Ultimate CompTIA SY0-701 Security+ Study Guide 1.0
Ultimate CompTIA SY0-701 Security+ Study Guide 1.0
SY0-701 Security+
Study Guide
1
Ultimate CompTIA SY0-701 Security+ Study Guide
Written by: Christian Joseph Miranda
© 2025 Christian Joseph Miranda. All rights reserved.
This study guide is for personal use only. No part of this publication may be reproduced,
distributed, or transmitted in any form or by any means without the prior written permission of the
author.
First Edition: January 2025
This is version 1.0
2
Table of Contents
Lesson 1: Summarize Fundamental Security Concepts ................................................................. 13
Topic 1A: Security Concepts .................................................................................................... 13
Information Security ........................................................................................................... 13
Cybersecurity Framework ................................................................................................... 14
Gap Analysis ....................................................................................................................... 15
Access Control .................................................................................................................... 16
Topic 1B: Security Controls ..................................................................................................... 18
Security Control Categories ................................................................................................. 18
Security Control Functional Types ....................................................................................... 19
Information Security Roles and Responsibilities ................................................................... 21
Information Security Competencies ..................................................................................... 22
Information Security Business Units .................................................................................... 24
Lesson 2: Compare Threat Types ................................................................................................ 25
Topic 2A: Threat Actors........................................................................................................... 25
Vulnerability, Threat, and Risk ............................................................................................. 25
Attributes of Threat Actors .................................................................................................. 26
Motivations of Threat Actors................................................................................................ 27
Hackers and Hacktivists ...................................................................................................... 29
Nation-State Actors ............................................................................................................. 30
Organized Crime and Competitors ....................................................................................... 31
Internal Threat Actors ......................................................................................................... 32
Topic 2B: Attack Surfaces ........................................................................................................ 33
Attack Surface and Threat Vectors........................................................................................ 33
Vulnerable Software Vectors ................................................................................................ 34
Network Vectors ................................................................................................................. 36
Lure-Based Vectors ............................................................................................................. 38
Message-Based Vectors ....................................................................................................... 39
Supply Chain Attack Surface ................................................................................................ 40
Topic 2C: Social Engineering ................................................................................................... 42
Human Vectors ................................................................................................................... 42
3
Impersonation and Pretexting ............................................................................................. 43
Phishing and Pharming ....................................................................................................... 44
Typosquatting..................................................................................................................... 46
Business Email Compromise ................................................................................................ 47
Lesson 3: Explain Cryptographic Solutions .................................................................................. 48
Topic 3A: Cryptographic Algorithms ........................................................................................ 48
Cryptographic Concepts ...................................................................................................... 48
Symmetric Encryption......................................................................................................... 50
Key Length.......................................................................................................................... 51
Asymmetric Encryption....................................................................................................... 53
Hashing .............................................................................................................................. 54
Digital Signatures ................................................................................................................ 55
Topic 3B: Public Key Infrastructure ......................................................................................... 57
Certificate Authorities ......................................................................................................... 57
Digital Certificates ............................................................................................................... 59
Root of Trust ....................................................................................................................... 59
Certificate Signing Requests................................................................................................. 61
Subject Name Attributes ...................................................................................................... 62
Certificate Revocation ......................................................................................................... 63
Key Management ................................................................................................................ 64
Cryptoprocessors and Secure Enclaves ................................................................................. 66
Topic 3C: Cryptographic Solutions ........................................................................................... 68
Encryption Supporting Confidentiality ................................................................................. 69
Disk and File Encryption ..................................................................................................... 70
Database Encryption ........................................................................................................... 72
Perfect Forward Secrecy ...................................................................................................... 75
Salting and Key Stretching ................................................................................................... 76
Blockchain .......................................................................................................................... 77
Obfuscation ........................................................................................................................ 78
Lesson 4: Implement Identity and Access Management ................................................................ 80
Topic 4A: Authentication ......................................................................................................... 80
Authentication Design ......................................................................................................... 80
Password Concepts ............................................................................................................. 82
4
Password Managers ............................................................................................................ 83
Multifactor Authentication................................................................................................... 85
Biometric Authentication .................................................................................................... 86
Hard Authentication Tokens ................................................................................................ 88
Soft Authentication Tokens .................................................................................................. 90
Passwordless Authentication ............................................................................................... 91
Topic 4B: Authorization .......................................................................................................... 92
Discretionary and Mandatory Access Control ....................................................................... 92
Role- and Attribute-Based Access Control............................................................................. 93
Rule-Based Access Control................................................................................................... 94
Least Privilege Permission Assignments ............................................................................... 95
User Account Provisioning ................................................................................................... 97
Account Attributes and Access Policies ................................................................................. 98
Account Restrictions ........................................................................................................... 99
Privileged Access Management .......................................................................................... 100
Topic 4C: Identity Management ............................................................................................. 101
Local, Network, and Remote Authentication ....................................................................... 101
Directory Services ............................................................................................................. 103
Single Sign-on Authorization ............................................................................................. 106
Federation ........................................................................................................................ 107
Security Assertion Markup Language (SAML) ..................................................................... 108
Open Authorization (OAuth) .............................................................................................. 110
Lesson 5: Secure Enterprise Network Architecture .................................................................... 112
Topic 5A: Enterprise Network Architecture............................................................................ 112
Architecture and Infrastructure Concepts ........................................................................... 112
Network Infrastructure ..................................................................................................... 114
Switching Infrastructure Considerations ............................................................................ 116
Routing Infrastructure Considerations ............................................................................... 117
Security Zones .................................................................................................................. 119
Attack Surface ................................................................................................................... 121
Port Security ..................................................................................................................... 123
Physical Isolation .............................................................................................................. 125
Architecture Considerations .............................................................................................. 126
5
Topic 5B: Network Security Appliances.................................................................................. 128
Device Placement .............................................................................................................. 128
Device Attributes .............................................................................................................. 130
Firewalls........................................................................................................................... 132
Layer 4 and Layer 7 Firewalls ............................................................................................ 134
Proxy Servers.................................................................................................................... 136
Intrusion Detection Systems .............................................................................................. 137
Next-Generation Firewalls and Unified Threat Management................................................ 139
Load Balancers ................................................................................................................. 140
Web Application Firewalls ................................................................................................. 142
Topic 5C: Secure Communications ......................................................................................... 143
Remote Access Architecture............................................................................................... 143
Transport Layer Security Tunneling ................................................................................... 144
Internet Protocol Security Tunneling ................................................................................. 146
Internet Key Exchange....................................................................................................... 147
Remote Desktop ................................................................................................................ 149
Secure Shell ...................................................................................................................... 150
Out-of-Band Management and Jump Servers ...................................................................... 152
Lesson 6: Secure Cloud Network Architecture ........................................................................... 153
Topic 6A: Cloud Infrastructure .............................................................................................. 153
Cloud Deployment Models ................................................................................................. 153
Cloud Service Models ........................................................................................................ 155
Responsibility Matrix ........................................................................................................ 157
Centralized and Decentralized Computing .......................................................................... 158
Resilient Architecture Concepts ......................................................................................... 160
Application Virtualization and Container Virtualization ...................................................... 161
Cloud Architecture ............................................................................................................ 163
Cloud Automation Technologies ......................................................................................... 164
Software Defined Networking ............................................................................................ 166
Cloud Architecture Features .............................................................................................. 167
Cloud Security Considerations ........................................................................................... 169
Topic 6B: Embedded Systems and Zero Trust Architecture ..................................................... 171
Embedded Systems ........................................................................................................... 171
6
Industrial Control Systems................................................................................................. 172
Internet of Things ............................................................................................................. 174
Deperimeterization and Zero Trust .................................................................................... 176
Zero Trust Security Concepts ............................................................................................. 178
Lesson 7: Explain Resiliency and Site Security Concepts ............................................................. 180
Topic 7A: Asset Management ................................................................................................. 180
Asset Tracking .................................................................................................................. 180
Asset Protection Concepts ................................................................................................. 182
Data Backups .................................................................................................................... 184
Advanced Data Protection ................................................................................................. 186
Secure Data Destruction .................................................................................................... 188
Topic 7B : Redundancy Strategies .......................................................................................... 190
Continuity of Operations ................................................................................................... 190
Capacity Planning Risks ..................................................................................................... 192
High Availability................................................................................................................ 194
Clustering ......................................................................................................................... 197
Power Redundancy ........................................................................................................... 199
Diversity and Defense in Depth .......................................................................................... 200
Deception Technologies ..................................................................................................... 202
Testing Resiliency ............................................................................................................. 204
Topic 7C : Physical Security ................................................................................................... 206
Physical Security Controls ................................................................................................. 206
Site Layout, Fencing, and Lighting ...................................................................................... 207
Gateways and Locks .......................................................................................................... 210
Security Guards and Cameras ............................................................................................ 211
Alarm Systems and Sensors ............................................................................................... 213
Lesson 8: Explain Vulnerability Management............................................................................. 215
Topic 8A: Device and OS Vulnerabilities ................................................................................. 215
Operating System Vulnerabilities ....................................................................................... 215
Vulnerability Types ........................................................................................................... 217
Zero-Day Vulnerabilities .................................................................................................... 218
Misconfiguration Vulnerabilities ........................................................................................ 220
Cryptographic Vulnerabilities ............................................................................................ 221
7
Sideloading, Rooting, and Jailbreaking................................................................................ 223
Topic 8B: Application and Cloud Vulnerabilities ..................................................................... 225
Application Vulnerabilities ................................................................................................ 225
Evaluation Scope ............................................................................................................... 227
Web Application Attacks .................................................................................................... 228
Cloud-based Application Attacks ........................................................................................ 230
Supply Chain ..................................................................................................................... 231
Topic 8C: Vulnerability Identification Methods ....................................................................... 233
Vulnerability Scanning....................................................................................................... 233
Threat Feeds ..................................................................................................................... 234
Deep and Dark Web ........................................................................................................... 236
Other Vulnerability Assessment Methods ........................................................................... 238
Topic 8D: Vulnerability Analysis and Remediation .................................................................. 240
Common Vulnerabilities and Exposures ............................................................................. 240
False Positives, False Negatives, and Log Review ................................................................. 241
Vulnerability Analysis ........................................................................................................ 243
Vulnerability Response and Remediation ........................................................................... 245
Lesson 9: Evaluate Network Security Capabilities ...................................................................... 246
Topic 9A: Network Security Baselines .................................................................................... 246
Benchmarks and Secure Configuration Guides .................................................................... 246
Wireless Network Installation Considerations .................................................................... 248
Wireless Encryption .......................................................................................................... 249
Wi-Fi Authentication Methods ........................................................................................... 250
Network Access Control (NAC) .......................................................................................... 251
Topic 9B: Network Security Capability Enhancement ............................................................. 252
Access Control Lists (ACLs) ............................................................................................... 252
Intrusion Detection and Prevention Systems (IDS/IPS) ....................................................... 253
IDS and IPS Detection Methods .......................................................................................... 255
Web Filtering .................................................................................................................... 256
Lesson 10: Assess Endpoint Security Capabilities ...................................................................... 257
Topic 10A: Implement Endpoint Security ............................................................................... 257
Endpoint Hardening .......................................................................................................... 257
Endpoint Protection .......................................................................................................... 259
8
Advanced Endpoint Protection........................................................................................... 260
Endpoint Configuration ..................................................................................................... 262
Hardening Techniques ....................................................................................................... 264
Hardening Specialized Devices........................................................................................... 265
Topic 10B: Mobile Device Hardening ..................................................................................... 267
Mobile Hardening Techniques............................................................................................ 267
Full Device Encryption and External Media ........................................................................ 269
Location Services .............................................................................................................. 270
Cellular and GPS Connection Methods ................................................................................ 271
Wi-Fi and Tethering Connection Methods ........................................................................... 272
Bluetooth Connection Methods .......................................................................................... 274
Near-Field Communications and Mobile Payment Services ................................................. 275
Lesson 11: Enhance Application Security Capabilities ................................................................ 277
Topic 11A: Application Protocol Security Baselines ................................................................ 277
Secure Protocols ............................................................................................................... 277
Transport Layer Security (TLS) .......................................................................................... 278
Secure Directory Services .................................................................................................. 280
Simple Network Management Protocol Security ................................................................. 281
File Transfer Services ........................................................................................................ 282
Email Services................................................................................................................... 284
Email Security................................................................................................................... 286
Email Data Loss Prevention ............................................................................................... 287
DNS Filtering .................................................................................................................... 289
Topic 11B: Cloud and Web Application Security Concepts ....................................................... 291
Secure Coding Techniques ................................................................................................. 291
Application Protections ..................................................................................................... 293
Software Sandboxing ......................................................................................................... 295
Lesson 12: Explain Incident Response and Monitoring Concepts ................................................ 296
Topic 12A: Incident Response................................................................................................ 296
Incident Response Processes ............................................................................................. 296
Preparation ...................................................................................................................... 298
Detection .......................................................................................................................... 300
Analysis ............................................................................................................................ 301
9
Containment ..................................................................................................................... 302
Eradication and Recovery .................................................................................................. 303
m ..................................................................................................................................... 304
Testing and Training.......................................................................................................... 306
Threat Hunting ................................................................................................................. 307
Topic 12B: Digital Forensics .................................................................................................. 308
Due Process and Legal Hold ............................................................................................... 308
Acquisition ....................................................................................................................... 309
System Memory Acquisition .............................................................................................. 311
Disk Image Acquisition ...................................................................................................... 311
Preservation ..................................................................................................................... 313
Reporting ......................................................................................................................... 314
Topic 12C: Data Sources ........................................................................................................ 315
Data Sources, Dashboards, and Reports .............................................................................. 315
Log Data ........................................................................................................................... 317
Host Operating System Logs .............................................................................................. 318
Application and Endpoint Logs .......................................................................................... 319
Network Data Sources ....................................................................................................... 321
Packet Captures ................................................................................................................ 322
Metadata .......................................................................................................................... 324
Topic 12D: Alerting and Monitoring Tools .............................................................................. 325
Security Information and Event Management ..................................................................... 325
Alerting and Monitoring Activities ..................................................................................... 326
Alert Tuning ..................................................................................................................... 328
Monitoring Infrastructure.................................................................................................. 329
Monitoring Systems and Applications ................................................................................ 330
Benchmarks...................................................................................................................... 332
Lesson 13: Analyze Indicators of Malicious Activity ................................................................... 333
Topic 13A: Malware Attack Indicators.................................................................................... 333
Malware Classification....................................................................................................... 333
Computer Viruses ............................................................................................................. 334
Computer Worms and Fileless Malware.............................................................................. 335
Spyware and Keyloggers .................................................................................................... 337
10
Backdoors and Remote Access Trojans ............................................................................... 338
Rootkits ............................................................................................................................ 339
Ransomware, Crypto-Malware, and Logic Bombs ................................................................ 341
TTPs and IoCs ................................................................................................................... 342
Malicious Activity Indicators.............................................................................................. 344
Topic 13B: Physical and Network Attack Indicators ................................................................ 345
Physical Attacks ................................................................................................................ 345
Network Attacks ............................................................................................................... 346
Distributed Denial of Service Attacks ................................................................................. 348
On-Path Attacks ................................................................................................................ 350
Domain Name System Attacks............................................................................................ 351
Wireless Attacks ............................................................................................................... 353
Password Attacks .............................................................................................................. 354
Credential Replay Attacks .................................................................................................. 356
Cryptographic Attacks ....................................................................................................... 357
Malicious Code Indicators.................................................................................................. 359
Topic 13C: Application Attack Indicators ............................................................................... 360
Application Attacks ........................................................................................................... 360
Replay Attacks .................................................................................................................. 361
Forgery Attacks ................................................................................................................. 363
Injection Attacks ............................................................................................................... 364
Directory Traversal and Command Injection Attacks ........................................................... 366
URL Analysis ..................................................................................................................... 367
Web Server Logs ............................................................................................................... 368
Lesson 14: Summarize Security Governance Concepts ............................................................... 369
Topic 14A: Policies, Standards, and Procedures ...................................................................... 369
Policies ............................................................................................................................. 369
Procedures ....................................................................................................................... 372
Standards ......................................................................................................................... 375
Legal Environment ............................................................................................................ 378
Governance and Accountability.......................................................................................... 381
Topic 14B: Change Management ............................................................................................ 385
Change Management Programs.......................................................................................... 385
11
Allowed and Blocked Changes ........................................................................................... 387
Restarts, Dependencies, and Downtime .............................................................................. 388
Documentation and Version Control................................................................................... 390
Topic 14C: Automation and Orchestration.............................................................................. 392
Automation and Scripting .................................................................................................. 392
Automation and Orchestration Implementation.................................................................. 393
Lesson 15: Explain Risk Management Processes ........................................................................ 396
Topic 15A: Risk Management Processes and Concepts ............................................................ 396
Risk Identification and Assessment .................................................................................... 396
Risk Management Strategies .............................................................................................. 398
Risk Management Processes .............................................................................................. 400
Business Impact Analysis................................................................................................... 403
Topic 15B: Vendor Management Concepts ............................................................................. 404
Vendor Selection ............................................................................................................... 404
Vendor Assessment Methods ............................................................................................. 406
Legal Agreements.............................................................................................................. 408
Topic 15C: Audits and Assessments ....................................................................................... 410
Attestation and Assessments ............................................................................................. 410
Penetration Testing ........................................................................................................... 412
Exercise Types .................................................................................................................. 414
Lesson 16: Summarize Data Protection and Compliance Concepts .............................................. 415
Topic 16A: Data Classification and Compliance....................................................................... 415
Data Types ........................................................................................................................ 415
Data Classifications ........................................................................................................... 417
Data Sovereignty and Geographical Considerations............................................................. 419
Privacy Data...................................................................................................................... 420
Privacy Breaches and Data Breaches .................................................................................. 423
Compliance ....................................................................................................................... 425
Monitoring and Reporting ................................................................................................. 426
Data Protection ................................................................................................................. 428
Data Loss Prevention......................................................................................................... 430
Topic 16B: Personnel Policies ................................................................................................ 432
Conduct Policies ................................................................................................................ 432
12
User and Role-Based Training ............................................................................................ 434
Training Topics and Techniques ......................................................................................... 435
Security Awareness Training Lifecycle................................................................................ 437
Information Security
Summary: Information security (infosec) involves protecting data resources from unauthorized
access, attack, theft, or damage. It ensures data confidentiality, integrity, and availability, collectively
known as the CIA Triad. Non-repudiation is also a critical aspect, ensuring actions cannot be denied.
Detailed Explanation:
• CIA Triad:
o Confidentiality:
▪ Definition: Information can only be read by authorized individuals.
▪ Purpose: Prevents unauthorized access to sensitive data.
o Integrity:
▪ Definition: Data is stored and transferred as intended, without
unauthorized modifications.
▪ Purpose: Ensures data accuracy and trustworthiness.
o Availability:
▪ Definition: Information is accessible to authorized users when needed.
▪ Purpose: Ensures reliable access to data and resources.
• Non-repudiation:
o Definition: Ensures that a person cannot deny performing an action, such as
creating, modifying, or sending a resource.
o Example: Legal documents, like wills, often require witnesses to confirm their
execution.
Key Points:
• CIA Triad:
o Confidentiality: Authorized access only.
o Integrity: Accurate and unaltered data.
13
o Availability: Reliable access for authorized users.
• Non-repudiation:
o Definition: Actions cannot be denied.
o Example: Witnesses for legal documents.
Cybersecurity Framework
Summary: Cybersecurity focuses on securing processing hardware and software to ensure
information security. The National Institute of Standards and Technology (NIST) framework
classifies cybersecurity tasks into five functions: Identify, Protect, Detect, Respond, and Recover.
Detailed Explanation:
• Identify:
o Definition: Develop security policies and capabilities.
o Tasks: Evaluate risks, threats, and vulnerabilities; recommend security controls to
mitigate them.
• Protect:
o Definition: Ensure security is embedded in every stage of IT hardware and software
lifecycle.
o Tasks: Procure, develop, install, operate, and decommission IT assets securely.
• Detect:
o Definition: Perform ongoing monitoring to ensure controls are effective.
o Tasks: Proactively monitor for new types of threats.
• Respond:
o Definition: Address threats to systems and data security.
o Tasks: Identify, analyze, contain, and eradicate threats.
• Recover:
o Definition: Restore systems and data after an attack.
o Tasks: Implement cybersecurity resilience measures.
Key Points:
• Identify:
o Policies and Capabilities: Develop and evaluate.
o Risks and Controls: Assess and recommend.
• Protect:
14
o Lifecycle Security: Embed security in IT asset lifecycle.
o Operations: Securely manage IT assets.
• Detect:
o Monitoring: Ongoing and proactive.
o Threats: Identify new threats.
• Respond:
o Threat Management: Analyze and contain threats.
o Eradication: Remove threats.
• Recover:
o Resilience: Restore systems and data.
o Recovery Measures: Implement resilience strategies.
Gap Analysis
Summary: Gap analysis identifies deviations between an organization's current security systems
and the requirements or recommendations of a cybersecurity framework. It helps in achieving
compliance and improving security by highlighting missing or poorly configured controls and
providing remediation recommendations.
Detailed Explanation:
• Security Functions and Outcomes:
o Identify Function:
▪ Example Outcome: Inventory of company assets.
▪ Achievement: Implementing security controls.
• Security Controls:
o Challenges: Numerous categories and types make selection difficult.
• Cybersecurity Framework:
o Purpose: Guides selection and configuration of controls.
o Benefits: Prevents building security programs in isolation; ensures important
security concepts are covered.
• Framework Usage:
o Capabilities: Allows objective assessment of current cybersecurity capabilities.
o Target Level: Identifies target capability level and prioritizes investments.
o Compliance: Provides structure for risk management and regulatory compliance.
15
• Gap Analysis Process:
o Purpose: Identifies deviations from framework requirements.
o Timing: Performed when adopting a framework or meeting new compliance
requirements; repeated periodically.
o Report: Provides overall score, list of missing/poorly configured controls, and
remediation recommendations.
o Involvement: May involve third-party consultants for complex frameworks and
compliance requirements.
Key Points:
• Security Functions and Outcomes:
o Identify Function: Inventory of assets.
o Security Controls: Implement to achieve outcomes.
• Security Controls:
o Selection Challenges: Numerous categories and types.
• Cybersecurity Framework:
o Guidance: Selection and configuration of controls.
o Benefits: Comprehensive security program development.
• Framework Usage:
o Capabilities Assessment: Objective statement of current capabilities.
o Target Level: Identify and prioritize investments.
o Compliance: Structure for risk management and compliance.
• Gap Analysis Process:
o Purpose: Identify deviations from framework.
o Timing: Initial adoption, new compliance, periodic review.
o Report: Score, missing controls, remediation.
o Consultants: May involve third-party specialists.
Access Control
Summary: Access control systems ensure that information systems meet the goals of the CIA triad
(Confidentiality, Integrity, Availability). They govern how subjects (users, devices, processes)
interact with objects (resources like networks, servers, databases). Modern access control is
typically implemented through Identity and Access Management (IAM) systems, which include
processes for identification, authentication, authorization, and accounting.
Detailed Explanation:
16
• Access Control System:
o Purpose: Ensures information systems meet CIA triad goals.
o Subjects: People, devices, software processes requesting access.
o Objects: Resources such as networks, servers, databases, apps, files.
o Permissions: Rights assigned to subjects for accessing resources.
• Identity and Access Management (IAM):
o Identification:
▪ Definition: Creating an account or ID representing the user, device, or
process.
▪ Example: Unique user accounts on a network.
o Authentication:
▪ Definition: Proving the identity of a subject attempting to access a resource.
▪ Example: Passwords for people, digital certificates for systems.
o Authorization:
▪ Definition: Determining and enforcing rights on resources.
▪ Models:
▪ Discretionary: Object owner allocates rights.
▪ Mandatory: System-enforced rules predetermine rights.
o Accounting:
▪ Definition: Tracking and alerting on the usage of resources.
▪ Example: Recording customer actions on an e-commerce site.
Key Points:
• Access Control System:
o CIA Triad: Confidentiality, Integrity, Availability.
o Subjects and Objects: Interaction governance.
o Permissions: Rights assignment.
• IAM Processes:
o Identification: Unique representation of users/devices.
o Authentication: Proving identity.
o Authorization: Rights determination and enforcement.
o Accounting: Usage tracking and alerting.
17
• E-commerce Example:
o Identification: Verify legitimate customers.
o Authentication: Unique accounts management.
o Authorization: Valid payment mechanisms, special offers.
o Accounting: Record customer actions.
18
Key Points:
• Security Controls:
o Purpose: Ensure confidentiality, integrity, availability, non-repudiation.
o Categories: Managerial, operational, technical, physical.
• Managerial Controls:
o Oversight: Risk identification, evaluation tools.
• Operational Controls:
o People-Based: Security guards, training programs.
• Technical Controls:
o System-Based: Firewalls, antivirus software, OS access control models.
• Physical Controls:
o Access Deterrence: Security cameras, alarms, gateways, locks, lighting, security
guards.
19
o Operation: After an attack.
o Examples:
▪ Backup Systems: Restore damaged data.
▪ Patch Management Systems: Fix vulnerabilities.
• Directive Controls:
o Definition: Enforce rules of behavior, policies, and procedures.
o Examples:
▪ Employee Contracts: Set disciplinary procedures.
▪ Training Programs: Raise awareness and enforce policies.
• Deterrent Controls:
o Definition: Psychologically discourage attackers.
o Examples:
▪ Signs and Warnings: Legal penalties for trespass or intrusion.
• Compensating Controls:
o Definition: Substitute for principal controls, providing equivalent or better
protection.
o Examples:
▪ Alternative Technologies: Different methods to achieve security.
Key Points:
• Preventive Controls:
o Purpose: Prevent attacks.
o Examples: ACLs, antimalware software.
• Detective Controls:
o Purpose: Detect and record intrusions.
o Examples: Logs.
• Corrective Controls:
o Purpose: Mitigate impact post-attack.
o Examples: Backup systems, patch management.
• Directive Controls:
o Purpose: Enforce behavior and policies.
o Examples: Employee contracts, training programs.
20
• Deterrent Controls:
o Purpose: Discourage attacks.
o Examples: Legal warnings.
• Compensating Controls:
o Purpose: Substitute for primary controls.
o Examples: Alternative security technologies.
21
▪ Responsibility: Specific domains like building control, web services.
o Technical and Specialist Staff:
▪ Responsibility: Implementing, maintaining, monitoring security policies.
▪ Example: Information Systems Security Officer (ISSO).
o Nontechnical Staff:
▪ Responsibility: Complying with policies and legislation.
o Directors/Owners:
▪ Responsibility: External security due care or liability.
▪ Shared Responsibility: All employees contribute to security.
Key Points:
• Security Policy:
o Definition: Formalized security implementation.
o Purpose: Protects data and resources.
• Implementation Variations:
o Different Organizations: Unique implementations.
o Common Goal: Secure assets.
• Organizational Security Posture:
o Framework-Based Controls: Best practices.
o Employee Awareness: Role understanding.
• Roles and Responsibilities:
o CIO: IT and security oversight.
o CTO: IT product and solution effectiveness.
o CSO/CISO: Security department management.
o Managers: Domain-specific responsibilities.
o Technical Staff: Policy implementation and monitoring.
o Nontechnical Staff: Policy compliance.
o Directors/Owners: External security responsibility.
22
Detailed Explanation:
• Risk Assessments and Testing:
o Activities: Participate in risk assessments and security system testing.
o Outcome: Make recommendations to improve security.
• Device and Software Management:
o Activities: Specify, source, install, and configure secure devices and software.
o Outcome: Ensure systems are secure and up-to-date.
• Access Control:
o Activities: Set up and maintain document access control and user privilege profiles.
o Outcome: Control who can access sensitive information.
• Audit and Monitoring:
o Activities: Monitor audit logs, review user privileges, and document access controls.
o Outcome: Detect and respond to unauthorized access.
• Incident Response:
o Activities: Manage security-related incident response and reporting.
o Outcome: Address and mitigate security incidents.
• Business Continuity and Disaster Recovery:
o Activities: Create and test business continuity and disaster recovery plans and
procedures.
o Outcome: Ensure the organization can recover from disruptions.
• Training and Education:
o Activities: Participate in security training and education programs.
o Outcome: Keep skills and knowledge up-to-date.
Key Points:
• Risk Assessments and Testing:
o Participate: Assess risks and test systems.
o Recommend: Improve security measures.
• Device and Software Management:
o Specify and Source: Secure devices and software.
o Install and Configure: Ensure security.
• Access Control:
23
o Set Up: Document access control.
o Maintain: User privilege profiles.
• Audit and Monitoring:
o Monitor: Audit logs.
o Review: User privileges and access controls.
• Incident Response:
o Manage: Incident response and reporting.
• Business Continuity and Disaster Recovery:
o Create and Test: Continuity and recovery plans.
• Training and Education:
o Participate: Security training programs.
24
o Definition: A dedicated team (CIRT/CSIRT/CERT) that acts as a single point of
contact for security incident notifications.
o Functions: May be part of the SOC or an independent unit.
o Role: Manage and respond to security incidents effectively.
Key Points:
• Security Operations Center (SOC):
o Centralized Monitoring: Protect critical assets.
o Business Functions: Finance, operations, sales/marketing.
o Large Organizations: Due to complexity and cost.
• DevSecOps:
o Integration: Security in software development.
o Shift Left: Early security considerations.
o Collaboration: Developers, administrators, security specialists.
o Benefits: Faster, reliable, secure software.
• Incident Response:
o Dedicated Team: CIRT/CSIRT/CERT.
o Single Point of Contact: For incident notifications.
o Role: Effective incident management.
25
o Examples: Improperly configured hardware/software, delays in patching, poor
network design, inadequate physical security, insecure passwords, software design
flaws.
o Severity Factors: Value of the asset and ease of exploitation.
• Threat:
o Definition: The potential for someone or something to exploit a vulnerability and
breach security.
o Types: Intentional (malicious) or unintentional.
o Components:
▪ Threat Actor/Agent: The person or thing posing the threat.
▪ Threat Vector: The path or tool used by the threat actor.
• Risk:
o Definition: The level of hazard posed by vulnerabilities and threats.
o Calculation: Likelihood of exploitation by a threat actor and the impact of a
successful exploit.
Key Points:
• Vulnerability:
o Weakness: Can be triggered accidentally or exploited intentionally.
o Examples: Misconfigured hardware/software, delayed patches, poor network
design, insecure passwords.
o Severity: Determined by asset value and ease of exploitation.
• Threat:
o Potential Exploitation: Can be intentional or unintentional.
o Threat Actor/Agent: The entity posing the threat.
o Threat Vector: The method used to exploit the vulnerability.
• Risk:
o Hazard Level: Based on vulnerabilities and threats.
o Calculation: Likelihood and impact of exploitation.
26
• Internal/External:
o Definition: Refers to the degree of access a threat actor has before initiating an
attack.
o External Threat Actor: No authorized access; must infiltrate the system (e.g.,
hacking, physical break-in). Can attack remotely or on-premises.
o Internal/Insider Threat Actor: Has authorized access (e.g., employees,
contractors, business partners).
• Level of Sophistication/Capability:
o Definition: The ability of a threat actor to use advanced exploit techniques and
tools.
o Low Sophistication: Uses widely available commodity attack tools.
o High Sophistication: Creates new exploits in systems and may use non-cyber tools
(e.g., political, military assets).
• Resources/Funding:
o Definition: The support needed for a threat actor's capabilities.
o Requirements: Customized attack tools, skilled personnel (strategists, designers,
coders, hackers, social engineers).
o Funding Sources: Nation-states, organized crime.
Key Points:
• Internal/External:
o External Threat Actor: No authorized access; infiltrates security.
o Internal Threat Actor: Has authorized access; includes employees, contractors,
partners.
• Level of Sophistication/Capability:
o Low Sophistication: Uses common attack tools.
o High Sophistication: Develops new exploits; may use non-cyber tools.
• Resources/Funding:
o Support Needed: Customized tools, skilled personnel.
o Funding Sources: Nation-states, organized crime.
27
Detailed Explanation:
• Motivation:
o Definition: The reason behind a threat actor's attack.
o Types: Greed, curiosity, grievance, etc.
o Characterization: Structured/targeted (e.g., criminal gang stealing data) or
unstructured/opportunistic (e.g., unskilled hacker spreading a worm).
• General Strategies:
o Service Disruption:
▪ Definition: Prevents normal operations of an organization.
▪ Methods: Attacks on websites, malware blocking access.
▪ Uses: Chaos, revenge, blackmail, or strategic objectives.
o Data Exfiltration:
▪ Definition: Unauthorized transfer of valuable information.
▪ Motivations: Personal use, blackmail, selling to third parties.
o Disinformation:
▪ Definition: Falsifying trusted resources.
▪ Methods: Website content changes, fake sites, social media bots.
o CIA Triad Impact:
▪ Confidentiality: Compromised by data exfiltration.
▪ Integrity: Attacked by disinformation.
▪ Availability: Targeted by service disruption.
• Chaotic Motivations:
o Early Internet: Attacks for chaos and credit.
o Modern Use: Political ends, war aims, revenge (e.g., disgruntled employees).
• Financial Motivations:
o Sophistication: Increased opportunities for financial gain.
o Methods:
▪ Blackmail: Payment to prevent information release.
▪ Extortion: Payment to stop an attack.
▪ Fraud: Falsifying records, affecting share prices, promoting schemes.
• Political Motivations:
28
o Definition: Attacks to bring societal or governance changes.
o Examples:
▪ Whistleblowing: Ethical concerns.
▪ Campaign Groups: Disrupting contradictory organizations.
▪ Nation-States: Espionage, disinformation, service disruption for war aims.
o Commercial Espionage: Companies stealing competitor secrets.
Key Points:
• Motivation:
o Reasons: Greed, curiosity, grievance.
o Types: Structured/targeted, unstructured/opportunistic.
• General Strategies:
o Service Disruption: Prevents normal operations.
o Data Exfiltration: Unauthorized information transfer.
o Disinformation: Falsifies trusted resources.
o CIA Triad: Confidentiality, integrity, availability impacts.
• Chaotic Motivations:
o Early Internet: Chaos and credit.
o Modern Use: Political ends, revenge.
• Financial Motivations:
o Methods: Blackmail, extortion, fraud.
• Political Motivations:
o Examples: Whistleblowing, campaign groups, nation-states.
o Commercial Espionage: Competitor secrets theft.
29
▪ Unauthorized (Black Hat): Engage in illegal or malicious activities.
▪ Authorized (White Hat): Perform penetration testing with permission.
o Historical Context: Originally a neutral term for skilled programmers and system
administrators.
• Unskilled Attackers:
o Definition: Use hacker tools without deep understanding or ability to create new
attacks.
o Motivations: Gain attention or prove technical abilities without specific targets.
• Hacker Teams and Hacktivists:
o Hacker Teams:
▪ Collaboration: Work in groups to develop sophisticated tools and strategies.
▪ Resources: More resources and funding compared to lone hackers.
o Hacktivists:
▪ Definition: Use cyber weapons to promote political agendas.
▪ Methods: Data exfiltration, service disruption, website defacement.
▪ Targets: Political, media, financial groups, and companies; also
environmental and animal advocacy groups.
Key Points:
• Hackers:
o Unauthorized Access: Skills to gain access without approval.
o Types: Black Hat (malicious), White Hat (authorized testing).
• Unskilled Attackers:
o Tools Usage: Use available tools without deep knowledge.
o Goals: Attention, technical proof.
• Hacker Teams and Hacktivists:
o Hacker Teams: Collaborative, resourceful, sophisticated.
o Hacktivists: Politically motivated, use cyber attacks for agendas.
o Targets: Political, media, financial, environmental, and animal advocacy groups.
Nation-State Actors
Summary: Nation-state actors use cyber weapons to achieve military, commercial, and strategic
goals. They engage in advanced persistent threats (APTs) to maintain ongoing access to networks,
often targeting critical infrastructure and employing disinformation and espionage tactics.
30
Detailed Explanation:
• Advanced Persistent Threat (APT):
o Definition: The ability of an adversary to achieve and maintain ongoing network
access using various tools and techniques.
o Origin: Term coined to describe modern cyber adversaries' behavior, highlighted by
Mandiant's APT1 report on Chinese cyber espionage.
• Nation-State Actors:
o Goals: Disinformation, espionage for strategic advantage, and financial gain.
o Targets: Energy, health, and electoral systems.
o Methods:
▪ Plausible Deniability: Operate at arm's length from the government, posing
as independent groups or hacktivists.
▪ False Flag Campaigns: Disinformation campaigns to implicate other states.
Key Points:
• Advanced Persistent Threat (APT):
o Ongoing Access: Maintain network compromise.
o Tools and Techniques: Variety of methods to achieve access.
• Nation-State Actors:
o Goals: Strategic advantage, financial gain.
o Targets: Critical infrastructure (energy, health, electoral systems).
o Methods: Plausible deniability, false flag campaigns.
31
o Espionage: Typically associated with state actors, but rogue businesses may also
engage in cyber espionage.
o Goals: Theft of information, business disruption, reputation damage.
o Facilitation: Employees with insider knowledge who switch companies.
Key Points:
• Organized Crime:
o Prevalence: Cybercrime surpasses physical crime in many regions.
o Jurisdictional Challenges: Cross-border operations complicate legal actions.
o Common Activities: Financial fraud, blackmail, extortion.
• Competitors:
o Cyber Espionage: Rogue businesses may engage in espionage.
o Objectives: Information theft, disruption, reputation harm.
o Insider Knowledge: Facilitated by employees changing companies.
32
o Definition: Individuals with ethical motivations for releasing confidential
information.
o Protection: Cannot be threatened or labeled punitively for protected disclosures.
• Unintentional Threats:
o Causes: Lack of awareness, carelessness (e.g., poor password management).
o Shadow IT: Unauthorized hardware/software introduced by users, creating
unmonitored attack surfaces.
Key Points:
• Internal Threats:
o Access: Granted by the organization.
o Types: Employees, contractors, guests, former insiders.
• Motivations:
o Revenge: Grievances.
o Financial Gain: Opportunistic or targeted.
o Examples: Structured (planned) vs. opportunistic (unplanned) attacks.
• Whistleblowers:
o Ethical Motivation: Releasing information for ethical reasons.
o Protection: Against retaliatory actions.
• Unintentional Threats:
o Causes: Awareness, carelessness.
o Shadow IT: Unauthorized IT resources.
33
o Assessment: Evaluate for vulnerabilities and monitor for intrusions.
o Scope: Can be assessed for an entire organization or specific components (e.g.,
servers, web applications, employee accounts).
• Threat Vectors:
o Definition: Paths used by threat actors to execute attacks (data exfiltration, service
disruption, disinformation).
o Sophistication: Use multiple vectors and plan multistage campaigns.
o Novel Vectors: Highly capable actors develop new vectors, potentially knowing the
attack surface better than the organization.
• Terminology:
o Threat Vector vs. Attack Vector: Often used interchangeably; some sources
distinguish threat vector (potential attack surface analysis) from attack vector
(executed exploit analysis).
Key Points:
• Attack Surface:
o Definition: Points of potential vulnerability exploitation.
o Minimization: Restrict access, assess vulnerabilities, monitor intrusions.
o Scope: Organization-wide or specific components.
• Threat Vectors:
o Definition: Paths for executing attacks.
o Sophistication: Multiple vectors, multistage campaigns.
o Novel Vectors: Developed by highly capable actors.
• Terminology:
o Threat Vector: Potential attack surface analysis.
o Attack Vector: Executed exploit analysis.
34
o Prevalence: Almost all software has vulnerabilities due to complexity and rapid
release cycles.
o Patch Management: Essential for mitigating vulnerabilities; ineffective systems
increase risk.
• Impact and Consequences:
o Varied Impact: Different vulnerabilities have different consequences.
o Examples:
▪ Adobe PDF Reader: Could allow network foothold via a workstation.
▪ Server Software: Could compromise cryptographic keys for secure web
services.
• Unsupported Systems and Applications:
o Definition: Systems no longer receiving updates or patches from vendors.
o Vulnerability: Highly exposed to exploits without vendor support.
o Mitigation: Isolate unsupported apps to reduce exploit opportunities
(compensating control).
• Client-Based vs. Agentless Scanning:
o Client-Based: Scanning process installed on each host, reporting to a management
server.
o Agentless: Scans hosts without installation; often used in threat actor
reconnaissance.
Key Points:
• Vulnerable Software:
o Definition: Flaws in code/design.
o Exploitation: Specific circumstances; patched by vendors.
o Patch Management: Crucial for mitigation.
• Impact and Consequences:
o Varied Impact: Different vulnerabilities, different consequences.
o Examples: Adobe PDF Reader (network foothold), server software (cryptographic
keys).
• Unsupported Systems and Applications:
o Definition: No longer updated/patched.
o Vulnerability: Highly exposed.
o Mitigation: Isolation as compensating control.
• Client-Based vs. Agentless Scanning:
35
o Client-Based: Installed scanning process.
o Agentless: No installation; used in reconnaissance.
Network Vectors
Summary: Network vectors are paths through which threat actors exploit vulnerabilities in
software over a network. These can be remote or local exploits, and minimizing risks involves
securing networks to ensure confidentiality, integrity, and availability.
Detailed Explanation:
• Exploit Techniques:
o Remote Exploit:
▪ Definition: Exploits vulnerabilities by sending code over a network without
needing an authenticated session.
o Local Exploit:
▪ Definition: Requires execution from an authenticated session, possibly
using valid credentials or hijacking an existing session.
• Unsecure Networks:
o Definition: Networks lacking confidentiality, integrity, and availability.
o Attributes:
▪ Lack of Confidentiality: Eavesdropping attacks to recover sensitive
information.
▪ Lack of Integrity: Unauthorized devices intercepting or modifying traffic
(on-path attacks).
▪ Lack of Availability: Service disruption attacks (DoS attacks).
• Securing Networks:
o Methods: Use access control frameworks and cryptographic solutions to identify,
authenticate, authorize, and audit users, hosts, and traffic.
• Specific Threat Vectors:
o Direct Access:
▪ Definition: Physical access to perpetrate attacks (e.g., accessing unlocked
workstations, stealing devices).
o Wired Network:
▪ Definition: Unauthorized devices attached to physical network ports.
o Remote and Wireless Network:
36
▪ Definition: Obtaining credentials or cracking security protocols for
remote/wireless access.
o Cloud Access:
▪ Definition: Exploiting weak credentials in cloud services.
o Bluetooth Network:
▪ Definition: Exploiting vulnerabilities in Bluetooth protocols.
o Default Credentials:
▪ Definition: Using default passwords to gain control of devices/apps.
o Open Service Port:
▪ Definition: Unauthenticated connections to network ports running
vulnerable software.
Key Points:
• Exploit Techniques:
o Remote: No authenticated session needed.
o Local: Requires authenticated session.
• Unsecure Networks:
o Confidentiality: Eavesdropping.
o Integrity: On-path attacks.
o Availability: DoS attacks.
• Securing Networks:
o Methods: Access control, cryptographic solutions.
• Specific Threat Vectors:
o Direct Access: Physical site access.
o Wired Network: Unauthorized device attachment.
o Remote/Wireless Network: Credential theft or protocol cracking.
o Cloud Access: Weak credentials exploitation.
o Bluetooth Network: Vulnerability exploitation.
o Default Credentials: Using default passwords.
o Open Service Port: Unauthenticated connections.
37
Lure-Based Vectors
Summary: Lure-based vectors use attractive or interesting items to trick users into facilitating an
attack. These lures deliver malicious payloads that can give threat actors control over systems or
disrupt services.
Detailed Explanation:
• Lure-Based Attacks:
o Definition: Use attractive items to trick users into opening files that deliver
malicious payloads.
o Purpose: Gain control over systems or disrupt services.
• Common Lure Media:
o Removable Device:
▪ Definition: Malware concealed on USB drives or memory cards.
▪ Method: Trick employees into connecting the device to a PC, laptop, or
smartphone.
▪ Drop Attack: Infected USB sticks left in accessible areas for employees to
find and use.
o Executable File:
▪ Definition: Exploit code hidden in program files.
▪ Example: Trojan Horse malware that appears useful but creates backdoor
access.
o Document Files:
▪ Definition: Malicious code embedded in word processing or PDF files.
▪ Method: Exploit scripting features or vulnerabilities in document
viewers/editors.
o Image Files:
▪ Definition: Exploit code within image files targeting browser or document
editing software vulnerabilities.
• Attack Surface:
o Definition: Points where threat actors can exploit vulnerabilities.
o Reduction: Effective endpoint security management, including vulnerability
management, antivirus, program execution control, and intrusion detection.
Key Points:
• Lure-Based Attacks:
o Definition: Attractive items trick users into facilitating attacks.
38
o Purpose: Control systems, disrupt services.
• Common Lure Media:
o Removable Device: Malware on USB drives/memory cards.
o Executable File: Exploit code in program files (e.g., Trojans).
o Document Files: Malicious code in word/PDF files.
o Image Files: Exploit code in image files.
• Attack Surface:
o Definition: Points of vulnerability exploitation.
o Reduction: Endpoint security management.
Message-Based Vectors
Summary: Message-based vectors involve delivering malicious files or links through various
messaging platforms to trick users into opening them. These vectors can exploit vulnerabilities in
email, SMS, instant messaging, web, and social media platforms.
Detailed Explanation:
• Email:
o Method: Sending malicious file attachments via email.
o Technique: Social engineering to persuade users to open attachments.
• Short Message Service (SMS):
o Method: Sending files or links via text messaging.
o Protocol: Uses Signaling System 7 (SS7), which has numerous vulnerabilities.
o Monitoring: Organizations typically lack monitoring capabilities for SMS.
• Instant Messaging (IM):
o Method: Sending files or links via IM apps on Windows, Android, or iOS.
o Security: Generally more secure than SMS due to encryption, but still vulnerable.
• Web and Social Media:
o Method: Concealing malware in files attached to posts or as downloads.
o Drive-By Download: Automatic infection of vulnerable browser software.
o Disinformation Campaigns: Persuading users to install malicious apps.
• Zero-Click Exploits:
o Definition: Exploits that trigger simply by receiving an attachment or viewing an
image, without user interaction.
39
• Social Engineering:
o Method: Persuading users to reveal passwords or weaken security configurations,
possibly through voice calls.
Key Points:
• Email:
o Method: Malicious attachments.
o Technique: Social engineering.
• SMS:
o Method: Files/links via text messaging.
o Protocol: SS7 vulnerabilities.
o Monitoring: Limited organizational capability.
• Instant Messaging:
o Method: Files/links via IM apps.
o Security: Encryption, but still vulnerable.
• Web and Social Media:
o Method: Malware in posts/downloads.
o Drive-By Download: Automatic infection.
o Disinformation: Malicious app installation.
• Zero-Click Exploits:
o Definition: No user interaction needed.
• Social Engineering:
o Method: Revealing passwords, weakening security.
40
• Procurement Management:
o Definition: Ensuring reliable sources of equipment and software.
o Relationships:
▪ Supplier: Sells products in bulk to businesses (B2B).
▪ Vendor: Sells products to retail businesses (B2B) or directly to customers
(B2C), may add customization and support.
▪ Business Partner: Close relationship with aligned goals and marketing
opportunities.
• Supply Chain Complexity:
o Example: A motherboard's supply chain includes chip manufacturers, firmware
developers, OEM resellers, couriers, and administrative staff.
o Trustworthiness: Each link in the supply chain must be trustworthy to prevent
backdoor access.
• Securing the Supply Chain:
o Trusted Supply Chain: Denying malicious actors the time or resources to modify
assets.
o Reputable Vendors: Best practical effort for most businesses.
o Scrutiny: Greater scrutiny by government, military/security services, and large
enterprises.
o Secondhand Machines: Particular care needed.
• Managed Service Providers (MSPs):
o Definition: Provision and support of IT resources (networks, security, web
infrastructure).
o Outsourcing: Useful for cost-effective and reliable IT provision.
o Security Complexity: Difficult to monitor MSPs; employees are potential insider
threats.
Key Points:
• Supply Chain:
o Definition: End-to-end process.
o Infiltration: Via supply chain companies.
• Procurement Management:
o Relationships: Supplier, vendor, business partner.
• Supply Chain Complexity:
o Example: Motherboard supply chain.
41
o Trustworthiness: Preventing backdoor access.
• Securing the Supply Chain:
o Trusted Supply Chain: Denying modification opportunities.
o Reputable Vendors: Practical effort.
o Scrutiny: Government and large enterprises.
o Secondhand Machines: Care needed.
• Managed Service Providers (MSPs):
o Definition: IT resource provision.
o Outsourcing: Cost-effective, reliable.
o Security Complexity: Monitoring challenges, insider threats.
Human Vectors
Summary: Human vectors involve exploiting the people operating computers and accounts within
an organization. Social engineering techniques are used to elicit information or persuade
individuals to perform actions that benefit the threat actor.
Detailed Explanation:
• Human Vectors:
o Definition: Part of the attack surface involving employees and contractors.
o Knowledge: Stored in the minds of people, not just on computer disks.
• Social Engineering:
o Definition: Techniques to elicit information or get someone to perform an action.
o Purpose: Gather intelligence for reconnaissance or effect an intrusion.
o Also Known As: "Hacking the human."
• Social Engineering Scenarios:
o Executable File:
▪ Method: Creates a file prompting for a password, records input.
▪ Example: Emails the file with a story about login problems, gains network
credentials.
o Help Desk Call:
▪ Method: Pretends to be a remote sales representative needing assistance.
42
▪ Example: Obtains remote access server details, login credentials, and phone
numbers.
o Fire Alarm:
▪ Method: Triggers an alarm, slips into the building during confusion.
▪ Example: Attaches a monitoring device to a network port.
Key Points:
• Human Vectors:
o Definition: Exploiting people within an organization.
o Knowledge: Exists in employees' and contractors' minds.
• Social Engineering:
o Definition: Eliciting information or persuading actions.
o Purpose: Intelligence gathering, intrusion.
o Also Known As: "Hacking the human."
• Social Engineering Scenarios:
o Executable File: Prompts for password, records input.
o Help Desk Call: Pretends to be a remote worker, gains access details.
o Fire Alarm: Creates confusion, attaches monitoring device.
43
o Definition: Using a carefully crafted story to support the impersonation.
o Purpose: Make the impersonation more convincing by using details that charm or
intimidate the target.
o Example: Impersonating IT support to get a user to reveal their password.
• Reconnaissance:
o Purpose: Gather intelligence to make impersonation more effective.
o Methods: Obtain seemingly innocuous information (e.g., employee lists, job titles,
phone numbers) to support the pretext.
Key Points:
• Impersonation:
o Definition: Pretending to be someone else.
o Approaches: Persuasive (natural request), coercive (intimidation).
• Pretexting:
o Definition: Fabricated story to support impersonation.
o Purpose: Convincing details to charm or intimidate.
• Reconnaissance:
o Purpose: Gather intelligence for effective impersonation.
o Methods: Obtain organizational details (e.g., employee lists, phone numbers).
44
o Credential Capture: Users authenticate with spoofed sites, revealing login
credentials.
• Types of Phishing:
o Vishing:
▪ Definition: Phishing via voice channels (telephone, VoIP).
▪ Example: Impersonating a bank to verify credit card transactions.
▪ Future Trends: Deep fake technology increasing voice and video phishing.
o SMiShing:
▪ Definition: Phishing via SMS text communications.
• Pharming:
o Definition: Redirects users from legitimate websites to malicious ones.
o Method: Corrupts Internet name resolution to redirect traffic.
o Example: Redirecting mybank.foo from IP address 2.2.2.2 to 6.6.6.6.
Key Points:
• Phishing:
o Definition: Social engineering and spoofing.
o Method: Email vector.
o Actions: Install malware, allow remote access.
• Phishing Campaigns:
o Spoof Websites: Imitate trusted sites.
o Email Tactics: Account updates, hoax alerts.
o Credential Capture: Spoofed site authentication.
• Types of Phishing:
o Vishing: Voice channel phishing.
o SMiShing: SMS text phishing.
• Pharming:
o Definition: Redirects to malicious sites.
o Method: Corrupts name resolution.
o Example: IP address redirection.
45
Typosquatting
Summary: Typosquatting involves registering domain names similar to legitimate ones to trick
users into thinking they are interacting with trusted sites. This technique is often used in phishing
and pharming attacks to exploit user trust.
Detailed Explanation:
• Impersonation in Phishing and Pharming:
o Dependence: Success relies on convincing the target that the message or site is
from a trusted source.
o Email Client Inconsistencies: Threat actors exploit how email clients display the
"From" field, sometimes showing arbitrary values instead of actual email addresses.
• Typosquatting:
o Definition: Registering domain names that are very similar to real ones (e.g.,
exannple.com).
o Purpose: Trick users into thinking they are on a trusted site or receiving email from
a known source.
o Other Names: Cousin, lookalike, or doppelganger domains.
• Hijacked Subdomains:
o Technique: Registering subdomains using the primary domain of a trusted cloud
provider (e.g., onmicrosoft.com).
o Example: A phishing message from example.onmicrosoft.com may appear
trustworthy to users.
Key Points:
• Impersonation in Phishing and Pharming:
o Dependence: Convincing targets of trustworthiness.
o Email Client Inconsistencies: Exploiting "From" field display.
• Typosquatting:
o Definition: Similar domain names to legitimate ones.
o Purpose: Trick users into trusting the site or email.
o Other Names: Cousin, lookalike, doppelganger domains.
• Hijacked Subdomains:
o Technique: Using trusted cloud provider domains.
o Example: Phishing from example.onmicrosoft.com.
46
Business Email Compromise
Summary: Business email compromise (BEC) involves sophisticated campaigns targeting specific
individuals within a company, often executives or senior managers. The goal is typically to trick the
target into authorizing fraudulent payments or wire transfers.
Detailed Explanation:
• Business Email Compromise (BEC):
o Definition: Sophisticated campaign targeting specific individuals within a company.
o Targets: Executives or senior managers.
o Method: Threat actor poses as a colleague, business partner, or vendor.
o Reconnaissance: Detailed understanding of the target and psychological approach.
o Execution: May involve gaining control of a legitimate mail account.
• Financial Motivation:
o Objective: Persuade a budget holder to authorize fraudulent payments or wire
transfers.
o Terminology:
▪ Spear Phishing: Targeting specific individuals.
▪ Whaling: Targeting influential employees.
▪ CEO Fraud: Impersonating the CEO.
▪ Angler Phishing: Using social media as the vector.
• Brand Impersonation and Disinformation:
o Brand Impersonation:
▪ Definition: Duplicating a company's logos and formatting to create
convincing phishing messages or websites.
▪ Methods: Mimicking email style, tone, and realistic content to boost search
rankings.
o Disinformation/Misinformation:
▪ Disinformation: Purposeful deception.
▪ Misinformation: Repeating false claims without intent to deceive.
▪ Campaigns: Create fake social media posts or referrers to amplify false facts.
• Watering Hole Attack:
o Definition: Compromising an unsecure third-party website used by a group of
targets.
o Example: Compromising a local pizza delivery firm's website to infect employees of
an e-commerce company.
47
Key Points:
• Business Email Compromise (BEC):
o Definition: Sophisticated, targeted campaigns.
o Targets: Executives, senior managers.
o Method: Posing as trusted contacts.
• Financial Motivation:
o Objective: Fraudulent payments, wire transfers.
o Terminology: Spear phishing, whaling, CEO fraud, angler phishing.
• Brand Impersonation and Disinformation:
o Brand Impersonation: Duplicating logos, formatting.
o Disinformation/Misinformation: Purposeful deception, repeating false claims.
• Watering Hole Attack:
o Definition: Compromising third-party websites.
o Example: Infecting employees via compromised local services.
Cryptographic Concepts
Summary: Cryptography, meaning "secret writing," is the practice of securing information by
encoding it. Unlike security through obscurity, cryptography ensures that even if the existence and
location of the secret are known, it cannot be understood without the means to decode it. Key terms
include plaintext, ciphertext, algorithm, and cryptanalysis. Main actors in cryptographic discussions
are Alice (sender), Bob (recipient), and Mallory (attacker). Cryptographic algorithms include
hashing, symmetric, and asymmetric encryption, each ensuring confidentiality, integrity, and non-
repudiation.
Detailed Explanation:
• Cryptography:
o Definition: The art of making information secure by encoding it.
o Contrast: Opposite of security through obscurity, which relies on hiding
information.
o Importance: Ensures that even if the secret's existence and location are known, it
remains undecipherable without the decoding means.
48
• Terminology:
o Plaintext (or cleartext): An unencrypted message.
o Ciphertext: An encrypted message.
o Algorithm: The process used to encrypt and decrypt a message.
o Cryptanalysis: The art of cracking cryptographic systems.
• Actors in Cryptography:
o Alice: The sender of a genuine message.
o Bob: The intended recipient of the message.
o Mallory: A malicious attacker attempting to subvert the message.
• Types of Cryptographic Algorithms:
o Hashing Algorithms: Ensure data integrity by producing a fixed-size hash value
from input data.
o Symmetric Encryption: Uses the same key for both encryption and decryption.
o Asymmetric Encryption: Uses a pair of keys (public and private) for encryption
and decryption.
Key Points:
• Cryptography:
o Secure Encoding: Protects information by encoding it.
o Opposite of Obscurity: Does not rely on hiding information.
• Terminology:
o Plaintext: Unencrypted message.
o Ciphertext: Encrypted message.
o Algorithm: Encryption/decryption process.
o Cryptanalysis: Cracking cryptographic systems.
• Actors:
o Alice: Sender.
o Bob: Recipient.
o Mallory: Attacker.
• Cryptographic Algorithms:
o Hashing: Ensures data integrity.
o Symmetric Encryption: Same key for encryption/decryption.
o Asymmetric Encryption: Public and private keys.
49
Symmetric Encryption
Summary: Symmetric encryption uses a single secret key for both encryption and decryption,
ensuring that only authorized persons can access the data. It involves substitution and transposition
algorithms to encode data securely. Symmetric encryption is fast and suitable for encrypting large
amounts of data, but it requires a secure method for key exchange.
Detailed Explanation:
• Symmetric Encryption:
o Definition: A cryptographic process that encodes data so it can be securely stored
or transmitted and decrypted only by the intended recipient using the same secret
key.
o Key Usage: Ensures decryption can only be performed by an authorized person.
• Substitution and Transposition Algorithms:
o Substitution Cipher:
▪ Definition: Replaces characters or blocks in the plaintext with different
ciphertext.
▪ Example: ROT13 rotates each letter 13 places (e.g., "Uryyb Jbeyq" decrypts
to "Hello World").
o Transposition Cipher:
▪ Definition: Keeps the same units in plaintext and ciphertext but changes
their order.
▪ Example: "HLOOLELWRD" is produced by writing letters in columns and
concatenating rows.
• Modern Encryption Algorithms:
o Techniques: Use complex substitution and transposition methods to defeat
cryptanalysis attempts.
• Symmetric Algorithms:
o Process:
1. Alice and Bob agree on a cipher and secret key value.
2. Alice encrypts a file using the cipher and key.
3. Alice sends the ciphertext to Bob.
4. Bob decrypts the ciphertext using the same cipher and key.
o Speed: Very fast, suitable for bulk encryption.
o Key Exchange: The main challenge is securely exchanging the key. If intercepted,
security is compromised.
50
o Limitations: Cannot be used for authentication or integrity, as both parties can
create the same secrets.
Key Points:
• Symmetric Encryption:
o Single Key: Used for both encryption and decryption.
o Authorized Access: Only authorized persons can decrypt.
• Substitution Cipher:
o Replacement: Characters/blocks replaced with different ciphertext.
o Example: ROT13 (e.g., "Uryyb Jbeyq" = "Hello World").
• Transposition Cipher:
o Order Change: Units remain the same but order is changed.
o Example: "HLOOLELWRD" from column writing.
• Modern Algorithms:
o Complex Techniques: Combine substitution and transposition.
