2022 FRSecure CISSP Mentor Program - 2022 - Class Five
2022 FRSecure CISSP Mentor Program - 2022 - Class Five
INTRODUCTION
2022
Class #5 – Domain 3
Security Architecture and Engineering
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 1
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 1
#MissionBeforeMoney
INTRODUCTION
Agenda –
• Welcome
• Introduction
• Security Architecture
• Security Engineering
• Security Models
• Security Controls
• Systems overview
• Cryptography
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 2
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 3
CISSP® MENTOR PROGRAM – SESSION FIVE
GETTING GOING…
Managing Risk!
Studythrough
We’re Tips: Chapters 1, 2, 3, and part way into Chapter
4!
• Study in small amounts frequently (20-30 min)
•• Check-in.
Flash card and practice test apps help
•• How many
Take napshave read
after Chapter
heavy 1, 2(aka
topics & 3?Security Models)
•• Questions?
Write things down, say them out loud
• Use the Slack Channels
• Exercise or get fresh air in between study sessions
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 4
CISSP® MENTOR PROGRAM – SESSION FIVE
GETTING GOING…
Great job last week! We’re through Domain 2 (Asset Security)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 5
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 6
#MissionBeforeMoney
DAD JOKE
Before we get too deep into this.
How about a dumb dad joke?
HAHAHAHA
Moving on…
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 7
#MissionBeforeMoney
Security Architecture Is
Design and organization of the components,
processes, services, and controls appropriate
to reduce the security risks associated with a
system to an acceptable level.
Security Engineering Is
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 8
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 9
#MissionBeforeMoney
*Reminder the cost of a security control, must be less than the cost of the risk being addressed
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 10
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 11
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 12
#MissionBeforeMoney
• Design
• Development
• Testing
• Implementation
• Maintenance
• Decommissioning
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 13
#MissionBeforeMoney
• It is less expensive to incorporate security when the overall functional system design is
developed rather than trying to add it on later (which will often require redesign, if not
reengineering, of already developed components).
• The need for security controls is not just to prevent the user from performing
unauthorized actions, but to prevent components of the system itself from violating
security requirements when acting on the user's requests.
• If security is not intrinsic to the overall design, it is not possible to completely mediate all
the activities that can compromise security.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 14
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 15
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 16
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 17
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 18
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 19
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 20
#MissionBeforeMoney
• An example where encapsulation is used in the real world is the use of the setuid bit. Typically, in Linux or any Unix-based
operating system, a file has ownership based on the person who created it, and an application runs based on the person who
launched it. A special mechanism, setuid, allows for a file or object to be set with different privileges. Setting the setuid bit on a
file will cause it to open with the permission of whatever account you set it to be. The setuid bit controls access, above and
beyond the typical operation. That is an example of encapsulation.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 21
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 22
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 23
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 24
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 25
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 26
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 28
#MissionBeforeMoney
• Tampering Data tampering is an attack on the integrity of data by maliciously manipulating data.
• Repudiation Repudiation is the ability of a party to deny that they are responsible for performing an action.
Repudiation threat occurs when a user claims that they did not perform an action, and there is no evidence to prove otherwise.
• Information disclosure Information disclosure — commonly referred to as a data leak — occurs when
information is improperly shared with an unauthorized party
• Denial of service A denial-of-service (DoS) attack involves a malicious actor rendering a system or service
unavailable by legitimate users.
• Elevation of privilege Elevation of privilege (or privilege escalation) occurs when an unprivileged application
user can upgrade their privileges to those of a privileged user (such as an administrator).
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 29
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 30
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 31
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 32
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 33
#MissionBeforeMoney
• Define technical scope During this stage, the boundaries of the technical environment and the
scope of all technical assets for which threat analysis is needed are defined. In addition to the application
boundaries, you must discover and document all infrastructure, application, and software dependencies.
• Application decomposition During this stage, an evaluation of all assets (i.e., the application
components) needs to be conducted, and the data flows between these assets need to be identified. As part of
this process, all application entry points and trust boundaries should be identified and defined. This stage is
intended to establish a clear understanding of all data sources, the parties that access those data sources, and all
use cases for data access within the application
• Threat analysis This stage is intended to identify and analyze threat information from within the system,
such as SIEM feeds, web application firewall (WAF) logs, etc., as well as externally available threat intelligence that
is related to the system.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 34
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 35
#MissionBeforeMoney
• Attack enumeration During this stage, attacks that could exploit identified vulnerabilities
(from step 5) are modeled and simulated. This helps determine the likelihood and impact of each identified
attack vector.
