regenerates weakened signals and amplifies them
Na
to extend the transmission distance.
et
• It is used to mitigate signal attenuation (loss of signal
je
strength) when data travels over long distances.
•
bha
Example: Repeaters are commonly used in large cabled
Su
networks to ensure signal integrity over extended distances.
l
Co
3. Concentrators:
ot
systems where multiple data streams are merged for
ll N
transmission over a single connection.
C o •
•
Very fast due to their simple function of transmitting raw data (bits).
No decision-making capabilities, meaning they cannot direct traffic
or perform filtering.
• Typically, they operate in the same collision domain, leading to
potential performance issues in certain network environments.
• Layer 1 devices, such as hubs, repeaters, and concentrators, handle the transmission of raw data
without intelligent decision-making.
• While hubs broadcast data to all devices, leading to potential collisions, repeaters amplify signals
to extend transmission distances, and concentrators aggregate signals for efficient transmission.
t r i
•
is
Circuit-switched networks: Establish a dedicated connection between
devices before transmitting data (e.g., traditional telephone systems).
D sent over a
•
shared network, with each packet potentially taking fao
Packet-switched networks: Data is broken into packets r and
internet).
o t different route (e.g., the
t N
data as it travels between two directly devices, protecting it from
interception.
je e
hadividehelping
Layer 2 Devices: Bridges and Switches:
•
u
Bridges: Devices b that a network into segments and manage traffic
based on MAC
S addresses, to reduce collisions.
l Devices that connect multiple devices within a network and forward
•
C obased
Switches:
B y
frames
reducing
on MAC addresses. Switches improve network efficiency by
collisions and increasing data transmission speed.
P
S • L2TP (Layer 2 Tunneling Protocol): A tunneling protocol used for VPNs that
Layer 2 Protocols:
CI S
or
provides data privacy and security.
ll N
• ARP (Address Resolution Protocol): Resolves IP addresses to MAC
• The Data Link layer (Layer 2) is responsible for framing data and ensuring it can be transmitted
between devices using MAC addresses.
• It connects the Physical layer (Layer 1) and the Network layer (Layer 3), playing a critical role in
managing data flow and security.
• Devices like bridges and switches operate at this layer, using protocols such as L2TP, PPTP, and
ARP to facilitate communication.
on
Structure of MAC Addresses:
• ti
First 24 bits: Organizational Unique Identifier (OUI), which identifies the
u
device’s manufacturer (e.g., Cisco, Intel).
tr i b
•
device.
D s
Last 24 bits: Uniquely assigned by the manufacturer to identify the specific
i
•
t for
Example: A MAC address could look like 00:1A:2B:3C:4D:5E, where the
No
first three pairs identify the manufacturer and the last three pairs identify
the device.
a,
Address Resolution Protocol (ARP) and Reverse ARP (RARP):
h
Na
• ARP: Maps IP addresses (Layer 3) to MAC addresses (Layer 2), facilitating
et
communication between devices.
•
je
Example: When sending data to a device, ARP helps translate the
bha
destination's IP address into its MAC address.
Su
• RARP: Reverses this process by mapping MAC addresses to IP
l
addresses.
y Co
ARP Poisoning:
B • ARP poisoning is a form of attack where an attacker spoofs or
SP
masquerades as another device on the network by altering the ARP table.
CI S • By doing this, the attacker can intercept data intended for the legitimate
for •
device.
Example: In a man-in-the-middle attack, ARP poisoning allows the
es
ot
attacker to reroute traffic through their device without detection.
ll N
Circuit-Switched vs. Packet-Switched Networks:
• At Layer 2, devices are uniquely identified by MAC addresses, which consist of 48 bits. ARP and
RARP are used to map IP addresses to MAC addresses and vice versa.
• However, this layer is susceptible to attacks like ARP poisoning, where attackers can spoof devices
to intercept data.
• The distinction between circuit-switched and packet-switched networks is important for
understanding how data travels across networks.
•
D is
Example: In a phone call, both parties can talk and listen at the same time
for
without waiting for the other to finish.
t
No
Establishing a Connection:
In a circuit-switched network, the connection can be established
a,
•
permanently or on demand. It is maintained between switches to ensure
h
Na
that traffic is routed to the correct destination.
et
Transmission of Digital Data over Analog Connections:
•
je
Analog communication was originally designed for voice, as the human
ha
voice is analog in nature.
b
Su
• However, with the rise of digital data, a solution was needed to transmit
l
digital information over analog telephone lines.
y Co
Modems (Modulation/Demodulation):
B • Modems were introduced to convert digital data into analog signals for
SP
transmission over analog telephone lines and back to digital data at the
CI S receiving end.
for • Example: Early internet connections used modems to allow data to travel
over phone lines, but these connections were limited to 65,000 bits per
es second.
ot Introduction of VoIP (Voice over IP):
ell N • As data networks grew, the need for faster communication led to the
rn
development of VoIP (Voice over IP), which allows voice communication
C o •
over data networks.
VoIP uses the internet protocol to transmit digital data more efficiently
than analog phone lines.
• Security risks: Though VoIP is faster, it also introduces security concerns,
such as potential eavesdropping or data breaches.
jeet
the availability and traffic on the network.
Unreliable Delivery: a
u bh networks, there is no guarantee of delivery.
l S may be lost during transmission, and the data must be
• In packet-switched
o
Some packets
B yC
reassembled upon arrival.
S P• Packets may also arrive out of order, but sequence numbers allow
C o over long distances, but they introduce the risk of lost packets and
reassembly errors.
• In a packet-switched network, data is broken into packets, which travel independently and may
take different routes to the destination.
• Switches route the packets based on header information, but the network does not guarantee
delivery, and packets may arrive out of order.
• This type of network is more efficient than circuit-switched networks, though it introduces risks such
as packet loss.
et
2. Example: PPTP is commonly used for remote access VPNs, though it
e
is less secure than newer protocols.
j
ha
3. L2TP (Layer 2 Tunneling Protocol):
b
Su
1. A more advanced tunneling protocol that combines the best features
of L2F and PPTP, providing strong encryption and security for VPNs.
l
Co
2. Example: L2TP is often used for site-to-site VPNs due to its enhanced
By security features.
SLIP (Serial Line Internet Protocol):
I SSP • An older protocol used for remote access via serial connections and modems.
r C • Example: SLIP was once used for dial-up internet access, though it has been largely
replaced by more modern protocols like PPP (Point-to-Point Protocol).
fo
es ARP (Address Resolution Protocol):
ot
• ARP maps IP addresses to MAC addresses, allowing devices to communicate
ll N
over a network.
rn e • Example: When sending data to another device on a network, ARP helps to identify
the device's MAC address, ensuring proper delivery.
• Layer 2 protocols manage data transmission at the Data Link layer. Tunneling protocols like L2F,
PPTP, and L2TP are used to create VPNs, while ARP and RARP map between IP and MAC
addresses.
• SLIP is an older protocol for remote access, replaced by more secure options today.
N o
• Example: In a LAN environment, switches
, and improving efficiency
between devices, reducing networkatraffic
forward data packets
compared to hubs. a h
t N
e
• Switches vs. Hubs: Unlike
j eto the
hubs, which broadcast data to all devices,
h a
switches send data only device that needs it.
Layer 2 vs. Layer 3bSwitches:
u
l S work at the Data Link layer and forward frames
• Layer 2oswitches
y Con MAC addresses.
based
B
S P• Layer 3 switches operate at the Network layer, performing
CIS
additional tasks like routing based on IP addresses.
or
• Example: A Layer 3 switch can forward data across different subnets,
orn as exam questions may specify whether they refer to a regular switch
(Layer 2) or a Layer 3 switch with added functionalities.
C
• Layer 2 devices, such as bridges and switches, operate at the Data Link layer and manage network
traffic based on MAC addresses.
• While bridges connect different networks, Layer 2 switches forward data to the intended recipient
within the network.
• Layer 3 switches provide additional routing functionality by operating at the Network layer.
orn • EAP-MD5: A simpler version of EAP using ID and password, with low
C security and limited industry support.
• Authentication protocols have evolved to meet the needs of remote access. PPP introduced PAP,
CHAP, and EAP for secure connections, with EAP being the most flexible and secure.
• PEAP enhances EAP by using an encrypted TLS tunnel.
• Various types of EAP offer different levels of security and authentication, with EAP-TLS providing
the highest security using certificates for both client and server authentication.
on
IGMP, IPsec, OSPF) needs to discover its IP address.
• Fragmentation and IP Route Selection:
uti
addressing
i b
• The Network layer is responsible for selecting the best route for data packets to
tr
take to reach their destination, considering factors like congestion or node
failure.
D is
for
• Example: If a primary route is congested, Layer 3 protocols may
t
choose an alternate route to ensure data reaches its destination.
Layer 3 Devices:
No
a,
• Routers: Forward data packets between different networks, ensuring that the
h
packets are routed to the correct destination.
Na
• Packet filtering firewalls: Filter network traffic based on IP addresses,
jeet
providing security by allowing or blocking specific packets.
• Layer 3 switches: Combine the functionality of both switches and routers,
ha
allowing for packet forwarding based on IP addresses.
b
Su
Layer 3 Protocols:
l
Co
• ICMP (Internet Control Message Protocol): Used for diagnostic purposes, such
as pinging to test network connectivity.
SP
memberships, allowing devices to join or leave multicast groups.
CI S • IPsec (Internet Protocol Security): Provides encryption and security for data
packets transmitted over IP networks.
for • OSPF (Open Shortest Path First): A routing protocol that finds the best path for
data packets within a network.
es
ot
Fragmentation and IP Addressing:
ll N
• Fragmentation is the process of breaking large chunks of data into smaller
packets for transmission.
• At Layer 3, data is formatted as packets, and logical addressing is used to map IP addresses to
MAC addresses using ARP and RARP. Routing is a key responsibility, with Layer 3 devices like
routers and firewalls managing traffic.
• Layer 3 protocols such as ICMP, IGMP, and IPsec ensure smooth network operations, while
fragmentation and IP addressing allow data to be efficiently transmitted across networks.
on
First)Common routing between source and destination.
protocols: BGP, OSPF, RIP
uti
• Example: Traceroute shows the number of hops taken from one
network to another.
tr i b
is
• Security concerns: ICMP can be used for reconnaissance by attackers,
D
for
making it common to filter ICMP traffic at firewalls.
IGMP (Internet Group Management Protocol):
t
No
• IGMP is used to manage group memberships for multicast
a,
communications.
h
• It helps hosts, routers, and similar devices join or leave multicast groups.
Na
• Example: Streaming video services use IGMP to manage data distribution
jeet
to multiple users.
ha
IPsec (Internet Protocol Security):
b
• IPsec is a tunneling protocol that provides authentication and
Su
encryption at Layer 3.
l
Co
• Example: IPsec is commonly used to secure VPNs, ensuring that data is
I SSP routers).
fo • OSPF is a routing protocol used by routers to determine the best path for
es network traffic.
ll N
routing protocols like RIP.
on
First)Common routing communication problems exist.
protocols: BGP, OSPF, RIP
uti
•Both tools can help identify if a host is reachable and map network paths,
i b
but they can also be used in reconnaissance attacks, which is why they are
tr
often filtered.
D is
t for
No
h a,
Na
jeet
bha
l Su
y Co
B
I SSP
r C
fo
es
ot
ell N
orn
C
• Layer 3 protocols like ICMP, IGMP, IPsec, and OSPF handle network routing, security, and logical
addressing.
• ICMP provides network feedback through tools like ping and traceroute, while IGMP manages
multicast groups.
• IPsec ensures secure communication through encryption, and OSPF is a secure and efficient
routing protocol.
• Routing protocols like BGP, OSPF, and RIP manage data flow between and within networks.
on
OSPF, BGP) to determine the best route for data.
Layer 3 Switches:
uti
•
r i b
Layer 3 switches are similar to routers in their ability to route traffic
t
is
between networks but are often used to connect devices within a VLAN
(Virtual Local Area Network).
D
•
t for
Example: A Layer 3 switch can route traffic between different
No
subnets within the same organization.
a,
• They combine switching and routing functionalities, enabling faster
h
internal communication while also providing Layer 3 routing capabilities.
Packet Filtering Firewalls:
Na
•
jeet
Packet filtering firewalls operate at Layer 3 and make decisions based
ha
on the header portion of data packets, such as source and destination
b
IP addresses and port numbers.
•
l Su Example: A packet filtering firewall can block traffic from certain
Co
IP addresses marked as malicious.
SP
headers, and therefore provide basic protection.
ll N
• Devices at Layer 3 balance speed and decision-making capability.
rn e • Layer 3 firewalls are fast but only offer limited filtering based on simple
IP addresses and port numbers.
• Layer 3 devices, such as routers, Layer 3 switches, and packet filtering firewalls, manage
network traffic by making decisions based on IP addresses.
• Routers direct traffic between networks, while Layer 3 switches handle routing within VLANs.
• Packet filtering firewalls provide fast but basic security by filtering packets based on header
information, while higher-layer firewalls offer more advanced protection at the cost of speed.
on
• IPv6: Consists of 128 bits, divided into eight 16-bit groups, significantly
increasing the number of available IP addresses.
• Example: An IPv6 address might look like
uti
2001:0db8:85a3:0000:0000:8a2e:0370:7334.
tr i b
Private vs. Public IP Addresses:
D is
for
• Private IP addresses are not routable on the public internet and are used within
local networks.
t
No
• Example: 192.168.0.0 – 192.168.255.255 is a private IP range used in
a,
many home networks.
•
h
Public IP addresses are globally unique and routable on the internet.
•
Na
Example: Websites like google.com have public IP addresses to be
et
accessible globally.
je
Network Classes (Subnetting):
•
bha
Subnetting allows for the creation of smaller networks (subnets) within a larger
Su
network, optimizing the use of available IP addresses.
l
Co
• Example: The 192.168.1.0 network can be divided into smaller subnets,
such as 192.168.1.0/24 for more efficient IP address allocation.
By • Network classes in IPv4 are divided into Class A, B, and C, allowing networks of
SP
varying sizes:
CI S •
•
Class A: Large networks
Class B: Medium networks
ll N
address when accessing the internet.
• IPv4 addresses are made up of 32 bits and have become limited due to the increasing
number of connected devices, leading to the adoption of IPv6 (with 128 bits). Private IP
addresses are used within local networks, while public IP addresses are routable on
the internet. NAT allows internal devices to share a public IP address, improving security
and IP address efficiency.
• IEEE sets the global standards for wired, wireless, and virtual networks.
• The IEEE 802.3 standard covers Ethernet-based wired networks, while IEEE 802.11 governs
wireless LAN (Wi-Fi) technology.
• IEEE 802.1Q is the standard for VLANs, which allow network segmentation for enhanced security
and efficiency.
et
bits, providing an almost infinite number of IP addresses (2^128).
•
je
Example: An IPv6 address looks like
ha
2001:0db8:85a3:0000:0000:8a2e:0370:7334 (represented in
b
Su
hexadecimal format, separated by colons).
•
l Benefits: Backward compatibility with IPv4, larger address
SP
addressing the limitations of IPv4 and ensuring enough
for • Reason for IPv6 Creation: IPv4’s address space was insufficient for the
growing number of devices connecting to the internet. IPv6 solves this
• IP is the protocol responsible for addressing and routing data across networks. IPv4 uses a 32-bit
address space, limiting the number of available addresses.
• To solve this, IPv6 was developed, offering a 128-bit address space and built-in IPsec security.
While IPv6 adoption is increasing, NAT and other techniques continue to extend the life of IPv4.
jee
networks are isolated internet traffic.
• a can usearetheonlysame
haddresses
Multiple organizations private IP range without
b
conflict, as these used internally.
•
l Su Twoprivate
Example: companies next door can both use the
C o without any issues. range for their internal networks
192.168.1.0
• Private IPv4 addresses are used for internal networks, providing non-routable IP
addresses that cannot be accessed from the internet, ensuring isolation and security.
They come in three main ranges: 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16, as
defined by RFC 1918.
on
Class C would have 254 addresses.
r i b
• Subnetting solves these issues by allowing the creation of smaller, logical
t
networks that can better fit organizational needs.
D is
for
IP Address Classes (A, B, C):
• Class A: Supports 16+ million IP addresses, typically used by large
t
No
organizations or ISPs.
• Class B: Supports 65,534 IP addresses, generally used by medium-sized
organizations.
h a,
Na
• Class C: Supports 254 IP addresses, typically used in small networks like
et
home or small business networks.
je
Class D and Class E Uses:
ha
• Class D: Reserved for multicast addressing, which is used for broadcasting
b
information to multiple hosts on a network.
Su
• Class E: Reserved for experimental purposes and not used for normal
l
Co
networking.
y
Maximum Number of IP Addresses Per Class:
B • Explanation: The difference between the total and usable addresses comes
SP
from the network address and broadcast address, which are reserved.
CI S
for Class Exponent
Total Usable
s Addresses Addresses
ell N
rn
Class B 2^16 65,536 65,534
• Subnetting optimizes the allocation of IP addresses by breaking a larger network into smaller, more
manageable sub-networks.
• This addresses the inefficiencies and limitations of traditional Class A, B, and C networks, ensuring
that the right number of addresses is allocated.
• Class A networks are the largest, followed by Class B and Class C, while Class D is reserved for
multicast and Class E for experimentation.
on
• UDP is often referred to as a "send and pray" protocol due to its
unreliable nature.
u ti
TCP Three-Way Handshake:
r i b
t between
•
i s
TCP uses a three-way handshake to establish a reliable connection
r D(synchronize)
two devices.
•
packet.
t fo
SYN: The sender initiates a connection with a SYN
B y C• port 53.
Well-known ports: Ports numbered 0–1023 are reserved for
S P • commonly used services.
CIS
Ephemeral ports: Ports numbered 1024–65535 are dynamic and
often used for temporary client connections.
• Layer 4 (Transport Layer) manages the reliable and efficient transportation of data using TCP and
UDP protocols.
• TCP provides reliable, ordered communication, ensuring data integrity, while UDP offers faster,
unordered transmission, ideal for real-time applications.
• The TCP three-way handshake establishes reliable connections, and ports associate specific
network services with unique numbers.
Na
(e.g., 2000), so the packet contains SYN-ACK flags.
•
jeet
Step 3: ACK (Acknowledge)
ha
• Device A responds with an ACK packet that acknowledges the
b
new session ID from Device B by incrementing it to 2001.
uthree steps—SYN, SYN-ACK, ACK—complete the connection
•
l S
The
es The server tries to send ACK packets for each request, but if the
ot
•
requests flood in too quickly, the server’s connection queue fills
• The TCP three-way handshake is essential for establishing reliable connections between devices
using SYN, SYN-ACK, and ACK.
• Although TCP ensures ordered and sequenced communication, it is vulnerable to SYN flood
attacks, which can overwhelm servers by filling up connection queues.
• Implementing SYN proxies can help mitigate these attacks by handling incoming SYN requests
intelligently.
on
• SSH (Secure Shell):
• Port 22 for secure remote login.
uti
• Telnet:
tr i b
• Port 23 for remote command line access.
• SMTP (Simple Mail Transfer Protocol):
D is
for
• Port 25 for sending emails.
t
No
• HTTP:
• Port 80 for web traffic.
• HTTPS (Secure HTTP):
h a,
Na
• Port 443 for secure web traffic.
et
Hardening and Securing Ports:
je
• If a service is not needed, close the associated port to prevent potential
ha
abuse by attackers.
b
Su
• Use packet filtering to block traffic targeting these ports in the
l header.
y Co
• Hardening involves disabling unnecessary services, blocking dangerous
ports, and applying patches to fix known vulnerabilities.
B
SP
• Example: Instead of HTTP, use HTTPS to encrypt web traffic.
CI S Port Classes:
• Well-Known Ports (0-1023): Used for widely known services like HTTP,
ll N
• Dynamic/Private Ports (49152-65535): Used by applications and
• Ports act as gateways for various services, and securing them (via hardening techniques like closing
unnecessary ports or using encryption protocols) is crucial.
• Layer 4 protocols—TCP (reliable) and UDP (fast, unreliable)—play key roles in data transport, while
SSL/TLS ensures secure communication over the Internet.
t
used for encrypted connections across the Internet.
No
h a,
Na
jeet
bha
l Su
y Co
B
I SSP
r C
fo
es
ot
ell N
orn
C
Ports act as gateways for various services, and securing them (via hardening techniques
like closing unnecessary ports or using encryption protocols) is crucial. Layer 4
protocols—TCP (reliable) and UDP (fast, unreliable)—play key roles in data transport,
while SSL/TLS ensures secure communication over the Internet.
r Dchanges or
authentication.
• Weak security as it doesn't prompt for password
encryption.
t fo
• o
N regular challenges to validate
CHAP (Challenge Handshake Authentication Protocol):
•
the authenticity of a session. a
Provides encrypted transmission , and
h
More secure than PAP butastill used in conjunction with other
t Nsecurity.
•
e
protocols for additional
•
h aandjeflexible,Protocol):
EAP (Extensible Authentication
•
u b certificates forallowing
Extensible
and digital
vendors to incorporate smart keys
authentication.
S in wireless network security protocols (e.g., WPA2) for
lUsed
•
o
y C (Network Basic Input/Output System):
connecting to secure networks and authenticating users.
•
BNetBIOS
P • Alocal legacy protocol enabling communication between devices in a
C •
•
Provides security by establishing sessions for applications and
controlling access based on session-level data.
Primarily used to monitor connections and ensure they are valid
before data transfer occurs.
• The Session layer is crucial for managing connections and communication between hosts,
providing mechanisms for authentication and ensuring secure, reliable dialogues between
processes.
• Key protocols like PAP, CHAP, EAP, NetBIOS, and RPC provide authentication and communication
services. Circuit proxy firewalls secure sessions at this layer.
ti
• Unlike Application layer firewalls, circuit proxy firewalls do not on
i bu
analyze the content of the traffic but instead manage the session
between hosts.
str
D i
Benefits of Circuit Proxy Firewalls:
fo r
• Provide anonymity and protection for internal t
o networks by hiding
N
a, appears as though it
internal IP addresses through Network Address Translation (NAT).
h
NIPaaddress, enhancing security by
• Outgoing traffic from the internal network
t
originates from the gateway's
e
je
masking internal details.
for
tes • Circuit proxy firewalls are simpler and faster due to their focus on
managing sessions rather than filtering content, making them more
o
ll N
efficient in certain scenarios.
rn e
C o
• Circuit proxy firewalls at the Session layer focus on securing TCP sessions by managing the
connection's handshake process.
• They offer anonymity and protect internal networks via NAT, ensuring that only legitimate traffic
passes through while hiding internal details from external users.
for
tes Importance of Content Distribution Networks (CDNs):
orn • Role of CDNs: Helps reduce latency and improve speed by hosting
C media files closer to users.
• CDNs manage the distribution of large media files, overcoming
the limitations of individual codecs by streamlining the delivery of
content such as YouTube videos.
• The Presentation layer focuses on the formatting, encryption, and compression of data to ensure
compatibility for exchange between applications.
• Codecs are essential for handling media compression but pose malware risks.
• Content Distribution Networks (CDNs) mitigate these risks by optimizing the delivery of large
media files globally.
o
Application security measures (e.g., secure coding, input t validation, and patch
,N
•
management) are critical to protect against these vulnerabilities.
Common Layer 7 Protocols: a
h Used for web traffic, with HTTPS providing
a
tforNtransferring files between systems.
• HTTP/S (Hypertext Transfer Protocol/Secure):
e
encrypted communication.
•
DNS (Domain Nameh
aje
FTP (File Transfer Protocol): Used
•
u b System): Translates domain names into IP addresses.
•
Telnet. l S
Telnet and SSH: Used for remote command-line access; SSH is the secure version of
o Mail Transfer Protocol): Used for sending emails.
C(Simple
•
y
SMTP
• BSNMP (Simple Network Management Protocol): Used for managing network devices.
P
S Layer 7 Devices:
CI S
or
• Gateways: Devices that manage communication between different networks, converting
o te • Application firewalls: Advanced firewalls that inspect traffic at the application level,
blocking or allowing traffic based on the content of the data (e.g., web content or specific
ll N
applications).
rn e
C o
• The Application layer (Layer 7) provides the user interface for communication services and handles
most application-level protocols.
• It is the most vulnerable layer due to the significant amount of application code involved, making it
a prime target for security breaches and attacks.
• End-to-end encryption, access control, and application firewalls are crucial for securing Layer 7
interactions.
•
o t and authenticity of
DNSSEC: Adds security to DNS by protecting the integrity
,N
DNS data, preventing spoofing attacks.
Telnet a
hterminal access, but insecure as it
•
transmits data in plaintext. t N
a
Telnet (port 23): A protocol for remote
e
Best practice is to usejSSH
efor secure remote connections instead of Telnet.
•
SSH (Secure Shell) bh
a
S uProvides a secure way to access remote computers, using
l
Co execution,
• SSH (port 22):
public-key cryptography to encrypt data. Commonly used for secure login,
y
command
B (Email Protocols)
and file transfers on remote servers.
PSMTP/POP3
S • SMTP (port 25): Used for sending emails from client to server.
CI S
or
• POP3 (port 110): Used for receiving emails, allowing users to download
ll N
• SNMP (ports 161 and 162): Used for network device management, helping
C o •
•
SNMPv1 and v2: Vulnerable to security risks.
SNMPv3: The latest version, offering enhanced security features such as
encryption and authentication.
• Layer 7 protocols are critical for communication, file transfer, email, and network management.
HTTPS and SSH provide secure alternatives to their insecure counterparts (HTTP, Telnet).
• SNMPv3 and DNSSEC are important advancements in securing network management and domain
name systems, respectively.
a je
slower than firewalls operating as Layer 3 or Layer
bh
4 firewalls.
u
o lS
B yC
S P
CI S
for
es
ot
ell N
orn
C
• Layer 7 devices, such as gateways and application-proxy firewalls, provide advanced security and
connectivity solutions.
• Gateways connect different networks, while application-proxy firewalls filter traffic based on
application-level data, ensuring detailed, content-aware protection.
h a,
• Vulnerability Management: Regularly scan and assess the network
Na
for vulnerabilities and mitigate or fix identified issues to enhance
network security.
jeet
CIA Triad Support ha
or
transmission and preventing unauthorized modifications,
s f and
ll N
minimal downtime.
rn e
C o
• Network administrators are responsible for the configuration, patching, and vulnerability
management of network resources.
• They play a key role in maintaining the CIA triad and ensuring the security and smooth operation of
an organization's network.
ti on
to be carried over IP networks, often used in storage and backup systems.
•
i bu
Voice over Internet Protocol (VoIP): Enables voice communications over IP
r
networks instead of traditional phone lines. Protocols like H.323 and SIP are
used.
ist
VoIP Security Concerns
D
•
t for
VoIP introduces security challenges due to its transmission over IP networks,
No
which lack native security.
a,
• Common VoIP attacks include eavesdropping, denial-of-service (DoS) attacks,
and phishing via VoIP channels (vishing).
h
Na
• Encryption (e.g., using SRTP) helps protect voice communications but may add
et
latency.
je
Common VoIP Protocols
1.
ha
Secure Real-time Transport Protocol (SRTP):
b
Su
1. Provides encryption, authentication, integrity, and replay attack
l protection for streaming voice and video over IP.
y Co
2. Optimizes bandwidth and has low resource requirements. Described in
B RFC 3711.
SP
2. Session Initiation Protocol (SIP):
for 2. Also supports direct connections between PBX systems and public
es telephony networks.
ell N • PBX (Private Branch Exchange): A private telephone network for internal
communications within an organization.
• IP Convergence enables data networks to carry multiple types of traffic, including voice and
multimedia.
• Converged protocols like VoIP, FCoE, and iSCSI have specific uses, but they also bring security
risks.
• VoIP is especially vulnerable and requires protocols like SRTP and SIP to ensure secure
communication.
Su
message.
l
y Co
P B
I SS
C
for
tes
o
ell N
orn
C
• Vishing is a voice-based phishing attack that manipulates victims through spoofed phone calls,
while smishing uses text messages to achieve similar goals.
• Both forms of phishing rely on social engineering to deceive and steal information from
unsuspecting individuals.
on
• ARP Poisoning
• ARP Tables
Passive vs. Active Attacks
uti
• Passive Attacks: The attacker does not alter the target’s environment (e.g.,
traffic monitoring).
tr i b
D is
• Active Attacks: The attacker engages with the target to alter systems or
for
data (e.g., SYN flooding or DoS attacks).
t
No
SYN Scanning
• A type of active attack that manipulates the TCP three-way handshake to
a,
identify open services on a target machine.
h
SYN Flooding
Na
jeet
• A Denial-of-Service (DoS) attack where multiple SYN requests are sent to
ha
the target to exhaust resources and cause a crash.
b
Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS)
l Su
• DoS: One machine disrupts a target’s functionality by overwhelming it with
Co
requests.
rn e ARP Poisoning
C o • An attacker alters their ARP table to redirect traffic meant for another
device to their own.
• ARP Tables map IP addresses to MAC addresses, and every device on a
network maintains an ARP table.
• Network security attacks follow phases similar to network assessments but differ during the
exploitation phase. Attacks can be passive (e.g., eavesdropping) or active (e.g., SYN flooding).
• Understanding the difference between types of attacks (DoS, DDoS, MitM, ARP poisoning) is crucial
for implementing detection and preventative measures to protect against network threats.
a
• Sniffing tools can be used to intercept,thisNtraffic without leaving a
trace. a h
etN
h aje
S ub
C ol
B y
I SSP
C
for
tes
o
ell N
orn
C
• Passive eavesdropping is a form of attack where the attacker listens to or monitors traffic without
changing it.
• This is also known as network sniffing and is difficult to detect, making it highly effective for
gathering sensitive information that could be used later in an active attack.
B yC
This leaves the connection half-open and avoids detection.
S PSYN Flooding
I
C •S
for SYN flooding is a form of denial-of-service attack that abuses the
TCP three-way handshake by sending multiple SYN requests to a
s
ote
target machine.
ll N
• The target system becomes overwhelmed with SYN requests, causing
• SYN scanning is an active scanning technique used to discover open or closed ports.
• It manipulates the normal three-way handshake, and attackers can use stealth scanning to avoid
detection.
• SYN flooding is a type of DoS attack that overwhelms a target by sending multiple SYN requests,
consuming its resources.
,N
times, or it may crash entirely or become unresponsive.
Three-Way Handshake Abuse
h a
a
of the target system bye e t N resources
• SYN flooding is an active attack as it disrupts the normal functioning
j exhausting and causing a denial of
service (DoS).
b ha
u the first step of the three-way TCP handshake
SSYN
• The attack leverages
l
o requests but never completing the process with an
by sending
ACK,C
B y leaving connections in a half-open state.
rn ell at detecting and blocking SYN flood traffic, preventing the attack
from overwhelming the target system.
C o
• SYN flooding attacks abuse the TCP three-way handshake by overwhelming a target with SYN
requests, consuming system resources, and potentially causing a denial of service.
• Proxies, firewalls, and IPS devices are effective at detecting and mitigating SYN flood attacks.
on
• This TCP-based attack involves sending fragmented packets of
differing sizes and out of order, along with fake sequence
uti
numbers.
r i
The target system struggles to reassemble the packets,twhich leads
b
•
to resource exhaustion, degraded performance, orD s crash
a isystem
(denial-of-service attack).
t for
IP Spoofing
N o
•
if it is coming from a legitimate h
a,
Spoofing is when an attacker disguises their IP address to appear as
Na
source, often to bypass security
checks.
e t
je
ha
Smurf Attack
• Steps: b
Su spoofs their IP address to match the victim’s IP.
• lAttacker
rn ell packets.
C o • Attacker sends UDP packets to open ports (e.g., ports 7 and 19)
that generate responses, flooding the victim’s network with traffic.
• This attack is aimed at overwhelming the target with massive
amounts of UDP traffic, causing a DoS attack.
• IP-based attacks include fragment attacks like overlapping fragments and teardrop attacks, as well
as IP spoofing attacks such as Smurf and Fraggle.
• These attacks aim to exploit network vulnerabilities, leading to denial-of-service (DoS) or bypassing
security measures by manipulating packet structures or spoofing IP addresses.
o te Spoofing Attack
• Denial-of-Service (DoS) attacks are aimed at overloading systems with traffic or requests to deny
functionality.