• Symmetric Algorithms:
o Process: Agreement on cipher/key, encryption, transmission, decryption.
o Speed: Fast, suitable for large data.
o Key Exchange: Secure method needed.
o Limitations: Not for authentication/integrity.
Key Length
Summary: Encryption algorithms use keys to enhance security. The key determines how data is
encrypted and decrypted. A keyspace is the range of possible key values. Modern ciphers use large
keyspaces to resist brute force attacks. Key length, measured in bits, indicates the size of the
keyspace. Larger keys provide stronger security but require more computational resources.
Detailed Explanation:
• Key Importance:
o Definition: A key is a value used in an encryption algorithm to encode and decode
data.
o Example: In ROT13, the key is 13. Changing the key (e.g., to 17) produces different
ciphertext.
• Keyspace:
o Definition: The range of possible values for a key.
51
o Example: ROT13 has a keyspace of 25 (ROT1 to ROT25). ROT0 and ROT26+ are
weak keys.
• Modern Ciphers:
o Large Keyspaces: Modern ciphers use trillions of possible key values, making brute
force attacks difficult.
o Brute Force Cryptanalysis: Attempting to decrypt ciphertext by trying every
possible key value.
• Key Length:
o Definition: The number of bits in a key, determining the size of the keyspace.
o Example: AES-128 uses a 128-bit key, with a keyspace of (2^{128}). AES-256 uses a
256-bit key, with a keyspace of (2^{256}).
• Security vs. Performance:
o Larger Keys: Provide stronger security but require more memory and processing
power.
o Trade-off: Balancing security needs with computational resources.
Key Points:
• Key Importance:
o Encryption/Decryption: Key determines how data is encoded and decoded.
o Example: ROT13 key is 13; changing key alters ciphertext.
• Keyspace:
o Range of Values: Possible key values.
o Example: ROT13 keyspace is 25; ROT0 and ROT26+ are weak.
• Modern Ciphers:
o Large Keyspaces: Trillions of possible values.
o Brute Force: Difficult due to large keyspace.
• Key Length:
o Bit Number: Indicates keyspace size.
o Example: AES-128 (128-bit key), AES-256 (256-bit key).
• Security vs. Performance:
o Larger Keys: Stronger security, more computational resources.
o Trade-off: Security needs vs. performance.
52
Asymmetric Encryption
Summary: Asymmetric encryption uses a pair of related keys (public and private) for encryption
and decryption. The public key encrypts the message, and only the corresponding private key can
decrypt it. This method ensures secure communication even if the public key is widely distributed.
Asymmetric encryption is computationally intensive, so it is often used to encrypt symmetric keys
for bulk data encryption.
Detailed Explanation:
• Asymmetric Encryption:
o Definition: Uses two different but related keys (public and private) for encryption
and decryption.
o Key Pair: Public key encrypts the message; private key decrypts it.
o Security: Public key cannot be used to decrypt the ciphertext, ensuring secure
communication.
• Process:
o Key Generation: Bob generates a key pair and keeps the private key secret.
o Public Key Distribution: Bob publishes the public key.
o Message Encryption: Alice uses Bob's public key to encrypt a message.
o Message Transmission: Alice sends the ciphertext to Bob.
o Message Decryption: Bob decrypts the message using his private key.
o Security Assurance: Even if Mallory intercepts the public key and ciphertext, they
cannot decrypt the message.
• Efficiency:
o Computational Overhead: Asymmetric encryption is more computationally
intensive than symmetric encryption.
o Hybrid Approach: Often used to encrypt a symmetric key, which is then used for
bulk data encryption.
• Algorithms:
o RSA (Rivest, Shamir, Adelman): Requires a 2,048-bit private key for acceptable
security.
o ECC (Elliptic Curve Cryptography): Uses 256-bit private keys for security
equivalent to a 3,072-bit RSA key.
Key Points:
• Asymmetric Encryption:
o Two Keys: Public key for encryption, private key for decryption.
o Secure Communication: Public key distribution does not compromise security.
53
• Process:
o Key Pair Generation: Bob generates and keeps private key secret.
o Public Key Use: Alice encrypts message with Bob's public key.
o Decryption: Bob uses private key to decrypt message.
o Security: Interception of public key and ciphertext does not compromise message.
• Efficiency:
o Computationally Intensive: More overhead than symmetric encryption.
o Hybrid Use: Encrypts symmetric keys for bulk data encryption.
• Algorithms:
o RSA: 2,048-bit private key.
o ECC: 256-bit private key for high security.
Hashing
Summary: A cryptographic hashing algorithm generates a fixed-length string of bits (hash or
message digest) from input plaintext of any length. Hashing ensures data integrity by making it
impossible to recover the original data from the hash and minimizing the likelihood of different
inputs producing the same output (collision). Popular hash algorithms include SHA (Secure Hash
Algorithm) and MD5 (Message Digest Algorithm #5).
Detailed Explanation:
• Hashing Algorithm:
o Definition: Produces a fixed-length string of bits from input plaintext.
o Properties: One-way function (impossible to recover plaintext) and collision-
resistant (unlikely for different inputs to produce the same output).
• Integrity Verification:
o Password Comparison:
▪ Bob has a digest of Alice's plaintext password.
▪ Alice hashes her password and sends the digest to Bob.
▪ Bob compares the received digest with the stored hash to verify the
password.
o File Integrity:
▪ Alice hashes a file (e.g., setup.exe) and publishes the digest.
▪ Bob downloads the file and the digest.
▪ Bob hashes the downloaded file and compares it with the published digest to
ensure integrity.
54
▪ If Mallory substitutes the file, the hash comparison will fail, indicating
tampering.
• Popular Hash Algorithms:
o Secure Hash Algorithm (SHA):
▪ Considered the strongest algorithm.
▪ Variants produce different-sized outputs (e.g., SHA256 produces a 256-bit
digest).
o Message Digest Algorithm #5 (MD5):
▪ Produces a 128-bit digest.
▪ Less secure than SHA256 but may be required for compatibility.
Key Points:
• Hashing Algorithm:
o Fixed-Length Output: From any length of input.
o One-Way Function: Impossible to recover plaintext.
o Collision-Resistant: Different inputs unlikely to produce the same output.
• Integrity Verification:
o Password Comparison: Hashes compared to verify passwords.
o File Integrity: Hashes compared to verify file integrity.
• Popular Hash Algorithms:
o SHA: Strong, with variants like SHA256 (256-bit digest).
o MD5: 128-bit digest, less secure but sometimes necessary for compatibility.
Digital Signatures
Summary: Digital signatures combine hashing and asymmetric encryption to ensure data integrity
and authenticate the sender. A digital signature is created by hashing a message and then
encrypting the hash with the sender's private key. The recipient can verify the signature using the
sender's public key and comparing the hash values. Standards for digital signatures include PKCS#1
(RSA), DSA, and ECDSA.
Detailed Explanation:
• Cryptographic Primitives:
o Definition: Basic cryptographic functions like hash functions, symmetric ciphers,
and asymmetric ciphers.
o Usage: Combined in a cipher suite for different security purposes.
• Encryption Uses:
55
o Confidentiality: Ensures only authorized parties can read the message.
o Integrity and Authentication: Ensures the message is unchanged and verifies the
sender's identity.
• Digital Signature Process:
o Hashing: The sender (Alice) creates a digest of the message using a hash algorithm
(e.g., SHA256).
o Signing: Alice encrypts the digest with her private key, creating the digital signature.
o Transmission: Alice sends the message and the digital signature to the recipient
(Bob).
o Verification: Bob uses Alice's public key to decrypt the signature and obtain the
original hash.
o Comparison: Bob hashes the received message and compares it with the decrypted
hash. If they match, the message is verified and Alice's identity is confirmed.
• Security Assurance:
o Integrity: Ensures the message has not been tampered with.
o Authentication: Confirms the sender's identity.
o Tampering Detection: If the message or signature is altered, the hashes will not
match.
• Standards:
o PKCS#1: Defines the use of RSA for digital signatures.
o DSA (Digital Signature Algorithm): Uses ElGamal cipher.
o ECDSA (Elliptic Curve DSA): More widely used, part of US government's FIPS.
Key Points:
• Cryptographic Primitives:
o Basic Functions: Hash functions, symmetric and asymmetric ciphers.
o Cipher Suite: Combines primitives for security.
• Encryption Uses:
o Confidentiality: Protects message content.
o Integrity and Authentication: Verifies message and sender.
• Digital Signature Process:
o Hashing: Creates message digest.
o Signing: Encrypts digest with private key.
o Transmission: Sends message and signature.
56
o Verification: Decrypts signature with public key.
o Comparison: Matches hashes to verify integrity and identity.
• Security Assurance:
o Integrity: Message unchanged.
o Authentication: Sender verified.
o Tampering Detection: Detects alterations.
• Standards:
o PKCS#1: RSA.
o DSA: ElGamal.
o ECDSA: Elliptic Curve, FIPS standard.
Certificate Authorities
Summary: Public key infrastructure (PKI) ensures that the owners of public keys are who they
claim to be by using digital certificates validated by certificate authorities (CAs). CAs can be private
(within an organization) or third-party (for public or business-to-business communications). Third-
party CAs, such as Comodo, DigiCert, and Let's Encrypt, provide certificate services, validate
identities, establish trust, manage certificate repositories, and handle key and certificate lifecycle
management.
Detailed Explanation:
• Public Key Cryptography:
o Confidential Messages: Use public key to encrypt; only private key can decrypt.
o Authentication: Sign message hash with private key; verify with public key.
• Problem with Public Key Cryptography:
o Identity Verification: No inherent mechanism to establish the owner's identity.
o E-commerce Concern: Ensuring the authenticity of websites and services
distributing public keys.
• Public Key Infrastructure (PKI):
o Purpose: Proves the identity of public key owners.
o Digital Certificates: Issued to validate public keys, guaranteed by CAs.
57
• Types of Certificate Authorities:
o Private CA: Used within an organization; trusted internally.
o Third-Party CA: Used for public/business communications; establishes trust
between servers and clients.
• Functions of Third-Party Public CAs:
o Certificate Services: Provide various certificate-related services.
o Identity Validation: Ensure the validity of certificates and the identity of applicants.
o Trust Establishment: Gain trust from users, governments, regulatory authorities,
and enterprises.
o Repository Management: Manage servers that store and administer certificates.
o Lifecycle Management: Handle key and certificate lifecycle, including revocation of
invalid certificates.
Key Points:
• Public Key Cryptography:
o Confidential Messages: Encrypt with public key, decrypt with private key.
o Authentication: Sign with private key, verify with public key.
• Identity Verification Issue:
o No Built-in Mechanism: Public key cryptography lacks identity verification.
o E-commerce Risk: Authenticity of websites and services.
• Public Key Infrastructure (PKI):
o Identity Proof: Uses digital certificates.
o Certificate Authority (CA): Validates certificates.
• Types of CAs:
o Private CA: Internal use.
o Third-Party CA: Public/business use.
• Third-Party CA Functions:
o Certificate Services: Various services for users.
o Identity Validation: Ensure certificate and applicant validity.
o Trust Establishment: Trusted by users and authorities.
o Repository Management: Administer certificate storage.
o Lifecycle Management: Manage keys and certificates, including revocation.
58
Digital Certificates
Summary: A digital certificate is a wrapper for a subject's public key, containing information about
the subject and the issuer. It is digitally signed by a certificate authority (CA) to verify its
authenticity. Digital certificates are based on the X.509 standard and are used to ensure secure
communications and transactions.
Detailed Explanation:
• Digital Certificate:
o Definition: A wrapper for a subject's public key, including information about the
subject and the issuer.
o Digital Signature: Proves the certificate was issued by a specific CA.
o Subjects: Can be human users (e.g., for signing messages) or computer servers (e.g.,
for hosting confidential transactions).
• Standards:
o X.509 Standard: Approved by the International Telecommunications Union and
standardized by the Internet Engineering Task Force (IETF).
o Public Key Cryptography Standards (PKCS): Created by RSA to promote the use of
public key infrastructure.
Key Points:
• Digital Certificate:
o Public Key Wrapper: Contains subject's public key and issuer information.
o Digital Signature: Verifies authenticity from a CA.
o Subjects: Human users or computer servers.
• Standards:
o X.509: International standard for digital certificates.
o PKCS: RSA standards for public key infrastructure.
Root of Trust
Summary: The root of trust model establishes trust between users and certificate authorities (CAs)
by using root certificates. A root certificate is self-signed by the CA and used to sign other
certificates. Trust models can be single CA or hierarchical, with third-party CAs often using the
latter. Self-signed certificates are used in specific scenarios but are generally less secure.
Detailed Explanation:
• Root Certificate:
o Definition: A certificate issued and self-signed by a CA.
o Key Size: Uses RSA key sizes of 2,048 or 4,096 bits or the ECC equivalent.
59
o Subject: Set to the organization/CA name (e.g., "CompTIA Root CA").
• Trust Model:
o Single CA:
▪ Model: A single root CA issues certificates directly to users and computers.
▪ Risk: If compromised, the entire PKI collapses.
o Hierarchical Model:
▪ Structure: Root CA issues certificates to intermediate CAs, which then issue
certificates to end entities.
▪ Advantages: Allows for clear certificate policies and traceable certification
paths (certificate chaining).
• Self-Signed Certificates:
o Usage: Deployed when PKI is too difficult or expensive to manage.
o Examples: Used in web administrative interfaces of consumer routers and in
development/test environments.
o Trust Issues: Marked as untrusted by operating systems or browsers, difficult to
validate, not recommended for critical hosts and applications.
Key Points:
• Root Certificate:
o Self-Signed: Issued by CA to itself.
o Key Size: RSA 2,048 or 4,096 bits, ECC equivalent.
o Subject: Organization/CA name.
• Trust Model:
o Single CA:
▪ Direct Issuance: Certificates issued directly by root CA.
▪ Risk: Single point of failure.
o Hierarchical Model:
▪ Intermediate CAs: Issue certificates to end entities.
▪ Certificate Chaining: Traceable path to root CA.
• Self-Signed Certificates:
o Usage: When PKI is impractical.
o Examples: Consumer routers, development/test environments.
o Trust Issues: Marked as untrusted, difficult to validate.
60
Certificate Signing Requests
Summary: A certificate signing request (CSR) is a process where a subject generates a key pair and
submits a request to a certificate authority (CA) to obtain a digital certificate. The CA verifies the
information and, if valid, signs and issues the certificate. Registration with the CA is required to
authorize certificate requests.
Detailed Explanation:
• Registration:
o Process: End users create an account with the CA and become authorized to request
certificates.
o Authorization: Methods vary by CA; can include auto-enrollment (e.g., in a
Windows domain) or identity verification tests by third-party CAs.
o Importance: Ensures certificates are issued only to legitimate users, maintaining
the CA's reputation.
• Certificate Signing Request (CSR):
o Key Pair Generation: Subject generates private and public asymmetric keys (e.g.,
RSA or ECC) with a chosen key length.
o Private Key Protection: Must be kept secure and known only to the subject.
o CSR Submission: Subject completes a CSR file with information for the certificate,
including the public key, and submits it to the CA.
• CA Review and Issuance:
o Verification: CA checks the validity of the information in the CSR.
o Web Server Example: Verifies subject name and fully qualified domain name
(FQDN), and ensures the CSR was initiated by the responsible person.
o Certificate Issuance: If valid, the CA signs the certificate and sends it to the subject.
Key Points:
• Registration:
o Account Creation: With the CA.
o Authorization: Varies by CA; can include auto-enrollment or identity verification.
• Certificate Signing Request (CSR):
o Key Pair: Private and public keys generated.
o Private Key: Must be protected.
o CSR File: Contains public key and other information.
• CA Review and Issuance:
61
o Verification: Checks CSR validity.
o Web Server Example: Verifies subject name and FQDN.
o Issuance: CA signs and issues the certificate.
62
• Subject Alternative Name (SAN):
o Identifiers: FQDNs, IP addresses.
o Validation: Browsers validate SAN over CN.
o Subdomains: Specific or wildcard.
• Distinguished Name (DN):
o Fields: O, OU, L, ST, C.
o Example: CN=www.example.com, OU=Web Hosting, O=Example LLC, L=Chicago,
ST=Illinois, C=US.
• Certificate Types:
o Email Certificates: SAN as email address.
o Code-Signing Certificates: Verify software publishers, require CA validation.
Certificate Revocation
Summary: Certificates can be revoked or suspended by the owner or the certificate authority (CA)
for various reasons, such as key compromise or business closure. A certificate revocation list (CRL)
is maintained by the CA to inform users of the status of certificates. The Online Certificate Status
Protocol (OCSP) provides real-time certificate status information.
Detailed Explanation:
• Revocation and Suspension:
o Revoked Certificate: No longer valid and cannot be reinstated.
o Suspended Certificate: Can be re-enabled.
o Reasons for Revocation/Suspension: Key compromise, business closure, user
departure, domain name change, misuse, etc.
o Codes: Unspecified, Key Compromise, CA Compromise, Superseded, Cessation of
Operation, Certificate Hold (for suspension).
• Certificate Revocation List (CRL):
o Purpose: Lists all revoked and suspended certificates.
o Accessibility: Must be accessible to anyone relying on the CA's certificates.
o Attributes:
▪ Publish Period: Date and time of publication.
▪ Distribution Points: Locations where the CRL is published.
▪ Validity Period: Time during which the CRL is authoritative.
▪ Signature: Signed by the CA to verify authenticity.
63
o Risks: Certificates might be accepted if an up-to-date CRL is not published or if the
browser/application does not check the CRL.
• Online Certificate Status Protocol (OCSP):
o Function: Provides real-time status of a certificate.
o Details: Published in the certificate.
o OCSP Servers: Query the certificate database directly or depend on CRLs.
Key Points:
• Revocation and Suspension:
o Revoked: Cannot be reinstated.
o Suspended: Can be re-enabled.
o Reasons: Key compromise, business closure, etc.
o Codes: Unspecified, Key Compromise, etc.
• Certificate Revocation List (CRL):
o Lists: Revoked and suspended certificates.
o Attributes: Publish Period, Distribution Points, Validity Period, Signature.
o Risks: Acceptance of revoked certificates if CRL is outdated or not checked.
• Online Certificate Status Protocol (OCSP):
o Real-Time Status: Provides current certificate status.
o OCSP Servers: Query database or depend on CRLs.
Key Management
Summary: Key management involves the operational considerations for managing cryptographic
keys throughout their lifecycle, including key generation, storage, revocation, expiration, and
renewal. Keys can be managed in a decentralized or centralized manner, with centralized key
management often using dedicated servers and protocols like KMIP.
Detailed Explanation:
• Key Generation:
o Definition: Creates an asymmetric key pair or symmetric secret key of the required
strength using the chosen cipher.
• Storage:
o Purpose: Prevents unauthorized access to private or secret keys and protects
against loss or damage.
• Revocation:
64
o Definition: Prevents the use of a key if it is compromised. Encrypted data should be
re-encrypted with a new key if the old key is revoked.
• Expiration and Renewal:
o Purpose: Provides a "shelf-life" for certificates to enhance security. Certificates
expire after a certain period and can be renewed with the same or a new key pair.
• Decentralized Key Management:
o Model: Keys are generated and managed directly on the computer or user account
that will use the certificate.
o Advantages: Easy to deploy, no special setup required.
o Disadvantages: Makes detection of key compromise more difficult.
• Centralized Key Management:
o Model: Key generation and storage are centralized using a key management system.
o Tools: Dedicated servers or appliances generate and store keys.
o Protocol: Key Management Interoperability Protocol (KMIP) is used for
communication between devices/apps and the server.
Key Points:
• Key Generation:
o Creates: Asymmetric key pair or symmetric secret key.
o Strength: Based on chosen cipher.
• Storage:
o Prevents: Unauthorized access and loss/damage.
• Revocation:
o Prevents Use: If key is compromised.
o Re-encryption: Required for data encrypted with revoked key.
• Expiration and Renewal:
o Shelf-Life: Enhances security.
o Renewal: With same or new key pair.
• Decentralized Key Management:
o Direct Management: On computer/user account.
o Easy Deployment: No special setup.
o Compromise Detection: More difficult.
• Centralized Key Management:
65
o Centralized Storage: Using key management system.
o Dedicated Servers: Generate and store keys.
o KMIP: Protocol for communication.
66
o Certification: FIPS 140-2 for market trust.
• Secure Enclave:
o Function: Protects decrypted data in system memory from unauthorized access.
o Implementation: Trusted execution environment (TEE) like Intel Software Guard
Extensions.
o Security: Prevents access by untrusted processes, even with root or system
privileges.
Key Points:
• Key Generation and Storage:
o Entropy: TRNGs for secure key generation.
o File System Vulnerability: Keys in file systems are at risk.
• Cryptoprocessors:
o Dedicated Hardware: For secure key handling.
o Advantages: Smaller attack surface, tamper resistance.
• Trusted Platform Module (TPM):
o Versions: TPM 1.2 and 2.0.
o Implementations: Discrete, integrated, firmware, virtual.
• Hardware Security Module (HSM):
o Form Factors: Various, including virtual appliances.
o Purpose: Centralized/portable key storage.
o Certification: FIPS 140-2.
• Secure Enclave:
o Protection: For decrypted data in system memory.
o Implementation: TEE like Intel SGX.
o Security: Prevents unauthorized access.
Key Escrow
Summary: Key escrow involves archiving cryptographic keys with a third party to ensure they can
be recovered if lost or damaged. M of N controls require a quorum of individuals to authorize key
recovery operations, enhancing security. Keys can be split into parts and held by separate escrow
providers to reduce the risk of compromise.
Detailed Explanation:
• Key Escrow:
67
o Definition: Archiving cryptographic keys with a third party to ensure recovery if
lost or damaged.
o Problem with Copies: Making multiple copies increases the risk of compromise
and makes detection difficult.
• M of N Controls:
o Definition: An operation requires a quorum (M) of available persons (N) to
authorize it.
o Purpose: Prevents a single individual from performing key recovery operations.
• Key Splitting:
o Process: A key can be divided into parts, each held by different escrow providers.
o Benefit: Reduces the risk of compromise.
• Key Recovery Agent (KRA):
o Definition: An account authorized to access a key held in escrow.
o Recovery Policy: May require multiple KRAs to authorize key recovery, mitigating
the risk of impersonation.
Key Points:
• Key Escrow:
o Third Party: Keys archived with an independent entity.
o Risk of Copies: Increased compromise risk with multiple copies.
• M of N Controls:
o Quorum: Requires multiple individuals to authorize operations.
o Security: Enhances security by preventing single-person access.
• Key Splitting:
o Parts: Key divided and held by separate providers.
o Risk Reduction: Lowers compromise risk.
• Key Recovery Agent (KRA):
o Authorized Access: Accounts with permission to access escrowed keys.
o Multiple KRAs: Required for authorization to prevent impersonation.
68
Encryption Supporting Confidentiality
Summary: Encryption ensures confidentiality by making data unreadable to unauthorized parties,
even if intercepted or stolen. Data can be in three states: at rest, in transit, or in use. Bulk encryption
uses symmetric ciphers for efficiency, while asymmetric encryption is used to securely distribute
symmetric keys. A typical encryption scheme involves both symmetric and asymmetric encryption
to protect data.
Detailed Explanation:
• Confidentiality through Encryption:
o Purpose: Ensures that intercepted or stolen data cannot be understood or altered
by unauthorized parties.
o Data States:
▪ Data at Rest: Stored in persistent media.
▪ Data in Transit: Transmitted over a network.
▪ Data in Use: Present in volatile memory (RAM, CPU registers, cache).
• Bulk Encryption:
o Definition: Encrypting large amounts of data (megabytes or gigabytes).
o Symmetric Ciphers: Used for bulk encryption due to efficiency (e.g., AES).
o Asymmetric Ciphers: Not efficient for bulk encryption due to high computational
overhead.
• Symmetric and Asymmetric Encryption Scheme:
o Symmetric Key Distribution: Challenging due to confidentiality concerns.
o Combined Approach:
1. Asymmetric Key Pair Generation: User generates a key pair (e.g., RSA or
ECC). The private key is encrypted and serves as the Key Encryption Key
(KEK).
2. Symmetric Key Generation: System generates a symmetric key (e.g.,
AES256 or AES512) for data encryption, referred to as the Data Encryption
Key (DEK).
3. Key Encryption: DEK is encrypted using the public key portion of the KEK.
4. Data Access: User supplies a password or starts an authenticated session to
use their private key to decrypt the DEK, which then decrypts the data.
Key Points:
• Confidentiality through Encryption:
o Unreadable Data: Ensures data cannot be understood by unauthorized parties.
o Data States: At rest, in transit, in use.
• Bulk Encryption:
69
o Symmetric Ciphers: Efficient for large data (e.g., AES).
o Asymmetric Ciphers: Inefficient for bulk data.
• Symmetric and Asymmetric Encryption Scheme:
o Symmetric Key Distribution: Challenging but necessary.
o Combined Approach:
1. Asymmetric Key Pair: Generates KEK.
2. Symmetric Key: Generates DEK.
3. Key Encryption: DEK encrypted with KEK.
4. Data Access: Decrypt DEK with private key to access data.
70
o Volume Encryption:
▪ Definition: Encrypts a storage resource with a single file system.
▪ Examples: Microsoft's BitLocker, Apple's FileVault.
▪ Scope: May or may not include free space and file metadata.
o File Encryption:
▪ Definition: Encrypts individual files or folders.
▪ Dependency: May require specific file system support (e.g., NTFS for
Microsoft's EFS).
o Metadata and Free Space:
▪ Metadata: Includes file lists, ownership, and timestamps.
▪ Free Space: Can contain data remnants from deleted files.
• Cryptoprocessors:
o Trusted Platform Module (TPM): Stores keys securely, compatible with encryption
products.
o Hardware Security Module (HSM): Provides centralized or portable key storage.
Key Points:
• Data at Rest:
o Encryption Levels: Full-disk to file system/database encryption.
• Full Disk and Partition Encryption:
o FDE: Encrypts entire storage device.
o SEDs: Built-in cryptoprocessor for key management.
o Partition Encryption: Encrypts specific disk areas.
• Volume and File Encryption:
o Volume Encryption: Encrypts storage resource with a single file system.
o File Encryption: Encrypts individual files/folders.
o Metadata and Free Space: Includes file lists, ownership, timestamps, and data
remnants.
• Cryptoprocessors:
o TPM: Secure key storage.
o HSM: Centralized/portable key storage.
71
Database Encryption
Summary: Database encryption protects data stored in structured databases by encrypting data at
various levels, such as database-level, record-level, and cell/column-level. This ensures data
confidentiality and integrity, even if the underlying storage media is compromised. Encryption can
be implemented by the database management system (DBMS) or through plug-ins, with different
granular options available.
Detailed Explanation:
• Structured Database:
o Definition: Stores data in tables with column fields and rows.
o Access: Mediated through a DBMS using SQL, typically hosted on a server.
• Encryption Levels:
o Disk/Volume Encryption:
▪ Protection: Underlying files can be protected by disk or volume encryption.
▪ Performance Impact: May adversely affect performance, hence encryption
is often implemented by the DBMS.
• Database-Level Encryption:
o Definition: Encrypts data when transferred between disk and memory.
o Example: Transparent Data Encryption (TDE) in SQL Server.
o Protection: Encrypts all records on disk and database logs, protecting against media
theft.
• Record-Level Encryption:
o Definition: Encrypts individual records to protect secrets from database
administrators.
o Public Key Encryption: Stores private keys outside the database to unlock cell
values.
o Example: SQL Server's Always Encrypted feature keeps data encrypted in memory,
decrypted only by client applications.
• Cell/Column Encryption:
o Definition: Encrypts specific fields within a table.
o Performance Impact: Less than database-level encryption but requires identifying
fields needing protection.
o Client Access: Can complicate access; decryption keys supplied by client
applications.
• Granular Control:
o Example: Health insurer's database with protected health information.
72
o Key Pairs: Each customer identified by a separate key pair for row/record-level
encryption.
o Compliance: Allows fine-grained access control to meet security and privacy
requirements.
Key Points:
• Structured Database:
o Tables: Data stored in tables with columns and rows.
o DBMS: Access mediated through SQL.
• Encryption Levels:
o Disk/Volume Encryption: Protects underlying files, may impact performance.
o Database-Level Encryption: Encrypts data between disk and memory (e.g., TDE).
o Record-Level Encryption: Protects individual records, uses public key encryption.
o Cell/Column Encryption: Encrypts specific fields, requires client-supplied keys.
• Granular Control:
o Key Pairs: Separate keys for different records.
o Compliance: Meets security and privacy requirements.
73
o Process:
1. Public Key Acquisition: Alice obtains Bob's public key (RSA or ECC) via
Bob's digital certificate.
2. Session Key Encryption: Alice encrypts her message using a symmetric
cipher (e.g., AES) and generates a session key.
3. Session Key Encryption with Public Key: Alice encrypts the session key
with Bob's public key.
4. Digital Envelope: Alice sends the encrypted session key and ciphertext to
Bob.
5. Session Key Decryption: Bob uses his private key to decrypt the session
key.
6. Message Decryption: Bob uses the session key to decrypt the ciphertext.
• Integrity and Authenticity:
o Hash-based Message Authentication Code (HMAC): Combines the secret key with
a hash of the message to ensure integrity and authenticity.
o Authenticated Encryption (AE): Symmetric cipher mode that ensures both
confidentiality and integrity/authenticity.
Key Points:
• Transport Encryption:
o Protects Data-in-Motion: Ensures secure transmission.
o Examples: WPA, IPsec (VPN), TLS.
• Key Exchange Mechanism:
o Asymmetric Ciphers: Inefficient for direct encryption.
o Process:
1. Public Key Acquisition: Alice gets Bob's public key.
2. Session Key Encryption: Alice encrypts message with symmetric cipher.
3. Session Key Encryption with Public Key: Encrypts session key with Bob's
public key.
4. Digital Envelope: Sends encrypted session key and ciphertext.
5. Session Key Decryption: Bob decrypts session key.
6. Message Decryption: Bob decrypts ciphertext.
• Integrity and Authenticity:
o HMAC: Ensures message integrity and authenticity.
o Authenticated Encryption (AE): Ensures confidentiality and integrity/authenticity.
74
Perfect Forward Secrecy
Summary: Perfect Forward Secrecy (PFS) ensures that session keys are not compromised even if
the server's private key is compromised in the future. PFS uses Diffie-Hellman (D-H) key agreement
to create ephemeral session keys, which are unique for each session and not derived from the
server's private key. This enhances security by preventing attackers from decrypting recorded
sessions.
Detailed Explanation:
• Digital Envelope and Key Exchange:
o Original Implementation: Server and client exchange secret keys using the server's
key pair.
o Risk: If the server's private key is compromised, recorded session data can be
decrypted.
• Perfect Forward Secrecy (PFS):
o Mitigation: Uses Diffie-Hellman (D-H) key agreement to create ephemeral session
keys.
o Process:
▪ Shared Secret Derivation: Alice and Bob derive the same shared secret by
sharing related values.
▪ Public and Private Values: Some values are shared publicly, while others
are kept private.
▪ Security: Mallory cannot learn the secret from the publicly exchanged
values.
▪ Digital Signature: Proves the authenticity of the values sent by the server.
• Benefits of Ephemeral Session Keys:
o Future Compromise: Compromise of the server does not affect recorded data.
o Session Confidentiality: Each session remains confidential even if one session key
is obtained.
o Increased Cryptanalysis Effort: Attackers need to perform extensive cryptanalysis
to recover an entire conversation.
• Implementation:
o Diffie-Hellman Ephemeral (DHE): Uses modular arithmetic.
o Elliptic Curve DHE (ECDHE): More commonly implemented for PFS.
Key Points:
• Digital Envelope and Key Exchange:
o Original Risk: Server's private key compromise can decrypt session data.
• Perfect Forward Secrecy (PFS):
75
o Diffie-Hellman (D-H): Creates ephemeral session keys.
o Shared Secret: Derived from shared and private values.
o Digital Signature: Ensures authenticity.
• Benefits of Ephemeral Session Keys:
o Future Compromise: Does not affect recorded data.
o Session Confidentiality: Each session remains secure.
o Cryptanalysis Effort: Increased for attackers.
• Implementation:
o DHE: Uses modular arithmetic.
o ECDHE: Commonly used for PFS.
76
Key Points:
• Salting:
o Unique Value: Added to each password.
o Hash Computation: (salt + password) * SHA = hash.
o Prevents: Identical hash values for identical passwords.
o Security: Mitigates brute force and dictionary attacks.
• Key Stretching:
o Repeated Hashing: Converts key into a longer, more complex key.
o Slows Attacks: Increases computational effort for attackers.
o Implementation: PBKDF2, used in WPA.
Blockchain
Summary: Blockchain is a decentralized and cryptographically secured method of recording
transactional records in an expanding list called blocks. Each block contains a hash of the previous
block, ensuring the integrity and immutability of the entire chain. Blockchain technology supports
various applications, including financial transactions, legal contracts, IP protection, online voting,
identity management, and data storage.
Detailed Explanation:
• Blockchain Concept:
o Definition: An expanding list of transactional records secured using cryptography.
o Blocks: Each record is referred to as a block.
o Hash Function: Each block is run through a hash function.
o Cryptographic Link: The hash value of the previous block is added to the hash
calculation of the next block, ensuring each block is linked.
• Integrity and Immutability:
o Validation: Each block validates the hash of the previous block, ensuring historical
transactions are untampered.
o Timestamp: Each block includes a timestamp of transactions and the transaction
data.
• Decentralization and Openness:
o Public Ledger: Blockchain is recorded in an open public ledger.
o Decentralized: The ledger is distributed across a peer-to-peer (P2P) network,
mitigating single points of failure.
o Trust: Users can trust each other equally.
77
o Transparency: Everyone can view every transaction on the blockchain.
• Applications:
o Financial Transactions: Ensures integrity and transparency.
o Legal Contracts: Provides secure and verifiable records.
o IP Protection: Protects copyrights and intellectual property.
o Online Voting: Ensures secure and transparent voting systems.
o Identity Management: Manages identities securely.
o Data Storage: Provides secure and immutable data storage.
Key Points:
• Blockchain Concept:
o Blocks: Transactional records.
o Hash Function: Ensures cryptographic linkage.
• Integrity and Immutability:
o Validation: Each block validates the previous one.
o Timestamp: Includes transaction timestamps.
• Decentralization and Openness:
o Public Ledger: Open and decentralized.
o Trust: Equal trust among users.
o Transparency: Viewable transactions.
• Applications:
o Financial Transactions: Integrity and transparency.
o Legal Contracts: Secure records.
o IP Protection: Protects intellectual property.
o Online Voting: Secure voting systems.
o Identity Management: Secure identity management.
o Data Storage: Immutable storage.
Obfuscation
Summary: Obfuscation makes data difficult to find, providing security through obscurity. While
generally deprecated, it has specific uses such as steganography, data masking, and tokenization.
These techniques help protect data confidentiality, integrity, and privacy.
Detailed Explanation:
78
• Steganography:
o Definition: Embeds information within an unexpected source (e.g., a message
hidden in a picture).
o Covertext: The container document or file.
o Confidentiality: The message can be encrypted before embedding.
o Integrity/Non-repudiation: Can demonstrate authenticity or detect tampering.
• Data Masking:
o Definition: Redacts all or part of the contents of a database field.
o Example: Substituting characters with "x" or partially redacting fields (e.g.,
retaining dialing prefix in a phone number).
o Format Preservation: Techniques to maintain the original format of the field.
• Tokenization:
o Definition: Replaces database field values with randomly generated tokens.
o Token Storage: Tokens and original values stored separately in a token server or
vault.
o Reversibility: Authorized queries can retrieve original values.
o Regulatory Compliance: Used as a substitute for encryption.
• De-identification:
o Purpose: Obfuscates personal data to share without compromising privacy.
o Techniques: Data masking and tokenization.
Key Points:
• Steganography:
o Hidden Information: Embeds data in unexpected sources.
o Covertext: Container document/file.
o Confidentiality: Encrypted message.
o Integrity/Non-repudiation: Authenticity and tampering detection.
• Data Masking:
o Redaction: Substitutes or partially redacts data.
o Example: "x" substitution, partial redaction.
o Format Preservation: Maintains original format.
• Tokenization:
o Random Tokens: Replaces field values.
79
o Token Storage: Separate from production database.
o Reversibility: Retrieve original values.
o Compliance: Substitute for encryption.
• De-identification:
o Privacy Protection: Obfuscates personal data.
o Techniques: Data masking, tokenization.
Authentication Design
Summary: Authentication design involves selecting technologies that ensure confidentiality,
integrity, and availability when verifying user credentials. Common authentication factors include
knowledge-based methods like usernames, passwords, passphrases, and PINs.
Detailed Explanation:
• Authentication Process:
o Definition: Authentication occurs when a user (supplicant) presents credentials to
an authentication server, which verifies them against stored credentials.
o Outcome: If the credentials match, the user is authenticated.
• Confidentiality:
o Importance: Prevents credential leakage, which could allow threat actors to
impersonate users.
o Requirement: Credentials must be kept secret to protect user identities and system
access.
• Integrity:
o Importance: Ensures the authentication mechanism is reliable and resistant to
bypass or counterfeit attempts.
o Requirement: The system must be robust against attacks and manipulation.
80
• Availability:
o Importance: Ensures the authentication process is efficient and user-friendly, not
hindering workflows.
o Requirement: The system must be accessible and easy to use.
• Authentication Factors:
o Knowledge Factor (Something You Know):
▪ Username and Password: Common method where the username is public,
but the password is secret.
▪ Passphrase: A longer, more secure, and memorable password composed of
multiple words.
▪ PIN: A personal identification number, traditionally short and numeric, now
used for single-device authentication with any character length.
Key Points:
• Authentication Process:
o Verification: Credentials presented and compared to stored copies.
o Match: Successful authentication if credentials match.
• Confidentiality:
o Protection: Prevents credential leakage.
o Impersonation Risk: Mitigates threat actor impersonation.
• Integrity:
o Reliability: Ensures robust and secure authentication.
o Resistance: Protects against bypass and counterfeit attempts.
• Availability:
o Efficiency: Quick and user-friendly authentication.
o Accessibility: Easy for users to operate.
• Knowledge Factor:
o Username and Password: Common, with secret passwords.
o Passphrase: Secure and memorable.
o PIN: Single-device authentication, flexible in length and characters.
81
Password Concepts
Summary: Improper credential management is a major security risk. Organizations relying on
password-based credentials must enforce strong policies and training. Key aspects include
password best practices, credential management policies, and system-enforced account policies.
Detailed Explanation:
• Credential Management:
o Importance: Poor management of credentials is a common attack vector.
o Policies: Strong policies and training are essential for secure password usage.
• Password Best Practices Policy:
o Purpose: Guides users on choosing and maintaining secure passwords.
o Scope: Part of a broader credential management policy covering passwords, smart
cards, and biometric IDs.
o Awareness: Educates users on social engineering attacks like phishing and
pharming.
• System-Enforced Account Policies:
o Password Length: Sets minimum (and possibly maximum) password length.
o Password Complexity: Requires a mix of uppercase, lowercase, alphanumeric, and
non-alphanumeric characters.
o Password Age: Forces periodic password changes.
o Password Reuse and History: Prevents reuse of recent passwords and quick
cycling through password changes.
• Password Aging vs. Expiration:
o Aging: Allows login with the old password but requires immediate change.
o Expiration: Disables login with the outdated password.
• NIST Guidance:
o Update: Recent NIST guidelines deprecate traditional practices like complexity,
aging, and password hints.
• Password Reuse:
o Risk: Using work passwords on other sites increases security risks.
o Mitigation: Soft policies can help discourage this behavior.
Key Points:
• Credential Management:
o Security Risk: Poor management is a common attack vector.
o Policies and Training: Essential for secure usage.
82
• Password Best Practices:
o Guidance: Choosing and maintaining secure passwords.
o Social Engineering: Awareness of phishing and pharming.
• System-Enforced Policies:
o Length: Minimum and maximum requirements.
o Complexity: Mix of character types.
o Age: Periodic changes.
o Reuse and History: Prevents reuse and quick cycling.
• Aging vs. Expiration:
o Aging: Immediate change after login.
o Expiration: Disables outdated passwords.
• NIST Guidelines:
o Deprecation: Traditional practices like complexity and aging.
• Password Reuse:
o Risk: Using work passwords elsewhere.
o Mitigation: Soft policies to discourage reuse.
Password Managers
Summary: Password managers help mitigate the risks of poor credential management by securely
storing and generating passwords. They are integrated into operating systems and browsers or
available as third-party apps, and they use a master password to protect the password vault.
Detailed Explanation:
• Credential Management Issues:
o Problem: Users often reuse passwords across corporate and consumer sites,
increasing security risks.
o Solution: Password managers mitigate this risk by securely managing passwords.
• Password Manager Selection:
o Options: Users can choose built-in password managers (e.g., Windows Credential
Manager, iCloud Keychain) or third-party apps.
o Installation: Third-party managers require browser plug-ins.
• Password Vault Security:
o Master Password: Secures the password vault, which is often stored in the cloud for
multi-device access. Some managers offer local storage.
83
o Random Password Generation: Managers generate random passwords for new or
updated accounts, adjustable to site requirements.
• Site Validation:
o Process: Password managers validate site identities using digital certificates and
offer to fill in passwords.
• Risks:
o Weak Master Password: A weak master password can compromise the entire vault.
o Vendor Compromise: Risks include breaches of the vendor's cloud storage or
systems.
o Impersonation Attacks: Attackers may trick the manager into filling passwords on
spoofed sites.
Key Points:
• Credential Management Issues:
o Reuse Risk: Using the same password across sites.
o Mitigation: Secure management with password managers.
• Password Manager Selection:
o Built-in Options: Windows Credential Manager, iCloud Keychain.
o Third-Party Apps: Require browser plug-ins.
• Password Vault Security:
o Master Password: Protects the vault.
o Cloud Storage: For multi-device access.
o Local Storage: Some managers offer this option.
o Random Generation: Adjustable to site policies.
• Site Validation:
o Digital Certificates: Used to validate site identities.
o Auto-Fill: Managers offer to fill in passwords.
• Risks:
o Weak Master Password: Compromises the vault.
o Vendor Compromise: Breaches of cloud storage/systems.
o Impersonation Attacks: Tricking the manager.
84
Multifactor Authentication
Summary: Multifactor authentication (MFA) enhances security by combining multiple types of
authentication factors, such as something you know (password), something you have (smart card),
and something you are (biometric). This approach mitigates the weaknesses of single-factor
authentication.
Detailed Explanation:
• Weakness of Single-Factor Authentication:
o Issue: Passwords alone are prone to compromise and are not reliable.
o Solution: MFA supplements or replaces password-based logins with additional
factors.
• Authentication Factors:
o Something You Have (Ownership Factor):
▪ Examples: Smart card, key fob, smartphone generating or receiving
cryptographic tokens.
▪ Purpose: Ensures the account holder possesses a unique item.
o Something You Are (Biometric Factor):
▪ Examples: Fingerprint, facial scan, gait analysis.
▪ Process: Scanned identifiers are recorded as a template and compared
during authentication.
o Somewhere You Are (Location-Based Factor):
▪ Examples: Geographic location via device's location service, IP address.
▪ Usage: Not a primary factor but used for continuous authentication or
access control.
▪ Application: Restricts access based on unexpected locations or impossible
travel times.
• Multifactor Authentication (MFA):
o Definition: Combines different types of factors for stronger security.
o Example: Using a PIN and a smart card together.
• Two-Factor Authentication (2FA):
o Definition: A specific type of MFA involving exactly two factors.
o Example: Combining a password with a biometric identifier.
Key Points:
• Weakness of Single-Factor Authentication:
o Compromise Risk: Passwords alone are unreliable.
85
o MFA Solution: Adds additional factors for security.
• Authentication Factors:
o Ownership Factor: Smart card, key fob, smartphone.
o Biometric Factor: Fingerprint, facial scan, gait.
o Location-Based Factor: Geographic location, IP address.
• MFA:
o Combination: Uses multiple factors.
o Example: PIN and smart card.
• 2FA:
o Two Factors: Exactly two types of factors.
o Example: Password and biometric.
Biometric Authentication
Summary: Biometric authentication uses unique physiological or behavioral characteristics to
verify identity. The process involves enrollment, where a biometric sample is captured and
converted into a template, and subsequent authentication, where new scans are compared to the
stored template. Key metrics for evaluating biometric systems include False Rejection Rate (FRR),
False Acceptance Rate (FAR), and Crossover Error Rate (CER).
Detailed Explanation:
• Enrollment Process:
o Sensor Module: Acquires the biometric sample from the user.
o Feature Extraction Module: Creates a mathematical template representing unique
identifiers.
o Authentication: User is re-scanned, and the new scan is compared to the template.
Access is granted if they match within a defined tolerance.
• Evaluation Metrics:
o False Rejection Rate (FRR):
▪ Definition: Percentage of legitimate users not recognized (Type I error).
▪ Impact: Causes inconvenience to users.
o False Acceptance Rate (FAR):
▪ Definition: Percentage of interlopers accepted (Type II error).
▪ Impact: Can lead to security breaches.
o Crossover Error Rate (CER):
86
▪ Definition: Point where FRR and FAR are equal.
▪ Importance: Lower CER indicates more efficient and reliable technology.
• Performance Factors:
o Throughput (Speed): Time required for template creation and authentication,
crucial for high-traffic areas.
o Failure to Enroll Rate (FER): Incidents where a template cannot be created during
enrollment.
o Cost/Implementation: Varies by scanner type; some are expensive or difficult to
use on mobile devices.
o User Acceptance: Concerns about privacy, intrusiveness, and accessibility for those
with disabilities.
• Common Biometric Methods:
o Fingerprint Recognition:
▪ Technology: Uses capacitive cells or optical cameras to detect unique ridge
patterns.
▪ Advantages: Inexpensive, nonintrusive, straightforward.
▪ Challenges: Moisture or dirt can affect readings.
o Facial Recognition:
▪ Technology: Records indicators like eye distance and nose width using
optical and infrared cameras.
▪ Advantages: Defeats spoofing attempts with photos.
▪ Challenges: Accuracy can be affected by lighting and angles.
Key Points:
• Enrollment Process:
o Sensor Module: Captures biometric sample.
o Feature Extraction: Creates unique template.
o Authentication: Compares new scan to template.
• Evaluation Metrics:
o FRR: Legitimate users not recognized.
o FAR: Interlopers accepted.
o CER: Balance point of FRR and FAR.
• Performance Factors:
o Throughput: Speed of template creation and authentication.
87
o FER: Failure to create a template.
o Cost/Implementation: Expense and ease of use.
o User Acceptance: Privacy and accessibility concerns.
• Common Methods:
o Fingerprint Recognition: Inexpensive, nonintrusive.
o Facial Recognition: Accurate, resists spoofing.
88
o Smart Cards:
▪ Function: Store digital certificates, private keys, and a PIN for activation.
▪ Types: Physical contact and contactless NFC cards.
o One-Time Password (OTP) Generators:
▪ Function: Generate tokens without needing a computer interface; users read
the displayed code.
o Security Keys:
▪ Function: Portable hardware security modules (HSM) with interfaces like
USB or NFC.
▪ Features: Often associated with U2F, may support certificate-based
authentication or HOTP/TOTP, and typically include an activation button or
biometric fingerprint reader.
• Static Tokens:
o Examples: Simple smart cards and fobs that transmit static tokens.
o Vulnerability: Prone to cloning and replay attacks.
Key Points:
• Ownership Factor:
o Authenticator: Device generating/receiving tokens.
o Token Generation Types:
▪ Certificate-Based: Uses private/public keys, requires PKI.
▪ OTP: Uses hash functions, no PKI needed.
▪ FIDO U2F: Uses key pairs, no shared secrets or PKI.
• Hard Authentication Tokens:
o Generation: Secure cryptoprocessor.
o Device Types:
▪ Smart Cards: Store certificates, keys, and PINs.
▪ OTP Generators: Display tokens.
▪ Security Keys: HSMs with USB/NFC, activation features.
• Static Tokens:
o Examples: Simple smart cards/fobs.
o Vulnerability: Cloning and replay attacks.
89
Soft Authentication Tokens
Summary: Soft authentication tokens are one-time passwords (OTPs) generated by the identity
provider and sent to the user via SMS, email, or an authenticator app. While SMS and email tokens
are vulnerable to interception, authenticator apps offer a more secure alternative.
Detailed Explanation:
• Soft Authentication Tokens:
o Definition: OTPs generated by the identity provider and transmitted to the user.
o Transmission Methods: Sent via SMS/text message, email, or authenticator app.
o Expiry: Typically have an expiry period, even if counter-based.
• SMS and Email Tokens:
o Nature: Do not count as an ownership factor.
o Description: Considered two-step verification rather than true MFA.
o Vulnerability: Highly susceptible to interception.
• Authenticator App Tokens:
o Definition: More secure OTPs generated by software installed on a computer or
smartphone.
o Registration: Users register each identity provider with the app using a QR code to
communicate the shared secret.
o Authentication Process: Users unlock the app with their device credential to view
the OTP token.
o Security: Less risk of interception compared to SMS or email, but potential malware
threats on shared-use devices.
Key Points:
• Soft Authentication Tokens:
o Definition: OTPs sent to users.
o Methods: SMS, email, authenticator app.
o Expiry: Have an expiry period.
• SMS and Email Tokens:
o Two-Step Verification: Not true MFA.
o Vulnerability: Prone to interception.
• Authenticator App Tokens:
o Secure OTPs: Generated by an app.
o Registration: Uses QR codes for shared secrets.
90
o Authentication: Requires unlocking the app.
o Security: Less interception risk, potential malware threats.
Passwordless Authentication
Summary: Passwordless authentication eliminates the use of passwords, relying instead on other
factors like security keys or biometric methods. The FIDO2 with WebAuthn specifications provide a
framework for this approach, enhancing security and reducing management burdens.
Detailed Explanation:
• Token-Based MFA:
o Current Use: Typically includes a password as a backup or part of a two-step
verification process.
o Passwordless Approach: Eliminates knowledge-based factors entirely.
• FIDO2 with WebAuthn:
o Framework: Provides a structure for passwordless authentication.
o Process:
▪ Authenticator Choice: Users select a roaming authenticator (e.g., security
key) or a platform authenticator (e.g., Windows Hello, Face ID/Touch ID).
▪ Local Gesture: Users configure a secure method (e.g., fingerprint, face
recognition, PIN) to confirm presence and authenticate the device.
▪ Registration: Users register with a web application (relying party),
generating a public/private key pair.
▪ Authentication Challenge: Users perform the local gesture to unlock the
private key, which signs a confirmation sent to the relying party.
▪ Verification: The relying party uses the public key to verify the signature
and authenticate the session.
• Security and Management:
o Comparison to FIDO U2F: Similar security to smart card authentication without
requiring digital certificates and PKI.
o API Improvement: FIDO2 WebAuthn adds an API for passwordless web application
authentication.
• Attestation:
o Purpose: Ensures the authenticator is trusted and resistant to spoofing or cloning.
o Mechanism: Authenticator devices have an attestation and model ID to prove they
are a root of trust.
o Privacy: Attestation keys identify the brand and model, not individuals.
91
Key Points:
• Token-Based MFA:
o Backup Passwords: Often still used.
o Passwordless: No knowledge-based factors.
• FIDO2 with WebAuthn:
o Authenticator Choice: Security key or platform authenticator.
o Local Gesture: Fingerprint, face recognition, PIN.
o Registration: Public/private key pair.
o Authentication: Local gesture unlocks private key, signs confirmation.
o Verification: Public key verifies signature.
• Security and Management:
o FIDO U2F Comparison: No digital certificates or PKI needed.
o API Improvement: Passwordless web authentication.
• Attestation:
o Trust: Ensures authenticator reliability.
o Mechanism: Attestation and model ID.
o Privacy: Identifies brand/model, not individuals.
92
o Definition: Based on security clearance levels, with each object given a classification
label and each subject granted a clearance level.
o Operation: Subjects can read objects at their clearance level or below.
o Rules: Nondiscretionary and cannot be changed by any subject account.
o Compartment-Based Access: Adds flexibility by allowing access based on both
classification and compartment (e.g., Secret and HR).
o Write Up, Read Down: Users with high clearance cannot write to low-clearance
documents to prevent data leakage.
Key Points:
• Discretionary Access Control (DAC):
o Resource Ownership: Owner controls access.
o Flexibility: Highly flexible, widely used.
o Weaknesses: Hard to enforce policies, vulnerable to insider threats.
• Mandatory Access Control (MAC):
o Security Clearance: Based on classification labels and clearance levels.
o Nondiscretionary Rules: Cannot be changed by users.
o Compartment-Based Access: Adds flexibility.
o Write Up, Read Down: Prevents data leakage.
93
o Implementation: RBAC can be partially implemented by mapping security groups
to roles, but they are not identical. Administrators should not be able to arbitrarily
assign roles to their own accounts or boost role permissions.
• Attribute-Based Access Control (ABAC):
o Definition: Access decisions are based on a combination of subject and object
attributes, plus any context-sensitive or system-wide attributes.
o Attributes: Can include group/role memberships, OS information, IP address,
presence of patches and antimalware, and more.
o Monitoring: Tracks events, alerts, and access requests to ensure consistency in
timing and location.
o Policies: Can implement policies like M-of-N control (requiring a minimum number
of agents to perform a task) and separation of duties.
Key Points:
• Role-Based Access Control (RBAC):
o Permissions: Defined by roles based on tasks.
o Nondiscretionary: System owners control role permissions.
o Implicit Rights: Gained through role assignments.
o Security Groups: Used for flexible and scalable permissions management.
o Implementation: Mapping security groups to roles, avoiding privilege escalation.
• Attribute-Based Access Control (ABAC):
o Access Decisions: Based on a combination of attributes.
o Attributes: Include group memberships, OS, IP address, patches, etc.
o Monitoring: Tracks events and access requests.
o Policies: Supports M-of-N control and separation of duties.
94
o Examples: Includes RBAC, ABAC, and MAC.
• Conditional Access:
o Definition: Monitors account or device behavior throughout a session and enforces
additional authentication or suspends the account if certain conditions are met.
o Examples: User Account Control (UAC) and sudo restrictions on privileged
accounts.
o Function: Prompts for confirmation or authentication when elevated privileges are
required.
o Criteria: Can include location-based policies and other criteria applied by RBAC and
ABAC systems.
Key Points:
• Rule-Based Access Control:
o System-Enforced: Policies determined by rules, not users.
o Examples: RBAC, ABAC, MAC.
• Conditional Access:
o Monitoring: Tracks behavior during sessions.
o Actions: Suspends account or requires reauthentication if conditions are met.
o Examples: UAC, sudo restrictions.
o Criteria: Includes location-based policies and other criteria.
95
o Challenges: Managing permissions for many users, groups, roles, and resources is
complex and time-consuming.
• Impacts of Improper Configuration:
o Too Restrictive: Leads to increased support calls and reduced productivity.
o Too Permissive: Weakens security and increases the risk of malware and data
breaches.
• Continual Monitoring:
o Authorization Creep: Users may accumulate excessive rights over time.
o Temporary Privileges: Systems must ensure temporary privileges are revoked
after the agreed period.
• Auditing:
o Regular Reviews: Privileges, group memberships, and access control lists should be
regularly reviewed.
o Disabling Unnecessary Accounts: Identifying and disabling accounts that are no
longer needed.
Key Points:
• Principle of Least Privilege:
o Minimum Rights: Only necessary permissions are granted.
o Risk Mitigation: Limits potential damage from compromised accounts.
• Design Phase:
o Workflow Analysis: Determines roles and permissions.
o Complexity: Managing permissions is challenging.
• Impacts of Improper Configuration:
o Restrictive: Increases support calls, reduces productivity.
o Permissive: Weakens security, increases risk.
• Continual Monitoring:
o Authorization Creep: Prevents accumulation of excessive rights.
o Temporary Privileges: Ensures timely revocation.
• Auditing:
o Regular Reviews: Monitors privileges and memberships.
o Disabling Accounts: Removes unnecessary accounts.
96
User Account Provisioning
Summary: User account provisioning involves setting up accounts for new employees, consultants,
contractors, and sometimes customers. The process includes identity proofing, issuing credentials,
providing hardware and software, teaching policy awareness, and assigning permissions.
Deprovisioning removes access rights when an employee leaves or a project ends.
Detailed Explanation:
• Provisioning Process:
o Identity Proofing:
▪ Verification: Confirms the person's identity using official documents and
records.
▪ Background Check: May include checks on addresses, education,
employment history, criminal record, and credit issues.
o Issuing Credentials:
▪ Password Selection: Allows users to choose a password known only to
them.
▪ Authenticator Enrollment: May include biometric or token-based
authenticators.
o Issuing Hardware and Software Assets:
▪ Resources: Typically includes a computer, smartphone, and licensed
software apps.
▪ Shadow IT: Ensures employees have adequate resources to avoid
unauthorized procurement.
o Teaching Policy Awareness:
▪ Training: Provides training and access to learning resources on security
policies and risks.
▪ Personal Use Policies: Educates on policies for personal use of IT assets.
o Creating Permissions Assignment:
▪ Role Identification: Determines work roles and configures appropriate
rights.
▪ Monitoring: Tags accounts with privileged access for close monitoring.
• Deprovisioning Process:
o Access Removal: Removes access rights and permissions when an employee leaves
or a project ends.
o Account Management: Disables or deletes accounts as necessary.
Key Points:
• Provisioning Process:
97
o Identity Proofing: Verifies identity and may include background checks.
o Issuing Credentials: Password selection and authenticator enrollment.
o Hardware and Software: Provides necessary resources.
o Policy Awareness: Training on security policies and personal use.
o Permissions Assignment: Configures rights based on roles and monitors privileged
access.
• Deprovisioning Process:
o Access Removal: Removes rights and permissions.
o Account Management: Disables or deletes accounts.
98
o Profile Attributes: Full name, email, contact number, department, account picture.
o Data Storage: Home folder and application settings.
• Permissions and Access Policies:
o Assignment: Directly to account or through group/role membership.
o Access Rights: Local/remote logon, software installation, network configuration.
• Group Policy Objects (GPOs):
o Configuration: Access rights for accounts.
o Linking: Sites, domains, organizational units in Active Directory.
Account Restrictions
Summary: Policy-based restrictions help mitigate the risks of account compromise by controlling
access based on location and time. These restrictions can be implemented using location-based
policies, which rely on network or geographical location, and time-based policies, which control
login times and durations.
Detailed Explanation:
• Location-Based Policies:
o Logical Network Location:
o Identifiers: IP address, subnet, virtual LAN (VLAN), organizational unit (OU).
o Usage: Restricting logins to specific network locations (e.g., preventing local logins
to servers in a restricted OU).
o Geographical Location:
o IP Address: Maps to a location based on ISP information, with varying accuracy.
o Location Services: Uses GPS, cell towers, Wi-Fi hotspots, and Bluetooth signals for
accurate positioning.
• Time-Based Restrictions:
o Types of Policies:
▪ Time-of-Day Restrictions: Establishes authorized login hours.
▪ Duration-Based Login: Limits the maximum login duration.
▪ Impossible Travel Time/Risky Login: Tracks login locations over time to
detect infeasible travel distances.
▪ Temporary Permissions: Removes account from security roles or groups
after a defined period.
Key Points:
• Location-Based Policies:
99
o Logical Network Location: IP address, subnet, VLAN, OU.
o Geographical Location: IP address mapping, GPS, cell towers, Wi-Fi, Bluetooth.
• Time-Based Restrictions:
o Time-of-Day Restrictions: Authorized login hours.
o Duration-Based Login: Maximum login time.
o Impossible Travel Time: Detects infeasible travel distances.
o Temporary Permissions: Time-limited access.
100
▪ Ephemeral Credentials: Temporary accounts or group memberships
created for specific tasks and then destroyed or disabled.
• Application to Service Accounts:
o **PAM also applies to service accounts, ensuring they are managed and monitored
similarly to human administrator accounts.