• Risk and impact analysis During this final stage, your business impact analysis (from
step 1) should be refined based on all the analysis performed in the previous six steps.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 36
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 37
#MissionBeforeMoney
• The concept of secure defaults (or secure-by-default) essentially means that systems should
be designed with the best security possible without users needing to turn on security
features or otherwise think about security configurations.
• Secure-by-default means that a system's default configuration includes the most secure
settings possible, which may not always be the most highly functioning settings.
• Systems and applications should be designed such that the end user (or system admin) must
actively choose to override secure configurations based on the business's needs and risk
appetite.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 38
#MissionBeforeMoney
• For systems with sensitive data, security controls should be designed such that in the
absence of specific configuration settings to the contrary, the default is to not permit the
action. Access should be based on permission (e.g., allowed list), not exclusion (e.g.,
blocked list)
• *This is the principle behind “deny all” default firewall rules and also relates to the
concept of least privileged
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 39
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 40
#MissionBeforeMoney
• *Separation of duties can also be viewed as a defense-in-depth control; permission for sensitive operations should not depend
on a single condition.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 41
#MissionBeforeMoney
• “If complexity is the worst enemy of security, then simplicity must be its ally” – Evan Francen
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 42
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 43
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 44
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 45
#MissionBeforeMoney
• 3rd parties (partners, cloud providers, or anyone else outside of your organization)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 46
#MissionBeforeMoney
• 3rd parties (partners, cloud providers, or anyone else outside of your organization)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 47
#MissionBeforeMoney
• Use least privilege access - Always assign the minimum rights required for the
specific access requested, on a Just in Time (JIT) basis.
• Assume breach - Instead of trusting devices on your network, assume the worst-
case scenario (i.e., that you've already been breached) and minimize the blast radius to
prevent further damage.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 48
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 49
#MissionBeforeMoney
• Deploy real-time monitoring to help detect and stop attacks and other anomalous
behavior
• Real-time analytics can also help inform access decisions by providing real-time context
for access requests and supporting JIT permissions
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 50
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 51
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 52
#MissionBeforeMoney
• Visibility and Transparency — Keep it Open - This is a “trust, but verify” principle (discussed
earlier) that seeks to assure all stakeholders that the system operates securely and maintains data
privacy as intended. (e.g., Privacy policy)
• Respect for User Privacy — Keep it User-Centric - System architects, developers, and
operators must keep the interests of the individual as their utmost priority by providing strong
privacy defaults, appropriate notice, and a user-friendly experience. (e.g., by clicking a button or
ticking a check box) in order to give consent.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 53
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 54
#MissionBeforeMoney
• In a cloud environment, the CSP takes on much of the operational burden, including a great deal of
security responsibility — but not all of it.
• The specific breakdown of responsibility varies by cloud provider and by cloud service type.
• *Your organization is ultimately responsible and accountable for the security of the cloud
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 55
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 56
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 57
#MissionBeforeMoney
DAD JOKE
Before we get too deep into this.
How about a dumb dad joke?
HAHAHAHA
Moving on…
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 58
#MissionBeforeMoney
• Can be informal, serving to illustrate and simplify the assessment of a system without the rigor of
a proof
• Can help reduce ambiguity and potential misunderstanding as to what, exactly, a security
architecture is trying to accomplish
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 59
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 60
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 61
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 62
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 63
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 64
#MissionBeforeMoney
Star Property (* property) - No write down, this rule prevents a subject from writing to
an object at a lower security level.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 65
#MissionBeforeMoney
Star Property (* property) - No write down, this rule prevents a subject from writing to
an object at a lower security level.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 66
#MissionBeforeMoney
• Does not deal with covert channels or the possibility of performing permitted operations
in a manner that reveals confidential information through side channels
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 67
#MissionBeforeMoney
• Star Integrity Property (* integrity property) - No write up, this rule prevents the
corruption of more secure information by a less privileged subject.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 68
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 69
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 70
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 71
#MissionBeforeMoney
• Star Integrity Property (* integrity property) - No write up, this rule prevents the
corruption of more secure information by a less privileged subject.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 72
#MissionBeforeMoney
• All objects related to the same company (or client) are part of what is called a company
data set.
• All company data sets in the same industry (i.e., that are competitors) are part of what is
called a conflict of interest class.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 73
#MissionBeforeMoney
• All objects related to the same company (or client) are part of what is called a company
data set.
• All company data sets in the same industry (i.e., that are competitors) are part of what is
called a conflict of interest class.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 74
#MissionBeforeMoney
• Star Integrity Property (* integrity property) - No write up, this rule prevents the
corruption of more secure information by a less privileged subject.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 75
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 76
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 77
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 78
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 79
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 80
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 81
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 82
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 83
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 84
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 85
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 86
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 87
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 88
#MissionBeforeMoney
• Chip design features such as shield layers to prevent eavesdropping on internal signals
using ion probes or other microscopic devices.