• A Distributed-Denial-of-Service (DDoS) attack leverages multiple machines to amplify the attack's
impact. Both are serious threats that can incapacitate networks and services.
• Man-in-the-middle and spoofing attacks are additional network attack vectors, with MITM
intercepting communications and spoofing faking identities to manipulate or steal data.
t
data to gain access or trust. This could involve pretending to be a trusted
No
IP, email, or another entity to deceive the target.
a,
• Spoofing is often used in attacks to bypass security measures like
h
access control lists (ACLs) or deceive systems/users into granting
access.
Na
Types of Spoofing
jeet
ha
• IP Spoofing: The attacker falsifies their IP address to disguise
themselves as a trusted source to bypass filters or firewall rules.
b
Su
• Email Spoofing: Attackers send emails with forged sender addresses to
l
Co
trick users into divulging sensitive information or downloading malware
(often used in phishing attacks).
By • DNS Spoofing: The attacker alters DNS records to redirect traffic to
SP
malicious websites without the user's knowledge.
ll N
• IP Spoofing allows an attacker to send traffic from a forged IP address
rn e but does not allow the attacker to receive responses. Any response is
on
• Nmap 3) codes, which are valuable for attackers during network reconnaissance.
• John the Ripper (JtR) DHCP (Dynamic Host Configuration Protocol)
uti
• Netstat •
network.
tr i b
Automatically assigns IP addresses to devices when they connect to a
•
is
Attackers can create a rogue DHCP server to intercept traffic by assigning
D
for
malicious gateway information.
Ipconfig
t
No
• A Windows command used to display network configurations and refresh
DHCP and DNS settings.
WHOIS
h a,
Na
• Tool used to query information about domain ownership and IP address
blocks.
•
jeet
Useful for attackers conducting reconnaissance to gather information about
target organizations.
Dig
bha
Su
• Command-line tool to query DNS records and obtain domain or IP address
information.
l
Co
Putty
By • Terminal emulator and file transfer application supporting protocols like SSH,
Telnet, and SCP.
SP
Nmap
ot
forcing or cracking encrypted password files.
Netstat
rn
statistics.
• Common network tools like Ping, Traceroute, and Nmap can be used by attackers to gather
information about a target network.
• Protocols such as ICMP and DHCP can be leveraged for reconnaissance or traffic interception.
• Tools like John the Ripper are used for password cracking, while WHOIS, Dig, and Nslookup
provide DNS and domain information useful for attackers during the reconnaissance phase.
on
map MAC addresses to their corresponding port on the switch.
ti
• If a switch does not have an entry for a particular device, it broadcasts
u
an ARP request to all devices.
tr i b
ARP Poisoning
D is
for
• An attacker can exploit ARP by sending malicious ARP replies,
t
No
tricking the switch into thinking the attacker's device is the legitimate
destination for traffic.
h a,
• The attacker modifies their ARP table to redirect traffic meant for the
legitimate device to their own.
Na
eet
• ARP poisoning allows attackers to intercept traffic and potentially
j
ha
modify or drop it (man-in-the-middle attack).
u b
Lack of Authentication
l Sand
C o
• ARP tables the ARP protocol itself lack built-in security or
B y
authentication
attacks.
mechanisms, making them vulnerable to spoofing
• ARP poisoning exploits the ARP protocol's lack of security to redirect network traffic.
• Attackers can send malicious ARP replies to manipulate MAC-IP mappings in the switch’s CAM
table, enabling them to intercept or alter data.
• Monitoring and implementing compensating controls like logging can help detect and prevent ARP
poisoning attacks.
for
originally used WEP.
WEP (Wired Equivalent Privacy)
t
• No
WEP was the original security protocol for wireless networks but was
a,
found to have serious vulnerabilities.
h
Na
• WPA and WPA2 were developed to replace WEP, offering stronger
et
encryption and key management.
je
Wireless Security Needs
•
bha
Wireless communication requires the following for adequate
Su
protection:
l
Co
• Access Control: Controlling who can connect to the wireless
network.
By • Authentication: Ensuring that users are who they claim to be.
ot Wireless Segregation
rn
vendors) into separate wireless networks enhances security.
C o •
•
Each group can be isolated with different security policies.
Guest networks can have limited access, while employee
networks can offer more privileges.
• Network architecture is essential to maintaining segregation and
minimizing vulnerabilities.
a,
• Signal leakage outside a controlled area can expose the network to
attack.
h
Na
et
Unlicensed Frequencies
je
• Certain frequencies, such as 2.4 GHz, 5 GHz, and 900 MHz, are
ha
unlicensed. This means any device or technology can operate within
b
Su
these bands.
• l These frequencies are widely used for Wi-Fi, Bluetooth,
ll N
to avoid interference and security breaches.
rn e
C o
• Radio frequency management is essential for controlling Wi-Fi signals and protecting
wireless networks.
• It involves managing signal strength to prevent unauthorized access from outside a
building, especially in unlicensed frequency bands like 2.4 GHz and 5 GHz.
• Effective management prevents signal leakage and enhances network security.
devices. ti on
• Widely used for internet connectivity, printing, and as hotspots for
i bu
•
str
Example: Connecting a computer to a mobile phone’s Wi-
Fi hotspot.
D i
Bluetooth
t for
N o
• Designed for close-proximity wireless communication.
ha
mobile phones
b
Cellular
l Su
• Refersoto mobile communication protocols and standards like CDMA,
y C 3G, 4G, and 5G.
BGSM,
I SSP• 5G is the latest standard, offering faster data speeds and enhanced
connectivity for mobile devices.
r C
fo RFID (Radio Frequency Identification)
s
ote • Involves readers and tags (chips or labels) for wireless tracking.
• Wireless technologies enable communication over radio frequencies without physical cables.
• Key technologies include Wi-Fi (for network connectivity), Bluetooth (for short-range device
communication), Cellular (for mobile phone communication), and RFID (for wireless tracking).
• Each of these plays a critical role in modern wireless infrastructure.
• The IEEE 802.11 wireless protocol family has evolved from 802.11 with speeds of 2 Mbps to 802.11be
(Wi-Fi 7) capable of reaching 40 Gbps.
• Frequencies range from 2.4 GHz to 60 GHz. However, security is not native to these protocols,
necessitating the use of external security measures like WPA2 and WPA3.
on
• WPA3, released in 2018, offers better encryption and authentication
mechanisms, including GCMP.
u t i
Access Control
r i b
t requiring
is
• Access control mechanisms define how wireless clients gain access to the network.
rD
• 802.1X is a common standard for dynamic access control,
•
authentication from a central server.
t
Pre-Shared Key (PSK) is another method used, f o especially for home
o
, Nusers.
networks.
Authentication Methods
a
h Protocol) methods are used in
N a
• Authentication verifies the identity of devices and
C
• Encryption
y • WEP
B (weak encryption protocol) was the original standard, now
SP
considered insecure.
CI S • WPA uses TKIP (RC4) for encryption, which has also been proven
vulnerable.
for • WPA2 uses AES (CCMP), which is much stronger and still widely used.
tes • WPA3 further strengthens encryption using GCMP (Galois Counter Mode
o Protocol) or CCMP-AES.
ll N
Integrity Protection
C o •
•
WEP and WPA lacked strong integrity measures.
WPA2 uses CCMP for integrity, providing both encryption and message
integrity.
• WPA3 enhances this with GCMP, providing even stronger protection
against tampering.
• Wireless security standards have evolved from WEP (weakest) to WPA3 (strongest).
• Key security services like access control, authentication, encryption, and integrity protection are
necessary to secure wireless communications.
• WPA3, the latest standard, provides improved encryption (GCMP) and stronger protection against
tampering and unauthorized access.
str
EAP (Extensible Authentication Protocol) Authentication:
•
exchange mechanism.
D i
A more secure option, requiring an authenticated key
•
t for
Provides flexibility for different authentication methods and
No
can support one- or two-factor authentication.
One-Factor vs. Two-Factor Authentication
• One-Factor Authentication:
h a,
Na
• Utilizes a single factor, like a password or network credential, to
et
authenticate users.
•
je
Common EAP-based one-factor methods include:
ha
• EAP-MD5 (less secure, uses MD5 hash).
b
Su
• LEAP (Lightweight EAP, proprietary to Cisco).
Co
• Two-Factor Authentication:
ot
Mutual Authentication
ll N
• To achieve the highest level of security, mutual authentication is
rn e recommended.
• Client-side authentication: Ensures the client can verify the
C o •
legitimacy of the access point (AP).
Access point authentication: Verifies the validity of the client
attempting to connect.
• This helps prevent attacks like rogue APs and man-in-the-middle
attacks.
• Wireless authentication methods include open authentication (least secure), shared key
authentication, and EAP-based authentication (most secure).
• EAP allows for one- or two-factor authentication, with two-factor providing stronger security.
• Mutual authentication ensures that both the client and access point verify each other’s legitimacy,
creating a more secure wireless network environment.
a,
weaknesses.
h
a protocol introduced with WPA2 and
Counter-Mode-CBC-MAC Protocol (CCMP)
•
t N
CCMP is a more robust encryption
WPA3.
je e
•
b ha standard.
Uses AES (Advanced Encryption Standard), which is a widely
CI S
for • WPA (Wi-Fi Protected Access) initially used TKIP to allow for better
tes hardware compatibility with WEP, but it has since been replaced due
to vulnerabilities.
o
ll N
• WPA2 uses CCMP-AES, which significantly strengthens wireless
• TKIP was a short-term fix for WEP vulnerabilities but remains susceptible to certain attacks due to
hardware compatibility issues.
• CCMP-AES, used in WPA2 and WPA3, offers significantly stronger encryption, using 128-bit AES
keys for secure wireless communication.
• CCMP is currently the most secure protocol for wireless encryption.
on
• Developed as a short-term solution to address WEP's vulnerabilities,
ti
particularly the weak initialization vector (IV) in WEP, which made it
u
easy to crack.
tr i b
•
D
which improves upon WEP's flawed static key approach. s
Key Mixing: TKIP sends each new packet with a unique encryption key,
i
•
t for
Michael: TKIP uses a Message Integrity Code (MIC) called Michael to
No
check data integrity.
a,
• Michael provides a basic form of integrity control, ensuring
h
packets have not been altered during transmission.
•
Na
However, TKIP is now considered obsolete due to security
jeet
vulnerabilities and is no longer recommended for modern
networks.
bha
WPA2 (Wi-Fi Protected Access 2) and CCMP
•
l Su
WPA2 implements CCMP (Counter Mode with Cipher Block Chaining
Co
Message Authentication Code Protocol), which uses AES for
By •
encryption and integrity.
AES in CBC-MAC (Cipher Block Chaining) mode ensures that both
es networks.
ell N • TKIP was a stopgap solution that allowed older hardware to operate
rn
with better security compared to WEP.
• TKIP was designed to replace WEP and implemented integrity protection through a Message Integrity
Code called Michael.
• However, TKIP is now considered insecure and is replaced by AES with CCMP in WPA2, which offers
robust encryption and integrity protection.
et
• SDN architecture is split into three planes:
•
je
Application Plane: Where applications and services reside.
•
bha
Control Plane: Manages the flow of traffic and network
Su
resources.
l
Co
• Data Plane: Carries the actual data and executes the
decisions made by the control plane.
By Northbound and Southbound APIs in SDN
ot
and the data plane. They enable the control plane to instruct the data
ll N
plane on handling traffic.
• VLANs allow the creation of logical local area networks using Layer 3 switches and reduce physical
wiring needs, with IEEE 802.1Q providing the standard for VLAN implementation.
• SDNs manage networks using software, divided into application, control, and data planes, and
leverage northbound and southbound APIs to handle network management and traffic control.
on
virtualization now extends to network segmentation via VLANs.
•
uti
VLANs offer a way to separate traffic between devices while using
r i
the same physical network, creating virtual tunnels that link
t b
devices into isolated logical segments.
D is
for
Security through Segmentation
t
VLANs improve security by allowing network traffic to be isolated
No
•
into different segments. For instance, different departments within
a,
a company can have their own VLANs, limiting access to their
h
Na
network resources.
•
jeet
Isolation ensures that devices within the same VLAN can
communicate freely, but devices in other VLANs cannot
ha
communicate without going through a router or firewall, adding a
b
Su
security layer.
l
Co
Layer 3 Switch and VLAN Creation
es
ot
VLAN Ports and Isolation
ll N
• Devices connected to specific ports on a switch that are
• VLANs allow the segmentation of networks into logical, isolated segments without the need for
physical rewiring, enhancing security and flexibility.
• They are created and managed using Layer 3 switches, where ports can be assigned to different
VLANs based on security and functional needs.
b h
all the routing and traffic decisions.
• The centralized
S uoncontrol allows for rapid reconfiguration of the
ol resources. enabling dynamic adjustments to traffic,
network based needs,
yC
security, and
P B
Planes in SDN: Control Plane and Data Plane
tes • Data Plane: The data plane is the execution layer that performs the
o actual forwarding of packets based on instructions from the control
ell N plane.
orn • SDN’s separation of the control and data planes simplifies network
C management and increases flexibility by decoupling decision-making
from physical devices.
CI S
or
connected to the Data Plane, making it the execution layer of the
s f SDN.
rn
Application Plane and the Control Plane. Applications send network
• The SDN architecture consists of the Application, Control, and Data Planes. Communication
between these layers is handled by Northbound APIs (Application to Control) and Southbound APIs
(Control to Data).
• The Application Plane sends requests, the Control Plane makes network decisions, and the Data
Plane executes them by routing traffic.
h aj
Benefits of VPC
u b
S
l since
C o
• Cost-effective:
infrastructures
VPCs are less expensive than dedicated private cloud
they use shared resources.
• B
y
S P Scalability: Like other public cloud services, VPCs offer easy
• A Virtual Private Cloud (VPC) is a portion of a public cloud that provides logically isolated,
customizable network environments without separate physical hardware.
• It combines the cost-effectiveness and scalability of public clouds with enhanced security
controls and virtual network isolation.
or
can isolate and direct traffic based on VLAN tagging.
ll N
networks.
rn e
C o
• IEEE 802.1Q is the standard that defines VLAN tagging and how switches and bridges handle VLAN
traffic.
• It plays a crucial role in ensuring network isolation and security for VLANs and supports
virtualization technologies like SDNs.
a,
• Frame Relay: Focuses on speed over error correction and supports
h
both permanent virtual circuits (PVCs) and switched virtual
circuits (SVCs).
Na
eet
• Asynchronous Transfer Mode (ATM): Supports high-speed
j
ha
transmission with connection-oriented virtual circuits that can be
b
permanent or on-demand.
l Su
• Multi-Protocol Label Switching (MPLS): The most advanced WAN
y Co
protocol, MPLS offers built-in security using labeling schemes and
forwarding tables. However, data can still be vulnerable to provider
B snooping, so organizations often choose to encrypt their data.
ot
links and SVCs allowing for on-demand virtual circuits, similar to
ll N
older PSTN networks.
• WANs are essential for connecting LANs across large geographical distances using protocols like
X.25, Frame Relay, ATM, and MPLS. Each protocol has unique features, with MPLS being the most
advanced, providing built-in security and fast, efficient data transmission.
a,
certain areas, which can prevent lateral movement of threats within
the network.
h
Na
et
• Switches, routers, and firewalls are used to implement
e
segmentation by controlling access between segments.
j
Bastion Hosts
bha
Su
• Bastion hosts are hardened devices (typically servers) designed to
l
resist attacks and are placed on the perimeter of a network or in a
y Co
DMZ.
B • These devices are exposed to external traffic and are usually
• Network architecture is vital for ensuring network security and performance. Elements like
defense in depth, partitioning, network segmentation, bastion hosts, and proxies contribute to a
secure network environment.
• NAT/PAT hides internal IPs, while segmentation limits the visibility of network traffic, adding
additional layers of protection.
No
security, building access controls, surveillance, and
securing the physical environment.
•
h a,
Physical Infrastructure: Securing servers, network
Na
devices, and workstations through hardware-based
jeet
measures.
ha
• Operating Systems: Implementing secure configurations,
b
patches, and hardening operating systems to minimize
l Su
vulnerabilities.
y Co
• Software Configurations: This inner layer focuses on
firewall settings, application security, and encryption to
B protect data from external and internal threats.
• Defense in depth is a security strategy that uses multiple, layered security controls to protect a
network or system.
• Each layer addresses different aspects of security, starting from policies and procedures down to
operating systems and software configurations, ensuring comprehensive protection.
je
• Access control rules can e
and control the flowaof traffic between the network segments.
h
S ub Partitioning
Importance of Internet
tes network.
on
respond to attacks.
•
u t
Preventive controls: Firewalls, intrusion prevention systems (IPS),i
access control lists (ACLs), and network segmentation.
tr i b
• s
Detective controls: Intrusion detection systems (IDS), inetwork
monitoring tools, and alerting mechanisms.
fo r D logging,
• Corrective controls: Security incident response
o t protocols,
,N
and traffic filtering or blocking.
Choke Points a
h in a network where all traffic
a
t Nfor centralized control and monitoring.
• Choke points are strategic locations
must pass through, allowing
e
jeexist at the network perimeter, where firewalls
•
h
A choke point should adevices
u b
and other security can enforce rules on both incoming and
I S
C Importance of Limiting Entry and Exit Points
for Limiting the ingress and egress points to one creates a controlled
tes •
entry and exit, which simplifies monitoring and securing traffic flow.
o
ll N
• A single point of entry and exit reduces potential vulnerabilities and
• The network perimeter serves as the boundary of an organization’s internal network, and choke
points allow for centralized monitoring and control of network traffic.
• To strengthen security, organizations should minimize entry and exit points, applying preventive,
detective, and corrective controls at the perimeter.
et
• Security risks arise when public-facing applications, like an e-
je
commerce platform or email server, are hosted within the
ha
internal network.
b
Su
• Hosting these applications internally would allow external users
l
from the public network to access the internal environment,
y Co
exposing critical assets to potential attacks.
BSecurity Benefits of Segmentation
ll N
segments, allowing controlled access while protecting sensitive
rn e •
data from external threats.
Best practices suggest hosting public-facing services (like
C o websites or email) in a DMZ (Demilitarized Zone) to maintain
security separation between public and private networks.
• A Bastion Host is a fortified server placed in a DMZ to handle public-facing services securely.
• The DMZ provides a buffer zone between the internal network and the internet, controlled by
boundary routers to manage traffic flow and enhance network security.
on
services.
• ti
Disadvantage: If a server (e.g., the web server) is compromised, attackers
u
i b
can gain a foothold in the network and potentially move laterally to other
tr
servers.
Microsegmentation in Virtualized Networks
D is
•
t for
Virtual firewalls can be deployed in front of each server at low cost,
No
creating separate DMZs for each server (web, FTP, mail).
a,
• Each virtual firewall can have strict firewall rules for its respective
h
server, such as allowing only web traffic for the web server, only FTP
Na
traffic for the FTP server, etc.
•
jeet
Benefit: If one server is compromised, attackers cannot easily move to
other servers as they must still penetrate other firewalls.
bha
Benefits of Microsegmentation
•
l Su
Tighter security: Each segment has specific firewall rules, making it
Co
more difficult for attackers to bypass security.
I SSP • Granular firewall rules: More precise control over traffic and security in
each segment, enhancing network protection.
r C Technologies Supporting Microsegmentation
fo
es • Network overlays/encapsulation: Virtual networks that are overlaid on
ot
top of physical networks.
ll N
• Distributed firewalls: Multiple virtual firewalls deployed across
rn e segments.
• Microsegmentation enables the virtualization of networks into smaller segments, each with
individual firewall rules, enhancing security and preventing lateral movement of attackers.
• Technologies such as distributed firewalls and IDS/IPS further support this approach, providing
granular protection for each network segment.
ti on
connection to the server, but the server recognizes the connection
as being from the proxy.
i bu
Role in Security
s tr
i
D security
•
o rdestinations.
Proxies are often used to filter requests and enforce
f
t
rules by blocking traffic destined for malicious
o
Proxies provide enhanced security by N
•
a ,cancontrolling what content can
ah
reach the client and what the client access, thus minimizing
tN
exposure to threats.
e e
ajfound
Layer 7 in OSI Model
• h
b they handle
Proxies are usually at Layer 7 (Application layer) of the OSI
S u
model because intelligent routing and decision-
makingo l regarding application-level traffic.
C
y of Web Proxy Usage
B
Example
I SSP• Amalicious
web proxy is used to filter web traffic. It can block access to
C domains or unsafe content, ensuring that the user is
tes
o
ell N
orn
C
• A proxy acts as an intermediary between a client and a server, enhancing network security by
filtering and blocking malicious traffic.
• By making intelligent decisions at the Application layer (Layer 7), proxies help enforce rules that
secure the environment from potential threats.
rD
multiple
f o
devices to use the same public IP address simultaneously.
t
o
, N is associated with a
Role of PAT in Port Translation
a
h to port 1058), allowing
• PAT ensures that each outgoing connection
a
t N through the same public IP while
unique port (e.g., port 1037 is translated
je e
multiple devices to communicate
maintaining unique connections.
h a
ub
NAT and PAT in Security
S
C ol networks.
•NAT and PAT add a layer of security by hiding internal IP addresses
B y reconnaissanceThisonmakes
from external
perform
it more difficult for attackers to
the internal network structure, as the
S Pinternal IP addresses are masked.
CIS
for
tes
o
ell N
orn
C
• NAT translates private IP addresses to public ones, allowing internal devices to communicate with
the internet.
• PAT ensures that multiple devices can share a single public IP address by assigning unique ports to
each connection, providing both efficiency and an additional layer of security.
Types of Firewalls h a,
1. Packet Filtering Firewallst N
a
je e
ha
• Simple packet filtering operates at Layer 3 of the OSI model
b
(Network Layer).
P B valid session.
a ,
• Application-Level Proxy Firewalls
a h
• Pros: Deep packet
etN inspection, ability to filter based on
a je
specific applications, provides granular control.
•
u bhanalysis
Cons: High processing overhead, slower performance due to
l S
detailed of traffic.
y Co
P B
I SS
r C
fo
es
ot
ell N
orn
C
• A firewall is a security control that filters network traffic based on predefined rules and is essential
for protecting internal networks from external threats.
• Different firewall technologies offer varying levels of security and performance, from simple packet
filtering to application-level inspection.
• Application-level firewalls provide the most detailed traffic filtering but come with increased
processing overhead.
t Na statistics on network
je
protocols and connections,e which helps with monitoring and
• Additionally, CBAC can give advanced
analysis.
b ha
u
SFiltering
l
Session-Based
o the state and context of a session (similar to stateful
y
• CBAC Ctracks
B
firewalls but with deeper protocol analysis).
s f needed and only for the duration of the session, minimizing risk
o te exposure.
ell N
orn
C
• CBAC adds context awareness to firewall filtering, inspecting traffic at the Application Layer for
enhanced security.
• It allows for deep traffic inspection and provides additional security capabilities, such as DDoS
detection and real-time traffic analysis.
• The main advantage of CBAC is its ability to filter TCP/UDP traffic based on the session state and
content, making it a more advanced and dynamic method of access control compared to traditional
static packet filtering.
•
tr
A firewall software resides on the host, controlling all traffic between the two
s
interfaces.
D i
for
• Pros: Simple architecture, cost-effective.
• Cons: Single point of failure (host), less flexible.
t
No
3. Screened Host Architecture:
• Adds a bastion host (a hardened server) to the architecture, which serves as an
a,
intermediary between the internal and external network.
h
Na
• A router filters external traffic, forwarding allowed traffic to the bastion host, which
provides application-level security.
et
• Pros: Better security than dual-homed, single point of defense.
•
je
Cons: The bastion host can still be targeted for attacks.
ha
4. Screened Subnet Architecture:
b
Su
• Also known as a Demilitarized Zone (DMZ) architecture.
• Consists of two screening routers, one between the internal network and the DMZ,
l
Co
and the other between the DMZ and the external network.
• Pros: Provides an additional layer of defense; external services (like web or email)
SP
• Cons: More complex, requires careful configuration of two routers.
5. Three-Legged Firewall Architecture:
CI S • A single firewall with three interfaces: one connected to the internal network, one
r
to the external network (internet), and one to the DMZ.
fo • Allows for secure separation of internal, external, and DMZ traffic with a single
es firewall device.
ot
• Pros: Simplifies network design with fewer devices, flexible rules for controlling
traffic between segments.
rn
Firewall Architecture Considerations
C o •
•
The architecture selected should reflect the security requirements and operational needs of
the organization.
For example, an e-commerce business may require a screened subnet or three-legged firewall
to separate web services from internal databases.
• The cost, complexity, performance, and threat model of the organization should guide the
choice of architecture.
• Firewall architectures are tailored based on an organization’s specific needs, balancing between
security and performance.
• The simplest form is packet filtering, while more sophisticated architectures like screened
subnets and three-legged firewalls offer layered security for sensitive services.
• The DMZ in screened subnet and three-legged firewall architectures helps isolate public-facing
applications, enhancing security.
olfiltering is fast.
on header information without inspecting the content of the packet,
C
packet
• By Low cost: Packet filtering firewalls are simple and cost-effective to
S P deploy.
CIS Cons
for
tes • Limited security: Since only Layer 3 information is analyzed, the
o firewall cannot examine the payload or provide deeper inspection
ll N
into application-level data.
• Packet filtering firewalls provide basic security by filtering traffic based on Layer 3 packet
headers.
• Efficiency and low cost are key benefits, but security is limited due to the lack of application-layer
filtering or session awareness.
• Best suited for simple, low-risk environments where speed is a priority and advanced threats are
less likely.
i on
application-layer data, session information, and even packet
t
content.
i bu
•
tr
The architecture allows the host to serve as a gatekeeper, managing
s
traffic between two distinct network segments.
D i
for
• Can use advanced firewall technologies like stateful inspection,
t
circuit-level proxy, and application-level filtering.
Pros
No
•
h a,
Increased Security: By having two network cards, the host can
Na
physically separate traffic between the trusted and untrusted
et
networks.
•
je
This makes direct packet forwarding between the two
bha
networks impossible without the host’s decision-making
Su
process.
•
l
Granular Control: The dual-homed host can make more complex
y Co
decisions than simple packet filtering, using techniques like stateful
SP
Cons
es
ot
• Single Point of Failure: The dual-homed host becomes a critical single
point in the network. If it goes down or is compromised, the network
• A dual-homed host has two network cards and can perform more advanced filtering than a simple
packet filtering router.
• It operates across all OSI layers, making it capable of complex decision-making for traffic between
two network segments.
• While providing enhanced security, it can also introduce bottlenecks and act as a single point of
failure.
•
D i
The bastion host adds an additional layer of filtering by inspecting traffic at
for
higher layers of the OSI model, such as application data.
Advantages
t
• Layered Security:
No
•
h a,
The packet filtering router performs basic checks before allowing any traffic
to reach the bastion host. This creates a layered defense system, making it
Na
harder for attackers to penetrate.
•
jeet
Attackers must first bypass the router before attempting to compromise the
bastion host.
•
bha
Performance Optimization:
Su
• The router handles simpler decisions, reducing the load on the bastion host,
l
which only processes traffic that has passed the first layer of filtering.
Co
• Versatility:
By • The bastion host can be highly customized, with various firewall technologies
applied based on specific security needs (e.g., application-level filtering,
SP
stateful inspection).
CI S Disadvantages
ot • Potential Bottlenecks:
ll N
• If the router or bastion host becomes overloaded with traffic, it can cause a
• The screened host architecture combines a packet filtering router with a bastion host, providing
multiple layers of filtering and enhanced security.
• Attackers would need to bypass the router before targeting the bastion host, offering layered
defense.
• This architecture offers versatility but can be complex to configure and may experience
bottlenecks under heavy traffic loads.
on
• The D MZ acts as a buffer zone between the public and internal networks.
•
uti
Pub lic-facing services like web servers, mail servers, and D NS servers can
reside in the DMZ, making them accessible to external users while limiting
access to the internal network.
tr i b
Advantages
• Enhanced Security:
D is
for
• The dual-firewall setup creates two layers of defense, making it difficult for
attackers to reach the internal network.
t
No
• If an attacker compromises the D MZ, they still need to bypass the second
a,
firewall to access internal resources.
h
• Traffic Segmentation:
Na
• The architecture allows for sp ecific traffic routing—external traffic is directed
et
only to the DMZ, while the internal network remains isolated. This segmentation
limits the spread of attacks.
je
ha
• Vendor Diversification:
b
• Using two firewalls from different vendors reduces the risk that a vulnerability
Su
in one firewall will affect the entire system. If one firewall has a weakness, the
l
second firewall from a different vendor is unlikely to have the same vulnerability.
Co
Disadv antages
By • Cost:
• The deployment of two firewalls increases the cost of both hardware and
SP
software.
s
• Configuring and managing two firewalls requires more technical ex pertise and
ote • Latency:
careful coordination, especially if they are from different vendors.
ll N
• The extra layer of security can introduce network latency, particularly if both
• A screened subnet architecture uses two firewalls to create a DMZ between the external and
internal networks.
• It provides enhanced security and traffic segmentation by isolating public-facing services from the
internal network.
• While costly and complex, using two firewalls from different vendors increases security by
mitigating the risk of a shared vulnerability.
on
Key Features
• Multiple Zones:
uti
•
tr i b
The firewall can support three or more distinct network zones:
•
(e.g., the Internet).
D is
External Network: Represents the untrusted, public network
•
t for
DMZ: A zone where public-facing servers (e.g., web servers,
No
mail servers) reside. These servers need to be accessible
from the external network.
•
h a,
Internal Network: Contains highly sensitive data and is not
Na
accessible directly from the external network.
et
• Traffic Control:
•
je
The firewall controls traffic between the three zones, allowing
ha
specific rules and policies to be applied to each connection point.
b
Su
• For example:
SP
controlled, allowing only certain types of connections, such
as database queries from a web application.
CI S Security Customization
for • The three-legged firewall allows for customized security policies tailored to
ot
• For instance, the firewall could apply lenient rules for the external
ll N
network, stricter rules for the DMZ, and the strictest rules for traffic
moving into the internal network.
rn e • Granular Security:
No
the management and monitoring of network traffic are centralized,
a,
reducing administrative complexity.
Disadvantages
h
• Single Point of Failure:
Na
•
jeet
If the firewall fails, all three network zones become inaccessible,
ha
making this a single point of failure. Therefore, high availability
features or redundancy may be necessary.
b
Su
• Resource Intensive:
l
Co
• The firewall must handle traffic for three separate zones, which can
increase processing load, especially if deep packet inspection or
By complex rules are applied. This can slow performance if not properly
SP
sized.
for want to securely host public-facing applications (e.g., websites) in a DMZ while
ll N
separate its public web server from its payment processing system in the
internal network, ensuring that external users never directly access sensitive
rn e data.
C o
• A three-legged firewall has three connection points that create multiple network zones: the
external network, DMZ, and internal network.
• This architecture allows for customized security policies between zones and provides cost-
effective network protection.
• While versatile, it can be a single point of failure and may require resource-intensive
management.
for
to investigate and respond to incidents.
t
No
Intrusion Prevention System (IPS)
• IPS also inspects data, but unlike IDS, it prevents or mitigates intrusions
by actively blocking traffic.
h a,
•
Na
Additional Action: Automatically takes corrective measures
et
(e.g., dropping malicious packets, resetting connections).
je
ha
• Main Role: Provides real-time protection by actively stopping
threats.
b
Su
Types of IDS/IPS
l
Co
1.Network-Based IDS/IPS (NIDS/NIPS)
rn e Mirror/Span/Promiscuous Port
on
• Detection Methods • Useful for detecting new or unknown threats but may lead to
• Ingress and Egress Monitoring false positives.
uti
• Whitelisting and Blacklisting Ingress and Egress Monitoring
tr i b
• Ingress: Monitoring of incoming traffic into a network.
D is
for
• Egress: Monitoring of outgoing traffic from a network.
t
• Key Role: Ensures both incoming and outgoing traffic is inspected for
No
malicious behavior, preventing data exfiltration or external threats.
a,
Whitelisting and Blacklisting
h
Na
• Whitelisting: Only allows traffic from specific trusted IP addresses; all
et
other traffic is blocked.