Key Points:
• Standard vs. Privileged Accounts:
o Standard Users: Limited privileges.
o Privileged Accounts: Significant configuration capabilities.
• Privileged Access Management (PAM):
o Purpose: Prevents account compromise.
o Account Restriction: Limits administrative accounts.
o Credential Management: Strong passwords, MFA, passwordless authentication.
o SAW: Secure workstations for admin tasks.
• Just-in-Time (JIT) Permissions:
o Zero Standing Privileges: No automatic elevated privileges.
o Models:
o Temporary Elevation: Limited period rights.
o Password Vaulting/Brokering: Time-limited account access.
o Ephemeral Credentials: Temporary accounts for specific tasks.
• Service Accounts:
o PAM Application: Managed and monitored like human accounts.
101
o Cryptographic Hashes: Passwords are stored as hashes to prevent compromise.
o Process: User-entered passwords are hashed and compared to stored hashes for
authentication.
• Windows Authentication:
o Local Sign-In:
▪ Component: Local Security Authority Subsystem Service (LSASS).
▪ Process: Compares credentials to hashes in the Security Accounts Manager
(SAM) database.
▪ Term: Also known as interactive logon.
o Network Sign-In:
▪ Component: LSASS passes credentials to an Active Directory (AD) domain
controller.
▪ Preferred System: Kerberos for network authentication.
▪ Legacy System: NT LAN Manager (NTLM) for older applications.
o Remote Sign-In:
▪ Usage: For devices not directly connected to the local network.
▪ Methods: Virtual private network (VPN), enterprise Wi-Fi, web portal.
▪ Protocols: Secure connection between client, remote access device, and
authentication server.
• Linux Authentication:
o Local Authentication:
▪ Storage: User account names in /etc/passwd.
▪ Password Check: Against hashes in /etc/shadow.
o Network Authentication:
▪ Method: Secure Shell (SSH).
▪ Authentication: Using cryptographic keys instead of passwords.
o Pluggable Authentication Module (PAM):
▪ Purpose: Enables different authentication providers (e.g., smart-card log-
in).
▪ Usage: Implements authentication to network directory services.
Key Points:
• Knowledge-Based Authentication:
o Hashes: Secure password storage.
102
o Comparison: User-entered password hashes vs. stored hashes.
• Windows Authentication:
o Local Sign-In: LSASS and SAM database.
o Network Sign-In: LSASS, AD domain controller, Kerberos, NTLM.
o Remote Sign-In: VPN, enterprise Wi-Fi, web portal.
• Linux Authentication:
o Local: /etc/passwd and /etc/shadow.
o Network: SSH and cryptographic keys.
o PAM: Supports various authentication providers.
Directory Services
Summary: Directory services store information about users, computers, security groups/roles, and
services. They use a schema to define attributes and are often based on the Lightweight Directory
Access Protocol (LDAP), derived from the X.500 standard. Distinguished names (DNs) uniquely
identify resources within the directory.
Detailed Explanation:
• Directory Service:
o Function: Stores information about various objects (users, computers, etc.).
o Attributes: Each object has attributes defined by the directory schema, which
specifies the type of information and whether it is required or optional.
o Interoperability: Most directory services use LDAP to ensure compatibility across
different vendors.
• Distinguished Name (DN):
o Definition: A unique identifier for resources within an X.500-like directory.
o Structure: Composed of attribute-value pairs, separated by commas.
o Relative Distinguished Name: The most specific attribute, uniquely identifying the
object within the context of broader attributes.
• Common Attributes:
o CN (Common Name): Identifies the specific object.
o OU (Organizational Unit): Represents a subdivision within an organization.
o O (Organization): The name of the organization.
o C (Country): The country code.
o DC (Domain Component): Components of the domain name.
103
• Example:
o Distinguished Name: CN=WIDGETWEB, OU=Marketing, O=Widget, C=UK,
DC=widget, DC=foo
o Explanation: This DN identifies a web server operated by Widget in the UK, within
the Marketing organizational unit.
Key Points:
• Directory Service:
o Stores Information: About users, computers, roles, and services.
o Schema: Defines attributes and their requirements.
o LDAP: Ensures vendor interoperability.
• Distinguished Name (DN):
o Unique Identifier: For resources.
o Structure: Attribute-value pairs.
o Relative Distinguished Name: Most specific attribute.
• Common Attributes:
o CN: Common Name.
o OU: Organizational Unit.
o O: Organization.
o C: Country.
o DC: Domain Component.
• Example:
o DN: CN=WIDGETWEB, OU=Marketing, O=Widget, C=UK, DC=widget, DC=foo
104
• Kerberos Protocol:
o Components: Clients, application servers, and a key distribution center (KDC).
o KDC Services: Authentication Service (AS) and Ticket Granting Service (TGS).
o Principals: Human users and application services.
• Kerberos Authentication Process:
o Step 1: Requesting a Ticket Granting Ticket (TGT):
▪ Principal Action: Sends a request to the AS, encrypting the date and time
with the user's password hash.
▪ AS Action: Verifies the user account, decodes the request, and checks for
expiration.
o Step 2: AS Response:
▪ Ticket Granting Ticket (TGT): Contains client information, time stamp, and
validity period, encrypted with the KDC's secret key.
▪ TGS Session Key: Used for communication between the client and TGS,
encrypted with the user's password hash.
• Logical Token:
o TGT: Identifies and confirms authentication but does not grant access to resources.
Key Points:
• Single Sign-on (SSO):
o Authentication: One-time authentication for multiple systems.
o Efficiency: Reduces the need for repeated credential entry.
• Kerberos Protocol:
o Components: Clients, application servers, KDC.
o KDC Services: AS and TGS.
o Principals: Users and services.
• Kerberos Authentication Process:
o Requesting TGT: Encrypts date and time with password hash.
o AS Verification: Checks user account and request validity.
o AS Response: Issues TGT and TGS session key.
• Logical Token:
o TGT: Confirms authentication, not resource access.
105
Single Sign-on Authorization
Summary: Single sign-on (SSO) authorization in Kerberos involves the client decrypting the Ticket
Granting Service (TGS) session key and using it to request service tickets for accessing application
servers. This process ensures mutual authentication between the client and the server, preventing
on-path attacks.
Detailed Explanation:
• Kerberos Authorization Process:
o Decrypting the TGS Session Key:
▪ Client Action: Decrypts the TGS session key but not the Ticket Granting
Ticket (TGT), establishing shared knowledge with the KDC.
o Requesting a Service Ticket:
▪ Principal Action: Sends the TGS a copy of the TGT, the name of the
application server, and an authenticator (time-stamped client ID encrypted
with the TGS session key).
▪ TGS Action: Decrypts the messages using the KDC's secret key and the TGS
session key, confirming the request's validity and checking for expiration or
replay attacks.
o TGS Response:
▪ Service Session Key: Encrypted with the TGS session key, used between the
client and the application server.
▪ Service Ticket: Contains principal information, encrypted with the
application server's secret key.
• Service Ticket Usage:
o Client Action: Forwards the service ticket and a time-stamped authenticator
(encrypted with the service session key) to the application server.
o Application Server Action: Decrypts the service ticket to obtain the service session
key, confirming the message's authenticity, and decrypts the authenticator.
o Optional Mutual Authentication: The server responds with the time stamp,
encrypted with the service session key, which the client decrypts to verify the
server's trustworthiness.
• Drawbacks and Solutions:
o Single Point of Failure: The KDC is a single point of failure, but backup KDC servers
can be implemented (e.g., multiple domain controllers in Active Directory).
Key Points:
• Kerberos Authorization Process:
o Decrypting TGS Session Key: Establishes shared knowledge with KDC.
o Requesting Service Ticket: Sends TGT, server name, and authenticator to TGS.
106
o TGS Response: Provides service session key and service ticket.
• Service Ticket Usage:
o Client Action: Forwards service ticket and authenticator to server.
o Server Action: Decrypts service ticket and authenticator.
o Mutual Authentication: Optional server response with time stamp.
• Drawbacks and Solutions:
o Single Point of Failure: KDC, mitigated by backup servers.
Federation
Summary: Federation allows a network to be accessible to external entities like partners, suppliers,
and customers by trusting accounts managed by different networks. This approach simplifies
account management and enables seamless authentication and authorization across different
platforms using claims-based identity protocols.
Detailed Explanation:
• Federation Concept:
o Definition: Extends network access beyond a well-defined group of employees to
external entities.
o Business Example: A company opens parts of its network to partners, suppliers,
and customers, trusting accounts managed by other networks.
o Consumer Example: Users can log into services like Twitter using credentials from
another service like Google Workspace.
• On-Premises vs. Federated Networks:
o On-Premises Networks: Use technologies like LDAP and Kerberos, often
implemented in Windows Active Directory, for centralized account and device
management.
o Federated Networks: Require additional protocols and frameworks to ensure
interoperability between different platforms, as web applications and third-party
networks may not support direct federation with Active Directory/LDAP.
• Claims-Based Identity:
o Process:
▪ Access Request: The principal (user) attempts to access a service provider
(SP).
▪ Redirection: The SP redirects the principal to an identity provider (IdP) for
authentication.
▪ Authentication: The principal authenticates with the IdP and obtains a
claim (token or document signed by the IdP).
107
▪ Claim Presentation: The principal presents the claim to the SP.
▪ Validation: The SP validates the claim using its trust relationship with the
IdP.
▪ Authorization: The SP connects the authenticated principal to its accounts
database to determine permissions and attributes, possibly querying
additional attributes from the IdP if authorized.
Key Points:
• Federation Concept:
o Network Access: Extends to external entities.
o Business and Consumer Examples: Trusts accounts from other networks.
• On-Premises vs. Federated Networks:
o On-Premises: Centralized management with LDAP/Kerberos.
o Federated: Requires interoperability protocols.
• Claims-Based Identity:
o Access Request: Principal attempts to access SP.
o Redirection: SP redirects to IdP.
o Authentication: Principal authenticates with IdP.
o Claim Presentation: Principal presents claim to SP.
o Validation: SP validates claim.
o Authorization: SP determines permissions and attributes.
108
o Security: Tokens are signed using the XML signature specification, allowing the
relying party to trust the identity provider.
• Example Implementation:
o Amazon Web Services (AWS): Functions as a SAML service provider, enabling
companies to manage user identities and permissions without creating direct
accounts on AWS.
• SAML Response Example:
<samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"
xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" ID="200" Version="2.0"
IssueInstant="2020-01-01T20:00:10Z" Destination="https://sp.foo/saml/acs" InResponseTo="100">
<saml:Issuer>https://idp.foo/sso</saml:Issuer>
<ds:Signature>...</ds:Signature>
<samlp:Status>...(success)...</samlp:Status>
<saml:Assertion xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:xs="http://www.w3.org/2001/XMLSchema" ID="2000" Version="2.0"
IssueInstant="2020-01-01T20:00:09Z">
<saml:Issuer>https://idp.foo/sso</saml:Issuer>
<ds:Signature>...</ds:Signature>
<saml:Subject>...
<saml:Conditions>...
<saml:AudienceRestriction>...
<saml:AuthnStatement>...
<saml:AttributeStatement>
<saml:Attribute>...
<saml:Attribute>...
</saml:AttributeStatement>
</saml:Assertion>
</samlp:Response>
Key Points:
• Federated Network Requirements:
o User Identity Assertions: Implemented using SAML.
o Protocol: SAML for transmitting claims.
109
• SAML Assertions:
o XML Format: Written in XML.
o Communication: HTTP/HTTPS and SOAP.
o Security: Digital signatures for trust.
• Example Implementation:
o AWS: SAML service provider for managing user identities and permissions.
• SAML Response Example:
o Structure: XML format with elements like <samlp:Response>, <saml:Issuer>,
<ds:Signature>, and <saml:Assertion>.
110
o Client ID and Secret: ID is public; secret is confidential.
• Authorization Process:
o Request: Client requests authorization; user approves via the authorization server.
o Grant Types/Flows: Different contexts (e.g., server to server, mobile app to server).
o Access Token: Validated by the authorization server, presented to the resource
server for access.
• JSON Web Token (JWT):
o Format: Used for claims data in OAuth.
o Transmission: Passed as Base64-encoded strings in URLs and HTTP headers.
o Security: Can be digitally signed for authentication and integrity.
Key Points:
• RESTful APIs:
o Flexibility: More implementation choices.
o Mobile Support: Better than SOAP/SAML.
• OAuth Protocol:
o Purpose: Share user profile information securely.
o User Account: Linked to OAuth consumer sites.
o Authorization: Granted to OAuth clients.
• Components:
o Resource Server: Hosts API functions.
o Authorization Server: Manages authorization requests.
• Client Registration:
o Redirect URL: Endpoint for authorization tokens.
o Client ID/Secret: ID is public; secret is confidential.
• Authorization Process:
o Request and Approval: User approves client request.
o Grant Types: Various contexts.
o Access Token: Validated and used for resource access.
• JSON Web Token (JWT):
o Format: For claims data.
o Transmission: Base64-encoded strings.
111
o Security: Digitally signed.
112
▪ Unauthorized Access: Unauthorized users and devices must be denied
access.
o Email Mailbox Server:
▪ Data Storage: Stores data assets and must be accessed only by authorized
clients.
▪ Availability: Must be fully available and fault-tolerant to support genuine
users.
▪ Dependencies: Must run with minimal dependencies over resilient network
infrastructure.
o Mail Transfer Server:
▪ Untrusted Hosts: Connects with untrusted Internet hosts, requiring
controlled communications between untrusted networks and trusted LAN.
▪ Policy-Based Controls: Data or software leaving or entering the network
must be subject to policy-based controls.
Key Points:
• Network Architecture:
o Selection and Placement: Media, devices, protocols/services, data assets.
o Components: Infrastructure, applications, data assets.
• Secure Network Infrastructure:
o Support Workflows: Ensures confidentiality, integrity, availability.
o Example: Customer order processing.
• Email Provisioning Systems:
o Access:
▪ Client Device: Physical channel, logical address.
▪ User Authentication: Authorized access.
▪ Unauthorized Access: Denied access.
o Email Mailbox Server:
▪ Data Storage: Authorized access only.
▪ Availability: Fault-tolerant, minimal dependencies.
o Mail Transfer Server:
▪ Untrusted Hosts: Controlled communications.
▪ Policy-Based Controls: Data/software control.
113
Network Infrastructure
Summary: Network infrastructure is analyzed using a layer model, such as the OSI model. It
consists of nodes and links, with nodes being either hosts or intermediaries. Hosts initiate data
transfers, while intermediaries forward traffic. Networks are categorized as LANs or WANs based
on their scope. Addressing and forwarding functions are managed by various network appliances
and protocols across different OSI layers.
Detailed Explanation:
• Layer Model:
o OSI Model: Defines layers of network functions.
o Physical (PHY) Layer (Layer 1): Links implemented as twisted-pair cables, fiber
optic cables, or wireless devices.
• Nodes and Links:
o Host Nodes: Initiate data transfers (servers or clients).
o Intermediary Nodes: Forward traffic around the network.
o Network Scope:
▪ Local Area Network (LAN): Single site.
▪ Wide Area Network (WAN): Metropolitan, country-wide, or global scope.
• Addressing and Forwarding:
o Unique Addressing: Each network node must have a unique address.
o Different Layers and Scopes: Addressing functions occur at different layers with
different scopes.
• Network Appliances and Protocols:
o Switches:
▪ Function: Forward frames between nodes in a cabled network.
▪ Layer: Work at layer 2 of the OSI model.
▪ Addressing: Use MAC addresses (48-bit value in hexadecimal notation).
▪ Broadcast Domain: Addressing works within the local network segment.
o Wireless Access Points:
▪ Function: Bridge between cabled network and wireless hosts.
▪ Layer: Work at layer 2 of the OSI model.
▪ Addressing: Use MAC addressing.
o Routers:
▪ Function: Send packets around an internetwork.
114
▪ Layer: Work at layer 3 of the OSI model.
▪ Default Gateway: Acts as a default gateway for hosts to send packets to
other segments.
o Transport Protocols:
▪ TCP: Establishes reliable connections.
▪ UDP: Allows unreliable, connectionless transfers.
▪ Layer: Defined at layer 4 of the OSI model.
▪ Ports: Each application protocol identified by a TCP or UDP port.
o Application Protocols:
▪ Function: Support client/server functionality for user-level services (e.g.,
web browsing, email, file transfer).
▪ Layer: Work at layer 7 of the OSI model.
o Domain Name System (DNS):
▪ Function: Host name records and perform name resolution.
▪ Layer: Works at layer 7 of the OSI model.
▪ Service Type: Infrastructure service, not user-level service.
Key Points:
• Layer Model:
o OSI Model: Defines network functions.
o Physical Layer: Twisted-pair cables, fiber optic cables, wireless devices.
• Nodes and Links:
o Host Nodes: Servers or clients.
o Intermediary Nodes: Forward traffic.
o Network Scope: LANs and WANs.
• Addressing and Forwarding:
o Unique Addressing: Different layers and scopes.
• Network Appliances and Protocols:
o Switches: Layer 2, MAC addresses, broadcast domain.
o Wireless Access Points: Layer 2, MAC addressing.
o Routers: Layer 3, default gateway.
o Transport Protocols: TCP (reliable), UDP (unreliable), layer 4.
o Application Protocols: Layer 7, user-level services.
115
o DNS: Layer 7, infrastructure service.
116
o Client Workstations: Connect via wall ports and patch panels.
o Servers and Core Appliances: Installed in a secure area, connected directly to
switch ports using patch cables.
Key Points:
• Network Infrastructure Function:
o Forwarding Traffic: Nodes and topology.
• On-Premises Network:
o Enterprise LAN: Single site, single company.
o Structured Cabling: Wall ports, patch cables, star topology, broadcast domain.
• Issues with Star Topology:
o Performance: Broadcast domains.
o Security: Flat network segment.
• Hierarchical Design:
o Forwarding Layers: Access switches, routers, broadcast domains, zone-based
security.
• Layer 3 Switches:
o Routing and Switching: Core network role.
• Equipment Room:
o Client Workstations: Wall ports, patch panels.
o Servers and Core Appliances: Secure area, direct connections.
117
o IPv4 Addressing:
▪ 32-bit Address: Written in dotted decimal notation.
▪ Network Prefix/Subnet Mask: Divides address into network ID and host
ID.
▪ Example: 10.1.1.0/24 (network ID: 10.1.1.x, host ID: x).
o IPv6 Addressing:
▪ 128-bit Address: Written in hex notation.
▪ Hierarchy: First 64-bits for network information, last 64-bits for host's
interface ID.
▪ Example: 2001:db8::abc:0:def0:1234.
• Address Resolution:
o IPv4: Uses Address Resolution Protocol (ARP) to map IP to MAC address.
o IPv6: Uses Neighbor Discovery (ND) protocol for the same purpose.
• Virtual LANs (VLANs):
o Logical IP Topology: Mapped to physical hardware switches.
o VLAN IDs: Value from 2 to 4,094.
o Port Assignment: Any switch port can be assigned to a specific VLAN.
o Layer 2 Domains: Each VLAN is a separate Layer 2 domain.
o Layer 3 Mapping: VLANs mapped to IP subnets at Layer 3.
• Example:
o Access Block: Uses VLANs to segment workstation hosts (VLAN32) from VoIP
handsets (VLAN40).
o Subnets: 10.1.32.0/24 and 10.1.40.0/24.
o Router Usage: Required for communication between VLANs.
o Access Control: Rules on the router can prevent risky communication.
• Extended VLAN Topology:
o Multiple Switches: VLAN topology can extend across multiple switches.
o Office Expansion: Same VLAN IDs and subnets configured for different floors.
Key Points:
• Layer 3 Forwarding:
o Logical Addressing: Networks and subnets.
o Broadcast Domains: Separate for each subnet.
118
• Internet Protocol:
o IPv4: 32-bit, dotted decimal, network prefix/subnet mask.
o IPv6: 128-bit, hex notation, hierarchical addressing.
• Address Resolution:
o IPv4: ARP.
o IPv6: ND protocol.
• Virtual LANs (VLANs):
o Logical to Physical Mapping: VLAN IDs, port assignment.
o Layer 2 Domains: Separate for each VLAN.
o Layer 3 Mapping: VLANs to IP subnets.
• Example:
o Access Block: VLAN32 (workstations), VLAN40 (VoIP).
o Subnets: 10.1.32.0/24, 10.1.40.0/24.
o Router: Required for inter-VLAN communication.
o Access Control: Router rules for security.
• Extended VLAN Topology:
o Multiple Switches: Same VLAN IDs and subnets across floors.
Security Zones
Summary: Security zones are created by segmenting network architecture into subnets, allowing
for a zone-based security topology. On-premises networks have a clear boundary at the network
perimeter, with varying levels of trust and access control within. Zones are defined based on similar
access control requirements to ensure confidentiality, integrity, and availability.
Detailed Explanation:
• Zone-Based Security Topology:
o Network Perimeter: Clear organizational boundary.
o Public Internet Zone: Hosts outside the perimeter, untrusted.
o Internal Zones: Different levels of trust and access control.
• Mapping Internal Security Topology:
o Systems and Data Assets: Identify workflows with similar access control
requirements.
o Database and File Systems:
119
▪ Priority: Confidentiality and integrity.
▪ Segmentation: Separate different types of data to reduce breach impact.
o Client Devices:
▪ Priority: Integrity and availability.
▪ Data Storage: Should not store data, lower confidentiality requirement.
o Public-Facing Application Servers:
▪ Priority: Integrity and availability.
▪ Data Storage: Should not store sensitive data.
▪ Trust Level: Not fully trusted.
o Network Infrastructure Application Servers:
▪ Priority: High levels of confidentiality, integrity, and availability.
▪ Impact: Compromise could have catastrophic impacts.
• Security Zones Creation:
o Segregation: Physical and/or logical segmentation.
o Traffic Control: Use security devices (e.g., firewalls) to control traffic between
zones.
o Principle of Least Privilege: Apply traffic policies.
• Trusted Hosts:
o Administrative Control: Subject to security mechanisms (antivirus, user rights,
software updates).
• Zone Entry and Exit Points:
o Known Points: Authorized access points (e.g., routers).
o Security Violations: Unauthorized devices (e.g., wireless access points) within
zones.
• Access Control Examples:
o Low Privilege Zone: Hosts (e.g., printers) can accept connections but not initiate
requests.
o Client Devices: Can make authorized requests but not accept new connections.
o Guest Zone: Access to the Internet, no access to enterprise LAN.
o Public-Facing Servers: Accept requests from the Internet, cannot initiate requests
to LAN or Internet.
o VLANs within Zones: Additional access rules (e.g., app servers to databases).
Key Points:
120
• Zone-Based Security Topology:
o Network Perimeter: Public Internet zone, internal zones.
o Internal Zones: Different trust and access control levels.
• Mapping Internal Security Topology:
o Systems and Data Assets: Similar access control requirements.
o Database and File Systems: Confidentiality, integrity, segmentation.
o Client Devices: Integrity, availability, lower confidentiality.
o Public-Facing Servers: Integrity, availability, not fully trusted.
o Infrastructure Servers: High confidentiality, integrity, availability.
• Security Zones Creation:
o Segregation: Physical/logical.
o Traffic Control: Security devices, least privilege.
• Trusted Hosts:
o Administrative Control: Security mechanisms.
• Zone Entry and Exit Points:
o Authorized Points: Known entry/exit.
o Security Violations: Unauthorized devices.
• Access Control Examples:
o Low Privilege Zone: Accept connections, not initiate.
o Client Devices: Authorized requests, no new connections.
o Guest Zone: Internet access, no LAN access.
o Public-Facing Servers: Accept requests, no initiation.
o VLANs within Zones: Additional rules.
Attack Surface
Summary: The network attack surface includes all points where a threat actor could gain access to
hosts and services. Analyzing the attack surface using the layer model helps identify potential
vulnerabilities at different network layers. Security controls must be implemented at each layer to
prevent, detect, and correct attacks, following the principle of defense in depth.
Detailed Explanation:
• Layer Model Analysis:
o Layer 1/2:
121
▪ Unauthorized Access: Connect to wall ports or wireless networks.
▪ Communication: With hosts within the same broadcast domain.
o Layer 3:
▪ Network Address: Obtain a valid network address, possibly by spoofing.
▪ Communication: With hosts in other zones.
o Layer 4/7:
▪ Connections: Establish connections to TCP or UDP ports.
▪ Communication: With application layer protocols and services.
• External/Public vs. Internal/Private Attack Surface:
o External/Public: Points of access from outside the network.
o Internal/Private: Points of access within the network.
• Security Controls:
o Defense in Depth: Multiple control categories and functions for layered protection.
o Network Perimeter: Controls to prevent external attacks.
o Segregated Zones: Mitigate risks from compromised or unauthorized internal
hosts.
• Common Weaknesses in Network Architecture:
o Single Points of Failure:
▪ Definition: Reliance on a single hardware server, appliance, or network
channel.
o Complex Dependencies:
▪ Definition: Services requiring many different systems to be available.
▪ Impact: Failure of individual systems should not affect overall network
performance.
o Availability Over Confidentiality and Integrity:
▪ Definition: Taking shortcuts to get services running, compromising security.
▪ Impact: Creates long-term risks.
o Lack of Documentation and Change Control:
▪ Definition: Adding segments, appliances, and services without proper
procedures.
▪ Impact: Lack of visibility into network constitution.
o Overdependence on Perimeter Security:
122
▪ Definition: Flat network architecture allowing any host to contact any other
host.
▪ Impact: Penetrating the network edge gives attackers freedom of movement.
Key Points:
• Layer Model Analysis:
o Layer 1/2: Unauthorized access to wall ports/wireless networks.
o Layer 3: Obtain valid network address, communicate with other zones.
o Layer 4/7: Establish connections to TCP/UDP ports, communicate with application
protocols.
• External/Public vs. Internal/Private Attack Surface:
o External/Public: Outside network access points.
o Internal/Private: Inside network access points.
• Security Controls:
o Defense in Depth: Layered protection.
o Network Perimeter: Prevent external attacks.
o Segregated Zones: Mitigate internal risks.
• Common Weaknesses:
o Single Points of Failure: Reliance on single hardware/server.
o Complex Dependencies: Multiple systems required.
o Availability Over Security: Shortcuts compromising security.
o Lack of Documentation: Poor change control.
o Overdependence on Perimeter Security: Flat network architecture.
Port Security
Summary: Port security involves securing wall and switch ports to prevent unauthorized devices
from connecting to the network. Methods include physical security measures, MAC filtering, and
802.1X authentication. These measures help protect the network from various attacks by ensuring
only authorized devices and users can access network resources.
Detailed Explanation:
• Physical Security Measures:
o Restricted Access: Limit access to physical switch ports and hardware to
authorized staff.
o Secure Locations: Place switch appliances in secure server rooms or lockable
cabinets.
123
o Disable Ports: Administratively disable switch ports or remove patch cables to
prevent unauthorized connections.
o Limitations: Complete port disabling can be administratively burdensome and not
foolproof.
• MAC Filtering and MAC Limiting:
o MAC Address Identification: Each host computer's network adapter has a unique
MAC address.
o MAC Filtering: Configure switch ports to permit only certain MAC addresses.
o MAC Limiting: Specify a limit to the number of permitted MAC addresses per port.
o Example: Enable port security with a maximum of two MAC addresses; the switch
records the first two MACs and drops traffic from other MAC addresses.
• 802.1X and Extensible Authentication Protocol (EAP):
o Challenges with MAC Filtering: Difficult to manage and prone to spoofing.
o 802.1X PNAC Standard: Requires authentication before granting full network
access.
o AAA Architecture:
▪ Supplicant: Device requesting access (e.g., user's PC or laptop).
▪ Authenticator: Switching device acting as a conduit for authentication data.
▪ Authentication Server: Validates authentication requests, issues
authorizations, and performs accounting.
o Protocols:
▪ EAP: Framework for multiple authentication methods, often using digital
certificates.
▪ RADIUS: Allows communication of authentication and authorization
decisions between authenticator and authentication server.
o Authentication Process: Host connects to 802.1X-enabled switch port, switch
opens port for EAPoL protocol, sends encrypted EAP packet to authentication server
via RADIUS, server validates credentials, and grants full network access if successful.
Key Points:
• Physical Security Measures:
o Restricted Access: Authorized staff only.
o Secure Locations: Server rooms, lockable cabinets.
o Disable Ports: Administrative disabling, patch cable removal.
o Limitations: Administrative overhead, not foolproof.
• MAC Filtering and MAC Limiting:
124
o MAC Address Identification: Unique MAC addresses.
o MAC Filtering: Permit specific MAC addresses.
o MAC Limiting: Limit number of MAC addresses per port.
o Example: Maximum of two MAC addresses.
• 802.1X and EAP:
o Challenges with MAC Filtering: Management, spoofing.
o 802.1X PNAC Standard: Authentication before access.
o AAA Architecture: Supplicant, authenticator, authentication server.
o Protocols: EAP, RADIUS.
o Authentication Process: EAPoL protocol, encrypted EAP packet, RADIUS
communication, credential validation.
Physical Isolation
Summary: Physical isolation involves disconnecting security-critical hosts from any network to
prevent unauthorized access. Air-gapped hosts and networks are examples where no cabled or
wireless connections exist to other networks. This method enhances security but presents
significant management challenges.
Detailed Explanation:
• Air-Gapped Hosts:
o Definition: Hosts not physically connected to any network.
o Examples:
▪ Root Certification Authority: In Public Key Infrastructure (PKI).
▪ Malware Analysis Host: Used to analyze malware execution.
• Air-Gapped Networks:
o Definition: Hosts within the network can communicate, but there is no connection
to other networks.
o Usage: Military bases, government sites, industrial facilities.
• Management Challenges:
o Local Administration: Device administration must be performed at a local
terminal.
o Updates and Installs: Performed using USB or optical media.
o Security Risks: Media used for updates/installations must be scanned to prevent
introducing malware.
Key Points:
125
• Air-Gapped Hosts:
o Definition: No network connection.
o Examples: Root Certification Authority, malware analysis host.
• Air-Gapped Networks:
o Definition: No cabled/wireless connection to other networks.
o Usage: Military, government, industrial.
• Management Challenges:
o Local Administration: At local terminal.
o Updates and Installs: Via USB/optical media.
o Security Risks: Scan media before use.
Architecture Considerations
Summary: When evaluating network architecture and selecting effective controls, consider factors
such as cost, compute and responsiveness, scalability, availability, resilience, power, patch
availability, and risk transference. These factors help ensure the architecture meets performance,
security, and operational requirements.
Detailed Explanation:
• Cost:
o Up-Front Capital Outlay: Includes architecture changes, acquisition, and upgrades
of appliances and software.
o Depreciation: Assets lose value over time.
o Maintenance and Support: Ongoing liabilities.
o Investment Value: Calculated based on reduced losses from incidents.
• Compute and Responsiveness:
o Minimize Processing Time: Ensure acceptable response time for workloads.
o Resources: Sufficient CPU, system memory, storage, and network bandwidth.
o Cost: Higher compute resources incur greater costs.
• Scalability and Ease of Deployment:
o Minimize Costs: When workloads increase or decrease.
o Capital Costs: Difficult to recover if workloads decrease.
o Deployment: Challenging to deploy new nodes or upgrade existing ones if
workloads increase.
126
o Scalable System: Quickly or automatically adds/removes compute resources
without excessive costs.
• Availability:
o Minimize Downtime: Maximize uptime.
o Impact: Downtime damages reputation, revenue, and profitability.
o Causes: Planned maintenance, unplanned failures, security incidents.
• Resilience and Ease of Recovery:
o Recovery Time: Reduce time to recover from failures.
o Manual Intervention: Systems that recover without manual intervention are more
resilient.
• Power:
o Energy Demands: Facility must meet energy demands of devices and workloads.
o Cost: Higher compute resources increase power usage and costs.
o Infrastructure: Minimize power failures to improve availability.
• Patch Availability:
o Protection: Ensure firmware and software are protected against known
vulnerabilities.
o Third-Party Management: Challenges when relying on third parties or
unsupported devices/software.
• Risk Transference:
o Third-Party Management: Use contracts to manage network infrastructure.
o SLA: Define penalties for not meeting metrics for responsiveness, scalability,
availability, and resilience.
• On-Premises Networks:
o High Capital Costs: Low scalability.
o Bandwidth Increase: Difficult to upgrade (e.g., from 1 Gbps to 10 Gbps).
o Recovery Procedures: Complex in large-scale disasters.
o Availability and Resilience: Lower compared to cloud networking.
Key Points:
• Cost:
o Capital Outlay: Acquisition, upgrades, depreciation.
o Maintenance: Ongoing support.
• Compute and Responsiveness:
127
o Processing Time: CPU, memory, storage, bandwidth.
o Cost: Higher resources, higher costs.
• Scalability and Deployment:
o Cost Management: Workload changes.
o Scalable System: Add/remove resources efficiently.
• Availability:
o Downtime: Minimize, maximize uptime.
o Impact: Reputation, revenue.
• Resilience and Recovery:
o Recovery Time: Manual vs. automatic.
• Power:
o Energy Demands: Costs, infrastructure.
• Patch Availability:
o Protection: Against vulnerabilities.
o Third-Party Challenges: Unsupported devices/software.
• Risk Transference:
o Third-Party Management: Contracts, SLA.
• On-Premises Networks:
o Capital Costs: Scalability, bandwidth upgrades.
o Recovery: Disaster complexity.
o Availability and Resilience: Compared to cloud networking.
Device Placement
Summary: Effective control selection for network infrastructure involves choosing the type and
placement of security appliances and software to enforce segmentation, apply access controls, and
monitor traffic for policy violations. This is guided by the principle of defense in depth, which
includes preventive, detective, and corrective controls at each OSI model layer.
Detailed Explanation:
• Defense in Depth:
128
o Principle: Security-critical zones are protected by diverse controls at each OSI
model layer.
o Device Placement: Ensures defense in depth through strategic placement within
the network topology.
• Types of Controls:
o Preventive Controls:
▪ Placement: At the border of a network segment or zone.
▪ Examples: Firewalls to enforce security policies, load balancers for high
availability.
o Detective Controls:
▪ Placement: Within the perimeter to monitor internal traffic.
▪ Examples: Intrusion detection systems (IDS) to alert on malicious traffic.
o Corrective Controls:
▪ Placement: Within the traffic to correct detected errors or irregularities.
▪ Examples: Load balancers to mitigate denial of service attacks.
• Endpoint Protection:
o Additional Layer: Preventive, detective, and corrective controls installed on hosts.
o Examples: Host firewalls, anti-virus, intrusion detection, data loss prevention.
• Illustration of Control Placement:
o Network Border:
▪ Preventive Control: Firewall enforcing ingress and egress traffic rules.
o Inline Sensor:
▪ Detective Control: Relays traffic to IDS to identify malicious traffic.
o Internal Routers:
▪ Access Control Lists: Enforce rules for traffic between internal zones and
hosts.
o Public-Facing Servers:
▪ Corrective Control: Load balancer mediates incoming traffic, mitigates
denial of service attacks.
o Mirrored Switch Ports:
▪ Sensors: Enable intrusion detection for sensitive hosts or zones.
o Hosts:
129
▪ Endpoint Protection Software: Applies preventive, detective, and
corrective controls.
Key Points:
• Defense in Depth:
o Principle: Diverse controls at each OSI model layer.
o Device Placement: Strategic within network topology.
• Types of Controls:
o Preventive: Firewalls, load balancers.
o Detective: Intrusion detection systems.
o Corrective: Load balancers for attack mitigation.
• Endpoint Protection:
o Additional Layer: Host firewalls, anti-virus, IDS, data loss prevention.
• Illustration of Control Placement:
o Network Border: Firewall.
o Inline Sensor: IDS.
o Internal Routers: Access control lists.
o Public-Facing Servers: Load balancer.
o Mirrored Switch Ports: Intrusion detection sensors.
o Hosts: Endpoint protection software.
Device Attributes
Summary: Device attributes determine how a device can be placed within the network topology.
Key attributes include whether a device is active or passive, its deployment method (inline or
monitor), and its fail mode (fail-open or fail-closed). These attributes influence the device's role in
enforcing security controls and maintaining network integrity.
Detailed Explanation:
• Active vs. Passive:
o Passive Security Control:
▪ Definition: Does not require client or agent configuration or host data
transfer.
▪ Example: Network traffic directed to a sensor and scanned by an analysis
engine.
▪ Characteristics: No addressable interface, hosts unaware of its operation.
130
o Active Security Control:
▪ Definition: Requires configuration with credentials and access permissions.
▪ Example: Scanning or filtering controls.
▪ Characteristics: Hosts must be explicitly configured to use the control, may
involve installing agent software or configuring network settings.
• Inline Devices and Monitor Methods:
o Inline Device:
▪ Definition: Becomes part of the cable path without changes in IP or routing
topology.
▪ Characteristics: Interfaces not configured with MAC or IP addresses.
▪ Traffic Copying: Can copy network traffic to a monitor or sensor.
o Monitor Methods:
▪ Test Access Point (TAP):
▪ Definition: Inline device with ports for incoming/outgoing network
cabling.
▪ Function: Physically copies the signal to a monitor port.
▪ Characteristics: Receives every frame, unaffected by load.
▪ SPAN/Mirror Port:
▪ Definition: Sensor attached to a specially configured mirror port on
a switch.
▪ Function: Receives copies of frames addressed to nominated access
ports.
▪ Characteristics: Not completely reliable, frames with errors not
mirrored, may drop frames under heavy load.
• Fail-Open vs. Fail-Closed:
o Fail-Open:
▪ Definition: Network or host access is preserved during failure.
▪ Priority: Availability over confidentiality and integrity.
▪ Risk: Threat actor could engineer a failure state to defeat the control.
o Fail-Closed:
▪ Definition: Access is blocked or system enters the most secure state during
failure.
▪ Priority: Confidentiality and integrity over availability.
▪ Risk: System downtime.
131
o Configuration: May or may not be possible to configure the fail mode.
▪ Example: Inline security appliance with power failure will fail-closed unless
there is an alternative network path.
Key Points:
• Active vs. Passive:
o Passive: No client configuration, no addressable interface.
o Active: Requires configuration, explicit host setup.
• Inline Devices and Monitor Methods:
o Inline Device: Part of cable path, no IP/MAC addresses.
o Monitor Methods:
▪ TAP: Physical signal copy, unaffected by load.
▪ SPAN/Mirror Port: Frame copies, not completely reliable.
• Fail-Open vs. Fail-Closed:
o Fail-Open: Preserves access, prioritizes availability.
o Fail-Closed: Blocks access, prioritizes security.
o Configuration: Depends on device capabilities.
Firewalls
Summary: A firewall is a preventive control designed to enforce policies on traffic entering and
exiting a network zone. It can be configured using access control lists (ACLs) to filter packets based
on IP addresses, protocols, and port numbers. Firewalls can be implemented as hardware
appliances or software and can be placed at various points in the network to protect different zones.
Detailed Explanation:
• Packet Filtering:
o Access Control List (ACL): Group of rules defining data packet types and actions.
o Inspection: Headers of IP packets are inspected.
o Rules:
▪ IP Filtering: Based on source and/or destination IP address.
▪ Protocol ID/Type: Identifies protocol (e.g., TCP, UDP, ICMP).
▪ Port Filtering/Security: Based on source and destination TCP/UDP port
numbers.
o Actions:
▪ Accept/Permit: Allows packet to pass.
132
▪ Drop/Deny: Silently discards the packet.
▪ Reject: Blocks packet and responds with an ICMP message (e.g., "port
unreachable").
• Firewall Device Placement and Attributes:
o Implementation: Hardware appliances or software on general computing hosts.
o Placement:
▪ Network Edge/Zonal Borders: Protects network segments.
▪ Individual Hosts: Protects specific devices.
o Types of Appliance Firewalls:
▪ Routed (Layer 3):
▪ Function: Performs forwarding between subnets.
▪ Interfaces: Each connects to a different subnet, configured with IP
and MAC addresses.
▪ Bridged (Layer 2):
▪ Function: Inspects traffic between two nodes (e.g., router and
switch).
▪ Interfaces: Configured with MAC addresses, not IP addresses.
▪ Inline (Layer 1):
▪ Function: Acts as a cable segment.
▪ Interfaces: No MAC or IP addresses, traffic is blocked or forwarded.
o Transparent Modes:
▪ Definition: Bridged and inline modes, no need to reconfigure subnets or IP
addresses.
▪ Use Case: Deploying a firewall without changing host IP addresses.
o Management Interface:
▪ Transparent Firewall: Needs an additional interface with an IP address.
▪ Routed Firewall: Can have a dedicated management interface or accept
management traffic on any interface.
• Router Firewalls:
o Definition: Implements filtering as part of router firmware.
o Example: SOHO Internet routers/modems with built-in firewalls.
Key Points:
• Packet Filtering:
133
o ACL: Defines rules for packet types and actions.
o Inspection: IP headers.
o Rules: IP filtering, protocol ID/type, port filtering.
o Actions: Accept, drop, reject.
• Firewall Device Placement and Attributes:
o Implementation: Hardware or software.
o Placement: Network edge, zonal borders, individual hosts.
o Appliance Firewalls:
▪ Routed: Layer 3, subnets, IP/MAC addresses.
▪ Bridged: Layer 2, nodes, MAC addresses.
▪ Inline: Layer 1, cable segment, no addresses.
o Transparent Modes: Bridged, inline, no subnet/IP reconfiguration.
o Management Interface: Transparent needs additional IP interface, routed can have
dedicated or any interface.
• Router Firewalls:
o Definition: Filtering in router firmware.
134
▪ Packet Handling: Check if a packet belongs to an existing connection; apply
filtering rules if not.
▪ Efficiency: Allow traffic to pass unmonitored once a connection is
established.
• Layer 4 Firewalls:
o OSI Layer: Transport layer.
o TCP Handshake: Examines SYN > SYN/ACK > ACK sequence to distinguish new
from established connections.
o Anomaly Detection: Drops packets with sequence anomalies or malicious flooding
attempts.
o Response: Can block source IP addresses and throttle sessions.
o UDP Traffic: Tracks UDP traffic, though more challenging due to connectionless
nature.
o Additional Detection: IP header and ICMP anomalies.
• Layer 7 Firewalls:
o OSI Layer: Application layer.
o Packet Inspection: Inspects headers and payloads of application-layer packets.
o Protocol Verification: Ensures application protocol matches the expected port.
o Threat Detection: Analyzes HTTP headers and webpage formatting to identify
threats.
o Application-Aware Firewalls: Also known as application layer gateway, stateful
multilayer inspection, and deep packet inspection.
o Configuration: Separate filters for each type of traffic (HTTP, HTTPS,
SMTP/POP/IMAP, FTP).
Key Points:
• Stateless vs. Stateful Firewalls:
o Stateless: Independent packet analysis, vulnerable to multi-packet attacks.
o Stateful: Tracks sessions, uses state table, efficient traffic handling.
• Layer 4 Firewalls:
o Transport Layer: TCP handshake, anomaly detection.
o Response: Block IPs, throttle sessions.
o UDP Traffic: Connectionless tracking, IP/ICMP anomalies.
• Layer 7 Firewalls:
o Application Layer: Header and payload inspection.
135
o Protocol Verification: Matches application protocol to port.
o Threat Detection: Analyzes HTTP headers, webpage formatting.
o Application-Aware: Multiple names, separate traffic filters.
Proxy Servers
Summary: Proxy servers perform application layer filtering by deconstructing, analyzing, and
rebuilding packets before forwarding them. They can be forward proxies, handling outbound traffic,
or reverse proxies, handling inbound traffic. Proxies enhance security, manage traffic, and can
provide caching for frequently requested content.
Detailed Explanation:
• Proxy Server Function:
o Store-and-Forward Model: Deconstructs, analyzes, and rebuilds packets.
o Rebuilding: Varies by proxy type (IP/TCP headers, HTTP headers, deep packet
inspection).
• Forward Proxy Servers:
o Outbound Traffic: Handles protocol-specific outbound traffic (e.g., web proxy for
TCP ports 80 and 443).
o Benefits:
▪ Traffic Management: Clients connect to a specified point on the perimeter
network.
▪ Security: Provides a degree of security.
▪ Caching: Retains frequently requested webpages to reduce re-fetching.
o Application Understanding: Must parse and modify application-specific
commands (e.g., HTTP).
o Types:
▪ Non-Transparent Proxy: Client configured with proxy server address and
port (e.g., TCP/8080).
▪ Transparent Proxy: Intercepts client traffic without reconfiguration,
implemented as a router or inline appliance.
o Authentication: Can require user authentication, often using single sign-on (SSO).
o Configuration:
▪ PAC Script: Allows automatic proxy configuration.
▪ WPAD Protocol: Allows browsers to locate a PAC file.
• Reverse Proxy Servers:
136
o Inbound Traffic: Handles protocol-specific inbound traffic.
o Deployment: Typically on the network edge, listening for client requests from a
public network.
o Filtering Rules: Applies rules and forwards accepted requests to an application
server within a secured subnet.
Key Points:
• Proxy Server Function:
o Store-and-Forward: Deconstruct, analyze, rebuild packets.
o Rebuilding: Varies by proxy type.
• Forward Proxy Servers:
o Outbound Traffic: Protocol-specific (e.g., web proxy).
o Benefits: Traffic management, security, caching.
o Application Understanding: Parse and modify commands.
o Types:
▪ Non-Transparent: Client configuration required.
▪ Transparent: Intercepts traffic, no reconfiguration.
o Authentication: User authentication, SSO.
o Configuration: PAC script, WPAD protocol.
• Reverse Proxy Servers:
o Inbound Traffic: Protocol-specific.
o Deployment: Network edge.
o Filtering Rules: Applies and forwards accepted requests.
137
o Deployment: Limited number of sensors to monitor key assets or network paths.
• Intrusion Detection Systems (IDS):
o Traffic Analysis: Captured traffic is analyzed by IDS software (e.g., Snort, Suricata,
Zeek/Bro).
o Detection: Matches traffic against detection signatures or heuristic patterns.
o Response: Raises alerts or generates log entries without blocking the source host.
o Usage: Identifies and logs hosts, applications, and detects various attacks (e.g.,
password-guessing, port scans, worms).
• Intrusion Prevention Systems (IPS):
o Active Response: Capable of automatically responding to detected threats.
o Responses:
▪ Shunning: Block the source of noncompliant traffic.
▪ Connection Reset: Reset the connection without blocking the source
address.
▪ Traffic Redirection: Redirect traffic to a honeypot or honeynet for analysis.
o Deployment: Inline appliance with integrated firewall and routing/forwarding
capability.
o Integration: Can reconfigure other appliances (e.g., firewall, router) using scripts or
APIs.
Key Points:
• Sensors:
o Capture Traffic: Packet sniffer, SPAN/mirror port, inline TAP.
o Placement: Behind firewall, near important servers.
o Deployment: Limited sensors for key assets.
• Intrusion Detection Systems (IDS):
o Traffic Analysis: IDS software (Snort, Suricata, Zeek/Bro).
o Detection: Signatures, heuristic patterns.
o Response: Alerts, log entries, no blocking.
o Usage: Logs hosts, applications, detects attacks.
• Intrusion Prevention Systems (IPS):
o Active Response: Automatic threat response.
o Responses: Shunning, connection reset, traffic redirection.
o Deployment: Inline appliance, integrated firewall.
138
o Integration: Reconfigure appliances via scripts/APIs.
139
o Downsides:
▪ Single Point of Failure: Unified system failure could affect the entire
network.
▪ Latency Issues: Performance may degrade under high network activity.
▪ Performance: May not match dedicated security devices.
• Comparison:
o NGFW: Enterprise product with advanced features and better performance.
o UTM: Comprehensive solution for small and medium-sized businesses with limited
resources and IT expertise.
Key Points:
• Next-Generation Firewalls (NGFW):
o Features: Layer 7 filtering, network directory integration, IPS functionality, cloud
integration.
o Introduction: Palo Alto, 2010.
• Unified Threat Management (UTM):
o Security Controls: Firewall, antimalware, intrusion prevention, spam filtering,
content filtering, data loss prevention, VPN, cloud access gateway, endpoint
protection.
o Management: Single console.
o Downsides: Single point of failure, latency issues, performance.
• Comparison:
o NGFW: Advanced features, better performance.
o UTM: Comprehensive, turnkey solution for SMBs.
Load Balancers
Summary: A load balancer distributes client requests across multiple server nodes to manage
varying loads, provide fault tolerance, and mitigate denial of service attacks. There are two main
types: Layer 4 load balancers, which make decisions based on IP addresses and ports, and Layer 7
load balancers, which use application-level data for more complex routing.
Detailed Explanation:
• Function:
o Distribution: Spreads client requests across server nodes in a farm or pool.
o Scalability: Handles light to heavy loads.
o Fault Tolerance: Forwards requests to another server if one fails.
140
o Use Cases: Web servers, email servers, web conferencing, video conferencing,
streaming media servers.
• Types of Load Balancers:
o Layer 4 Load Balancer:
▪ Operation: Makes forwarding decisions based on IP address and TCP/UDP
port values.
▪ OSI Layer: Transport layer.
o Layer 7 Load Balancer (Content Switch):
▪ Operation: Makes forwarding decisions based on application-level data
(e.g., URL, data types like video or audio streaming).
▪ OSI Layer: Application layer.
▪ Complex Logic: Requires more processing power.
• Scheduling:
o Algorithm: Determines which node processes each incoming request.
o Methods:
▪ Round Robin: Picks the next node in sequence.
▪ Fewest Connections: Chooses the node with the fewest active connections.
▪ Best Response Time: Selects the node with the best response time.
o Weighting: Can use administrator-set preferences or dynamic load information.
o Health Checks: Uses heartbeat or health check probes to verify node availability
and load.
• Source IP Affinity and Session Persistence:
o Source IP Affinity:
▪ Layer 4 Approach: Keeps client sessions connected to the initial node.
o Session Persistence:
▪ Application-Layer Load Balancer: Uses cookies to maintain session
connections.
▪ Reliability: More reliable than source IP affinity but requires browser
cookie acceptance.
Key Points:
• Function:
o Distribution: Client requests across server nodes.
o Scalability: Light to heavy loads.
141
o Fault Tolerance: Server failure handling.
o Use Cases: Web, email, conferencing, streaming servers.
• Types of Load Balancers:
o Layer 4: IP address, TCP/UDP port values.
o Layer 7: Application-level data, complex logic.
• Scheduling:
o Algorithm: Node selection.
o Methods: Round robin, fewest connections, best response time.
o Health Checks: Node availability and load verification.
• Source IP Affinity and Session Persistence:
o Source IP Affinity: Layer 4, initial node connection.
o Session Persistence: Application-layer, cookie-based.
142
• Function:
o Protection: Web server software, back-end databases.
o Threats: Code injection, denial of service.
o Traffic Filtering: Application-aware rules.
o Intrusion Detection: Application-specific.
• Operation:
o Signatures: Known attack signatures.
o Pattern Matching: Blocks suspect code.
o Logging: Reveals potential threats.
• Deployment:
o Appliance: Zone protection.
o Plug-In Software: Web server integration.
143
▪ Definition: Connects two or more private networks.
▪ Operation: Configured to operate automatically, gateways exchange security
information.
▪ Trust Relationship: Establishes a secure connection for tunneling data.
▪ Routing: Determines whether to deliver traffic locally or over the VPN
tunnel.
o Host-to-Host Tunnel:
▪ Definition: Secures traffic between two computers where the private
network is not trusted.
• VPN Protocols:
o Legacy Protocols: Point-to-Point Tunneling Protocol (PPTP) deprecated due to
inadequate security.
o Modern Protocols: Transport Layer Security (TLS) and Internet Protocol Security
(IPsec) preferred for VPN access.
Key Points:
• Remote Access Networking:
o Intermediate Network: Connection through ISP networks.
o Modern Method: VPN.
• VPN Topologies:
o Client-to-Site: Telecommuters, secure tunnel.
o Site-to-Site: Private networks, automatic operation, secure tunneling.
o Host-to-Host: Secure traffic between computers.
• VPN Protocols:
o Legacy: PPTP deprecated.
o Modern: TLS, IPsec.
144
o Mutual Authentication: Optional client certificate for mutual identity verification.
o Encrypted Tunnel: TLS creates a secure tunnel for submitting authentication
credentials.
o Authentication Processing: Typically handled by a RADIUS server.
o Communication Tunneling: VPN gateway tunnels all local network
communications over the secure socket.
• Protocol Options:
o TCP or UDP: TLS VPN can use either protocol.
o UDP (Datagram TLS - DTLS): Chosen for better performance with latency-sensitive
traffic (e.g., voice, video).
o TCP: Easier to use with default firewall policies.
• TLS Versions:
o Secure Versions: TLS 1.3 and TLS 1.2.
o Deprecated Versions: Versions earlier than TLS 1.2.
Key Points:
• TLS VPN:
o Digital Certificates: Client-server connections.
o Server Certificate: VPN gateway identification.
o Mutual Authentication: Optional client certificate.
o Encrypted Tunnel: Secure authentication and communication.
o RADIUS Server: Authentication processing.
o Communication Tunneling: Secure socket.
• Protocol Options:
o TCP or UDP: Protocol choices.
o UDP (DTLS): Performance for latency-sensitive traffic.
o TCP: Firewall policy compatibility.
• TLS Versions:
o Secure Versions: TLS 1.3, TLS 1.2.
o Deprecated Versions: Earlier than TLS 1.2.
145
Internet Protocol Security Tunneling
Summary: Internet Protocol Security (IPsec) operates at the network layer (layer 3) of the OSI
model, providing secure communication without the need for specific application support. IPsec
uses two core protocols, Authentication Header (AH) and Encapsulating Security Payload (ESP), and
can operate in transport or tunnel mode.
Detailed Explanation:
• IPsec Overview:
o Layer: Network layer (layer 3) of the OSI model.
o Implementation: Does not require specific application support.
o Packet Overhead: Less than application-level security protocols.
• Core Protocols:
o Authentication Header (AH):
▪ Function: Performs a cryptographic hash on the whole packet (including IP
header) plus a shared secret key.
▪ Integrity Check Value (ICV): Added to the header to confirm packet
integrity.
▪ Confidentiality: Does not encrypt the payload.
o Encapsulating Security Payload (ESP):
▪ Function: Encrypts the packet and attaches a header, trailer, and ICV.
▪ ICV Calculation: Excludes the IP header.
▪ Confidentiality: Provides encryption for the payload.
• IPsec Modes:
o Transport Mode:
▪ Use Case: Secures communications between hosts on a private network.
▪ ESP: Encrypts only the payload data, not the IP header.
▪ AH: Provides integrity for the IP header.
o Tunnel Mode:
▪ Use Case: Secures communications between VPN sites across an unsecure
network.
▪ ESP: Encrypts the whole IP packet (header and payload) and encapsulates it
with a new IP header.
▪ AH: Not typically used in tunnel mode due to the need for confidentiality.
Key Points:
• IPsec Overview:
146
o Layer: Network layer (layer 3).
o Implementation: No specific application support needed.
o Packet Overhead: Reduced.
• Core Protocols:
o AH: Cryptographic hash, ICV, no payload encryption.
o ESP: Encryption, header, trailer, ICV, excludes IP header.
• IPsec Modes:
o Transport Mode: Host-to-host, payload encryption (ESP), IP header integrity (AH).
o Tunnel Mode: VPN sites, full packet encryption (ESP), new IP header, AH not used.
147
▪ Digital Certificates: Issued by a mutually trusted certificate
authority.
▪ Pre-Shared Key: Same passphrase configured on both peers.
o Phase II:
▪ Cipher and Key Size Selection: Establishes which ciphers and key sizes will
be used with AH and/or ESP in the IPsec session.
• IKE Versions:
o IKEv1:
▪ Use Case: Designed for site-to-site and host-to-host topologies.
▪ Remote Access VPNs: Requires a supporting protocol.
o IKEv2:
▪ Features:
▪ EAP Authentication: Supports methods like user authentication
against a RADIUS server.
▪ Simple Setup Mode: Reduces bandwidth without compromising
security.
▪ NAT Traversal and MOBIKE Multihoming: Easier tunnel
configuration through home routers/firewalls and maintaining IPsec
connections when switching between Wi-Fi and cellular interfaces.
Key Points:
• IPsec Policy:
o Authentication Mechanism: AH/ESP, transport/tunnel mode.
o Shared Secret: Mutual authentication.
• Internet Key Exchange (IKE):
o Function: Authentication, cryptographic ciphers, key exchange.
o Security Association (SA): Negotiated properties.
• IKE Phases:
o Phase I: Identity establishment, key agreement, authentication methods.
o Phase II: Cipher and key size selection.
• IKE Versions:
o IKEv1: Site-to-site, host-to-host, remote access VPNs.
o IKEv2: EAP authentication, simple setup, NAT traversal, MOBIKE multihoming.
148
Remote Desktop
Summary: Remote desktop access allows users to connect to a specific computer over a network,
transferring screen, audio, mouse, and keyboard data. This can be done using protocols like
Microsoft's Remote Desktop Protocol (RDP) or alternatives like TeamViewer and Virtual Network
Computing (VNC). Modern solutions also support web browser clients using HTML5 and
WebSocket.
Detailed Explanation:
• Remote Access VPN:
o Function: Joins user's PC or smartphone to a remote private network via a secure
tunnel over a public network.
• Remote Desktop Access:
o Connection Type: Connects to a terminal server on a host using software that
transfers shell data.
o Graphical Remote Access Tool:
▪ Data Transfer: Sends screen and audio data from the remote host to the
client.
▪ Input Transfer: Transfers mouse and keyboard input from the client to the
remote host.
o Microsoft's Remote Desktop Protocol (RDP):
▪ Use Case: Accesses a physical machine on a one-to-one basis.
▪ Remote Desktop Gateway: Facilitates access to virtual desktops or
individual apps on network servers.
▪ Encryption: RDP connections are encrypted by default.
• Alternatives to RDP:
o TeamViewer: Supports remote access to various platforms (Windows, macOS, iOS,
Linux, Chrome OS, Android).
o Virtual Network Computing (VNC): Implemented by several providers (e.g.,
RealVNC).
• Web Browser Clients:
o HTML5 VPN: Uses the canvas element to draw and update a desktop with minimal
lag, handles audio.
o Clientless Remote Desktop Gateway: Uses WebSocket protocol for bidirectional
communication without separate HTTP requests.
Key Points:
• Remote Access VPN:
o Secure Tunnel: Connects user's device to remote network.
149
• Remote Desktop Access:
o Terminal Server Connection: Transfers shell data.
o Graphical Tool: Screen, audio, mouse, keyboard data transfer.
o RDP: One-to-one physical machine access, encrypted connections.
o Remote Desktop Gateway: Access to virtual desktops/apps.
• Alternatives to RDP:
o TeamViewer: Multi-platform support.
o VNC: Various implementations.
• Web Browser Clients:
o HTML5 VPN: Minimal lag, audio handling.
o WebSocket: Bidirectional communication.
Secure Shell
Summary: Secure Shell (SSH) provides secure remote access to command line terminals, primarily
for remote administration and secure file transfer (SFTP). SSH servers use public/private key pairs
(host keys) for identification, and various client authentication methods are supported. Managing
SSH keys is critical for security.
Detailed Explanation:
• SSH Overview:
o Purpose: Secure remote access to command line terminals.
o Uses: Remote administration, secure file transfer (SFTP).
o Products: Numerous commercial and open-source options, with OpenSSH being the
most widely used.
• Host Key:
o Identification: SSH servers identified by a public/private key pair (host key).
o Mapping: Host names mapped to host keys manually or through enterprise
software.
o Compromise: Host key must be changed if compromised to prevent spoofing
attacks.
• SSH Client Authentication:
o Methods:
▪ Username/Password: Credentials verified by SSH server against a local
database or RADIUS server.
150
▪ Public Key Authentication: Remote user's public key added to a list of
authorized keys on the SSH server.
▪ Kerberos: Client submits Kerberos credentials (Ticket Granting Ticket) to
the server, validated by the Ticket Granting Service.
o Key Management: Critical to manage valid client public keys to prevent attacks.