• Trusted boot process that validates the initial boot firmware and operating system load.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 89
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 91
#MissionBeforeMoney
• Encrypt data such that it can only be decrypted using the same TPM.
• Verify the state of the machine the TPM is installed on to detect certain
forms of tampering (i.e., with the BIOS) and ensure platform integrity.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 93
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 94
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 95
#MissionBeforeMoney
• HSMs are frequently found in certificate authorities (CAs) that use them to protect their
root private keys, and payment processors.
• HSMs are also used in many national security applications or other environments.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 96
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 97
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 98
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 99
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 100
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 101
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 102
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 103
#MissionBeforeMoney
DAD JOKE
Laughter for Levity
How about a dumb dad joke?
HAHAHAHA
Moving on…
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 104
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 105
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 106
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 107
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 108
#MissionBeforeMoney
• Assign unique admin accounts for each administrator (i.e., do not share
admin accounts between more than one admin)
• Enable logging at a sufficiently detailed level to provide the forensic
information needed to identify the cause of events related to security
incidents (but ensure logging does not include passwords)
• Protect the logs from tampering by database admins, either through
permissions on the database system itself or by transmitting the log data
in real time to a separate secure logging system.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 109
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 110
#MissionBeforeMoney
• Transparent data encryption (TDE) protects the data from those who have direct access
to the filesystem (i.e., the “root” user), but do not have permission to access the
database system and the specific database item.
• Cell-level encryption (CLE) encrypts database information at the cell or column level.
With this approach, data remains encrypted when read from the database and is
decrypted only when requested.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 111
#MissionBeforeMoney
• Cell-level encryption (CLE) encrypts database information at the cell or column level.
Key management and handling the decryption/encryption requests can add
With this approach, data remains
considerable encrypted
complexity to thewhen read
application andfrom theondatabase
depending and is
the types of queries
decrypted only when requested.
(and whether they include CLE-protected data), the performance can be affected,
sometimes drastically.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 112
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 113
#MissionBeforeMoney
“All cryptography can eventually be broken the only question is how much effort
is required.” – Bruce Schneier
• A number of avenues that can be followed to compromise a cryptographic system.
• Algorithm and protocol weaknesses
• Implementation weakness
• Key management vulnerabilities
*There are countries that strictly regulate the use of cryptography, and countries that, while permitting the unrestricted use of cryptography, regulate the export of
cryptographic technology
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 114
#MissionBeforeMoney
• The cryptographic attack surface includes not only the algorithm, but the
people, processes, and technology that implement the cryptographic
protections, all of which are potentially vulnerable to attack.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 115
#MissionBeforeMoney
• CryptologyExample
is hard, andprotocols withgetweaknesses
even the experts it wrong.
Plan
• Cryptanalysis becomes morefor the Lifecycle
effective over time, owing to advances in
computing, Wireless Equivalent
mathematical Privacy
breakthroughs, and other(WEP)
improvements in
cryptanalytic methods.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 116
#MissionBeforeMoney
The best defense is to use standard cryptographic libraries that have been tested over
time for side-channel information leakage.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 117
#MissionBeforeMoney
• Compare secret strings (e.g., keys, plaintext, unhashed passwords) using constant-time
comparison routines.
• Avoid branching or loop counts that depend upon secret data.
• Avoid indexing lookup tables or arrays using secret data Use strong (i.e., “cryptographic
grade”) random number generators.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 118
#MissionBeforeMoney
• Compare secret strings (e.g., keys, plaintext, unhashed passwords) using constant-time
comparison routines.
•
Read the Case Studies in the
Avoid branching or loop counts that depend upon secret data.
Book
• Avoid indexing lookup tables or arrays using secret data Use strong (i.e., “cryptographic
grade”) random number generators.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 119
#MissionBeforeMoney
Keys should not be reused and should be rotated (replaced) periodically to ensure that the
amount of data encrypted using a single key is limited.
Symmetric and private keys depend upon confidentiality to be effective. This means great
care must be taken with how the keys are stored to reduce the possibility of their
becoming known to unauthorized entities.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 120
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 121
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 122
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 123
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 125
#MissionBeforeMoney
• Computers used to maintain and manage industrial systems must never be used for any
other purpose
• It is essential to limit and screen permitted traffic accessing the ICS network through the
use of carefully configured firewalls and network proxies
• For ICSs that must be remotely accessible, compensating controls such as installing a
web proxy or VPN should be considered to add an additional layer of security on top of
whatever access controls are implemented on the ICS itself.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 127
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 128
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 129
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 130
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 131
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 132
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 133
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 134
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 135
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 136
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 137
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 140
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 141
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 142
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 143
#MissionBeforeMoney
• To start, you can protect yourself (and others that might be a target of
your compromised devices) through the same two basic security controls
previously mentioned
• Change default credentials as soon as possible, and before you connect the device
to the internet.