•
je
Pro: Highly secure but may block legitimate traffic
ha
unintentionally.
b
Su
• Blacklisting: Specifically blocks traffic from known malicious IP
l
addresses; all other traffic is allowed.
y
•
Co Pro: Easier to implement, but new or unknown threats might
B bypass the blacklist.
I SSP
r C
fo
es
ot
ell N
orn
C
• IDS and IPS systems perform data inspection, with IDS focusing on detection and IPS providing
prevention.
• IDS/IPS systems can be network-based or host-based, with different monitoring approaches for
traffic and host activities.
• Detection methods include signature-based for known threats and anomaly-based for unknown
or evolving threats.
• Ingress and egress monitoring are key for securing traffic flow, and whitelisting/blacklisting
strategies add additional layers of protection.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Data Inspection
Definition of Data Inspection
• Definition of Data Inspection
• Virus Scanning • Data inspection refers to the process of monitoring and examining
• Stateful Inspection transmitted data to ensure compliance with security rules.
• Content Inspection • It focuses on detecting unauthorized or malicious data and triggering
appropriate actions when a violation is detected.
Virus Scanning
• Function: Scans files for known malware or virus signatures.
on
• Mechanism: Compares files against a database of known malware
signatures to detect malicious content. t i
u the
• Example: Antivirus software scanning email attachments to
tr i b
block
delivery of infected files. is
Stateful Inspection
fo rD
• Function: Tracks and analyzes the stateN ofo
t
communications between
systems.
h a,
• Mechanism: Maintains a dynamic
t Na state/context table to follow the
je e
status of active network connections.
• Example: A firewall
b hathat inspects and tracks connection states to
S uaccess.
ensure that only valid communication flows are allowed, preventing
ol
unauthorized
C
y Inspection
Content
B
S P• Function: Inspects transmitted mobile code or content for compliance
CIS
with defined security rules.
C o
• Data inspection ensures transmitted data adheres to security rules by identifying threats like
malware or harmful scripts.
• The key methods include virus scanning, stateful inspection, and content inspection, all of which
add layers of defense.
• Proper data inspection safeguards the network by actively monitoring and responding to potential
security threats.
on
• Pros and Cons of Host-Based • Requires proper sensor placement for maximum efficiency.
IDS/IPS
uti
b
• Example: A NIDS placed on a network's main router monitors traffic entering
• Example Use Cases
r i
and leaving the network, alerting administrators to any suspicious traffic
t
patterns.
D is
for
Host-Based IDS/IPS (HIDS/HIPS):
•
t
Installed directly on specific devices (like servers or mission-critical
No
systems) and monitors that device's activity.
•
itself.
h a,
Provides more detailed visibility into the activity occurring on the device
• Pros:
Na
•
je et
Granular protection at the host level, making it highly effective for
protecting critical systems.
•
b ha
Can detect internal attacks and changes made directly on the host.
• Cons:
l Su
•
o Resource-intensive (requires processing power and storage on each
yC
host).
B •
P• Example:
Does not monitor broader network traffic, limited to the host device.
for
es • Network-Based IDS/IPS: Monitors the flow of data across network segments
ot
(broader coverage).
ll N
• Host-Based IDS/IPS: Focuses on monitoring activity within a specific device
C o
• Network-based IDS/IPS provide broad monitoring of network traffic and can detect threats across
multiple devices, while host-based IDS/IPS offer detailed monitoring of specific systems.
• A combination of both types provides the most comprehensive protection by covering both the
network level and individual hosts.
on
Detection
•
hashes, suspicious IP addresses, or byte sequences).
uti
Relies on known attack signatures (such as malicious file
for
existing signatures.
t
No
• Example: An IDS detects malware by matching the packet's
signature with a known malicious file hash.
• Anomaly-Based Detection:
h a,
•
Na
Detects deviations from normal behavior by establishing a
jeet
baseline of expected network activity.
ha
• Pros: Can detect unknown or new threats.
•
b
Cons: Resource-intensive and can result in false positives.
•
l SuExample: An IDS raises an alert when a spike in network traffic
Co
deviates from normal patterns.
SP
• Stateful Matching:
for •
triggers an alert or blocks traffic.
Statistical Anomalies:
es
ot
• Detects statistical deviations from normal behavior patterns,
ll N
triggering alerts or blocking suspicious traffic.
rn e • Traffic Anomalies:
• Mirror, span, and promiscuous ports are essential for IDS/IPS, enabling devices to monitor network
traffic without disrupting it.
• Signature-based detection works well against known threats, while anomaly-based detection can
catch new threats by identifying unusual network behavior, though it requires more resources and
can lead to false positives.
on
• Prevents data loss or the unauthorized transmission of
sensitive information outside the network.
u t i
• Can also detect compromised systems attemptingito
tr b
communicate with external attackers.
is
D and block
Example: Monitoring outbound traffic to r
•
t fo detect
unauthorized file transfers or command-and-control
o
, NMonitoring:
communications from infected machines.
• a
h requires analyzing traffic in both
Importance of Both Ingress and Egress
a
t Nattacks and detect data exfiltration.
• Comprehensive monitoring
e
directions to prevent
je Protects the network from external
•
h a
Ingress Monitoring:
u b
threats.
S
lEgress
•
C o Monitoring: Prevents insider threats, data
breaches, and outgoing malicious activity.
•
y
BRole of IDS/IPS in Monitoring:
S P
CI S • IDS/IPS should be placed in strategic positions to monitor
both incoming (ingress) and outgoing (egress) traffic.
for • An IDS/IPS system monitoring ingress can detect suspicious
tes traffic before it enters the network, while monitoring egress
o
ll N
can prevent data theft or malicious activity from being sent
outside.
rn e
C o
• Ingress monitoring focuses on detecting threats entering the network, while egress monitoring
focuses on threats exiting the network.
• Both are critical for protecting against external attacks and preventing data loss or unauthorized
communications from inside the network.
Na
• Example:
et
• A network may employ a deny list to block known malicious
je
IP addresses, preventing access to those sources.
bha
Importance of Terminology:
Su
• The terms "allow list" and "deny list" are gaining popularity as they
l
Co
avoid the racial connotations associated with "whitelist" and
By "blacklist."
• Awareness of these terms is essential, as both may appear on exams
r C Use Cases:
fo • Allow Lists: Commonly used for restricting access to a limited number
es of approved services, enhancing security by minimizing exposure to
ot untrusted sources.
ell N • Deny Lists: Useful for preventing access to known harmful sites or IPs,
• Allow lists permit access only to specified IP addresses, blocking all others, while deny lists explicitly
block certain IPs, allowing all others.
• The shift toward using the terms "allow list" and "deny list" reflects a more inclusive language in
cybersecurity practices.
ell N systems.
orn
C
A sandbox is a crucial cybersecurity tool that allows for the safe execution and analysis of
untrusted code. It aids in detecting true threats while minimizing the risk of undetected
malicious activity, making it essential for both IDS/IPS systems and malware analysts.
CoNegative:
4. False
y
P B • Description: No alert is generated despite an ongoing
I SS attack.
tes
o
ell N
orn
C
• Understanding alert statuses is crucial for effective security monitoring. Tuning security
tools is necessary to balance between minimizing false positives and preventing false
negatives, which can leave the organization vulnerable. Effective tuning varies
depending on the organization's specific context and threat landscape.
ote
crime they were already planning.
ll N
• Example: Using a honeypot to attract a known attacker.
rn e • Entrapment:
• Honeypots and honeynets serve as valuable tools in cybersecurity by detecting and analyzing
malicious activities.
• However, organizations must navigate the legal implications of their use, ensuring they do not
engage in entrapment.
• Understanding the balance between enticement and entrapment is crucial for ethical security
practices.
for
ensuring that even if traffic is intercepted, it remains unreadable without
the proper decryption key.
t
• Types of VPNs: No
•
h a,
Client-based VPNs: Installed on the user’s device, securing
Na
remote access to the corporate network.
•
jeet
Site-to-Site VPNs: Securely connect two different networks,
often used between a company’s headquarters and branch
bha
offices.
Tunneling:
l Su
Co
• Tunneling is a process that involves encapsulating a data packet inside
By •
another packet for secure transmission.
Tunneling protocols include PPTP, L2TP (usually combined with IPsec for
r C Split Tunneling:
fo • This feature allows users to access corporate resources via a VPN while
rn
Authentication and Encryption:
• VPNs are essential tools for securing remote access, especially over untrusted networks.
• They provide encryption and secure communication channels, reducing the risk of data interception.
While split tunneling offers convenience, it also introduces security risks, and organizations must
carefully weigh these factors when implementing remote access solutions.
Na
the number of vulnerable entry points into the corporate network.
et
• By securing these devices, organizations can prevent or mitigate
je
cyberattacks before they impact critical systems.
ha
Role of Network Access Control (NAC):
b
•
l Su
NAC solutions complement endpoint security by managing which
Co
devices can connect to the corporate network.
By • NAC ensures that only healthy, compliant devices with updated security
measures (e.g., antivirus or encryption) are allowed access to the
I SSP •
network.
Devices that fail to meet the security requirements may be quarantined
r C or denied access.
fo
es Evolved Endpoint Security Strategies:
ll N
comprehensive strategies, including:
C o ✓
✓
Endpoint Data Leak Prevention (DLP) solutions
Endpoint Detection and Response (EDR) platforms
✓ Threat detection, response, and continuous monitoring
• Endpoint security protects individual devices within a corporate network, helping to reduce potential
entry points for attackers.
• Modern strategies go beyond antivirus solutions, incorporating NAC, DLP, and EDR systems to
ensure robust protection.
• NAC plays a critical role in verifying device security and preventing unauthorized access to the
network.
No
network, independent of the original packet’s intended route.
•
h a,
The outer packet’s header dictates the network route, effectively
"forcing" the packet to travel through a predetermined path.
Na
et
• However, the encapsulated packet remains readable unless encryption
is applied.
je
ha
Tunneling with or without Encryption:
b
•
l Su
Tunneling by itself does not provide security—it only encapsulates the
Co
packet. If security is needed, the encapsulated packet must be
I SSP • Without encryption, the encapsulated packet can still be read by any
ell N important:
orn • Lower layers (Layer 2): Highly efficient but with limited functionality.
C • Higher layers (Layer 7): Provide more functionality, such as application-
level capabilities, but are less efficient.
i b u
• This encapsulation allows GRE to support multiple protocol types and
s tr provide
flexibility for network routing.
i
Use Cases for GRE:
f o rtoDbe routed across an IP
•
o t
GRE is useful in scenarios where multiple protocols need
network.
N
For example, it can transport IPv6 packets,over an IPv4 network, or multicast
•
a
h natively support it.
a
traffic over an IP network that does not
• GRE is often used in VPNs, where
e tN it provides routing flexibility alongside other
aje
security protocols like IPsec.
Pros of GRE:
h
b GRE can encapsulate multiple protocols, making it versatile
•
S u
Protocol Flexibility:
o l Multicast
for different network needs.
•
y C which are not
Supports Traffic: GRE allows multicast traffic to be routed over IP
B networks, always natively supported.
P bridge between different network
S • IPv6 Compatibility: GRE can tunnel IPv6 traffic over an IPv4 network, offering a
CIS
types.
tes • No Encryption: Unlike IPsec, GRE does not provide any encryption or security
ll N
tunnel is not protected from interception.
rn e • Overhead: GRE adds an additional header to each packet, which increases the
o
size of the packet and can lead to network overhead and reduced performance.
C • Not Secure by Itself: Since GRE does not provide confidentiality or integrity
protection, it is typically combined with IPsec for secure tunneling.
• Generic Routing Encapsulation (GRE) is a versatile tunneling protocol that enables the encapsulation
of multiple network protocols over IP networks.
• Its strength lies in its ability to support IPv6 and multicast traffic over IP networks.
• However, GRE does not offer security, so it is commonly used in combination with other protocols
like IPsec for secure transmission.
je et
and performance, as not all traffic needs to go through the corporate
VPN, which can result in faster browsing and downloads.
•
b ha Users can access corporate resources
Increased Efficiency:
securely viau
l S the VPN while simultaneously using direct connections
Co and Risks:
for less sensitive tasks.
y
BSecurity Risks: Split tunneling can bypass corporate security
Weaknesses
P
S controls, exposing the user's device to threats from unsecured
•
CI S
or
networks, such as hotel or public Wi-Fi. Malicious actors can exploit
o te network.
• Split tunneling allows for efficient use of bandwidth and optimized performance by
routing non-corporate traffic outside the VPN.
• However, the feature poses significant security risks, as it can bypass corporate security
controls, leaving the device vulnerable to attacks and reducing the organization's ability
to monitor or protect network traffic.
on
through a proxy server.
• SSL/TLS (Secure Sockets Layer/Transport Layer Security): Layer 4 protocol
u ti
(Transport Layer), providing encryption for web traffic, commonly used in HTTPS.
r i b
ist
• IPsec (Internet Protocol Security): Works at Layer 3 (Network Layer), offering
encryption and authentication to secure IP packets.
GRE (Generic Routing Encapsulation): Encapsulates packetsD
for
• at multiple OSI layers,
but lacks encryption by default.
L2TP (Layer 2 Tunneling Protocol): Operates at Layert2 (Data Link Layer). Often paired
•
with IPsec to add encryption.
N o
L2F (Layer 2 Forwarding Protocol): Another ,Layer 2 protocol, but less commonly used
ha
•
today.
a
•
e t N A basic Layer 2 tunneling protocol for
PPTP (Point-to-Point Tunneling Protocol):
aje
VPNs, which includes encryption.
PPTP vs. L2TP:
h
ubat Layer 2 and includes built-in encryption.
• PPTP (Point-to-Point Tunneling Protocol):
•
S
• olSimple and efficient, but vulnerable to attacks due to weaker encryption
Operates
C
y • mechanisms.
P B Commonly used in older VPNs, but has been largely replaced due to security
S concerns.
CIS
• L2TP (Layer 2 Tunneling Protocol):
or
• Also a Layer 2 protocol, but lacks encryption on its own.
s f • Typically paired with IPsec to create a secure VPN, where IPsec provides the
ll N
• More secure than PPTP, but can be slightly slower due to the added
encryption overhead.
C o • A VPN (Virtual Private Network) is not just a tunnel—it requires encryption for security.
Protocols like IPsec, SSH, and SSL/TLS add encryption to tunnels, ensuring secure
transmission of data across untrusted networks like the internet.
• L2TP is paired with IPsec to form a secure VPN, while PPTP offers its own encryption
but is less secure.
on
packets.
•
t i
Provides data-origin authentication and replay protection, but it does not
u
•
encrypt the payload.
Encapsulating Security Payload (ESP):
t r i b
is
rD
• Provides encryption of the payload, ensuring confidentiality in addition to the
o
integrity, data-origin authentication, and replay protection offered by AH.
t f
o
• ESP is commonly used for its encryption capabilities, making it essential for
secure VPN communications.
, N
IPsec Modes: Transport and Tunnel
h a
• Transport Mode:
a
•
Commonly used ine
t N of the IP packet is encrypted or authenticated.
In this mode, only the payload
•
a je end-to-end communications (e.g., client to server) within
h
a trusted network.
Tunnel Mode: b
•
S u
•
l
o offering maximum security.
The entire IP packet (header and payload) is encapsulated and encrypted,
y C
P B • Typically used in site-to-site VPNs where two networks are securely
connected over an untrusted network like the internet.
for • It generates the session keys that are shared between the two endpoints of the VPN,
tes ensuring that communication is encrypted with a dynamically created key that is valid
o
only for the duration of the session.
ll N
Security Associations (SAs):
C o •
session in IPsec.
Each SA contains parameters such as the encryption algorithm, session keys, and
authentication methods.
• An SA is needed for each direction (inbound and outbound) of the communication and
for each component (AH or ESP) being used.
• IPsec is a robust protocol suite used for VPNs, offering both authentication through AH and
encryption through ESP.
• It can operate in transport or tunnel mode, depending on the level of security required. IPsec is
integrated into IPv6, making it a standard for modern secure communications.
• Additionally, Internet Key Exchange (IKE) and Security Associations (SAs) are essential for the secure
exchange of session keys and for defining the security parameters of the VPN connection.
a,
and authenticity are critical.
h
Na
• Encapsulating Security Payload (ESP):
• ESP offers more robust security by providing encryption in addition to integrity,
jeet
data-origin authentication, and replay protection. It ensures confidentiality by
encrypting the payload, making it the preferred choice for VPNs.
ha
Internet Key Exchange (IKE)
b
Su
• IKE is the protocol used to exchange keys securely between the two endpoints of an IPsec
VPN.
l
Co
• Since VPNs require symmetric encryption (using the same key at both ends), IKE ensures
By that both endpoints generate and use the same session key. It’s essentially a version of the
Diffie–Hellman key exchange protocol and helps establish secure communication between
SP
the endpoints.
for communication session in IPsec. Since communication is one-way, two SAs are
s
needed for bi-directional communication—one for each direction.
ote • If both AH and ESP are used in the connection, four SAs are required: two for AH and
two for ESP, each for inbound and outbound communication.
ll N
Key attributes in an SA include:
rn e • Authentication algorithm
C o •
•
Encryption algorithm
Encryption keys
• Mode (transport or tunnel)
• Sequence number
• Expiry of the SA
• IPsec provides a robust solution for securing communications, offering both integrity and encryption
through its AH and ESP subprotocols.
• It operates in two modes: transport, which encrypts only the payload, and tunnel, which encrypts
the entire IP packet.
• IKE is essential for establishing secure key exchange, while Security Associations ensure the secure
management of each communication session.
l
server now S
with the server’s
share the same session key for secure communication.
Asymmetrico
y C and Symmetric Cryptography in SSL/TLS:
• BAsymmetric Cryptography: The server's public key is used to encrypt the
CIS
• Symmetric Cryptography: After the session key is shared, symmetric
or
encryption is used for fast, secure communication between the client and the
o te DROWN Attack:
ell
decrypt communications between a client and server.
orn • It’s crucial to disable backward compatibility with SSLv2 to protect against this
attack. Server owners should ensure private keys are not used with servers that
C allow SSLv2 connections.
• SSL/TLS is vital for securing online communications, with TLS being the modern standard.
• The handshake process ensures that a session key is securely created, using both asymmetric and
symmetric encryption to protect data during transmission.
• Proper implementation is necessary to avoid vulnerabilities such as the DROWN attack, which can
exploit older SSL protocols.
et
specific applications or services.
je
IPsec VPN: Does not encrypt connections by default but uses IKE
ha
•
(Internet Key Exchange) for key management and data
b
Su
authentication. It is more versatile for encrypting traffic across entire
l
Co
networks, but the setup can be more complex.
ll N
authentication.
• TLS VPNs provide easier setup, application-specific encryption, and more granular control at the
Transport layer, while IPsec VPNs offer broader network-level encryption at the Network layer but
with added complexity.
• The choice between TLS and IPsec VPNs depends on organizational needs such as performance,
security, and ease of management.
i bu
•
and allows users to connect to network resources securely.
s tr
It provides AAA functionality—authentication, authorization, and accounting—
i
•
fo rD
RADIUS operates at the application layer and uses UDP for transmission.
However, it has limitations in security as it only obfuscates user passwords.
TACACS+:
o t
• Terminal Access Controller Access Control System
developed by Cisco as an improvementa
N Plus (TACACS+) was
, RADIUS.
a h over
t N It isand
• It uses TCP for reliable transmission and encrypts all packets, not just
e
passwords, making it more secure. often used for device administration
j e
tasks, providing robust authentication access control.
Diameter:
b ha to RADIUS and offers enhanced security. It addresses
• Diameter is theu
SEAPsuccessor
o l
RADIUS’s shortcomings by providing stronger encryption and improved security
o • TACACS+: More secure with full packet encryption and uses TCP, making it
ll N
reliable for administrative tasks.
rn e • Diameter: Successor to RADIUS with advanced security features like EAP and is
o
more scalable.
C
• Remote authentication protocols like RADIUS, TACACS+, and Diameter are essential for ensuring the
security of remote access.
• RADIUS provides basic AAA services but has limitations in security, while TACACS+ improves upon it
with full encryption.
• Diameter is the modern successor, offering enhanced security and scalability, making it suitable for
today’s complex networks.
on
1. Need to Know:
1.
ti
Subjects (users or processes) should only have access to data if they
u
absolutely need it to perform their tasks.
t r i b
2.
i
Example: A HR executive may have access to employee
s salaries but
rD
not detailed technical documentation.
2. Least Privilege:
fo
Users or systems should be granted o thetminimum level of access
, N the risk of abuse or
1.
necessary to perform their jobs, reducing
compromise. a
h on content management may only have
a
t Ndocuments without the ability to modify them.
2. Example: An intern working
e
access to read certain
Separation of Duties:je
ha are broken down into discrete parts, and no single
3.
b
Su process.
• Critical tasks
l
individual has the necessary permissions to perform all aspects of a
rn
property.
No
(read, write, delete, execute) users are allowed to perform.
a,
• Provide individual accountability: Tracks and logs user actions to
h
ensure that management knows who is doing what. This supports
Na
auditing and investigation of suspicious activity.
jeet
Access Control Principles:
ha
• Need to Know:
b
Su
• Definition: Only personnel who require access to an asset to
l perform their job should be granted access.
y Co
• Example: A marketing employee shouldn’t have access to
B sensitive financial records unless it's necessary for their role.
ll N
settings.
rn e • Separation of Duties:
• Access control mechanisms protect an organization’s assets by limiting and controlling who can
access specific resources and what they can do with them.
• The key principles—need to know, least privilege, and separation of duties—are applied throughout
access control strategies to prevent unauthorized access and ensure individual accountability.
threats o
l attack surface, mitigating risks from insider
C or accidental misconfigurations.
y of Duties and Responsibilities:
B
Separation
tes into the accounts payable system, while another confirms its accuracy,
o reducing the risk of creating fake vendors.
• The principles of access control—need to know, least privilege, and separation of duties—play
critical roles in protecting organizational assets.
• These principles ensure that access is limited to only those who require it, permissions are kept to
the minimum necessary, and critical tasks are divided to prevent fraud and errors.
on
• Information: Access to sensitive data, whether digital or
physical (e.g., files, databases).
uti
•
r i b
Personnel: Ensuring the right personnel access appropriate
t
resources based on their roles.
D is
for
• Applications: Controlling access to software applications,
t
tools, and platforms used within the organization.
Access Control System:
No
a,
• Definition: The mechanism responsible for controlling a subject's
h
Na
access to an object. A subject refers to a user, while an object is the
et
resource or data the user attempts to access.
je
• Mediation: Access is mediated based on a set of predefined rules. This
ha
can include role-based access control, mandatory access control, or
b
Su
discretionary access control.
l
Co
• Logging and Monitoring: All access attempts and activities are logged
to ensure accountability and assurance that the access control
By system is functioning as expected. Monitoring helps detect
SP
unauthorized access and abnormal behavior.
ot
rules of access control and ensures accountability.
ll N
• Functionality: It works by verifying whether a subject has permission to
i bu
a subject can have with an object. These modes enable more precise
str
control based on what actions are required for the subject to perform their
job.
D i
for
• Common Access Modes:
t
No
• Create: The ability to create new objects, such as files,
databases, or records. Example: A user can create a new
a,
document in a shared folder.
h
•
Na
Update: Permission to modify or update existing objects.
je et
Example: A user can edit customer details in a CRM system.
ha
• Read: The ability to view or read objects without making
b
changes. Example: A user can view a financial report but cannot
l Su
edit it.
SP •
entry.
ll N
Example: A user can delete outdated documents from a shared
rn e drive.
• Logical Access Modes provide granular control over what actions a user can perform on an object,
such as creating, reading, updating, executing, or deleting objects.
• These permissions are defined based on the user's role and responsibilities, following the principles
of need to know and least privilege to ensure that users have the appropriate level of access
without compromising security.
t for
Noto a specific job function
Definition of Roles:
• Concept: A role is a set of permissions, tied
a
within an organization, often linked htoa what tasks the job requires.
N to call center agents, giving them
tneed
e
access to the systemsjthey e
• Example: A role might be assigned
to perform their job, such as CRM
h
systems for customer a interaction.
u b
• Management:
o l Srequired
When users are assigned a role, they inherit all the
y
based Con job requirements.
permissions for that role, streamlining access management
P B
I SS permissions required to fulfill those functions, making them less
• Job-Oriented: Roles are tightly focused around job functions and the
C
or
flexible but more structured than groups.
s f
o te Key Differences Between Groups and Roles:
ll N
• Groups: Provide flexibility for organizing users who share common
rn e access needs but aren’t necessarily tied to the same job function.
• Groups and Roles are two different approaches to managing user permissions.
• Groups are more flexible and allow for the organization of users who share access needs but might
not have the same job functions.
• Roles are job-specific, assigning permissions based on the responsibilities of a particular position.
Both approaches are useful in different contexts for efficiently managing access control.
on
• Greater flexibility by having one unified control point.
•
ti
Single username and password grant access to multiple systems.
u
b
• Disadvantages:
•
tr i
Single point of failure—if the central system is compromised, it can
affect the entire organization.
D is
for
• Becomes a potential target for attacks due to its importance.
• Example: An Active Directory managing all user access across multiple systems
t
No
in a network.
Decentralized Administration:
a,
• Concept: Control is distributed to multiple systems, allowing management by
h
Na
those closer to the resources.
et
• Advantages:
e
• Granular control over access, tailored to individual departments or
j
ha
systems.
•
bMinimizes risk of complete failure—if one system fails, others remain
Su
functional.
•
l Local teams can manage access specific to their needs.
y Co
• Disadvantages:
SP
requires more effort.
• Lack of standardization and possible security holes due to
CI S fragmented control.
ell N • Advantages:
rn
• Balances the efficiency of centralized control with the granularity of
C o •
decentralized systems.
Often necessary due to legacy systems that can’t be integrated into
modern centralized control systems.
• Provides flexibility while maintaining some level of central oversight.
• Example: A company using centralized control for core systems but allowing
departments to manage their own access controls for specialized resources.
• Access control administration can follow a centralized approach, which offers simplicity and cost
reduction but introduces risks related to a single point of failure.
• In contrast, decentralized approaches provide granular control but come with administrative
overhead.
• The hybrid approach combines the strengths of both, offering flexibility to manage legacy and
modern systems together effectively.
on
• Human Integration • Principle: The best identity systems are those that disclose the least amount of
• Consistent Experience Across identifying information.
uti
Contexts
additional personal details.
tr i b
• Example: Using only a username to log into a website instead of revealing
Justifiable Parties:
D is
for
• Principle: Identifying information should only be shared with parties that have a
legitimate reason to be involved.
t
No
• Example: A payment processor receiving credit card details only for the purpose of
a,
processing a transaction, without sharing it with unrelated third parties.
h
Na
Directed Identity:
et
• Principle: Identity systems should support omni-directional identifiers for public
e
entities and uni-directional identifiers for private entities.
j
bha
• Example: A public website having a universal identifier (URL), while a user’s
identifier for logging in remains private and secure from other entities.
l Su
Pluralism of Operators and Technologies:
y Co
• Principle: Identity systems must be interoperable with various identity providers
and technology platforms.
B
SP
• Example: A user should be able to log into different websites using credentials
from Google, Facebook, or another identity provider seamlessly.
CI S Human Integration:
for • Principle: Identity systems must account for the fact that human users are an
ot
• Example: Ensuring user-friendly interfaces and reliable security features such as
ll N
two-factor authentication that protects the communication between the user and
the system.
• The Seven Laws of Identity outline the fundamental principles for designing identity systems that
protect user privacy, provide security, and ensure seamless user experiences.
• They emphasize the importance of user control, minimal data disclosure, trust in legitimate
parties, and interoperability across different technologies while providing a consistent and
human-centered approach to identity management.
a,
• Example: After entering a username, the system asks for a password to
h
confirm that the user is who they claim to be.
Authorization:
Na
jeet
• Defines what level of access is granted once the user or process has been
ha
identified and authenticated.
b
• Example: An employee might have access to the company's email system,
Su
but not to financial records unless they are authorized.
l
Co
• Role-Based Access Control (RBAC) or Attribute-Based Access Control
I SSP • Refers to the logging and monitoring of all actions taken by identified and
r C authenticated users.
fo • This ensures users are held responsible for their actions and any misuse
es can be tracked.
ot • Example: If a user accesses sensitive data, the system records the time,
ll N
date, and action to ensure accountability.
C o • AAA represents the core of access control, ensuring users are properly
authenticated, authorized, and that their actions are tracked for
accountability.
• These components work together to ensure comprehensive security
within systems.
• Access Control Services are fundamental to ensuring that users and processes interact securely
with organizational assets.
• The core elements—identification, authentication, authorization, and accountability—are
essential in controlling access, verifying identities, and maintaining logs for accountability.
• Proper implementation of these services ensures the security and integrity of organizational
resources.
• Identification is the first component of Access Control Services, ensuring that each user or process
interacting with a system can be uniquely identified.
• The identification must be unique, nondescriptive of roles, and issued through secure methods to
protect organizational security.
• Proper identification ensures that actions can be tracked back to the responsible individual, which
is essential for accountability.
“The quick brown fox jumps over the lazyN ot123!” For example:
can be more secure due to their length and complexity.
dog
C o
on
provide an extra layer of security as they constantly change.
Soft Tokens vs. Hard Tokens:
uti
• Soft Tokens: Software-based applications (e.g., Google
tr i b
is
Authenticator, Authy) that generate OTPs on smartphones or
D
for
computers.
•
t
Hard Tokens: Physical devices (e.g., RSA SecureID) that generate
No
OTPs, typically used for authentication in high-security
environments.
h a,
Na
Smart Cards and Memory Cards:
•
jeet
Smart Cards: Credit-card-sized cards with an embedded chip. They
are inserted into a smart card reader to authenticate users. Used
ha
often in government or military settings.
b
•
l Su
Memory Cards: Cards with magnetic strips (like ATM cards) that
Co
store basic information, such as account numbers, and are used for
limited access authentication. Less secure compared to smart
By cards.
es authentication server.
ll N
challenge-response mechanism where the token and server
• Authentication by ownership verifies a user’s identity based on something they possess, such as
soft or hard tokens, smart cards, or memory cards.
• One-time passwords (OTPs) are a key component of this authentication method, providing dynamic
and expiring credentials.
• OTPs can be generated through synchronous (time-based or event-based) or asynchronous
(challenge-response) methods, each offering different levels of security and complexity.
a,
cards.
h
Differences Between Smart and Memory Cards:
Na
Smart Cards have the ability to process and store information
et
•
e
securely, while memory cards can only store static information that
j
ha
is read during transactions.
b
Su
• Smart cards generate unique data with each transaction, while
l
memory cards present the same data each time.
y Co
Contact Smart Cards:
B • Require physical contact with the card reader for the embedded
I SSP •
chip to be powered and to process transactions.
Often seen in older chip-and-pin credit cards or government ID
r C systems.
fo
es Contactless Smart Cards:
ll N
powering the chip remotely and enabling transactions without
rn e physical contact.
• Smart cards offer enhanced security by using a chip to process and generate authentication data for
each transaction, while memory cards rely on static data stored on a magnetic stripe.
• Contact smart cards require physical interaction with a reader, whereas contactless smart cards
allow for wireless communication, providing greater convenience and flexibility in secure
transactions.
on
• Facial Features: Used in facial recognition technology, such as
Apple's Face ID.
uti
•
tr i b
Eyes: Includes retina and iris scans for high-security access.
2. Behavioral Characteristics:
D is
for
• Handwriting: The unique way someone writes can be analyzed.
t
• Gait: The way someone walks, often used in surveillance.
No
• Voice Recognition: Identifies a person based on their voice
pattern.
h a,
Na
• Typing Patterns: Measures keystroke dynamics, which are
et
unique to each user.
je
Biometric Device Considerations:
ha
• Processing Speed: Biometric systems can be slower than other
b
Su
authentication methods due to the time required for analysis.
l
Co
• User Acceptance: Some users may resist biometric systems due to
privacy concerns or inconvenience.
By • Protection of Biometric Data: Storing biometric data securely is essential
I SSP since this data is uniquely tied to individuals and cannot be changed like
passwords.
r C • Accuracy: The effectiveness of biometric systems is measured by how
fo accurately they can identify users without errors.
es
ot
Crossover Error Rate (CER):
ll N
• CER is the point at which the rate of false rejections (Type 1 errors) and
on
attempting to access a system but being denied.