Compromised keys should be deleted and regenerated.
• SSH Commands:
o Connecting to SSH Server:
▪ Command: ssh [email protected]
o Creating and Copying Key Pair:
▪ Commands:
▪ ssh-keygen -t rsa
▪ ssh-copy-id [email protected]
o Using Standard Linux Shell Commands: At SSH prompt, use standard commands
and exit to close the connection.
o Copying Files with SCP:
▪ From Remote to Local: scp [email protected]:/logs/audit.log audit.log
▪ From Local to Remote: Reverse the arguments.
▪ Copying Directories: Use -r option for recursive copy.
Key Points:
• SSH Overview:
o Purpose: Secure remote access.
o Uses: Administration, file transfer.
o Products: OpenSSH, others.
• Host Key:
o Identification: Public/private key pair.
o Mapping: Manual or enterprise software.
o Compromise: Change if compromised.
• SSH Client Authentication:
o Methods: Username/password, public key, Kerberos.
o Key Management: Critical for security.
• SSH Commands:
151
o Connecting: ssh [email protected]
o Key Pair: ssh-keygen -t rsa, ssh-copy-id [email protected]
o Shell Commands: Standard Linux commands, exit.
o SCP: Copy files, directories with -r.
152
▪ Access Control: Admin interface on application server allows connections
only from the jump server.
▪ Security: Denies connection attempts from other hosts.
Key Points:
• Remote Access Management Channel:
o Purpose: Secure administration.
o SAWs: Minimal software, restricted Internet access, stringent controls.
• Out-of-Band Management:
o In-Band vs. Out-of-Band: Shared vs. separate network/VLAN.
o Methods: Serial console, browser-based interface, virtual terminal.
o Benefits: Security, access preservation.
• Jump Servers:
o Challenge: Secure administrative access for Internet-exposed hosts.
o Solution: Jump server in secure zone.
o Function: Administrative port/protocol, access control.
153
• Hosted Private:
o Definition: Hosted by a third party for exclusive use by an organization.
o Benefits: More secure and better performance.
o Costs: More expensive than public clouds.
• Private:
o Definition: Cloud infrastructure completely private to and owned by the
organization.
o Functions: Managed by a dedicated business unit, with other units using the cloud.
o Benefits: Greater control over privacy and security.
o Usage: Suitable for banking and governmental services requiring strict access
control.
• Community:
o Definition: Shared by several organizations to pool resources for common concerns
like standardization and security policies.
o Usage: Can be hosted private or fully private.
• Hybrid:
o Definition: Combines public, private, community, hosted, on-site, and off-site
solutions.
o Benefits: Flexibility and scalability, with data risk considerations when moving data
between environments.
Security Considerations:
• Single-tenant Architecture:
o Definition: Dedicated infrastructure for a single customer.
o Benefits: Highest security level, complete control.
o Costs: More expensive, customer manages security.
• Multi-tenant Architecture:
o Definition: Multiple customers share the same infrastructure.
o Benefits: Cost-effective.
o Risks: Increased risk of unauthorized access or data leakage.
• Hybrid Architecture:
o Definition: Uses both public and private cloud infrastructure.
o Benefits: Flexibility and control over sensitive data.
o Challenges: Requires careful management for integration and security.
154
• Serverless Architecture:
o Definition: Cloud provider manages infrastructure, scaling resources based on
demand.
o Benefits: Potentially more secure, provider manages security.
o Responsibilities: Customers must secure access to applications and data.
Key Points:
• Public (or Multi-tenant):
o Shared Resources: Performance and security risks.
o Multi-cloud: Services from multiple CSPs.
• Hosted Private:
o Exclusive Use: More secure, better performance.
o Cost: More expensive.
• Private:
o Complete Control: Over privacy and security.
o Usage: Banking, governmental services.
• Community:
o Shared Costs: For common concerns.
o Types: Hosted private or fully private.
• Hybrid:
o Combination: Public, private, community, hosted, on-site, off-site.
o Flexibility: With data risk considerations.
• Security Considerations:
o Single-tenant: Highest security, more expensive.
o Multi-tenant: Cost-effective, higher risk.
o Hybrid: Flexibility, requires careful management.
o Serverless: Provider-managed security, customer responsibilities.
155
Detailed Explanation:
• Software as a Service (SaaS):
o Definition: Provisioning software applications hosted on a supplier's servers,
accessed on a pay-as-you-go or lease arrangement.
o Functions: Allows quick provisioning of on-demand applications without the need
for client-side deployment.
o Examples: Microsoft Office 365, Salesforce, Google Workspace.
• Platform as a Service (PaaS):
o Definition: Provides servers, storage, and network infrastructure along with a
multi-tier web application/database platform.
o Functions: Developers create software that runs on the platform; the service
provider ensures platform integrity and availability.
o Examples: Oracle Database, Microsoft Azure SQL Database, Google App Engine.
• Infrastructure as a Service (IaaS):
o Definition: Provisioning IT resources like servers, load balancers, and storage
components quickly, rented from the service provider's datacenter.
o Functions: Offers flexibility in managing and scaling infrastructure as needed.
o Examples: Amazon Elastic Compute Cloud, Microsoft Azure Virtual Machines,
Oracle Cloud, OpenStack.
• Third-Party Vendors:
o Definition: External entities providing cloud services to businesses using IaaS, PaaS,
or SaaS models.
o Considerations: Selection, contract negotiation, service performance, compliance,
and communication practices.
o Strategies: Robust vendor management, service-level agreements (SLAs), security
assessments, and multi-cloud or hybrid cloud deployments to mitigate risks.
Key Points:
• SaaS:
o Access: Pay-as-you-go or lease arrangement.
o Provisioning: Quick on-demand applications.
o Examples: Microsoft Office 365, Salesforce, Google Workspace.
• PaaS:
o Resources: Servers, storage, network infrastructure, multi-tier platforms.
o Development: Developers create software; provider ensures platform integrity.
156
o Examples: Oracle Database, Microsoft Azure SQL Database, Google App Engine.
• IaaS:
o Provisioning: IT resources rented as needed.
o Flexibility: Manage and scale infrastructure.
o Examples: Amazon EC2, Microsoft Azure VMs, Oracle Cloud, OpenStack.
• Third-Party Vendors:
o Management: Vendor selection, SLAs, security practices.
o Risks: Vendor lock-in, data portability, interoperability.
o Strategies: Multi-cloud, hybrid cloud deployments.
Responsibility Matrix
Summary: In cloud infrastructure, security responsibilities are shared between the cloud provider
and the customer. The cloud provider secures the underlying infrastructure, while the customer
secures their applications and data. The shared responsibility model varies based on the service
model (SaaS, PaaS, IaaS).
Detailed Explanation:
• Cloud Service Provider (CSP) Responsibilities:
o Physical Security: Securing the infrastructure's physical components.
o Equipment Security: Securing computer, storage, and network equipment.
o Network Security: Protecting foundational elements like DDoS protection.
o Backup and Recovery: Ensuring cloud storage backup and recovery.
o Resource Isolation: Securing cloud infrastructure resource isolation among
tenants.
o Identity and Access Control: Managing tenant resource identity and access control.
o Monitoring and Incident Response: Security monitoring and incident response for
the infrastructure.
o Datacenter Management: Securing and managing datacenters in multiple
geographic regions.
• Cloud Service Customer Responsibilities:
o Identity Management: Managing user identities.
o Data Location Configuration: Configuring geographic locations for data storage
and service execution.
o Access Controls: Implementing user and service access controls to cloud resources.
o Data and Application Security: Configuring security for data and applications.
157
o Operating System Protection: Protecting operating systems when deployed.
o Encryption: Using and configuring encryption, especially key protection.
• Shared Responsibility Model:
o SaaS Model: CSP handles operating system configuration and control.
o IaaS Model: Operating system security is shared between CSP and customer.
o FaaS (Function as a Service): Allows execution of code in response to triggers, with
dynamic scaling.
Key Points:
• CSP Responsibilities:
o Physical Security: Infrastructure components.
o Equipment Security: Computer, storage, network.
o Network Security: DDoS protection.
o Backup and Recovery: Cloud storage.
o Resource Isolation: Among tenants.
o Identity and Access Control: Tenant resources.
o Monitoring and Incident Response: Infrastructure security.
o Datacenter Management: Multiple regions.
• Customer Responsibilities:
o Identity Management: User identities.
o Data Location Configuration: Geographic storage.
o Access Controls: User and service access.
o Data and Application Security: Configuration.
o Operating System Protection: When deployed.
o Encryption: Key protection.
• Shared Responsibility:
o SaaS: CSP handles OS configuration.
o IaaS: Shared OS security.
o FaaS: Dynamic code execution.
158
locations or devices. The choice between these architectures depends on organizational needs for
control, resilience, and flexibility.
Detailed Explanation:
• Centralized Computing:
o Definition: All data processing and storage are performed in a single location,
usually a central server.
o Dependence: Users and devices rely on the central server for data access and
processing.
o Control: The server administrator and organization control security and privacy
decisions.
o Examples: Mainframe computers, client-server architectures.
• Decentralized Computing:
o Definition: Data processing and storage are distributed across multiple locations or
devices.
o Independence: No single device or location is responsible for all data processing
and storage.
o Trend: Increasingly important in modern infrastructures for resilience and
flexibility.
o Examples: Blockchain, peer-to-peer (P2P) networks, content delivery networks
(CDNs), Internet of Things (IoT) devices, distributed databases, Tor network.
• Choosing Between Architectures:
o Centralized: Suitable for large organizations needing strict control and
management.
o Decentralized: Ideal for situations where resilience and flexibility are prioritized
over central control.
Key Points:
• Centralized Computing:
o Single Location: Data processing and storage.
o Dependence: On central server.
o Control: By server administrator and organization.
o Examples: Mainframes, client-server.
• Decentralized Computing:
o Distributed: Data processing and storage.
o Independence: No single point of responsibility.
o Trend: Modern infrastructures.
159
o Examples: Blockchain, P2P networks, CDNs, IoT, distributed databases, Tor.
• Benefits of Decentralized Architecture:
o Fault Tolerance: Improved resilience.
o Scalability: Better scalability.
o Security: Unique security features.
160
• Replication Tiers:
o Local Replication: Data is replicated within a single datacenter in the region where
the storage account was created, often in separate fault and upgrade domains.
o Regional Replication (Zone-Redundant Storage): Data is replicated across
multiple datacenters within one or two regions, safeguarding against single
datacenter failures.
o Geo-Redundant Storage (GRS): Data is replicated to a secondary region distant
from the primary region, protecting against regional outages or disasters.
Key Points:
• High Availability (HA):
o 99.99% Uptime: Guaranteed storage availability.
o Redundancy: Multiple disk controllers and storage devices.
• Replication:
o Central Storage: Data available to all business units.
o Requirements: Low latency, security, data integrity.
o Storage Tiers: Hot vs. cold storage.
o Application Needs: Diverse replication requirements.
• High Availability Across Zones:
o Regions and Zones: Independent datacenters.
o Hosting Choices: Lower latency, improved performance.
o Redundancy: Multiple zones and regions.
• Replication Tiers:
o Local Replication: Within a single datacenter.
o Regional Replication: Across multiple datacenters.
o Geo-Redundant Storage: Secondary distant region.
161
o Definition: Clients access or stream applications hosted on a server, rather than
running the entire desktop virtually.
o Solutions: Common solutions include Citrix XenApp, Microsoft App-V, and VMware
ThinApp.
o Clientless Access: Often used with HTML5 remote desktop apps, accessible through
web browsers.
• Containerization:
o Definition: Encapsulates all necessary software components (code, libraries,
configurations) within a portable unit called a container.
o Benefits: Ensures consistent application behavior across different platforms, avoids
dependency issues.
o Examples: Docker is a popular container platform, allowing easy management and
deployment of containers.
• Hypervisors:
o Role: Manage multiple virtual machines (VMs) on a single hardware platform.
o Types:
▪ Type 1 (Bare-Metal): Runs directly on physical hardware, offering high
performance and efficiency (e.g., VMware ESXi, Microsoft Hyper-V).
▪ Type 2 (Hosted): Runs on top of a host operating system, often used for
development and testing (e.g., VMware Workstation, Oracle VirtualBox).
Key Points:
• Application Virtualization:
o Access: Hosted on a server, streamed to clients.
o Solutions: Citrix XenApp, Microsoft App-V, VMware ThinApp.
o Clientless: HTML5 remote desktop apps.
• Containerization:
o Encapsulation: All software components in a container.
o Consistency: Across different platforms.
o Examples: Docker.
• Hypervisors:
o Management: Multiple VMs on one hardware platform.
o Types:
▪ Type 1: Bare-metal, high performance (VMware ESXi, Microsoft Hyper-V).
162
▪ Type 2: Hosted, for development/testing (VMware Workstation, Oracle
VirtualBox).
Cloud Architecture
Summary: Cloud architecture encompasses various models and technologies, including serverless
computing and microservices, which enhance scalability, efficiency, and flexibility. These
innovations allow organizations to focus on application development without managing underlying
infrastructure, while also introducing new security considerations.
Detailed Explanation:
• Serverless Computing:
o Definition: Cloud provider manages infrastructure, automatically allocating
resources as needed and charging based on actual usage.
o Applications: Includes chatbots, mobile backends, and event-driven processing.
o Providers: Major providers include AWS Lambda, Google Cloud Functions, and
Microsoft Azure Functions.
o Benefits: Scalable, cost-effective, and easy to manage. Eliminates the need for server
management and emphasizes event-driven orchestration.
• Microservices:
o Definition: Architectural approach where applications are built as a collection of
small, independent services, each focusing on a specific business capability.
o Benefits: Modular design, easier scaling and updating, independent team
development.
o Challenges: Integration issues can arise when combining independent components.
o Related Technologies: Often implemented using Infrastructure as Code (IaC) for
consistent and repeatable deployments.
• Transformational Changes:
o Cloud-Native Services: Enable dynamic scaling, innovation, and operational
optimization.
o Key Services:
▪ Elastic Compute and Auto-Scaling: Adjust computing power based on
demand.
▪ Content Delivery Networks (CDNs): Optimize web traffic by caching
content.
▪ Object Storage: Provides massive, unstructured data storage.
▪ Identity and Access Management: Advanced security features and
platform integration.
163
▪ Containerization and Orchestration: Change how applications are
deployed and managed.
▪ AI and Machine Learning Services: Enhance data processing and analytics.
▪ Serverless Databases and IoT Services: Support backend operations and
big data analytics.
Key Points:
• Serverless Computing:
o Managed Infrastructure: No need for server management.
o Event-Driven: Orchestration based on triggers.
o Examples: AWS Lambda, Google Cloud Functions, Azure Functions.
• Microservices:
o Modular Design: Independent services with specific responsibilities.
o Scalability: Easier to scale and update.
o Integration Challenges: Potential issues when combining components.
o IaC: Ensures consistent deployments.
• Transformational Changes:
o Elastic Compute: Dynamic scaling.
o CDNs: Web traffic optimization.
o Object Storage: Large-scale data storage.
o Security: Advanced identity and access management.
o Containerization: Modern application deployment.
164
o Version Control: Files are version-controlled and treated like code in software
projects.
o HCL (HashiCorp Configuration Language): Used in IaC environments, supports
variables, and has a concise syntax. Popular in tools like Terraform and Consul.
• Responsiveness Mechanisms:
o Load Balancing:
▪ Definition: Distributes network traffic across multiple servers or services.
▪ Benefits: Improves performance and provides high availability.
▪ Function: Acts as an intermediary between users and back-end resources,
using algorithms to distribute requests.
o Edge Computing:
▪ Definition: Optimizes the geographic location of resources to reduce latency.
▪ Benefits: Faster processing, reduced network latency, improved
responsiveness.
▪ Applications: Ideal for real-time or low-latency processing, such as IoT
devices and CDNs.
o Auto-Scaling:
▪ Definition: Automatically adjusts computing resources based on demand.
▪ Benefits: Ensures optimal performance and responsiveness, reduces
operating costs.
▪ Function: Scales resources up during high demand and releases them when
demand decreases.
Key Points:
• Infrastructure as Code (IaC):
o Machine-Readable Files: YAML, JSON, HCL.
o Automation: Reduces errors, ensures consistency.
o Version Control: Treated like code.
o HCL: Used in Terraform, Consul.
• Responsiveness Mechanisms:
o Load Balancing:
o Traffic Distribution: Across servers/services.
o High Availability: Improved performance.
o Intermediary Role: Between users and resources.
o Edge Computing:
165
o Geographic Optimization: Reduces latency.
o Real-Time Processing: Faster, more responsive.
o Applications: IoT, CDNs.
o Auto-Scaling:
o Dynamic Adjustment: Based on demand.
o Optimal Performance: Ensures responsiveness.
o Cost Efficiency: Reduces operating costs.
166
o Definition: Supports rapid deployment of virtual networking using general-purpose
VMs and containers.
o Benefits: Simplifies configuration, allows automated deployment of network links,
appliances, and servers.
Key Points:
• IaC:
o Configuration: Physical and virtual appliances via scripting/APIs.
o Complex Networks: Challenging policy implementation.
• Network Planes:
o Management Plane: Monitors traffic and status.
o Control Plane: Traffic prioritization and security decisions.
o Data Plane: Traffic switching and security controls.
• SDN Applications:
o Policy Decisions: Control plane.
o Implementation: Data plane via network controller.
o APIs: Northbound (SDN apps to controller), Southbound (controller to devices).
• NFV:
o Virtual Networking: Using VMs and containers.
o Automation: Simplifies deployment and management.
167
• Disaster Recovery Services:
o Definition: Tools and services to detect and respond to issues impacting availability.
o Benefits: Proactive issue detection and response.
• Service-Level Agreements (SLAs):
o Definition: Guarantees a certain level of uptime and availability.
o Benefits: Provides credits or refunds if commitments are not met.
• Considerations:
o Cost:
▪ Models: Consumption-based or subscription-based.
▪ CapEx to OpEx: Shift from capital expenses to operational expenses.
▪ Optimization: Importance of optimizing resources to avoid high recurring
costs.
o Scalability:
▪ Vertical Scaling: Adding capacity to existing resources.
▪ Horizontal Scaling: Adding more instances to work in parallel.
o Resilience:
▪ Redundancy: Use of redundant hardware and fault tolerance.
▪ Data Replication: Ensures data availability across multiple servers and
datacenters.
o Ease of Deployment:
▪ Automation: Reduces manual intervention.
▪ Standardization: Simplifies deployment with standardized configurations.
▪ Portability: Ensures applications can move between different cloud
infrastructures.
o Ease of Recovery:
▪ Backup and Restore: Automated backups and quick data restoration.
▪ Redundant Architectures: Distributes data across multiple datacenters.
▪ Disaster Recovery Services: Replicates environments in different regions.
o SLA and ISA:
▪ SLAs: Define expected service levels and commitments.
▪ ISAs: Establish security requirements and responsibilities.
o Power:
168
▪ Energy Efficiency: Deploying energy-efficient hardware and optimizing
cooling systems.
▪ Redundant Power Infrastructure: Ensures high availability with multiple
power feeds and backup systems.
▪ Power Usage Effectiveness (PUE): Measures datacenter energy efficiency.
o Compute:
▪ Capabilities: Elasticity, resource pooling, orchestration, automation,
serverless computing.
▪ Networking: Secure communication, traffic routing, load balancing, private
and public connectivity.
▪ Content Delivery Networks (CDNs): Efficient content delivery and high
availability.
Key Points:
• Data Replication: Ensures data availability.
• Auto-Scaling: Handles high traffic volumes.
• Disaster Recovery: Proactive issue detection.
• SLAs: Guarantees uptime and availability.
• Cost: Shift from CapEx to OpEx.
• Scalability: Vertical and horizontal scaling.
• Resilience: Redundant hardware and data replication.
• Ease of Deployment: Automation, standardization, portability.
• Ease of Recovery: Backup, restore, redundant architectures.
• SLA and ISA: Service levels and security requirements.
• Power: Energy efficiency and redundant infrastructure.
• Compute: Elasticity, resource pooling, networking, CDNs.
169
o Precautions: Use access controls and encryption to protect data.
o Disaster Recovery: Develop plans to respond to catastrophic events impacting
cloud resources.
• Patching:
o Policy: Cloud providers should have clear patch management policies.
o Features: Automated patch management, regular updates, centralized management,
security monitoring.
o Challenges: Complexity of cloud systems, lack of control over underlying
infrastructure, legal and regulatory requirements.
• Secure Communication and Access:
o SD-WAN (Software-Defined Wide Area Network):
▪ Definition: Connects branch offices, datacenters, and cloud infrastructure
over a WAN.
▪ Security: Uses encryption, segments network traffic, integrates with
firewalls, centralizes security policy management.
o SASE (Secure Access Service Edge):
▪ Definition: Combines WAN technologies and cloud-based security services.
▪ Security Model: Operates under a zero trust model, incorporating Identity
and Access Management (IAM).
▪ Features: Intrusion prevention, malware protection, content filtering,
centralized security and access management.
Key Points:
• Data Protection:
o Access Controls: Essential for securing data.
o Encryption: Protects data in transit and at rest.
o Disaster Recovery: Plans for catastrophic events.
• Patching:
o Clear Policies: Regular and responsive patch management.
o Automated Management: Reduces manual intervention.
o Challenges: Complexity and control issues.
• Secure Communication and Access:
o SD-WAN:
▪ Encryption: Protects data across the network.
▪ Traffic Segmentation: Prioritizes critical data.
170
▪ Firewall Integration: Enhances threat protection.
▪ Centralized Management: Simplifies policy enforcement.
o SASE:
▪ Zero Trust Model: Assumes all users/devices are untrusted until
authenticated.
▪ IAM Integration: Manages identities and access.
▪ Threat Prevention: Intrusion prevention, malware protection, content
filtering.
Embedded Systems
Summary: Embedded systems are specialized computing systems integrated into various devices
to control their functions. They are used in consumer electronics, industrial automation, automotive
systems, medical devices, and more.
Detailed Explanation:
• Home Appliances:
o Examples: Refrigerators, washing machines, coffee makers.
o Function: Control functions and operations.
• Smartphones and Tablets:
o Components: Processors, sensors, communication modules.
o Function: Enable various functionalities and connectivity.
• Automotive Systems:
o Examples: Engine control units, entertainment systems, safety systems (airbags,
anti-lock brakes).
o Function: Enhance vehicle performance, safety, and user experience.
• Industrial Automation:
o Examples: Robots, assembly lines, sensors.
o Function: Control systems and machinery for efficient production.
• Medical Devices:
o Examples: Pacemakers, insulin pumps, blood glucose monitors.
o Function: Control medical functions and provide data to healthcare providers.
• Aerospace and Defense:
o Examples: Aircraft, satellites, military equipment.
171
o Function: Navigation, communication, control.
Real-Time Operating Systems (RTOS):
• Definition: Operating systems designed for real-time processing and response, ensuring
high stability and processing speed.
• Examples of RTOS:
o VxWorks: Used in aerospace and defense systems for real-time performance and
reliability.
o FreeRTOS: Open-source OS used in robotics, industrial automation, consumer
electronics.
o AUTOSAR: Framework for automotive software, including RTOS for engine and
transmission control.
o Siemens SIMATIC WinCC: RTOS for industrial automation applications.
• Risks Associated with RTOS:
o Security Breaches: Complex software can be difficult to secure, leading to
vulnerabilities.
o System-Level Attacks: Potential for attackers to disrupt critical processes or gain
control, causing harm or damage.
Key Points:
• Embedded Systems:
o Home Appliances: Control functions and operations.
o Smartphones/Tablets: Enable functionalities and connectivity.
o Automotive Systems: Enhance performance, safety, user experience.
o Industrial Automation: Control systems and machinery.
o Medical Devices: Control functions, provide data.
o Aerospace/Defense: Navigation, communication, control.
• RTOS:
o Real-Time Processing: High stability and speed.
o Examples: VxWorks, FreeRTOS, AUTOSAR, Siemens SIMATIC WinCC.
o Security Risks: Vulnerabilities, system-level attacks.
172
ICS includes Distributed Control Systems (DCS) and Supervisory Control and Data Acquisition
(SCADA) systems, which manage and monitor plant devices and equipment.
Detailed Explanation:
• Workflow and Process Automation Systems:
o Definition: ICS control machinery in critical infrastructure.
o Components: Embedded programmable logic controllers (PLCs), actuators, sensors,
human-machine interfaces (HMIs), and control servers.
o Function: PLCs linked by OT fieldbus or industrial Ethernet control mechanical
components and monitor local states like temperature.
o Data Historian: Database of all information generated by the control loop.
• Supervisory Control and Data Acquisition (SCADA):
o Definition: Manages large-scale, multiple-site ICSs.
o Components: Software on ordinary computers, field devices with embedded PLCs.
o Communication: Uses WAN (cellular or satellite) to link SCADA server to field
devices.
• ICS/SCADA Applications:
o Energy: Power generation and distribution, utilities (water/sewage,
transportation).
o Industrial: Mining, refining, hazardous processes.
o Fabrication and Manufacturing: Automated production systems, high precision.
o Logistics: Automated transport, lift systems, component tracking.
o Facilities: Site and building management (HVAC, lighting, security).
• Security Considerations:
o Historical Context: Initially built without IT security considerations.
o Current Awareness: High necessity for enforcing security controls.
o Example Attack: Stuxnet worm targeting SCADA management software.
o NIST Recommendations: Special Publication 800-82 for ICS/SCADA security
controls.
• Cybersecurity in ICS/SCADA:
o Importance: Critical for public safety, economic stability, national security.
o Risks: Malware, ransomware, unauthorized access, targeted attacks.
o Protections: Network segmentation, access controls, intrusion detection,
encryption, continuous monitoring.
Key Points:
173
• Workflow and Process Automation:
o ICS Components: PLCs, actuators, sensors, HMIs, control servers.
o Data Historian: Information database.
• SCADA:
o Large-Scale Management: Multiple-site ICSs.
o WAN Communication: Cellular or satellite links.
• Applications:
o Energy: Power and utilities.
o Industrial: Mining, refining.
o Manufacturing: High precision production.
o Logistics: Transport and tracking.
o Facilities: Building management.
• Security:
o Historical Lack: Initial absence of IT security.
o Current Necessity: Enforcing security controls.
o Example Attack: Stuxnet worm.
o NIST Guidelines: Special Publication 800-82.
• Cybersecurity:
o Critical Importance: Public safety, economic stability, national security.
o Risks: Malware, ransomware, unauthorized access.
o Protections: Segmentation, access controls, intrusion detection, encryption.
Internet of Things
Summary: The Internet of Things (IoT) refers to the network of physical devices embedded with
sensors, software, and connectivity, enabling them to collect and exchange data. IoT devices
communicate over the Internet, often using cloud-based systems for data analytics.
Detailed Explanation:
• Sensors and Actuators:
o Sensors: Detect changes in the physical environment (e.g., temperature, humidity,
motion).
o Actuators: Perform actions based on sensor data (e.g., turning on lights, adjusting
thermostats).
174
• IoT Communication:
o Internet Connectivity: IoT devices communicate with each other and cloud-based
systems.
o Data Exchange: Enables data collection and instruction reception.
• IoT Examples:
o Smart Homes: Control lighting, temperature, security systems remotely.
o Smart Cities: Manage traffic, monitor air quality, improve public safety.
o Healthcare: Wearables and implantable devices collect and send patient data.
o Agriculture: Sensors monitor soil conditions, weather, crop growth.
• Factors Driving IoT Adoption:
o Cost Reduction: Decreased cost of IoT sensors and devices.
o Connectivity Advances: Improved connectivity with 5G and low-power networks.
o Data Analytics: New tools and techniques for analyzing IoT data.
o COVID-19 Impact: Accelerated adoption in healthcare for remote monitoring.
• Security Risks Associated with IoT:
o Inadequate Security Measures: Limited processing power and memory make
strong security controls difficult.
o Lack of Standardization: Compatibility issues and varying security requirements.
o Data Volume: Increased risk of data breaches and cyberattacks.
• Examples of IoT Security Issues:
o Mirai Botnet Attack: Infected IoT devices used for DDoS attacks.
o Casino Hack: Smart thermometer used as a backdoor to access the network.
o Spying: Hacked baby monitors and home security cameras.
• Reasons for Poor IoT Security:
o Focus on Functionality: Security often overlooked in design.
o Cost Constraints: Low-cost devices may lack robust security features.
o Rushed to Market: Insufficient security testing.
• Best Practice Guidance for IoT:
o Internet of Things Security Foundation (IoTSF): IoTSF
o Industrial Internet Consortium (IIC) Security Framework: IIC Security
Framework
175
o Cloud Security Alliance (CSA) IoT Security Controls Framework: CSA IoT
Security Controls Framework
o European Telecommunications Standards Institute (ETSI) IoT Security
Standards: ETSI IoT Security Standards
Key Points:
• Sensors and Actuators: Detect changes and perform actions.
• IoT Communication: Internet connectivity for data exchange.
• Examples: Smart homes, cities, healthcare, agriculture.
• Adoption Factors: Cost reduction, connectivity advances, data analytics, COVID-19 impact.
• Security Risks: Inadequate measures, lack of standardization, data volume.
• Security Issues: Mirai botnet, casino hack, spying.
• Poor Security Reasons: Focus on functionality, cost constraints, rushed to market.
• Best Practices: IoTSF, IIC, CSA, ETSI guidelines.
176
o Cloud: Spread of enterprise infrastructures between on-premises and cloud
platforms.
o Remote Work: Expands enterprise footprint, increases security risks.
o Mobile: Increased use of smartphones and tablets for corporate data access.
o Outsourcing and Contracting: Remote access for external entities.
o Wireless Networks (Wi-Fi): Susceptible to exploits, often unsecured.
• Key Benefits of Zero Trust Architecture:
o Greater Security: Requires authentication and verification for all access.
o Better Access Controls: Stringent limits on resource access.
o Improved Governance and Compliance: Limits data access, provides operational
visibility.
o Increased Granularity: Grants access based on need.
• Essential Components of Zero Trust Architecture:
o Network and Endpoint Security: Controls access to applications, data, and
networks.
o Identity and Access Management (IAM): Ensures only verified users can access
systems and data.
o Policy-Based Enforcement: Restricts network traffic to legitimate requests.
o Cloud Security: Manages access to cloud-based applications, services, and data.
o Network Visibility: Analyzes network traffic and devices for suspicious activity.
o Network Segmentation: Controls access to sensitive data from trusted locations.
o Data Protection: Secures access to sensitive data, including encryption and
auditing.
o Threat Detection and Prevention: Identifies and prevents attacks.
Key Points:
• Zero Trust Architectures:
o Continuous Verification: All access must be verified.
o NIST Definition: Focus on users, assets, resources.
o Benefits: Enhanced protection against attacks.
• Deperimeterization:
o Focus Shift: From network boundaries to individual resources.
o Security Measures: Authentication, encryption, access control, monitoring.
• Trends:
177
o Cloud: Distributed infrastructures.
o Remote Work: Increased security risks.
o Mobile: Expanded data access.
o Outsourcing: Remote access for external entities.
o Wi-Fi: Susceptible to exploits.
• Zero Trust Benefits:
o Security: Authentication and verification.
o Access Controls: Stringent limits.
o Governance: Improved visibility.
o Granularity: Need-based access.
• Components:
o Network Security: Access control.
o IAM: Verified user access.
o Policy Enforcement: Legitimate traffic.
o Cloud Security: Managed access.
o Visibility: Traffic analysis.
o Segmentation: Controlled access.
o Data Protection: Encryption, auditing.
o Threat Detection: Attack prevention.
178
o Purpose: Reduces the network's attack surface and potential damage from attacks.
• Policy-Driven Access Control:
o Definition: Enforces access restrictions based on user identity, device posture, and
network context.
o Purpose: Ensures that access is granted according to predefined policies.
• Device Posture:
o Definition: Security status of a device, including configurations, software versions,
and patch levels.
o Purpose: Assesses whether a device meets security requirements or poses a risk.
Significance of Control and Data Planes in Zero Trust Models:
• Control Plane:
o Function: Manages policies for user and device authorization.
o Components:
▪ Policy Engine: Configures identities, access policies, threat intelligence, and
behavioral analytics to make dynamic decisions.
▪ Policy Administrator: Manages access tokens and session establishment
based on policy engine decisions.
• Data Plane:
o Function: Establishes secure sessions for information transfers.
o Components:
▪ Policy Enforcement Point: Mediates access requests and interfaces with
the policy administrator to set up secure data pathways.
• Implicit Trust Zone:
o Definition: Secure data pathway established between the policy enforcement point
and the resource.
o Purpose: Ensures data protection through encryption and minimizes trust zones.
Zero Trust Architecture Examples:
• Google BeyondCorp:
o Description: Uses multiple security layers (identity verification, device verification,
access control) to secure internal networks and provide remote access.
• Cisco Zero Trust Architecture:
o Description: Incorporates network segmentation, access control policies, and
threat detection to protect against various cyber threats.
• Palo Alto Networks Prisma Access:
179
o Description: Cloud-delivered security service using Zero Trust to secure network
traffic and prevent data exfiltration.
Key Points:
• Zero Trust Model:
o No Inherent Trust: Continuous authentication and authorization.
o Adaptive Identity: Context-aware verification.
o Threat Scope Reduction: Need-to-know access.
o Policy-Driven Control: Enforces access restrictions.
o Device Posture: Security status assessment.
• Control and Data Planes:
o Control Plane: Manages policies and decisions.
o Data Plane: Establishes secure sessions.
o Implicit Trust Zone: Secure data pathways.
• Examples:
o Google BeyondCorp: Multi-layer security.
o Cisco Zero Trust: Comprehensive threat protection.
o Palo Alto Prisma Access: Secure network traffic.
Asset Tracking
Summary: Asset tracking involves managing and monitoring an organization's critical systems,
components, devices, and other valuable objects. This process includes collecting and analyzing
information about these assets to support informed decision-making and achieve business goals.
Detailed Explanation:
• Asset Management Process:
o Definition: Tracks all critical systems, components, devices, and other valuable
objects in an inventory.
o Functions: Collects and analyzes information to support informed changes and
achieve business goals.
180
o Tools: Various software suites and hardware solutions are available for tracking and
managing assets.
o Data Stored: Type, model, serial number, asset ID, location, user(s), value, and
service information.
• Technical Assets:
o Focus: Requires some degree of configuration.
o Non-Technical Assets: Includes items like furniture and buildings that do not
require configuration.
• Asset Assignment/Accounting and Monitoring:
o Ownership Assignment: Designates specific individuals or teams responsible for
particular assets.
o Classification: Organizes assets based on value, sensitivity, or criticality.
o Monitoring Activities: Includes inventory and enumeration tasks to maintain a
comprehensive list of assets.
o Importance: Vital for license management, patch deployment, and security incident
response.
• Asset Enumeration Methods:
o Manual Inventory: Suitable for smaller organizations or specific asset types.
o Network Scanning: Tools like Nmap, Nessus, or OpenVAS discover and enumerate
networked devices.
o Asset Management Software: Solutions like Lansweeper, ManageEngine, or
SolarWinds track and catalog assets.
o Configuration Management Database (CMDB): Centralized repository of IT
infrastructure information.
o Mobile Device Management (MDM) Solutions: Manage and secure mobile
devices.
o Cloud Asset Discovery: Tools like AWS Config or Azure Resource Graph discover
and catalog cloud assets.
• Asset Acquisition/Procurement:
o Security Features: Select hardware and software with strong security features.
o Vendor Selection: Work with reputable vendors that prioritize security.
o Integration: Ensure solutions integrate with existing security infrastructure.
o Total Cost of Ownership (TCO): Consider initial purchase price and ongoing costs.
Key Points:
• Asset Management Process:
181
o Inventory: Tracks critical systems and devices.
o Data Collection: Supports informed decision-making.
o Tools: Software and hardware solutions.
• Technical Assets:
o Configuration Required: Focus on assets needing configuration.
o Non-Technical Assets: Includes furniture and buildings.
• Asset Assignment/Accounting and Monitoring:
o Ownership Assignment: Clear accountability for assets.
o Classification: Based on value, sensitivity, or criticality.
o Monitoring: Inventory and enumeration tasks.
• Asset Enumeration Methods:
o Manual Inventory: For smaller organizations.
o Network Scanning: Tools like Nmap, Nessus, OpenVAS.
o Asset Management Software: Lansweeper, ManageEngine, SolarWinds.
o CMDB: Centralized IT infrastructure repository.
o MDM Solutions: Manage mobile devices.
o Cloud Asset Discovery: AWS Config, Azure Resource Graph.
• Asset Acquisition/Procurement:
o Security Features: Built-in encryption, secure boot mechanisms.
o Vendor Selection: Reputable vendors with ongoing support.
o Integration: Seamless with existing security infrastructure.
o TCO: Initial purchase and ongoing costs.
182
o Importance: Protecting these assets is crucial for maintaining system integrity,
confidentiality, and availability.
• Asset Identification and Standard Naming Conventions:
o Identification Methods: Use barcode labels or RFID tags for tangible assets.
o RFID Tags: Chips programmed with asset data that signal scanners to update
location information.
o Naming Conventions: Standardized naming for hardware and digital assets
(accounts, virtual machines) to ensure consistency.
o Configuration Management Database (CMDB): Stores asset information,
including location and function.
• Configuration Management:
o Purpose: Ensures assets adhere to approved configurations.
o Change Control: Reduces risk of operational interruptions due to changes.
o ITIL Framework: Implements configuration management using service assets,
configuration items (CIs), baseline configurations, and a configuration management
system (CMS).
• ITIL Elements:
o Service Assets: Things, processes, or people contributing to IT service delivery.
o Configuration Items (CIs): Assets requiring specific management procedures.
o Baseline Configuration: List of settings an asset must adhere to for security.
o Configuration Management System (CMS): Tools and databases for managing CIs.
o Diagrams: Illustrate relationships between network elements and business
workflows.
Key Points:
• Asset Definition:
o Critical Resources: Hardware, software, data, network components.
o Protection: Ensures integrity, confidentiality, availability.
• Asset Identification and Naming:
o Methods: Barcode labels, RFID tags.
o Consistency: Standard naming conventions.
o CMDB: Stores asset information.
• Configuration Management:
o Adherence: Approved configurations.
o Change Control: Minimizes operational risks.
183
o ITIL Framework: Service assets, CIs, baseline configurations, CMS.
• ITIL Elements:
o Service Assets: Contribute to IT services.
o CIs: Require management procedures.
o Baseline Configuration: Security settings.
o CMS: Manages CIs.
o Diagrams: Show network relationships.
Data Backups
Summary: Data backups are essential for protecting an organization's critical data and systems.
They ensure data availability and integrity by creating copies of important information and storing
them securely. Regular testing and verification of backups are crucial for reliable recovery.
Detailed Explanation:
• Role of Backups:
o Purpose: Ensure availability and integrity of critical data and systems.
o Protection: Safeguard against hardware failure, data corruption, and cyberattacks
like ransomware.
o Testing: Regularly test and verify backups for reliable recovery.
• Enterprise Backup Challenges:
o Scalability: Simple techniques may not handle large data volumes efficiently.
o Performance Issues: Can disrupt operations and have lengthy recovery times.
o Granularity and Customization: Enterprises need targeted backups for specific
applications and data subsets.
o Compliance and Security: Require advanced features like encryption, access
control, and audit trails.
o Disaster Recovery: Need robust plans and centralized management.
• Critical Capabilities for Enterprise Backup Solutions:
o Support for Various Environments: Virtual, physical, and cloud.
o Data Deduplication and Compression: Optimize storage space.
o Instant Recovery and Replication: Quick failover.
o Ransomware Protection and Encryption: Ensure data security.
o Granular Restore Options: For individual files, folders, or applications.
o Reporting, Monitoring, and Alerting: Effective management.
184
o Integration: With virtualization platforms, cloud providers, and storage systems.
• Data Deduplication:
o Definition: Data compression technique that eliminates redundant data.
o Function: Stores a single copy of identical data blocks and creates references.
o Levels: File-level, block-level, or byte-level.
o Benefits: Minimizes storage requirements and improves data transfer efficiency.
• Backup Frequency:
o Influencing Factors: Data volatility, regulatory requirements, system performance,
architecture capabilities, and operational needs.
o Dynamic Data: Requires more frequent backups.
o Stable Data: May opt for less frequent backups.
o Assessment: Based on regulatory requirements, risk tolerance, and resources.
• On-Site and Off-Site Backups:
o On-Site Backups: Stored locally for rapid access and recovery.
o Off-Site Backups: Transferred to remote locations for protection against physical
threats.
o Ransomware Protection: Air-gapped backups to prevent access and encryption by
ransomware.
• Recovery Validation:
o Full Recovery Test: Restores entire system to verify functionality.
o Partial Recovery Test: Validates integrity of specific data subsets.
o Backup Audits: Check logs, schedules, and configurations.
o Disaster Recovery Scenarios: Simulate failures to assess preparedness.
o Importance: Ensures backups are reliable and recovery times are understood.
Key Points:
• Role of Backups:
o Availability and Integrity: Protect critical data and systems.
o Regular Testing: Ensure reliable recovery.
• Enterprise Backup Challenges:
o Scalability and Performance: Handle large data volumes efficiently.
o Granularity and Customization: Target specific applications and data subsets.
o Compliance and Security: Advanced features required.
185
o Disaster Recovery: Robust plans and centralized management.
• Critical Capabilities:
o Environment Support: Virtual, physical, cloud.
o Data Deduplication: Optimize storage.
o Instant Recovery: Quick failover.
o Ransomware Protection: Ensure security.
o Granular Restore: Individual files, folders, applications.
o Management Tools: Reporting, monitoring, alerting.
o Integration: With existing systems.
• Data Deduplication:
o Redundant Data: Eliminates duplicates.
o Efficiency: Improves storage and transfer.
• Backup Frequency:
o Dynamic vs. Stable Data: Frequency based on needs.
o Assessment: Regulatory requirements, risk tolerance, resources.
• On-Site and Off-Site Backups:
o Local Storage: Rapid access.
o Remote Storage: Protection against physical threats.
o Ransomware: Air-gapped backups.
• Recovery Validation:
o Full and Partial Tests: Verify functionality and integrity.
o Audits and Scenarios: Ensure preparedness.
o Understanding Recovery Times: Critical for planning.
186
▪ VM Snapshots: Capture the state of a virtual machine, including memory,
storage, and configuration settings (e.g., VMware vSphere, Microsoft Hyper-
V).
▪ Filesystem Snapshots: Capture the state of a file system at a given moment
(e.g., ZFS, Btrfs).
▪ SAN Snapshots: Taken at the block-level storage layer within a storage area
network (e.g., NetApp, Dell EMC).
o Benefits: Enable rollback to previous states, recover deleted files, and restore large
datasets quickly.
• Replication and Journaling:
o Replication:
▪ Definition: Creating and maintaining exact copies of data on different
storage systems or locations.
▪ Example: Database mirroring where changes to the primary database are
replicated to a secondary database.
▪ Benefits: Safeguards against data loss due to failures, errors, or attacks.
o Journaling:
▪ Definition: Recording changes to data in a separate log (journal).
▪ Example: File system journaling (e.g., JFS, NTFS) maintains a record of
changes for recovery and consistency checks.
▪ Benefits: Enables tracking and reverting data modifications, minimizing
data loss.
• Advanced Data Protection Methods:
o Remote Journaling: Maintains a journal of data changes at a remote location for
recovery and business continuity.
o SAN Replication: Duplicates data from one SAN to another, providing redundancy
and protection against failures.
o VM Replication: Maintains an up-to-date copy of a virtual machine on a separate
host for quick failover.
• Encrypting Backups:
o Importance: Adds an extra layer of protection against unauthorized access or theft.
o Benefits: Ensures sensitive data remains unreadable without the decryption key,
meeting regulatory requirements and avoiding legal consequences.
o Regulations: Many industries mandate the protection of sensitive data stored in
backups.
Key Points:
187
• Snapshots:
o VM Snapshots: Capture VM state (e.g., VMware vSphere, Microsoft Hyper-V).
o Filesystem Snapshots: Capture file system state (e.g., ZFS, Btrfs).
o SAN Snapshots: Capture storage volume state (e.g., NetApp, Dell EMC).
• Replication and Journaling:
o Replication: Exact data copies (e.g., database mirroring).
o Journaling: Separate log of data changes (e.g., JFS, NTFS).
• Advanced Methods:
o Remote Journaling: Data changes at a remote location.
o SAN Replication: Real-time data duplication.
o VM Replication: Up-to-date VM copy for failover.
• Encrypting Backups:
o Data Security: Protects against unauthorized access.
o Compliance: Meets regulatory requirements.
o Regulations: Mandate protection of sensitive data.
188
▪ Complex Patterns: Multiple passes to thwart data recovery attempts.
o Solid-State Drives (SSDs):
▪ ATA Secure Erase: Commands designed to sanitize all stored data, including
inaccessible memory cells.
• Asset Disposal:
o Sanitization:
▪ Definition: Removing sensitive information to prevent unauthorized access.
▪ Techniques: Data wiping, degaussing, encryption.
▪ Importance: Protects sensitive information and ensures compliance.
o Destruction:
▪ Physical Methods: Shredding, crushing, incinerating storage devices.
▪ Electronic Methods: Overwriting data multiple times, degaussing.
▪ Purpose: Ensures data cannot be retrieved or misused.
o Certification:
▪ Definition: Documentation and verification of data sanitization or
destruction.
▪ Third-Party Involvement: Provides impartial evaluation and compliance
evidence.
• Overwriting HDD Data:
o Process: Sets each bit to zero (zero filling) or uses more secure methods with
multiple passes.
o Security: More secure methods involve passes of zeros, ones, and pseudorandom
patterns.
o Time: Overwriting can take considerable time depending on the number of passes.
Key Points:
• Circumstances for Data Destruction:
o Retention Period: End of data retention.
o Compliance: GDPR, HIPAA.
o Storage Optimization: Destroy obsolete data.
o Decommissioning: Secure data destruction before disposal.
• Methods for Data Destruction:
o HDDs: Data wiping, complex patterns.
o SSDs: ATA Secure Erase.
189
• Asset Disposal:
o Sanitization: Data wiping, degaussing, encryption.
o Destruction: Physical (shredding, crushing), electronic (overwriting, degaussing).
o Certification: Documentation and third-party verification.
• Overwriting HDD Data:
o Zero Filling: Basic method.
o Secure Methods: Multiple passes.
o Time: Depends on number of passes.
Continuity of Operations
Summary: Continuity of operations (COOP) ensures that an organization can maintain or quickly
resume critical functions during disruptions. COOP strategies minimize downtime, protect
resources, and maintain business resilience through redundancy, alternative work arrangements,
and clear communication protocols.
Detailed Explanation:
• COOP Concepts:
o Definition: Ensures maintenance or quick resumption of critical functions during
disruptions.
o Key Elements: Identify critical functions, establish priorities, determine necessary
resources.
o Strategies: Redundancy for IT systems and data, off-site backups, failover systems,
disaster recovery solutions.
o Alternative Work Arrangements: Remote work, co-location arrangements.
o Communication Protocols: Clear roles and responsibilities during emergencies.
• Testing and Updating COOP Plans:
o Importance: Regular testing and updating ensure effectiveness during disruptions.
o Testing Methods: Tabletop exercises, isolated functional tests, full-scale drills.
o Evaluation Criteria: Pre-established criteria for measuring performance.
o Focus: Proactive preparation for disruptions to minimize impact.
• Backups in COOP:
o Role: Safeguard against data loss and restore systems during disruptions.
190
o Testing: Verifies integrity and effectiveness of backups.
o Scenarios: Simulate various disruptions to identify issues and gaps.
o Compliance: Ensure regulatory requirements are met.
• Relationship to Business Continuity:
o COOP: Focuses on continuity of critical functions during emergencies.
o Business Continuity (BC): Broader approach, including overall resilience and
recovery.
o Scope: COOP is a component of BC, focusing on immediate response and restoration.
• Capacity Planning:
o Definition: Assess current and future resource requirements to meet business
objectives.
o People: Evaluate workforce productivity, staffing levels, skills gaps.
o Technology: Assess hardware, software, network resources for performance,
scalability, reliability.
o Infrastructure: Evaluate physical facilities for growth and continuity.
o Methods: Trend analysis, simulation modeling, benchmarking.
o Benefits: Optimize resource allocation, reduce costs, minimize downtime.
Key Points:
• COOP Concepts:
o Critical Functions: Identify and prioritize.
o Strategies: Redundancy, backups, disaster recovery.
o Work Arrangements: Remote work, co-location.
o Communication: Clear protocols.
• Testing COOP Plans:
o Regular Testing: Ensure effectiveness.
o Methods: Exercises, drills.
o Evaluation: Pre-established criteria.
• Backups in COOP:
o Safeguard Data: Against loss.
o Testing: Verify integrity.
o Compliance: Regulatory requirements.
• Relationship to BC:
191
o COOP: Immediate response.
o BC: Overall resilience.
• Capacity Planning:
o Resource Assessment: People, technology, infrastructure.
o Methods: Trend analysis, simulation, benchmarking.
o Benefits: Optimize resources, reduce costs.
192
o Video Conferencing Software: Virtual meetings and screen sharing (e.g., Zoom,
Microsoft Teams).
o Instant Messaging/Chat Tools: Real-time communication (e.g., Slack, Microsoft
Teams).
o Virtual Phone Systems: Cloud-based phone systems for remote calls.
o Project Management Tools: Task management and team coordination (e.g., Trello,
Asana).
• Changes in Workforce Capacity:
o Layoffs: Introduce cybersecurity and physical risks.
o Disgruntled Employees: Potential unauthorized access or misuse of data.
o Knowledge Transfer: Loss of experienced employees can lead to security gaps.
o Offboarding Procedures: Ensure proper revocation of access and knowledge
transfer.
• Other Risks of Poor Capacity Planning:
o Technology/Infrastructure:
▪ Overloaded Systems: Susceptible to crashes, failures, and DoS attacks.
▪ Limited Resources: Performance degradation and neglect of security
measures.
▪ Insufficient Investment: Vulnerability to emerging threats.
o Physical Security:
▪ Insufficient Measures: Risk of unauthorized access or theft.
▪ Power/Cooling Requirements: Overheating or power failures in
datacenters.
▪ Future Growth: Limited ability to scale operations.
o Overestimating Capacity Needs:
▪ Increased Costs: Unnecessary expenses strain budgets.
▪ Inefficient Utilization: Low ROI and operational effectiveness.
▪ Higher Energy Consumption: Increased costs and environmental impact.
▪ Increased Complexity: Challenges in managing technology and
infrastructure.
▪ Opportunity Cost: Diverting resources from essential projects.
• Balanced Approach:
o Regular Review/Update: Capacity plans to adapt to changing circumstances.
o Techniques: Monitoring, forecasting, and resource scaling.
193
o Benefits: Optimize resource allocation and mitigate risks.
Key Points:
• People Risks:
o Staffing/Skills Gaps: Inadequate resource allocation.
o Cross-Training: Reduce dependency.
o Communication: Manage expectations and responses.
• Remote Work Technologies:
o VPN, Remote Desktop, Cloud Tools: Secure access and collaboration.
o Video Conferencing, Messaging, Phone Systems: Communication.
o Project Management: Task coordination.
• Workforce Capacity Changes:
o Layoffs: Cybersecurity and physical risks.
o Offboarding: Proper procedures.
• Technology/Infrastructure Risks:
o Overloaded Systems: Crashes and failures.
o Limited Resources: Performance issues.
o Investment: Protect against threats.
• Balanced Capacity Planning:
o Review/Update: Adapt to changes.
o Techniques: Monitoring and forecasting.
o Benefits: Optimize resources.
High Availability
Summary: High availability (HA) ensures IT systems remain operational with minimal downtime. It
involves designing hardware, servers, networking, datacenters, and physical locations for fault
tolerance and redundancy. HA setups use redundant components and failover mechanisms to
maintain continuous operation.
Detailed Explanation:
• High Availability Concepts:
o Definition: Ensures systems remain operational and accessible with minimal
downtime.
o Redundant Components: Power supplies, hard drives, network interfaces.
194
o Server Clusters: Automatic failover from primary to secondary servers.
o Networking Redundancy: Switches, routers, load balancers.
o Datacenters: Redundant power sources, cooling systems, backup generators.
o Geographic Diversity: Deploy datacenters in diverse locations to mitigate large-
scale events.
• Measuring Availability:
o Uptime and Downtime: Measured over a defined period (e.g., one year).
o Maximum Tolerable Downtime (MTD): Expresses availability requirement.
o "Nines" Term: Describes availability (e.g., 99.9999% for six-nines).
o Downtime Calculation: Sum of scheduled service intervals plus unplanned outages.
• Scalability and Elasticity:
o Scalability: Increase resources to meet demand within similar cost ratios.
▪ Scale Out: Add more resources in parallel.
▪ Scale Up: Increase power of existing resources.
o Elasticity: Handle changes in demand in real time without performance loss.
• Fault Tolerance and Redundancy:
o Fault Tolerance: System continues to provide service despite failures.
o Redundant Components: Allow recovery from component failures.
• Site Considerations:
o Alternate Processing/Recovery Sites: Provide similar level of service.
o Failover: Redundant component or site takes over functionality.
o Site Resiliency: Hot, warm, or cold sites.
▪ Hot Site: Immediate failover, operational equipment with live data.
▪ Warm Site: Requires loading latest data set.
▪ Cold Site: Empty building, longer setup time.
• Geographic Dispersion:
o Definition: Distribution of recovery sites across different locations.
o Purpose: Minimize impact of regional disasters.
• Cloud as Disaster Recovery (DR):
o Cost Efficiency: Affordable redundancy and backup options.
o Scalability: Incorporate redundant capabilities without over-provisioning.
195
o Geographic Diversity: Protect against regional outages.
o Faster Deployment: Quick setup of redundant systems.
o Simplified Management: Tools and services reduce complexity.
o Improved Security and Compliance: Meet regulatory requirements.
• Testing Redundancy and High Availability:
o Load Testing: Validate performance under expected or peak loads.
o Failover Testing: Ensure seamless transition between primary and secondary
infrastructure.
o Monitoring Systems: Detect and respond to failures and performance issues.
Key Points:
• High Availability Concepts:
o Redundant Components: Ensure continuous operation.
o Server Clusters: Automatic failover.
o Networking Redundancy: Maintain connectivity.
o Datacenters: Redundant power and cooling.
• Measuring Availability:
o Uptime/Downtime: Defined period.
o MTD: Availability requirement.
o "Nines" Term: Availability description.
• Scalability and Elasticity:
o Scalability: Increase resources.
o Elasticity: Handle demand changes.
• Fault Tolerance and Redundancy:
o Fault Tolerance: Continue service despite failures.
o Redundant Components: Recovery from failures.
• Site Considerations:
o Alternate Sites: Processing/recovery.
o Failover: Redundant component/site.
o Site Resiliency: Hot, warm, cold.
• Geographic Dispersion:
o Recovery Sites: Different locations.
196
o Purpose: Minimize disaster impact.
• Cloud as DR:
o Cost Efficiency: Affordable redundancy.
o Scalability: Redundant capabilities.
o Geographic Diversity: Protect against outages.
o Faster Deployment: Quick setup.
o Simplified Management: Reduce complexity.
o Security and Compliance: Meet requirements.
• Testing Redundancy and HA:
o Load Testing: Validate performance.
o Failover Testing: Ensure seamless transition.
o Monitoring Systems: Detect/respond to issues.
Clustering
Summary: Clustering involves multiple redundant processing nodes that share data and accept
connections, providing redundancy and high availability. If one node fails, connections can failover
to a working node, making the cluster appear as a single server to clients.
Detailed Explanation:
• Clustering vs. Load Balancing:
o Load Balancing: Distributes traffic between independent processing nodes,
typically managing web traffic.
o Clustering: Provides redundancy and high availability for systems like databases
and file servers by sharing data among nodes.
• Virtual IP:
o Definition: A shared or floating address used by multiple load balancer appliances.
o Configuration: Instances have a private connection with "real" IP addresses and run
a redundancy protocol (e.g., CARP).
o Failover Mechanism: Heartbeat mechanism allows failover to a passive node if the
active one fails.
• Active/Passive (A/P) and Active/Active (A/A) Clustering:
o Active/Passive Clustering:
▪ Definition: One node is active, the other is passive.
▪ Advantage: Performance is not affected during failover.
197
▪ Disadvantage: Higher hardware and operating system costs due to unused
capacity.
o Active/Active Clustering:
▪ Definition: Both nodes process connections concurrently.
▪ Advantage: Maximum capacity utilization.
▪ Disadvantage: Performance degradation during failover.
• N+1 and N+M Configurations:
o N+1 Configuration:
▪ Definition: A single passive node shared among multiple active nodes.
▪ Example: Five active nodes with one passive node.
▪ Benefit: Reduces the number of passive nodes needed.
o N+M Configuration:
▪ Definition: Multiple passive nodes shared among multiple active nodes.
▪ Example: Ten active nodes with two or three passive nodes.
▪ Benefit: Balance between redundancy and cost-efficiency.
• Application Clustering:
o Purpose: Provision fault-tolerant application services.
o Session State Data: Allows servers to communicate session information.
o Example: User logs in on one instance, next session can start on another instance
with access to login information.
Key Points:
• Clustering vs. Load Balancing:
o Load Balancing: Manages web traffic.
o Clustering: Redundancy for databases, file servers.
• Virtual IP:
o Shared Address: Used by multiple appliances.
o Redundancy Protocol: CARP, heartbeat mechanism.
• Active/Passive and Active/Active Clustering:
o Active/Passive: One active, one passive.
o Active/Active: Both nodes active.
• N+1 and N+M Configurations:
o N+1: Single passive node for multiple active nodes.
198
o N+M: Multiple passive nodes for multiple active nodes.
• Application Clustering:
o Fault-Tolerant Services: Communicate session information.
o Example: Session continuity across instances.
Power Redundancy
Summary: Power redundancy ensures that computer systems have a stable power supply to
operate continuously. It involves deploying systems to protect against electrical events like voltage
spikes, surges, and power failures, allowing network operations to continue uninterrupted or be
quickly recovered.
Detailed Explanation:
• Dual Power Supplies:
o Definition: Enterprise-class servers or appliances feature two or more power
supply units (PSUs) for redundancy.
o Hot Plug PSU: Can be replaced without powering down the system.
• Managed Power Distribution Units (PDUs):
o Power Circuits: Must meet the load capacity of all installed equipment with room
for growth.
o Functions: Clean power signal, protect against spikes, surges, under-voltage events,
and integrate with uninterruptible power supplies (UPSs).
o Remote Monitoring: Report load and status, switch power on/off, sequence socket
activation.
• Battery Backups and Uninterruptible Power Supplies (UPSs):
o Battery Backup: Sustains system operation for minutes or hours during power loss.
o Component Level: Protects read/write operations cached at the time of power loss.
o System Level: UPS provides temporary power source during complete power loss.
o Components: Bank of batteries, charging circuit, inverter for AC voltage.
o Failover Time: Allows time to switch to an alternative power source or shut down
properly.
• Generators:
o Backup Power: Provides power to the whole building for several days.
o Fuel Sources: Diesel, propane, natural gas, renewable sources (solar, wind,
geothermal, hydrogen fuel cells, hydro).
o Large-Scale Battery Solutions: Alternatives to backup generators (e.g., Tesla's
Powerpack).
199
o Microgrid Technologies: Use datacenter battery resources for power storage.
o Transfer Switches: Introduce generator power manually or automatically.
o UPS Requirement: Protect against interruptions as generators cannot respond fast
enough.
Key Points:
• Dual Power Supplies:
o Redundancy: Two or more PSUs.
o Hot Plug: Replace without shutdown.
• Managed PDUs:
o Load Capacity: Meet equipment needs.
o Functions: Clean power, protect against electrical events.
o Remote Monitoring: Load, status, power control.