• Keep your device updated with the current firmware release, either by enabling auto-
update (if supported by your device) or by periodically checking with the
manufacturer's website for firmware updates.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 144
#MissionBeforeMoney
• Segment your network so that your IoT devices do not have access to other sensitive
devices or servers on your internal networks. If you have to be able to access your
IoT device externally, then at the very least put the device behind a router that does
reverse NAT mapping.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 145
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 146
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 147
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 148
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 149
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 150
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 152
#MissionBeforeMoney
• You should maintain least privileged access for serverless functions, as you do other
services — serverless functions should be granted only the access and permissions
necessary to execute their task.
• Runtime protection should be used to detect suspicious events or errors that may lead to
unexpected behavior or compromise.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 153
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 154
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 155
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 156
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 157
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 158
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 159
#MissionBeforeMoney
• The concept of edge computing dates back to the content delivery networks (CDNs) of
the 1990s and now extends into the world of cloud computing. CDNs are covered in
detail in Chapter 4, “Communication and Network Security.”
• Edge computing allows pseudo-local data processing to minimize data sent over the
internet.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 160
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 161
#MissionBeforeMoney
• The operating system provides a level of abstraction that manages the details of files
and directories.
• Virtualization is the act of creating virtual (i.e., not real) compute, storage, and network
resources, virtualization allows you to create software versions of hardware.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 162
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 163
#MissionBeforeMoney
• Virtualization enables multiple operating systems to run on the same computer, each
unaware of and unable (in a properly designed system) to affect the other operating
systems.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 164
#MissionBeforeMoney
• Virtualized machines running within the host OS are then called guest machines.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 165
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 166
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 167
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 168
#MissionBeforeMoney
DAD JOKE
Before we get too deep into this.
How about a dumb dad joke?
HAHAHAHA
Moving on…
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 169
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 170
#MissionBeforeMoney
• Confidentiality (and privacy): One of the main uses of cryptography is to protect the
confidentiality of information, both at rest and in transit. This offers the critical feature of
“privacy” when applied to personally identifiable information (PII) and protected health
information (PHI).
• Integrity: Another common application of cryptography is the use of hashing algorithms
and message digest to provide assurance of data integrity (or accuracy). These
cryptographic applications help ensure that data being accessed is intact and as
expected.
• Authenticity (and nonrepudiation): Cryptography can also be used for authentication
services as well as nonrepudiation through digital signatures and digital certificates.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 171
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 172
#MissionBeforeMoney
• Key: The input that controls the operation of the cryptographic algorithm; it determines
the behavior of the algorithm and permits the reliable encryption and decryption of the
message. Symmetric/private keys (discussed later in this chapter) must be kept private,
while public keys (also discussed later in this chapter) are shared to enable
authentication and other use cases.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 173
#MissionBeforeMoney
• The key length (e.g., AES-256, RSA-2048, SHA-512, etc.) The operating
mode (ECB, CBC, etc.)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 174
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 175
#MissionBeforeMoney
There are a number of methods for securely exchanging keys over an insecure channel, the
most widely used of which uses public key cryptography (also discussed later).
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 176
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 177
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 178
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 179
#MissionBeforeMoney
• For IoT and edge devices, you'll generally want algorithms that are lightweight and can
be supported by devices that are usually resource constrained.
• Example of how performance and other system factors make cryptography an
important factor in overall system architecture and design.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 180
#MissionBeforeMoney
• Stream ciphers take either a single bit or a single byte at a time, optimized for
encrypting communications links, able to quickly resynchronize in the face of
dropped or corrupted bits.
• It is possible, at the cost of some (or considerable) efficiency to employ a block
cipher as a stream cipher and vice versa.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 181
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 182
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 183
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 184
#MissionBeforeMoney
SESSION 5 - FIN
YOU MADE IT!
Domain 3 is 1/2 done WHOOT HECK YA!! YALL!
Domain 3 can be a challenge because it’s so dense.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 185
#MissionBeforeMoney
SESSION 5 - FIN
YOU MADE IT!
Domain 3 is 1/2 done WHOOT HECK YA!! YALL!
Domain 3 can be a challenge because it’s so dense.
Homework:
• Finish reading Domain 3.
• Take practice tests.
• Review at least two of the references we provided in this
class (download for later use).
• Post at least one question/answer in the Slack Channel.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 187
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION ONE
INTRODUCTION
2022
Class #5 – Domain 3
Security Architecture and Engineering
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 1