•
t
Type 2 Error (False Acceptance): This occurs when an unauthorized
u i
tr b
user is wrongly accepted by the system. The False Acceptance Rate
i
(FAR) measures how frequently this occurs. Type 2 errors are far more
D is
dangerous because they allow unauthorized individuals to gain access
for
to secure systems. Example: An attacker gaining access due to system
misidentification.
t
Crossover Error Rate (CER):
No
•
h a,
CER is the point where the FRR and FAR intersect. It indicates the overall
Na
accuracy of a biometric system.
et
• A lower CER suggests a more accurate system, while a higher CER
e
indicates less reliability.
j
•
bha
Biometric systems can be tuned, but reducing one error type increases
the other, creating an inverse relationship.
l Su
Biometric Templates:
y
•
Co
Biometric Templates are digital representations of a user’s biometric
SP
• Raw biometric data (like fingerprints or facial scans) should never be
CI S stored due to privacy risks. Templates are used instead to protect the
individual's biometric information.
for 1 : N Identification:
ll N
fingerprint scanner at a door tries to match the fingerprint to a known
rn e template in a database.
C o 1 : 1 Authentication:
• In this method, the system already knows the user's identity, and it
compares the newly generated biometric template to a stored template
for authentication. Example: A laptop scans a user’s fingerprint and
compares it to their stored fingerprint data.
• Biometric systems use physiological or behavioral attributes for authentication. While not 100%
accurate, they introduce the risk of Type 1 (false rejection) and Type 2 (false acceptance) errors, with
Type 2 errors being the most serious.
• The Crossover Error Rate (CER) is a key metric for measuring a system's overall accuracy. To
protect privacy, biometric data is stored as templates rather than raw data, and these templates
can be used for identification (1 : N) or authentication (1 : 1) purposes.
jeet
eye. Extremely accurate but controversial. Retina scans are
invasive (bright light flashed into the eye) and can reveal
ha
personal health issues, causing privacy concerns. Rarely used
b
Su
due to discomfort and potential privacy risks.
l
Co
Behavioral Biometric Devices:
• Biometric devices can be categorized into physiological (e.g., fingerprint, iris, retina
scanners) and behavioral (e.g., voice, signature, keystroke dynamics). While
physiological biometrics focus on a person's physical attributes, behavioral
biometrics analyze how individuals perform actions. Each type of biometric device has
its own use cases and accuracy, with some systems like retina scanners being highly
accurate but invasive and controversial due to privacy concerns.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Factors of Authentication
Factors of Authentication:
• Factors of Authentication
• Single-Factor • Authentication by Knowledge: Something you know, like a password,
Authentication passphrase, or security questions.
• Multifactor Authentication • Authentication by Ownership: Something you have, such as a smart
(MFA) card, RSA token, or one-time password (OTP).
• Authentication by Characteristic: Something you are, involving
physiological (fingerprint, retina scan) or behavioral (keystroke
dynamics, voice) biometrics.
Single-Factor Authentication:
ti on
u
• Utilizes only one factor of authentication from any of the threebtypes.
i
st r
i
rD
• Example: Logging in with a password alone or using a fingerprint
scanner by itself.
fo
tit's based on a single
• Drawback: More vulnerable to attacks since o
security measure.
a ,N
Multifactor Authentication (MFA):ah
ell N authentication.
• Authentication can be categorized into three factors: knowledge, ownership, and characteristic.
Single-factor authentication involves using only one type, whereas multifactor authentication
(MFA) requires using two or more types from different categories.
• MFA is much more secure, as it requires attackers to compromise multiple factors to gain access.
a,
biometrics or a PIN directly on their device, rather than remembering a
password.
h
Na
Advantages of Password-less Authentication:
jeet
• Reduced Friction: Easier and quicker for users to authenticate without
ha
needing to remember complex passwords.
b
Su
• Increased Security: Limits weak passwords and helps to prevent
l
Co
password-based attacks such as phishing.
ll N
hardware token, they may be locked out of their account.
• Password-less authentication methods, such as biometrics, mobile devices, and security tokens,
provide a secure alternative to passwords, reducing risks like phishing and weak passwords.
• While convenient, challenges such as device loss, biometric limitations, and higher costs must be
carefully considered.
• Passkeys are one of the more recent innovations in password-less security.
on
Password Vaults (Password Managers):
• Password vaults, also known as password managers, are applications
uti
designed to generate, store, and manage passwords securely.
tr i b
is
• Passwords are stored in an encrypted database that is protected by a
D
for
master password.
t
• The idea is that users can generate strong, unique passwords for all
No
their accounts without having to remember each one—only the master
a,
password.
h
Na
• Example: A user with 20 accounts can store passwords for each
account in the vault and only needs to remember their vault's master
password.
jeet
ha
Advantages of Password Vaults:
b
Su
• Increased Security: Makes it easier for users to have unique and
l
strong passwords for each account, which helps protect against
y Co
attacks like credential stuffing.
B • Convenience: Simplifies the user experience by requiring users to
ll N
• Single Point of Failure: If an attacker gains access to the password
• Credential management systems, especially those using strong authentication methods, help
organizations manage access at scale.
• Password vaults enable users to securely store and manage unique passwords, but they introduce a
single point of failure that can be mitigated through multifactor authentication.
• These systems are essential for securing modern digital identities and assets.
for
attackers could gain access to all systems with just one breach.
t
No
• Centralized Administration: SSO relies on centralized management of
user access, which can become a target for attackers.
Kerberos as an SSO Protocol:
h a,
•
Na
Kerberos is one of the primary protocols used for single sign-on. It
provides:
jeet
ha
• Authentication: Verifies user identities.
•
bAuthorization: Determines what resources users can access.
•
l Su Auditing: Tracks user activity for accountability.
y
•
Co
How Kerberos Works:
SP
a network.
for (TGT), which they can use to obtain service tickets for
accessing resources without needing to re-enter credentials.
es
ot
SESAME Protocol:
ll N
• SESAME is an enhanced version of Kerberos that offers additional
• Single sign-on (SSO) simplifies user authentication by allowing access to multiple systems with a
single login, offering convenience and ease of use.
• However, the centralization of access introduces potential risks, as a failure or compromise of the
authentication system could lead to widespread access issues.
• Kerberos is the most widely used SSO protocol, and while SESAME offers improvements, its
adoption has been limited due to Kerberos’ integration into major operating systems.
on
passwords since they only need to remember one.
Advantages of SSO:
uti
i b
• Convenience: Users need to log in only once to access multiple systems.
tr
have one login to worry about.
D is
• Stronger Security: Users are more likely to use a strong password if they only
for
• Improved User Experience: Simplifies access and reduces login-related friction.
t
• Centralized Control: SSO systems make it easier for IT administrators to manage
access across an organization.
No
Disadvantages of SSO:
h a,
Na
• Single Point of Failure: If the SSO system is compromised, attackers may gain
access to all systems. If it goes down, users lose access to everything.
jeet
• Security Risks: Centralizing authentication makes it a more attractive target for
ha
attackers.
b
• Legacy Systems: Some older systems may not integrate well with modern SSO
Su
setups, leading to security gaps or exclusions.
l
Co
SSO Process Steps:
1. Login Request: A user requests to log in to an application.
SP
to the authentication server.
es 4. Ticket/Token Presentation: The user returns to the application and presents the
ot
ticket/token.
ll N
5. Authorization: If the token is valid, the application authorizes access, and the
e
user can now access the system.
• Single sign-on (SSO) enhances the user experience by reducing the number of logins, promoting
stronger password usage, and streamlining administrative control.
• However, the system's centralization introduces risks, making it a single point of failure both in terms
of availability and security.
• Proper management and security protocols are essential to mitigate these risks.
SP
returns two messages:
for 2. A Ticket Granting Ticket (TGT) encrypted with the TGS’s key,
ll N
password, confirming her identity. She then sends the TGT to the
C o 4. Service Ticket: The TGS verifies Alice and provides her with a Service
Ticket, which she uses to request access to the service.
5. Service Access: Alice presents the Service Ticket to the target
service. The service verifies the ticket and grants access.
tr
a session. Frequent re-authentication can mitigate this, but it
s
adds user burden.
D i
for
• Ticket Expiration: For high-value systems, frequent ticket
t
expiration is necessary to ensure security, but this can frustrate
No
users who need to log in repeatedly.
h a,
Na
jeet
bha
l Su
y Co
B
I SSP
r C
fo
es
ot
ell N
orn
C
• Kerberos is a widely used Single Sign-On (SSO) authentication protocol that ensures secure access
to multiple systems using tickets instead of repeatedly transmitting passwords.
• Its major components—the Authentication Service (AS) and Ticket Granting Service (TGS)—allow for
efficient credential verification.
• However, challenges like key distribution and the potential for TOCTOU attacks highlight the need for
careful management of ticket lifespans and re-authentication for critical systems.
I SSP
C
for
tes
o
ell N
orn
C
• SESAME improves upon Kerberos by supporting both symmetric and asymmetric cryptography,
addressing key distribution challenges, and issuing multiple tickets for better security.
• However, Kerberos remains the dominant Single Sign-On (SSO) protocol due to its integration with
widely used operating systems like Windows, macOS, and Linux, particularly through Active
Directory in Windows environments.
, N password decryption
unsolicited messages or post content in comment
a
hto guess a user's password by
• CAPTCHA helps defend against brute-force
N a
attacks, which involve bots trying
automatically testing manytcombinations.
e
je humans can proceed through specific
• By ensuring that onlyareal
h
b or forms, CAPTCHA enhances security and user
protection. Su
sections of websites
C ol
B y
I SSP
r C
fo
es
ot
ell N
orn
C
• CAPTCHA is a widely used security mechanism that protects websites from automated programs or
bots by requiring users to complete a simple test, proving they're human.
• This technique helps prevent spam, automated account creation, and brute -force password attacks.
It is a simple yet effective way to enhance website security.
u bhMethods:
S
Session Termination
l Limitations:
that C
• Schedule o Administrators can set schedule limitations
y log users out of a system at a set time (e.g., every evening at 5
Bp.m.).
P
S • Login Limitation: Prevents simultaneous logins using the same user
CI S ID, ensuring that one account cannot be used by multiple individuals
for concurrently.
• Session management is critical for ensuring secure, active user sessions. Without it, attackers may
hijack sessions, leading to unauthorized access.
• Effective session management involves frequent re-authentication and session termination methods
like schedule limitations, login restrictions, time-outs, and screensavers to prevent session hijacking
and enhance overall system security.
y Co driver’s
passport, license, or national ID card before issuing them an
P B
employee badge or access credentials.
I SS Digital
• Certificate Issuance: A person applying for a digital certificate
C may be asked to provide documentation to prove their identity, which
for the RA will verify before the certificate is issued by the CA.
tes
o
ell N
orn
C
• Identity proofing (registration) is verifying someone's identity before granting access to important
resources or systems.
• It is a critical step in the identity lifecycle, ensuring that credentials and access are only granted to
individuals whose identities have been properly confirmed.
Na
identity, suitable for low-risk transactions.
jeet
AAL2: High Confidence:
ha
• Multifactor authentication is required at this level, which
significantly increases security.
b
•
l Su
AAL2 uses approved cryptographic techniques to ensure stronger
Co
authentication.
orn • AAL3 offers very high confidence and is suitable for high-risk
C transactions.
a,
relationships allow identities to be shared and recognized across
h
different systems without needing multiple authentication events.
Key Components of FIM: Na
1. Principal/User:
jeet
•
bha
This is the person who wants to access a system. The user
Su
only needs to authenticate once, after which they can access
l multiple systems without re-authenticating.
y Co
2. Identity Provider (IdP):
B • The identity provider is the entity that verifies the user's
ll N
• Also known as the service provider, the relying party trusts
o • The relying party, also called the service provider, trusts the
ll N
authentication performed by the IdP (e.g., Pinterest trusting
C o
• Federated Identity Management (FIM) allows for one-time authentication across multiple
organizations by leveraging trust relationships between the user (principal), identity provider (IdP),
and relying party (RP).
• This system provides convenience by reducing the need for multiple logins and passwords while
maintaining a secure flow of information across disparate systems.
on
service from a service provider. The request is redirected to
the identity provider for authentication.
uti
2. Identity Provider Authenticates User:
tr i b
is
•
f
standard identification and authenticationo r Dprocedures. Once
The identity provider verifies the user’s identity through
je e
sensitive information
contains assertion
like the user’s password. Instead, it
about the user (e.g.,
a
bhAuthorization:
username, role).
S u
l
4. Service Provider
o
y C• The user passes the assertion ticket to the service provider
on
1. Defines how requests and responses are structured
between entities.
uti
3.Bindings:
tr i b
1. Maps SAML messages onto standard communication
D is
for
protocols (e.g., HTTP).
4.Profiles:
t
No
1. Specifies how SAML is used for various business use cases
like Web SSO or LDAP.
h a,
Important Characteristics of SAML:
Na
jeet
•SAML Assertion Tickets:
ha
• SAML relies on tokens, called assertion tickets, to
b
communicate the user’s authentication and authorization
l Su
details.
y Co
•Written in XML:
SP
(XML), a machine and human-readable format that ensures
for
es
ot
ell N
orn
C
• SAML is a crucial protocol in Federated Identity Management, enabling secure authentication and
authorization across multiple service providers.
• It uses SAML assertion tickets to communicate user information without revealing sensitive details
like passwords.
• SAML’s components (assertions, protocols, bindings, profiles) make it versatile for different
business use cases, and its use of XML ensures both human and machine readability.
No
• Example: Assigning a unique username to each employee.
a,
2. Proper Authentication:
h
Na
• Users must be authenticated before gaining access to any
system resources.
•
eet
This ensures that the person using the identity is actually who
j
ha
they claim to be.
b
Example: Requiring a password, smart card, or biometric scan
Su
•
l for login.
y
3.
Co
Authorization:
SP
permissions based on their role or need-to-know.
CI S • This ensures users only access what they are allowed to,
for •
preventing misuse.
Example: Restricting access to financial data to only authorized
es personnel.
ot
ll N
4. Logging and Monitoring:
• The Principle of Access Control is achieved through accountability, which requires identifying,
authenticating, authorizing, and monitoring users.
• These measures ensure that all actions within a system can be traced back to the responsible
individual, which is crucial for security, audits, and compliance.
on
Example:
•
ti
A finance manager needs to access a sensitive database once a month to
u
tr i b
generate financial reports. Instead of having constant access to the
database, the manager's privileges are elevated for the specific time window
during which they need to complete the task.
D is
for
Benefits of Just-in-time Access:
t
No
1. Minimizes Long-term Privilege Risks:
• By granting elevated access only when needed, JIT access prevents
a,
users from having continuous administrative or privileged access,
h
Na
which could be exploited in the case of an insider threat or account
compromise.
2.
eet
Automated and Efficient:
j
•
bha
Many JIT systems are automated, allowing for automatic elevation
of privileges based on predefined criteria (e.g., a scheduled report
l Su or request). This removes the need for manual intervention while still
Co
maintaining tight security controls.
SP
• By limiting access time, the window of opportunity for an attacker
to exploit privileged accounts is significantly reduced.
ot
enforced. Logs of when privileges were elevated are kept for auditing
ll N
purposes.
• Just-in-time (JIT) access enhances security by granting temporary elevated privileges to users only
when they are needed.
• This reduces the risks associated with long-term elevated access, minimizes the attack surface, and
supports compliance through proper logging and auditing.
for
access to multiple systems.
4. t
Multifactor Authentication (MFA): Adding a layer of security by requiring
two or more factors to verify identity.
No
5.
a,
Directory Services: Managing user identities, credentials, and other
h
Na
information in both on-premises and cloud environments.
et
Types of Identities in IDaaS:
•
je
Cloud Identity: Identity created and managed in the cloud, authenticated
ha
by a cloud service.
b
Su
• Synced Identity: Identity created locally (e.g., via Active Directory) and
l
synced to the cloud.
y
•
Co
Linked Identity: Two separate accounts, one local and one cloud-based,
that are linked together for access.
B
SP
• Federated Identity: Managed by a third-party Identity Provider (IdP) and
for 1. Availability Risks: If the IDaaS provider suffers an outage, users may be
orn 3. Trust Risks: Trusting a third party to handle the organization’s sensitive or
C proprietary identity data introduces potential risks related to control,
security, and regulatory compliance.
• IDaaS offers cloud-based identity management services that centralize and simplify user
authentication, provisioning, and administration across cloud and on-premises environments.
• While it enhances security and operational efficiency, organizations must assess availability, data
protection, and trust risks when relying on third-party providers for critical identity functions.
on
Cloud-Based IAM Solutions:
• IAM services are provided through a cloud service provider.
uti
•
r i
Leverages Federated Identity protocols like SAML to integrate
t b
is
cloud-based services with the organization’s existing identity
D
for
credentials, allowing seamless authentication.
•
t
Availability risk exists since access to identity services depends on
No
the availability of the cloud provider.
•
h a,
Security concerns arise due to the multitenant nature of cloud
Na
infrastructure, where multiple organizations share the same
underlying resources.
•
jeet
Example: A startup using AWS IAM for cloud-based applications and
storage.
bha
Su
Hybrid IAM Solutions:
l
Co
• Combines the best features of both on-premises and cloud-based
IAM.
By • Allows greater flexibility and scalability, making it ideal for
ll N
applications and cloud-based IAM for external services like Microsoft
C o
• IAM solutions can be implemented using on-premises, cloud-based, or hybrid models. On-
premises systems offer more control and security but lack the flexibility of cloud-based solutions.
• Cloud IAM offers scalability and remote access but comes with risks of availability and multitenancy.
• Hybrid IAM solutions blend the strengths of both models to provide flexibility and control, making
them ideal for organizations with evolving needs.
on
federated access.
• Facilitates remote access and scalability, which is advantageous for
uti
b
organizations with geographically dispersed users.
•
tr i
Subject to availability risks—if the cloud service goes down, users may lose
access to critical systems.
D is
for
• Example: A company using Microsoft Azure Active Directory for external cloud
apps.
t
Hybrid IAM Solutions:
No
•
h a,
Combines on-premises and cloud-based IAM features.
Na
• Provides flexibility and scalability, ideal for growing organizations with diverse
needs.
•
eet
Sensitive systems are managed on-premises, while cloud services handle less
j
ha
sensitive operations.
•
b
Example: An enterprise running internal HR systems on-premises while
Su
integrating cloud-based apps like Office 365.
l
Co
IDaaS Risks:
By • Availability of Service: If the cloud provider suffers an outage, users may not
be able to access their systems.
ote • Example: A data breach at the cloud provider could expose users' personal
and authentication data.
rn
information to a third-party provider can pose risks if data protection controls
C o •
are inadequate.
Example: Intellectual property might be vulnerable if the cloud provider’s
security practices are not robust enough.
• IAM solutions can be deployed through on-premises, cloud, or hybrid models, each with varying
degrees of control, security, and flexibility.
• On-premises solutions provide more direct control, while cloud IAM solutions offer scalability but
come with availability risks.
• Hybrid IAM solutions offer the best of both worlds.
• In the context of IDaaS, organizations should be aware of risks related to service availability, data
protection, and third-party trust, ensuring that safeguards are in place to mitigate these
vulnerabilities.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Authorization Mechanisms - 1
Discretionary Access Control (DAC):
• Discretionary Access • The asset owner determines access and grants permissions based on
Control (DAC) their discretion.
• Rule-based Access Control • Flexibility is key, but it can lead to security risks as owners might
• Role-based Access Control accidentally give broad access.
• Attribute-based Access • Example: A file owner allowing a colleague to read or modify a file based
Control (ABAC) on their judgment.
• Context-based and Risk- Rule-based Access Control:
based Access Controle • Access is controlled by rules set by administrators.
• Xtensible Access Control
on
• Can be highly granular, providing specific access based on conditions,
Markup Language (XACML) such as time of day or network location.
uti
updates.
tr b
• Administrative overhead is high due to the need for constant rule
i
D is
• Example: Firewall rules that only allow access to certain servers during
for
business hours.
t
No
Role-based Access Control (RBAC):
a,
• Access is granted based on roles or job functions within an
organization.
h
Na
• Simplifies administration by assigning users to roles with predefined
permissions.
jeet
ha
• Scalability is a major advantage, especially in large organizations.
b
• Example: An IT administrator role that automatically grants access to
Su
system management tools.
l
y Co
Attribute-based Access Control (ABAC):
SP
function, device type, working hours, and security clearance.
h ajeand devices.
• Example: A cloud service
for different user groups
provider
S ub
C ol
B y
I SSP
C
for
tes
o
ell N
orn
C
• Authorization mechanisms vary from Discretionary Access Control (DAC), where asset owners
grant permissions, to more structured approaches like Rule-based, Role-based, and Attribute-
based Access Control (ABAC).
• Context-based and Risk-based access controls provide dynamic and adaptive security measures,
adjusting based on the connection's environment or perceived risk.
• Tools like XACML enable organizations to enforce sophisticated access policies, particularly in
complex environments requiring fine-grained controls.
for
Lists (ACLs) or firewall rules.
•
t
Highly granular: This approach can be very specific, but it requires regular
updating to stay relevant.
No
•
and 6 PM.
h a,
Example: A firewall rule that only allows access to a network between 9 AM
Na
Attribute-Based Access Control (ABAC):
•
eet
Attribute-centric: Decisions are based on multiple user attributes like job
j
ha
role, location, time, and device security.
•
b
Highly flexible and suitable for dynamic environments, providing very fine-
Su
grained access control.
l
Co
• Example: A user can only access sensitive files if they are using a company-
ote • Example: An employee can only view classified documents if they hold a
security clearance that matches the classification of the document.
orn • Dynamic control: Factors like the IP address, time of access, and location
are evaluated to assess the risk of a user’s request.
C • Adaptive security: Based on the perceived risk, additional security measures
(such as multi-factor authentication) may be required.
• Example: A remote access request from a previously unseen location might
trigger an extra authentication step.
• The different types of access control provide varying levels of security, flexibility, and management
complexity.
• Discretionary Access Control (DAC) offers flexibility but can be risky, while Role-Based Access Control
(RBAC) simplifies management by aligning permissions with roles.
• Rule-based and Attribute-based access controls (ABAC) provide greater granularity and adaptability.
• Mandatory Access Control (MAC) offers strong security in highly classified environments.
• Risk-Based Access Control provides dynamic responses based on user behavior and context. Each
method should be chosen based on the specific security needs and risk profile of the organization.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Discretionary Access Control (DAC)
Discretionary Access Control (DAC):
• Discretionary Access Control
• Owner-driven access control: The asset owner determines who can
(DAC) Definition access an asset and the level of access, based on their discretion.
• Rule-Based Access Control
(DAC Type 1) • Flexibility and accountability: Since the owner is responsible for the
• Role-Based Access Control asset, they are in the best position to determine access, which fosters
accountability.
(RBAC) (DAC Type 2)
• Attribute-Based Access • Best practice: Encouraged in environments where asset owners are
Control (ABAC) (DAC Type 3) knowledgeable and directly responsible for the data or system.
• Example: A document owner granting specific team members "read"
on
access while granting others "edit" access.
Rule-Based Access Control (DAC Type 1): ti
urules
tr
• Rule-centric: Access to an object is determined based on specific i b
set by the asset owner. is
Dgranting or
• Highly structured: Owners can create detailed rulesrfor
denying access based on various criteria. t fo
o
Nof this timeframe.
,
• Example: An owner might create a rule that allows access only during
ha
business hours, restricting access outside
Role-Based Access Control (RBAC)a(DAC Type 2):
e t N by the user's job role or function
aje
• Role-centric: Access is determined
h
within the organization.
roles ratherS
ub
• Simplified management: The owner grants access based on predefined
tes such as the user’s job function, device used, time of day, and more.
o • Granular control: Allows very specific and fine-grained access controls,
orn • Example: A user accessing sensitive financial data may need to be using
C a company-issued laptop, be on the corporate network, and be working
within business hours to gain access.
• Discretionary Access Control (DAC) allows the owner of an asset to determine who can access it
and under what conditions.
• DAC provides flexibility, enabling owners to use rules, roles, or attributes to control access, making
it adaptable to different environments.
• Rule-Based, Role-Based, and Attribute-Based access controls provide different levels of
granularity and flexibility, with ABAC offering the most detailed control by factoring in multiple user
and asset attributes.
ist to roles
organization. Users assigned to a role inherit that role's permissions.
Simplifies management: Reduces overhead by assigningD
instead of managing each user individually. This makes itreasier to administer
• permissions
permissions for large groups of users.
t fo
•
N
Example: Call center agents all receive the same opermissions based on their
a,
shared role in the organization.
•
a
Pro: Great for organizations with clearh roles, such as call centers or
N
departments with uniform responsibilities.
t
• Con: Can become complex
je ein organizations with many roles or overlapping job
a (ABAC):
functions, potentially creating
hControl
more roles than employees.
b
SuAccess
Attribute-Based Access
•
o l
How it works: is determined by a set of attributes such as the user’s
C and context-based: ABAC allows access decisions based on a wide
job role,
yGranular
device type, location, time of access, and asset classification.
•
B
P are accessible from different locations and devices.
range of factors, making it ideal for cloud environments where applications
S
CIS • Example: A user may need to be using a company-issued device, be on the
or
corporate network, and working during business hours to gain access to
s f sensitive data.
o te • Pro: Offers the most detailed control, especially useful in dynamic cloud
environments where access decisions require more contextual factors.
ell N • Con: Can be complex to implement and manage, as it requires defining and
rn
maintaining many different attributes and policies.
C o
• Each type of Discretionary Access Control (DAC) has its own strengths and weaknesses. Rule-
Based Access Control is highly granular but can be cumbersome to manage.
• Role-Based Access Control (RBAC) simplifies management through roles but may become
complex in organizations with many roles.
• Attribute-Based Access Control (ABAC) offers the most detailed and context-sensitive control,
making it highly useful for cloud environments, but it can be complex to administer due to the need
for defining multiple attributes and policies.
on
access, and more.
• Example: In a corporate network, XACML could be used to enforce
uti
i b
policies that only allow access to a specific database if a user is in a
tr
certain hours.
D is
particular location, using a secure device, and performing tasks within
Components of XACML:
t for
No
• Policy Language: Defines access control policies using attributes. This
a,
language is flexible and allows for complex rule sets to govern access.
h
• Architecture: Provides a framework for attribute-based decisions. It
Na
includes various components such as a Policy Decision Point (PDP) and
jeet
Policy Enforcement Point (PEP).
ha
• Processing Model: Specifies how requests are processed, how policies
b
are evaluated, and how access decisions are made based on those
policies.
l Su
Co
Use of XACML in ABAC:
I SSP environments.
ll N
financial records based on a user’s department, job function, and
C o
D i
User Behavior: Behavioral patterns such as typing speed, typical access
for
•
patterns, etc.
t
No
• Location: Physical location of the user, determined by GPS or network
information.
•
h a,
Example: A user working from home on a known device during regular hours
Na
would face less scrutiny than a user logging in from a foreign country on a new
et
device.
je
Operation of Risk-Based Access Control:
•
bha
Risk Profiling: When a user requests access, the system generates a risk
profile based on the elements mentioned above.
•
l Su
Dynamic Authentication: Based on the risk profile, the system may request
Co
further authentication challenges for higher-risk requests (such as MFA or
By challenge questions), or it may grant access with minimal friction for low-risk
requests.
r C convenience.
es
ot
• Enhanced Security: RBAC allows for more granular control, increasing
security by adapting authentication requirements based on perceived risk.
ell N • Improved User Experience: Low-risk users do not need to go through extra
rn
layers of authentication, making the system more user-friendly while
C o •
maintaining security.
Example: A sales executive logging into the CRM from their office may
experience smooth access, while the same user attempting access from a
different country might be required to go through additional verification steps.
• Risk-Based Access Control enhances security by evaluating risk factors such as IP address, time,
location, and device type, creating a risk profile for each access request.
• Based on the risk level, further authentication may be required before granting access.
• This method improves security while maintaining a user-friendly experience, dynamically adjusting
authentication challenges based on real-time risk assessments.
h a,
Operation of Mandatory Access Control:
Na
• Access Decision: MAC systems automatically enforce access
jeet
control decisions based on the relationship between a user's
ha
clearance and the asset's classification.
b
• If the user's clearance level matches or exceeds the classification
Su
of the asset, access may be granted; otherwise, it will be denied.
l
y Co
• Example: A user with a "Confidential" clearance cannot access
"Secret" documents, regardless of their need to perform a job
B function, because the system enforces access rules automatically.
• Mandatory Access Control (MAC) is a stringent access control model where users have no
discretionary power over the access to resources.
• Access is determined solely based on a user’s security clearance and the asset’s classification
level.
• MAC is commonly used in government and military settings where confidentiality is the highest
priority, ensuring only those with appropriate clearance can access sensitive information.
for
classification system.
•
t
Example: A user with “Confidential” clearance can only access assets labeled at
or below the “Confidential” level.
No
Decision-Making by the System:
h a,
Na
• The system automatically enforces access decisions, ensuring that only users
with the appropriate clearance can access classified information.
•
eet
Example: If a user with “Public” clearance attempts to access an object
j
ha
classified as “Secret,” the system denies access.
b
Why MAC is Rarely Used in Private Organizations:
•
l Su
MAC is administratively complex and difficult to implement in organizations
Co
where employees do not have clearly defined clearance levels and assets are not
By •
routinely classified.
In most private sector organizations, access control is more flexible, and less
ote •
critical.
Example: A military organization might use MAC to ensure that only individuals
ell N with “Top Secret” clearance can access highly classified intelligence.
orn
C
• Mandatory Access Control (MAC) is a system-enforced access model that focuses on protecting
confidentiality.
• Access decisions are based on the classification of objects and the clearance level of users.
• MAC is rare in the private sector due to its complexity and is typically used in government and
military environments where the protection of sensitive information is paramount.
on
often from IT or a similar department, grants access on behalf of the
• Examples of Non-
discretionary Access
owner.
ti
u the
The key difference is that Non-discretionary Access Controlitakes
r b
it tin the hands
Control in Practice •
decision-making power away from the owner and placesis
of someone else, like a system administrator.
f o rD
Why Non-discretionary Access Control Should Be
o t Avoided:
N
•
practice, because it removes theh a, considered
Non-discretionary Access Control is not a security best
Na
accountability of access control from
the asset owner.
t
e access being granted, as decisions about
•
who should accessaan jeasset
It can lead to unnecessary
bh or sensitivity.
may be made without full knowledge of the
Su
asset's importance
o
Examples of l
Non-discretionary Access Control in Practice:
C
y Department-Assigned Access: In many organizations, when new
•
B IT
SP to various systems, often without direct input from the asset owners.
employees are hired, IT departments create accounts and assign access
o te • Access
users
Policy
only have
Enforcement is critical for ensuring that
access to the resources they are
rn
• By having a PEP and PDP structure, organizations can
C o •
ensure centralized and consistent decision-making.
This approach minimizes risks associated with
unauthorized access and ensures that the system is
compliant with security policies and regulations.
• Access policy enforcement involves two critical components: the Policy Enforcement
Point (PEP), which acts as the gatekeeper for access requests, and the Policy Decision
Point (PDP), which evaluates and makes decisions on those requests based on pre-
defined rules.
• Together, they ensure that only authorized users are granted access to resources,
enhancing security and compliance in applications.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Vendor Access
Importance of Vendor Identity and Access Provisioning:
• Importance of Vendor
Identity and Access • Vendor identity and access provisioning must be handled with
equal or greater care than employee provisioning.
Provisioning
• Third-Party Vendor • Vendors often have access to critical systems and data, such as IT
Relationships and services, finance, marketing, or supply chain systems.
Associated Risks
Third-Party Vendor Relationships and Associated Risks:
• Security Review for Vendor
Access • Third-party vendor relationships can introduce significant risks to
• Comparison to Employee an organization, including potential breaches or unauthorized
Access Provisioning access.
ti on
• As vendors may have access to sensitive information, strict
i buaccess
s tr
control measures must be applied to ensure proper security.
i
Security Review for Vendor Access:
fo rD
• Vendor access provisioning should includeo t a security review
process, which might entail:
, N
a
hvendor's own security practices.