• Battery Backups and UPSs:
o Temporary Power: Sustain operation during power loss.
o Component/System Level: Protect read/write operations, provide AC voltage.
o Failover Time: Switch to alternative power or shut down.
• Generators:
o Backup Power: Whole building for days.
o Fuel Sources: Diesel, propane, natural gas, renewables.
o Battery Solutions: Alternatives to generators.
o Microgrid Technologies: Power storage.
o Transfer Switches: Manual/automatic.
o UPS Requirement: Protect against interruptions.
200
o Benefits: Reduces risk of a single vulnerability compromising the entire system.
o Challenges for Attackers: Requires familiarity with multiple platforms and exploit
techniques.
o Robust Security Posture: Limits potential damage and deters attackers.
• Defense in Depth:
o Definition: Comprehensive strategy with multiple layers of protection.
o Perimeter Security: Firewalls, intrusion detection systems.
o Network Level: Segmentation, secure access controls, traffic monitoring.
o Endpoint Security: Antivirus software, device hardening, patch management.
o User Authentication: Multifactor authentication.
o Employee Training: Security awareness and incident response planning.
• Vendor Diversity:
o Cybersecurity: Reduces single point of failure risk.
o Business Resilience: Mitigates vendor lock-in risk.
o Innovation: Leverages diverse perspectives and technologies.
o Competition: Promotes better pricing, features, and support.
o Customization: Allows tailored IT infrastructure.
o Risk Management: Spreads risk across multiple vendors.
o Compliance: Meets regulatory requirements.
• Multi-Cloud Strategies:
o Cybersecurity Benefits: Diversifies risk, improves security posture.
o Business Benefits: Promotes vendor independence, fosters competition, optimizes
IT infrastructure.
o Example: E-commerce platform using multiple cloud providers for high availability,
data security, performance optimization, and cost efficiency.
Key Points:
• Platform Diversity:
o Multiple Technologies: Reduce risk of single vulnerability.
o Challenges for Attackers: Familiarity with multiple platforms.
o Robust Security: Limits damage, deters attackers.
• Defense in Depth:
o Multiple Layers: Comprehensive protection.
201
o Perimeter Security: Firewalls, intrusion detection.
o Network Level: Segmentation, access controls.
o Endpoint Security: Antivirus, patch management.
o User Authentication: Multifactor.
o Employee Training: Awareness, incident response.
• Vendor Diversity:
o Cybersecurity: Reduces failure risk.
o Business Resilience: Mitigates lock-in.
o Innovation: Diverse technologies.
o Competition: Better pricing, features.
o Customization: Tailored infrastructure.
o Risk Management: Spreads risk.
o Compliance: Regulatory requirements.
• Multi-Cloud Strategies:
o Cybersecurity: Diversifies risk.
o Business: Vendor independence, competition.
o Example: E-commerce platform with multiple cloud providers.
Deception Technologies
Summary: Deception and disruption technologies are cybersecurity tools designed to detect and
defend against attacks by increasing the cost of attack planning for threat actors. These tools
include honeypots, honeynets, honeyfiles, and honeytokens, which help monitor attacker activity,
gather intelligence, and divert attention from real systems.
Detailed Explanation:
• Honeypots:
o Definition: Decoy systems that mimic real systems and applications.
o Purpose: Monitor attacker activity and gather information about their tactics and
tools.
• Honeynets:
o Definition: A network of interconnected honeypots simulating an entire network.
o Purpose: Provide a more extensive and realistic environment for attackers to
engage with.
• Honeyfiles:
202
o Definition: Fake files that appear to contain sensitive information.
o Purpose: Detect attempts to access and steal data.
• Honeytokens:
o Definition: False credentials, login credentials, or other data types.
o Purpose: Distract attackers, trigger alerts, and provide insight into attacker activity.
• Benefits:
o Detection and Monitoring: Identify and monitor attacks.
o Intelligence Gathering: Collect information about attackers and their methods.
o Proactive Defense: Defend against future attacks.
o Diversion: Divert attackers' attention from real systems, reducing the risk of
successful attacks.
• Disruption Strategies:
o Purpose: Raise the attack cost and tie up adversary's resources.
o Examples:
▪ Bogus DNS Entries: List multiple non-existent hosts.
▪ Decoy Directories: Configure web servers with multiple decoy directories
or dynamically generated pages.
▪ Port Triggering/Spoofing: Return fake telemetry data to slow down port
scanning.
▪ DNS Sinkhole: Route suspect traffic to a honeynet for analysis.
Key Points:
• Honeypots:
o Decoy Systems: Mimic real systems.
o Monitor Activity: Gather attacker information.
• Honeynets:
o Network of Honeypots: Simulate entire network.
o Engagement: Realistic environment for attackers.
• Honeyfiles:
o Fake Files: Detect data access attempts.
o Sensitive Information: Appear valuable.
• Honeytokens:
o False Credentials: Distract and trigger alerts.
203
o Insight: Provide attacker activity information.
• Disruption Strategies:
o Raise Attack Cost: Tie up resources.
o Examples: Bogus DNS, decoy directories, port spoofing, DNS sinkhole.
Testing Resiliency
Summary: Testing system resilience and incident response effectiveness is crucial for organizations
to recover from disruptions and maintain business continuity. Various tests help identify
vulnerabilities, evaluate recovery strategies, and improve preparedness for real-life incidents.
Detailed Explanation:
• Tabletop Exercises:
o Definition: Teams discuss and work through hypothetical scenarios.
o Purpose: Assess response plans and decision-making processes.
o Example: Simulating a ransomware attack to test collaboration between IT and
management teams.
• Failover Tests:
o Definition: Intentionally cause the failure of a primary system to evaluate automatic
transfer to a secondary system.
o Purpose: Ensure backup systems can seamlessly take over during an incident.
o Example: Simulating the failure of a primary database server to verify standby
server functionality.
• Simulations:
o Definition: Controlled experiments replicating real-world scenarios.
o Purpose: Assess incident response processes and system resilience under realistic
conditions.
o Example: Cyberattack simulation targeting network infrastructure to evaluate
security measures.
• Parallel Processing Tests:
o Definition: Run primary and backup systems simultaneously.
o Purpose: Validate functionality and performance of backup systems without
disrupting normal operations.
o Example: Verifying that a backup datacenter can handle the same traffic as the
primary datacenter.
• Risks of Not Testing:
204
o Potential Vulnerabilities: Unrecognized weaknesses in incident response plans.
o System Failures: Untested systems may fail during real-life disruptions.
o Extended Downtime: Increased downtime and data loss.
o Regulatory Penalties: Failure to meet industry standards and compliance
requirements.
• Documentation:
o Planning, Implementation, Evaluation: Comprehensive documentation supports
the testing process.
o Test Plans: Outline objectives, scope, methods, roles, and responsibilities.
o Test Scripts: Step-by-step instructions for performing tests.
o Test Results: Identify strengths and weaknesses of business continuity plans.
o Communication: Facilitates effective communication with stakeholders.
o Third-Party Assessments: Objective evaluation and compliance verification (e.g.,
ISO 22301, PCI DSS, SOC 2).
Key Points:
• Tabletop Exercises:
o Hypothetical Scenarios: Assess response plans.
o Example: Ransomware attack simulation.
• Failover Tests:
o Primary System Failure: Evaluate automatic transfer.
o Example: Database server failover.
• Simulations:
o Real-World Scenarios: Assess processes and resilience.
o Example: Cyberattack simulation.
• Parallel Processing Tests:
o Simultaneous Systems: Validate backup functionality.
o Example: Backup datacenter traffic handling.
• Risks of Not Testing:
o Vulnerabilities: Unrecognized weaknesses.
o System Failures: Untested systems.
o Extended Downtime: Increased downtime.
o Regulatory Penalties: Compliance failure.
205
• Documentation:
o Comprehensive Support: Planning, implementation, evaluation.
o Test Plans/Scripts: Objectives, methods, instructions.
o Test Results: Identify strengths/weaknesses.
o Communication: Effective stakeholder communication.
o Third-Party Assessments: Objective evaluation.
206
o Authentication: Identifies approved persons through access lists and mechanisms.
o Authorization: Controls access through defined entry and exit points.
o Accounting: Records usage of entry/exit points and detects breaches.
• Zone Implementation:
o Definition: Physical security often uses zones separated by barriers.
o Security Mechanisms: Control entry and exit points.
o Restrictive Progression: Each zone becomes increasingly restrictive.
Key Points:
• Importance of Physical Security:
o Defense: Against unauthorized access.
o Components: Servers, datacenters, infrastructure.
• Examples of Measures:
o Access Control: Biometric scanners, smart cards, key fobs.
o Surveillance: Video cameras, motion sensors, alarms.
o Environmental Controls: Backup power, cooling, fire suppression.
• Access Control Fundamentals:
o Authentication: Access lists, mechanisms.
o Authorization: Barriers, entry/exit points.
o Accounting: Records, breach detection.
• Zone Implementation:
o Zones: Separated by barriers.
o Mechanisms: Control entry/exit.
o Restrictive: Increasingly restrictive zones.
207
o Benefits: Enhances security, deters criminal activity, promotes safety, cost-effective.
• Barricades and Entry/Exit Points:
o Definition: Prevent access and channel people through defined points.
o Authentication Mechanisms: Ensure only authorized persons are allowed through.
o Surveillance: Detect attempts to penetrate barricades.
o Examples: Bollards and security posts to prevent vehicle attacks.
• Fencing:
o Purpose: Protect the exterior of a building.
o Characteristics: Transparent, robust, secure against climbing.
o Drawback: Can give an intimidating appearance.
o Alternative Methods: Discreet security for customer-facing buildings.
• Lighting:
o Importance: Enhances perception of safety and security at night.
o Design Considerations: Overall light levels, specific surfaces, avoid shadows and
glare.
o Benefits: Deterrent to intrusion, aids surveillance.
• Bollards:
o Definition: Short vertical posts made of durable materials.
o Types: Fixed, retractable, remotely controlled.
o Purposes: Protect pedestrians, prevent unauthorized vehicle access, secure
infrastructure.
o Applications: Government buildings, airports, stadiums, store entrances.
• Existing Structures:
o Adjustments: Incorporate security principles within cost constraints.
o Secure Zones: Locate deep within buildings, avoid external walls/doors/windows.
o Public Access Areas: Use demilitarized zone design, visible security mechanisms.
o Signage and Warnings: Enforce controlled security.
o Discreet Entry Points: Avoid inspection of security mechanisms.
o Traffic Flow: Minimize movement between zones.
o High-Visibility Areas: Hinder covert use of gateways, simplify surveillance.
o Secure Zones: Position screens/input devices away from pathways/windows, use
one-way glass.
208
Key Points:
• Environmental Design:
o Enhance Security: Built environment.
o Settings: Various public and private spaces.
o Benefits: Security, deterrence, safety, cost-effective.
• Barricades and Entry/Exit Points:
o Prevent Access: Channel through points.
o Authentication: Authorized persons only.
o Surveillance: Detect penetration attempts.
o Examples: Bollards, security posts.
• Fencing:
o Protect Exterior: Transparent, robust, secure.
o Drawback: Intimidating appearance.
o Alternatives: Discreet methods.
• Lighting:
o Safety and Security: Nighttime perception.
o Design: Light levels, surfaces, avoid shadows/glare.
o Benefits: Deterrent, aids surveillance.
• Bollards:
o Durable Posts: Fixed, retractable.
o Purposes: Pedestrian protection, vehicle access prevention.
o Applications: Various public spaces.
• Existing Structures:
o Security Adjustments: Within cost constraints.
o Secure Zones: Deep within buildings.
o Public Areas: Demilitarized design, visible security.
o Signage: Enforce security.
o Discreet Entry: Avoid inspection.
o Traffic Flow: Minimize between zones.
o High-Visibility: Hinder covert use, simplify surveillance.
o Secure Zones: Position screens/input devices strategically.
209
Gateways and Locks
Summary: Securing gateways involves fitting them with locks that are self-closing and self-locking.
Locks can be physical, electronic, or biometric. Additional security measures include access control
vestibules (mantraps), cable locks, and access badges, which are part of a physical access control
system (PACS).
Detailed Explanation:
• Types of Locks:
o Physical Locks:
▪ Definition: Conventional locks that require a key to operate.
▪ Security: More expensive types offer greater resistance to lock picking.
o Electronic Locks:
▪ Definition: Operate by entering a PIN on an electronic keypad.
▪ Types: Cipher, combination, or keyless locks.
▪ Smart Locks: Opened using a magnetic swipe card or proximity reader.
o Biometric Locks:
▪ Definition: Integrated with a biometric scanner (e.g., fingerprint, facial
recognition).
• Access Control Vestibule (Mantrap):
o Definition: Security measure with two interlocking doors that allow only one
person to pass at a time.
o Operation: First door opens after access is granted, second door opens only when
the first door is shut.
o Purpose: Prevents unauthorized access and tailgating.
o Applications: High-security settings like datacenters, government buildings,
financial institutions.
• Cable Locks:
o Definition: Attach to a secure point on the device chassis.
o Purpose: Secure the chassis to a rack or desk, prevent opening without removing
the cable.
• Access Badges:
o Definition: Plastic cards with magnetic strips, RFID chips, or NFC technology.
o Function: Replace physical keys, provide access by swiping, tapping, or proximity.
210
o System Requirements: Magnetic door-locking mechanisms, access card readers,
electrical power, and network communications.
o PACS: Manages and maintains security within a facility, logs badge access activity.
o Identification: Displays badge holder's name, title, photograph.
o Security Audits: Logs time, location, and identity for investigations and planning.
Key Points:
• Types of Locks:
o Physical: Conventional, key-operated.
o Electronic: PIN, smart locks.
o Biometric: Integrated scanners.
• Access Control Vestibule:
o Mantrap: Two interlocking doors.
o Purpose: Prevent unauthorized access.
• Cable Locks:
o Secure Point: Attach to chassis.
o Purpose: Prevent unauthorized opening.
• Access Badges:
o Plastic Cards: Magnetic strips, RFID, NFC.
o Function: Replace keys, provide access.
o PACS: Manage security, log activity.
o Identification: Name, title, photograph.
o Security Audits: Log access events.
211
o Cost: Expensive to maintain.
o Limitations: May not be possible in certain zones due to security clearance
requirements.
o Training: Essential for effective performance.
• Video Surveillance:
o Cost-Effective: Cheaper than maintaining separate guards at each gateway or zone.
o Deterrent: Effective in deterring unauthorized access.
o Recording: Movement and access can be recorded for later review.
o Drawbacks: Longer response times, potential security compromise if not enough
staff monitor feeds.
o CCTV Network: Cameras connected to a multiplexer using coaxial or data cabling.
• Smart Physical Security:
o AI and Machine Learning: Enhance surveillance capabilities.
o Motion Recognition: Alerts when movement patterns do not match authorized
individuals.
o Object Detection: Detects changes in the environment, such as missing servers or
unknown devices.
o Drones/UAV: Cameras mounted on drones cover wider areas than ground-based
patrols.
Key Points:
• Security Guards:
o Monitor Checkpoints: Verify identification, log events.
o Visual Deterrent: Respond to breaches.
o Cost: Expensive.
o Training: Essential.
• Video Surveillance:
o Cost-Effective: Compared to guards.
o Deterrent: Effective.
o Recording: Movement and access.
o Drawbacks: Response times, monitoring staff.
o CCTV Network: Coaxial or data cabling.
• Smart Physical Security:
o AI and Machine Learning: Enhance capabilities.
212
o Motion Recognition: Alerts for unauthorized movement.
o Object Detection: Changes in environment.
o Drones/UAV: Wider area coverage.
213
o Monitoring Systems: Alarms linked to local law enforcement or security
companies.
o Silent Alarms: Alert security personnel without audible sound.
• Sensor Types:
o Infrared Sensors:
▪ Definition: Detect changes in heat patterns.
▪ Applications: Motion detection in residential and commercial systems.
o Pressure Sensors:
▪ Definition: Activated by weight.
▪ Applications: High-security areas, retail environments.
o Microwave Sensors:
▪ Definition: Emit microwave pulses and measure reflections.
▪ Dual-Technology: Combined with infrared detectors to reduce false alarms.
▪ Applications: Large outdoor areas like parking lots.
o Ultrasonic Sensors:
▪ Definition: Emit sound waves and measure return time.
▪ Applications: Automated lighting systems.
Key Points:
• Types of Alarms:
o Circuit: Door/window opening, fence cutting.
o Motion Detection: Movement within an area.
o Noise Detection: Sounds picked up by a microphone.
o Proximity: RFID tags and readers.
o Duress: Manually triggered by staff.
• Applications of Alarms:
o Perimeter Security: Windows, doors.
o Access Control: Unused spaces.
o Public Areas: Exposed staff.
o Monitoring Systems: Linked to law enforcement.
o Silent Alarms: Non-audible alerts.
• Sensor Types:
214
o Infrared: Heat pattern changes.
o Pressure: Activated by weight.
o Microwave: Pulse reflections.
o Ultrasonic: Sound wave return time.
215
o Vulnerabilities: Kernel vulnerabilities, misconfigurations, unpatched systems.
o Significance: Widespread use in cloud and server infrastructure.
o Example:
▪ Heartbleed (2014): A severe vulnerability in the OpenSSL cryptographic
library, compromising secret keys.
• Android:
o Definition: An open-source mobile OS.
o Vulnerabilities: Fragmentation among manufacturers and versions, inconsistent
patching.
o Example:
▪ Stagefright (2015): Allowed execution of malicious code via MMS
messages.
• iOS:
o Definition: A closed-source mobile OS.
o Vulnerabilities: Significant issues despite being closed-source.
o Example:
▪ Project Zero (2019): Discovered vulnerabilities exploited by nation-state
attackers via malicious websites.
Key Points:
• Microsoft Windows:
o Extensive Feature Set: Broad user base.
o Common Vulnerabilities: Buffer overflows, input validation, privilege flaws.
o Significant Examples: MS08-067, MS17-010.
• Apple macOS:
o UNIX-Based: Access controls, secure boot, third-party software.
o Perception of Safety: Can lead to complacency.
o Significant Example: Shellshock.
• Linux:
o Open-Source: Rapid development and patching.
o Common Issues: Kernel vulnerabilities, misconfigurations, unpatched systems.
o Significant Example: Heartbleed.
• Android:
216
o Open-Source: Fragmentation issues.
o Significant Example: Stagefright.
• iOS:
o Closed-Source: Still vulnerable.
o Significant Example: Project Zero vulnerabilities.
Vulnerability Types
Summary: Vulnerability types include issues with legacy and end-of-life (EOL) systems, firmware
vulnerabilities, and virtualization vulnerabilities. These vulnerabilities can pose significant security
challenges due to outdated systems, foundational software flaws, and the complexities of virtual
environments.
Detailed Explanation:
• Legacy and End-of-Life (EOL) Systems:
o Definition: Outdated systems that may no longer receive updates or support.
o EOL Systems: No longer supported by the manufacturer, making them vulnerable to
new threats.
o Legacy Systems: Outdated but may still be supported; often used due to reliability
and integration into critical functions.
o Examples: Windows 7 and Server 2008, which stopped receiving updates in January
2020.
o Risks: Lack of updates, lack of support, compatibility issues with newer systems.
• Firmware Vulnerabilities:
o Definition: Foundational software controlling hardware, which can contain
significant vulnerabilities.
o Examples:
▪ Meltdown and Spectre (2018): Impacted almost all computers and mobile
devices, allowing data theft during processing.
▪ LoJax (2018): UEFI firmware vulnerability allowing persistence even after
hard drive replacement or OS reinstallation.
o Risks: EOL hardware vulnerabilities arise when manufacturers stop providing
updates, parts, or patches.
• Virtualization Vulnerabilities:
o Definition: Vulnerabilities unique to virtual environments, impacting cost savings,
scalability, and efficiency.
o Examples:
217
▪ VM Escape: Attacker breaks out of a virtual machine to access the host
system or other VMs.
▪ Cloudburst (CVE-2009-1244): VMware ESX Server vulnerability allowing
guest OS to execute code on the host OS.
▪ Resource Reuse: Sensitive data leakage between VMs if resources are not
properly sanitized.
o Mitigation: Data sanitization, encryption, robust key management, training on
security features, and regular patching of hypervisors.
Key Points:
• Legacy and End-of-Life (EOL) Systems:
o Outdated Systems: Lack of updates and support.
o EOL Examples: Windows 7, Server 2008.
o Risks: Vulnerable to new threats, compatibility issues.
• Firmware Vulnerabilities:
o Foundational Software: Controls hardware.
o Significant Examples: Meltdown, Spectre, LoJax.
o Risks: Persistent vulnerabilities, data theft.
• Virtualization Vulnerabilities:
o Unique to Virtual Environments: VM escape, resource reuse.
o Significant Examples: Cloudburst, VM escape.
o Mitigation: Data sanitization, encryption, regular patching.
Zero-Day Vulnerabilities
Summary: Zero-day vulnerabilities are previously unknown flaws in software or hardware that
attackers exploit before developers can fix them. These vulnerabilities are highly dangerous due to
their stealth and unpredictability, often used by advanced threat actors for high-value targets.
Detailed Explanation:
• Definition:
• Zero-Day Vulnerability: A flaw that is unknown to developers and vendors, giving
them "zero days" to fix it once discovered.
• Zero-Day Attack: An attack that exploits a zero-day vulnerability.
• Zero-Day Malware: Malware designed to exploit a zero-day vulnerability.
• Significance:
• Impact: Can cause widespread damage before a patch is available.
218
• Targets: Often used against high-value targets like governmental institutions and
major corporations.
• Financial Value: Zero-day exploits can be worth millions of dollars, especially for
mobile OS vulnerabilities.
• Challenges:
• Detection: Traditional security measures like antivirus software and firewalls are
often ineffective.
• Response: Discovery triggers a race between attackers exploiting the vulnerability
and developers working to patch it.
• Responsible Disclosure:
• Process: Ethical security researchers inform the vendor privately to develop a patch
before public disclosure.
• Goal: Limit potential harm by allowing time for a fix before the vulnerability is
widely known.
• Examples:
• Advanced Threat Actors: Organized crime groups and nation-state attackers
frequently use zero-day vulnerabilities.
• Stockpiling: State security and law enforcement agencies may stockpile zero-days
for investigative purposes.
Key Points:
• Definition:
• Zero-Day Vulnerability: Unknown flaw with no available fix.
• Zero-Day Attack/Malware: Exploits the vulnerability.
• Significance:
• High Impact: Widespread damage potential.
• High-Value Targets: Governmental institutions, major corporations.
• Financial Value: Worth millions for mobile OS exploits.
• Challenges:
• Detection Issues: Ineffective traditional security measures.
• Response Race: Between attackers and developers.
• Responsible Disclosure:
• Ethical Process: Inform vendor privately.
• Goal: Develop patch before public disclosure.
• Examples:
219
• Advanced Threat Actors: Use in targeted attacks.
• Stockpiling: By state security and law enforcement.
Misconfiguration Vulnerabilities
Summary: Misconfiguration vulnerabilities occur when systems, networks, or applications are
improperly configured, leading to unauthorized access, data leaks, or full-system compromises.
These vulnerabilities can arise in various IT environments, including network equipment, servers,
databases, and cloud services.
Detailed Explanation:
• Definition:
• Misconfiguration: Improper setup of systems, networks, or applications that leads
to security vulnerabilities.
• Impact: Can result in unauthorized access, data leaks, or system compromises.
• Common Causes:
• Default Configurations: Often prioritize ease of use and compatibility, leading to
security trade-offs.
• Examples: Default credentials like "admin/admin," unnecessary services
enabled, overly permissive settings.
• Cloud Services: Default settings may leave data storage or compute instances
publicly accessible.
• Example: Improperly managed access permissions on storage buckets.
• Risks:
• Network Devices: Routers and switches with default configurations can be
vulnerable due to well-documented credentials and management protocols.
• Support and Troubleshooting: Temporary changes made during troubleshooting
can lead to vulnerabilities if not reverted.
• Example: Disabling security features or loosening access controls.
• Best Practices:
• Principle of Least Privilege: Configure systems to grant the minimum necessary
access.
• Change Default Credentials: Replace default login credentials with strong, unique
passwords.
• Tighten Access Controls: Ensure only authorized users have access to sensitive
systems and data.
• Regular Audits: Continuously review and audit configurations to maintain security.
220
• Change Management: Follow best practices for documenting, testing, and
approving changes to avoid introducing vulnerabilities.
Key Points:
• Definition:
• Misconfiguration: Improper setup leading to vulnerabilities.
• Impact: Unauthorized access, data leaks, system compromises.
• Common Causes:
• Default Configurations: Ease of use vs. security trade-offs.
• Cloud Services: Publicly accessible settings.
• Risks:
• Network Devices: Default credentials, vulnerable protocols.
• Support and Troubleshooting: Temporary changes not reverted.
• Best Practices:
• Least Privilege: Minimum necessary access.
• Change Credentials: Strong, unique passwords.
• Access Controls: Authorized user access only.
• Regular Audits: Continuous review.
• Change Management: Proper documentation and approval.
Cryptographic Vulnerabilities
Summary: Cryptographic vulnerabilities are weaknesses in cryptographic systems, protocols, or
algorithms that can be exploited to compromise data. These vulnerabilities are critical because
cryptography is essential for secure communication and data protection.
Detailed Explanation:
• Definition:
• Cryptographic Vulnerabilities: Weaknesses in cryptographic systems, protocols, or
algorithms.
• Impact: Can compromise data security, leading to unauthorized access and data
breaches.
• Examples:
• Heartbleed: Exploited a flaw in the OpenSSL cryptographic library, allowing
attackers to read secure communication.
• KRACK: A vulnerability in the WPA2 protocol that protects Wi-Fi traffic, allowing
attackers to intercept and decrypt network traffic.
221
• Symmetric and Asymmetric Encryption:
• Symmetric Encryption: Vulnerable to weak keys.
• Example: DES (Data Encryption Standard) was vulnerable to brute force
attacks due to its 56-bit key size.
• Triple DES (3DES): Initially more secure than DES but later found
vulnerable to the "Sweet32" birthday attack.
• Asymmetric Encryption: Vulnerable if small key sizes are used or if random
number generation is weak.
• Example: RSA can be compromised if the same key pair is used for an
extended period.
• Cipher Suites:
• Definition: Combinations of encryption algorithms used in protocols like SSL/TLS.
• Examples of Attacks:
• BEAST: Targeted weaknesses in SSL/TLS cipher suites.
• POODLE: Exploited flaws in SSL and early versions of TLS.
• Protecting Cryptographic Keys:
• Kerckhoffs's Principle: A cryptosystem should be secure even if everything about
the system, except the key, is public knowledge.
• Key Generation: Use industry best practices to ensure keys cannot be guessed or
brute-forced.
• Key Protection: Implement security measures to safeguard keys from unauthorized
access.
• Secure Key Storage: Use hardware security modules (HSMs) or key
management systems (KMS).
• Access Controls: Implement proper access controls and authentication
mechanisms.
• Key Rotation: Periodically change cryptographic keys to combat risks
associated with key breaches.
Key Points:
• Definition:
• Cryptographic Vulnerabilities: Weaknesses in cryptographic systems.
• Impact: Compromise data security.
• Examples:
• Heartbleed: OpenSSL flaw.
• KRACK: WPA2 protocol vulnerability.
222
• Symmetric and Asymmetric Encryption:
• Symmetric: Weak keys (e.g., DES, 3DES).
• Asymmetric: Small key sizes, weak random number generation (e.g., RSA).
• Cipher Suites:
• SSL/TLS Vulnerabilities: BEAST, POODLE.
• Protecting Cryptographic Keys:
• Kerckhoffs's Principle: Security even if system details are public.
• Key Generation: Best practices.
• Key Protection: Secure storage, access controls, key rotation.
223
• Weakened Security Measures: Rooting, sideloading, and jailbreaking can make it
easier for attackers to exploit vulnerabilities.
• Unverified App Stores: Increased risk of downloading malicious or compromised
applications.
• Compliance Violations: Particularly critical for regulated industries like healthcare
and finance.
• Mitigation Strategies:
• Mobile Device Management (MDM): Platforms can detect and restrict rooting,
jailbreaking, and sideloading.
• Employee Education: Regular awareness programs to ensure employees
understand the risks and adhere to security policies.
• Additional Vulnerabilities:
• Insecure Wi-Fi Connections: Mobile devices are susceptible to the same
vulnerabilities as desktop computers.
• Phishing Attacks: Mobile devices can be targeted by phishing attacks.
• Unpatched Software: Vulnerabilities in unpatched software can be exploited.
• Loss or Theft: Portable nature of mobile devices increases the risk of loss or theft,
potentially exposing unencrypted data.
Key Points:
• Rooting:
• Android Devices: Gain root access.
• Purpose: Modify system files, install custom ROMs.
• Jailbreaking:
• iOS Devices: Gain full access.
• Purpose: Install unauthorized apps, customize device.
• Sideloading:
• Definition: Install apps from unofficial sources.
• Risks: Malicious apps, data theft.
• Security and Privacy Concerns:
• Excessive Permissions: Access sensitive data.
• Increased Attack Surface: More vulnerabilities.
• Organizational Risks:
• Weakened Security: Easier exploitation.
• Compliance Violations: Critical for regulated industries.
224
• Mitigation Strategies:
• MDM Platforms: Detect and restrict.
• Employee Education: Awareness programs.
• Additional Vulnerabilities:
• Insecure Wi-Fi: Susceptible to attacks.
• Phishing: Targeted attacks.
• Unpatched Software: Exploitable vulnerabilities.
• Loss or Theft: Risk of data exposure.
Application Vulnerabilities
Summary: Application vulnerabilities include race conditions, memory injection, buffer overflow,
and malicious updates. These vulnerabilities can lead to severe security breaches, unauthorized
access, data corruption, and system compromises.
Detailed Explanation:
• Race Condition and TOCTOU:
• Definition: Software flaws related to the timing or order of events within a program.
• Impact: Can cause data corruption, unauthorized access, or security breaches.
• Examples:
• Dirty COW (CVE-2016-5195): A race condition in the Linux Kernel allowing
privileged access.
• Microsoft Windows Elevation of Privilege (CVE-2020-0796): A race
condition in SMBv3 protocol allowing arbitrary code execution.
• Mitigation: Use of locks, semaphores, and monitors in multi-threaded applications.
• Memory Injection:
• Definition: Introducing malicious code into a running application's process
memory.
• Impact: Can lead to unauthorized access, malware installation, data exfiltration, or
creating backdoors.
• Common Attacks: Buffer overflow, format string vulnerabilities, code injection.
• Mitigation: Secure coding practices, input/output validation, encoding, type-
casting, access controls, static and dynamic application testing.
• Buffer Overflow:
225
• Definition: Exploiting a buffer by overfilling it with data.
• Impact: Can change the return address in the stack, allowing arbitrary code
execution.
• Mitigation: Address space layout randomization (ASLR), Data Execution Prevention
(DEP), type-safe programming languages, secure coding practices.
• Malicious Update:
• Definition: An update that appears legitimate but contains harmful code.
• Impact: Can distribute malware or execute cyberattacks.
• Examples:
• CCleaner (2017): Compromised update with a malicious payload.
• SolarWinds (2020): Malicious update to the Orion platform distributing a
backdoor.
• Mitigation: Secure software supply chain management, digital signature
verification, software security practices.
Key Points:
• Race Condition and TOCTOU:
• Definition: Timing/order flaws.
• Impact: Data corruption, unauthorized access.
• Examples: Dirty COW, Microsoft SMBv3.
• Mitigation: Locks, semaphores, monitors.
• Memory Injection:
• Definition: Malicious code in process memory.
• Impact: Unauthorized access, malware, data exfiltration.
• Common Attacks: Buffer overflow, code injection.
• Mitigation: Secure coding, validation, access controls.
• Buffer Overflow:
• Definition: Overfilling a buffer.
• Impact: Arbitrary code execution.
• Mitigation: ASLR, DEP, type-safe languages, secure coding.
• Malicious Update:
• Definition: Harmful code in updates.
• Impact: Malware distribution, cyberattacks.
226
• Examples: CCleaner, SolarWinds.
• Mitigation: Supply chain management, digital signatures.
Evaluation Scope
Summary: Evaluation scope refers to the product, system, or service being analyzed for potential
security vulnerabilities. This process involves rigorous testing and analysis to identify weaknesses
in design, implementation, or operation, aiming to mitigate risk, improve security posture, and
ensure compliance with relevant standards.
Detailed Explanation:
• Evaluation Target:
• Definition: The specific product, system, or service under analysis.
• Examples: Software applications, networks, security services, entire IT
infrastructures.
• Focus: Application code, logic, data handling, authentication mechanisms, and other
security aspects.
• Scope Practices:
• Security Testing: Conducting vulnerability assessments and penetration testing to
identify weaknesses or misconfigurations.
• Documentation Review: Reviewing design specifications, architecture diagrams,
security policies, and procedures for secure design principles and compliance.
• Source Code Analysis: Identifying potential security vulnerabilities or coding
errors related to input validation, secure coding practices, and standards.
• Configuration Assessment: Ensuring configuration settings align with security
best practices and industry standards.
• Cryptographic Analysis: Assessing encryption algorithms, key management, and
secure key storage for proper implementation.
• Compliance Verification: Verifying adherence to relevant regulations, frameworks,
or security certifications.
• Security Architecture Review: Identifying weaknesses or gaps in security controls,
such as segregation of duties, audit trails, or access controls.
• Penetration Tester vs. Attacker:
• Penetration Tester:
• Scope: Authorized system, application, network, or environment for
evaluation.
• Objective: Uncover vulnerabilities, report findings, recommend remediation
strategies.
227
• Attacker:
• Scope: Intended target for exploitation.
• Objective: Identify and exploit vulnerabilities for unauthorized access, data
theft, service disruption, or system takeover.
Key Points:
• Evaluation Target:
• Definition: Product, system, or service under analysis.
• Focus: Security aspects like code, logic, data handling, authentication.
• Scope Practices:
• Security Testing: Vulnerability assessments, penetration testing.
• Documentation Review: Secure design principles, compliance.
• Source Code Analysis: Identify vulnerabilities, coding errors.
• Configuration Assessment: Align settings with best practices.
• Cryptographic Analysis: Proper implementation of encryption.
• Compliance Verification: Adherence to regulations.
• Security Architecture Review: Identify security control gaps.
• Penetration Tester vs. Attacker:
• Penetration Tester: Authorized evaluation, uncover vulnerabilities, recommend
fixes.
• Attacker: Exploit target vulnerabilities for malicious purposes.
228
• HTTP Statelessness: Each request is independent; sessions managed using cookies
or session IDs.
• Improper Management: Predictable session IDs, session fixation, session hijacking.
• Cross-Site Scripting (XSS):
• Definition: Exploits the browser's trust in scripts from a trusted site.
• Types:
• Reflected (Nonpersistent): Malicious input from a crafted link.
• Stored (Persistent): Malicious code inserted into a back-end database or
content management system.
• DOM-Based: Exploits vulnerabilities in client-side scripts manipulating the
Document Object Model (DOM).
• Impact: Defacing sites, stealing cookies, intercepting information, installing
malware.
• SQL Injection (SQLi):
• Definition: Exploits insecure processing of requests and queries.
• Impact: Extract or insert information into the database, execute arbitrary code.
• Example: Modifying SQL queries to return all user records or change fields.
Key Points:
• Characteristics:
• Exploitation: Input validation, security settings, software updates.
• Client-Server Model: Bypass security controls.
• Remote Exploitation: Internet-accessible.
• Session Management:
• HTTP Statelessness: Independent requests.
• Improper Management: Predictable IDs, fixation, hijacking.
• Cross-Site Scripting (XSS):
• Definition: Browser trust in scripts.
• Types: Reflected, stored, DOM-based.
• Impact: Defacing, stealing data, intercepting info, malware.
• SQL Injection (SQLi):
• Definition: Insecure request processing.
• Impact: Database manipulation, arbitrary code execution.
229
• Example: Modifying SQL queries.
230
• Reverse Proxy: Positioned at the cloud network edge, directing traffic to
cloud services if compliant.
• API: Brokers connections between cloud service and consumer,
communicating changes like disabled accounts or revoked authorizations.
Key Points:
• Characteristics:
• Exploitation: Misconfigurations, weak authentication.
• Shared Responsibility: Security gaps due to confusion.
• Accessibility: Attractive target.
• Unique Cloud Attacks:
• Side-Channel: Extract information via shared resources.
• Cryptojacking: Unauthorized cryptocurrency mining.
• Cloud as an Attack Platform:
• Phishing/Malware: Fraudulent websites, malicious files.
• Exploitation: Sensitive information, malware distribution.
• Cloud Access Security Brokers (CASB):
• Definition: Mediates cloud service access.
• Functions: Authentication, malware scanning, monitoring, data exfiltration
prevention.
• Implementation: Forward proxy, reverse proxy, API.
Supply Chain
Summary: Software supply chain vulnerabilities are risks introduced during the development,
distribution, and maintenance of software products. These vulnerabilities can arise from service
providers, hardware suppliers, and software providers, affecting the entire lifecycle from coding to
deployment.
Detailed Explanation:
• Service Providers:
• Role: Offer development, testing, and deployment platforms or contribute to the
software's codebase.
• Risks: Inadequate security measures, unsecured communication.
• Hardware Suppliers:
• Role: Provide the hardware on which software runs or interacts.
231
• Risks: Compromised hardware, preinstalled firmware vulnerabilities, physical
tampering, unreliable drivers.
• Example: Hardware with known vulnerabilities or susceptible to tampering.
• Software Providers:
• Role: Makers of libraries, frameworks, and third-party components.
• Risks: Vulnerabilities in third-party components, outdated software.
• Software Bill of Materials (SBOM):
• Definition: Comprehensive inventory of all components in a software product.
• Purpose: Provide transparency and visibility into the software supply chain.
• Benefits: Identify potential vulnerabilities, track component origins, support rapid
response to vulnerabilities.
• Dependency Analysis and SBOM Tools:
• OWASP Dependency-Check: Identifies project dependencies and known
vulnerabilities.
• Comprehensive SBOM Tools: OWASP Dependency-Track, SPDX, CycloneDX for
detailed SBOMs.
Key Points:
• Service Providers:
• Role: Development, testing, deployment.
• Risks: Security measures, communication.
• Hardware Suppliers:
• Role: Provide hardware.
• Risks: Compromised hardware, firmware vulnerabilities, tampering.
• Software Providers:
• Role: Libraries, frameworks, components.
• Risks: Vulnerabilities, outdated software.
• Software Bill of Materials (SBOM):
• Definition: Inventory of software components.
• Purpose: Transparency, vulnerability identification, origin tracking.
• Dependency Analysis and SBOM Tools:
• OWASP Dependency-Check: Identifies dependencies, vulnerabilities.
• Comprehensive Tools: OWASP Dependency-Track, SPDX, CycloneDX
232
Topic 8C: Vulnerability Identification Methods
Vulnerability Scanning
Summary: Vulnerability scanning is a crucial aspect of vulnerability management, involving the
systematic probing of systems or networks to detect security weaknesses. This process helps
identify, classify, remediate, and mitigate vulnerabilities, supporting both general and application-
specific security.
Detailed Explanation:
• Vulnerability Management:
• Definition: Identifying, classifying, remediating, and mitigating vulnerabilities.
• Process: Internal and external scans to inventory vulnerabilities from different
network viewpoints.
• Application Security: Locates misconfigurations and missing patches in software.
• Vulnerability Scanning Tools:
• Examples: openVAS, Nessus.
• Features: Analyze network equipment, operating systems, databases, patch
compliance, configuration.
• Specialized Tools: For deeper application analysis.
• Network Vulnerability Scanner:
• Examples: Tenable Nessus, OpenVAS.
• Function: Test network hosts (PCs, mobile devices, servers, routers, switches).
• Output: Reports on missing patches, configuration deviations, vulnerabilities.
• Credentialed and Non-Credentialed Scans:
• Non-Credentialed Scan: Test packets directed at a host without login rights.
• Focus: External assessment, web application scanning.
• Credentialed Scan: User account with login rights for in-depth analysis.
• Focus: Insider attack simulation, misconfiguration detection.
• Application and Web Application Scanners:
• Definition: Specialized scanning for software application weaknesses.
• Methods: Static analysis (code review), dynamic analysis (testing running
applications).
• Focus: Issues like unvalidated inputs, broken access controls, SQL injection.
233
• Package Monitoring:
• Definition: Tracks and assesses the security of third-party software packages,
libraries, dependencies.
• Tools: Automated software composition analysis (SCA) tools.
• Purpose: Ensure components are up to date and free from known vulnerabilities.
Key Points:
• Vulnerability Management:
• Definition: Identify, classify, remediate, mitigate vulnerabilities.
• Process: Internal/external scans, application security.
• Vulnerability Scanning Tools:
• Examples: openVAS, Nessus.
• Features: Network equipment, OS, databases, patch compliance.
• Network Vulnerability Scanner:
• Examples: Tenable Nessus, OpenVAS.
• Function: Test network hosts, report vulnerabilities.
• Credentialed and Non-Credentialed Scans:
• Non-Credentialed: No login rights, external assessment.
• Credentialed: Login rights, in-depth analysis.
• Application and Web Application Scanners:
• Definition: Specialized scanning for software applications.
• Methods: Static, dynamic analysis.
• Focus: Unvalidated inputs, access controls, SQL injection.
• Package Monitoring:
• Definition: Track third-party software security.
• Tools: SCA tools.
• Purpose: Ensure up-to-date, secure components.
Threat Feeds
Summary: Threat feeds are real-time, continuously updated sources of information about potential
threats and vulnerabilities. Integrating threat feeds into vulnerability management practices helps
organizations stay aware of the latest risks and respond swiftly.
Detailed Explanation:
234
• Definition:
• Threat Feeds: Real-time data sources about vulnerabilities, exploits, and threat
actors.
• Purpose: Enhance threat intelligence, enable quicker identification and remediation
of vulnerabilities.
• Common Platforms:
• AlienVault's Open Threat Exchange (OTX)
• IBM's X-Force Exchange
• Recorded Future
• Benefits:
• Timely Information: Provides up-to-date context about new threats.
• Focus Remediation: Helps prioritize the most relevant and damaging
vulnerabilities.
• Proactive Approach: Reduces time between vulnerability discovery and
remediation.
• Third-Party Threat Feeds:
• Open-Source Feeds: Free, accessible, cost-effective (e.g., Cyber Threat Alliance,
MISP).
• Proprietary Feeds: Comprehensive, advanced insights, paid subscriptions (e.g., IBM
X-Force Exchange, Mandiant's FireEye, Recorded Future).
• Types of Threat Feed Outputs:
• Behavioral Threat Research: Narrative commentary on attacks and TTPs.
• Reputational Threat Intelligence: Lists of malicious IP addresses, domains,
malware signatures.
• Threat Data: Correlates observed data with known TTPs and threat actor
indicators.
• Information-Sharing Organizations:
• Examples: Cyber Threat Alliance, Information Sharing and Analysis Centers (ISACs).
• Role: Enhance collective cybersecurity resilience, promote collaborative threat
tackling.
• Open-Source Intelligence (OSINT):
• Definition: Collecting and analyzing publicly available information for decision-
making.
• Sources: Blogs, forums, social media, dark web.
• Tools: Shodan, Maltego, Recon-ng, theHarvester.
235
• Framework: OSINT Framework (https://github.com/lockfale/osint-framework).
Key Points:
• Definition:
• Threat Feeds: Real-time data on threats and vulnerabilities.
• Purpose: Enhance threat intelligence, quick remediation.
• Common Platforms:
• Examples: OTX, X-Force Exchange, Recorded Future.
• Benefits:
• Timely Information: Up-to-date threat context.
• Focus Remediation: Prioritize relevant vulnerabilities.
• Proactive Approach: Faster remediation.
• Third-Party Threat Feeds:
• Open-Source: Free, accessible (e.g., Cyber Threat Alliance).
• Proprietary: Comprehensive, paid (e.g., IBM X-Force Exchange).
• Types of Outputs:
• Behavioral Research: Attack commentary.
• Reputational Intelligence: Malicious IPs, domains.
• Threat Data: Correlates with known TTPs.
• Information-Sharing Organizations:
• Examples: Cyber Threat Alliance, ISACs.
• Role: Collaborative cybersecurity.
• Open-Source Intelligence (OSINT):
• Definition: Public information analysis.
• Sources: Blogs, forums, social media.
• Tools: Shodan, Maltego, Recon-ng, theHarvester.
• Framework: OSINT Framework.
236
Detailed Explanation:
• Deep Web:
• Definition: Parts of the World Wide Web not indexed by search engines.
• Examples: Pages requiring registration, unlinked pages, nonstandard DNS, encoded
content.
• Purpose: Often used for legitimate purposes but can include concealed areas.
• Dark Net:
• Definition: An overlay network using software like TOR, Freenet, or I2P to
anonymize usage.
• Function: Prevents third parties from knowing about the network or analyzing
activity.
• Example: Onion routing with multiple layers of encryption and relays.
• Dark Web:
• Definition: Sites, content, and services accessible only over a dark net.
• Access: Often hidden from search engines, accessible via "word of mouth" bulletin
boards.
• Purpose: Used for both illicit activities and legitimate purposes.
• Legitimate Uses:
• Privacy and Anonymity: Enhanced privacy for whistleblowers, journalists,
activists, or individuals under repressive regimes.
• Access to Censored Information: Bypassing censorship in countries with strict
Internet controls.
• Research and Information Sharing: Insights into criminal activities and emerging
threats for cybersecurity professionals.
• Threat Research:
• Purpose: Discover TTPs of cyber adversaries.
• Methods: Analyzing customer networks, operating honeynets, infiltrating dark web
forums.
• Challenges: Continually shifting landscape as adversaries adapt.
Key Points:
• Deep Web:
• Definition: Non-indexed parts of the Internet.
• Examples: Registration-required pages, unlinked pages.
• Dark Net:
237
• Definition: Anonymizing overlay network.
• Function: Prevents third-party analysis.
• Dark Web:
• Definition: Sites/services on a dark net.
• Access: Hidden, "word of mouth" URLs.
• Legitimate Uses:
• Privacy: For whistleblowers, journalists, activists.
• Censorship Bypass: Access to restricted information.
• Research: Cybersecurity insights.
• Threat Research:
• Purpose: Discover cyber adversaries' TTPs.
• Methods: Network analysis, honeynets, dark web infiltration.
• Challenges: Adversaries' adaptations.
238
• Definition: Organizations incentivize external security researchers to discover and
report vulnerabilities.
• Purpose: Leverage diverse skills and perspectives to uncover complex
vulnerabilities.
• Comparison with Pen Testing:
• Pen Testing: Hired team, structured approach, confined time frame.
• Bug Bounties: Global community, rewards for findings, diverse testing.
• Auditing:
• Definition: Comprehensive reviews of security controls, policies, and procedures.
• Types:
• Compliance Audits: Assess adherence to regulations (e.g., GDPR, HIPAA).
• Risk-Based Audits: Identify potential threats and vulnerabilities.
• Technical Audits: Examine IT infrastructure (network security, access
controls, data protection).
• Role of Pen Testing: Practical assessment of defenses, simulating real-world
attacks.
• Importance in Compliance: Required by regulations (e.g., PCI DSS).
Key Points:
• Penetration Testing:
• Definition: Ethical hacking to exploit vulnerabilities.
• Purpose: Demonstrate impact, identify complex issues.
• Types: Unknown, known, partially known environments.
• Bug Bounties:
• Definition: Incentivize external researchers.
• Purpose: Diverse skills, uncover complex vulnerabilities.
• Comparison: Pen testing (structured, hired team) vs. bug bounties (global
community, rewards).
• Auditing:
• Definition: Review security controls, policies, procedures.
• Types: Compliance, risk-based, technical audits.
• Role of Pen Testing: Simulate attacks, improve defenses.
• Compliance Importance: Required by regulations.
239
Topic 8D: Vulnerability Analysis and Remediation
240
• Definition: A system maintained by the Forum of Incident Response and Security
Teams to score vulnerabilities.
• Scoring: Generates a score from 0 to 10 based on characteristics like remote
triggerability, local access, user intervention.
• Score Bands:
• 0.1+: Low
• 4.0+: Medium
• 7.0+: High
• 9.0+: Critical
Key Points:
• Vulnerability Feeds:
• Definition: Updates for automated scanners.
• Examples: Nessus plug-ins, OpenVAS NVTs.
• National Vulnerability Database (NVD):
• Definition: Repository of detailed vulnerability information.
• Content: Descriptions, ratings, versions, mitigation.
• Security Content Automation Protocol (SCAP):
• Definition: Protocol for feed updates.
• Function: Configuration comparison, common identifiers.
• Common Vulnerabilities and Exposures (CVE):
• Definition: Dictionary of known vulnerabilities.
• Elements: Identifier, description, references, creation date.
• Common Vulnerability Scoring System (CVSS):
• Definition: System for scoring vulnerabilities.
• Scoring: 0 to 10 based on characteristics.
• Score Bands: Low, Medium, High, Critical.
241
• Vulnerability Scan Reports:
• Content: Summary of discoveries, color-coded by criticality.
• Review: By scope (most critical across all hosts) or by host.
• Details: Links to specific information and remediation steps.
• False Positives:
• Definition: Incorrect identification of a vulnerability.
• Example: A scan flags an open port as a risk, but the port isn't actually open.
• Impact: Wastes time and effort, may lead to disregarding scans.
• False Negatives:
• Definition: Potential vulnerabilities that go undetected.
• Mitigation: Run repeat scans periodically, use scanners from different vendors.
• Risk: Automated tools may not replicate a skilled hacker's success, leading to a false
sense of security.
• Log Review:
• Purpose: Validate vulnerability reports by examining system and network logs.
• Example: A scanner identifies an unstable process; log review confirms repeated
failures and related issues.
• Benefit: Confirms the validity of vulnerability alerts using relevant data sources.
Key Points:
• Vulnerability Scan Reports:
• Content: Summary, color-coded criticality.
• Review: Scope or host.
• Details: Links to remediation steps.
• False Positives:
• Definition: Incorrect vulnerability identification.
• Example: Flagged open port not actually open.
• Impact: Wasted effort, potential disregard of scans.
• False Negatives:
• Definition: Undetected vulnerabilities.
• Mitigation: Repeat scans, different vendors.
• Risk: False sense of security from automated tools.
• Log Review:
242
• Purpose: Validate reports.
• Example: Confirming unstable process through logs.
• Benefit: Validates alerts with data.
Vulnerability Analysis
Summary: Vulnerability analysis is essential for supporting an organization's cybersecurity
strategy. It involves prioritizing vulnerabilities, classifying them, considering exposure factors,
assessing organizational impacts, and aligning with risk tolerance.
Detailed Explanation:
• Prioritization:
• Purpose: Identify and address the most critical vulnerabilities first.
• Factors: Severity, ease of exploitation, potential impact.
• Benefit: Focus limited resources on significant threats.
• Classification:
• Purpose: Categorize vulnerabilities based on characteristics.
• Factors: Type of system/application, nature of vulnerability, potential impact.
• Benefit: Clarify the scope and nature of threats.
• Exposure Factor:
• Definition: Extent to which an asset is susceptible to compromise.
• Factors: Accessibility, current threat landscape, IT infrastructure specifics.
• Examples: Weak authentication, inadequate network segmentation, insufficient
access control.
• Impacts:
• Purpose: Assess potential organizational impact of vulnerabilities.
• Factors: Financial loss, reputational damage, operational disruption, regulatory
penalties.
• Benefit: Informed decisions about risk mitigation.
• Environmental Variables:
• IT Infrastructure: Hardware, software, networks, systems diversity, complexity,
age.
• External Threat Landscape: Prevalence of attacks, threat actor activities.
• Regulatory and Compliance Environment: Industry regulations, potential
penalties.
243
• Operational Environment: Workflows, business processes, usage patterns.
• Examples: Poor patch management, lack of access controls, insufficient training.
• Risk Tolerance:
• Definition: Level of risk an organization is willing to accept.
• Factors: Organization size, industry, regulatory environment, strategic objectives.
• Benefit: Align vulnerability management with overall risk management strategy.
Key Points:
• Prioritization:
• Purpose: Address critical vulnerabilities.
• Factors: Severity, exploitation ease, impact.
• Classification:
• Purpose: Categorize vulnerabilities.
• Factors: System type, vulnerability nature, impact.
• Exposure Factor:
• Definition: Susceptibility to compromise.
• Factors: Accessibility, threat landscape, IT specifics.
• Examples: Weak authentication, network segmentation.
• Impacts:
• Purpose: Assess organizational impact.
• Factors: Financial, reputational, operational, regulatory.
• Environmental Variables:
• IT Infrastructure: Diversity, complexity, age.
• Threat Landscape: Attack prevalence, threat actors.
• Regulatory Environment: Compliance requirements.
• Operational Environment: Workflows, processes, patterns.
• Examples: Patch management, access controls, training.
• Risk Tolerance:
• Definition: Acceptable risk level.
• Factors: Size, industry, regulations, objectives.
• Benefit: Align with risk management strategy.
244
Vulnerability Response and Remediation
Summary: Vulnerability response and remediation involve various strategies to manage and
mitigate cybersecurity risks. Key practices include patching, insurance, segmentation, compensating
controls, exceptions, and exemptions, each playing a distinct role in enhancing security.
Detailed Explanation:
• Remediation Practices:
• Patching:
• Definition: Applying updates to fix known vulnerabilities.
• Importance: Prevents exploitation, improves security posture.
• Program: Centralized patch management for consistent application.
• Cybersecurity Insurance:
• Definition: Financial protection against breaches.
• Role: Complements technical controls with financial risk transfer.
• Coverage: Data breach response, business interruption, ransomware, third-
party liability.
• Segmentation:
• Definition: Dividing a network into segments to contain breaches.
• Benefit: Limits lateral movement of attackers, supports incident response.
• Compensating Controls:
• Definition: Measures to mitigate risk when direct remediation isn't possible.
• Examples: Additional monitoring, secondary authentication, enhanced
encryption.
• Exceptions and Exemptions:
• Definition: Scenarios where vulnerabilities can't be remediated.
• Process: Senior leadership accepts risk, documents rationale, sets
reassessment timeline.
• Validation:
• Importance: Ensures remediation actions are correctly implemented and effective.
• Methods:
• Re-scanning: Additional scans to confirm vulnerabilities are resolved.
• Auditing: In-depth review of remediation process, alignment with policies.
• Verification: Manual checks, automated testing, log reviews to confirm
results.
245
• Reporting:
• Purpose: Maintain cybersecurity posture by highlighting and prioritizing
vulnerabilities.
• CVSS: Standardized method for rating severity (exploitability, impact, remediation
level).
• Content: Potential impact, recommendations for addressing vulnerabilities.
• Timeliness: Essential to prevent delays in remediation and reduce attack windows.
• Format: Clear, concise for both technical and nontechnical stakeholders.
Key Points:
• Remediation Practices:
• Patching: Fix known vulnerabilities.
• Insurance: Financial protection.
• Segmentation: Contain breaches.
• Compensating Controls: Mitigate risk.
• Exceptions/Exemptions: Accept risk, document rationale.
• Validation:
• Importance: Correct implementation, effectiveness.
• Methods: Re-scanning, auditing, verification.
• Reporting:
• Purpose: Highlight, prioritize vulnerabilities.
• CVSS: Standardized severity rating.
• Content: Impact, recommendations.
• Timeliness: Prevent delays.
• Format: Clear, concise.
246
Detailed Explanation:
• Secure Baselines: Standard configurations for network devices, software, and more to
ensure consistent security practices.
• CIS Benchmarks: Globally recognized best practices for securing IT systems, covering
various domains like networks, operating systems, and applications. Updated continuously
to address evolving risks.
• STIGs: Security Technical Implementation Guides by DISA for the US Department of
Defense, providing standardized security configurations for DoD IT infrastructure.
Tools for Managing Compliance:
• Configuration Management Tools: Puppet, Chef, Ansible, Microsoft's Group Policy for
automating secure baseline deployments.
• Compliance Monitoring Tools: OpenSCAP, CIS-CAT Pro, SCAP Compliance Checker for
assessing adherence to secure baselines.
Hardening Concepts
Summary: Hardening involves changing default settings of network equipment, software, and
operating systems to improve security.
Detailed Explanation:
• Default Configurations: Often insecure and well-documented, making them targets for
attackers.
• Hardening Methods: Implementing secure baseline recommendations to enhance security.
Switches and Routers:
• Change Default Credentials: Prevents unauthorized access.
• Disable Unnecessary Services: Reduces attack surface.
• Use Secure Management Protocols: SSH instead of Telnet, HTTPS instead of HTTP.
• Implement Access Control Lists (ACLs): Restricts access to necessary devices and
networks.
• Enable Logging and Monitoring: Identifies issues like repeated login failures.
• Configure Port Security: Limits devices connecting to switch ports.
• Strong Password Policies: Reduces risk of password attacks.
• Physically Secure Equipment: Prevents unauthorized physical access.
Server Hardware and Operating Systems:
• Change Default Credentials: Similar to network devices.
• Disable Unnecessary Services: Reduces attack surface.
• Apply Security Patches and Updates Regularly: Fixes vulnerabilities.
247
• Least Privilege Principle: Limits user privileges to necessary functions.
• Use Firewalls and IDS: Blocks or alerts on malicious activity.
• Secure Configuration: Uses baseline configurations like CIS or STIGs.
• Strong Access Controls: Includes strong password policies, MFA, and PAM.
• Enable Logging and Monitoring: Identifies issues like repeated login failures.
• Use Antivirus and Antimalware Solutions: Detects and quarantines malware.
• Physical Security: Secures server equipment to prevent unauthorized access.
248
o Optimize Design: Adjust power, change channels, add/move WAPs.
Wireless Encryption
Summary: Wireless networks must be configured with security settings to prevent unauthorized
access and data interception. Various Wi-Fi security standards, such as WPA, WPA2, and WPA3,
provide different levels of encryption and authentication.
Detailed Explanation:
• Importance of Encryption: Without encryption, anyone within range can intercept and
read packets on the wireless network.
• Security Standards: Determine cryptographic protocols, key generation methods, and
authentication processes.
Wi-Fi Protected Access (WPA):
• WPA: Designed to fix vulnerabilities in WEP, uses RC4 stream cipher with TKIP for stronger
security.
• WPA2: Uses AES with CCM for authenticated encryption, replacing RC4 and TKIP.
• WPA3: Introduces SAE for secure key exchange, Enhanced Open for encrypted traffic
without a password, and updated cryptographic protocols with AES GCM.
Wi-Fi Protected Setup (WPS):
• Purpose: Simplifies secure setup for residential consumers.
• Method: Uses a push button or PIN for device association.
• Vulnerabilities: Susceptible to brute force attacks; some models may not fully disable WPS.
Easy Connect (DPP):
• Replacement for WPS: Uses public/private key pairs and QR codes or NFC tags for secure
device configuration.
• Benefits: Fixes security issues with WPS and simplifies configuration for IoT devices.
Key Points:
• WPA Versions:
o WPA: RC4 with TKIP.
o WPA2: AES with CCM.
o WPA3: SAE, Enhanced Open, AES GCM.
• WPS:
o Simplifies Setup: Push button or PIN method.
o Security Risks: Vulnerable to brute force attacks.
• Easy Connect:
249
o Secure Configuration: Uses QR codes or NFC tags.
o IoT Devices: Simplifies setup for headless devices.
Wi-Fi Standards:
• Wi-Fi 6 (802.11ax): Latest generation, supports WPA3.
• Wi-Fi 5 (802.11ac) and Wi-Fi 4 (802.11n): Earlier standards, some devices support WPA3
with updates.
250
• EAP Types: EAP-TLS (client-server certificates), EAP-TTLS, PEAP (server-side certificates).