•
a
A deeper review of the
•
et N of the vendor’s facilities, systems,
An onsite inspection
CIS
than employee provisioning, as the scope of access and potential
or
impact on the organization can be far greater.
s f
o te • Vendor provisioning must also include regular reviews and timely
revocation when access is no longer required.
ell N
orn
C
• Vendor identity and access provisioning should be managed with greater care than
employee access, given the potential risks posed by third-party relationships.
• It involves stringent processes, including security reviews and onsite inspections to
ensure that vendors maintain secure practices and that their access is properly
controlled and monitored.
for
updated or modified to match the new role's
requirements. t
• No
Proper role-based access control (RBAC) often guides
a,
provisioning to ensure least privilege is applied.
h
Review (User Access Review):
Na
•
jeet
User access review involves periodically checking that users have
ha
the appropriate access based on their current roles.
• bHigh-privilege accounts should be reviewed more
l Su frequently due to the potential risks they pose.
y Co
• Regular reviews help ensure access is not abused,
unnecessary permissions are removed, and that users
B
SP
maintain the right level of access.
CI S Revocation:
ll N
termination to prevent any unauthorized access to
rn e systems or data.
Revocation can also occur when an employee changes
C o •
roles and no longer requires access to specific systems.
• The Identity Life Cycle involves provisioning, review, and revocation of user access.
Provisioning ensures new employees or those changing roles have the access they
need.
• Regular user access reviews ensure that permissions remain appropriate, particularly
for high-privilege accounts.
• Finally, revocation guarantees timely removal of access when no longer needed, such
as in cases of termination or role changes, minimizing security risks.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Identity Life Cycle
Definition of Identity Life Cycle:
• Definition of Identity Life • The Identity Life Cycle refers to the process of managing user access
Cycle from the beginning to the end of their involvement with an organization.
• Stages of the Identity Life • It consists of three main stages: Provisioning, Review, and Revocation.
Cycle
Stages of the Identity Life Cycle:
• Importance of Review
Process 1. Provisioning:
• Revocation Process 1. Creation of user access when a new employee is hired or
when an existing employee changes roles.
2. Activities during provisioning include background checks,
on
identity proofing, and ensuring the user has the skills and
clearance to access the system.
uti
3. Ensures users have access only to the necessary systems
tr i b
and resources according to their roles, applying the principle
of least privilege.
D is
for
2. Review:
t
No
• A periodic check of the user’s access to ensure they have
appropriate permissions based on their role.
•
h a,
Asset or system owners should review the user's access and
Na
determine if it is still necessary or needs modification.
•
jeet
The timing of access reviews is driven by the value of the
assets or systems involved. For example, high-risk accounts
bha
(e.g., admin or root) should be reviewed more frequently than
Su
standard user accounts.
l
Co
Importance of Review Process:
By
• High-value systems or accounts, such as administrator or root
accounts, pose greater risks and therefore require more frequent
ll N
• Revocation is the removal of access, typically during termination (either
• The Identity Life Cycle consists of Provisioning, Review, and Revocation of user
access. Provisioning assigns access when employees are hired or change roles.
• Periodic reviews ensure that access remains appropriate, especially for high-risk
accounts.
• Finally, revocation promptly removes access upon termination or role changes,
reducing the risk of over-privileged users and preventing security breaches.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Access Reviews and Privilege Escalation
Timing of Access Reviews:
• Timing of Access Reviews • Annual reviews: User access should be reviewed at least annually.
• Considerations for Role • More frequent reviews: Some accounts, such as admin or superuser
Changes roles, should be reviewed more frequently, potentially as often as
• Privileged Accounts and weekly, due to the high-risk nature of these accounts.
Administrative Roles Role Changes:
• Privilege Escalation (e.g., use • When a user changes roles, their access should be reviewed
of sudo) immediately.
• New access should be granted as needed.
• Old access that is no longer relevant should be removed.
• Reviews must always be approved by the owner to ensure access is
ti on
appropriate.
i bu
Terminations:
str
•
D i
In the case of voluntary or involuntary termination, the user’s access
for
should be reviewed, and all access should typically be removed to
prevent unauthorized access.
t
No
High-Risk Accounts:
a,
• Admin and superuser accounts: Because these accounts have
h
broader and more powerful access, their access should be reviewed
Na
more frequently, with some reviews potentially taking place weekly or
monthly.
jeet
ha
Privilege Escalation:
•
b
Best Practice: Administrators should have two accounts:
l
•
Su A standard user account for regular tasks (e.g., checking
Co
emails, browsing).
ll N
purpose, allowing the administrator to run programs as a
rn e •
different user with higher privileges.
This separation of duties helps reduce the risk of privileged accounts
C o being compromised during routine activities like checking emails or
browsing the web, which are often vulnerable points for attacks.
• Access reviews should be conducted at least annually, but high-risk accounts like
admin accounts may need more frequent reviews (weekly or monthly).
• When a user changes roles or leaves the company, their access should be reviewed
immediately to ensure appropriate privileges.
• Privilege escalation strategies, such as using sudo or RunAs, minimize the risk of
compromising privileged accounts during routine tasks.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Service Account Management
Definition of Service Accounts:
• Definition of Service • Service accounts are accounts used by services, applications, or
Accounts workloads rather than by humans. These accounts facilitate the
• Importance of Managing operation of automated tasks within an IT infrastructure.
Service Accounts
Importance of Managing Service Accounts:
• Best Practices for Service
Account Management • Even though service accounts are not used by humans, they require
human oversight to ensure they are secure.
• Without proper management, these accounts can become
targets for attacks like privilege escalation and spoofing.
on
• Misconfigured or over-privileged service accounts could be
ti
exploited by attackers to gain unauthorized access or cause
u
other security breaches.
tr i b
Best Practices for Service Account Management:
D is
for
• Limit service accounts to single purposes: Service accounts
should be set up to only perform a specific function. This reduces
t
No
the risk of them being used for malicious purposes.
a,
• Reduce privileges: Grant only the necessary permissions for
h
service accounts to function. This concept is aligned with the
principle of least privilege.
Na
•
eet
For example, if a service account only needs read access to
j
ha
a database, it should not be granted write or delete
b
permissions.
•
l Su
Monitor and audit service accounts regularly: Continuous
y Co
monitoring and auditing of service accounts help detect suspicious
behavior early on.
B
SP
• Ensure logging is enabled for service accounts, capturing
for
es
ot
ell N
orn
C
• Service accounts are not used by humans but require oversight to ensure security.
Best practices include limiting each account to a single purpose, reducing privileges to
the minimum necessary, and regularly monitoring these accounts to prevent security
risks like privilege escalation.
on
• Example: When you log in to a new website using your Google
account, OIDC is verifying your identity via Google.
u ti
2. OAuth (Open Authorization):
r i
t andb
resources without needing to share credentials. is
• OAuth 2.0 allows secure, delegated access to applications
ol
access multiple services with one login.
C
4. Kerberos:
• Authentication systems help verify identities and ensure that only authorized users
gain access to resources.
• OAuth provides access delegation via tokens, while OIDC adds user authentication.
SAML and Kerberos are popular in single sign-on (SSO) environments, and RADIUS
and TACACS+ are commonly used for network authentication.
Continuousu
h
initial development
b helps ensure that systems are meeting
•
S testing
ol requirements and that new updates or modifications do
regulatory
notC
y introduce new vulnerabilities or break existing functionality.
• BEnd-of-life testing is crucial to confirm data migration to new
rn e and though planes can largely fly themselves, fatal errors can still
occur due to vulnerabilities or system failures.
C o • Regular and rigorous testing is necessary to ensure that complex
systems operate reliably and safely, especially when human lives or
critical business operations are at stake.
• Security assessment and testing are vital to ensure that security controls are defined, tested, and
functioning properly.
• Given the complexity of modern systems, continuous testing throughout the lifecycle of an asset is
essential to mitigate vulnerabilities, ensure regulatory compliance, and minimize risks.
ti on
Definition of Verification:
u
• Verification is the process of confirming that the producttroribsystem is
D is and
being built correctly according to the design, standards,
requirements.
t for
• It involves technical checks to ensure the
N osystem functions as
,
expected and that the design is implemented accurately.
• Example: Verifying a banking a ha involves ensuring that the
system
N
encryption mechanisms,ttransaction logic, and data integrity are
functioning properly.ee
j
aValidation
b
Relationship between h and Verification:
u
•
o l Soccurs first, ensuring the correct problem is being solved.
Validation
•
B yC
Verification follows, ensuring that the solution is implemented
SP• Both processes are critical in security and system design, ensuring
correctly.
CI S
for that systems meet user needs and function properly within defined
o
ell N
orn
C
• Validation ensures that the right product is being built to meet user needs, while
verification ensures that the product is being built correctly according to design
specifications. Both are essential for delivering a functional and secure system that
meets user and business requirements.
• Testing efforts should align with the value of the system to the organization. There are multiple
strategies for conducting assessments and audits, including internal, external, and third-party
options.
• Each method provides varying levels of assurance depending on the complexity and sensitivity of the
system or application being tested.
e tN
validation of internal security by external experts. However, it may be
l S
perform a penetration test on its internal applications.
CoAudit:
Third-Party
y
• BInvolves three parties: the customer, the vendor, and an
P
S independent auditing firm.
I S
C • Common in cloud computing where service providers use third-
for party audits to verify their security and provide assurance to
tes customers.
o
ell N • Implications: Ensures high objectivity and provides trusted
rn
assurance. However, it can be costly and requires trust in the audit
C o firm's credentials.
• Example: Amazon Web Services commissioning an independent firm
to audit its cloud services and using the report to reassure potential
customers about security compliance.
• Each assessment, testing, and auditing strategy—internal, external, or third-party—has its specific
strengths and implications.
• Internal audits offer cost-efficiency but can lack objectivity, while external and third-party audits
provide greater assurance through independent, unbiased reviews, often at a higher cost.
• Combining these strategies can enhance overall security assurance and address various levels of
risk across different systems.
je e used by the
ha
organization.
b
Su on-premise and cloud evaluations, assessing hybrid
Hybrid Audit:
l
Co
• Combines both
B
andy
infrastructures where an organization uses both physical data centers
cloud services.
ll N
house data center but also utilizes cloud storage for backups and
rn e scalability.
C o
• Audits can be conducted in three major locations—on-premise, in the cloud, or a hybrid combination
of both.
• On-premise audits focus on physical infrastructure within an organization, while cloud audits assess
security managed by cloud providers.
• Hybrid audits evaluate both environments, requiring coordination to ensure consistent security
across all infrastructures.
a,
implications and actions necessary to address vulnerabilities.
h
Na
• Example: Explaining to development teams the importance of secure
et
coding practices and helping them integrate it into the development
lifecycle.
je
b hain Testing:
Role of Security Team
u role is to advise, provide assurance, monitor,
Steam’s
l
• The security
y Coin collaboration
and evaluate security testing. They do not perform the testing alone
B
but work with others in the organization.
I SSP• Example: The security team monitors security tests carried out by
C external consultants or internal IT staff and ensures the results are
tes
o
ell N
orn
C
• The security professional's role revolves around identifying risks, advising on testing processes, and
supporting stakeholders to ensure that security measures are effective.
• While they don't carry out tests independently, they ensure that the testing process is thorough and
addresses relevant security concerns.
on
• Each type focuses on specific parts of the application or system to ensure
security controls are working as intended.
uti
Unit Testing:
tr i b
is
• Definition: Testing of individual components or modules of the application in
isolation.
D
for
• Purpose: To ensure that each part of the system works independently without
t
No
errors.
a,
• Example: Testing a login function to ensure password input and validation
work correctly.
h
Interface Testing:
Na
jeet
• Definition: Testing the interaction between different modules or systems.
ha
• Purpose: To verify that modules can communicate with each other correctly.
b
• Example: Ensuring that the front-end of a web application properly
Su
communicates with the back-end database when retrieving or sending user
l
Co
data.
By Integration Testing:
• Definition: Testing where modules that work together are combined and tested
I SSP as a group.
fo components.
es • Example: Checking that after login, the user is directed to the appropriate
ot
dashboard with correct access rights.
ll N
System Testing:
C o environment.
• Purpose: To ensure that the entire system, including all subsystems,
functions as expected.
• Example: Testing an online banking system from user authentication to
transaction completion.
• Security control testing aligns with the application development phases and includes several types
of testing.
• Each testing type—unit, interface, integration, and system—focuses on specific aspects of the
application to ensure security controls are effectively implemented and function as required.
• Testing should be thorough and cover every component from the smallest unit to the entire system in
its operational environment.
on
system architecture.
ti
• Example: Testing that encryption protocols and access controls are included in
u
the design of an online payment system.
Develop Phase:
tr i b
D is
• Purpose: Implement and verify all security controls are working as designed
for
during system development.
t
• Testing Focus: Multiple testing approaches, including unit testing, integration
No
testing, system testing, vulnerability assessments.
a,
• Example: During unit testing, the login module is tested independently to ensure
h
Na
that password validation is functioning correctly.
et
Deploy Phase:
je
• Purpose: Ensure the system functions as intended in the production
ha
environment.
b
Su
• Testing Focus: Perform usability, performance, and vulnerability testing before
moving into production.
l
Co
• Example: Performance testing ensures the system can handle expected user load
I SSP • Purpose: Continue monitoring the system to ensure it works as intended, with no
security compromises.
r C
fo • Testing Focus: Ongoing configuration management reviews, vulnerability
management, and log analysis.
es
ot
• Example: Continuously reviewing system logs to detect anomalies or
ll N
unauthorized access attempts.
e
Retire Phase:
orn • Purpose: Securely migrate data from the old system to a new one and ensure
tes
o • Focus: Testing the complete application in its operating environment
ll N
to verify end-to-end functionality.
• Software testing must be comprehensive, starting from testing individual components (unit testing)
to ensuring that all components interact properly (interface and integration testing) and ultimately
verifying that the entire system functions as expected (system testing).
• Each stage ensures the functionality and security of the application are thoroughly evaluated.
for • Example: For a range of inputs (0-100), choosing test cases from each
tes partition, such as 0-50 and 51-100, to verify behavior across partitions.
rn ell • Definition: Testing around the upper and lower boundaries of input
C o •
groups or partitions.
Example: Testing the values at the edges of a range, such as 0 and
100, to ensure the system properly handles boundary cases.
• Testing techniques are categorized into manual and automated methods, with further classification
into white-box (SAST) and black-box (DAST) testing.
• Each type of testing, whether it involves positive, negative, or misuse cases, is critical for ensuring
application security.
• Testing strategies such as equivalence partitioning and boundary value analysis help ensure
comprehensive coverage across inputs and edge cases.
for • Example: For a range of inputs (0-100), choosing test cases from each
tes partition, such as 0-50 and 51-100, to verify behavior across partitions.
rn ell • Definition: Testing around the upper and lower boundaries of input
C o •
groups or partitions.
Example: Testing the values at the edges of a range, such as 0 and
100, to ensure the system properly handles boundary cases.
• Testing techniques are categorized into manual and automated methods, with further
classification into white-box (SAST) and black-box (DAST) testing. Each type of testing,
whether it involves positive, negative, or misuse cases, is critical for ensuring
application security. Testing strategies such as equivalence partitioning and boundary
value analysis help ensure comprehensive coverage across inputs and edge cases.
jeet
• Process: Test scripts or batch files are written and executed by
ha
automated testing tools. These scripts can repeatedly run test cases and
check for known issues.
b
Su
• Example: Tools like Selenium can automate web application testing,
l
Co
automatically simulating user interactions such as form submissions or
By page navigation.
• Advantages:
ll N
• Disadvantages:
• Manual testing relies on human intuition and is useful for exploratory or visual testing but is time -
consuming and prone to error.
• Automated testing is more efficient for repetitive tasks and regression testing but may miss user
experience issues.
• A balanced approach using both methods is ideal for thorough and effective software testing.
a,environment.
• Purpose: Identify runtime issues, such as unhandled
h
transmission, and behavior flaws in a live
• Example: Testing a web application
t Naitforis live.
SQL injection attacks or cross-site
ol
slower to execute compared to SAST.
y C
Fuzz Testing:
• BDefinition: Fuzz testing sends random or malformed inputs to an application to
S P uncover how it handles unexpected data and stress conditions.
CIS • Dynamic Testing: Fuzz testing is a type of dynamic testing that stresses the
or
application in unusual or illogical ways.
N
ell
• Example: Feeding an application randomly generated input strings to see if it
crashes.
orn • Advantages: Effective in discovering edge cases and rare issues that developers
C •
may not anticipate.
Disadvantages: May not identify logical flaws, and lacks precision unless
combined with other testing methods.
• SAST focuses on examining source code for vulnerabilities before the application is run and is best
for early detection of issues.
• DAST tests the application while it is running and catches runtime errors and security flaws that may
only surface during execution.
• Fuzz Testing introduces randomness into inputs to identify how well an application handles
unexpected scenarios, useful for stress testing and finding edge-case bugs.
a
hbox testing by reviewing the source code
• Example: A developer performs white
a
t N into the internal workings of the system,
for potential vulnerabilities, such as buffer overflows or improper error handling.
Advantage: Provides deepe
•
a je identification and debugging.
insight
enabling thorough vulnerability
Disadvantage: b h
•
S
which would be uMay miss issues that only surface in real-world conditions,
more apparent during black box testing.
or
white box testing assesses code integrity, logic, and security from within the
s f system.
N
ell
• Black Box Testing: Used by testers simulating real-world attacks or functional
users to identify external vulnerabilities and behavior flaws (e.g., penetration
rn
testing, user acceptance testing).
C o • White Box Testing: Used by developers and internal security teams to verify the
security and correctness of code, logic, and architecture (e.g., code reviews,
static analysis).
• Black Box Testing evaluates a system’s external behavior without knowledge of the underlying code,
ideal for simulating real-world conditions and attacks.
• White Box Testing allows detailed scrutiny of the system’s internal structure and code, ensuring
internal security and functionality.
• Both approaches provide complementary insights and should be used together for comprehensive
testing.
on
intended under normal circumstances.
Definition of Negative Testing:
uti
•
tr i b
Definition: Negative testing focuses on how the system responds when
errors gracefully.
D is
incorrect or unexpected inputs are provided, ensuring that it handles
•
t for
Purpose: To confirm that the system does not crash or behave
No
unpredictably when invalid data is entered.
• Example: A user enters an incorrect username or password, and the
a,
system responds with an error message like "Invalid username or
h
Na
password" instead of crashing.
et
• Advantage: Ensures that the system can handle unexpected or invalid
je
inputs without failing.
ha
Definition of Misuse Testing:
b
Su
• Definition: Misuse testing evaluates how the system behaves when
l
subjected to malicious or abnormal usage, simulating the actions of a
y Co
potential attacker.
SP
exploitation.
rn
• Positive Testing: Focuses on verifying normal functionality with valid
C o •
inputs.
Negative Testing: Checks how the system responds to incorrect or
unexpected inputs.
• Misuse Testing: Simulates attacks or malicious actions to test the
system’s security and resilience.
• Positive Testing ensures the system functions correctly under normal conditions.
• Negative Testing verifies the system can handle errors and invalid inputs without failure.
• Misuse Testing assesses how well the system withstands malicious attempts to exploit or abuse it.
Each type of testing is essential for ensuring both the functionality and security of a system.
ll N
Analysis:
• Equivalence Partitioning groups inputs into partitions with similar behavior, reducing the number of
test cases needed to validate the system.
• Boundary Value Analysis focuses on testing at the extreme edges or boundaries of input ranges
where bugs are more likely to occur.
• Both techniques improve testing efficiency by targeting key areas for testing while reducing
redundant test cases.
je et
that code have been tested, then the test coverage would be:
ha of code = 100
• Amount of code covered = 50
Total b
Sucoverage = 50/100 = 50%
• amount
lTest
Co
•
By
I SSP
r C
fo
es
ot
ell N
orn
C
• Test Coverage Analysis measures how much of an application's code has been tested.It is
calculated by dividing the amount of code tested by the total code in the application, expressed as a
percentage.
• Higher test coverage generally suggests more comprehensive testing, though achieving 100%
coverage doesn’t necessarily guarantee the software is bug-free.
a,
along with mitigation recommendations.
h
Na
Testing Perspectives:
et
• Internal Testing: Testing from inside the corporate network, simulating an
e
attack by an insider or a compromised internal system.
j
•
bha
External Testing: Testing from outside the corporate network, simulating an
Su
attack by an outsider.
l
Testing Approaches:
y
•
Co
Blind Testing: The tester has little to no prior knowledge about the target,
B simulating a real-world attack by an outsider with limited information.
I SSP • Double-Blind Testing: Neither the tester nor the internal security team knows
the test is happening, simulating a more realistic attack scenario to gauge
ell N 2. Partial Knowledge (Gray Box): The tester has some knowledge of the target
orn (e.g., IP addresses, software versions), allowing for a more focused attack.
C 3. Full Knowledge (White Box): The tester has complete knowledge of the
target, including its architecture, source code, and network configurations,
making it a thorough examination.
• Vulnerability Testing is usually automated and quicker, identifying known vulnerabilities, while
Penetration Testing is more manual and deeper, simulating actual attacks.
• Testing follows stages of reconnaissance, enumeration, vulnerability analysis, exploitation, and
reporting.
• Perspectives include internal (inside the corporate network) and external (from outside).
• Testing approaches range from blind to double-blind, with varying levels of prior knowledge: black
box, gray box, and white box.
je et
Disclosure, Denial of Service, and Elevation of Privilege. It’s a
framework used to identify and categorize threats.
• PASTA: Stands for h a for Attack Simulation and Threat Analysis.
b Process
Su
It’s a methodology
assess thel risk.
that simulates attacks to identify vulnerabilities and
y Co Assessment Tools:
Vulnerability
P B
• Automated tools like Nessus, Qualys, InsightVM are used for vulnerability
I SS scanning.
C o 3.
4.
Vulnerability Analysis: Analyzing vulnerabilities in the system.
Exploitation (Pen Testing only): Attempting to exploit the identified
vulnerabilities.
5. Reporting: Documenting the findings, including vulnerabilities and any
successful exploits.
• Vulnerability assessments identify system weaknesses but do not attempt to exploit them.
• Penetration tests go further by actively trying to breach the system using identified vulnerabilities.
• Both are essential in a comprehensive security strategy, but they differ in depth, with pen testing
being more hands-on and in-depth.
• Tools like Nessus and Qualys can assist with automated vulnerability assessments, while pen
testing relies more on the expertise of the tester.
• Active phase where the tester interacts with the target network to identify IP
on
addresses, open ports, hostnames, and active user accounts.
uti
•
tr i b
Example: Running port scans to identify services like a web server on port 80 or a
database server on port 3306. Enumeration narrows down the types of systems
and potential vulnerabilities.
D is
Vulnerability Analysis:
fo r
t
o in the system. Vulnerability
• Focuses on identifying and analyzing the vulnerabilities
testing ends here with no attempts to exploit. N
CIS
unauthorized access.
ell N • Key considerations include prioritizing critical vulnerabilities and eliminating false
• The vulnerability assessment process identifies potential weaknesses in a system but does not
involve exploitation.
• Penetration testing goes further by attempting to exploit the vulnerabilities. The key step that
differentiates the two is the execution/exploitation phase.
• The final step, documenting findings, is crucial for providing actionable insights to improve system
security.
CIS
effectively integrated into blue team defenses.
for • Example: A purple team would facilitate debriefs where red teams
tes share their findings, and blue teams adjust their security strategies
o accordingly.
ell N
orn
C
• Red teams simulate attackers, blue teams are the defenders, and purple teams foster collaboration
between both to enhance security.
• Purple teams aim to ensure that red team findings lead to actionable improvements by the blue
team, creating a continuous feedback loop to strengthen defenses.
on
through defenses.
•
ti
Example: Testing a web server’s exposure to external hackers trying to
u
gain unauthorized access.
tr i b
s
Approach in Testing (Blind vs. Double-Blind):
• Blind Testing:
D i
for
• The tester has little to no information about the target.
t
No
• The target company’s IT/security team knows about the test and can
prepare.
•
h a,
Example: A penetration test is conducted with minimal information
Na
about the company, requiring reconnaissance by the tester.
• Double-Blind Testing:
•
eet
Neither the tester nor the target’s IT/security team is aware of the test’s
j
ha
specifics.
•
b
Tests both the external threat response of the company and the
Su
incident response capabilities of the internal teams.
l
Co
• Example: An unannounced test is conducted where only senior
management knows, testing real-world incident detection and
By response.
SP
Knowledge in Testing (Zero, Partial, Full):
es information.
ll N
any network details.
C o access.
• Balances internal and external knowledge to uncover vulnerabilities.
• Example: The tester knows certain IP ranges or firewall settings but
must discover specific weaknesses.
• Full Knowledge (White Box):
• The tester has full access to system details (e.g., IP addresses, network
diagrams, and security policies).
• Testing techniques can be performed
• from internal
Focuses on in-depth ortesting
external perspectives,
with maximum using
information blindideal
available,
for simulating insider threats or comprehensive system audits.
or double-blind approaches, and with varying levels of knowledge (zero, partial, or full).
• Example: Testing for vulnerabilities with access to system architecture,
Each method provides unique insights into anhow
simulating organization’s
a knowledgeablesecurity posture,
insider would helping
exploit the system.to
identify vulnerabilities from different angles.
on
access.
•
ti
Balances internal and external knowledge to uncover vulnerabilities.
ubut
•
r i
Example: The tester knows certain IP ranges or firewall settings
t b
must discover specific weaknesses.
is
• Full Knowledge (White Box):
o r IPDaddresses, network
The tester has full access to system details f(e.g.,
•
diagrams, and security policies). o t
N information available, ideal
Focuses on in-depth testing with,maximum
•
a
h with access to system architecture,
for simulating insider threats or comprehensive system audits.
a
•
simulating how a e tN
Example: Testing for vulnerabilities
b ha
l Su
y Co
B
I SSP
r C
fo
es
ot
ell N
orn
C
• Testing techniques can be performed from internal or external perspectives, using blind
or double-blind approaches, and with varying levels of knowledge (zero, partial, or full).
Each method provides unique insights into an organization’s security posture, helping to
identify vulnerabilities from different angles.
t
1. Regularly scan for vulnerabilities across all assets.
No
2. Example: Using automated tools like Nessus, Qualys, or InsightVM to find
vulnerabilities such as missing patches, outdated software, or
a,
misconfigurations.
h
Na
4. Vulnerability Remediation:
et
1. Prioritize vulnerabilities based on their risk and impact on the organization.
e
2. Example: A vulnerability on a critical financial system should be patched
j
immediately, while a lower-priority system might be scheduled for patching
ha
later.
3.
b
Remediation can include patching, updating systems, applying configurations,
Su
or even isolating the system.
OngoinglReview:
C1. o Ensure
5.
y
that the asset inventory is continually updated and new vulnerabilities
P B 2. Example:
are identified as part of regular scans.
If new devices or systems are added, they should be incorporated into
C
for • Without a precise asset inventory, vulnerability management becomes ineffective because
o • Ensures all assets, especially critical ones, are included in the vulnerability assessment
ll N
and management process.
• Vulnerability management is a continuous cycle that includes identifying, classifying, and mitigating
vulnerabilities while ensuring all assets are monitored.
• Effective vulnerability management relies on accurate asset inventory, classification of assets by
value, ongoing vulnerability identification, and remediation through patching and updating.
• Regular review and adaptation to new vulnerabilities are essential for maintaining security.
a,
external perspective.
h
Na
• Benefits: Identifies basic vulnerabilities as seen from an
et
attacker’s point of view but lacks depth.
•
je
Challenges: Higher likelihood of false positives since the
ha
scanner cannot verify detailed configuration settings.
b
Su
• Example: Scanning from an external IP address to identify
l open ports and potentially exploitable services without
rn
• They can only detect known vulnerabilities, so they depend on
C o •
frequently updated databases.
Any new or emerging vulnerabilities that aren’t cataloged in the
scanner’s database will not be detected.
No
services (e.g., HTTP, FTP) and analyzing the responses for details
a,
about the software and its version.
• h
Active Banner Grabbing: Involves direct interaction with the
Na
target, requesting banners from services like web servers or
jeet
email servers.
ha
• Passive Banner Grabbing: Involves sniffing network traffic
b
without directly interacting with the system, allowing for
l Su
stealthier identification.
y
•
Co
OS Fingerprinting: Uses methods such as packet inspection to
determine the operating system based on how packets are
B
SP
constructed and transmitted.
orn • Knowing the exact operating system and version is critical for
C •
identifying vulnerabilities specific to that system.
Example: Windows 7 has different security vulnerabilities compared
to Windows 10, so knowing the OS version helps in targeting the
appropriate patches or exploits.
• Banner grabbing and OS fingerprinting are crucial techniques for identifying a system's software,
operating system, and version, which helps in determining specific vulnerabilities.
• These methods allow for more accurate vulnerability assessments and better-targeted security
measures or, alternatively, provide attackers with valuable information to exploit system
weaknesses.
rD
of a vulnerability, such as the ease of exploitation and the potential
damage it can cause.
f o
t codemight
•
N o
Example: A critical vulnerability that allows remote
might be scored as a 9.8, whereas a minor vulnerability
execution
only score
3.2.
How CVE and CVSS Work Together:ah
a,
Nand provides a unique reference for it,
t the
•
ensuring everyone refers
je e
CVE identifies the vulnerability
to same issue.
a
•
u bh efforts
CVSS assigns a severity score to the vulnerability, helping organizations
S
prioritize remediation based on risk.
•
C ol the
Example: When a vulnerability scan identifies a new issue, it will
y
reference CVE (e.g., CVE-2024-0010) and provide the CVSS score
Bvulnerability is and how severe it is.
(e.g., 7.5), giving security teams clear information about what the
P
S Use of CVE and CVSS in Vulnerability Reports:
CI S
for • Vulnerability scanners (e.g., Nessus, Qualys) will typically include CVE
and CVSS data in their reports to help security teams understand the
tes vulnerabilities identified.
ell
about the vulnerability, while the CVSS score helps to prioritize which
rn
vulnerabilities should be fixed first.
C o • Example: A vulnerability scan report may show multiple CVEs with their
respective CVSS scores, guiding the security team to address the most
critical vulnerabilities first.
• CVE is a standardized system for identifying and cataloging vulnerabilities, ensuring that
everyone refers to the same issues consistently.
• CVSS, on the other hand, provides a score to quantify the severity of each vulnerability.
Together, CVE and CVSS are critical tools in vulnerability
ti on
Definition of False-Negatives:
i bu
tr
• False-negatives happen when a system fails to detect a vulnerability,
s
i
rD
indicating that everything is secure when there is, in fact, a security
flaw.
fo
t they prevent security
o
• False-negatives are far more dangerous because
,N
teams from identifying real risks in a system.
a
• Example: A scanner might missaan hunpatched vulnerability in a web
t Nto attacks without the team knowing.
application, leaving it exposed
e
Why False-Negatives Are
h ajeWorse Than False-Positives:
u b create unnecessary work, they do not represent
S
• While false-positives
l risks.
o
actual security
B yC
• False-negatives, on the other hand, create a false sense of security,
SP security breaches.
allowing vulnerabilities to go unaddressed, potentially leading to
CI S
for • Example: A false-negative in a financial system could lead to a major
e tN
incidents, especially breaches, correlate activities
aje
across different systems.
• h
b leading to aitsecurity
Without time synchronization,
sequence ofuevents
becomes difficult to trace the
S incident.
C
Role of NTPolin Log Synchronization:
y
• BThe Network Time Protocol (NTP) is commonly used to ensure all
ell N servers is easier when all systems share the same timestamp format.
orn
C
• Log review and analysis are essential for identifying potential security incidents and
operational issues within an organization.
• Proactive log monitoring helps catch issues early, while synchronized log times, often
achieved through NTP, are critical for correlating events across systems, especially in
the case of breaches or incidents.
I SSP attacks.
C • Errors: Unusual or unexpected errors could signal system
for malfunctions.
• Timely log review and analysis are essential for monitoring system health and identifying potential
security breaches.
• Only log relevant data to reduce noise, automate log reviews where possible, and focus on
identifying errors, unauthorized modifications, and breaches.
for
system configuration changes, or network anomalies.
t
No
Review the Logs:
•
h a,
Logs need to be regularly reviewed, either manually or through
Na
automated systems like SIEM (Security Information and Event
Management) to manage large amounts of data efficiently.
jeet
ha
• Regular log reviews help ensure no critical errors or suspicious
activity is missed.
b
l Su
Identify Errors/Anomalies:
•
y Coon detecting key issues such as errors, unauthorized system
Focus
P Bmodifications, or breaches.
I SS • Errors: Unexpected system errors may indicate problems
C that need addressing.
for • Modifications: Unauthorized changes to systems may
C o
• Timely log review and analysis are crucial for monitoring system health and detecting potential
security breaches.
• Organizations should focus on logging relevant data based on risk management principles, use
automated tools for efficient log review, and prioritize identifying errors, unauthorized modifications,
and breaches for proactive response.
ti on
In large organizations with multiple servers, switches, and firewalls,
•
if each device has a slightly different time, tracking and
i bu
str
understanding how an event unfolded is highly challenging.
D i
for
• Example: A firewall may log a suspicious packet at 10:00 AM, but if
t
the server logs the same event as occurring at 10:03 AM, correlating
those two events becomes problematic.
No
Role of Network Time Protocol (NTP):
h a,
•
t Ninaa network are synchronized with the
NTP ensures that all devices
same time source. ee
h ajdevice is synced with a publicly available
ubsuch as one from NIST (National Institute of Standards
• Typically, a network
S
nuclear clock,
C ol
and Technology), to provide an accurate time reference.
• y other network devices then synchronize with this main device,
BAll
I SSP ensuring consistent event log time stamps across the entire network.
C
for
tes
o
ell N
orn
C
• Ensuring consistent time stamps for log events is critical for correlating activities across systems,
especially during security incidents.
• Using Network Time Protocol (NTP) to synchronize devices within a network ensures accurate and
unified time logging, which is vital for effective monitoring, incident response, and forensic
investigations.
s t r
Collected from multiple sources and stored in a centralizedi system for easier
3. Collection:
1.
D
r loss
2.
access and analysis.
t fo
Proper collection ensures completeness and prevents of valuable log data.
4. Normalization: o
N formats; normalization converts
1.
a
Logs from different systems may have , different
h of logs across diverse systems.
logs into a uniform format for analysis.
a
tN
2. This step simplifies the correlation
5. Analysis:
e
jefor insights such as system health, potential security
1.
h a
Analyzing log data
incidents, and performance anomalies.
2.
S ub ortools
Automated
breaches,
(like SIEM) or manual reviews can be used to identify errors,
suspicious activity.
6.
C olLog data must be stored for an appropriate duration to meet legal, regulatory,
Retention:
or
1. Logs must be securely disposed of after their retention period to prevent
ll N
Details to be Covered in Domain 7:
o
challenges, and how to manage logs effectively to support organizational security.
on
crashing due to full log files.
• uti
While efficient, it may result in the loss of valuable older log data,
especially during a long-term investigation.
tr i b
Clipping Levels: D is
• t for
A more selective approach where only events that exceed a defined
threshold are logged.
No
• h a,
Example: Instead of logging every failed login attempt, the system
Na
might log after 15 failed attempts to indicate a potential password-
cracking attempt.
je et
•
bhanoise.
Helps reduce log size by focusing on significant events, filtering out
u
normal operational
• Does o l Soverwrite previous log data, making it more suitable for
not
C security breaches or patterns of unusual activity.
By
identifying
• Circular overwrite and clipping levels are two log file management techniques aimed at controlling
log file sizes.
• Circular overwrite is efficient for saving space but may result in the loss of older data.
• Clipping levels allow for logging only significant events, reducing log size while preserving critical
information, making it a more valuable approach for security monitoring.
No
Synthetic Performance Monitoring (SPM):
a,
• A proactive monitoring method where pre-scripted transactions are
h
generated to simulate real-world activities in the system, without
actual users.
Na
•
jeet
Functional tests ensure different functionalities (like logging in,
ha
transferring funds, etc.) work as expected.
b
Su
• Performance tests under load simulate multiple users
l
simultaneously performing transactions to check how the system
y Co
handles high traffic.
B • Example: A retail e-commerce platform running test scripts before
• Operational testing ensures that systems are functioning properly when in use. Real
User Monitoring (RUM) passively observes live interactions, while Synthetic
Performance Monitoring (SPM) proactively tests system functionality and load
performance using simulated transactions. Both techniques are critical for maintaining
system performance and availability.
or
• Detailed report for development teams, providing in-depth
ll N
decisions based on their roles.
• Regression testing is crucial for ensuring that software updates don’t introduce new problems.
• It verifies that the rest of the system functions correctly after changes are made.
• Reporting results should be tailored to the audience using "metrics that matter"—offering high-level
summaries for executives and detailed reports for technical teams.
a h
Role of Compliance in Security Policies:
t N
• Compliance checks ensure
je e alignment with organizational policies,
ha
procedures, and baselines.
b
S
• Example: After u can confirm
implementing new controls for data protection,
o
compliancel and regulatory requirements
checks that they meet both company
y C
standards like GDPR or HIPAA.
P B
I SS
C
for
tes
o
ell N
orn
C
• Compliance checks are essential for ensuring that security controls not only function as intended
but also meet organizational and regulatory standards.
• By aligning security control testing with policies and standards, organizations can maintain a robust
and compliant security posture.
on
assess the likelihood of a future breach.
SMART Metrics:
uti
•
tr i b
SMART stands for Specific, Measurable, Achievable, Relevant, and
Timely.
D is
for
• Specific: Are the results clearly stated and easy to
understand?
t
• No
Measurable: Can the results be quantified with data?
•
h a,
Achievable: Can the results drive the desired outcomes?
•
Na
Relevant: Are the results aligned with business strategies?
•
eet
Timely: Are the results available when needed?
j
ha
Importance of Metrics in Security:
b
Su
• Metrics like KPIs and KRIs help inform goal setting, action planning,
l
and risk management.
y • Co
SMART metrics ensure that security processes are aligned with
B business objectives and can be effectively monitored.
fo over time.
rn
recovery.
• KPIs are used to evaluate past performance, while KRIs focus on anticipating future risks.
• Both are essential for informed decision-making in security management.
• SMART metrics ensure that goals and outcomes are aligned with the organization’s business strategy
and security objectives, driving measurable, relevant, and timely results.
i bu based
•
s tr
Example: Monitoring phishing attempts or the likelihood of system failures
i
on usage patterns.
Metrics for KPIs: D
r response
• Account Management: Mean time to resolution, average
t fo time,
number of support tickets. o
• Management Review and Approval: Time
a , toNresolve defects, number of
h verified, time between backup
identified defects, process effectiveness.
a
• Backup Verification: Number of N
verifications, amount of data trestored.
backups
e
Metrics for KRIs:
h aje
• b
phishing emailureport rates.
Training and Awareness: Number of employees completing security training,
S
•
C olRecovery
Disaster (DR) and Business Continuity (BC): Recovery Time
B y
Objective
processes.
(RTO), Recovery Point Objective (RPO), time taken to restore critical
I SSP• Account Monitoring: Frequency of password changes, last login times, and
abnormal login activities.
C
for Comparison Between KPIs and KRIs:
• KPIs measure past performance, helping organizations assess whether they met goals, while KRIs
are forward-looking metrics that assess potential future risks.
• Both are critical in risk management, with KPIs focused on operational performance and KRIs on
identifying threats to prevent incidents.
• Effective security management incorporates both types of metrics to ensure comprehensive
monitoring and decision-making.
i
• Remediation is the process of documenting and implementing fixes for
t on
vulnerabilities found during the security assessments.
i bu
s r
t of
i
• Example: After a vulnerability scan identifies an outdated version
software, a patch is applied to resolve the issue.
fo r Dto ensure proper
t
• The remediation process should be well-documented
o
,N
tracking and resolution of issues.
Exception Handling in Test Output:ha
Na during testing may not be
• Sometimes, vulnerabilitiestidentified
je e like budget or the low probability of
addressed due to constraints
exploitation.
bha
• Example: AS u vulnerability in an internal system might be accepted
o
due to lowl minor
risk.
• B y C
Documenting exceptions ensures accountability and helps in risk
S P management by providing justification for why certain issues are not
CIS
fixed.
• Test output involves documenting the results of security assessments, including remediation steps
for vulnerabilities, the reasons for any exceptions, and disclosing new vulnerabilities ethically.
• This process is crucial in addressing risks, managing exceptions transparently, and sharing critical
security information for broader protection.
y Co
stakeholders, such as regulators or customers.
B Audit Plans:
I SSP •
•
An audit plan outlines the steps and objectives of the audit process.
Typically includes the following phases:
r C
fo • Define the audit objective: Identify the purpose of the audit
rn
time periods.
• There are three types of audits: internal, external, and third-party, each serving different functions
based on who conducts the audit and the area of focus.
• An effective audit process includes clearly defining objectives and scope, conducting the audit, and
refining processes based on findings.
• Internal audits focus on organizational processes, external audits focus on vendors, and third -party
audits are independent evaluations often used to build credibility.
for 6. Conduct the audit: Carry out the assessment, gather evidence, and
• An audit plan involves setting clear objectives and a well-defined scope, conducting the audit
systematically, and refining the process afterward.
• Ensuring thorough communication of audit results and involving relevant leaders is essential for
improving organizational processes.
a,
compliance.
Third-Party Audits: a h
t Nhired
e e
• Involves independent auditors
j
by a service provider to assess
tes • The security team plays a critical role in the audit process by providing
o necessary data, evidence, and insights into security controls.
• Audit approaches differ based on who is conducting the audit and what systems are being assessed.
• Internal audits review an organization’s own processes, external audits can evaluate third-party
systems, and third-party audits involve independent assessments of service providers.
• The security function must support the audit process by providing data, ensuring controls are
effective, and offering insights into risk management strategies.
t
• These reports are comprehensive and used by security professionals i on
i b
to assess an organization’s controls beyond just financial data.u
s r
twith care.
i
rD
• Can contain sensitive information and should be handled
SOC 3 Reports:
t fo
• Stripped-down versions of SOC 2 reports. N o
a ,
a hsecurity
• Primarily used for marketing purposes to give prospective customers
e tN
confidence in a service provider’s without revealing sensitive
aje
operational details.
Type 1 Reports:
b h
Sureports
o l
• Point-in-time that focus on the design of controls.
I SSP time.
C Type 2 Reports:
for
tes • More comprehensive reports that focus on both the design and
o operating effectiveness of controls over a period of time, usually one
ll N
year.
• SOC reports help organizations build trust with their customers by assessing security
and operational controls. SOC 2, Type 2 reports are the most valuable for security
professionals as they verify both the design and effectiveness of security controls over
time.
• SOC 3 reports, on the other hand, are mainly used for public disclosure and marketing
purposes. Type 1 reports focus on controls at a specific point in time, whereas Type 2
reports provide a more thorough analysis over an extended period.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
Audit Roles and Responsibilities
Executive (Senior) Management:
• Executive (Senior) Management
• Responsible for setting the tone from the top.
• Audit Committee
• Security Officer • Ensures that the audit process is promoted and that there is clear
support for audits within the organization.
• Compliance Manager
• Internal Auditors • Articulates the importance of assurance across the company.
• External Auditors Audit Committee:
• Consists of key board members and senior stakeholders.
• Provides oversight and strategic direction to the audit program.
• Ensures that the audit process aligns with organizational goals and
regulatory requirements. ti on
i bu
Security Officer (CSO/CISO):
s r
tduring audits.
i
rD
• Advises on security-related risks that should be addressed
•
t fo
Provides input on critical security controls and areas of focus based on
emerging threats and vulnerabilities.
N o
Compliance Manager:
, laws, regulations, and
arelevant
h
Na
• Ensures corporate compliance with
internal policies.
t
•
required audits area jee auditor
Oversees audit scheduling,
conducted
training, and ensures that all
on time.
h
Plays a key rolebin ensuring the organization meets industry standards
•
S u
InternalC o l
and legal obligations.
Auditors:
y
• BEmployees of the company who conduct internal audits.
P
S • Their
CI S role is to provide assurance that internal controls are functioning as
intended and corporate governance is being maintained.
orn • Their reports are used to build credibility and trust with stakeholders,
C such as regulators or customers.
• Audit roles are distributed among senior management, security officers, compliance managers, and
auditors (both internal and external).
• Senior management sets the tone for audits, while the audit committee oversees the process.
• Security officers advise on security risks, and compliance managers ensure adherence to
regulations. Internal auditors verify internal controls, and external auditors provide an independent,
unbiased audit of the organization’s controls.
e e
ajobjectives
• The goal of security operations
b h
enabling it to meet its without disruption.
• This includesu
l S and data, providing incident response capabilities,
ensuring confidentiality, integrity, and availability (CIA
triad) ofosystems
and C
B y enforcing compliance with regulations.
S P• By mitigating risks and handling security incidents effectively,
or
securely.
s f
o te
ell N
orn
C
• Security operations are essential for maintaining the security and resilience of an organization’s
systems.
• They integrate security practices with organizational processes and support the business in
achieving its goals without compromising on security.
• Effective security operations help manage risks, respond to incidents, and ensure compliance with
policies and regulations.
ti on
• Seal off access: Prevent unauthorized individuals from entering the area
where the incident or crime took place.
i bu
• Take photographs: Capture detailed images of the sceneis
tr
before
anything is moved or disturbed.
fo rD
• Document evidence: Record the exact location o t of all evidence,
including digital devices, to create a clearN
a , and reliable record of the
scene.
a h
N mobile devices, and storage
tUSBs)
• Avoid touching anything: Computers,
je
media (like hard drives ande must not be physically tampered
b ha
with, as this could alter or destroy vital evidence.
l Suthetechniques
• Employ forensic for imaging or snapshotting data without
Co of Evidence in Investigations:
compromising system's integrity.
B y
Contamination
P
S state. evidence is contaminated, it cannot be restored to its original
CI S • Once
rn
tampering.
C o
• Securing the scene is essential in any investigation to preserve evidence. Investigators must follow
proper procedures like sealing off the area, documenting the scene, and avoiding any interaction
with digital devices.
• Ensuring that evidence is not contaminated allows investigators to maintain the integrity of the
investigation, leading to reliable conclusions and upholding the legal admissibility of evidence.
No
evidence.
a,
2. Collection of Evidence:
•
h
Proper collection methods are used for both physical and digital
evidence.
Na
•
jeet
Policies and standards guide the collection process to preserve
evidence integrity.
bha
3. Examination and Analysis:
•
l Su Evidence is examined through manual and automated processes
Co
to determine its relevance to the investigation.
• The analysis helps to build a case or identify the responsible party.
By 4. Final Reporting:
I SSP •
•
Results of the investigation are compiled into a detailed report.
The report outlines the entire investigation process, findings,
r C recommendations, and actions required.
fo • Reports may vary depending on the audience and level of detail
es required.
ot Chain of Custody:
ell N • Key in maintaining the integrity of evidence, it records who handled the
rn
evidence, when, and where.
• Forensic investigation involves identifying and securing the scene, collecting evidence while
maintaining the chain of custody, and examining and analyzing the data.
• The final report is critical for summarizing findings and may need to be tailored for different
audiences.
on
• Photographs, video/audio recordings, and security footage
related to the investigation.
uti
Evidence Types:
tr i b
1. Real Evidence:
D is
for
• Tangible physical objects, such as hard drives and USBs. They
are physical evidence that can be inspected and used to prove
t
No
or disprove factual issues in trials.
a,
2. Direct Evidence:
•
h
Evidence that speaks for itself, requiring no inference (e.g.,
Na
video footage of the crime happening).
3.
et
Circumstantial Evidence:
je
ha
• Indirect evidence that suggests a fact by implication. It can
b
prove an intermediate fact, such as a witness stating the
l Su
defendant was near the crime scene.
Co
4. Corroborative Evidence:
I SSP 5.
trials.
Hearsay Evidence:
r C
fo • Testimony from witnesses who were not present at the event. It
ll N
• Stipulates that original evidence should be presented in court
C o 7. Secondary Evidence:
• Substitutes for original evidence, such as a printout of log files,
used when the original no longer exists.
t fo
physical tools, or access to needed information.
Locard’s Exchange Principle: N o
Definition: h a,
•
a whenever two objects interact, a
Nthat
• t
This principle posits
e occurs. Something is always taken and
je
transfer of material
somethingais always left behind.
bh
Applicationuin Forensics:
lS
•
• o In every investigation, detectives search for traces left behind
By C (e.g., fingerprints, DNA, fibers) and evidence of what might
CI S
or
vacuuming for fibers, and fingerprint analysis, following this
o te • Example:
ll N
A hacker breaks into a system, leaving behind IP addresses, login
on
• Definition:
•
ti
Live evidence refers to data stored temporarily in a running system,
u
b
such as in RAM, cache, or system buffers.
• Example:
tr i
•
D is
Information in active memory that will be lost if the system is turned
for
off or rebooted. It’s crucial to extract this data during a live forensic
analysis.
t
Forensic Copies:
No
• Definition:
h a,
Na
• Forensic copies are bit-for-bit replicas of digital media (e.g., hard
drives, SSDs). They ensure that the integrity of the original data is
jeet
preserved for forensic analysis.
ha
• Importance:
•
bForensic copies allow investigators to analyze data without altering
Co
investigation.
s f • Tools like FTK (Forensic Toolkit) and EnCase are often used to extract
ll N
Artifacts in Digital Forensics:
rn e • Definition:
o
• Artifacts are traces left behind after a breach or attempted breach.
C These act as clues, often pointing to the actions or path of an
attacker.
• Example:
• Artifacts can include log files, registry changes, malware traces, or
deleted files that show tampering or unauthorized access attempts.
• Digital forensics involves the systematic collection and analysis of digital data, often crucial in legal
investigations.
• Live evidence, forensic copies, and artifacts all play key roles in this process.
• Digital forensics tools and procedures ensure the proper handling of data, maintaining the integrity of
evidence for investigation or court presentation.
for
the keyboard) can change or overwrite crucial evidence.
t
No
• Immediacy:
• The need for immediate action to collect data without disrupting
a,
the system, as powering off the system leads to the loss of live
h
Na
evidence.
et
Specialized Tools for Live Evidence:
je
ha
• Tools and Expertise:
•
b
Extracting live evidence requires expert knowledge and
Co
changing the system state. Tools like Volatility and FTK Imager
can be used to capture RAM content and other live system data.
By • Minimizing Contamination:
ot • Data Loss:
rn
storage such as RAM or CPU registers is lost. This can severely
C o • Example:
hinder an investigation as crucial evidence may be irretrievable.
• Live evidence is volatile and requires careful handling during digital forensic investigations.
• Special tools and expertise are necessary to extract this data while minimizing the risk of
contamination.
• Disrupting the system can result in permanent loss of critical evidence, which makes live evidence
collection both challenging and urgent.
a,
MD5, SHA-1) to ensure data integrity.
Handling the Original Hard Drive:
h
• Preservation:
Na
•
eet
Once the forensic copies are made, the original hard drive
j
ha
should be placed in an evidence bag, sealed, and never touched
b
again unless absolutely necessary. This ensures the chain of
l Su
custody is maintained, preserving the integrity of the evidence.
Co
• Example:
SP
investigators immediately store the original in an evidence bag
and focus on analyzing the forensic copies.
es
ot
• The first forensic copy is archived, similar to the original, and is
never used. The second copy, known as the working copy, is
ell N used for analysis to avoid contaminating the original data. This
rn
working copy allows investigators to perform various tests
C o • Example:
without risking the integrity of the original evidence.
• Forensic copies are exact duplicates of a digital storage device, created to preserve the integrity of
evidence while allowing investigators to perform analysis.
• The original hard drive and the first copy are sealed as evidence, while the second copy, known as
the working copy, is used for forensic examination.
• This process ensures the evidence remains untainted throughout the investigation.
ti on
pressing keys, alters the state of the system and can contaminate the
u
evidence.
• Specialized Tools Required:
tr i b
•
D is
Expert knowledge and forensic tools (e.g., Volatility, FTK Imager) are
essential to extract live evidence without affecting its integrity.
• Example:
t for
No
• In the case of an ongoing cyberattack, capturing data from RAM can
reveal information about active processes, encryption keys, or
a,
malware residing in volatile memory.
h
Na
Forensic Copies and Handling:
et
• Definition:
•
je
Forensic copies are exact, bit-for-bit replicas of digital storage media
ha
(e.g., hard drives). These copies preserve evidence for analysis while
Su
• Handling Procedures:
l
Co
• After creating two bit-for-bit copies, the original hard drive is sealed in
an evidence bag and stored. One of the copies is also sealed, while the
SP
Importance of Bit-for-Bit Copies:
CI S • Definition:
• A bit-for-bit copy means the entire content of the original drive,
es exactly.
ll N
• To verify the integrity of the forensic copies, hashing (e.g., using MD5 or
C o • Example:
• During an investigation, the hard drive from a suspect's laptop is
copied bit-for-bit, and the hash values of the original and copies are
compared to ensure no data alteration.
• Live evidence is volatile and can be easily lost if a system’s state changes. Specialized tools are
required to extract it without contamination.
• Forensic copies, on the other hand, provide exact, bit-for-bit replicas of storage media.
• Creating these copies ensures that the original data remains untouched, allowing detailed analysis
of the duplicate.
• Verifying the integrity of the copies using hash values ensures the copies are accurate and can be
used as valid evidence in legal proceedings.
t
Computer systems, web browsers, mobile devices, hard
•
No
drives, and flash drives all generate artifacts.
• Common Artifacts:
h a,
• a
Nand
IP addresses, file names/types, registry keys, operating
t
echanges.
system information, logged information like account
e
updates andjfile
a
Example of Use:bh
•
u
AnSIP address found in the browser history could help identify
l
Cothe
•
location of an attacker. Similarly, registry keys might show
B y when malware was installed.
I SSP
r C
fo
es
ot
ell N
orn
C
• Mobile device forensic analysis is challenging due to rapid changes in operating systems, lack of
universal tools, and the complexity of suspended applications.
• Investigators require specialized training and tools to handle this complexity. Forensic artifacts are
crucial pieces of evidence in any investigation, acting as clues that can reveal the actions and
identity of an attacker.
• Proper reporting and documentation throughout the investigation process are necessary to ensure
the evidence is clear, accurate, and legally valid for stakeholders.
ti on
documentation and handling minimize the risk of the evidence
being dismissed.
i bu
• Preventing Contamination:
str
•
D i
Evidence must be handled and stored carefully to prevent any
for
form of contamination, tampering, or deterioration, especially
t
when it may need to be presented in court years later.
• Documentation:
No
•
h a,
The chain of custody involves documenting every transfer or
Na
handling of evidence, noting the time, date, and individuals
involved in each step.
jeet
Steps in Establishing and Maintaining the Chain of Custody:
•
bha
Tag the Evidence:
Su
• Evidence should be clearly tagged to document where it was
l collected, by whom, and on what date.
y
• Co
Bag the Evidence:
B • After tagging, the evidence should be stored securely in a sealed
ot
storage location (e.g., an evidence locker) where it will remain
ll N
until it is needed for analysis or court proceedings.
rn e • Example:
• The chain of custody ensures that evidence is collected, documented, and stored in a way that
maintains its integrity for use in legal proceedings.
• Key steps include tagging, bagging, and securely storing the evidence.
• Maintaining a clear chain of custody is critical to ensuring that evidence is admissible in court and
free from contamination.
i bu
Rule 2: Accurate:
str
• Meaning:
D i
for
• The evidence must retain its integrity and not be altered from the time it was
collected. This helps ensure that the data or physical objects are reliable.
t
No
• Example:
• A hard drive image that is shown to have the same hash value as the original
a,
drive, confirming it has not been modified.
h
Na
Rule 3: Complete:
• Meaning:
•
jeet
All relevant parts of the evidence must be presented, including those that
ha
may support or contradict the case. Presenting only part of the evidence can
undermine the investigation.
b
Su
• Example:
•
l Logs from a computer system must be presented in their entirety, not just
Co
selectively chosen entries.
r C non-technical individuals.
fo • Example:
ll N
Rule 5: Admissible:
rn e • Meaning:
o
• Evidence must be permissible in court. Proper handling and maintaining the
C chain of custody can help ensure the evidence is admissible, but it doesn't
guarantee it.
• Example:
• Ensuring that digital evidence, like emails, is collected in a way that follows
legal standards so it can be presented in court.
on
• Searching for both existing and deleted files. Even when files are
erased.
uti
deleted, they often remain on the drive, with only the file pointers being
• Example:
tr i b
• is
A hard drive analysis reveals remnants of deleted files, allowing
D
for
recovery of critical evidence that could provide insight into the
incident.
t
No
Software Analysis:
a,
• Meaning:
h
Na
• This technique involves analyzing software, especially malware, to
understand its functionality, purpose, and origin.
• Key Focus:
jeet
ha
• Uncovering how malware operates and identifying clues that could
Su
determine who may be responsible for the malicious software.
l
Co
• Example:
SP
potential attribution.
CI S Network Analysis:
for • Meaning:
• Network analysis examines how a network was accessed, how it was
es traversed, and which systems were compromised during an incident.
ot • Key Focus:
ell N • Logs from systems and network devices are typically examined to track
rn
the movement of attackers through the network and uncover potential
C o • Example:
vulnerabilities.
• Investigative techniques such as media analysis, software analysis, and network analysis are
essential tools in digital forensics.
• Each method focuses on different aspects of the investigation: media analysis recovers deleted
data, software analysis decodes malicious software, and network analysis traces the attacker’s
movements through a compromised network.
• All techniques together help to form a comprehensive understanding of the incident and are critical
to securing evidence.
on
where the crime occurred.
• Example:
uti
•
tr i b
A hacker breaches a company’s systems and steals sensitive customer
data. Law enforcement takes over the investigation to pursue charges of
cybercrime.
D is
for
Civil Investigations:
• Definition:
t
No
• These involve disputes between individuals or organizations, and the
outcome typically results in fines or monetary penalties rather than criminal
a,
sentences.
• Driven by:
h
•
Na
The involved organizations, individuals, or their legal representatives.
• Example:
•
jeet
Two companies are involved in a legal dispute over intellectual property,
bha
and the court assigns financial damages to the losing party.
Su
Regulatory Investigations:
l
• Definition:
Co
• These investigations focus on violations of regulatory requirements
y
governing specific industries.
B • Driven by:
SP
• The relevant regulatory body overseeing the compliance of organizations.
CI S • Example:
• A company is investigated by a financial regulatory body for failing to
s
Administrative Investigations:
ote • Definition:
• These deal with internal violations of an organization’s policies or
ll N
procedures. The focus is on resolving organizational issues without
o
• Driven by:
C • Example:
• The organization itself.
str
indicate suspicious activities or potential threats.
• Reporting and Alerts:
D i
for
• The system generates reports and real-time alerts on
t
important security events, facilitating quick detection and
response to incidents.
No
• Correlation and Centralization:
h a,
Na
• SIEM systems correlate data from different systems to identify
et
potential security incidents that may not be apparent when
je
viewed in isolation.
ha
Benefits of SIEM:
b
Su
• Centralized Monitoring:
l
Co
• Provides a single pane of glass for monitoring security events
across an organization.
By • Real-Time Threat Detection:
ll N
standards and requirements.
• SIEM systems play a critical role in security operations by aggregating and analyzing log data from
multiple sources to detect, monitor, and respond to security threats.
• They enable centralized visibility, enhance incident response capabilities, and support compliance
efforts, making them essential for robust security operations.
on
• SIEM systems alert security analysts when suspicious activity is
ti
detected, allowing them to respond to potential incidents in real-
u
time.
tr i b
•
D is
Example: Analyzing login activity from different users to detect if
they share the same IP address, which could indicate a
for
compromised account.
Human and Process Integration: t
No
•
• Beyond technology, SIEM requires trained personnel to analyze
a,
alerts effectively and escalation procedures to handle incidents
h
Na
appropriately.
et
Key Capabilities of SIEM:
1.
j
Aggregation:
e
•
bha
Brings together logs from multiple sources across an organization
Su
under a unified platform.
2.
l
Normalization:
y Co
• Converts logs from different formats (e.g., time/date formats) into a
B standardized format.
SP
3. Deduplication:
for 4.
redundant data.
Correlation:
es
ot
• Identifies relationships between events that may indicate a security
ll N
issue (e.g., multiple failed login attempts followed by a successful
login).
rn e 5. Secure Storage:
• Operating Systems:
• Logs from Windows, Linux, and other OS.
t i on
Intrusion Prevention and Detection Systems (IPS/IDS):
i b u
r
•
Logs related to intrusion attempts and suspicious traffict patterns.
•
D is
t for
N o
h a,
t Na
je e
b ha
l Su
y Co
B
I SSP
r C
fo
es
ot
ell N
orn
C
• SIEM systems are integral to security operations, allowing organizations to collect, normalize, and
correlate logs from multiple sources to detect security incidents.
• Key functionalities like aggregation, secure storage, and correlation enable faster threat detection,
real-time alerts, and support for compliance requirements.
on
vulnerabilities and threat actors.
• Helps organizations move from reactive to proactive defense,
uti
strengthening their digital security posture.
tr i b
Threat Intelligence Sources:
D is
1. Vendor Trend Reports:
t f or
•
N omethods,
Reports published by security vendors detailing recent and
a ,
significant threats, common attack and known
ah
vulnerabilities.
2. Public Sector Reports (e.g., N
t and detailed guidance for handling and
US-CERT):
ealerts
•
je
Provides critical
mitigatinga
h current threats, particularly for infrastructure and
publicbsectors.
l SuSharing and Analysis Centers (ISACs):
C• o ISACs are sector-specific hubs where organizations can share
3. Information
CI S
for • Includes open-source threat intelligence platforms, government
C o •
external threat data, adding enhanced detection and alerting capabilities.
Allows SIEMs to correlate internal events with known threat data, helping
to identify suspicious activity more accurately.
Na
such as unauthorized data access or privilege misuse.
et
2. Hacked Privileged Accounts:
•
je
Monitors for abnormal actions performed by privileged
bha
accounts, indicating a potential compromise.
3.
Su
Brute-Force Attacks:
l
Co
• Identifies patterns of repeated access attempts and login
By 4.
failures as indicators of brute-force attacks.
General Anomaly Detection:
ll N
providing security teams with alerts before a breach progresses.
on
• Adaptation to Changes: Allows rapid detection and adaptation to
threats.
uti
changes in the environment, such as new vulnerabilities or emerging
S P• Amonitoring
SIEM, once set up and tuned, plays a pivotal role in the continuous
process by:
rn ell •
when suspicious activities are detected.
Supporting Compliance: Enabling continuous
C o monitoring for compliance requirements, including
record-keeping and audit readiness.
jeet
monitoring to focus on actionable alerts.
ha
Importance of Continuous Monitoring for a SIEM System:
•
b
Initial Setup: While the SIEM setup process can take months to
Su
complete due to complexities, the work doesn’t stop once it’s
l
Co
operational. Regular updates and monitoring are essential for
By •
optimal functioning.
Ongoing Adjustments: To maintain effectiveness, the SIEM must
on
threats.
2. Incident Response:
uti
•
tr i
Automates and streamlines the response process for
b
of security events.
D is
incidents, ensuring quick detection, response, and resolution
et
• SOAR tools are designed to integrate with other security technologies,
je
providing a unified approach to security management.
•
bha
Automation: SOAR uses automated workflows and responses based
Su
on established policies, which enable quicker and more consistent
l
incident handling.
y
•
Co
Machine Learning: Employs machine learning to assist with threat
B detection and to improve SOC efficiency, helping security teams
SP
continuously enhance their response tactics.
ell N resilience.
rn
• Consistent Threat Management: Automated workflows ensure
• SOAR combines compatible technologies to streamline threat management, incident response, and
operational automation.
• By consolidating data from diverse sources, automating workflows, and leveraging machine learning,
SOAR enhances SOC capabilities, improves incident response times, and enables more efficient and
consistent security operations.
on
software, applying security patches, and ensuring it meets baseline
standards.
uti
2. Baselining:
tr i b
s
• Definition: Baselining is creating a standard configuration for systems and
i
applications, defining the security and performance parameters each asset
D
for
must meet.
t
• Example: Establishing a baseline for a server OS that includes approved
No
software, specific configurations, and security settings. Baselines act as
reference points for compliance and change management.