RADIUS Authentication Workflow:
1. Connection: User's device (supplicant) connects to NAS (e.g., access point).
2. Credential Prompt: NAS prompts for authentication credentials.
3. Access-Request: NAS sends encrypted Access-Request to AAA server.
4. Decryption: AAA server decrypts request using shared secret.
5. EAP Exchange: Access-Challenge and Access-Request packets exchanged for verification.
6. Access-Accept/Reject: AAA server responds with Access-Accept or Access-Reject.
7. Accounting (Optional): NAS logs usage data to accounting server.
251
o Port-Based Control: Uses network scans or DHCP fingerprinting to evaluate
devices.
o Broad Compatibility: Works with any device, including guest or IoT devices,
without prior configuration.
Key Points:
• NAC Functions:
o Authentication: Ensures only valid users and devices access the network.
o Compliance Checks: Evaluates security parameters like OS version and antivirus
status.
o Access Control: Restricts access based on user profiles and device attributes.
• Dynamic VLAN Assignment:
o User-Based VLANs: Assigns VLANs based on user identity and device health.
o Quarantine Procedures: Isolates noncompliant devices in a quarantine VLAN.
• Agent-Based vs. Agentless NAC:
o Agent-Based: Provides detailed device information and automatic remediation.
o Agentless: Uses network scans and is compatible with all devices.
252
• Configuration Principles:
o Block spoofed internal/private IP addresses.
o Block local network protocols (ICMP, DHCP, routing).
o Use penetration testing and log monitoring.
o Secure firewall hardware and management interface.
Firewall Rule Examples:
• Allow Specific Traffic: HTTP (port 80) and HTTPS (port 443) for web servers.
• Restrict Protocols: Block FTP or SSH if not needed.
• Restrict Outgoing Traffic: Block SMTP (port 25) to prevent spam.
Screened Subnet (Perimeter Network)
Summary: A screened subnet creates a neutral zone between an internal network and the Internet,
hosting public-facing servers while protecting sensitive internal resources.
Detailed Explanation:
• Purpose: Reduces exposure of internal network resources to external threats.
• Typical Services: Web, email, DNS, FTP.
Firewall Configuration:
• First Firewall: Between the Internet and the screened subnet, allows traffic to public
services.
• Second Firewall: Between the screened subnet and the internal network, blocks most
traffic from the screened subnet.
Key Points:
• Screened Subnet Benefits:
o Limits damage from compromised public-facing servers.
o Enhances network segmentation and security control.
253
Host-Based vs. Network-Based Systems:
• Host-Based IDS/IPS (HIDS/HIPS):
o Installation: On individual systems or servers.
o Monitoring: System behavior, configurations, and non-network events.
o Example: OSSEC (log analysis, integrity checking, real-time alerting).
• Network-Based IDS/IPS (NIDS/NIPS):
o Monitoring: Network traffic for patterns or signatures of threats.
o Effectiveness: Identifies threats across multiple systems (e.g., DDoS attacks).
Complementary Use:
• HIDS/HIPS: Effective for insider threats and system-specific activities.
• NIDS/NIPS: Effective for network-wide anomalies and external threats.
Examples of IDS and IPS Tools:
• Snort (IDS/IPS):
o Detection Methods: Signature, protocol, and anomaly-based inspection.
o Community Support: Large community contributing rules and configurations.
• Suricata (IDS/IPS/NSM):
o Performance: High-performance, scalable, compatible with Snort rulesets.
• Security Onion:
o Platform: Linux distribution for intrusion detection, network security monitoring,
and log management.
o Integration: Includes Snort, Suricata, and other tools for comprehensive security.
Key Points:
• IDS:
o Passive Monitoring: Inspects traffic, identifies threats, sends alerts.
o No Blocking: Does not prevent threats, avoids false positives blocking legitimate
traffic.
• IPS:
o Proactive Measures: Blocks traffic, drops malicious packets, resets connections.
o Risk of False Positives: Potential to block legitimate traffic.
254
IDS and IPS Detection Methods
Summary: Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) use various
methods to detect and respond to suspicious network traffic. These methods include signature-
based detection, behavioral-based detection, anomaly-based detection, and trend analysis.
Detailed Explanation:
• Analysis Engine: Scans and interprets traffic to identify suspicious activities. It classifies
events as ignore, log only, alert, or block (for IPS).
Detection Methods:
• Signature-Based Detection:
o Description: Uses a database of known attack patterns or signatures.
o Updates: Requires regular updates to protect against new threats.
o Example: Snort rules file from Emerging Threats community feed.
• Behavioral- and Anomaly-Based Detection:
o Behavioral-Based Detection:
▪ Description: Recognizes baseline "normal" traffic and flags deviations.
▪ Capabilities: Identifies zero-day attacks, insider threats, and other
anomalies.
o Anomaly-Based Detection:
▪ Description: Looks for irregularities in protocol usage and deviations from
RFC standards.
▪ NBAD Products: Use heuristics to model normal traffic and detect
anomalies.
▪ Machine Learning: Enhances detection capabilities in modern products.
Behavioral-Based Detection Products:
• User and Entity Behavior Analytics (UEBA): Scans multiple sources to identify anomalies,
often integrated with SIEM platforms.
• Network Traffic Analysis (NTA): Applies analysis techniques to network streams.
Trend Analysis:
• Purpose: Helps understand the environment over time, identifying patterns, anomalies, and
potential threats.
• Benefits: Aids in tuning IDS/IPS systems, reducing false positives, and focusing on
significant alerts.
• Operational Security: Identifies common threats and targeted systems, guiding security
policy changes and investments.
Key Points:
255
• Signature-Based Detection:
o Pattern Matching: Matches traffic against known attack signatures.
o Regular Updates: Essential for protection against new threats.
• Behavioral- and Anomaly-Based Detection:
o Baseline Recognition: Flags deviations from normal traffic.
o Heuristics and Machine Learning: Improve detection accuracy.
• Trend Analysis:
o Pattern Identification: Tracks events and alerts to identify ongoing threats.
o System Tuning: Reduces false positives and focuses on critical alerts.
Web Filtering
Summary: Web filtering is crucial for cybersecurity, blocking access to malicious or inappropriate
websites to protect the network. It prevents malware, increases productivity, and supports data loss
prevention (DLP) strategies.
Detailed Explanation:
• Function: Analyzes web traffic in real time, restricting access based on URL, IP address,
content category, or keywords.
• Benefits: Prevents malware, ransomware, and phishing attacks; increases productivity;
limits legal liability; supports DLP.
Agent-Based Filtering:
• Installation: Software agents on devices enforce web filtering policies.
• Communication: Agents retrieve policies from a centralized server and apply them locally.
• Advantages: Policies remain effective off-network; detailed reporting and analytics;
granular control over HTTPS traffic and application-specific rules.
Centralized Web Filtering:
• Proxy Server Role: Acts as an intermediary, controlling and monitoring web content.
• Functions: Blocks specific URLs, IP addresses, or content categories; performs logging and
reporting; anonymizes requests; caches web content.
Techniques Used:
• URL Scanning: Blocks access to known malicious or inappropriate URLs.
• Content Categorization: Classifies websites into categories for flexible policy enforcement.
• Block Rules: Implements rules based on URL, domain, IP address, content category, or
keywords.
256
• Reputation-Based Filtering: Uses databases to score and block sites with poor
reputations.
Issues Related to Web Filtering:
• Overblocking: Too restrictive, blocking legitimate websites and impacting productivity.
• Underblocking: Allows access to harmful or inappropriate websites.
• Handling HTTPS Traffic: Challenges in inspecting encrypted traffic without proper
configuration.
• Privacy Concerns: Logging and monitoring web activity must balance security and user
privacy.
Key Points:
• Agent-Based Filtering:
o Local Enforcement: Policies applied on devices.
o Detailed Reporting: Logs web access attempts for analysis.
• Centralized Web Filtering:
o Proxy Server: Controls and monitors web traffic.
o Techniques: URL scanning, content categorization, block rules, reputation-based
filtering.
• Challenges:
o Overblocking/Underblocking: Balancing security and accessibility.
o HTTPS Traffic: Inspecting encrypted traffic.
o Privacy: Managing user privacy and compliance.
Endpoint Hardening
Summary: Endpoint hardening involves securing operating systems and workstations to protect
against unauthorized access, data breaches, and malware. This includes applying best practice
baselines, managing configurations, and ensuring regular maintenance.
Detailed Explanation:
• Operating System Security:
o Practices: Access controls, authentication, secure configurations, application
security, patch management, endpoint protection, user training, and monitoring.
257
o Hardening: Balancing security with functionality and usability.
o Best Practice Baselines: Guidelines for secure configurations, reducing the attack
surface by running only necessary protocols and services.
Key Components:
• Interfaces: Disable unused network interfaces.
• Services: Disable unused services.
• Application Service Ports: Disable or block unnecessary ports.
• Persistent Storage: Use disk encryption for data security.
• Maintenance Cycle: Regular updates and threat response.
Workstations:
• Unique Concerns: Large attack surface due to varied tasks and applications.
• Hardening Practices: Remove unnecessary software, limit administrative privileges,
manage application installations and updates.
• User-Focused Security: Regular training on phishing, strong passwords, responsible
Internet use, and handling sensitive data.
• Security Configurations: Automatic updates, screen locks, firewalls, endpoint protection,
intrusion detection/prevention, logging, encryption, monitoring.
• Peripheral Device Security: Secure USB ports with endpoint protection software and
device control policies.
• Segmentation: Restrict communications to limit malware propagation.
Baseline Configuration and Registry Settings:
• Separate Baselines: Different configurations for various system types (e.g., desktop clients,
servers).
• Registry Settings: Managed via group policy objects (GPOs) in Windows.
• Least Privilege: Limit registry modification rights.
• Host-Based Intrusion Detection: Alerts on suspicious registry events.
• Baseline Deviation Reporting: Ensures configurations match baseline templates.
• Tools: Microsoft Baseline Security Analyzer (MBSA) replaced by Security Compliance
Toolkit.
Key Points:
• Operating System Security:
o Practices: Access controls, secure configurations, patch management.
o Hardening: Balancing security and usability.
• Workstations:
258
o Hardening Practices: Remove unnecessary software, limit privileges.
o User Training: Phishing, strong passwords, secure behaviors.
o Security Configurations: Updates, firewalls, encryption.
• Baseline Configuration:
o Registry Settings: Managed via GPOs.
o Deviation Reporting: Ensures compliance with baselines.
o Tools: Security Compliance Toolkit.
Endpoint Protection
Summary: Endpoint protection involves hardening devices to enhance security by minimizing
vulnerabilities. This includes segmentation, device isolation, antivirus and antimalware solutions,
disk encryption, and patch management.
Detailed Explanation:
• Device Hardening: Configuring network and system settings to reduce the attack surface.
• Segmentation: Divides networks into segments or subnets with distinct security controls,
limiting the spread of attacks.
• Isolation: Segregates individual devices to prevent lateral spread of threats.
Key Components:
• Antivirus and Antimalware:
o Signature-Based Detection: Detects known viruses and malware.
o Generalized Malware Detection: Includes Trojans, spyware, PUPs, cryptojackers,
etc.
• Disk Encryption:
o Full Disk Encryption (FDE): Encrypts entire drive contents, including system files.
o Self-Encrypting Drives (SED): Perform cryptographic operations on the drive
controller, improving performance.
o Trusted Platform Module (TPM): Securely stores encryption keys.
• Patch Management:
o Automated Updates: Ensures systems are up-to-date with security patches.
o Testing Patches: Crucial for maintaining stability and security.
o Enterprise Patch Management Suites: Manage updates for multiple OSes and
third-party applications.
Segmentation:
259
• Purpose: Isolates systems to limit the spread of attacks.
• Implementation: Divides networks into subnets with distinct security controls.
Device Isolation:
• Purpose: Prevents lateral spread of threats.
• Implementation: Restricts network traffic between devices.
Antivirus and Antimalware:
• First Generation: Signature-based detection of known viruses.
• Modern Solutions: Detect a wide range of malware, including Trojans and spyware.
Disk Encryption:
• Full Disk Encryption (FDE): Encrypts entire drive contents.
• Self-Encrypting Drives (SED): Use drive controllers for encryption, improving
performance.
• Trusted Platform Module (TPM): Stores encryption keys securely.
Patch Management:
• Automated Updates: Ensures systems are patched regularly.
• Testing Patches: Prevents issues from untested patches.
• Enterprise Solutions: Manage updates for various systems and applications.
Key Points:
• Device Hardening: Reduces attack surface.
• Segmentation: Isolates systems to limit attack spread.
• Device Isolation: Prevents lateral threat movement.
• Antivirus and Antimalware: Detects and prevents malware.
• Disk Encryption: Protects data on drives.
• Patch Management: Ensures systems are up-to-date and secure.
260
o Purpose: Provides real-time and historical visibility into compromises, contains
malware, and facilitates remediation.
o Management: Often managed from a cloud portal using AI and machine learning.
o Capabilities: Real-time monitoring, data collection, fast response, and forensic
insights.
o Focus: Protects endpoint devices like computers, laptops, and mobile devices.
• Extended Detection and Response (XDR):
o Expansion: Extends protection beyond endpoints to include network, cloud
platforms, email gateways, firewalls, and other infrastructure components.
o Comprehensive View: Provides a broader scope for identifying threats and
enabling faster responses.
• Host-Based Intrusion Detection/Prevention Systems (HIDS/HIPS):
o Purpose: Monitors and protects individual hosts from unauthorized access and
malicious activities.
o Detection Methods: Signature-based detection, anomaly detection, and behavior
analysis.
o Core Feature: File integrity monitoring (FIM) to audit key system files.
o Examples: Tripwire, OSSEC.
• User Behavior Analytics (UBA)/User and Entity Behavior Analytics (UEBA):
o Purpose: Monitors and analyzes user behavior to detect anomalies indicative of
potential threats.
o Techniques: Machine learning, data science, and statistical analysis.
o Capabilities: Establishes baseline profiles and alerts on unusual activities.
o Examples: Alerts on unusual data downloads or logins from unexpected locations.
Key Points:
• EDR:
o Real-Time Monitoring: Detects and responds to advanced threats.
o Cloud Management: Uses AI and machine learning for analysis.
• XDR:
o Broader Scope: Includes network, cloud, email, and firewall data.
o Comprehensive Protection: Enhances threat identification and response.
• HIDS/HIPS:
o Host Protection: Monitors individual systems for suspicious activities.
o File Integrity Monitoring: Ensures key system files match authorized versions.
261
• UBA/UEBA:
o Behavior Analysis: Detects anomalies in user behavior.
o Machine Learning: Establishes and monitors baseline profiles.
Endpoint Configuration
Summary: Endpoint configuration involves securing devices by managing access controls, applying
the principle of least privilege, using access control lists (ACLs), setting file system permissions,
implementing application allow/block lists, monitoring, and enforcing configurations.
Detailed Explanation:
• Mitigation Vectors:
o Social Engineering: Use security education and awareness; review permissions.
o Vulnerabilities: Install patches or isolate systems.
o Lack of Security Controls: Deploy endpoint protection, firewalls, content filtering,
DLP, or MDM.
o Configuration Drift: Reapply baseline configurations; improve configuration
management.
o Weak Configuration: Review and improve security settings.
Access Control:
• Principle of Least Privilege (PoLP):
o Implementation: Audit user roles and privileges; use role-based access control
(RBAC); apply temporary privileges.
o Application: Applies to users, applications, and operating systems.
• Access Control Lists (ACLs):
o Purpose: Enforce access control policies.
o Usage: Define rules for network traffic and file system access.
o Management: Requires proper planning, periodic reviews, and best practices.
• File System Permissions:
o ACLs: List accounts and permissions for file system objects.
o Linux Permissions: Read (r), Write (w), Execute (x) for user (u), group (g), others
(o).
o Commands: chmod for modifying permissions.
Application Allow Lists and Block Lists:
• Allow List: Denies execution unless explicitly authorized.
262
• Block List: Allows execution but explicitly prohibits listed processes.
• Updates: Regularly updated based on incidents and threat hunting.
Monitoring:
• Purpose: Detect changes that weaken security configurations.
• Compliance: Provides data for compliance and auditing.
Configuration Enforcement:
• Methods:
o Standardized Baselines: Defined by organizations like NIST, CIS.
o Automated Tools: Apply and maintain configurations.
o Continuous Monitoring: Detect deviations.
o Change Management: Review, test, and approve changes.
• Example: Managing firewall rules with automated tools.
Group Policy:
• Feature: Centralized management in Windows environments.
• Usage: Enforce security settings across systems.
• Examples: Password policies, firewall settings, software restrictions.
SELinux:
• Feature: Access control security policies in Linux.
• Purpose: Granular permission control over processes and system objects.
• Application: Limits resource access to enhance security.
Key Points:
• Mitigation Vectors: Address social engineering, vulnerabilities, security controls,
configuration drift, and weak configurations.
• Access Control: Implement PoLP, use ACLs, manage file system permissions.
• Application Lists: Use allow/block lists for execution control.
• Monitoring: Ensure security configurations remain in place.
• Configuration Enforcement: Use standardized baselines, automated tools, continuous
monitoring, and change management.
• Group Policy: Centralized management in Windows.
• SELinux: Granular control in Linux.
263
Hardening Techniques
Summary: Hardening techniques protect endpoints against evolving cybersecurity threats by
addressing vulnerabilities at multiple levels, including physical access, network protocols, operating
system configurations, and user behaviors.
Detailed Explanation:
• Protecting Ports:
o Physical Ports: Disable unnecessary ports (USB, HDMI, serial) to prevent
unauthorized access.
o Port Control Software: Allows only authorized devices to connect.
o Firmware/UEFI/BIOS Settings: Disable ports or require passwords for booting
from nonstandard sources.
o Logical Ports: Use firewalls and service hardening to secure software-based
communication features.
• Encryption Techniques:
o Full Disk Encryption (FDE): Encrypts entire hard drive, protecting all data.
o Removable Media Encryption: Protects data on removable devices.
o Virtual Private Networks (VPNs): Secure data transmission.
o Email Encryption: Protects sensitive email information.
• Host-Based Firewalls and IPS:
o Default-Deny Policies: Block all traffic unless explicitly allowed.
o Traffic Filtering: Block or allow traffic based on parameters.
o Application Control: Permit only trusted applications to communicate.
o Integration with SIEM: Supports rapid detection and response.
• Installing Endpoint Protection:
o Deployment Plan: Consider order, time frames, and stages.
o Standardize Configurations: Ensure consistency across devices.
o Automate Deployments: Use tools like SCCM or Group Policy.
o Updates and Patches: Keep software and definitions current.
o Monitor Agents: Check for alerts and verify updates.
o Centralize Management: Enforce global security policies.
• Changing Defaults and Removing Unnecessary Software:
o Default Passwords: Change to strong, unique credentials.
o Unnecessary Software: Remove to reduce attack surface.
264
o Firmware Updates: Patch known vulnerabilities.
o Encrypted Protocols: Use HTTPS and SNMPv3 for secure management.
• Decommissioning:
o Data Sanitization: Securely erase all data.
o Factory Reset: Remove residual configurations.
o Physical Destruction: Destroy sensitive components.
o Documentation: Update inventory records.
Key Points:
• Protecting Ports: Disable unnecessary physical and logical ports.
• Encryption Techniques: Use FDE, removable media encryption, VPNs, and email
encryption.
• Host-Based Firewalls and IPS: Implement default-deny policies, traffic filtering, and
application control.
• Installing Endpoint Protection: Plan deployment, standardize configurations, automate
updates, monitor agents, and centralize management.
• Changing Defaults and Removing Unnecessary Software: Change default passwords,
remove unnecessary software, apply firmware updates, and use encrypted protocols.
• Decommissioning: Securely erase data, reset to factory settings, destroy sensitive
components, and update inventory records.
265
Hardening ICS/SCADA:
• Network Segmentation: Isolate ICS/SCADA systems from wider networks.
• Authentication and Authorization: Implement robust processes to limit access.
• Unidirectional Gateways (Data Diodes): Ensure data flows only outward to protect from
inbound attacks.
• Physical and Cyber Threat Protection: Prevent environmental disasters and utility
failures.
Hardening Embedded and RTOS:
• Secure Design: Incorporate security from the start with secure coding practices and
minimal design.
• Secure Boot Mechanisms: Ensure only trusted software runs on the device.
• Physical Tamper-Proofing: Protect devices from physical tampering.
• Comprehensive Security Testing: Regularly test for vulnerabilities.
Security Standards and Certifications:
• Standards: Provide guidelines and best practices (e.g., Common Criteria, IEC 62443, MISRA-
C, CERT Secure Coding Standards).
• Certifications: Demonstrate compliance with security standards (e.g., ISO 27001, IEC
61508).
• Framework: Establish a common language and criteria for evaluating security.
Key Points:
• General Hardening:
o Updates and Patches: Regularly update systems.
o Disable Services: Turn off unnecessary services.
o Network Security: Use firewalls, IDS/IPS, and encryption.
o Secure Credentials: Implement strong authentication.
o Audits and Tests: Conduct regular security audits and penetration tests.
• ICS/SCADA:
o Segmentation: Isolate systems from wider networks.
o Data Diodes: Ensure unidirectional data flow.
o Threat Protection: Prevent cyber and physical threats.
• Embedded and RTOS:
o Secure Design: Use secure coding and minimal design.
o Secure Boot: Ensure trusted software runs.
266
o Tamper-Proofing: Protect against physical tampering.
o Security Testing: Regularly test for vulnerabilities.
• Standards and Certifications:
o Guidelines: Follow security standards.
o Compliance: Obtain relevant certifications.
o Framework: Use a common language for security evaluation.
267
o Usage: Business purposes only.
• Corporate Owned, Personally Enabled (COPE):
o Ownership: Organization-owned.
o Usage: Allows personal use within acceptable use policies.
• Choose Your Own Device (CYOD):
o Ownership: Organization-owned.
o Choice: Employees select from a preapproved list.
Considerations:
• BYOD: Cost savings and flexibility but higher security risks.
• COPE: Greater control and security but higher equipment costs.
• CYOD: Balance between control and employee choice.
Mobile Device Management (MDM)
MDM Functions:
• Inventory Management: Track all devices accessing corporate resources.
• Security Policies: Enforce encryption, screen locks, and other security measures.
• Remote Capabilities: Lock or wipe devices if lost or stolen.
• Configuration Management: Centralize and enforce device settings.
• Updates and Patches: Ensure devices are protected against vulnerabilities.
• Quarantine Noncompliant Devices: Remove or isolate devices that don't meet security
standards.
Common MDM Tasks:
• App Distribution and Updates: Manage enterprise applications.
• Email Management: Configure and secure corporate email accounts.
• Geo-Tracking and Geofencing: Monitor device locations.
• App Allow/Block Listing: Control which apps can be installed.
• Internet Access Control: Manage web access and usage.
Popular MDM Platforms:
• Apple MDM: Built into macOS, iOS.
• Android Enterprise: Google's solution for Android devices.
• Platform-Agnostic Solutions: Microsoft Intune, VMware AirWatch, IBM MaaS360.
Key Points:
268
• Mobile Hardening: Apply OS patches, strong passwords, endpoint protection, and least
privilege.
• Unique Features: Implement remote wiping, encryption, secure lock screens, and manage
app permissions.
• Deployment Models: Choose between BYOD, COBO, COPE, and CYOD based on
organizational needs.
• MDM: Use MDM to manage, secure, and enforce policies on mobile devices.
269
Key Points:
• iOS Encryption:
o Full Device Encryption: All user data encrypted.
o Data Protection: Second layer of encryption for email and certain apps.
o Automatic Enablement: Enabled with password lock.
• Android Encryption:
o File-Level Encryption: Default for user data.
o No Full Disk Encryption: Due to performance concerns.
• Removable Storage:
o Support: Some Android devices support Micro SD cards and USB storage.
o Encryption: May require third-party software.
o Sensitive Data: Limit storage on removable media.
• MicroSD HSM:
o Secure Storage: Stores cryptographic keys securely.
o Versatility: Usable with multiple devices.
Location Services
Summary: Location services use geolocation to determine a device's physical position. They rely on
systems like GPS and IPS and are available to apps with user permission. While useful for
navigation, they raise privacy concerns due to potential tracking and data misuse.
Detailed Explanation:
• Geolocation:
o Global Positioning System (GPS): Determines latitude and longitude using satellite
information.
o Indoor Positioning System (IPS): Uses trilateration with cell towers, Wi-Fi access
points, and Bluetooth/RFID beacons.
• Privacy Concerns:
o Tracking: Location services can track movements and habits.
o Data Storage: Apps may store and send location data, risking exposure to attackers.
o Risks: Stalking, social engineering, identity theft.
Geofencing and Camera/Microphone Enforcement
Geofencing:
270
• Definition: Creating a virtual boundary based on real-world geography.
• Uses:
o Device Control: Limit functionality of devices outside a defined perimeter.
o Context-Aware Authentication: Lock and reauthenticate devices entering a specific
area.
o Camera/Microphone Control: Disable these features within certain areas.
Example:
• Office Perimeter: Lock smartphones and disable cameras/microphones when entering
office premises.
GPS Tagging
GPS Tagging:
• Definition: Adding geographical metadata (latitude, longitude) to media like photos, SMS,
and videos.
• Risks:
o Privacy: Highly sensitive personal and organizational data.
o Tracking: Can be used to track movements and locations.
o Example: A soldier revealing troop positions by uploading GPS-tagged selfies.
Key Points:
• Location Services:
o Systems: GPS and IPS.
o Privacy: Risks of tracking and data misuse.
• Geofencing:
o Virtual Boundaries: Control device functionality based on location.
o Uses: Device control, authentication, camera/microphone enforcement.
• GPS Tagging:
o Metadata: Adds location data to media.
o Risks: Privacy concerns and tracking.
271
• Cellular/Mobile Data Connections:
o Usage: Smartphones, tablets, and laptops use mobile data networks for
communication.
o Security: Mobile data connections bypass enterprise network protections, requiring
endpoint controls to ensure data security and privacy.
o Technologies: User awareness, VPNs, MDM, mobile threat defense, and DLP protect
cellular data connections.
• Global Positioning System (GPS):
o Function: GPS sensors triangulate device positions using signals from GPS satellites.
o Assisted GPS (A-GPS): Uses cell tower data to speed up triangulation, adjusting for
device position relative to the tower.
o Satellite Systems: GPS (US), Galileo (EU), GLONASS (Russia), BeiDou (China).
o Vulnerabilities: GPS signals can be jammed or spoofed, potentially defeating
geofencing mechanisms.
Key Points:
• Cellular Data Connections:
o Endpoint Controls: Implement user awareness, VPNs, MDM, mobile threat defense,
and DLP.
o Security: Ensure data security and privacy over cellular networks.
• GPS:
o Triangulation: Uses satellite signals to determine device position.
o A-GPS: Enhances GPS with cell tower data.
o Satellite Systems: Includes GPS, Galileo, GLONASS, BeiDou.
o Vulnerabilities: GPS signals can be jammed or spoofed.
272
o Risks: Open access points and rogue access points can lead to attacks like DNS
spoofing.
Personal Area Networks (PANs)
PANs:
• Function: Enable connectivity between mobile devices and peripherals.
• Ad Hoc Networks: Peer-to-peer connections between devices.
• Corporate Security: Generally disable peer-to-peer functions to prevent unauthorized
access.
Ad Hoc Wi-Fi and Wi-Fi Direct
Ad Hoc Wi-Fi:
• Peer-to-Peer: Connections without an access point.
• Standards: No established standards for ad hoc networking.
• MITRE Project: Enables Android smartphones to configure ad hoc networks.
Wi-Fi Direct:
• One-to-One Connections: One device functions as a soft access point.
• Vulnerabilities: Depends on Wi-Fi Protected Setup (WPS), which has known
vulnerabilities.
• Support: Android supports Wi-Fi Direct AP; iOS uses a proprietary framework.
Wireless Mesh Products:
• Vendors: Netgear, Google, etc.
• Interoperability: Some support the EasyMesh standard for peer-to-peer networks.
Tethering and Hotspots
Tethering:
• Function: Share a smartphone's Internet connection with another device.
• Methods: USB cable, Bluetooth, or Wi-Fi (hotspot).
• Enterprise Networks: Typically disabled to prevent circumvention of security mechanisms.
Key Points:
• Wi-Fi Connections:
o Default Use: Prefer Wi-Fi for data.
o Security: Use WPA3 for low risk.
o Risks: Open and rogue access points.
• PANs:
273
o Connectivity: Between devices and peripherals.
o Security: Disable peer-to-peer functions.
• Ad Hoc Wi-Fi and Wi-Fi Direct:
o Ad Hoc: Peer-to-peer without access points.
o Wi-Fi Direct: One-to-one connections with a soft AP.
o Vulnerabilities: WPS weaknesses.
• Tethering and Hotspots:
o Methods: USB, Bluetooth, Wi-Fi.
o Enterprise Use: Typically disabled for security.
274
o Control: Manage which devices can connect.
• Encryption:
o Data Protection: Encrypts data transmitted between devices.
o Shared Secret Key: Used for encryption after pairing.
• Bluetooth Secure Connections (BSC):
o Enhanced Security: Increased resistance to eavesdropping and attacks.
• Bluetooth Low Energy (BLE) Privacy:
o Random Addresses: Prevents tracking and unauthorized identification.
Key Points:
• Device Discovery: Even non-discoverable devices can be detected.
• Authentication and Authorization: Use secure passkeys and validate paired devices.
• Malware: Keep devices updated to prevent exploits.
• Bluetooth Security Features:
o Pairing and Authentication: Use cryptographic keys.
o Permissions: Require user consent.
o Encryption: Protect data transmission.
o BSC: Enhanced security against attacks.
o BLE Privacy: Uses random addresses to prevent tracking.
275
o Lack of Encryption: Allows eavesdropping and on-path attacks if data is not
encrypted by software services.
Mobile Payment Services
Mobile Wallet Apps:
• Function: Use NFC for contactless payments at point-of-sale (PoS) machines.
• Configuration: Users enter credit card information into a mobile wallet app.
• One-Time Token: Wallet app transmits a token instead of the actual credit card
information.
• Major Apps: Apple Pay, Google Pay, Samsung Pay.
NFC Attack Types:
• Eavesdropping: Certain antenna configurations can pick up NFC signals from a distance.
• Skimming: Attackers can skim information from NFC devices in crowded areas.
• Data Corruption: Similar to a DoS attack, flooding the area with RF signals to interrupt data
transfer.
Key Points:
• NFC Functions:
o Reading Tags: For applications like smart posters.
o Pairing Devices: Configures Bluetooth and other connections.
o Information Exchange: Shares data like contact cards.
• Security Concerns:
o Vulnerabilities: Handling tags and lack of encryption.
o Eavesdropping and Skimming: Risks from antenna configurations and crowded
areas.
• Mobile Wallet Apps:
o Payment Services: Use NFC for contactless payments.
o One-Time Token: Ensures secure transactions.
o Major Apps: Apple Pay, Google Pay, Samsung Pay.
276
Lesson 11: Enhance Application Security Capabilities
Topic 11A: Application Protocol Security Baselines
Secure Protocols
Summary: Secure protocols are essential for protecting data transmitted over networks. Unlike
insecure protocols, which transmit data in clear text, secure protocols use encryption to safeguard
information. Implementing secure protocols can be complex but is crucial for maintaining network
security.
Detailed Explanation:
• Insecure Protocols:
o Examples: HTTP, Telnet.
o Risks: Transmit data in clear text, making it readable by anyone intercepting the
data.
• Secure Protocols:
o Examples: HTTPS, SSH.
o Benefits: Use encryption to protect data, ensuring confidentiality and integrity.
o Implementation Challenges: Require obtaining and configuring SSL/TLS
certificates, managing cryptographic keys, and troubleshooting encrypted data.
Importance of Secure Protocols:
• Protect Sensitive Information: HTTPS protects login credentials and form data on
webpages.
• Secure Connections: SSH ensures encrypted communication with servers and equipment.
Implementation Challenges:
• Complexity: More difficult to implement and manage compared to insecure protocols.
• Certificate Management: Requires handling SSL/TLS certificates and ensuring they remain
valid.
• Troubleshooting: Encrypted data packets are harder to inspect for issues.
Implementing Secure Protocols
Formal Processes:
• Risk Assessment: Evaluate risks and review policies.
• Security Features: Assess different protocols' security features.
• Documentation: Document decisions for audits and compliance reviews.
Protocol Selection:
• Data Sensitivity: Choose protocols based on data sensitivity (e.g., HTTPS, SSH, SFTP/FTPS).
277
• Port Configuration: Standard ports (HTTP: 80, HTTPS: 443) can be changed but may
complicate configuration.
• Transport Methods: TCP (reliable, connection-oriented) vs. UDP (faster, connectionless).
Considerations:
• Encryption Levels: Ensure suitable encryption for data protection.
• Authentication Methods: Implement strong authentication.
• Existing Security Equipment: Consider firewalls and other security measures.
• Balance: Optimize security, maintainability, performance, and cost.
Key Points:
• Insecure vs. Secure Protocols:
o Insecure: HTTP, Telnet (clear text).
o Secure: HTTPS, SSH (encrypted).
• Implementation Challenges:
o Complexity: More difficult to manage.
o Certificate Management: Requires handling SSL/TLS certificates.
o Troubleshooting: Encrypted data is harder to inspect.
• Protocol Selection:
o Data Sensitivity: Choose based on data type.
o Port Configuration: Standard vs. custom ports.
o Transport Methods: TCP vs. UDP.
• Considerations: Encryption, authentication, existing security, balance of factors.
278
o Digital Certificates: Issued by trusted Certificate Authorities (CAs) to prove server
identity and validate key pairs.
o Encryption: Server and client negotiate supported ciphers to establish an encrypted
session.
o HTTPS: Operates over port 443, indicated by "https://" and a padlock icon in
browsers.
• Client Certificates: Can be installed for mutual authentication, commonly used in VPNs and
enterprise networks.
SSL/TLS Versions
Versions:
• SSL: Older versions are insecure and should not be used.
• TLS 1.2: Commonly used, but can support legacy clients with older versions.
• TLS 1.3: Approved in 2018, prevents downgrade attacks and improves handshake protocol
for faster connections.
Downgrade Attacks:
• Definition: On-path attacks that force the use of weaker cipher suites and SSL/TLS
versions.
• Prevention: TLS 1.3 removes insecure features and algorithms from previous versions.
Cipher Suites
Definition:
• Cipher Suite: A set of algorithms used for encryption and hashing in TLS.
TLS 1.2 Cipher Suite Example:
• Format: ECDHE-RSA-AES128-GCM-SHA256
o ECDHE: Elliptic Curve Diffie-Hellman Ephemeral mode for session key agreement.
o RSA: RSA signatures.
o AES128-GCM: 128-bit AES-GCM for symmetric bulk encryption.
o SHA256: 256-bit SHA for HMAC functions.
TLS 1.3 Cipher Suite Example:
• Format: TLSAES256GCMSHA384
o AES256GCM: Bulk encryption key strength and mode of operation.
o SHA384: Cryptographic hash algorithm used in HKDF for deriving symmetric
session keys.
Key Points:
• TLS Development:
279
o SSL to TLS: Enhanced security features.
o Digital Certificates: Issued by CAs for server identity and key validation.
• TLS Versions:
o TLS 1.2: Supports legacy clients.
o TLS 1.3: Prevents downgrade attacks, faster handshake.
• Cipher Suites:
o TLS 1.2 Example: ECDHE-RSA-AES128-GCM-SHA256.
o TLS 1.3 Example: TLSAES256GCMSHA384.
280
• LDAP Basics:
o Port 389: Default port for LDAP.
o No Security: Plaintext transmissions.
• Authentication Methods:
o No Authentication: Anonymous access.
o Simple Bind: Plaintext DN and password.
o SASL: Uses mechanisms like Kerberos with STARTTLS.
o LDAPS: Secure tunnel with digital certificate, port 636.
• Security Recommendations:
o Disable Insecure Methods: Anonymous and simple authentication.
o Access Levels: Read-only and read/write access.
o Network Access: Restrict to private network, block public access, allow authorized
IPs.
281
• Community Name Management: Use difficult-to-guess community names; avoid leaving
them blank or set to default.
• Access Control: Use access control lists to restrict management operations to known hosts
(specific IP addresses).
• SNMP Versions: Prefer SNMP v3, which supports encryption and strong user-based
authentication. Disable older versions of SNMP.
SNMP v3 Features:
• User-Based Authentication: Agents are configured with usernames and access
permissions.
• Message Security: SNMP messages are signed with a hash of the user's passphrase for
authentication.
Key Points:
• SNMP Basics:
o Components: Monitor and agents.
o Agent: Maintains MIB, initiates traps.
o Monitor: Polls agents, displays MIB information.
• Operations:
o Device Queries: Port 161 (UDP).
o Trap Operations: Port 162 (UDP).
• Security Guidelines:
o Plaintext Community Names: Avoid transmission over risky networks.
o Community Name Management: Use strong, non-default names.
o Access Control: Restrict to known hosts.
o SNMP Versions: Use SNMP v3, disable older versions.
• SNMP v3 Features:
o User-Based Authentication: Configured with usernames and permissions.
o Message Security: Signed with a hash of the user's passphrase.
282
Detailed Explanation:
File Transfer Methods:
• Shared Folders: Hosted by network operating systems for local or remote access.
• Email and Messaging Apps: Send files as attachments.
• HTTP: Supports file downloads and uploads.
• Peer-to-Peer Services: Direct file sharing between users.
File Transfer Protocol (FTP):
• Configuration: FTP servers host public directories and user accounts. Many HTTP servers
also function as FTP servers.
• Efficiency: More efficient than email attachments or HTTP file transfers.
• Security Issues: Lacks security; all data and authentication are in plaintext, making it
vulnerable to interception.
Unauthorized Servers:
• Rogue Servers: Users should not install unauthorized servers on their PCs. For example, IIS
includes HTTP, FTP, and SMTP servers but is not installed by default on client versions of
Windows.
Secure File Transfer Protocol (SFTP):
• Encryption: Encrypts authentication and data transfer using Secure Shell (SSH) over TCP
port 22.
• Secure Link: Creates a secure link between client and server, preventing eavesdropping and
on-path attacks.
• Requirements: Needs an SSH server that supports SFTP and SFTP client software.
FTP Over SSL (FTPS):
• Explicit TLS (FTPES): Uses the AUTH TLS command to upgrade an unsecure connection
over port 21 to a secure one, protecting authentication credentials. Data transfers can also
be encrypted using the PROT command.
• Implicit TLS (FTPS): Negotiates an SSL/TLS tunnel before any FTP commands are
exchanged, using secure port 990 for the control connection.
• Configuration Challenges: FTPS can be tricky to configure with firewalls, making FTPES
the preferred method.
Key Points:
• File Transfer Methods:
o Shared Folders: Local or remote access.
o Email and Messaging Apps: Attachments.
o HTTP: Downloads and uploads.
283
o Peer-to-Peer: Direct sharing.
• FTP:
o Configuration: Public directories, user accounts.
o Efficiency: More efficient than attachments or HTTP.
o Security Issues: Plaintext data and authentication.
• Unauthorized Servers:
o Rogue Servers: Avoid unauthorized installations.
• SFTP:
o Encryption: Uses SSH over TCP port 22.
o Secure Link: Prevents eavesdropping.
o Requirements: SSH server and SFTP client.
• FTPS:
o Explicit TLS (FTPES): Upgrades unsecure connections, port 21.
o Implicit TLS (FTPS): Uses secure port 990.
o Configuration Challenges: Prefer FTPES due to firewall issues.
Email Services
Summary: Email services use protocols like the Simple Mail Transfer Protocol (SMTP) for sending
mail and mailbox protocols for storing and managing messages. Secure versions of these protocols,
such as SMTPS, POP3S, and IMAPS, use encryption to protect communications.
Detailed Explanation:
Email Protocols:
• SMTP (Simple Mail Transfer Protocol): Specifies how mail is sent from one system to
another.
• Mailbox Protocols: Store messages for users and allow them to download or manage them
on the server.
Secure SMTP (SMTPS):
• Message Delivery: The sender's SMTP server discovers the recipient's SMTP server IP
using the domain name part of the email address, registered in DNS with an MX record.
• TLS Security: SMTP can be secured using TLS, similar to HTTPS with a server certificate.
o STARTTLS: Upgrades an existing unsecure connection to use TLS (explicit TLS).
o SMTPS: Establishes a secure connection before any SMTP commands are exchanged
(implicit TLS).
284
SMTP Ports:
• Port 25: Used for message relay between SMTP servers. STARTTLS can secure the
connection if supported.
• Port 587: Used by mail clients to submit messages for delivery. Requires STARTTLS and
authentication.
• Port 465: Used for message submission over implicit TLS (SMTPS), though deprecated.
Secure POP (POP3S):
• POP3 (Post Office Protocol v3): Stores messages delivered by SMTP on a server.
Downloads messages to the recipient's email client.
• POP3S: Secured version of POP3 operating over TCP port 995.
Secure IMAP (IMAPS):
• IMAP (Internet Message Access Protocol): Supports permanent connections to a server
and multiple clients to the same mailbox. Allows managing mail folders on the server.
• IMAPS: Secured version of IMAP operating over TCP port 993.
Key Points:
• Email Protocols:
o SMTP: Sends mail between systems.
o Mailbox Protocols: Store and manage messages.
• Secure SMTP (SMTPS):
o Message Delivery: Uses MX records in DNS.
o TLS Security: STARTTLS (explicit) and SMTPS (implicit).
• SMTP Ports:
o Port 25: Message relay, STARTTLS.
o Port 587: Client submission, STARTTLS and authentication.
o Port 465: Deprecated implicit TLS.
• Secure POP (POP3S):
o POP3: Downloads messages to client.
o POP3S: Secured over TCP port 995.
• Secure IMAP (IMAPS):
o IMAP: Permanent connections, multiple clients, folder management.
o IMAPS: Secured over TCP port 993.
285
Email Security
Summary: Three key technologies—Sender Policy Framework (SPF), Domain Keys Identified Mail
(DKIM), and Domain-based Message Authentication, Reporting & Conformance (DMARC)—are
essential for verifying email authenticity and preventing phishing and spam. These technologies,
along with email gateways and Secure/Multipurpose Internet Mail Extensions (S/MIME),
significantly enhance email security.
Detailed Explanation:
SPF (Sender Policy Framework):
• Function: Detects and prevents sender address forgery in phishing and spam emails.
• Mechanism: Verifies the sender's IP address against authorized IP addresses listed in the
DNS TXT records of the sender's domain.
• Process: Receiving mail server checks the SPF record to confirm the email originated from
an authorized system.
DKIM (DomainKeys Identified Mail):
• Function: Uses encryption to enable email verification.
• Mechanism: Sender signs emails with a digital signature.
• Process: Receiving server uses a DKIM record in the sender's DNS to verify the signature
and email integrity.
DMARC (Domain-based Message Authentication, Reporting & Conformance):
• Function: Defines rules for handling messages based on SPF and DKIM checks.
• Mechanism: Provides reporting capabilities for domain owners to monitor email activity.
• Process: Can move messages to quarantine, reject them, or tag them based on
authentication results.
Combined Use of SPF, DKIM, and DMARC:
• Enhancement: Makes it difficult for attackers to impersonate trusted domains.
• Importance: Essential for verifying email authenticity, maintaining content integrity, and
ensuring safe delivery.
Email Gateway:
• Function: Controls all incoming and outgoing email traffic.
• Mechanism: Uses anti-spam filters, antivirus scanners, and threat detection algorithms.
• Process: Scrutinizes emails to remove threats, enforces policies, and automates
authentication using DMARC, SPF, and DKIM.
S/MIME (Secure/Multipurpose Internet Mail Extensions):
• Function: Secures email communications.
• Mechanism: Uses public key encryption and digital signatures.
286
• Process: Encrypts email content and verifies sender authenticity to ensure confidentiality
and integrity.
Key Points:
• SPF:
o Function: Prevents sender address forgery.
o Mechanism: Verifies sender's IP against DNS TXT records.
• DKIM:
o Function: Enables email verification.
o Mechanism: Uses digital signatures.
• DMARC:
o Function: Defines handling rules based on SPF and DKIM.
o Mechanism: Provides reporting and monitoring.
• Combined Use:
o Enhancement: Prevents domain impersonation.
o Importance: Verifies authenticity and integrity.
• Email Gateway:
o Function: Controls email traffic.
o Mechanism: Uses filters and threat detection.
o Process: Enforces policies and automates authentication.
• S/MIME:
o Function: Secures email communications.
o Mechanism: Uses encryption and digital signatures.
o Process: Ensures confidentiality and integrity.
287
• Common Vector for Data Loss: Due to its widespread use and the sensitivity of the data it
carries, email is a frequent target for data loss incidents.
• Human Errors: Mistakes such as sending confidential data to the wrong recipients or using
insecure transmission methods highlight the need for DLP measures.
• Insider Threats: DLP solutions help guard against data leakage risks posed by insiders,
whether due to lack of policy awareness or malicious intent.
Regulatory Compliance:
• Regulations: GDPR, HIPAA, and PCI DSS impose stringent requirements for protecting
specific data types.
• DLP Role: DLP is a key mechanism to ensure compliance and prevent unauthorized data
transmission.
DLP Technologies:
• Function: Prevent unauthorized sharing or dissemination of sensitive information.
• Policies: Monitor and control content in communication platforms like email.
• Scanning: DLP scans emails and attachments for sensitive information defined by the
organization's policies (e.g., credit card numbers, social security numbers, proprietary
information).
• Actions: Based on predefined rules, the DLP system can block emails, alert the sender or
administrator, or automatically encrypt the email before transmission.
Enforcement:
• Essential for Organizations: Especially those handling sensitive customer data or subject
to regulations like GDPR, HIPAA, or PCI DSS.
• Benefits: Minimizes the risk of data breaches, avoids noncompliance penalties, and
maintains data security and privacy.
• Tools: DLP is often enforced using email gateways and security policies on endpoint
protection tools.
Key Points:
• Importance of Email DLP:
o Sensitive Data: Financial, intellectual property, customer, employee data, PII.
o Common Vector: Frequent target for data loss.
o Human Errors: Sending to wrong recipients, insecure methods.
o Insider Threats: Lack of policy awareness, malicious intent.
• Regulatory Compliance:
o Regulations: GDPR, HIPAA, PCI DSS.
o DLP Role: Ensures compliance, prevents unauthorized transmission.
288
• DLP Technologies:
o Function: Prevent unauthorized sharing.
o Policies: Monitor and control content.
o Scanning: Detects sensitive information.
o Actions: Block, alert, encrypt.
• Enforcement:
o Essential for Organizations: Handling sensitive data, regulatory compliance.
o Benefits: Minimizes breaches, avoids penalties, maintains security.
o Tools: Email gateways, endpoint protection policies.
DNS Filtering
Summary: DNS filtering blocks or allows access to specific websites by controlling the resolution of
domain names into IP addresses. It provides a proactive defense against malicious sites, enforces
acceptable use policies, and protects all devices on a network. DNS filtering is easy to implement
and cost-effective but should be combined with other security measures for comprehensive
protection.
Detailed Explanation:
DNS Filtering Basics:
• Function: Controls access to websites by managing the resolution of domain names into IP
addresses.
• Mechanism: Checks domain name requests against a database of approved or blocked
domains. Blocks access to malicious or unapproved sites.
Benefits of DNS Filtering:
• Proactive Defense: Blocks access to phishing sites, malware distribution sites, and other
malicious destinations.
• Policy Enforcement: Helps enforce acceptable use policies by blocking inappropriate or
distracting websites.
• Device Protection: Protects all devices on a network, including IoT devices.
• Ease of Implementation: Simple to set up and cost-effective for networks of any size.
Implementing DNS Filtering:
• DNS Filtering Services: Use services like Cisco's OpenDNS, Quad9, or CleanBrowsing for
DNS resolution with built-in filtering.
• Managed DNS Servers: Organizations can implement DNS filtering directly on their own
DNS servers (e.g., Microsoft's DNS server or BIND) for complete control over filtering
policies.
289
• DNS Firewalls: Intercept DNS queries at the network level and apply filtering rules.
• Endpoint Protection: Some antivirus software and endpoint protection tools provide DNS
filtering capabilities for device-level protection.
• Open Source Solutions: Tools like Pi-hole or ADGuard can be configured as local DNS
resolvers with filtering capabilities, often implemented on Raspberry Pi hardware.
DNS Security:
• Fault Tolerance: Ensure DNS services are fault-tolerant to prevent disruptions from DoS
attacks.
• Access Control: Local DNS servers should only accept recursive queries from authenticated
local hosts and not from the Internet.
• Patch Management: Regularly update DNS server software to address known
vulnerabilities.
• Preventing DNS Footprinting: Use access control lists to prevent unauthorized zone
transfers and protect private network information.
• DNSSEC (DNS Security Extensions): Mitigates spoofing and poisoning attacks by validating
DNS responses with signed resource records.
Key Points:
• DNS Filtering Basics:
o Function: Controls website access.
o Mechanism: Checks domain requests against a database.
• Benefits:
o Proactive Defense: Blocks malicious sites.
o Policy Enforcement: Enforces acceptable use policies.
o Device Protection: Protects all network devices.
o Ease of Implementation: Simple and cost-effective.
• Implementing DNS Filtering:
o Services: OpenDNS, Quad9, CleanBrowsing.
o Managed Servers: Microsoft's DNS server, BIND.
o DNS Firewalls: Network-level filtering.
o Endpoint Protection: Device-level filtering.
o Open Source: Pi-hole, ADGuard.
• DNS Security:
o Fault Tolerance: Prevent DoS disruptions.
o Access Control: Restrict recursive queries.
290
o Patch Management: Update server software.
o Preventing Footprinting: Use access control lists.
o DNSSEC: Validates DNS responses.
291
o SameSite Attribute: Limits when cookies are sent to mitigate cross-site request
forgery.
o Expiration Limits: Restricts the usable life of cookies.
Static Code Analysis:
• Purpose: Identifies vulnerabilities, errors, and noncompliant coding practices before
deployment.
• Tools: SonarQube, Coverity, Fortify.
• Benefits: Early detection of bugs, improved code quality, and education on common coding
errors.
Code Signing:
• Function: Uses digital signatures to verify the integrity and authenticity of software code.
• Process: Signer uses a private key to encrypt a hash of the code, forming a digital signature.
• Certificate Authority (CA): Issues certificates to verify the signer's identity.
• Benefits: Ensures software has not been tampered with and confirms the publisher's
identity.
• Limitations: Does not guarantee the safety or security of the code itself.
Key Points:
• Security Development Lifecycle:
o Modern Practices: Integrate security with functionality and usability.
o Examples: Microsoft's SDL, OWASP SAMM.
• Input Validation:
o Importance: Prevents manipulation of application behavior.
o Methods: Allowlisting, blocklisting, data type checks, range checks, regular
expressions, encoding.
• Secure Cookies:
o Function: Store session states and preferences.
o Security Measures: Secure, HttpOnly, SameSite attributes, expiration limits.
• Static Code Analysis:
o Purpose: Identifies vulnerabilities and errors.
o Tools: SonarQube, Coverity, Fortify.
o Benefits: Early bug detection, improved code quality.
• Code Signing:
o Function: Verifies integrity and authenticity of code.
292
o Process: Uses digital signatures and certificates.
o Benefits: Ensures code integrity, confirms publisher identity.
o Limitations: Does not guarantee code safety.
Application Protections
Summary: Application protections involve measures to prevent data exposure, handle errors
gracefully, manage memory securely, validate inputs both client-side and server-side, and ensure
security in cloud environments. These practices are essential for maintaining the integrity,
confidentiality, and availability of applications.
Detailed Explanation:
Data Exposure:
• Definition: Occurs when privileged information (e.g., tokens, passwords, personal data) is
accessible without proper access controls.
• Protection: Transmit data only between authenticated hosts using strong, industry-
standard encryption libraries.
Error Handling:
• Importance: Ensures applications handle errors and exceptions in a controlled manner.
• Structured Exception Handling (SEH): Programmers should write SEHs to dictate
application behavior during errors.
• Custom Error Handlers: Prevent default error messages that reveal platform information
to attackers.
• Types of Errors:
o Errors: Conditions the process cannot recover from (e.g., out of memory).
o Exceptions: Errors that can be handled without crashing the process.
Memory Management:
• Importance: Prevents arbitrary code execution by ensuring secure memory management
practices.
• Checks: Validate untrusted input to prevent memory overwrites.
Client-Side vs. Server-Side Validation:
• Client-Side Validation: Performed locally; vulnerable to malware interference.
• Server-Side Validation: Performed remotely; more secure but can be time-consuming.
• Best Practice: Use client-side validation for initial checks and server-side validation for
final acceptance.
Application Security in the Cloud:
293
• Cloud Hardening: Fortifies cloud infrastructure to reduce attack surfaces.
• Shared Responsibility Model: Cloud providers secure infrastructure; customers secure
data and applications.
• Practices: Least privilege access, encryption, regular audits, continuous monitoring,
vulnerability assessments, and penetration testing.
Monitoring Capabilities:
• Importance: Enhances logging and monitoring to detect potential threats.
• Comprehensive Logging: Capture important events and activities for security audits and
incident response.
• Real-Time Alerts: Trigger alerts for specific events (e.g., failed login attempts, unusual data
transfers) to improve threat detection.
Key Points:
• Data Exposure:
o Definition: Unauthorized access to privileged information.
o Protection: Use strong encryption libraries.
• Error Handling:
o Importance: Controlled error and exception management.
o SEH: Structured exception handling.
o Custom Handlers: Prevent revealing platform information.
o Types: Errors (unrecoverable), exceptions (recoverable).
• Memory Management:
o Importance: Prevent arbitrary code execution.
o Checks: Validate untrusted input.
• Client-Side vs. Server-Side Validation:
o Client-Side: Initial checks, vulnerable to malware.
o Server-Side: Final acceptance, more secure.
o Best Practice: Use both for comprehensive validation.
• Application Security in the Cloud:
o Cloud Hardening: Fortifies infrastructure.
o Shared Responsibility: Providers secure infrastructure, customers secure data.
o Practices: Least privilege, encryption, audits, monitoring, assessments.
• Monitoring Capabilities:
294
o Importance: Detect potential threats.
o Comprehensive Logging: Capture important events.
o Real-Time Alerts: Improve threat detection.
Software Sandboxing
Summary: Sandboxing is a security mechanism that isolates running processes to prevent them
from accessing the system they are running on. This containment strategy reduces the impact of
malicious or malfunctioning software, enhancing system security and stability.
Detailed Explanation:
Sandboxing Basics:
• Function: Isolates running processes to control program access and prevent system
interference.
• Benefit: Reduces the potential impact of malicious or malfunctioning software.
Practical Examples:
• Web Browsers: Modern browsers like Google Chrome use sandboxing to separate each tab
and extension into distinct processes. This prevents malicious code in one tab from affecting
the entire browser or operating system.
• Operating Systems: iOS and Android use sandboxing to limit each application's actions.
Apps can access their own data but not other apps' data or nonessential system resources
without permission.
• Virtual Machines and Containers: VMs and containers like Docker run in isolation from
the host and each other. If one VM or container is compromised, the others remain
unaffected.
Sandboxing in Security Operations:
• Purpose: Detects and understands malware activities through forensic inspection.
• Tools:
o Cuckoo Sandbox: An open-source system that runs files in an isolated environment
and logs activities like system calls and network traffic.
o Joe Sandbox: A web-accessible tool that uses machine learning and other
techniques to analyze software without requiring setup or installation.
Key Points:
• Sandboxing Basics:
o Function: Isolates processes to control access.
o Benefit: Enhances security and stability.
• Practical Examples:
295
o Web Browsers: Isolates tabs and extensions.
o Operating Systems: Limits app actions.
o VMs and Containers: Isolates VMs and containers.
• Sandboxing in Security Operations:
o Purpose: Forensic inspection of malware.
o Tools: Cuckoo Sandbox, Joe Sandbox.
296
o Function: Limits the scope and impact of the incident.
o Actions: Securing data, notifying stakeholders, and identifying reporting
requirements.
5. Eradication:
o Function: Removes the cause and restores the system to a secure state.
o Actions: Applying secure configurations and installing patches.
6. Recovery:
o Function: Reintegrates the system into business processes.
o Actions: Restoring data from backups, security testing, and monitoring for
reoccurrence.
7. Lessons Learned:
o Function: Analyzes the incident and response to improve procedures.
o Actions: Documenting the incident and feeding back into the preparation phase.
Key Points:
• Preparation:
o Function: System resilience.
o Actions: Hardening, policies, communication setup.
• Detection:
o Function: Discovering threats.
o Sources: Automated systems, manual detection.
• Analysis:
o Function: Incident confirmation and severity assessment.
o Actions: Triage.
• Containment:
o Function: Limiting impact.
o Actions: Data security, stakeholder notification.
• Eradication:
o Function: Cause removal and system restoration.
o Actions: Secure configurations, patches.
• Recovery:
o Function: System reintegration.
o Actions: Data restoration, monitoring.
297
• Lessons Learned:
o Function: Procedure improvement.
o Actions: Documentation, feedback.
Preparation
Summary: The preparation process establishes and updates policies and procedures for dealing
with security breaches, including provisioning personnel and resources.
Detailed Explanation:
Cybersecurity Infrastructure:
• Incident Detection Tools: Provide visibility by automating the collection and analysis of
network traffic, system state monitoring, and log data.
• Digital Forensics Tools: Facilitate acquiring and validating data from system memory and
file systems for incident response or prosecution.
• Case Management Tools: Log incident details and coordinate response activities across a
team. Often part of a product suite like SIEM or SOAR, which manage incident response
steps.
Cyber Incident Response Team:
• Team Composition: Includes members with various security competencies, often referred
to as CIRT, CSIRT, or CERT. May be part of a SOC.
• Leadership: Led by a senior executive decision-maker for serious incidents.
• Roles:
o Managers: Oversee daily operations and coordinate with other departments.
o Analysts and Technicians: Prioritize cases and mitigate minor incidents.
• Additional Expertise:
o Legal: Ensures compliance with laws and regulations, liaises with law enforcement.
o Human Resources (HR): Manages employee-related issues and contributes to
addressing underlying organizational problems.
o Public Relations: Handles negative press and social media reactions.
• Outsourcing: Some functions may be outsourced to third-party agencies for better handling
of insider threats.
Communication Plan:
• Purpose: Establishes clear lines of communication for reporting incidents and notifying
affected parties.
• Security: Prevents unintentional information release and ensures adversaries are not
alerted to containment measures.
298
• Out-of-Band Communication: Uses methods that cannot be intercepted, avoiding
corporate email.
Stakeholder Management:
• Information Control: Prevents unauthorized release of incident details.
• Reporting Obligations: Informs affected parties and regulators as necessary.
• Marketing and PR Impact: Manages the company's reputation and demonstrates improved
security systems.
Incident Response Plan:
• Outcome: A formal plan listing procedures, contacts, and resources for various incident
categories.
Key Points:
• Cybersecurity Infrastructure:
o Incident Detection: Automates data collection and analysis.
o Digital Forensics: Validates data for response or prosecution.
o Case Management: Coordinates response activities.
• Cyber Incident Response Team:
o Composition: Security experts, legal, HR, PR.
o Leadership: Senior executive decision-maker.
o Roles: Managers, analysts, technicians.
o Outsourcing: Third-party agencies for insider threats.
• Communication Plan:
o Purpose: Clear reporting lines.
o Security: Prevents information leaks.
o Out-of-Band: Secure communication methods.
• Stakeholder Management:
o Control: Prevents unauthorized information release.
o Reporting: Informs affected parties and regulators.
o PR Impact: Manages reputation.
• Incident Response Plan:
o Outcome: Formal plan with procedures and resources.
299
Detection
Summary: Detection involves correlating events from various data sources to identify potential
security incidents. Indicators can be recorded through multiple channels, and it's crucial to notify
the appropriate person on the CIRT when a suspicious event is detected.
Detailed Explanation:
Detection Channels:
• Log Files and Alerts: Matching events in log files, error messages, IDS alerts, firewall alerts,
and other data sources to known threat patterns.