3. Automation:
h a,
Na
• Definition: Automation within CM involves using tools and scripts to apply
et
configurations, manage updates, and track changes consistently and with
minimal human intervention.
je
ha
• Example: Automated patch management tools update systems as per the
baseline requirements, reducing the chances of human error and ensuring
b
Su
consistency.
l
CM Lifecycle and Processes:
Co
• Establish Baselines: Identify and set configurations and standards for systems and
By •
assets.
Provision Assets: Deploy systems and apply baseline configurations.
I SSP •
•
Monitor Changes: Continuously monitor systems to detect deviations from the baseline.
Update and Maintain: Apply updates and make necessary configuration adjustments to
fo • Audit and Document: Regularly audit systems against the baseline and maintain
ll N
• Improved Security: Consistent configurations reduce vulnerabilities and make it easier
rn e •
to detect unauthorized changes.
Operational Efficiency: Automation and standard baselines streamline the deployment,
C o •
maintenance, and troubleshooting of systems.
Compliance: Maintains alignment with industry regulations and organizational policies,
ensuring all systems meet required security and operational standards.
• Reduced Downtime: Standardized configurations help prevent compatibility issues and
configuration drift that could cause system failures.
a,
default credentials and applying strict access control
h
configurations aligned with the organization’s baseline.
Asset Inventory Database: Na
•
eet
The database should be updated each time an asset is added or
j
ha
removed to ensure the inventory remains current.
b
Su
• Importance: A current asset inventory helps track asset ownership,
l
status, and condition, facilitating timely patching, scanning, and
y Co
configuration compliance.
SP
database should reflect its version, deployment date, and
• An asset inventory is essential for tracking organizational assets and reducing vulnerabilities by
maintaining control over all hardware and software.
• Secure provisioning during asset deployment, coupled with an up-to-date inventory database,
supports asset management, providing visibility, accountability, and regular maintenance
throughout the asset life cycle.
Na
only what is required for operational purposes.
et
• Example: Disabling unused ports and services on network
je
devices as part of the deployment process.
ha
Automation in Provisioning:
b
•
l Su
Automated provisioning tools support consistency in configurations,
Co
especially in larger environments, reducing human error and saving
time.
By • Benefits: Automation ensures uniformity in device settings across
ll N
asset under management.
C o 3.
measures.
Document configuration: Record settings for reference, audits,
and troubleshooting.
4. Verify configuration: Use tools like credentialed vulnerability
scans to confirm compliance with configurations.
a,
rights or access within systems.
•
h
Objective: Ensures sensitive accounts are monitored and accessed
Na
securely, reducing the risk of misuse.
•
jeet
Example: Administrative accounts with access to core servers
ha
are only accessible to authorized personnel with multi-factor
bauthentication.
Su
Job Rotation:
l
Co
• Definition: Regularly rotating employees through different roles to
SP
• Objective: Reduces fraud by preventing employees from having
prolonged control over sensitive areas, encouraging cross-training.
• Foundational security operations concepts enforce secure, structured, and monitored access within
organizations.
• Principles like need to know, least privilege, and separation of duties prevent unauthorized data
access and misuse.
• PAM focuses on protecting privileged accounts, while job rotation helps deter fraud.
• SLAs formalize expectations between parties, enhancing accountability and service standards.
on
should be logged and monitored in detail.
•
ti
Example: An IT admin has a regular user account for daily tasks and a
u
Need to Know vs. Least Privilege:
tr b
separate privileged account used strictly for system maintenance.
i
•
D is
Need to Know: Restricts a user’s knowledge or access to only the data
for
necessary for their role.
•
t
Example: An HR employee can access employee records but cannot
No
view financial data.
a,
• Least Privilege: Limits a user’s actions and privileges to those required for their
specific duties.
h
•
Na
Example: A network technician can view network configurations but
Job Rotation:
jeet
cannot make system-wide changes.
•
bha
Definition: Periodically rotating employees through different roles to prevent
Su
prolonged control over sensitive functions.
•
l
Benefits:
y Co
• Fraud Deterrence: Reduces opportunity for fraudulent behavior.
SP
• Cross-Training: Prepares employees to cover multiple roles,
CI S •
preventing single points of failure.
Example: Employees in finance rotate through different audit
ot
• Definition: Legal contracts between a customer and vendor detailing
ll N
performance standards, response times, and other agreed-upon operational
specifics.
rn e • Key Elements:
C o •
•
Response Times: Define time frames for specific incident responses.
Performance Standards: Set benchmarks for acceptable service
quality and availability.
• Example: A cloud service provider agrees in an SLA to address critical
incidents within one hour.
• Foundational security concepts—PAM, need to know, least privilege, job rotation, and SLAs—
enhance security within an organization.
• PAM restricts and monitors high-access accounts to prevent misuse.
• Need to know and least privilege principles ensure access and actions are limited to job -specific
requirements, reducing exposure risk.
• Job rotation minimizes fraud potential and encourages skill development.
• SLAs provide structured agreements, establishing expectations for service quality and response.
Na
compatibility and data preservation.
et
Key Media Management Considerations:
•
je
Factors to Consider: Confidentiality, access speeds, portability,
ha
durability, media format, and data format.
b
Su
• Example - Confidentiality: Encryption algorithms should be
l evaluated for long-term use; strong cryptography today may be
ll N
• Inventory Management: Complete asset inventory is essential to track
• Media management is crucial for protecting and retaining data over time.
• With diverse storage media and durability requirements, managing assets effectively requires regular
inventory, careful consideration of MTBF, and data migration to maintain accessibility and security.
• Asset management practices are essential, covering hardware/software lifecycle, secure
configurations, and regulatory compliance, to minimize risks and optimize asset value.
a,
3. Response:
•
h
Confirm the incident, assemble the incident response team, and
Na
activate response protocols.
•
4. Mitigation:
jeet
Take initial steps to contain the incident and prevent further damage.
•
bha
Implement containment actions (e.g., isolating affected systems,
Su
blocking malicious IPs).
l
• Stop the incident from spreading and limit its impact on other systems.
Co
5. Reporting:
r C 6. Recovery:
es replacements.
ll N
7. Remediation:
rn e •
•
Identify and eliminate the root cause to prevent recurrence.
Update security controls, policies, or procedures as needed.
C o 8. Lessons Learned:
• Conduct a post-incident review to analyze the incident and response
effectiveness.
• Document improvements to refine future incident response and
resilience.
• The incident response process involves preparing for potential incidents, detecting threats, and
responding quickly to contain and mitigate impact.
• Post-incident, a thorough analysis and lessons learned help strengthen future response capabilities
and improve organizational resilience.
fo data.
ell N access.
rn
• Employee Error: Unintentional mistakes that compromise security.
• An event is a routine occurrence with no immediate threat, while an incident is an adverse event
requiring a structured response.
• Distinguishing between the two ensures resources are used efficiently, with incident response
reserved for cases that demand urgent security action and containment.
on
Response (IR Team):
• Objective: Activate the Incident Response team after detection.
u ti
•
tr b
Actions: Conduct an impact assessment to gauge the scale,iimpact,
and required resources or departments.
is
Mitigation (Containment):
fo rD
Objective: Limit the impact of the incident. t
•
N o
•
,
Actions: Focus on containing the issue to prevent further damage
aisolating
h
without necessarily resolving it (e.g., affected systems).
Reporting:
t Na
•
j
Objective: Communicate
ee incident status to stakeholders.
a updates during containment and designate a
Actions: Providehongoing
•
spokespersonu bto ensure message consistency.
S
ol to Normal):
Recovery (Return
C
•
B yObjective: Restore normal operations.
S P• Actions: Clean up, repair affected areas, and ensure systems return to
CIS
functional status.
or
Remediation (Prevention):
ll N
• Actions: Implement system improvements and fixes to mitigate similar
incidents in the future.
• The Incident Response Process involves structured steps starting with preparation, detecting
incidents, responding, containing the impact, and then moving to recovery and preventative
measures.
• Effective incident response relies on organized communication, clear roles, and continuous
improvement based on lessons learned to strengthen the organization’s security posture.
on
without user action.
•
t
Example: A worm infecting one device in a network, spreading to
u i
others autonomously.
Logic Bomb:
tr i b
•
D is
Characteristics: Executes malicious actions based on a specific
for
trigger condition in the code.
•
t
Example: Deletes files if a certain date or condition is met.
Trojan Horse:
No
•
h a,
Characteristics: Appears harmless but contains hidden malicious
Na
code.
• Example: An application disguised as a utility but steals data once
installed.
jeet
ha
Polymorphic Malware:
•
b
Characteristics: Changes its code or appearance to evade detection.
•
l Su
Example: Malware that alters its binary pattern to bypass antivirus
Co
scans.
By Ransomware:
• Characteristics: Encrypts files or systems and demands ransom for
I SSP •
the decryption key.
Example: Locks users out of critical systems until a ransom payment
r C is made.
fo Rootkit:
es
ot
• Characteristics: Conceals malicious tools or processes, often giving
ll N
attackers hidden access.
• Example: A rootkit that embeds itself in a system kernel, hiding its
rn e activities.
C o Zero-Day:
• Characteristics: Newly discovered malware without known detection
signatures.
• Example: Malware exploiting an undisclosed vulnerability, making it
undetectable by current security measures.
• Malware encompasses a range of harmful software types, each with unique behaviors and impacts.
• Understanding specific types, like viruses, worms, and ransomware, helps in identifying preventive
and remedial actions.
• Emerging malware like polymorphic and zero-day variants require adaptive and proactive security
measures to counter evolving threats effectively.
on
• Botnet • Found in documents like Excel, uses simple code that can automate malicious
• Boot Sector Infector actions.
Multipartite:
uti
b
•
• Hoaxes/Pranks •
tr i
Spreads through multiple vectors (e.g., Stuxnet spreading via USB then targeting
•
•
Logic Bomb
Stealth
systems).
D is
for
• Polymorphic:
• Ransomware • Changes form (file name, size, structure) each time it replicates to avoid
detection.
t
No
• Rootkit
• Trojan Horse:
a,
• Data Diddler • Disguised as legitimate software but contains hidden malicious code.
• Zero-Day
h
Na
• Botnet:
• Network of infected devices under an attacker's control, often used in DDoS
•
j et
attacks or spamming.
e
Boot Sector Infector:
•
bha
Installs in the boot sector of a hard drive, making it hard to detect and remove.
Su
• Hoaxes/Pranks:
•
l Not actual software, typically social engineering attempts causing harm or
Co
amusement.
By • Logic Bomb:
• Code that activates when certain conditions are met (e.g., deletion of files if a
SP
user is no longer employed).
CI S • Stealth Malware:
• Actively hides its presence, disabling security measures on the infected system.
for • Ransomware:
ot
data exfiltration.
ll N
• Rootkit:
Collection of tools to hide malware presence, typically provides ongoing control
e
•
rn
to attacker.
C o • Data Diddler:
• Makes subtle changes to data over time, often used in financial fraud (e.g.,
salami attacks).
• Zero-Day:
• Newly discovered, no existing detection signatures; dangerous due to lack of
awareness.
• Malware encompasses a variety of types, each with specific characteristics and potential impacts on
system security.
• Understanding the distinctions among viruses, worms, Trojans, ransomware, rootkits, and zero-day
attacks allows for better detection, prevention, and response strategies, supporting comprehensive
defense in an evolving threat landscape.
on
• Continuous monitoring and log analysis across the
organization’s infrastructure.
uti
• Auditing Services:
tr i b
is
rD
• Regular or ad-hoc audits to ensure compliance with
t fo
regulatory standards and internal policies.
• Penetration Testing: o
Nvulnerabilities through
•
a ,
External testers attempt to find
simulated attacks, oftenhperformed annually or biannually.
t Na
•
je e and response to evolving malware
Antivirus and Malware Management:
• a through continuously updated protection.
Managed detection
hoften
b
threats,
u
l SServices:
•
C o Specialized in analyzing incidents post-breach, recovering
Forensic
B y •
data, and assessing the impact of an attack.
P
S Importance of Third-Party Security Services:
I S
C • Cost-Effectiveness: Reduces the need for in-house infrastructure
for
es and specialized staff for every security task.
ot
ll N
• Expertise: Access to specialized skills and the latest technology
• Third-party provided security services allow organizations to enhance their security posture by
leveraging external expertise and infrastructure.
• Services like SIEM, penetration testing, and forensic analysis offer flexibility, scalability, and access
to advanced skills, supporting robust security without extensive internal resource allocation.
• This approach is integral in cloud environments where specialized, ongoing security support is often
required.
B yC
to guide behavior and protocol.
CIS
Objective: Educate users on recognizing suspicious files,
or
avoiding risky websites, and following safe email practices.
ell N
orn
C
• Anti-malware software is essential in safeguarding systems from malicious software, utilizing both
signature-based and heuristic detection to identify and neutralize threats.
• While technology is critical, robust policies and regular user training are equally important in
creating an effective defense against malware outbreaks.
• Heuristic detection offers a broader protection spectrum, while user awareness minimizes human-
initiated infections, making anti-malware efforts more comprehensive and resilient.
et
2. Two Methods:
je
1. Static scanning: examines code structure.
Su
environment.
l
Co
3. Pros: Can detect new, unknown malware.
ot
Change Detection (File Integrity Monitoring):
ll N
• Common in Linux systems; checks for modifications in key system files.
• Effective malware prevention combines user training, policies, and multiple technical detection
approaches.
• Signature-based and heuristic-based methods target known and unknown threats, respectively,
while activity monitoring and change detection add layers of defense.
• Regular updates to both detection tools and user training are critical to maintaining protection
against evolving threats.
y
•
Co
Network Risk Scoring: Assigns risk scores to network activities,
B helping prioritize security responses based on detected risk levels.
SP
• Automation of Security Tasks: Automates repetitive security tasks,
ot
attempts.
ll N
• Evasive Malware: Detects malware that uses advanced
• ML and AI-based tools offer enhanced security capabilities through predictive modeling and
automation.
• In security, they support threat detection, risk scoring, and cybercrime response by learning from
past data, analyzing patterns, and enabling quicker response to threats.
• This application of ML/AI transforms security processes, enhancing both system protection and
efficiency in managing complex security challenges.
a,
critical operations.
h
Na
• Threat Intelligence: Important to stay updated on new vulnerabilities,
et
often sourced from internal intelligence, vendor updates, and news feeds.
je
Determining Patch Levels:
ha
• Agent-Based Monitoring:
b
Su
• Agent installed on host: Checks software versions against a
l
Co
master database and initiates updates if needed.
By
• Agentless Monitoring:
• External monitoring tool connects to each device and assesses
r C • Passive Detection:
es
ot
patch levels from network traffic.
N
ell
Method Description
rn
Software on each host, auto-
Agent
C o updates
on
• Process: Uses tools like Windows Server Update Services
(WSUS) for consistent updates.
uti
tr i b
D is
t for
Deployment
N o
Description
, ideal for critical systems
aDirect,
h
Na
Manual
ha
Automated
updates
b
l Su
y Co
B
I SSP
r C
fo
es
ot
ell N
orn
C
str
3. Approval:
•
D i
Multiple Stages: Based on the importance of the change.
•
t for
Key Personnel: System owner, stakeholders, and possibly a Change
No
Advisory Board (CAB) for major changes.
• Flexible Levels: Less review for minor changes; high review for costly or
high-impact changes.
h a,
Na
4. Build and Test:
et
• Testing Environment: Conduct development and testing in a controlled
e
test environment.
j
ha
• Types of Testing: Includes regression and validation testing to ensure
b
functionality and stability.
Su
5. Notification:
l
Co
• Prior to Implementation: Inform key stakeholders of the impending
change to allow for input or readiness.
By
6. Implement:
SP
• Execution: Apply the tested and approved change in the live
CI S 7. Validation:
environment.
ll N
• Documentation: Critical to keep detailed records at each step.
on
Inform key stakeholders before
Notification
implementation
fo for version
Validation
with management and stakeholders
t
otracking
N
Complete documentation
Documentation
a,
and baseline
h
Na
jeet
bha
l Su
y Co
B
I SSP
r C
fo
es
ot
ell N
orn
C
on
• Description: Allows systems to remain operational, often at
reduced capacity, despite component or system failure.
u ti
Usage Example: In network switches or firewalls, abfail-open
•
tr i
is
mode allows traffic to continue flowing in case of a failure.
•
o r D less secure.
Goal: Ensures availability over security, minimizing
downtime but potentially leaving the fsystem
o t
, N or restricts access in
2. Fail-Secure (Fail-Closed):
Description: Shuts downasystems
•
response to a failure,a h
t Ndoor with a fail-closed
prioritizing security over availability.
• Usage Example:
jeeof a power failure.
A lock will remain
ell N • Goal: Protects human life and safety above all else.
orn
C
• Failure Modes are critical components of recovery strategies in environments where system
resilience, security, and human safety need to be preserved during failures.
• Understanding the appropriate failure mode for each system—fail-soft, fail-secure, or fail-safe—
ensures that systems are designed to handle failures effectively based on the organization’s
priorities, whether that’s maintaining operational continuity, securing assets, or safeguarding
people.
on
• Benefit: Efficient storage, faster backups.
• Limitation: Slower restoration due to multiple backup sets.
u t i
2. Differential Backup:
tr i b
Benefit: Faster restoration than incremental, as onlyis
• Backs up changes since the last full backup.
rD
• two sets (full +
•
differential) are needed.
Limitation: Larger storage requirement over
t f otime.
o
,N
3. Full Backup:
•
a
Benefit: Easiest and fastesthfor full restoration.
Backs up all data regardless of changes.
je
ana
4. Mirror Backup:
Creates h
•
b exact copy of data with no compression.
u Highaccess
•
l S
Benefit: Direct to data copy; near-instantaneous restoration.
Backup C
•
o Limitation: storage space requirement.
By Rotations:
S P• Purpose: Establish a schedule for tape use, retention, and rotation to ensure
reliable and organized data recovery.
ell
for data retention.
• Backup Storage Strategies ensure that data is securely stored and recoverable, balancing storage
needs, backup and restore times, and data integrity checks.
• Incremental and differential backups are efficient methods, while full and mirror backups provide
complete data snapshots.
• Backup rotations ensure data freshness and organization, and CRC checksums verify data integrity
across all backup types, enhancing reliability and security.
for
• Pros: High availability, scalable, low-cost for storage and
recovery.
t
•
No
Cons: Dependent on internet connection; potential privacy and
security concerns.
h a,
Na
Additional Backup Storage Strategies:
et
• Electronic Vaulting:
•
je
Automated tape management system (e.g., tape jukebox)
ha
controlled by robotic arms.
b
Su
• Purpose: Efficiently manage multiple tapes; suited for large data
l storage needs.
y Co
• Benefit: Streamlines backup process with automated scheduling.
SP
• Definition: Techniques for managing backup tapes to optimize
• Backup storage strategies vary by location and function. Onsite storage allows easy access but is
vulnerable to local incidents.
• Offsite storage provides a geographic safety net, ideal for disaster recovery, while cloud storage
offers scalable, high-availability solutions but depends on network access.
• Electronic vaulting automates tape management, and tape rotation strategies (like GFS and FIFO)
help maintain organized, secure, and accessible backup systems, ensuring backup reliability and
recovery efficiency.
on
• Function: Data is split across multiple drives, allowing for faster
read and write speeds.
uti
•
tr i b
Disadvantage: No redundancy—if one disk fails, all data is lost.
•
is
Use Case: Ideal for non-critical systems where speed is
D
for
prioritized.
2. RAID 1 (Mirroring):
t
• No
Function: Data is duplicated across multiple disks, providing
redundancy.
h a,
Na
• Advantage: Offers high data availability—if one disk fails, data
et
remains accessible.
•
je
Use Case: Suitable for systems where data reliability is crucial.
ha
RAID 5 (ParitybProtection):
3.
u Uses parity to store data redundantly across three or
SFunction:
•
l
y C• o more drives.
PB
Advantage: Balances speed and redundancy, with cost-effective
storage.
ll N
(redundancy) by striping and mirroring data across at least four
rn e drives.
• RAID (Redundant Array of Independent Disks) provides enhanced speed or redundancy by using
multiple disks together in a system.
• Key RAID types include RAID 0 (striping for speed), RAID 1 (mirroring for reliability), RAID 5 (parity for
balance of performance and cost), and RAID 10 (combining mirroring and striping for high speed and
availability).
• RAID setups support various business needs, from improving data access speed to ensuring high
availability and data recovery.
on
incoming requests.
• Redundancy:
uti
•
tr i b
Consists of a primary system actively handling all work, with
secondary systems in standby.
D is
•
t for
If the primary system fails, a secondary system takes over
No
seamlessly.
a,
• No performance drop if primary fails, as the secondary
h
system is configured identically to the primary.
Na
et
Primary By-product:
je
ha
• Both clustering and redundancy aim for High Availability (HA) to
b
minimize downtime from planned/unplanned outages or component
failures.
l Su
y Co
B
I SSP
r C
fo
es
ot
ell N
orn
C
• Clustering and Redundancy are recovery strategies that enhance high availability (HA).
• Clustering distributes workload among multiple active systems, reducing performance
proportionally if one fails.
• Redundancy, by contrast, designates a primary system for handling tasks, with secondary systems
on standby, resulting in no performance loss if the primary fails.
• Both approaches are fundamental in ensuring continuous operations, with clustering focusing on
shared workload and redundancy on seamless backup.
on
• Lacks computer hardware, data, and people.
• Cost: Moderate ($$)
uti
•
r i b
Recovery Time: Days, as basic setup is in place, but systems
t
need to be added.
D is
for
• Hot Site:
•
t
Fully equipped with servers, network equipment; lacks only
data and personnel.
No
• Cost: High ($$$)
h a,
Na
• Recovery Time: Hours, as most infrastructure is already in
et
place.
• Mobile Site:
je
•
bha
A hot site on wheels, often in a shipping container; flexible for
Su
relocation.
l Cost: High ($$$)
Co
•
• Recovery Time: Days to hours, depending on transportation
By time to the needed location.
orn
C
• Geographic Disparity ensures that recovery sites remain unaffected by local disruptions at the
primary site.
• Internal vs. external recovery sites balance control with convenience, and options like reciprocal
agreements, resource capacity agreements, and multiple processing sites offer additional
recovery support.
• Metrics like RPO and RTO help define acceptable data loss and recovery time, guiding strategic
decisions around recovery and continuity plans.
aje
Disaster Recovery Plan (DRP):
h
S ubof essential IT systems and infrastructure.
• Focus: Recovery
• BCM is a comprehensive framework for maintaining BCP and DRP plans to handle disruptions.
• BCP focuses on sustaining critical business processes, while DRP is dedicated to recovering vital
technology and infrastructure needed to resume business operations.
• Together, they ensure organizational resilience against unforeseen disruptions.
et
recovery in case of an incident.
je
ha
6. Ensure Testing, Training, and Exercises
b
1. Testing: Validates the efficacy of recovery steps.
l Su
2. Training: Prepares personnel for plan activation.
y Co
3. Exercises: Identifies gaps in the plan to enhance
B preparedness.
I SSP7. Maintenance
r C • Keep the plan current by regularly updating it to align with
fo system and organizational changes.
s
ote External Dependencies:
ell N • Consider critical suppliers, like fuel delivery services for generators,
• The BCP/DRP process emphasizes continuity and rapid recovery from disruptions. BCP keeps
operations functioning, while DRP focuses on returning systems to normal.
• Key steps include policy creation, impact analysis, controls, contingency strategies, and rigorous
testing.
• Additionally, addressing external dependencies ensures that resources essential to recovery are
accessible during a disaster.
on
• MTD (Maximum Tolerable 2. Shorter RTOs lead to faster system recovery but increase costs.
Downtime): Total acceptable 3.
ti
Cost Implications: The shorter the RTO, the higher the investment in
u
downtime for business resources and technology to ensure rapid recovery.
tr i b
continuity. 3. Work Recovery Time (WRT):
is
r Dissues.
1. Time required to confirm system/data functionality post-restoration.
2.
fo
Ensures that operations can fully resume without
t for thorough testing.
3.
o
Component of MTD, highlighting the need
4. Maximum Tolerable Downtime (MTD):
,N
Total time a business processacan
1.
a h be down before severe impact.
tN
2. Formula: MTD = RTO + WRT
3.
e
Key metric in deciding disaster declaration timing.
h aje
Example Scenario (Bank Disaster):
•
u b RPO would accept a day’s data loss with daily backups.
Bank with a 24-hour
S
l loss tolerance (e.g., few seconds), continuous replication and
streamo
• For minimal
• BMTDy Crepresents the ultimate threshold before significant operational loss and
backups are necessary.
S PRelationships
reputational damage.
CIS
for • Timeline: BAU -> Disaster -> RPO -> RTO -> WRT -> MTD
tes • Each component illustrates steps from initial data loss to full business continuity
o
restoration.
ell N
orn
C
• RPO, RTO, WRT, and MTD are essential metrics in continuity planning, each defining
recovery objectives and potential downtime impact. RPO and RTO have direct cost
implications—the lower these objectives, the higher the cost of maintaining them. MTD
(comprising RTO + WRT) serves as a critical threshold for decision-making in disaster
recovery, ensuring the business can continue to operate with minimal interruption.
u ti
resource allocation for the recovery of the most critical functions.
Process Steps
r i b
t Criticality:
is
rD
1. Determine Mission/Business Processes and Recovery
• Identify key business processes.
fo
t estimate tolerable
• Determine impacts of disruptiono and
downtime (using RPO, RTO,,WRT, N MTD metrics).
h a
2. a
Identify Resource Requirements:
•
e t N to restore critical business
Assess what is needed
h aje ensures
operations (e.g., staff, data, equipment, facilities).
•
u b dependencies.realistic recovery efforts by
This evaluation
l S
identifying
3. o
C Recovery Priorities for System Resources:
Identify
y
B • Link system resources to essential processes and establish
S P dependency-based priorities.
CI S • Set recovery order based on business impact and
for dependency structure.
• The Business Impact Analysis (BIA) is a structured process to identify critical business functions and
assess the potential impacts of disruptions.
• It defines essential recovery times (RPO, RTO, WRT, and MTD) and prioritizes resources and
processes for efficient recovery.
• This proactive planning enables an organization to protect vital assets and maintain operations
during and after a disaster.
on
• Communication: Internal and • Decision made by CEO or Business Continuity Board/Committee.
external, involving all relevant
ti
• Clear criteria are necessary to differentiate between incidents and disasters.
u
stakeholders. Incident Assessment Prior to Declaration:
tr i b
• Training & Awareness: Essential
for effective disaster response. the MTD.
D s
• The incident response team evaluates severity and the likelihood of meeting
i
for
• If MTD is at risk, the Disaster Recovery Plan (DRP) is activated.
t
No
Personnel Involved:
• The Disaster Response Team includes members from:
• Executive Management
h a,
Na
• Legal
•
• IT
jeet
Human Resources
•
bha
Public Relations
•
l Su Security
Co
• Team members should be trained in response protocols and participate in
regular DR tests.
By Training and Awareness:
I SSP • Regular training, at least annually, is crucial for ensuring effective disaster
recovery.
r C • Prepares the team for quick and accurate response to real disaster situations.
fo Lessons Learned:
es
ot
• Post-disaster analysis to evaluate what worked, what needs improvement,
and plan adjustments.
• The Disaster Response Process activates the Disaster Recovery Plan (DRP) when an incident
threatens to exceed MTD.
• Declaring a disaster involves an assessment of impact, engaging a trained response team, and
executing a well-communicated response.
• Training and reviewing lessons learned improve future resilience, while effective internal and external
communication ensures coordinated management during a crisis.
B yC
• After initial testing and adjustments, critical systems are restored,
SP
ensuring smooth operation and reliability at the main site.
CI S
for
tes
o
ell N
orn
C
• Restoration order in disaster recovery is guided by the BIA, which prioritizes critical systems.
• Dependency charts clarify restoration order by mapping component dependencies.
• At a DR site, critical systems are restored first, while at the primary site, least critical systems are
restored first to test stability, followed by critical systems to ensure a seamless transition back to
normal operations.
h
• Impact: Paper-based;ajeno effect on systems.
Parallel Test:Su
b
C olVerifies plan effectiveness on backup systems without
B y
• Purpose:
impacting production.
rn
production.
• BCP and DRP testing is essential to validate recovery plans. Tests progress from low-impact (Read-
through, Walkthrough) to high-impact (Parallel, Full-interruption).
• Full-interruption tests are the most conclusive but require management approval due to the impact
on production.
• Each test type ensures preparedness across different disaster scenarios and validates various
aspects of the DRP, contributing to the overall resilience of the organization.
i bu
3. Survival of Business:
st r
D ofi
operations. fo r
• Objective: Maintain business continuity and avoid cessation
o t
N functions to sustain
• Focus on preserving the essential business
,
ha
business viability post-disaster.
Additional Considerations: Na
• Personnel Safety andje et Concerns: Extend beyond the
a and managing situations under duress.
Security
hsafety
b
workplace to travel
uOrganizations should provide security, medical, and
l S
• Travel Safety:
C
or
employee safety.
s f
o te
ell N
orn
C
• The primary goals of Business Continuity Management are to ensure people's safety, minimize
damage, and ensure business survival.
• Safety of personnel is the highest priority in BCM, followed by actions that protect physical and
business assets.
• Addressing security concerns, including during travel or duress situations, is essential for a
comprehensive BCM approach.
on
• Development Phases &
• Security is not limited to just development phases but must be
Security Integration integrated through the entire life cycle of an application.
u ti
• Operations and
• Development Phase: Security practices need torbe i b
tthe design
applied
Decommissioning
is
from the very beginning, integrating security into
and development.
fo rD
•
o t securitypatching,
Operations Phase: Continuous monitoring, and
,N
updating are essential for maintaining post-
deployment.
Decommissioning &a h a
•
t N Disposal: When an application is no
e e
longer needed, secure
and systemjcomponents
disposal
are
practices
removed
ensure that data
securely to avoid
h
breaches. a
u b
l S 8:
Objective of Domain
o
y
• EquipCsecurity professionals to understand, apply, and enforce
B
security throughout all stages of software development and
C
for
tes
o
ell N
orn
C
• Domain 8 on Software Development Security emphasizes the need for security integration across
all stages of an application’s life cycle—from development to disposal.
• Security professionals must focus on protecting applications at every phase to mitigate risks and
ensure secure operational integrity.
je et
prevent exposure of sensitive data and eliminate risks related
to unused applications.
b ha
Su Development Life Cycle): Focuses on developing,
SDLC vs. SLC:
l
Co and building applications with embedded security.
• SDLC (Software
y
designing,
B
P
• SLC (System Life Cycle): Starts post-deployment, focusing on
S securing the application throughout its operational life, change
CI S management, and secure disposal at end-of-life.
for
tes
o
ell N
orn
C
• Effective application security requires involvement at each SDLC phase, from design to
decommissioning.
• Addressing security early and consistently helps minimize vulnerabilities, reduces costs, and aligns
with proactive risk management.
• The SDLC focuses on application creation, while the SLC encompasses its operational lifespan,
emphasizing security throughout.
No
Conduct threat modeling to practices and reviewed for vulnerabilities.
a,
inform security controls.
3. Development: Build security
h
• Testing Phase: Critical for identifying and addressing vulnerabilities.
into code proactively. •
Na
Static Testing (SAST): Analyzes code without executing it.
4. Testing Phase: Apply static,
•
e et
Dynamic Testing (DAST): Tests application in runtime.
j
ha
dynamic, and fuzz testing to
• Fuzz Testing: Sends random or unexpected inputs to reveal
detect vulnerabilities.
u b
errors.
5. Release/Deployment (SDLC)
l SMaintenance:
or Implementation (SLC): Deployment
C o &
Perform
certification/accreditation. B y
• Certification & Accreditation: Final step before deployment,
6. Operations & Maintenance:
S P confirming all security standards are met.
for
for ongoing updates.
changes to maintain integrity.
t s
7. Decommissioning/Disposal:
e
Ensure safe archival and End-of-Life Management:
o
ll N
disposal of assets.
• During decommissioning, security ensures safe archival and disposal,
rn e protecting data integrity even in retirement.
C o
• Security is essential throughout SDLC and SLC, from initial requirements and design to testing,
deployment, and end-of-life.
• Early risk analysis and threat modeling set the stage for secure design, while robust testing
identifies vulnerabilities.
• The final steps in certification and change management solidify security, making it a continual
priority across the software's lifecycle.
on
• Limitations: Does not allow
for changes or backward • Ensures every phase is thoroughly completed and signed off before
uti
movement once a phase is moving forward.
tr i b
complete.
Waterfall Model Phases:
Cons of Waterfall Model:
D is
1. Requirements Gathering:
t for
• Rigid and inflexible: Any modifications or additions requested by the
No
Business analysts capture application owner after a phase is complete require formal change
management.
a,
the owner’s needs.
2. Design: Requirements are
h
Na
• Additional cost and time: Making changes after initial requirements
translated into technical
are set is time-consuming and costly, as it disrupts the linear flow.
specifications.
je et
ha
3. Implementation: • Owner exclusion: Application owners are often only involved at the
Development team builds
b
beginning, losing the chance to adapt the project to evolving needs as
according to specifications.
l Su
it progresses.
CoLimitations:
4. Testing: Ensures product
Example of
meets the initial
requirements. • B
y
If the owner suggests new ideas mid-process, they may be advised
5. Deployment: Product is P
S that changes aren’t possible due to frozen design specifications,
released for use.
CI S which restricts the development team’s flexibility.
6. Maintenance: Ongoing
for Alternative Methodologies:
tes
support and updates.
ll N
limitations of the Waterfall approach, providing greater flexibility and
C o
• The Waterfall approach is a traditional, linear SDLC model that requires each phase to be
completed in succession.
• While it offers structure and clarity, it’s inflexible to mid-process changes and can be costly if
adjustments are needed later.
• New methodologies aim to provide flexibility and allow continuous involvement of application
owners throughout the development cycle.
,N
combined to leverage efficient coordination and delivery.
strengths of each for Combining Methodologies:
h a
optimal results. a
N (e.g., Agile-Waterfall) to capitalize
Key Development
e tlarger
• Teams may use a hybrid approach
j
on Waterfall’s structureefor projects and Agile’s flexibility for
ha
Methodologies:
iterative development.
1. Waterfall
b
2. Spiral
Su at Every Stage:
Importance of Security
l
3. Agile
C o the methodology, security considerations should be a part
• No matter
4. Agile-Scrum Master Role
B y
of each phase from planning to deployment and beyond, preventing
• Various development methodologies, including Waterfall, Spiral, and Agile, offer distinct
approaches to software development, with Agile promoting flexibility and Spiral allowing iterative
revisits.
• The Agile-Scrum Master plays a key role in coordinating these efforts effectively. Regardless of the
chosen methodology, security should be a continuous consideration to ensure resilient, secure code
throughout the development process.
for
Essential to embed security and deploying.
t
No
across all methodologies. • Customer Interaction: Heavy focus on continuous customer feedback.
a,
Key Development • Best For: Dynamic projects that benefit from flexibility and continuous
user input.
Methodologies:
h
1. Waterfall Scaled Agile Framework (SAFe)
Na
2. Structured Programming •
jeet
Scaled Agile: Designed for large organizations to coordinate numerous
ha
Development Agile teams.
3. Agile •
b
Collaboration Focused: Ensures effective communication and delivery
4. Scaled Agile Framework
Su
in large, multi-team settings.
l
Co
5. Spiral Method • Ideal For: Complex, large-scale projects needing Agile benefits at an
6. Cleanroom Development
By organizational scale.
Spiral Method
r C assessments.
es • Good For: Projects where risk analysis and iterative refinement are
ot essential.
C •
reliability.
Defect Prevention: Emphasis on preventing errors through rigorous
design and development practices.
• Best Application: High-stakes environments where reliability is
paramount (e.g., aerospace, defense).
• The Waterfall, Structured Programming, Agile, Scaled Agile Framework, Spiral, and Cleanroom
methodologies each offer unique benefits.
• Waterfall’s structured flow is best for well-defined projects, while Agile’s iterative nature suits
projects requiring adaptability and customer feedback.
• The Scaled Agile Framework allows large organizations to apply Agile across multiple teams, and
Spiral combines risk management with iterative phases.
• Cleanroom prioritizes defect prevention, ideal for critical applications.
u
3. Scrum bhMaster Role: Guides the team, ensures productivity,
S removes obstacles to keep sprints on track.
land
o
C4. Goal: Deliver working software quickly and allow for
By adaptability based on feedback.
fo
es
ot
ell N
orn
C
• Waterfall prioritizes a structured, linear approach, focusing on completing all project phases
sequentially with set requirements.
• Agile emphasizes flexibility, with frequent, incremental deliveries via "sprints" that allow for
continuous feedback and adjustments.
• Waterfall is ideal for well-defined projects, while Agile suits dynamic, evolving projects that benefit
from early and continuous user input.
• The Scrum Master plays a crucial role in Agile development, coordinating team activities, enforcing
scrum principles, and protecting the team from disruptions.
• They facilitate collaboration, remove barriers, and ensure smooth workflow, enhancing productivity
while guiding the team to meet project goals efficiently.
CIS
Verification, Operations.
tes • Key Actions: Monitoring, periodic evaluation, and patching support long-
o
ll N
term secure and functional applications.
• Maturity models like CMMI and OWASP SAMM provide frameworks to assess and enhance
development processes, focusing on security and quality improvement.
• CMMI has six levels that measure organizational maturity, from incomplete processes to continuous
optimization, while SAMM evaluates software security posture with three maturity levels across key
business functions.
• The maintenance phase emphasizes monitoring, evaluation, and patching to support secure, reliable
software long-term.
on
Request (RFC) Process: • Service Level Agreements (SLA) adjustments to meet
Requests initiated through agreed-upon performance standards.
uti
service requests, incident
Importance in Software Development:
tr i b
management, or SLAs.
is
r D stability.
Related Processes: • Configuration Management: Maintains consistent application
• Configuration Management
fo
configurations throughout the software lifecycle, ensuring
t deployment of
• Release Management
o
, Nsecure software releases.
• Release Management: Manages the timing and
a
software updates, aiming for controlled,
h
a
e tN
h aje
S ub
C ol
B y
I SSP
C
for
tes
o
ell N
orn
C
• Change management is critical for ensuring that all changes—whether in operational settings or
software development—are assessed for risk, costs, and benefits before implementation.
• In software development, configuration and release management are essential components of
change management, supporting stability and security in software releases.
C ol
B y
I SSP
C
for
tes
o
ell N
orn
C
• An Integrated Product Team (IPT), or DevOps approach, combines development, operations, and
quality assurance to create an agile, collaborative, and secure environment.
• This model emphasizes early security integration and continuous involvement, reducing risks
associated with the isolated development of individual teams.
SP
only when necessary.
CI S
for
tes
o
ell N
orn
C
• Security should be integrated throughout DevOps, evolving into SecDevOps, with active
collaboration among teams and a strong focus on automated security testing.
• This approach enables continuous security assurance without slowing down development cycles,
making it ideal for agile and iterative workflows.
on
Process:
1. Selective Release: Code Smoke Testing in Context:
uti
changes are initially •
tr i
Definition: An initial testing approach focused on verifying core b
released to a small group. functionality.
is
rD
2. Feedback and Monitoring:
Responses are monitored •
f o
Application: Ensures that any critical failures are identified
t errors that might
immediately after deployment, addressing simple
for issues, allowing for fixes
o
,N
before a wider release. disrupt essential features.
Related Testing Concept:
h a
a
tN
• Smoke Testing: A quick
preliminary check to ensure
e
key features are functioning
h aje
ub
after a change.
S
C ol
By
I SSP
r C
fo
es
ot
ell N
orn
C
• Canary testing allows new software changes to be deployed safely to a limited user group before
general release, reducing the risk of widespread issues.
• It provides early detection of issues in a real environment, while smoke testing offers a quick check of
basic functionality post-deployment.
• Both approaches aim to improve release quality by identifying and addressing potential issues early.
a,
during build) vs. dynamic platform types (e.g., mobile, desktop).
(accessed at runtime).
h
Na
• IDE Components:
2. Tool Sets (SDKs): Development
tools (compiler, debugger) aiding •
jeet
Streamline coding with a code editor, compiler, debugger,
and automation tools.
ha
specific platforms.
3. IDEs: Comprehensive tools for •
b
Examples: Visual Studio (Microsoft), Eclipse, IntelliJ IDEA.
coding (e.g., Visual Studio, •
l SuSelection depends on factors like language support, cost,
Co
Eclipse). and usability.
4. Translators: Convert code to
machine language: By Translators and Execution:
1. Assemblers (assembly
I SSP • Translators make code executable by computers, which only
understand binary.
C
language to machine code)
r
o
2. Compilers (high-level to
f
• Assemblers: Entire low-level code to machine code.
machine code)
es • Compilers: Entire high-level code to machine language
ot
3. Interpreters (high-level code before execution.
ll N
to machine code, line-by-line
• Interpreters: Line-by-line high-level to machine language
rn e
at runtime) at runtime.
C o
5. Runtime: The phase when code
executes on the system. Runtime
• The period when the code is active and interacting with the system
resources.
• Software development involves using programming languages, libraries, and tools like SDKs and
IDEs to create applications.
• Libraries offer reusable code, and SDKs provide specific platform tools. IDEs integrate these
components, enabling efficient coding. Translators (assemblers, compilers, interpreters) convert
code into machine language.
• Runtime is the execution phase, making all these components function together.
y
S PB
CI S
for
es
ot
ell N
orn
C
• CI/CD stands for Continuous Integration, Continuous Delivery, and/or Deployment. CI focuses on
automated code commits and testing.
• CD (Delivery) adds automated code release into repositories, while CD (Deployment) automatically
pushes code changes into production if testing is successful.
• CI/CD optimizes the development process, allowing reliable, fast code updates without manual
intervention.
for
development team.
• Relation to Change t
• Team Collaboration: SCM fosters effective teamwork by maintaining
Management: Part of broader No
clear documentation of each change and ensuring that team members
configuration and change
h a,
work with the most current information.
management processes. Benefits Explained:
Na
Benefits of SCM:
jeet
• Productivity and Error Reduction: SCM minimizes errors by clearly
ha
• Improves productivity and
tracking all changes, so any issues can be resolved efficiently, and by
reduces errors.
b
Su SCM enables smoother workflows in
ensuring that only approved and validated changes are incorporated.
• Supports consistent version
control and change tracking. l
o environments with consistent, organized change
• Process Efficiency:
y C
development
• Facilitates organized, systematic
changes to code, documents, B
management practices.
and other resources.
I SSP
r C
fo
es
ot
ell N
orn
C
• Code repositories are essential storage and management platforms for software and application
code, supporting both open-source and private projects.
• Beyond storage, they offer robust version control, code review, collaboration, bug tracking, and
document management, making them invaluable for efficient, secure, and collaborative software
development.
• Popular options include GitHub for open-source projects and Project Locker for enterprise-level
private code management.
ha
• Conducted while the • Purpose: Identifies unforeseen weaknesses by stressing the
application is running
b
application with diverse input data.
with visible source code
l Su Security Testing (IAST):
Co of SAST and DAST:
Interactive Application
y
• Combination
B • Conducted while the application is running and allows
S P
CI S visibility into source code and runtime behavior.
or
• Purpose: Provides a more comprehensive approach by
o te
ell N
orn
C
• Application security testing utilizes multiple techniques—SAST, DAST, and Fuzz Testing—to
comprehensively assess code security from various perspectives, such as static code analysis,
runtime behavior, and input robustness.
• IAST combines SAST and DAST capabilities, allowing real-time testing with code visibility for a more
in-depth analysis. Incorporating these methods ensures thorough security assessment across
development and deployment phases.
on
Early characteristics and promoting consistent security practices
• Utilizing Built-in Security across code.
uti
Capabilities of Modern Languages • Encapsulation:
tr i b
Objective: Incorporate secure •
is
Concept from VPN tunneling applied in programming.
D
for
programming practices through • Wraps an object or code to hide specific information and
structured methodologies, leveraging
t
adapts the code to particular needs, providing controlled
No
modern programming capabilities to access to object functionality.
a,
enhance application security. • Polymorphism:
h
Na
• Similar to polymorphic viruses but non-malicious.
•
jeet
Code that can change based on specific requirements,
behaving adaptively to suit the application environment’s
ha
needs.
b
Su
• Polyinstantiation:
l
Co
• Allows objects to exist in multiple independent instances,
SP
Importance of SecDevOps:
ll N
Programming Tools for Security:
• Secure programming benefits from incorporating security requirements at the start of development,
following a SecDevOps approach.
• Techniques like inheritance, encapsulation, polymorphism, and polyinstantiation allow for secure,
adaptable, and maintainable code.
• Modern programming languages with built-in security capabilities make addressing security needs
more feasible, and tools for secure inheritance and encapsulation ensure consistent security
practices across applications.
on
• Potential delays in recovery or • Alters the appearance of the code without changing its
maintenance due to lack of clarity functionality.
ti
in obfuscated code, especially •
debugging info, and altering code formatting. tri
Changes may include modifying comments, removing bu
during a disaster recovery
situation.
D is
for
• Easiest to implement but weakest in terms of security
BCM Strategy: effectiveness.
• Secure storage of original code
o t
(software vault) as part of BCM. 2. Data Obfuscation:
, N
Changes data structuresa
•
h in the code, making it challenging
t Na
to understand data relationships and values.
j ee
3. Control Flow Obfuscation:
•
b halogical
Alters the flow within the code by reordering
S u and methods. irrelevant conditions, or modifying
statements, inserting
olloops
•C More advanced and difficult to reverse-engineer than lexical
B y or data obfuscation.
I SSPPotential Disadvantages:
C
for • Maintenance and Disaster Recovery: If obfuscated code is required
• Code obfuscation enhances security by obscuring the purpose and logic of code, making it difficult
for unauthorized users to interpret or reverse-engineer.
• Three primary types—lexical, data, and control flow—offer different levels of complexity, with control
flow being the most sophisticated.
• While obfuscation strengthens code security, it can hinder maintenance or recovery efforts.
• To mitigate this, unaltered source code should be stored securely in a software vault as part of BCM
strategy
on
components of the software tests do not compromise other environments.
environment to prevent 3. QA (Quality Assurance) Environment:
uti
cross-environment •
i b
Allows for thorough validation of the application’s performance
tr
interference and secure
sensitive data.
and security.
D is
for
• Critical to apply security checks and vulnerability
Security Role: assessments in QA before any code moves to production.
t
No
• Security should act as an 4. Production Environment:
a,
advisor in each environment • The live environment where the application is accessible to end -
to ensure that best practices users.
h
and controls are in place.
Na
et
• Requires strict security controls, monitoring, and adherence to
security policies, as it holds live data and real user interactions.
je
ha
Role of Security in Each Environment:
b
Su
• Advisor Role: Security teams should be actively involved in each
l
environment to establish guidelines, monitor adherence to policies, and
y Co
review changes.
SP
development, test, or QA environments.
• Separating software development environments is a best practice that safeguards against security
risks and operational disruptions.
• By isolating development, testing, QA, and production, each environment can be managed with
tailored security controls.
• Security plays an advisory role across these environments to maintain data protection, implement
access controls, and prevent cross-environment interference.
• This separation ultimately supports a secure, efficient software development lifecycle.
Na
• Prevent data corruption by increasing efficiency.
controlling simultaneous access
ACID Properties:
•
jeet
Locking Controls: Essential to prevent data inconsistencies by
ha
managing data access in concurrent environments, especially during
1. Atomicity - Ensures transactions
b
write operations.
are completed entirely or not at
Su
ACID Properties in Databases:
l
Co
all. • Atomicity: All parts of a transaction must complete or none of them will.
2. Consistency - Maintains
database integrity by following By Ensures reliability by avoiding partial transactions.
SP
• Consistency: Ensures only valid data is saved, preserving integrity rules
rules. within the database.
CI S
3. Isolation - Ensures concurrent
• Isolation: Each transaction is processed independently, without
for
transactions do not interfere. interference from others, maintaining accuracy.
es
4. Durability - Guarantees
• Durability: Once a transaction is committed, it remains in the database
ot
transaction permanence after
even in case of a system failure.
ll N
commit.
Importance of Database Security:
• DBMS environments manage critical data through hardware, software, database languages, and
user interfaces, with strict security applied to each component.
• In relational databases, primary and foreign keys organize data, while concurrency and lock controls
prevent corruption when multiple users access data.
• Databases adhere to ACID properties (Atomicity, Consistency, Isolation, and Durability) to ensure
transaction integrity and reliability.
• Comprehensive database security across layers is essential to protect valuable business
information from unauthorized access.
Cornell Notes by Col Subhajeet Naha, Retd, CISSP 2024
DBMS Architecture Components
1. Hardware:
DBMS Architecture Components • Physical foundation of the DBMS, often consisting of dedicated
Core Components: servers.
1. Hardware
2. Software
• Includes RAID controllers for redundancy, ensuring data availability
even if hardware fails.
3. Language (e.g., SQL)
4. Users • Redundant components (power, cooling, and network) provide
5. Data system resilience and reliability.
Primary Function of Each 2. Software:
Component: • Operating System (OS): Supports the database application,
on
• Facilitates data storage, retrieval, handling low-level system management and security.
and security within a structured •
u
Database Software/Application: Manages data storage, retrieval,ti
database environment
i b
and user interaction, requiring robust application security to prevent
tr
unauthorized data access.
D is
for
3. Language (SQL):
•
t
SQL (Structured Query Language): The primary language used to
No
communicate with and manage database contents.
•
h a,
Variants include T-SQL, MySQL, PostgreSQL, and SQLite.
Na
• SQL commands allow for data querying, updating, and structuring,
et
supporting user interactions within the DBMS.
4. Users: je
•
bha
Individuals interacting with the database, typically through a user
Su
interface provided by the DBMS software.
l
Co
• Admin and super users may access data directly via SQL queries,
SP
• User roles and access levels should be defined and controlled to
ll N
• Requires security measures across all DBMS components,
• DBMS architecture is made up of five key components—hardware, software, language, users, and
data.
• Each component is essential in supporting the secure and efficient functioning of the database.
• Hardware provides the physical infrastructure; software (OS and DBMS) manages data operations;
• SQL or a similar language enables user interactions; users are managed through roles and
permissions; and
• Data is safeguarded through a comprehensive security framework that covers all DBMS elements.
• Relational databases (RDBMS) replaced hierarchical databases, allowing for structured, two-
dimensional tables that link data through relationships.
• RDBMS uses attributes (columns) and tuples (rows) to organize data, and primary and foreign keys
to maintain referential integrity, allowing users to easily relate information across tables.
• This structure enhances data-driven decision-making by supporting data consistency and relational
insights.
on
an existing student.
2. Common Database Terms: u ti
r i b
t data
is
• Tuple: Represents a single row in a table (each row is a unique
entry).
fo rD
characteristic or data type (e.g., LastNameo
t
• Attribute: A single column within a table, representing a specific
h
• Field: The specific data point at the aintersection
N a
where individual data entries reside.
• Primary Key: A uniqueje et for each row, ensuring no two rows
identifier
share the same key.
b haExample: AuthorID in an authors table.
l
• Foreign Key:SuA column in one table referencing the primary key in
another,o creating a relationship between tables. Example: AuthorID as
y C key in a books table linking to the authors table.
a foreign
B
I SSP
r C
fo
es
ot
ell N
orn
C
• Referential integrity is essential in relational databases, ensuring data consistency across tables
through primary key validation.
• Key terms include Tuple (row), Attribute (column), Field (individual data point), Primary Key (unique
identifier within a table), and Foreign Key (a reference linking two tables).
• Referential integrity allows for data reliability and relational insights across connected tables.
je
view it until User A completes and releases the lock.
b
3. Database Integrity:ha
• Concurrencyl Suand locking work together to protect data accuracy and
Co
reliability.
y
B controls prevent issues like data corruption that could occur if
• Lock
P
I SS simultaneously.
multiple users attempted to write to the same database entry
C
for
tes
o
ell N
orn
C
• Concurrency allows multiple users to access data at the same time, supporting real-time decision-
making.
• Lock controls are used to maintain data integrity by preventing simultaneous updates to the same
data.
• This functionality is essential for protecting databases from corruption and ensuring data reliability.
N o
a, rules (e.g., negative
• Example: If a transaction violates database
balance not allowed), it will not behcompleted.
3. Isolation: t Na
je e is isolated from others, meaning it is
invisible to other ha
• Definition: Each transaction
btransactions until it’s fully completed.
S u
• Purpose:lPrevents concurrent transactions from interfering with each
o
Cmaintaining
y
other, data integrity.
• B
S P Example: User B cannot see changes made by User A’s transaction
for 4. Durability:
C o power outages.
• Example: After a transaction is committed, the data changes are
written to disk and preserved even if there’s a system crash.
• The ACID properties in RDBMS — Atomicity, Consistency, Isolation, and Durability — are
fundamental principles that ensure database transactions are processed reliably.
• They prevent partial updates, ensure adherence to rules, maintain transaction isolation, and
guarantee that completed changes are permanent, which collectively support data integrity and
reliability in multi-user environments.
a
hwithout revealing the actual data
• Data Management: Supports data organization
a
providing information about data
content.
e tN
a je Useful for tracking data ownership, changes,
h
• Security & Compliance:
ub which aids in auditing and maintaining data integrity.
and permissions,
S
C ol
B y
I SSP
C
for
tes
o
ell N
orn
C
• Metadata provides essential information about data, enabling efficient management, retrieval, and
security of data.
• By offering details such as creation date, file size, ownership, and structure, metadata improves the
functionality and integrity of data systems and is critical for organizing and accessing information
effectively.
on
software, ensuring version control, consistency, and tracking
throughout the software lifecycle.
u t i
2. Common Characteristics:
r i b
t errors,
is
rD
• Automation: Key in maintaining consistency, reducing manual
fo
and ensuring quality across all stages of software development.
t processes, leading to
o
, N products and updates.
• Efficiency and Delivery: Designed to streamline
a
faster and more reliable delivery of software
h security measures to protect
a
t Nstakeholders, integrating security at every
• Security Focus: Emphasizes proactive
e
both the organization and its
phase.
h aje
S ub
C ol
B y
I SSP
C
for
tes
o
ell N
orn
C
• Development ecosystems like CI/CD, SOAR, and SCM provide structured frameworks that focus on
efficiency, automation, and security.
• Each ecosystem serves a unique purpose—whether for code integration, security response, or
configuration management—but they share common goals of delivering high-quality products,
automating workflows, and proactively securing development processes.
on
• Penetration Testing: Simulated attacks to evaluate
application resilience.
ut i
2. Key Processes in Security Assessment:
tr i b
is
strategies to mitigate them.
f o rD
• Risk Analysis and Mitigation: Analyzes risks and implements
je e
• Internal and External
compliance andb
ha Audits: Provides an objective review, ensuring
SuProcess: Evaluates third-party components for security
identifying security gaps.
l
Co
• Procurement
y
compliance.
B
P
S requirements before release.
• Testing and Verification: Validates that applications meet security
CI S
for • Code Signing: Verifies the origin and integrity of code to prevent
tes tampering.
• Software security assessment involves comprehensive testing methods, risk analysis, logging, and
audits.
• Key activities include threat modeling, penetration testing, and certification and accreditation, which
confirm technical compliance and secure management approval, respectively.
• Each process ensures that software security is maintained and meets organizational and regulatory
standards.
f o r Dassessments,
• Methods: Can include black-box testing, vulnerability
and security audits on the acquired software.t
N o
3. Source Code Availability and Escrow
h athe, source code, offering only the
Agreements:
• Vendors may not provide access
t Na to
compiled product.
je e
• Escrow Agreement: a can
hensuring
This be arranged to store the source code
b
orusupport.
with a third party,
operationsS
access if the vendor ceases business
l
y Co
P B
I SS
C
for
tes
o
ell N
orn
C
• Purchasing software does not eliminate the need for a security assessment.
• Security should evaluate any acquired software for vulnerabilities to ensure it meets the
organization's standards.
• If source code is unavailable, companies can establish escrow agreements to secure access to the
code for future needs.
• This proactive approach mitigates risks associated with vendor dependency and software
vulnerabilities.
No
• Potential vulnerabilities due to widespread use.
a,
3. Open Source Software:
h
Na
• Definition: Software with available source code, inviting community
collaboration and modification.
• Advantages:
jeet
•
bha
Allows code examination, modification, and control by the
organization.
•
l SuTypically faster identification and resolution of security issues.
y Co
• Maintains stability beyond the original creators, supported by a
broad community.
B
SP
• Disadvantages:
es software.
ot 4. COTS vs. Open Source:
rn
development.
• When acquiring software, whether COTS or open source, organizations must prioritize security and
evaluate software thoroughly, using the SDLC process where possible.
• COTS offers established functionality but is restrictive, while open source offers flexibility and
community support but requires proactive assessment to prevent vulnerabilities.
rn ell evaluations.
• Third-party code and MSPs offer valuable services but require stringent assessments to ensure
quality, security, and alignment with organizational standards.
• The SDLC process should be applied to third-party code, while MSPs should be evaluated through
SOC reports, site visits, and customer references to verify compliance and suitability.
for
assets to the cloud.
t
No
3. Shared Responsibility Model:
a,
• Definition: The cloud provider and the customer share
h
responsibilities for security based on the service model:
• Na
SaaS: Provider manages infrastructure and platform security,
jeet
while the customer manages data access and protection.
•
bha
IaaS: Provider handles basic infrastructure security;
customer manages OS, applications, and data.
•
l Su
PaaS: Provider secures the platform, and the customer is
SP
clear understanding of control responsibilities for each party.
ot
capabilities, and disaster recovery processes.
ll N
• Written Agreement: All responsibilities, including risk management
• Cloud services require security’s involvement from the start, emphasizing due diligence and the
shared responsibility model.
• Each cloud model (SaaS, IaaS, PaaS) has different shared security responsibilities, which should be
clearly defined in service agreements to ensure both the provider and customer understand and
fulfill their security roles.
for
software development practices.
t
No
3. Common Code-Level Vulnerabilities:
• Covert Channels: Unintentional communication paths that may leak
a,
sensitive information. Types include timing and storage.
h
•
Na
Buffer Overflows: When input data exceeds allocated buffer space,
detection.
jeet
causing application instability or data corruption. Usually patched after
•
bha
Memory/Object Reuse: Risks arise when storage with sensitive data
Su
isn’t properly cleared, allowing potential access by other applications.
l
Co
• Executable Mobile Code: Code that downloads and executes on a
system when users click links. Sandboxing mitigates risk.
By • TOCTOU (Time-of-Check Time-of-Use): Also known as a race condition,
I SSP where a delay between checking and using a value leaves an opening for
exploitation.
r C • Backdoors/Trapdoors: Developer shortcuts for system access that may
fo persist post-development, allowing unauthorized access if not removed.
es
ot
• Malformed Input: Input that fails validation, leading to risks like SQL
ll N
injection. Input validation is critical.
• Secure coding guidelines and frameworks (e.g., OWASP, NIST, CIS) help standardize secure
development practices.
• Common vulnerabilities, like buffer overflows, TOCTOU, and backdoors, highlight risks at the source
code level.
• Comprehensive input validation and secure handling of data are essential to mitigate these risks,
along with proper training for non-expert users (citizen developers) accessing powerful development
tools.
ti on
code into overflow data, potentially elevating system privileges.
•
i bu
Attackers leverage the inability of buffers to resize dynamically to
execute malicious code or disrupt system functions.
str
3. Mitigation Techniques:
D i
•
for
Address Space Layout Randomization (ASLR):
t
• Randomizes memory location
N o oftosystem executables,
buffer locations. a
,
making it difficult for attackers predict and exploit
a h
• Without ASLR,
t Nattackers may study program behavior
e
aje Checking:
and buffer usage to launch attacks.
•
h
Bounds/Parameter
•ubVerifies that input values are within specific bounds
S
l before use, ensuring no overflow occurs.
o
C • Examples
B y ranges,
include ensuring string length limits, number
and array bounds are enforced during input
CI S
for • Parameter/Bounds Checking: Limits data size and format
• Buffer overflow vulnerabilities arise when more data than a buffer can handle is sent, leading to
potential exploits.
• Mitigation methods like ASLR randomise executable locations in memory, making it harder for
attackers to predict buffer usage.
• Bounds checking and runtime validation of data ensure inputs stay within safe limits, while safe
programming practices, including language and library selection, further protect against buffer
overflows.
standardized,a h a
1. Older format, developed
XML-based.
N WS standards, offering robust
et through
2. Extensible
errorje
a handling for complex applications.
u bh for APIs:
3. Security Techniques
S
1. l Authentication
C o tokens (e.g.,
and Authorization: Access control using
OAuth) to secure access.
y
PB
2. Encryption (TLS): Ensures data security during transmission
for
confidentiality and integrity.
t
No
• Error Handling and Logging: Manages errors without revealing
a,
sensitive information and logs securely for auditing.
h
• System Configuration: Ensures systems are set up securely,
minimizing exposure to threats.
Na
eet
• File/Database Security: Protects file and database contents from
j
ha
unauthorized access.
b
Su
• Memory Management: Prevents memory leaks and vulnerabilities like
l
buffer overflows.
y Co
Concepts of Coupling and Cohesion:
B • Coupling: Refers to the interdependency between different units of
r C independently.
ell N Polyinstantiation:
• Secure coding practices are essential to reduce vulnerabilities in software, incorporating input
validation, secure authentication, session management, and cryptographic practices, among others.
• Key design principles like low coupling and high cohesion promote modular, secure code, while
polyinstantiation prevents unauthorized inference by creating separate instances of objects for
different access levels.
on
single unit of code is.
• ti
High Cohesion: The unit's code is highly related, focused on
u
i b
a single task or functionality, making it easier to understand
tr
and maintain.
D is
for
• Low Cohesion: The unit's code handles unrelated tasks,
making it harder to manage and prone to errors.
o t
Ideal Combination for Optimal Code Quality: N
h aare, considered optimal:
Na interdependencies, allowing
• Low Coupling and High Cohesion
•
t
Low Coupling: Reduces
individual unitseto function independently, simplifying testing
h aje
and maintenance.
• u
High bCohesion: Ensures each code unit is focused and
S
lorganized, making it more understandable and less error-
o
yC
prone.
• B
SP code, which may be challenging to maintain, test, and debug.
High Coupling and Low Cohesion are indicators of poorly written
CI S
for
tes
o
ell N
orn
C
a,
General tries to add "Charlie Company 6," and it already
h
exists at a higher classification, a system without
Na
polyinstantiation might reveal its existence through an error
message.
je et
•
b ha
With polyinstantiation, the system would map "Charlie
Company 6" to a lower-level version for those without
l Su clearance, concealing sensitive information.
4.
y Co of Unauthorized Inference:
Prevention
a je
via software, offering similar in a virtual form.
bh
Policy-Driven Approach:
u
l S security is typically managed by policies that align
o
• Software-defined
yC
with organizational
aBcost-effective
goals and objectives, optimizing security controls in
manner.
• Software-defined security provides a flexible, scalable way to manage security through software
rather than hardware, particularly valuable in cloud and virtualized environments.
• By replicating functions like firewalls and access controls and allowing them to be managed by
policies, it aligns security with organizational goals in an efficient, adaptable manner.
e tN
increasing an organization's exposure to potential attacks.
h aje
S ub
C ol
By
I SSP
r C
fo
es
ot
ell N
orn
C
• Software development vulnerabilities stem from insecure coding practices and citizen developers
lacking security expertise.
• Common vulnerabilities include backdoors, which allow unauthorized access, and MITM attacks
that compromise communication security.
• Ensuring secure coding practices and training citizen developers can help minimize these risks and
improve software security.
D is
Common Attacks Stemming from Insecure Practices:
t for
o
• Between-the-Lines Attack (Man-in-the-Middle):
N
•
h a,
Attackers intercept or alter communications between
Na
devices or individuals, compromising data integrity and
confidentiality.
e t
je
a from a previous operation remains in memory,
• Memory Reuse (Object Reuse):
• b hdata
Residual
C o leakage.
CI S access.
for
tes
o
ell N
orn
C
• Software vulnerabilities often arise from citizen developers lacking secure coding expertise and
insecure coding practices.
• Key vulnerabilities include backdoors allowing unauthorized access, between-the-lines attacks
intercepting communication, and memory reuse exposing residual data.
• Addressing these risks with secure coding practices and proper training can enhance software
reliability and security.