• Baseline Deviations: Identifying deviations from baseline system metrics.
• Manual Inspection: Physically inspecting sites, premises, networks, and hosts. Proactive
searches for signs of intrusion are known as threat hunting.
• Notifications: Reports from employees, customers, or suppliers.
• Public Reports: New vulnerabilities or threats reported by system vendors, regulators,
media, or other outside parties.
• Confidential Reporting: Providing options for employees to report insider threats like
fraud or misconduct without fear.
First Responder:
• Role: The first responder is the person on the CIRT notified of a suspicious event. They take
charge of the situation and formulate the appropriate response.
• Training: Employees at all levels must be trained to recognize and respond to security
incidents.
Key Points:
• Detection Channels:
o Log Files and Alerts: Match events to threat patterns.
o Baseline Deviations: Identify unusual metrics.
o Manual Inspection: Conduct threat hunting.
o Notifications: Receive reports from various sources.
o Public Reports: Monitor external vulnerability reports.
o Confidential Reporting: Encourage insider threat reporting.
• First Responder:
o Role: Takes charge of detected incidents.
o Training: Ensures all employees can recognize and respond to incidents.
300
Analysis
Summary: After detection, the analysis process involves investigating data to confirm if a genuine
incident has occurred and determining its priority. This process may involve correlating multiple
indicators and escalating complex events to senior CIRT members.
Detailed Explanation:
Incident Verification:
• True Positive: Confirmed incident based on multiple indicators.
• False Positive: Dismissed report if no genuine incident is found.
• Escalation: Complex or high-impact events may be escalated to senior CIRT members.
Impact Assessment:
• Data Integrity: Value of data at risk.
• Downtime: Degree of disruption to business processes.
• Economic/Publicity Impact: Short-term costs (incident response, lost business) and long-
term costs (reputation damage).
• Scope: Number of systems affected, not always indicative of priority.
• Detection Time: Speed of detecting breaches.
• Recovery Time: Length of remediation process.
Incident Categorization:
• Purpose: Ensures shared understanding among response team members.
• Threat Intelligence: Provides insights into adversary tactics, techniques, and procedures
(TTPs).
• Cyber Kill Chain: Framework describing attack stages, useful for threat research.
Playbooks:
• Purpose: Guides investigators in determining priorities and remediation plans.
• Content: Data-driven SOPs for specific cyber threat scenarios.
• Process: Starts with an alert report and leads through analysis, containment, eradication,
recovery, and lessons learned.
Key Points:
• Incident Verification:
o True Positive: Confirmed incident.
o False Positive: Dismissed report.
o Escalation: For complex events.
• Impact Assessment:
301
o Data Integrity: Value of data.
o Downtime: Business disruption.
o Economic/Publicity Impact: Short-term and long-term costs.
o Scope: Number of systems affected.
o Detection Time: Speed of detection.
o Recovery Time: Length of remediation.
• Incident Categorization:
o Purpose: Shared understanding.
o Threat Intelligence: Insights into TTPs.
o Cyber Kill Chain: Attack stages framework.
• Playbooks:
o Purpose: Guides for incident response.
o Content: SOPs for threat scenarios.
o Process: Steps from alert to lessons learned.
Containment
Summary: Following detection and analysis, containment involves determining an appropriate
response to an incident. This phase addresses various complex issues and employs techniques like
isolation-based and segmentation-based containment to limit the impact of the incident.
Detailed Explanation:
Complex Issues in Containment:
• Damage Assessment: Determine the damage or theft already inflicted and potential future
impact.
• Countermeasures: Evaluate available countermeasures, their costs, and implications.
• Alerting the Threat Actor: Consider actions that might alert the attacker and gather
necessary evidence.
• Notification: Identify required notifications or reporting at this stage.
Containment Techniques:
Isolation-Based Containment:
• Definition: Removing an affected component from its larger environment.
• Methods:
o Network Disconnection: Pulling the network plug or disabling the switch port (air
gap).
302
o VLAN Isolation: Using routing infrastructure to isolate infected VLANs.
o Firewalls: Preventing infected hosts from communicating.
o Account/Application Disabling: Disabling user accounts or application services to
limit damage.
Segmentation-Based Containment:
• Definition: Isolating a host or group of hosts using network technologies.
• Methods:
o VLANs, Subnets, and Firewalls: Preventing communication outside the protected
segment.
o Sinkhole/Honeynet: Allowing the attacker to receive filtered output to facilitate
analysis and potentially identify the threat actor.
Key Points:
• Complex Issues:
o Damage Assessment: Current and potential impact.
o Countermeasures: Costs and implications.
o Alerting the Threat Actor: Evidence gathering.
o Notification: Required reporting.
• Containment Techniques:
o Isolation-Based:
▪ Network Disconnection: Air gap.
▪ VLAN Isolation: Routing infrastructure.
▪ Firewalls: Communication prevention.
▪ Account/Application Disabling: Limiting damage.
o Segmentation-Based:
▪ Network Technologies: VLANs, subnets, firewalls.
▪ Sinkhole/Honeynet: Deceptive analysis.
303
• Reconstitution of Affected Systems:
o Methods: Remove malicious files/tools or restore systems from secure
backups/images.
o Baseline Templates: Ensure templates are updated to prevent recurrence of the
incident.
• Reaudit Security Controls:
o Purpose: Ensure controls are not vulnerable to the same or new attacks.
o Awareness: Be prepared for potential follow-up attacks in targeted incidents.
• Notification:
o Affected Parties: Inform and provide remediation steps, such as advising customers
to change compromised passwords.
Recovery Steps:
• Restoration of Capabilities:
o Reconfiguration: Fully reconfigure hosts to their pre-incident business workflow.
o Monitoring: Ensure the system cannot be compromised through the same attack
vector or closely monitor the vector for future attacks.
Key Points:
• Eradication:
o Reconstitution: Remove malicious files or restore from backups.
o Baseline Templates: Update to prevent recurrence.
o Reaudit Controls: Ensure security controls are robust.
o Notification: Inform affected parties and provide remediation steps.
• Recovery:
o Restoration: Reconfigure systems to pre-incident state.
o Monitoring: Protect against future attacks.
m
Summary: The lessons learned process reviews severe security incidents to determine their root
cause, whether they were avoidable, and how to prevent them in the future. This involves meetings,
root cause analysis, and compiling reports to improve procedures.
Detailed Explanation:
Lessons Learned Activity:
304
• Meeting: Staff review the incident and responses, including both involved and noninvolved
handlers for objective perspectives. Focus on improving procedures rather than assigning
blame.
• Report Compilation: Analysts compile a lessons learned report (LLR) or after-action report
(AAR).
Root Cause Analysis:
• Purpose: Determine how the incident occurred and identify avoidable factors.
• Models:
o Five Whys Model: Drill down to root causes by asking successive "Why" questions.
▪ Example:
▪ Why was our patient safety database found on a dark website?
Because a threat actor copied it to USB and walked out with it.
▪ Why was the database copied without alert? Because the data loss
prevention system was disabled.
▪ Why was the system disabled? Because the attacker had privileges.
▪ Why were they given privileges? All administrator accounts had
them.
▪ Why didn't disabling the system generate an alert? Alerts were
disabled due to false positives.
▪ Root Causes: Improper permission assignments and logging/alerting
configuration.
o Alternative Questions: Build a complete picture of the incident.
▪ Who was the adversary?
▪ Why was the incident perpetrated?
▪ When did it occur, when was it detected, and how long did it take to contain
and eradicate?
▪ Where did it occur (affected systems and network segments)?
▪ How did it occur (TTPs used by the adversary)?
▪ What security controls could have improved mitigation or response?
Key Points:
• Lessons Learned Activity:
o Meeting: Review incident and responses, focus on improvement.
o Report Compilation: Create LLR or AAR.
• Root Cause Analysis:
305
o Purpose: Identify how the incident occurred.
o Models:
▪ Five Whys: Successive "Why" questions.
▪ Alternative Questions: Comprehensive incident picture.
• Example Questions:
o Who: Adversary identity.
o Why: Motives and targeted assets.
o When: Incident timeline.
o Where: Affected systems and segments.
o How: TTPs used.
o What: Better security controls.
306
o Incident Detection and Reporting: Ensures staff can recognize and report
incidents.
o Cross-Departmental Training: Coordinates efforts across different departments.
o Security Awareness and Compliance: Helps employees identify future attacks.
o Team Building and Communication: Improves resilience and working
relationships during stressful incidents.
Key Points:
• Testing:
o Purpose: Develop competencies, identify deficiencies.
o Forms:
o Tabletop Exercise: Scenario explanation.
o Walkthroughs: Demonstrate actions.
o Simulations: Team-based exercises.
• Training:
o Purpose: Swift and effective incident response.
o Focus Areas:
▪ Detection and Reporting: Recognize and report incidents.
▪ Cross-Departmental: Coordinate efforts.
▪ Awareness and Compliance: Identify future attacks.
o Team Building: Improve resilience.
Threat Hunting
Summary: Threat hunting proactively discovers evidence of TTPs within a network or system,
contrasting with reactive processes triggered by alerts. It provides valuable information for incident
response preparation, demonstrating the value of security tools and identifying areas for
improvement.
Detailed Explanation:
Threat Hunting Process:
• Purpose: Proactively discover evidence of TTPs within the network or system.
• Contrast: Reactive processes are triggered by alerts, while threat hunting is proactive.
Key Points:
• Advisories and Bulletins:
o Purpose: Warn of new threat types.
307
o Activity: Labor-intensive, performed with clear goals and resources.
o Trigger: Security bulletins and advisories about new TTPs or vulnerabilities.
o Example: Initiating a threat-hunting plan if new malware is detected in other
companies.
• Intelligence Fusion and Threat Data:
o Manual Analysis: Lengthy process of analyzing network and log data.
o SIEM and Threat Analytics: Use intelligence fusion techniques with up-to-date TTP
and indicator threat data feeds.
o Queries and Filters: Correlate threat data against on-premises data from network
traffic and logs.
• Maneuver:
o Adversarial Nature: Recognize that capable threat actors anticipate threat hunting
and deploy countermeasures.
o Example: An attacker may trigger a denial of service attack to divert attention.
o Defensive Maneuver: Use passive discovery techniques to avoid alerting threat
actors before a containment, eradication, and recovery plan is in place.
308
• Defense Strategy: Exploiting uncertainties or mistakes in evidence integrity or collection
process.
Legal Hold:
• Definition: Requires preserving information relevant to a court case.
• Sources: Defined by regulators, industry best practices, or litigation notices.
• Impact: Computer systems may be taken as evidence, disrupting networks.
• Suspension: Routine deletion/destruction of records and logs must be suspended.
Key Points:
• Digital Forensics:
o Purpose: Legal evidence collection.
o Challenges: External threat prosecution.
o Evidence: Latent and requires interpretation.
o Documentation: Ensures integrity.
• Due Process:
o Definition: Fair legal proceedings.
o Importance: Forensic investigation.
o Awareness: Understanding processes.
o Defense Strategy: Exploiting uncertainties.
• Legal Hold:
o Definition: Preserve relevant information.
o Sources: Regulators, best practices, litigation notices.
o Impact: Evidence collection disruption.
o Suspension: Halt routine deletion/destruction.
Acquisition
Summary: Acquisition involves obtaining a forensically clean copy of data from a device seized as
evidence. Legal validity is crucial, especially with BYOD policies. The process is complex due to the
nature of digital evidence and the need to capture it in the correct order of volatility.
Detailed Explanation:
Legal Validity:
• Ownership: Verify legal validity of search or seizure, especially for BYOD.
• Mistakes: Any mistake can make evidence inadmissible.
309
Complexity of Data Acquisition:
• Digital vs. Physical: More difficult to capture evidence from a digital crime scene.
• Power State: Some evidence is lost if the system is powered off; some is unobtainable until
powered off.
• Shutdown Method: Evidence may be lost depending on whether the system is shut down
or "frozen" by disconnecting power.
Acquisition Process:
• Tool Usage: Use tools to make an image from the target device.
• Volatility Order: Capture evidence from more volatile to less volatile storage.
Order of Volatility (ISOC Best Practice):
1. CPU Registers and Cache Memory: Includes cache on disk controllers, graphics cards, etc.
2. Nonpersistent System Memory (RAM): Routing table, ARP cache, process table, kernel
statistics.
3. Persistent Mass Storage Devices: HDDs, SSDs, flash memory devices.
o Partition and File System Blocks: Slack space, free space.
o System Memory Caches: Swap space/virtual memory, hibernation files.
o Temporary File Caches: Browser cache.
o User, Application, and OS Files and Directories.
4. Remote Logging and Monitoring Data.
5. Physical Configuration and Network Topology.
6. Archival Media and Printed Documents.
Windows Registry:
• Storage: Mostly stored on disk, but some keys (e.g., HKLM\HARDWARE) exist only in
memory.
• Analysis: Can be analyzed via a memory dump.
Key Points:
• Legal Validity: Verify for BYOD, avoid mistakes.
• Complexity: Digital evidence capture, power state considerations.
• Acquisition Process: Use tools, follow volatility order.
• Volatility Order: From CPU registers to archival media.
• Windows Registry: Disk and memory analysis.
310
System Memory Acquisition
Summary: System memory acquisition involves creating a dump of volatile data held in RAM. This
data can be analyzed to identify running processes, temporary file contents, registry data, network
connections, cryptographic keys, and more. Specialized tools are required for this process.
Detailed Explanation:
Volatile Data:
• Definition: Data held in RAM, lost when power is removed.
• Purpose: Analyzing a memory dump can reveal running processes, temporary file systems,
registry data, network connections, cryptographic keys, and encrypted data.
Acquisition Tools:
• Specialist Tools: Hardware or software tools that capture memory contents while the host
is running.
• Preinstallation: Tools need to be preinstalled as they require a kernel mode driver.
• Commercial Tools: Available for Windows to perform system memory acquisition.
• Linux Tools: The Volatility framework includes a tool to install a kernel driver for memory
acquisition.
Key Points:
• Volatile Data:
o Definition: Data in RAM, lost without power.
o Purpose: Analyzing memory dumps for various data types.
• Acquisition Tools:
o Specialist Tools: Capture memory contents.
o Preinstallation: Requires kernel mode driver.
o Commercial Tools: Available for Windows.
o Linux Tools: Volatility framework for kernel driver installation.
311
• OS Installation: Captures the OS if the boot volume is included.
Device States for Acquisition:
1. Live Acquisition:
o Description: Copying data while the host is running.
o Pros: Captures more evidence, reduces service impact.
o Cons: Data on disks changes, may not be legally acceptable, may alert threat actors.
2. Static Acquisition by Shutting Down:
o Description: Shutting down the host before acquisition.
o Risk: Malware may detect shutdown and perform anti-forensics.
3. Static Acquisition by Pulling the Plug:
o Description: Disconnecting power at the wall socket.
o Pros: Preserves storage devices in a forensically clean state.
o Cons: Risk of data corruption.
Documentation:
• Importance: Document steps, provide a timeline, and video-record actions to ensure
evidence integrity.
Imaging Utilities:
• GUI Tools: Available in forensic suites.
• Linux Command: dd command for copying input file to output file.
o Example: dd if=/dev/sda of=/mnt/usbstick/backup.img
• dcfldd: A fork of dd with additional features like multiple output files and exact match
verification.
Key Points:
• Nonvolatile Storage: HDDs, SSDs, USB drives, optical media.
• Device States:
o Live Acquisition: Running host, more evidence, potential legal issues.
o Static Acquisition (Shutdown): Risk of anti-forensics.
o Static Acquisition (Pull Plug): Forensically clean, risk of corruption.
• Documentation: Essential for evidence integrity.
• Imaging Utilities: GUI tools, dd command, dcfldd.
312
Preservation
Summary: Preservation ensures that evidence collected at a crime scene is protected from
tampering and maintains a valid timeline. This involves tightly controlled access, video recording
the acquisition process, and using tools like write blockers to prevent data alteration.
Detailed Explanation:
Evidence Collection:
• Timeline Validity: Ensure evidence conforms to a valid timeline.
• Controlled Access: Prevent tampering by tightly controlling access.
• Video Recording: Establishes provenance by recording the acquisition process.
Forensically Sound Image:
• Capture Tool: Must not alter data or metadata on the source disk.
• Write Blocker: Prevents data changes by filtering write commands.
Evidence Integrity and Non-Repudiation:
• Process:
1. Cryptographic Hash: Create a hash of the disk media using MD5 or SHA.
2. Bit-by-Bit Copy: Make a copy using an imaging utility.
3. Second Hash: Create a hash of the image to match the original.
4. Reference Image Copy: Validate with checksum and perform analysis on the copy.
• Purpose: Ensures non-repudiation by proving no modification to the image.
Chain of Custody:
• Labeling and Sealing: Use tamper-evident bags with antistatic shielding.
• Documentation: Record collection, handling, and storage details.
• Integrity: Protects against accusations of tampering or alteration.
• Logging: Every handler must log methods and tools used.
Storage:
• Secure Facility: Ensure access and environmental control to protect electronic systems
from hazards like condensation, ESD, and fire.
Key Points:
• Evidence Collection:
o Timeline Validity: Maintain a valid timeline.
o Controlled Access: Prevent tampering.
o Video Recording: Establish provenance.
313
• Forensically Sound Image:
o Capture Tool: No data alteration.
o Write Blocker: Prevents changes.
• Evidence Integrity:
o Process: Hashing, copying, validating.
o Purpose: Non-repudiation.
• Chain of Custody:
o Labeling and Sealing: Tamper-evident bags.
o Documentation: Collection and handling records.
o Integrity: Protects against tampering accusations.
o Logging: Methods and tools used.
• Storage:
o Secure Facility: Access and environmental control.
Reporting
Summary: Digital forensics reporting summarizes the significant contents of digital data and the
investigator's conclusions. It must adhere to strong ethical principles, ensuring unbiased analysis,
repeatable methods, and proper handling of evidence.
Detailed Explanation:
Ethical Principles:
• Unbiased Analysis: Conclusions should be based solely on direct evidence.
• Repeatable Methods: Analysis methods must be repeatable by third parties.
• Evidence Handling: Ideally, evidence should not be changed. If manipulation is necessary, it
must be justified and documented.
• Defense Strategy: Any deviation from ethical behavior can lead to dismissal of findings.
Forensic Examination:
• ESI Search: Involves searching the entire drive, including allocated and unallocated sectors.
• E-Discovery: Filters relevant evidence from all data gathered and stores it in a usable
format for trials.
E-Discovery Functions:
• Identify and De-Duplicate: Filters standard files to reduce data volume.
• Search: Locates files of interest using keyword and semantic search.
• Tags: Applies keywords or labels to organize evidence.
314
• Security: Ensures evidence is stored, transmitted, and analyzed without tampering.
• Disclosure: Provides the same evidence to both plaintiff and defendant, fulfilling trial
requirements.
Key Points:
• Ethical Principles:
o Unbiased Analysis: Based on direct evidence.
o Repeatable Methods: Third-party verification.
o Evidence Handling: Justified and documented manipulation.
o Defense Strategy: Avoid deviations.
• Forensic Examination:
o ESI Search: Entire drive search.
o E-Discovery: Filters and stores relevant evidence.
• E-Discovery Functions:
o Identify and De-Duplicate: Reduces data volume.
o Search: Locates files of interest.
o Tags: Organizes evidence.
o Security: Prevents tampering.
o Disclosure: Ensures equal evidence access.
315
• Endpoint Security Logs: Includes host-based intrusion detection, vulnerability scanning,
antivirus, and firewall security software.
Challenges:
• Diversity and Size: Managing large and varied data sources.
• "Vs" of Data: Volume, velocity, variety, veracity, and value.
Dashboards:
• Purpose: Provide a console for day-to-day incident response.
• Customization: Separate dashboards for different purposes (e.g., incident handler vs.
manager).
• Content: Visualizations (graphs, tables) showing key status metrics.
Automated Reports:
• Types:
o Alerts and Alarms: Detect threat indicators and start incident cases.
o Status Reports: Communicate threat levels, incident numbers, and effectiveness of
controls.
• Customization: Preconfigured and custom reports tailored to audience needs.
Key Points:
• Data Sources:
o System Memory and Media Data: File system data and metadata.
o Network Appliance Logs: Switches, routers, firewalls.
o Network Traffic: Sensors and IDS.
o Vulnerability Scanner Logs: Network-based scanners.
o OS Component Logs: Client and server hosts.
o Application and Service Logs: Hosts.
o Endpoint Security Logs: Intrusion detection, antivirus, firewall.
• Challenges:
o Diversity and Size: Managing large data sources.
o "Vs" of Data: Volume, velocity, variety, veracity, value.
• Dashboards:
o Purpose: Incident response console.
o Customization: Different dashboards for different roles.
o Content: Key status metrics.
316
• Automated Reports:
o Types: Alerts/alarms and status reports.
o Customization: Preconfigured and custom reports.
Log Data
Summary: Log data is essential for investigating security incidents. It includes event message data
and metadata from various sources, and accurate logging requires synchronized date and time
values. SIEM tools aggregate and correlate logs for better visibility and monitoring.
Detailed Explanation:
Event Data:
• Generated By: Processes on network appliances and general computing hosts.
• Components:
o Event Message Data: Specific notifications or alerts (e.g., "Login failure," "Firewall
rule dropped traffic").
o Event Metadata: Source and time of the event, including host/network address,
process name, and categorization/priority fields.
Accurate Logging:
• Synchronization: Hosts must be synchronized to the same date and time value and format.
• Time Zone: Ideally, use the same time zone or a neutral zone like UTC.
Log Formats:
Windows Event Viewer:
• Format: Each event has a header with source, level, user, timestamp, category, keywords,
and host name.
Syslog:
• Usage: Open format, protocol, and server software for logging event messages.
• Sources: Generated by switches, routers, firewalls, UNIX/Linux servers, and workstations.
• Components:
o PRI Code: Calculated from facility and severity level.
o Header: Contains timestamp, host name, app name, process ID, and message ID
fields.
o Message Part: Contains a tag showing the source process plus content, formatted as
space- or comma-delimited fields or name/value pairs.
Log Data Management:
• Individual Analysis: Logs can be kept and analyzed on each host.
317
• SIEM Tools: Aggregate and correlate logs from multiple sources for a "single pane of glass"
view.
• Collection Methods: Via an agent on each host or using syslog to forward event data.
Key Points:
• Event Data:
o Generated By: Network appliances, computing hosts.
o Components: Message data and metadata.
• Accurate Logging:
o Synchronization: Date and time values.
o Time Zone: Use the same or neutral zone.
• Log Formats:
o Windows Event Viewer: Detailed headers.
o Syslog: Open format, various sources.
• Log Data Management:
o Individual Analysis: Host-specific logs.
o SIEM Tools: Aggregate and correlate logs.
o Collection Methods: Agents or syslog.
318
• System Log: Events from OS kernel processes and services (e.g., service failures,
shutdowns).
Linux Logs:
• Implementation: Varies by distribution (syslog or Journald).
• Principal Log Files:
o /var/log/messages or /var/log/syslog: Stores all system events.
o /var/log/auth.log or /var/log/secure: Records login attempts, sudo use, and
authentication data.
o Package Manager Log: Stores software installation and update information.
macOS Logs:
• Unified Logging System: Accessed via the Console app or the log command.
• Security-Related Events: Includes login, app installs, and system policy violations.
Key Points:
• OS-Specific Security Logs:
o Audit Events: Success/accept or fail/deny.
o Authentication Events: User sign-ins/outs, privilege attempts.
o File System Events: Permissions to read/modify files.
• Windows Logs:
o Application Log: Application events.
o Security Log: Audit events.
o System Log: OS kernel events.
• Linux Logs:
o Implementation: Syslog or Journald.
o Principal Log Files: System events, authentication data, package manager logs.
• macOS Logs:
o Unified Logging: Console app or log command.
o Security Events: Login, app installs, policy violations.
319
Detailed Explanation:
Application Logs:
• Definition: Managed by applications rather than the OS.
• Formats: May use Event Viewer, syslog, or custom formats.
• Windows Event Viewer: Specific application log for authenticated accounts, custom logs
for specific processes.
• Location: Check product documentation for log locations.
Endpoint Logs:
• Definition: Monitored by security software on the host.
• Includes: Host-based firewalls, intrusion detection, vulnerability scanners,
antivirus/antimalware suites.
• Integration: Often integrated into endpoint protection platforms (EPP), endpoint detection
and response (EDR), or extended detection and response (XDR).
• SIEM Integration: Security tools can be integrated with SIEM using agent-based software.
Threat Levels and Analysis:
• Summarizing Events: Shows overall threat levels (e.g., malware detected, intrusion events,
missing patches).
• Detection Events: Helps attribute intrusion events to specific actors and develop threat
intelligence.
Vulnerability Scans:
• Logging: Vulnerability scanners log each detected vulnerability to a SIEM.
• Vulnerabilities: Include missing patches and noncompliance with baseline security
configurations.
• Host Configuration: Provides information about host configuration and remediation status.
Key Points:
• Application Logs:
o Definition: Managed by applications.
o Formats: Event Viewer, syslog, custom.
o Windows Event Viewer: Specific and custom logs.
o Location: Product documentation.
• Endpoint Logs:
o Definition: Monitored by security software.
o Includes: Firewalls, intrusion detection, vulnerability scanners, antivirus.
320
o Integration: EPP, EDR, XDR.
o SIEM Integration: Agent-based software.
• Threat Levels and Analysis:
o Summarizing Events: Overall threat levels.
o Detection Events: Attribution and threat intelligence.
• Vulnerability Scans:
o Logging: Logs vulnerabilities to SIEM.
o Vulnerabilities: Missing patches, noncompliance.
o Host Configuration: Remediation status.
321
• Additional Logs: Shuns, resets, redirects (similar to firewall).
• Visualization: Summary event data in dashboard graphs to represent threat levels.
• Analysis: Helps attribute intrusion events to specific actors and develop threat intelligence.
Key Points:
• Network Logs:
o Generated By: Routers, firewalls, switches, access points.
o Content: Appliance operation, traffic, access logs.
o Examples: On-path attacks, scanning activity, wireless network attacks.
• Firewall Logs:
o Configuration: Event generation by rule.
o Usage: Testing new/high-impact rules.
o Details: Date/timestamp, interface, traffic direction, packet status, addresses, ports.
o Support: Confirms connections, adjusts rules.
• IPS/IDS Logs:
o Event Generation: Traffic pattern matches.
o Volume: High, log high sensitivity/impact rules.
o Additional Logs: Shuns, resets, redirects.
o Visualization: Dashboard graphs for threat levels.
o Analysis: Attribution and threat intelligence.
Packet Captures
Summary: Network traffic analysis provides valuable insights into potential breaches. This can be
done at the level of individual frames or using summary statistics of traffic flows and protocol usage.
SIEM tools and retrospective network analysis (RNA) solutions help in capturing and analyzing
network packets.
Detailed Explanation:
Network Traffic Analysis:
• Detail Level: Analyzed at individual frames or summary statistics.
• SIEM Tools: Store selected information from network sensors, aggregate and summarize
packet data to show protocol usage and endpoint activity.
• Recording Traffic: Typically, only packets triggering firewall or IDS rules are recorded to
manage data volume.
Retrospective Network Analysis (RNA):
322
• Purpose: Records the totality of network events at packet header or payload level, given
sufficient resources.
Packet Analysis:
• Tool: Wireshark or similar tools.
• Process: Deep, frame-by-frame scrutiny of captured traffic.
• Layers Analyzed:
o Data Link/MAC Layer: Header fields.
o Network/IP Layer: Header fields.
o Transport (TCP/UDP) Layer: Header fields.
o Application Layer: Header data and payload contents.
Uses of Packet Analysis:
• Identify Manipulations: Detect nonstandard packet manipulations (e.g., botnet server
mechanisms).
• Inspect Protocol Payloads: Identify data exfiltration attempts or suspicious domain/URL
contacts.
• Reveal Attack Tools: Detailed packet content analysis can reveal tools used in an attack.
• Extract Binary Files: Possible to extract potential malware for further analysis.
Key Points:
• Network Traffic Analysis:
o Detail Level: Individual frames, summary statistics.
o SIEM Tools: Aggregate and summarize packet data.
o Recording Traffic: Packets triggering firewall/IDS rules.
• Retrospective Network Analysis (RNA):
o Purpose: Record total network events.
• Packet Analysis:
o Tool: Wireshark.
o Process: Frame-by-frame scrutiny.
o Layers: Data link/MAC, network/IP, transport (TCP/UDP), application.
• Uses:
o Identify Manipulations: Nonstandard packet uses.
o Inspect Payloads: Data exfiltration, suspicious contacts.
o Reveal Tools: Attack tools.
323
o Extract Files: Potential malware.
Metadata
Summary: Metadata refers to the properties of data created by an application, stored on media, or
transmitted over a network. It helps establish timelines and contains other types of evidence useful
in investigations.
Detailed Explanation:
File Metadata:
• Attributes: Tracks file creation, access, and modification times.
• Security Attributes: Read-only, hidden, or system file status.
• ACLs: Permissions attached to a file.
• Extended Attributes: Author, copyright information, tags for indexing/searching.
• Social Media: Metadata can reveal location and time when uploaded with media.
Web Metadata:
• Headers: Returned by web servers and included in client requests.
• Authorization: Transmitted via cookies.
• Data Type: Headers describe the type of data returned (text, binary).
• Inspection: Headers can be inspected using web browser tools and logged by web servers.
Email Metadata:
• Internet Header: Contains recipient and sender addresses, server handling details.
• Creation: Mail user agent (MUA) creates initial header, forwards to mail delivery agent
(MDA).
• Transmission: MDA checks sender authorization, adds/amends header, transmits to
message transfer agent (MTA).
• Routing: MTA routes message, adding information to the header.
• Viewing Headers: Use message properties/options/source command in mail clients.
• Parsing Tools: Tools like Message Analyzer (part of Microsoft Remote Connectivity
Analyzer) parse and display headers in a structured format.
Key Points:
• File Metadata:
o Attributes: Creation, access, modification times.
o Security: Read-only, hidden, system file status.
o ACLs: Permissions.
324
o Extended Attributes: Author, copyright, tags.
o Social Media: Reveals location and time.
• Web Metadata:
o Headers: Server returns, client includes.
o Authorization: Cookies.
o Data Type: Text, binary.
o Inspection: Browser tools, server logs.
• Email Metadata:
o Internet Header: Recipient, sender, server details.
o Creation: MUA creates, MDA forwards.
o Transmission: MDA checks, transmits to MTA.
o Routing: MTA adds information.
o Viewing: Mail client commands.
o Parsing Tools: Message Analyzer.
325
o Description: Hosts push log changes to the SIEM server.
o Process: Management server parses and normalizes each log/monitoring source.
o Usage: Common for switches, routers, and firewalls using Syslog protocol.
3. Sensor-Based Collection:
o Description: Collects packet captures and traffic flow data from sniffers.
o Process: Uses mirror port functionality of a switch or network tap.
Log Aggregation:
• Purpose: Normalizes data from different sources to make it consistent and searchable.
• Tools: SIEM software features connectors or plug-ins to interpret data from various
systems.
• Normalization: Accounts for vendor implementation differences and normalizes date/time
zone differences to a single timeline.
Key Points:
• Core Function: Data collection and correlation.
• Types of Collection:
o Agent-Based: Host-installed agents.
o Listener/Collector: Hosts push logs to SIEM.
o Sensor-Based: Packet captures and traffic flow data.
• Log Aggregation:
o Purpose: Consistent and searchable data.
o Tools: Connectors or plug-ins.
o Normalization: Vendor differences and time zones.
326
• Threat Intelligence Feed: Associates data points with known threat indicators.
• Incident Response: Alerts are processed through analysis, containment, eradication, and
recovery.
o Validation: Determines if an alert is a true positive.
o Quarantine: Isolates the source of indicators.
• Automation: SIEM and SOAR solutions can automate validation and remediation.
Reporting:
• Purpose: Provides insight into the security system's status.
• Types of Reports:
o Executive Reports: High-level summary for decision-makers.
o Manager Reports: Detailed information for operational decisions.
o Compliance Reports: Information required by regulators.
• Common Metrics:
o Authentication Data: Failed login attempts, file audit data.
o Hosts: Missing patches, configuration vulnerabilities.
o User Account Anomalies: Out-of-hours use, excessive permission requests.
o Incident Case Management: Volume, open cases, resolution time.
o Trend Reporting: Changes to key metrics over time.
Archiving:
• Retention Policy: Keeps historical log and network traffic data for a defined period.
• Purpose: Supports retrospective incident and threat hunting, forensic evidence, and
compliance.
• Performance: Log rotation scheme moves outdated information to archive storage to
maintain SIEM performance.
Key Points:
• Alerting:
o Correlation Rules: Detect potential incidents.
o Logical Expressions: Match conditions.
o Threat Intelligence: Known threat indicators.
o Incident Response: Analysis, containment, eradication, recovery.
o Automation: Validation and remediation.
• Reporting:
327
o Purpose: Security system status.
o Types: Executive, manager, compliance.
o Metrics: Authentication data, hosts, user anomalies, incident management, trends.
• Archiving:
o Retention Policy: Historical data.
o Purpose: Incident hunting, forensic evidence, compliance.
o Performance: Log rotation scheme.
Alert Tuning
Summary: Alert tuning is essential to reduce false positives and manage alert fatigue. It involves
refining detection rules, redirecting alert floods, and using machine learning to optimize the
alerting system.
Detailed Explanation:
Criticality Levels:
• Log Only: Event added to SIEM's database, not automatically classified.
• Alert: Listed on a dashboard for an agent to assess.
• Alarm: Automatically classified as critical, raising a priority alarm.
Challenges:
• False Positives: Waste analysts' time and reduce productivity.
• Alert Fatigue: Analysts may miss high-impact alerts due to numerous low-priority alerts.
• False Negatives: System fails to generate alerts for malicious indicators, a serious security
weakness.
• True Negatives: Events properly allowed by the system.
Techniques for Alert Tuning:
1. Refining Detection Rules and Muting Alert Levels:
o Adjust Parameters: Reduce multiple notifications by adding more correlation
factors.
o Mute Alerts: Change to log-only status or reduce notification frequency.
2. Redirecting Sudden Alert "Floods":
o Dedicated Group: Assign to a dedicated agent or team to handle false positives.
3. Redirecting Infrastructure-Related Alerts:
o Infrastructure Team: Manage misconfigurations causing high alert volumes.
328
4. Continuous Monitoring of Alert Volume and Analyst Feedback:
o Manager Oversight: Monitor system and reduce alert sensitivity based on analyst
feedback.
o SOAR Solutions: Automate rule processing.
5. Deploying Machine Learning (ML) Analysis:
o Rapid Analysis: Monitor analyst responses and automatically tune rules to reduce
false negatives without impacting true positives.
Key Points:
• Criticality Levels: Log only, alert, alarm.
• Challenges: False positives, alert fatigue, false negatives, true negatives.
• Techniques:
o Refining Rules: Adjust parameters, mute alerts.
o Redirecting Alerts: Dedicated groups for floods and infrastructure-related alerts.
o Continuous Monitoring: Manager oversight, SOAR solutions.
o Machine Learning: Automatic rule tuning.
Monitoring Infrastructure
Summary: Managerial reports are used for day-to-day monitoring of computer resources and
network infrastructure. Network monitors and flow collectors help in tracking the status and
performance of network appliances and traffic, providing insights into potential issues and attacks.
Detailed Explanation:
Network Monitors:
• Purpose: Collect data about network infrastructure appliances (e.g., switches, access points,
routers, firewalls).
• Monitored Metrics: CPU/memory load, state tables, disk capacity, fan speeds/temperature,
network link utilization/error statistics.
• Heartbeat Messages: Indicate availability.
• Data Collection: Often uses Simple Network Management Protocol (SNMP).
o SNMP Traps: Inform management system of notable events (e.g., port failure,
overheating, power failure, excessive CPU utilization).
o Thresholds: Set for triggering traps, providing alerts and alarms for hardware
issues.
• Unusual Conditions: Network monitoring can reveal potential attacks.
NetFlow:
329
• Purpose: Records metadata and statistics about network traffic.
• Sources: Switches, routers, firewalls, web proxies.
• Features:
o Trend and Pattern Highlighting: Traffic generated by applications, hosts, and
ports.
o Anomaly Detection: Alerts based on flow analysis patterns or custom triggers.
o Visualization Tools: Map network connections and interpret traffic patterns.
o Rogue Behavior Identification: Detects malware, tunneling, bandwidth issues.
o C&C Channel Identification: Detects malware attempts to contact handlers.
• NetFlow and IPFIX:
o NetFlow: Cisco-developed reporting of network flow information.
o IPFIX: IETF standard for flow information export.
o Flow Labels and Records: Defined by packets sharing key characteristics (5-tuple:
source address, destination address, protocol, source port, destination port).
o Flow Expiration: Exporter caches data and transmits to a collector when flows
expire or become inactive.
Key Points:
• Network Monitors:
o Purpose: Monitor network appliances.
o Metrics: CPU/memory, state tables, disk capacity, fan speeds, network utilization.
o SNMP: Data collection and traps for notable events.
o Unusual Conditions: Potential attack indicators.
• NetFlow:
o Purpose: Record network traffic metadata.
o Sources: Switches, routers, firewalls, proxies.
o Features: Trend highlighting, anomaly detection, visualization, rogue behavior
identification.
o NetFlow/IPFIX: Flow labels and records, flow expiration.
330
Detailed Explanation:
System Monitors and Logs:
• Functionality: Similar to network monitors for computer hosts.
• SNMP Traps: Report health status (e.g., CPU/memory load, disk capacity).
• Logs: Valuable for diagnosing availability issues and recording authorized/unauthorized
resource use.
• Audit Trail: Logs provide a record of actions and early warnings of intrusion attempts.
• User Association: Logs typically associate actions with specific users, emphasizing the
importance of not sharing login details.
Application and Cloud Monitors:
• SNMP Limitations: Limited functionality.
• Proprietary Solutions: Available for infrastructure, application, database, and cloud
environments.
• Monitoring Factors: Include heartbeat tests, session/request numbers, bandwidth
consumption, CPU/memory utilization, error/security alerts.
• Cloud Services: Monitor network bandwidth, virtual machine status, application health.
Vulnerability Scanners:
• Reports: Total number of unmitigated vulnerabilities for each host.
• Consolidation: Shows network-wide host status and highlights patch/configuration issues.
Antivirus:
• Endpoint Protection Platforms (EPPs): Next-gen A-V suites detect malware by signature
and integrate with user and entity behavior analytics (UEBA).
• AI-Backed Analysis: Detects threat actor behavior bypassing signature matching.
• Configuration: Automatically blocks detected threats and generates dashboard alerts/logs
via SIEM integration.
Data Loss Prevention (DLP):
• Function: Mediates copying of tagged data to authorized media/services.
• Monitoring Statistics: Show DLP policy violations and trends over time.
Key Points:
• System Monitors and Logs:
o Functionality: Health status, SNMP traps.
o Logs: Diagnose issues, record actions, early warnings.
o User Association: Importance of unique login details.
331
• Application and Cloud Monitors:
o SNMP Limitations: Limited functionality.
o Proprietary Solutions: Infrastructure, application, database, cloud.
o Monitoring Factors: Heartbeat tests, sessions, bandwidth, CPU/memory, alerts.
o Cloud Services: Network bandwidth, VM status, application health.
• Vulnerability Scanners:
o Reports: Unmitigated vulnerabilities.
o Consolidation: Network-wide status.
• Antivirus:
o EPPs: Next-gen A-V, UEBA integration.
o AI-Backed Analysis: Detects bypassed threats.
o Configuration: Automatic blocking, SIEM alerts/logs.
• Data Loss Prevention (DLP):
o Function: Mediates data copying.
o Monitoring Statistics: Policy violations, trends.
Benchmarks
Summary: Vulnerability scans assess the configuration of security controls and application settings
against established benchmarks. This helps identify necessary controls and misconfigurations,
ensuring systems meet best practice standards.
Detailed Explanation:
Vulnerability Scans:
• Purpose: Assess security controls and application settings.
• Identify Issues: Lack of necessary controls or misconfigurations (e.g., outdated antivirus,
default passwords).
• Best Practices: Provided in templates listing controls and configuration settings.
Security Content Automation Protocol (SCAP):
• Function: Allows scanners to determine if a computer meets a configuration baseline.
• Components:
o Open Vulnerability and Assessment Language (OVAL): XML schema for
describing system security state and querying vulnerability reports.
o Extensible Configuration Checklist Description Format (XCCDF): XML schema
for developing and auditing best practice configuration checklists and rules.
332
Compliance Scans:
• Purpose: Measure systems and configurations against best practice frameworks.
• Necessity: For regulatory compliance or voluntary adherence to best practice standards.
Key Points:
• Vulnerability Scans:
o Purpose: Assess security controls and settings.
o Identify Issues: Necessary controls, misconfigurations.
o Best Practices: Templates with controls and settings.
• SCAP:
o Function: Configuration baseline compliance.
o Components: OVAL, XCCDF.
• Compliance Scans:
o Purpose: Best practice framework adherence.
o Necessity: Regulatory or voluntary compliance.
333
▪ Installs without user consent and operates secretly.
o Potentially Unwanted Programs (PUPs) / Potentially Unwanted Applications
(PUAs):
▪ Installed alongside other software or bundled with new systems.
▪ May not be malicious but can be unwanted or installed without clear
consent.
▪ Sometimes referred to as grayware or bloatware.
• Payloads:
o Spyware: Collects user information without consent.
o Rootkit: Provides unauthorized access to a computer.
o Remote Access Trojan (RAT): Allows remote control of a system.
o Ransomware: Encrypts data and demands payment for decryption.
Key Points:
• Vectors:
o Viruses and Worms:
▪ Viruses: Infect and spread via executable code.
▪ Worms: Spread independently across networks.
o Trojan: Hidden in legitimate software, installs secretly.
o PUPs/PUAs: Installed with other software, may not be malicious.
• Payloads:
o Spyware: Collects data secretly.
o Rootkit: Grants unauthorized access.
o RAT: Enables remote control.
o Ransomware: Encrypts data, demands ransom.
Computer Viruses
Summary: A computer virus is a type of malware that replicates and spreads by infecting
executable applications or program code. Viruses are classified based on the type of file or media
they infect.
Detailed Explanation:
• Types of Viruses:
o Non-resident/File Infector:
334
▪ Contained within a host executable file.
▪ Runs with the host process, infects other process images, and performs
payload actions.
o Memory Resident:
▪ Creates a new process in memory when the host file is executed.
▪ Remains in memory even if the host process is terminated.
o Boot:
▪ Written to the disk boot sector or partition table.
▪ Executes as a memory-resident process when the OS starts or media is
attached.
o Script and Macro Viruses:
▪ Uses programming features in local scripting engines (e.g., PowerShell, WMI,
JavaScript).
▪ Can be embedded in documents like Microsoft Office files with VBA or PDFs
with JavaScript.
• Special Terms:
o Multipartite: Viruses that use multiple vectors.
o Polymorphic: Viruses that dynamically change or obfuscate their code to evade
detection.
Key Points:
• Types of Viruses:
o Non-resident/File Infector: Infects host executable files, runs with the host
process.
o Memory Resident: Creates a persistent process in memory.
o Boot: Infects boot sector or partition table, executes on OS start.
o Script and Macro Viruses: Uses scripting engines, embedded in documents.
• Special Terms:
o Multipartite: Multiple vectors.
o Polymorphic: Changes code to avoid detection.
335
Detailed Explanation:
• Computer Worms:
o Execution: Runs without user action by exploiting vulnerabilities in processes.
o Examples: Code Red worm infected Microsoft's IIS web server via a buffer overflow.
o Effects: Consumes network bandwidth, can crash systems, and may carry malicious
payloads.
o Notable Worm: Conficker demonstrated the potential for remote code execution
and potent attacks.
• Fileless Malware:
o Characteristics:
▪ Does not write code to disk; operates in memory.
▪ May alter registry values for persistence.
▪ Initial execution may depend on user actions like running a script or opening
a file.
o Techniques:
▪ Uses lightweight shellcode for backdoor mechanisms.
▪ Downloads additional payloads, often obfuscated to evade detection.
▪ Employs "live off the land" techniques, using legitimate system tools (e.g.,
PowerShell, WMI) to execute actions.
o Classifications:
▪ Advanced Persistent Threat (APT): Long-term, targeted attacks.
▪ Advanced Volatile Threat (AVT): Similar to APT but more transient.
▪ Low-Observable Characteristics (LOC) Attack: Uses various coding tricks
to evade detection.
Key Points:
• Computer Worms:
o Execution: Exploits vulnerabilities, no user action needed.
o Effects: Network bandwidth consumption, system crashes, malicious payloads.
o Examples: Code Red, Conficker.
• Fileless Malware:
o Characteristics: Memory-resident, no disk code, registry changes for persistence.
o Techniques: Lightweight shellcode, obfuscated payloads, "live off the land"
methods.
336
o Classifications: APT, AVT, LOC attacks.
337
o Beacons: Invisible images for metadata collection.
• Adware:
o Browser reconfigurations: Allows tracking, changes settings.
o Installation: Programs or extensions.
• Spyware:
o Monitoring: Tracks activity, takes screenshots, activates devices.
o DNS redirection: To pharming sites.
• Keyloggers:
o Keystroke recording: Steals passwords and credit card data.
o Software and hardware: Includes scripts and modified USB adapters.
338
o Function: Establish connections from compromised hosts to C2 hosts.
o Detection: Network connections are key to identifying RATs, backdoors, or bots.
o Implementation: Historically used IRC; modern methods use HTTPS or DNS traffic.
Key Points:
• Backdoors:
o Bypass Authentication: Provide remote control.
o Creation: Intentional or due to misconfiguration.
• RATs:
o Covert Malware: Mimics legitimate remote control programs.
o Functions: Remote access, file uploads, software installation.
o Terminology: Also known as remote administration tools.
• Bots and Botnets:
o Bots: Perform malicious activities.
o Botnets: Controlled groups of bots.
o Uses: DDoS attacks, spam, cryptomining.
• C2 Networks:
o Connections: Key for identifying threats.
o Implementation: Uses covert channels like HTTPS or DNS.
Rootkits
Summary: Rootkits are a type of malware that gain high-level privileges on a system, often through
exploiting vulnerabilities. They can conceal their presence and perform various malicious activities,
making them particularly dangerous.
Detailed Explanation:
• Privileges and Execution:
o User Privileges: Malware inherits the privileges of the logged-on user.
o Administrator Privileges: Requires user confirmation via UAC or admin
credentials.
o SYSTEM Privileges: Critical processes run with SYSTEM privileges, higher than
local admin.
• Concealment Techniques:
o Process Names: Trojans may use deceptive names (e.g., "rund1132.exe" instead of
"rundll32.exe").
339
o Persistence: Achieved through registry entries or creating services.
o Exploit Payloads: Can execute without authorization if exploiting severe
vulnerabilities.
• Rootkit Capabilities:
o System Changes: Can theoretically change anything on the system.
o Detection Evasion: May compromise system files and interfaces to hide from tools
like Explorer, taskmgr, or netstat.
o Log Cleaning: Contains tools to clean system logs.
• Privilege Rings:
o Ring 0: Most privileged, direct hardware access (kernel processes).
o Ring 3: User-mode processes.
o Ring 1 and 2: Drivers and I/O processes.
o Virtualization: Adds complexity to this architecture.
• Firmware Rootkits:
o Persistence: Can reside in computer or peripheral firmware.
o Survival: Survive OS reinstallation and drive formatting.
o Examples: DarkMatter and Quark Matter UEFI rootkits targeting Apple Macbook
firmware.
Key Points:
• Privileges and Execution:
o User Privileges: Limited to user profile actions.
o Administrator Privileges: Requires UAC confirmation.
o SYSTEM Privileges: Highest level, critical processes.
• Concealment Techniques:
o Deceptive Process Names: Mimic legitimate files.
o Persistence Methods: Registry entries, services.
o Exploit Payloads: Execute without user authorization.
• Rootkit Capabilities:
o System Changes: Extensive potential changes.
o Detection Evasion: Hides from system tools.
o Log Cleaning: Conceals activity.
• Privilege Rings:
340
o Ring 0: Kernel processes.
o Ring 3: User-mode processes.
o Ring 1 and 2: Drivers, I/O processes.
o Virtualization: Adds complexity.
• Firmware Rootkits:
o Persistence: In firmware, survives OS reinstall.
o Examples: DarkMatter, Quark Matter.
341
Key Points:
• Ransomware:
o Extortion: Makes data/systems unavailable, demands payment.
o Methods: Threatening messages, scareware.
• Crypto-Ransomware:
o Encryption: Encrypts files, demands payment for decryption.
o Example: CryptoLocker.
• Cryptojacking Malware:
o Resource Hijacking: Uses host resources for crypto-mining.
o Execution: Often via botnets.
• Logic Bombs:
o Trigger Conditions: Time, date, user/system events.
o Example: Scripts left by disgruntled employees.
o Detection: Hard to detect with antivirus software.
342
o Techniques: Exploiting vulnerabilities in network monitoring software.
o Procedures: Installing compromised software through infected repositories.
• Indicators of Compromise (IoCs):
o Definition: Residual signs of a successful or ongoing attack.
o Examples: Compromised process versions, C&C network connections, disabled
recovery features, encrypted files, blackmail notices.
• Modern Threat Detection:
o Integration: Uses threat feeds of published TTPs and IoCs.
o Automation: AI systems perform automated analysis to detect malicious behaviors.
• IoCs vs. IoAs:
o IoC: Evidence of a successful attack.
o IoA: Evidence of an intrusion attempt in progress.
Key Points:
• Antivirus Scanners:
o Signature-Based: Recognizes known malware.
o Limitations: Not effective for advanced threats.
• TTPs:
o Tactic: High-level threat behavior.
o Technique: How a tactic is executed.
o Procedure: Detailed execution method.
• IoCs:
o Definition: Signs of an attack.
o Examples: Compromised processes, C&C connections, encrypted files.
• Modern Detection:
o Integration: Uses threat feeds.
o Automation: AI for analysis.
• IoCs vs. IoAs:
o IoC: Successful attack evidence.
o IoA: Intrusion attempt evidence.
343
Malicious Activity Indicators
Summary: Malicious activity indicators help identify the presence of malware. These indicators can
be obvious, like changes in browser settings, or subtle, requiring detailed analysis of system
behavior.
Detailed Explanation:
• Sandbox Execution:
o Definition: Isolated environment to analyze suspect code or hosts.
o Function: Records file system, registry changes, and network activity.
o Sheep Dip: Isolated host for testing new software and removable media.
• Resource Consumption:
o Indicators: Excessive CPU usage, memory leaks, disk activity, network bandwidth
consumption.
o Investigation: High resource consumption can indicate malware but may also be
due to other issues.
o Examples: Botnet DDoS, cryptojacking, crypto-ransomware.
• File System:
o Interaction: Malware may interact with the file system and registry.
o Metadata Analysis: Check file creation, access, modification times.
o Blocked Content Indicators: Access denied messages, DLP system logs.
• Resource Inaccessibility:
o Definition: Network, host, file, or database is unavailable.
o Indicators: Denial of Service (DoS) attacks, ransomware, disabled scanning utilities.
• Account Compromise:
o Indicators:
▪ Account Lockout: Too many failed authentication attempts.
▪ Concurrent Session Usage: Multiple logins from different locations.
▪ Impossible Travel: Logins from geographically impossible locations.
• Logging:
o Indicators:
▪ Missing Logs: Deleted log files.
▪ Unusual Gaps: Gaps between log entry times.
▪ Out-of-Cycle Logging: Manipulated timestamps.
344
Key Points:
• Sandbox Execution:
o Isolated Analysis: Records changes and activity.
o Sheep Dip: Tests new software/media.
• Resource Consumption:
o Indicators: High CPU, memory, disk, network usage.
o Examples: Botnet DDoS, cryptojacking.
• File System:
o Interaction: Malware behavior in file system and registry.
o Metadata: Analyze file times, check for suspicious files.
• Resource Inaccessibility:
o Indicators: DoS attacks, ransomware.
• Account Compromise:
o Indicators: Account lockout, concurrent sessions, impossible travel.
• Logging:
o Indicators: Missing logs, unusual gaps, manipulated timestamps.
345
▪ Cutting network cables.
▪ Disrupting cooling systems.
o Vectors: Environmental and building maintenance systems.
• RFID Cloning:
o Technology: Encodes information into passive tags read by electromagnetic waves.
o Card Cloning:
▪ Duplicating existing cards without cryptographic protections.
▪ Indicators: Use of a card in suspicious locations or times.
o Skimming:
▪ Using counterfeit readers to capture card details.
▪ Indicators: Suspicious access patterns, impossible travel.
• Near-Field Communication (NFC):
o Derived from RFID: Used for contactless cards.
o Range: Works at very close range, allows two-way communication.
Key Points:
• Brute Force Attacks:
o Examples: Smashing hardware, forcing locks.
o Indicators: Visible signs of tampering.
• Environmental Attacks:
o Examples: Destroying power lines, cutting cables.
o Vectors: Maintenance systems.
• RFID Cloning:
o Card Cloning: Duplicating cards, suspicious usage.
o Skimming: Counterfeit readers, suspicious access patterns.
• NFC:
o Derived from RFID: Close-range communication.
Network Attacks
Summary: Network attacks involve various strategies and techniques used by threat actors to
disrupt or gain access to systems via network vectors. These attacks are analyzed within the context
of the cyberattack lifecycle.
Detailed Explanation:
346
• Reconnaissance:
o Host Discovery: Identifies active IP addresses.
o Service Discovery: Identifies open TCP/UDP ports.
o Fingerprinting: Identifies application types, versions, OS, and device types.
o Detection: Rapid scanning generates detectable network traffic.
• Credential Harvesting:
o Definition: Attempts to learn passwords or cryptographic secrets.
o Purpose: To gain authenticated access to network systems.
• Denial of Service (DoS):
o Definition: Causes hosts and services to become unavailable.
o Detection: Monitoring tools report non-responsive hosts or high request volumes.
o Purpose: Can be an end goal or facilitate other attacks.
• Weaponization, Delivery, and Breach:
o Definition: Techniques to gain access without authentication.
o Methods: Malicious code directed at vulnerable hosts or tricking users into running
code.
• Command and Control (C2), Beaconing, and Persistence:
o Definition: Techniques to operate and maintain access to compromised hosts.
o Detection: Identifying anomalous connection endpoints and unauthorized startup
items.
• Lateral Movement, Pivoting, and Privilege Escalation:
o Definition: Techniques to move within a network and gain higher permissions.
o Detection: Anomalous account logins and privilege use, often detected by machine
learning.
• Data Exfiltration:
o Definition: Copying information assets to the attacker's remote machine.
o Detection: Anomalous large data transfers or small, stealthy data movements.
Key Points:
• Reconnaissance:
o Host Discovery: Active IP addresses.
o Service Discovery: Open ports.
o Fingerprinting: Application and OS identification.
347
• Credential Harvesting:
o Purpose: Gain authenticated access.
• Denial of Service (DoS):
o Purpose: Unavailability of hosts/services.
o Detection: Non-responsive hosts, high request volumes.
• Weaponization, Delivery, and Breach:
o Methods: Malicious code, user trickery.
• Command and Control (C2), Beaconing, and Persistence:
o Detection: Anomalous connections, unauthorized startups.
• Lateral Movement, Pivoting, and Privilege Escalation:
o Detection: Anomalous logins, privilege use.
• Data Exfiltration:
o Detection: Large or stealthy data transfers.
348
• SYN Flood Attack:
o Mechanism: Withholds client's ACK packet during TCP handshake.
o Effect: Fills server's state table with pending connections, preventing genuine
traffic.
• Reflected Attacks:
o Definition: Spoofs victim's IP address to direct responses from third-party servers
to the victim.
o Effect: Consumes victim's bandwidth.
o Asymmetric Threat: Effective attacks with fewer resources than the victim.
• Amplified Attacks:
o Definition: Targets weaknesses in application protocols to increase attack
effectiveness.
o Protocols: DNS, NTP, CLDAP, memcached.
o Mechanism: Manipulates requests to force large data responses.
• DDoS Indicators:
o Traffic Spikes: Unexplained increases in traffic.
o Mitigation: High availability services (load balancing, cluster services), stateful
firewalls.
o Challenges: Randomly spoofed source addresses, bot-launched attacks.
Key Points:
• DoS:
o Definition: Reduces resource availability.
o Targets: Hardware, infrastructure, CPU, memory, bandwidth.
• DDoS:
o Definition: Multiple hosts, botnets.
o Types: Bandwidth consumption, resource exhaustion.
• SYN Flood Attack:
o Mechanism: Withholds ACK packet, fills state table.
• Reflected Attacks:
o Definition: Spoofs IP, directs responses to victim.
o Effect: Consumes bandwidth.
• Amplified Attacks:
349
o Definition: Exploits protocol weaknesses.
o Protocols: DNS, NTP, CLDAP, memcached.
• DDoS Indicators:
o Traffic Spikes: Unexplained increases.
o Mitigation: Load balancing, firewalls.
o Challenges: Spoofed addresses, bot attacks.
On-Path Attacks
Summary: An on-path attack, also known as an adversary-in-the-middle (AitM) attack, involves a
threat actor positioning themselves between two hosts to capture, monitor, and relay
communications. This attack can also modify traffic covertly.
Detailed Explanation:
• Mechanism:
o Positioning: Threat actor intercepts communication between two hosts.
o Relaying: Captures and relays communication, making detection difficult.
o Modification: Can present spoofed forms to capture credentials.
• Network Layers:
o Layer 2 Example: ARP poisoning attack.
▪ ARP (Address Resolution Protocol): Identifies MAC addresses for IPv4
addresses.
▪ ARP Poisoning: Uses unsolicited ARP replies to update MAC:IP address
cache with spoofed addresses.
• ARP Poisoning Attack Example:
o Attack Pattern:
▪ Gratuitous ARP Replies: Attacker sends unsolicited ARP replies to hosts.
▪ Spoofed Addresses: Hosts update their cache with the attacker's MAC
address.
o Packet Capture:
▪ Frames 6-8: Attacker sends ARP replies claiming to have certain IP
addresses.
▪ Frame 9: Host tries to send a packet, received by the attacker.
▪ Frame 10: Attacker retransmits the packet to the actual host.
▪ Frames 11-12: Reply from the actual host is received and retransmitted by
the attacker.
350
• Target:
o Default Gateway: Common target for ARP poisoning to intercept all traffic destined
for remote networks.
Key Points:
• Mechanism:
o Positioning: Between two hosts.
o Relaying: Captures and relays communication.
o Modification: Spoofed forms for credential capture.
• Network Layers:
o Layer 2 Example: ARP poisoning.
▪ ARP: Identifies MAC addresses.
▪ Poisoning: Spoofed ARP replies.
• ARP Poisoning Attack Example:
o Gratuitous ARP Replies: Sent by attacker.
o Spoofed Addresses: Hosts update cache.
o Packet Capture: Shows attack pattern.
• Target:
o Default Gateway: Intercepts remote network traffic.
351
• Types of DNS Poisoning:
o DNS-Based On-Path Attacks:
▪ Mechanism: Uses ARP poisoning to respond with spoofed DNS replies.
▪ Combination: May include DoS attacks on legitimate DNS servers.
▪ Rogue DHCP: Configures clients with a threat actor-controlled DNS resolver.
o DNS Client Cache Poisoning:
▪ Mechanism: Modifies the HOSTS file to redirect traffic.
▪ Location: HOSTS file in UNIX/Linux (/etc/hosts) and Windows
(%SystemRoot%\System32\Drivers\etc\hosts).
▪ Indicator: Presence of suspect entries in the HOSTS file.
o DNS Server Cache Poisoning:
▪ Mechanism: Corrupts DNS server records through DoS attacks and spoofed
replies.
▪ Recursive Queries: Attacker's DNS masquerades as authoritative server,
inserting false records.
▪ Tools: nslookup or dig to query and discover false records.
• DNS Attack Indicators:
o Event Logs: Logs of DNS requests and responses.
o Suspicious Communication: Hosts communicating with suspicious IP ranges or
domains.
o Statistical Anomalies: Spikes or large numbers of DNS lookup failures.
o C&C Implementation: DNS used for command & control of remote access Trojans.
o Data Exfiltration: Covert data transfer from private networks.
Key Points:
• Public Network Attacks:
o Typosquatting: Confuses users.
o DRDoS: Uses DNS in DoS attacks.
o DoS Attacks: Targets DNS services.
o DNS Hijacking: Redirects traffic.
• Private Network Attacks:
o DNS Poisoning: Compromises name resolution.
• Types of DNS Poisoning:
352
o On-Path Attacks: ARP poisoning, rogue DHCP.
o Client Cache Poisoning: Modifies HOSTS file.
o Server Cache Poisoning: Corrupts server records.
• DNS Attack Indicators:
o Event Logs: DNS request logs.
o Suspicious Communication: With suspicious IPs/domains.
o Anomalies: Lookup failures.
o C&C Implementation: For remote access Trojans.
o Data Exfiltration: Covert transfers.
Wireless Attacks
Summary: Wireless networks face unique security challenges and are common targets for various
attacks, including rogue access points, wireless denial of service (DoS) attacks, and replay attacks
aimed at key recovery.
Detailed Explanation:
• Rogue Access Points:
o Definition: Unauthorized access points installed on the network.
o Evil Twin: A rogue access point masquerading as a legitimate one.
▪ Techniques: Typosquatting, SSID stripping, DoS to overcome legitimate
access points.
▪ BSSID Spoofing: Spoofs the MAC address of the access point's radio.
▪ Detection: Physical inspections, Wi-Fi analyzers, wireless intrusion
protection systems.
• Wireless Denial of Service (DoS):
o Definition: Prevents clients from connecting to legitimate access points.
o Interference: Can be unintentional or intentional (jamming with a stronger signal).
o Disassociation Attacks:
▪ Mechanism: Exploits lack of encryption in management frames to send
spoofed frames.
▪ Effects: Disconnects clients from the network.
▪ Variants: Single victim disassociation, broadcast disassociation.
▪ Combination: May be used with replay attacks to recover network keys.
• Wireless Replay and Key Recovery:
353
o Definition: Captures hashes used in wireless authentication to crack them offline.
o KRACK Attack:
▪ Mechanism: Targets WPA and WPA2 4-way handshake.
▪ Effectiveness: Works on both personal and enterprise authentication
mechanisms.
▪ Mitigation: Ensure clients and access points are fully patched.
Key Points:
• Rogue Access Points:
o Unauthorized: Installed without permission.
o Evil Twin: Masquerades as legitimate.
o Detection: Physical inspections, Wi-Fi analyzers.
• Wireless DoS:
o Interference: Disrupts legitimate connections.
o Disassociation Attacks: Spoofed frames to disconnect clients.
• Wireless Replay and Key Recovery:
o Replay Attacks: Capture and crack authentication hashes.
o KRACK Attack: Targets WPA/WPA2 handshake.
o Mitigation: Patch clients and access points.
Password Attacks
Summary: Password attacks exploit weaknesses in password selection and management to recover
plaintext passwords and compromise accounts. These attacks can be online, where the attacker
interacts directly with the authentication service, or offline, where the attacker works with a
database of password hashes.
Detailed Explanation:
• Online Attacks:
o Definition: Attacker interacts directly with the authentication service (e.g., web
login, VPN gateway).
o Indicators: Repeated failed logins followed by a successful login, or logins at
unusual times/locations.
o Mitigation: Use strong passwords, restrict login attempts, block known bad IP
addresses.
o Vulnerability: Can lead to denial of service attacks by locking out valid users.
• Offline Attacks:
354
o Definition: Attacker obtains a database of password hashes (e.g., SAM, NTDS.DIT,
/etc/shadow).
o Indicators: File system audit logs showing access to password files, presence of
attack tools.
o Methods: Packet sniffers to capture client responses, exploiting protocol
weaknesses.
• Brute Force Attacks:
o Definition: Attempts every possible combination to match a captured hash.
o Output Space: Determined by the algorithm's bit size (e.g., 128-bit MD5, 256-bit
SHA256).
o Constraints: Time and computing resources, effective for short passwords.
o Distributed Attacks: Use multiple hardware components to crack longer
passwords.
• Dictionary and Hybrid Attacks:
o Dictionary Attack: Uses a dictionary of likely plaintexts to generate hash values and
match them.
o Hybrid Attack: Combines dictionary and brute force attacks, targeting naive
passwords with limited variations.
• Password Spraying:
o Definition: Horizontal brute force attack using common passwords with multiple
usernames.
o Examples: Using passwords like "password" or "123456" across many accounts.
Key Points:
• Online Attacks:
o Direct Interaction: With authentication service.
o Indicators: Failed logins, unusual login times.
o Mitigation: Strong passwords, restrict attempts.
• Offline Attacks:
o Database Access: Password hashes.
o Indicators: Access logs, attack tools.
o Methods: Packet sniffers, protocol weaknesses.
• Brute Force Attacks:
o Combination Attempts: Match captured hash.
o Constraints: Time, resources.
355
o Distributed: Multiple hardware components.
• Dictionary and Hybrid Attacks:
o Dictionary: Likely plaintexts.
o Hybrid: Dictionary + brute force.
• Password Spraying:
o Common Passwords: Across multiple usernames.
356
o Detection Systems: Correlate security log events, detect malware code.
Key Points:
• Initial Foothold:
o Compromise: Single workstation.
o Objective: Data assets, lateral movement, privilege escalation.
• Target:
o Windows AD Networks: Primary target.
o Web Applications: Also targeted.
• Cached Secrets:
o LSASS: Memory and SAM registry.
o Secrets: Kerberos TGT, service tickets, NT hash.
• Credential Replay Mechanisms:
o PtH: Uses NT hash.
o Golden Ticket: Forges TGT.
o Silver Ticket: Forges service tickets.
• Mitigations:
o Credential Guard: Protects secrets.
o Patching: Secure hosts.
o Detection Systems: Correlate logs, detect malware.
Cryptographic Attacks
Summary: Cryptographic attacks exploit weaknesses in cryptographic systems to compromise
authentication and data integrity. Common types include downgrade attacks, collision attacks, and
birthday attacks.
Detailed Explanation:
• Downgrade Attacks:
o Definition: Forces a server or client to use a weaker protocol with weaker ciphers
and key lengths.
o Example: Forcing the use of weak TLS or SSL versions.
o Kerberoasting: Targets Active Directory by obtaining service tickets and subjecting
them to brute force attacks. Weaker encryption (e.g., RC4) makes it easier to crack
passwords.
o Detection: Found in server logs or by intrusion detection systems.
357
• Collision Attacks:
o Definition: Exploits weak cryptographic hashing functions to generate the same
hash for different plaintexts.
o Mechanism:
▪ Create a malicious and a benign document with the same hash.
▪ Submit the benign document for signing.
▪ Transfer the signature to the malicious document.
o Uses: Forging digital certificates, spoofing trusted websites, or making malware
appear legitimate.
• Birthday Attacks:
o Definition: Exploits collisions in hash functions through brute force.
o Birthday Paradox: Shows that the probability of two items sharing the same hash is
higher than expected.
o Mechanism:
▪ Create multiple variations of malicious and benign documents.
▪ Match hash outputs to exploit collisions.
o Effectiveness: A hash function with 128-bit hashes can be attacked by generating
(2^{64}) variations, which is computationally feasible.
Key Points:
• Downgrade Attacks:
o Weaker Protocols: Forces use of weak ciphers.
o Kerberoasting: Targets service account passwords.
o Detection: Server logs, intrusion detection.
• Collision Attacks:
o Weak Hash Functions: Generate same hash for different plaintexts.
o Mechanism: Malicious and benign document matching.
o Uses: Forging certificates, spoofing websites.
• Birthday Attacks:
o Exploits Collisions: Through brute force.
o Birthday Paradox: Higher probability of hash collisions.
o Mechanism: Multiple document variations.
358
Malicious Code Indicators
Summary: Malicious code can compromise hosts and launch network attacks. Indicators of such
code execution are detected by endpoint protection software or discovered in logs showing how the
malware interacted with the network, file system, and registry.
Detailed Explanation:
• Shellcode:
o Definition: Minimal program exploiting OS or app vulnerabilities to gain privileges
or drop a backdoor.
o Follow-up: Network connection to download additional tools.
• Credential Dumping:
o Definition: Malware accessing credentials file (e.g., SAM) or sniffing credentials in
memory (e.g., lsass.exe).
o DCSync Attack: Tricks domain controller into replicating user list and credentials to
a rogue host.
• Pivoting/Lateral Movement/Insider Attack:
o Definition: Using a foothold to execute processes remotely (e.g., PsExec,
PowerShell).
o Objectives: Seeking data assets or widening access by changing security
configurations (e.g., opening firewall ports, creating accounts).
o Detection: Commands may blend with ordinary operations but could be anomalous
for the compromised account.
• Persistence:
o Definition: Mechanisms allowing backdoor to restart after reboot or user logoff.
o Methods: Using AutoRun keys in the registry, adding scheduled tasks, or using WMI
event subscriptions.
Key Points:
• Shellcode:
o Exploits Vulnerabilities: Gains privileges or drops backdoors.
o Follow-up: Downloads additional tools.
• Credential Dumping:
o Accesses Credentials: From files or memory.
o DCSync Attack: Replicates user list and credentials.
• Pivoting/Lateral Movement/Insider Attack:
o Remote Execution: Using tools like PsExec, PowerShell.
359
o Objectives: Data assets, security configuration changes.
o Detection: Anomalous commands.
• Persistence:
o Restarts Backdoor: After reboot or logoff.
o Methods: AutoRun keys, scheduled tasks, WMI subscriptions.
360
o Detection: Process logging, audit logs, incident response, and endpoint protection
alerts.
• Buffer Overflow:
o Definition: Exploiting a buffer to overwrite data and execute arbitrary code.
o Common Vulnerability: Stack overflow, changing the return address.
o Mitigations: Address Space Layout Randomization (ASLR), Data Execution
Prevention (DEP).
o Indicators: Frequent process crashes and anomalies.
Key Points:
• Types of Application Attacks:
o OS/Third-Party Apps: Trojans, malicious attachments, browser vulnerabilities.
o Web Applications: Exploiting web vulnerabilities.
• Indicators:
o Crashes/Errors: Increased numbers.
o Logs: System or application-specific.
o Resource Utilization: Anomalous usage.
• Privilege Escalation:
o Arbitrary Code Execution: Unauthorized code.
o Vertical: Higher privileges.
o Horizontal: Another user's data.
o Detection: Logs, alerts.
• Buffer Overflow:
o Exploitation: Overwriting data.
o Common Vulnerability: Stack overflow.
o Mitigations: ASLR, DEP.
o Indicators: Process crashes.
Replay Attacks
Summary: Replay attacks exploit cookie-based sessions in web applications by capturing or
guessing session tokens and using them to reestablish sessions illegitimately. These attacks can be
facilitated by on-path attacks, unsecured networks, malware, or cross-site scripting (XSS).
Detailed Explanation:
361
• HTTP and Cookies:
o Stateless Protocol: HTTP does not preserve client information.
o Cookies: Used to maintain stateful data, created by the server and sent in HTTP
response headers.
o Types of Cookies:
▪ Nonpersistent: Stored in memory, deleted when the browser closes.
▪ Persistent: Stored in the browser cache, deleted by the user or upon
expiration.
• Session Management:
o Session Tokens: Identify users and prove authentication across multiple actions
and requests.
o Replay Attack Mechanism: Capturing or guessing session tokens to reestablish
sessions.
• Methods of Capturing Cookies:
o On-Path Attacks: Sniffing network traffic.
o Unsecured Networks: Public Wi-Fi hotspots.
o Malware: Infecting the host to capture cookies.
o Cross-Site Scripting (XSS): Running malicious code in a trusted site or application
context.
• Session Prediction Attacks:
o Focus: Identifying weaknesses in token generation algorithms.
o Requirements: Non-predictable algorithms, no revealing information about the
session client.
o Session Management: Limit session lifespan, require reauthentication periodically.
Key Points:
• HTTP and Cookies:
o Stateless Protocol: No client information preservation.
o Cookies: Maintain stateful data.
o Types: Nonpersistent, persistent.
• Session Management:
o Session Tokens: Identify and authenticate users.
o Replay Attack: Capturing or guessing tokens.
• Capturing Cookies:
362
o On-Path Attacks: Network sniffing.
o Unsecured Networks: Public Wi-Fi.
o Malware: Host infection.
o XSS: Malicious code in trusted context.
• Session Prediction Attacks:
o Weaknesses: Token generation algorithms.
o Requirements: Non-predictable, no revealing information.
o Management: Limit lifespan, reauthentication.
Forgery Attacks
Summary: Forgery attacks hijack authenticated sessions to perform actions without the user's
consent. Common types include Cross-Site Request Forgery (CSRF) and Server-Side Request
Forgery (SSRF).
Detailed Explanation:
• Cross-Site Request Forgery (CSRF):
o Mechanism: Exploits applications using cookies for authentication and session
tracking.
o Process:
▪ Attacker convinces the victim to start a session with the target site.
▪ Attacker sends an HTTP request to the victim's browser to spoof an action
on the target site (e.g., changing a password).
▪ The target site accepts the request if it assumes the browser is
authenticated.
o Confused Deputy Attack: Another term for CSRF, where the site is tricked into
performing actions on behalf of the attacker.
• Server-Side Request Forgery (SSRF):
o Mechanism: Causes a server application to process arbitrary requests targeting
another service.
o Process:
▪ Exploits lack of authentication between internal servers and weak input
validation.
▪ Targets cloud infrastructure with multiple layers of servers (client interface,
middleware, database).
▪ Public server executes requests on internal servers with its privilege level.
363
Key Points:
• CSRF:
o Exploits Cookies: For authentication and session tracking.
o Process: Victim starts session, attacker sends spoofed request.
o Confused Deputy Attack: Site performs actions on behalf of the attacker.
• SSRF:
o Targets Servers: Processes arbitrary requests.
o Exploits: Lack of internal authentication, weak input validation.
o Cloud Infrastructure: Multiple server layers, public server executes internal
requests.
Injection Attacks
Summary: Injection attacks exploit vulnerabilities in the way applications process requests and
queries, allowing unauthorized actions. These attacks can target both client-side and server-side
applications.
Detailed Explanation:
• Client-Side vs. Server-Side Attacks:
o Client-Side Attacks: Execute arbitrary code on the browser (e.g., session replay,
CSRF, XSS).
o Server-Side Attacks: Cause the server to process unauthorized scripts or queries.
• Injection Attacks:
o Mechanism: Exploits insecure processing of requests and queries.
o Example: An application allowing a user to view their profile might be manipulated
to return or modify records for all users.
• Types of Injection Attacks:
o Persistent XSS: Injects malicious scripts into web pages viewed by other users.
o SQL Injection: Manipulates SQL queries to access or modify database information.
• Extensible Markup Language (XML) Injection:
o Usage: XML is used for authentication, authorization, and data exchange.
o Vulnerability: Data submitted via XML without encryption or input validation.
o Example: XML External Entity (XXE) attack embeds a request for a local resource.
o Code Example:
▪ <?xml version="1.0" encoding="UTF-8"?>
364
▪ <!DOCTYPE foo [<!ELEMENT foo ANY >
▪ <!ENTITY bar SYSTEM "file:///etc/config"> ]>
▪ <bar>&bar;</bar>
o Effect: Returns the contents of /etc/config as part of the response.
• Lightweight Directory Access Protocol (LDAP) Injection:
o Usage: LDAP is used to read and write network directory databases.
o Vulnerability: Unauthenticated access or client app vulnerabilities.
o Mechanism: Submitting arbitrary LDAP queries to create/delete accounts or change
authorizations.
o Example:
▪ Valid Query: (&(username=Bob)(password=Pa$w0rd))
▪ Injection: bob)(&)) bypasses the password check.
▪ Resulting Query: (&(username=Bob)(&))
Key Points:
• Client-Side vs. Server-Side:
o Client-Side: Browser-based code execution.
o Server-Side: Unauthorized server processing.
• Injection Attacks:
o Mechanism: Insecure request/query processing.
o Example: Manipulating user profile queries.
• Types:
o Persistent XSS: Malicious scripts in web pages.
o SQL Injection: Manipulates SQL queries.
• XML Injection:
o Usage: Authentication, data exchange.
o Vulnerability: Unencrypted, unvalidated data.
o Example: XXE attack.
• LDAP Injection:
o Usage: Network directory databases.
o Vulnerability: Unauthenticated access, client app flaws.
o Example: Bypassing password checks.
365
Directory Traversal and Command Injection Attacks
Summary: Directory traversal and command injection attacks exploit vulnerabilities in web servers
to access unauthorized files or execute OS commands. These attacks can bypass input validation
and security measures if not properly configured.
Detailed Explanation:
• Directory Traversal:
o Mechanism: Submits a request to access files outside the web server's root
directory using paths like ../.
o Canonicalization Attack: Disguises malicious input by encoding characters.
o Example:
▪ Direct Path: http://victim.foo/?show=../../../../etc/config
▪ Encoded Path:
http://victim.foo/?show=%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e
%2fetc/config
o Vulnerability: Insufficient input filtering and improper access permissions.
• Command Injection:
o Mechanism: Causes the server to run OS shell commands and return the output to
the browser.
o Security Measures: Web server should prevent commands from operating outside
the server's directory root and restrict privileges to the "guest" user.
o Vulnerability: Circumventing security measures or exploiting misconfigured web
servers.
Key Points:
• Directory Traversal:
o Mechanism: Access files outside root directory.
o Canonicalization: Encodes characters to bypass validation.
o Example: Direct and encoded paths.
o Vulnerability: Input filtering, access permissions.
• Command Injection:
o Mechanism: Run OS shell commands.
o Security Measures: Prevent commands outside root, restrict privileges.
o Vulnerability: Circumventing security, misconfiguration.
366
URL Analysis
Summary: URL analysis is crucial for detecting session hijacking, replay, forgery, and injection
attacks. It involves examining the structure and content of URLs to identify potential malicious
activity.
Detailed Explanation:
• Uniform Resource Locator (URL):
o Function: Points to the host or service location on the Internet and can encode
actions or data.
o HTTP Operation:
o Client Request: Made by a user-agent (e.g., web browser) to an HTTP server.
o TCP Connection: Used for multiple requests or new connections for different
requests.
o Request Components: Method, resource (URL path), version number, headers,
body.
o Principal Methods:
▪ GET: Retrieve a resource.
▪ POST: Send data for processing.
▪ PUT: Create or replace a resource.
o Data Submission: Via POST/PUT methods or encoded within the URL.
o Query Parameters: Formatted as name=value pairs, delimited by ampersands.
• Server Response:
o Components: Version number, status code, message, optional headers, message
body.
o HTTP Response Codes: Examples include 200 (OK) and 404 (Not Found).
• Percent Encoding:
o Purpose: Allows submission of any character (safe or unsafe) within the URL.
o Reserved Characters: Used as delimiters within URL syntax.
o Examples: : / ? # [ ] @ ! $ & ' ( ) * + , ; =
o Unsafe Characters: Control characters like null string termination, carriage return,
line feed, end of file, tab.
o Legitimate Uses: Encoding reserved characters and submitting Unicode characters.
o Misuse: Obfuscating URLs and submitting malicious input.
Key Points:
• URL Function:
367
o Host/Service Location: Encodes actions or data.
o HTTP Operation: Client requests, TCP connections, request components.
o Methods: GET, POST, PUT.
o Data Submission: POST/PUT methods, URL encoding.
o Query Parameters: Name=value pairs.
• Server Response:
o Components: Version number, status code, message.
o Response Codes: 200 (OK), 404 (Not Found).
• Percent Encoding:
o Purpose: Submit any character within URL.
o Reserved Characters: Delimiters in URL syntax.
o Unsafe Characters: Control characters.
o Legitimate Uses: Encoding reserved characters, Unicode.
o Misuse: Obfuscating URLs, malicious input.
368
o Details: Provides insights into the makeup of each request or response, such as
cookie information.
Key Points:
• Logging Configuration:
o Purpose: Capture HTTP traffic with errors or specific rules.
o Indicators: Evidence of attacks.
• Status Codes:
o 400 Range: Client errors (e.g., 403 - Forbidden).
o 500 Range: Server errors (e.g., 502 - Bad Gateway).
• HTTP Header Information:
o Requests and Responses: Detailed logs.
o Details: Insights into requests and responses.
369
o Purpose: Maintain compliance with relevant laws to protect customer data.
o Details: Data collection, storage, processing, and sharing practices, including
employee responsibilities.
Key Points:
• Governance and Policies:
o Purpose: Direct and control organization.
o Outputs: Rules for decision-making and risk mitigation.
• Compliance:
o Definition: Adherence to relevant regulations and standards.
o Role of Policies: Ensure daily operations meet legal requirements.
370
o Details: Identifying, investigating, controlling, and mitigating incidents, and
communication procedures.
• Software Development Life Cycle (SDLC):
o Purpose: Govern software development within the organization.
o Details: Structured plan from requirement analysis to maintenance, ensuring
efficiency, reliability, and security.
• Change Management:
o Purpose: Outline how changes to IT systems and software are managed.
o Details: Request, review, approval, implementation, and documentation
requirements.
Key Points:
• Acceptable Use Policy (AUP):
o Purpose: Define acceptable behavior.
o Details: Browsing, content, downloads, sensitive information, and consequences.
• Information Security Policies:
o Purpose: Ensure information security compliance.
o Details: Security within the organization's environment.
• Business Continuity & COOP:
o Purpose: Maintain critical processes during disruptions.
o Details: Natural disasters, cyber-attacks.
• Disaster Recovery:
o Purpose: Recover from catastrophic events.
o Details: Restore operations quickly.
• Incident Response:
o Purpose: Processes after security breaches.
o Details: Identify, investigate, control, mitigate, and communicate.
• Software Development Life Cycle (SDLC):
o Purpose: Govern software development.
o Details: Structured plan from analysis to maintenance.
• Change Management:
o Purpose: Manage changes to IT systems.
o Details: Request, review, approval, implementation, documentation.
371
Guidelines
Summary: Guidelines provide recommendations that steer actions in specific job roles or
departments. They are more flexible than policies and allow greater discretion for individuals
implementing them. Guidelines offer best practices and suggestions for achieving goals and
completing tasks effectively.
Detailed Explanation:
• Purpose:
o Recommendations: Steer actions in specific roles or departments.
o Flexibility: Allow discretion for individuals.
• Example: Help Desk Support Practices:
o Purpose: Recommend language, tone, and response times for email support.
o Details: Flexibility depending on request circumstances.
Key Points:
• Purpose:
o Recommendations: Steer actions.
o Flexibility: Allow discretion.
• Example: Help Desk Support Practices:
o Purpose: Recommend practices for email support.
o Details: Language, tone, response times, flexibility.
Procedures
Summary: Procedures provide step-by-step instructions and checklists to ensure tasks are
completed in compliance with policies. They are essential for maintaining consistency and
adherence to organizational standards.
Detailed Explanation:
• Purpose:
o Framework: Define specific steps to comply with policies.
o Consistency: Ensure tasks are performed uniformly.
Personnel Management
Summary: Personnel management involves identity and access management (IAM) and HR
policies, applied during recruitment, operation, and termination phases. It ensures security and
compliance throughout an employee's lifecycle.
372
Detailed Explanation:
• Recruitment (Hiring):
o Security Issues: Screening candidates and performing background checks.
• Operation (Working):
o Policy Communication: HR manages policy communication and training.
o Training Programs: Emphasize the importance of security.
• Termination (Separation):
o Process: Manage voluntary or involuntary departures with security considerations.
Key Points:
• Recruitment:
o Screening: Background checks.
• Operation:
o Policy Communication: HR's role.
o Training: Security importance.
• Termination:
o Security: Manage departures securely.
Background Checks
Summary: Background checks verify a person's identity and suitability for a role, especially in high-
security environments. They can be performed internally or by external third parties.
Detailed Explanation:
• Purpose:
o Verification: Ensure no concealed criminal activity or unsuitable connections.
o High-Security Roles: Greater scrutiny required.
Key Points:
• Verification: Identity and suitability.
• High-Security: Greater scrutiny.
Onboarding
Summary: Onboarding integrates new employees into the organization, involving HR and IT to
create user accounts, assign privileges, and ensure secure credential transmission.
Detailed Explanation:
373
• Process:
o Account Creation: IT and HR collaboration.
o Secure Credentials: Protect against rogue staff.
o Asset Allocation: Provision devices or agree on BYOD.
o Training: Schedule security awareness training.
Key Points:
• Account Creation: IT and HR roles.
• Secure Credentials: Initial password security.
• Asset Allocation: Device provisioning.
• Training: Security awareness.
Playbooks
Summary: Playbooks standardize procedures, ensuring consistency and quality in operations. They
are crucial for knowledge sharing, risk mitigation, and incident response.
Detailed Explanation:
• Purpose:
o Standardization: Consistent operations.
o Knowledge Sharing: Preserve institutional knowledge.
o Risk Mitigation: Document critical procedures.
o Incident Response: Guide emergency actions.
Key Points:
• Standardization: Consistent procedures.
• Knowledge Sharing: Institutional knowledge.
• Risk Mitigation: Critical procedures.
• Incident Response: Emergency actions.
Change Management
Summary: Change management involves planning, trialing, and implementing changes with
rollback plans to minimize negative impacts. It includes scheduling changes to avoid workflow
disruptions.
Detailed Explanation:
• Process:
374
o Planning: Consider dependent components.
o Trialing: Test significant changes.
o Rollback Plans: Reverse harmful changes.
o Scheduling: Avoid workflow disruptions.
Key Points:
• Planning: Consider dependencies.
• Trialing: Test changes.
• Rollback Plans: Reverse changes.
• Scheduling: Avoid disruptions.
Offboarding
Summary: Offboarding ensures a secure and graceful employee exit, including account
management, asset retrieval, and data wiping. It addresses security concerns for departing
employees.
Detailed Explanation:
• Process:
o Account Management: Disable accounts and privileges.
o Asset Retrieval: Collect company assets.
o Data Wiping: Remove corporate data from personal devices.
o Re-Securing Systems: Change shared credentials.
Key Points:
• Account Management: Disable accounts.
• Asset Retrieval: Collect assets.
• Data Wiping: Remove corporate data.
• Re-Securing Systems: Change credentials.
Standards
Summary: Standards define the expected outcomes of tasks, such as configuration states for
servers or performance baselines for services. They are selected based on regulatory requirements,
business needs, risk management strategies, industry practices, and stakeholder expectations.
Detailed Explanation:
• Regulatory Requirements:
375
o Primary Driver: Legal requirements and security, privacy, and data protection
regulations.
o Example: Healthcare providers in the US must comply with HIPAA standards.
• Business-Specific Needs:
o Example: Organizations handling credit card transactions adopt PCI DSS to
safeguard cardholder data.
• Risk Management Strategies:
o Purpose: Identify, evaluate, and manage risks.
o Example: ISO/IEC 27001 provides a framework for an information security
management system (ISMS).
• Industry Practices:
o Adherence: Demonstrates commitment to high security and data protection levels.
o Example: Cloud-reliant organizations adopt ISO/IEC 27017 and ISO/IEC 27018.
• Stakeholder Expectations:
o Influence: Stakeholders view adherence to standards as a commitment to quality,
security, and reliability.
Key Points:
• Regulatory Requirements: Legal and security regulations.
• Business Needs: Specific operational requirements.
• Risk Management: Managing security risks.
• Industry Practices: Best practices and standards.
• Stakeholder Expectations: Commitment to quality and security.
Industry Standards
Summary: Common industry standards include ISO/IEC 27001, ISO/IEC 27002, ISO/IEC 27017,
ISO/IEC 27018, NIST SP 800-63, PCI DSS, and FIPS. These standards provide benchmarks for
evaluating compliance and security practices.
Detailed Explanation:
• ISO/IEC 27001:
o Purpose: Framework for an ISMS.
• ISO/IEC 27002:
o Purpose: Guidance on specific controls for an ISMS.
• ISO/IEC 27017:
376
o Purpose: Specific to cloud services.
• ISO/IEC 27018:
o Purpose: Protecting PII in public clouds.
• NIST SP 800-63:
o Purpose: Digital identity guidelines.
• PCI DSS:
o Purpose: Protecting cardholder data.
• FIPS:
o Purpose: Cryptography standards for federal systems.
Key Points:
• ISO/IEC 27001: ISMS framework.
• ISO/IEC 27002: ISMS controls.
• ISO/IEC 27017: Cloud services.
• ISO/IEC 27018: PII protection.
• NIST SP 800-63: Digital identity.
• PCI DSS: Cardholder data protection.
• FIPS: Cryptography standards.
Internal Standards
Summary: Internal standards ensure the safety and integrity of operations, protecting data,
intellectual property, and hardware. They provide consistent descriptions for managing
organizational practices.
Detailed Explanation:
• Password Standards:
o Hashing Algorithms: Requirements for hash functions.
o Password Salting: Methods to protect password hashes.
o Secure Transmission: Methods for secure password transmission.
o Password Reset: Identity verification methods.
o Password Managers: Requirements for password managers.
• Access Control Standards:
o Models: Role-based, discretionary, and mandatory access control.
o Identity Verification: Methods to verify identities.
377
o Privilege Management: Managing user privileges.
o Authentication Protocols: Acceptable protocols like Kerberos, OAuth, or SAML.
o Session Management: Practices for session timeouts and secure cookies.
o Audit Trails: Mandatory audit capabilities.
• Physical Security Standards:
o Building Security: Card access, CCTV, security personnel.
o Workstation Security: Securing portable devices.
o Datacenter Security: Card access, biometric scans, visitor logs.
o Equipment Disposal: Secure disposal of equipment.
o Visitor Management: Sign-in procedures, badges, escorted access.
• Encryption Standards:
o Algorithms: Allowable encryption algorithms like AES and ECC.
o Key Length: Minimum key lengths.
o Key Management: Generation, distribution, storage, and changing of keys.
Key Points:
• Password Standards: Hashing, salting, transmission, reset, managers.
• Access Control: Models, verification, management, protocols, sessions, audits.
• Physical Security: Building, workstation, datacenter, disposal, visitor management.
• Encryption: Algorithms, key lengths, key management.
Legal Environment
Summary: Governance committees ensure organizations comply with cybersecurity laws and
regulations to avoid legal liability. They manage legal risks, interpret legal requirements, and
implement operational controls to protect the organization.
Detailed Explanation:
• Governance Committees:
o Role: Ensure compliance with laws and regulations.
o Legal Risks: Regulatory compliance, contractual obligations, public disclosure,
breach liability, privacy laws, intellectual property protection, licensing agreements.
• Due Diligence:
o Definition: Legal term indicating responsible persons have not been negligent.
378
o Legislation: Criminalizes negligence in information management (e.g., Sarbanes-
Oxley Act, Computer Security Act, FISMA).
• Frameworks and Benchmarks:
o Purpose: Demonstrate compliance with legal/regulatory requirements.
o Examples: NIST, ISO 27K.
Key Points:
• Governance Committees: Ensure compliance and manage legal risks.
• Due Diligence: Prevent negligence and legal liabilities.
• Frameworks: Demonstrate compliance.
Global Law
Summary: Global laws like GDPR and CCPA protect privacy and personal data across geopolitical
boundaries. They require informed consent for data collection and processing, and provide rights to
data subjects.
Detailed Explanation:
• GDPR:
o Purpose: Protect personal data and privacy.
o Requirements: Informed consent, rights to withdraw consent, inspect, amend, or
erase data.
o Penalties: Large fines for non-compliance.
• CCPA:
o Purpose: Protect California residents' personal information.
o Requirements: Inform consumers about data collection, purposes, and sharing.
Rights to access, delete, or opt out of data sale.
o Applicability: Organizations with gross annual revenues over $25 million, or
handling data of 50,000 or more consumers.
Key Points:
• GDPR: Protects personal data and privacy.
• CCPA: Protects California residents' personal information.
379
Detailed Explanation:
• National Laws:
o Examples: HIPAA, GLBA, FISMA (US); Data Protection Act 2018, NIS Regulations
2018 (UK); PIPEDA (Canada); Information Technology Act 2000 (India); Privacy Act
1988 (Australia).
• Local and Regional Laws:
o Examples: New York DFS Part 500 Cybersecurity Regulation, Massachusetts 201
CMR 17.00.
• Industry-Specific Laws:
o Healthcare: HIPAA, GDPR.
o Financial Services: GLBA, PCI DSS.
o Telecommunications: CALEA.
o Energy: NERC.
o Education & Children: FERPA, CIPA, COPPA.
o Government: FISMA, CJIS Security Policy, GSC.
Key Points:
• National Laws: Vary by country.
• Local and Regional Laws: Specific to states or cities.
• Industry-Specific Laws: Govern data handling and protection.
Cybersecurity Regulations
Summary: Cybersecurity regulations protect digital information and systems from cyber threats.
They set standards for data protection, network security, breach notifications, and digital identity
verification.
Detailed Explanation:
• Purpose:
o Protect Consumer Privacy: Ensure data confidentiality, integrity, and availability.
o Financial System Security: Maintain stability and trustworthiness.
o Critical Infrastructure Protection: Safeguard against cybercrime.
• Examples:
o GDPR: Data protection and privacy.
o CCPA: Consumer privacy rights.
o HIPAA: Health information security.
380
o FISMA: Federal data security.
o NIS Directive: Network and information systems security.
o CMMC: Cybersecurity maturity model certification.
Key Points:
• Purpose: Protect data and systems.
• Examples: GDPR, CCPA, HIPAA, FISMA, NIS Directive, CMMC.
381
Governance Boards
Summary: Governance boards set strategic objectives, policies, and guidelines for security practices
and risk management. They oversee security controls, ensure compliance, and evaluate the security
program's effectiveness.
Detailed Explanation:
• Role:
o Strategic Objectives: Set policies and guidelines.
o Oversight: Implement security controls and ensure compliance.
o Evaluation: Assess security program effectiveness.
Key Points:
• Strategic Objectives: Set policies.
• Oversight: Implement controls.
• Evaluation: Assess effectiveness.
382
• Centralized: Single decision-making group.
• Decentralized: Distributed decision-making.
• Hybrid: Combination of both.
383
o Role: Protect personal data and enforce data protection regulations.
• National Cybersecurity Agencies:
o Role: Protect critical infrastructure and coordinate incident response.
Key Points:
• Regulatory Agencies: Enforce standards.
• Intelligence Agencies: Counteract threats.
• Law Enforcement: Investigate crimes.
• Defense Organizations: National security.
• Data Protection: Safeguard personal data.
• Cybersecurity Agencies: Protect infrastructure.
384
Topic 14B: Change Management
Change Management Programs
Summary: Change management is a systematic approach to managing changes in an organization,
ensuring they are handled efficiently and effectively to minimize risks and avoid negative impacts
on security, service availability, or performance.
Detailed Explanation:
• Purpose:
o Systematic Approach: Manage changes to products or systems.
o Minimize Risks: Ensure changes do not negatively impact security or performance.
• Types of Changes:
o Software Deployments: Implementing new software.
o System Updates: Updating existing systems.
o Software Patching: Applying patches to fix vulnerabilities.
o Hardware Replacements/Upgrades: Updating hardware components.
o Network Modifications: Changing network configurations.
o System Configurations: Adjusting system settings.
o New Product Implementations: Introducing new products.
o New Software Integrations: Integrating new software.
o Support Environment Changes: Updating support systems.
• Change Management Process:
o Documentation: Details of changes, reasons, impacts, and rollback plans.
o Risk Assessment: Identify potential security impacts.
o Approval: Changes must be approved by appropriate personnel.
o Review and Audit: Ensure changes are completed correctly and securely.
Key Points:
• Systematic Approach: Manage changes efficiently.
• Minimize Risks: Avoid negative impacts.
• Types of Changes: Software, hardware, network, configurations.
• Process: Documentation, risk assessment, approval, review.
385
Summary: Change management requires expertise from various parts of an organization to oversee
and implement changes effectively. Stakeholder involvement is crucial for comprehensive review,
risk identification, and successful implementation.
Detailed Explanation:
• Expertise Required:
o IT Professionals: Technical knowledge.
o Business Leaders: Operational knowledge.
o Compliance Officers: Legal expertise.
• Stakeholder Involvement:
o Comprehensive Review: Identify non-obvious risks.
o Effective Implementation: Minimize risks and disruptions.
o Acceptance and Adoption: Promote ownership and responsibility.
• Ownership:
o Definition: Individuals or groups responsible for implementing changes.
o Responsibilities: Ensure changes are implemented as planned, manage risks, and
communicate effectively.
• Stakeholders:
o Definition: Individuals or groups impacted by the change.
o Engagement: Keep informed, understand concerns, address needs.
Key Points:
• Expertise: IT, business, compliance.
• Stakeholder Involvement: Review, implementation, acceptance.
• Ownership: Responsible for changes.
• Stakeholders: Impacted by changes.
386
• Test Results:
o Purpose: Evaluate changes in a test environment.
o Details: Ensure changes work as intended, identify potential issues.
• Backout Plans:
o Purpose: Contingency plans for reversing changes.
o Details: Minimize downtime, reduce risk of data loss.
• Maintenance Windows:
o Purpose: Predefined time frames for implementing changes.
o Details: Schedule during low activity to minimize disruptions.
• Standard Operating Procedures (SOPs):
o Purpose: Detailed instructions for routine operations or changes.
o Details: Ensure consistent and effective implementation.
Key Points:
• Impact Analysis: Assess implications.
• Test Results: Evaluate in test environment.
• Backout Plans: Contingency for reversal.
• Maintenance Windows: Scheduled changes.
• SOPs: Detailed instructions.
387
o Security Measure: Clearly identify off-limits changes.
o Examples: Software with known security issues, high-impact changes, unauthorized
individuals.
• Technical Controls:
o Access Controls: Manage who can make changes.
o Firewall Rules: Control network traffic.
o Software Restriction Mechanisms: Prevent unauthorized software execution.
• Impact on Change Implementation:
o Software Patching: Allow lists based on hash values may fail after patching.
o Testing Plan: Incorporate impacts of allow and block lists.
Key Points:
• Allow Lists: Approved changes, streamline processes, regular updates.
• Deny Lists: Blocked changes, prevent risks, security measure.
• Technical Controls: Access controls, firewall rules, software restrictions.
• Impact on Implementation: Consider allow/block list impacts in testing.
388
o Backout Plans: Develop effective plans to handle potential complications.
o Post-Change Monitoring: Validate system functionality and detect issues quickly.
o Alternative Solutions: Identify alternatives if risks are too high.
Key Points:
• Restarts and Downtime: Schedule to minimize impact.
• Dependencies: Analyze and manage impacts.
• Risk Management: Develop backout plans and monitor changes.
389
Detailed Explanation:
• Challenges:
o Outdated Technology: Compatibility issues with new software or security updates.
o Specialized Solutions: May require virtualization, emulation, or custom software to
ensure compatibility.
o Lack of Documentation: Extensive testing and meticulous implementation plans
needed.
o No Vendor Support: Increases risks associated with changes.
• Security Problems:
o Complexity: High complexity and poor documentation make management difficult.
o Business Criticality: Critical to operations but difficult to manage securely.
Key Points:
• Outdated Technology: Compatibility issues.
• Specialized Solutions: Ensure compatibility.
• Lack of Documentation: Extensive testing needed.
• No Vendor Support: Increases risks.
390
o Training: Major changes may require training for relevant teams.
Key Points:
• Version Control: Track changes, maintain records, ensure approved changes.
• Impact Assessment: Assess and update documents.
• Labeling and Archiving: Label new versions, archive old ones.
• Training: Provide training for major changes.
391
Key Points:
• Change Requests: Reflect change details and status.
• Policies and Procedures: Align with new processes.
• System Documentation: Update for changes.
• Configuration Management: Track configuration changes.
• Training Materials: Update for employee training.
• Incident Response Plans: Reflect revised configurations.
Summary: Automation and scripting are essential in modern IT operations, streamlining processes,
enhancing security, and improving efficiency. They help enforce security policies, reduce human
error, and provide clear audit trails.
Detailed Explanation:
• Governance:
o Enforcement: Automation helps enforce security policies consistently and
efficiently.
o Monitoring and Reporting: Provides valuable insights for leadership and risk
managers.
• Change Management:
o Error Reduction: Minimizes human error.
o Implementation Time: Reduces time needed for changes.
o Audit Trails: Tracks changes for later review.
Key Points:
• Governance: Enforce policies, monitor, and report.
• Change Management: Reduce errors, save time, track changes.
392
• Provisioning:
o User Provisioning: Creating, modifying, or deleting user accounts and access rights.
o Resource Provisioning: Allocating IT resources like servers, storage, and networks.
o Benefits: Reduces manual effort, minimizes errors, improves compliance.
• Guardrails and Security Groups:
o Guardrails: Monitor and enforce compliance with security policies.
o Security Groups: Define resource access, manage efficiently through automation.
• Ticketing:
o Automation: Generate support tickets automatically, route based on criteria.
o Escalation: Ensure critical issues receive immediate attention.
• Service Management:
o Routine Tasks: Automate enabling/disabling services, modifying access rights.
o Lifecycle Management: Maintain IT resources efficiently.
• Continuous Integration and Testing:
o Principles: Regularly merge changes, test automatically.
o Benefits: Improve code quality, accelerate development, reduce integration issues.
• Application Programming Interfaces (APIs):
o Communication: Enable software systems to interact.
o Orchestration: Create seamless workflows, develop complex systems like SOAR
platforms.
Key Points:
• Provisioning: User and resource management.
• Guardrails and Security Groups: Enforce policies, manage access.
• Ticketing: Automate support processes.
• Service Management: Automate routine tasks.
• Continuous Integration: Improve code quality.
• APIs: Facilitate system interactions.
393
improve efficiency, enforce standardized baselines, and support staff retention by reducing
repetitive tasks.
Detailed Explanation:
• Benefits in Security Operations:
o Efficiency: Perform repetitive tasks quickly and consistently.
o Human Error: Reduce the likelihood of errors.
o Operator Fatigue: Minimize mental exhaustion from high-intensity work.
o Workforce Multiplier: Enable security teams to focus on complex issues.
• Combating Operator Fatigue:
o Routine Tasks: Automate tasks like scanning for vulnerabilities, applying patches,
and monitoring systems.
o Orchestration: Coordinate automated tasks across systems to reduce detection and
reaction times.
o Example: Automatically isolate threats, perform analysis, notify teams, generate
tickets, and document incidents.
• Standardized Baselines:
o Configuration Management: Enforce approved configurations and settings.
o Override Unauthorized Changes: Automatically revert unauthorized changes to
endpoints.
Key Points:
• Efficiency: Quick and consistent task performance.
• Human Error: Reduced likelihood.
• Operator Fatigue: Minimized.
• Standardized Baselines: Enforce configurations.
Important Considerations
Summary: While automation and orchestration offer many benefits, they also present challenges
such as complexity, cost, single points of failure, technical debt, and the need for ongoing support.
Detailed Explanation:
• Complexity:
o Understanding: Requires deep knowledge of systems, processes, and
interdependencies.
o Management: Poorly planned automation can add complexity.
• Cost:
394
o Initial Cost: High costs for tools, integration, and training.
o Maintenance: Ongoing costs for software maintenance and upgrades.
• Single Point of Failure:
o Impact: Failure of critical automated systems can cause widespread problems.
• Technical Debt:
o Hasty Implementation: Can result in poorly documented code and system
instability.
o Long-Term Costs: Increased complexity and costs over time.
• Ongoing Support:
o Maintenance: Requires updates, patches, and continuous education.
o Effectiveness: Benefits erode without adequate support.
Key Points:
• Complexity: Requires deep understanding.
• Cost: High initial and maintenance costs.
• Single Point of Failure: Potential widespread impact.
• Technical Debt: Poor implementation leads to instability.
• Ongoing Support: Necessary for effectiveness.
395
• Security and Governance:
o Security Controls: Enforce security measures.
o Patching: Apply patches consistently.
o Automated Tasks: Automate security-related tasks.
Key Points:
• Consistency: Standardized configurations.
• Time Savings: Quick deployment.
• Scalability: Simplified resource deployment.
• Compliance: Easier auditing and tracking.
• Security: Enforce controls and automate tasks.
396
▪ Ad Hoc: Conducted as needed, often in response to specific incidents.
▪ One-Time: Comprehensive evaluations at a specific point in time.
▪ Recurring: Scheduled at regular intervals (annually, quarterly, monthly).
▪ Continuous: Ongoing evaluation supported by real-time data tools.
o Purpose: Ensures effective identification and management of risks.
• Risk Analysis vs. Risk Assessment:
o Risk Analysis: Identifies and evaluates potential risks and their characteristics.
o Risk Assessment: Estimates potential risk levels and their significance, considering
the likelihood and severity of events.
• Quantitative Analysis:
o Definition: Assigns concrete values to each risk factor.
o Key Metrics:
▪ Single Loss Expectancy (SLE): Amount lost in a single occurrence.
▪ Annualized Loss Expectancy (ALE): Amount lost over a year, calculated by
multiplying SLE by the annualized rate of occurrence (ARO).
o Benefits: Provides tangible numbers to justify the costs of controls.
o Challenges: Complex, time-consuming, and requires historical data for accuracy.
• Qualitative Analysis:
o Definition: Assesses risks based on subjective judgment and qualitative factors.
o Benefits: Simplicity, ease of use, and quick initial assessment.
o Limitations: Subjective, relies on expert judgment, and lacks numerical data.
• Inherent Risk:
o Definition: Level of risk before any mitigation.
o Management: Balances the cost of controls with the associated risk, aiming to
reduce risk to a tolerable level.
o Risk Posture: Overall status of risk management, identifying and prioritizing risk
response options.
• Heat Map:
o Definition: A visual tool using red, yellow, or green indicators to represent risk
severity, likelihood, and control costs.
o Purpose: Provides an immediate impression of where to focus security efforts.
Key Points:
• Risk Identification:
397
o Recognize Risks: Malware, phishing, insider threats, equipment failures, software
vulnerabilities, inadequate policies/training.
o Methods: Vulnerability assessments, penetration testing, security audits, threat
intelligence.
• Risk Assessment:
o Evaluate Impact: Ad hoc, recurring, one-time, continuous assessments.
o Purpose: Effective risk management.
• Risk Analysis vs. Risk Assessment:
o Analysis: Identifies and evaluates risks.
o Assessment: Estimates risk levels and significance.
• Quantitative Analysis:
o Metrics: SLE, ALE.
o Benefits: Justifies control costs.
o Challenges: Complexity, time, data accuracy.
• Qualitative Analysis:
o Approach: Subjective judgment.
o Benefits: Simplicity, quick assessment.
o Limitations: Subjectivity, lack of numerical data.
• Inherent Risk:
o Definition: Pre-mitigation risk level.
o Management: Balance control costs with risk.
• Heat Map:
o Visual Tool: Indicates risk severity, likelihood, control costs.
398
o Examples:
▪ Policies controlling flammable materials to reduce fire risk.
▪ Alarms and sprinklers to contain fire incidents.
▪ Off-site data backup for server destruction scenarios.
• Avoidance:
o Definition: Stopping the activity that causes risk.
o Example: Discontinuing the sale of a vulnerable application due to security issues
and legal threats.
o Usage: Rarely a credible option.
• Risk Transference:
o Definition: Assigning risk to a third party, such as an insurance company.
o Cybersecurity Insurance: Protects against fines and liabilities from data breaches
and attacks.
o Limitations: Reputation risks and some legal liabilities may remain with the
original company.
• Risk Acceptance:
o Definition: No countermeasures are implemented because the risk level is deemed
acceptable.
o Risk Exception: Recognizes unmitigated risks due to financial, technical, or
operational constraints, seeking alternate controls.
o Risk Exemption: Allows risk to remain without mitigation due to strategic
decisions, often when mitigation costs outweigh potential harm.
• Residual Risk and Risk Appetite:
o Residual Risk: The remaining risk after mitigation, transference, or acceptance
measures.
o Risk Appetite: The level of residual risk that is tolerable, assessed strategically and
constrained by regulation and compliance.
Key Points:
• Risk Mitigation:
o Reduce Exposure: Through policies, alarms, sprinklers, and backups.
o Risk Deterrence: Countermeasures to reduce likelihood or impact.
• Avoidance:
o Stop Risky Activities: Discontinue problematic applications.
o Rare Option: Not commonly feasible.
399
• Risk Transference:
o Assign to Third Party: Use of insurance.
o Limitations: Reputation and some legal risks remain.
• Risk Acceptance:
o Acceptable Risk Levels: No countermeasures needed.
o Exceptions and Exemptions: Recognize and document unmitigated risks.
• Residual Risk and Risk Appetite:
o Post-Mitigation Risk: Residual risk assessment.
o Strategic Tolerance: Risk appetite for overall risk management.
400
o Definition: Determine countermeasures and assess the cost of additional security
controls.
o Process: Identify appropriate responses for each risk, including mitigation,
avoidance, transference, or acceptance.
• Likelihood and Impact:
o Likelihood: Describes the chance of a risk event happening, expressed qualitatively
(low, medium, high) or quantitatively (0 to 1 or percentage).
o Impact: Severity of the risk if realized, determined by asset value or disruption cost.
• Enterprise Risk Management (ERM):
o Definition: Policies and procedures based on frameworks like NIST RMF or ISO 31K.
o Process: Formalized as Risk and Control Self-Assessment (RCSA) or led by external
parties as Risk and Control Assessment (RCA).
• Risk Registers:
o Definition: Document showing risk assessments, including severity, owner, and
mitigation strategies.
o Formats: Heat map risk matrix or scatterplot graphs.
o Purpose: Shared among stakeholders to understand associated risks.
• Risk Threshold:
o Definition: Limits of acceptable risk an organization is willing to tolerate.
o Factors: Based on regulatory requirements, objectives, stakeholder expectations,
and risk appetite.
• Key Risk Indicators (KRIs):
o Definition: Predictive indicators to monitor and predict potential risks.
o Purpose: Provide early indication of increasing risk exposures.
• Risk Owner:
o Definition: Individual responsible for managing a particular risk.
o Role: Identify, assess, mitigate, monitor, and communicate risk status.
• Risk Appetite:
o Definition: Level of risk an organization is willing to accept.
o Comparison: Risks are compared to risk appetite to determine management and
monitoring priorities.
• Levels of Risk Appetite:
o Expansionary: Willing to take higher risks for high returns or growth.
o Conservative: Prioritizes risk avoidance and cautious approach.
401
o Neutral: Balances expansionary and conservative approaches.
• Risk Reporting:
o Definition: Methods to communicate risk profile and management effectiveness.
o Purpose: Supports decision-making and ensures stakeholders understand risks.
Key Points:
• Identify Mission Essential Functions:
o Focus Efforts: On critical functions and supporting systems.
• Identify Vulnerabilities:
o Analyze Systems: Discover and list weaknesses.
• Identify Threats:
o Assess Threats: For each function or workflow.
• Analyze Business Impacts:
o Assess Likelihood and Impact: Using quantitative and qualitative methods.
• Identify Risk Response:
o Determine Countermeasures: Assess cost and appropriateness.
• Likelihood and Impact:
o Likelihood: Qualitative or quantitative measure.
o Impact: Severity based on asset value or disruption cost.
• Enterprise Risk Management (ERM):
o Policies and Procedures: Based on frameworks like NIST RMF or ISO 31K.
• Risk Registers:
o Document Risks: Include severity, owner, and mitigation strategies.
• Risk Threshold:
o Acceptable Limits: Based on various factors.
• Key Risk Indicators (KRIs):
o Predictive Indicators: Monitor and predict risks.
• Risk Owner:
o Manage Risks: Identify, assess, mitigate, monitor, and communicate.
• Risk Appetite:
o Acceptable Risk Level: Compare risks to determine priorities.
• Levels of Risk Appetite:
402
o Expansionary: High risk for high returns.
o Conservative: Risk avoidance.
o Neutral: Balanced approach.
• Risk Reporting:
o Communicate Risks: Support decision-making and stakeholder understanding.
403
▪ Maximum Tolerable Downtime (MTD): Longest period a business function
can be down without causing irrecoverable failure.
▪ Recovery Time Objective (RTO): Time to identify and recover from a
disaster.
▪ Work Recovery Time (WRT): Additional time to reintegrate systems and
restore full functionality.
▪ Recovery Point Objective (RPO): Maximum acceptable data loss measured
in time.
• Mean Time Metrics:
o Mean Time Between Failures (MTBF): Expected lifetime of a product, calculated
as total operational time divided by the number of failures.
o Mean Time to Repair (MTTR): Time taken to correct a fault and restore full
operation, calculated as total hours of unplanned maintenance divided by the
number of failure incidents.
Key Points:
• Identification of Critical Systems:
o Inventory: Business processes and supporting assets.
o Asset Types: People, tangible assets, intangible assets, procedures.
• Business Process Analysis (BPA):
o Analyze Dependencies: Inputs, hardware, staff, outputs, process flow.
• Mission Essential Functions (MEF):
o Critical Functions: Must be restored first.
o Metrics: MTD, RTO, WRT, RPO.
• Mean Time Metrics:
o MTBF: Expected product lifetime.
o MTTR: Time to repair and restore functionality.
Vendor Selection
Summary: Vendor selection involves systematically evaluating and assessing potential vendors to
minimize risks associated with outsourcing or procurement. This process includes identifying risk
criteria, conducting due diligence, and selecting vendors based on their risk profile to ensure they
align with the organization's risk tolerance and can manage risks effectively.
Detailed Explanation:
404
• Vendor Selection Practices:
o Definition: Systematic evaluation and assessment of potential vendors.
o Steps: Identify risk criteria, conduct due diligence, select vendors based on risk
profile.
o Goals: Minimize risks related to financial stability, operational reliability, data
security, regulatory compliance, and reputation.
• Third-Party Vendor Assessment:
o Definition: Evaluation of external vendors providing goods, services, or technology
solutions.
o Role: Support business operations with specialized expertise, products, and
services.
o Risks: Access to sensitive data, infrastructure, or critical processes.
o Importance: Ensures vendors adhere to security standards and regulatory
compliance.
• Governance, Risk, and Compliance (GRC) Frameworks:
o Definition: Frameworks that include vendor assessment as a critical component.
o Purpose: Maintain IT and business operations security.
o Significance: Ensures vendors comply with security standards and regulatory
requirements.
• Vendor Assessment Statistics:
o Network Access: Companies allow 89 vendors to access their networks weekly.
o Data Breaches: 69% of organizations have experienced breaches due to vendor
security shortcomings.
o Risk Management: 65% find it hard to manage cybersecurity risks with third-party
vendors.
o Cost vs. Security: 64% focus more on cost than security when outsourcing.
• Regulatory Compliance:
o Importance: Ensures vendors comply with regulations and industry standards.
o Benefits: Protects against fines and legal consequences, provides evidence of due
diligence during audits.
• Conflict of Interest:
o Definition: Competing interests that could compromise objectivity and impartiality.
o Examples:
▪ Financial Interests: Bias due to partnerships or financial incentives.
405
▪ Personal Relationships: Influence from close ties with decision-makers.
▪ Competitive Relationships: Prioritizing own interests over the
organization's.
▪ Insider Information: Unfair advantage from access to confidential
information.
Key Points:
• Vendor Selection Practices:
o Evaluate and Assess: Systematic approach to minimize risks.
o Steps: Identify risk criteria, conduct due diligence, select based on risk profile.
• Third-Party Vendor Assessment:
o Evaluate Vendors: Ensure adherence to security standards and regulatory
compliance.
o Role and Risks: Support operations but introduce potential risks.
• GRC Frameworks:
o Include Vendor Assessment: Critical for maintaining security.
• Vendor Assessment Statistics:
o Network Access: 89 vendors weekly.
o Data Breaches: 69% due to vendor shortcomings.
o Risk Management: 65% find it challenging.
o Cost vs. Security: 64% prioritize cost.
• Regulatory Compliance:
o Ensure Compliance: Protects against fines and legal issues.
• Conflict of Interest:
o Identify and Address: Financial interests, personal relationships, competitive
relationships, insider information.
406
o Definition: Comprehensive process of gathering and analyzing information about
potential vendors.
o Criteria: Financial stability, reputation, technical capabilities, security practices,
regulatory compliance, past performance.
o Purpose: Minimize risks, verify vendor claims, identify red flags, ensure alignment
with organizational needs.
• Penetration Testing:
o Definition: Evaluates vendors' security posture and identifies vulnerabilities.
o Purpose: Understand potential risks, validate security controls, uncover
weaknesses, assist risk management.
• Right-to-Audit Clause:
o Definition: Contractual provision granting authority to conduct audits of vendor
practices.
o Purpose: Validate compliance with contractual obligations, security standards, and
regulatory requirements.
• Evidence of Internal Audits:
o Definition: Independent evaluation of internal controls, risk management, and
compliance.
o Purpose: Demonstrate vendor's commitment to governance, risk management, and
secure operations.
• Independent Assessments:
o Definition: Engaging independent experts to evaluate vendor capabilities and
practices.
o Purpose: Provide objective evaluation, mitigate biases, ensure thorough
assessments, support informed decision-making.
• Supply Chain Analysis:
o Definition: Evaluates risks and vulnerabilities in the supply chain.
o Purpose: Identify weak links, vulnerabilities, and potential points of compromise,
ensure smooth operations and compliance.
• Vendor Monitoring:
o Definition: Continuous oversight and evaluation of vendors.
o Purpose: Ensure ongoing adherence to security standards, compliance
requirements, and contractual obligations.
Key Points:
• Due Diligence:
407
o Comprehensive Evaluation: Financial stability, reputation, technical capabilities,
security practices, regulatory compliance, past performance.
o Purpose: Minimize risks, verify claims, identify red flags.
• Penetration Testing:
o Evaluate Security: Identify vulnerabilities, validate controls, uncover weaknesses.
• Right-to-Audit Clause:
o Contractual Authority: Conduct audits, validate compliance.
• Evidence of Internal Audits:
o Independent Evaluation: Internal controls, risk management, compliance.
• Independent Assessments:
o Objective Evaluation: Mitigate biases, ensure thorough assessments.
• Supply Chain Analysis:
o Evaluate Risks: Identify weak links, vulnerabilities, ensure compliance.
• Vendor Monitoring:
o Continuous Oversight: Adherence to standards, compliance, contractual
obligations.
Legal Agreements
Summary: Legal agreements are essential for establishing the rights, responsibilities, and
expectations between vendors and clients. They provide a framework for conducting business and
addressing potential issues or disputes.
Detailed Explanation:
• Initial Agreements:
o Memorandum of Understanding (MOU):
▪ Definition: Nonbinding agreement outlining intentions, shared goals, and
general terms of cooperation.
▪ Purpose: Establish a common understanding before a formal agreement.
o Nondisclosure Agreement (NDA):
▪ Definition: Ensures confidentiality and protection of sensitive information.
▪ Purpose: Protects shared information during the relationship.
o Memorandum of Agreement (MOA):
▪ Definition: Formal agreement defining specific terms, conditions, and
responsibilities.
408
▪ Purpose: Establishes a legally binding relationship.
o Business Partnership Agreement (BPA):
▪ Definition: Governs long-term strategic partnerships.
▪ Purpose: Covers goals, financial arrangements, decision-making processes,
intellectual property rights, confidentiality, and dispute resolution.
o Master Service Agreement (MSA):
▪ Definition: Outlines overall terms and conditions of a specific contract.
▪ Purpose: Includes scope, pricing, deliverables, and intellectual property
rights.
• Detailed Agreements:
o Service-level Agreement (SLA):
▪ Definition: Defines specific performance metrics, quality standards, and
service levels.
▪ Purpose: Sets expectations for vendor performance.
o Statement of Work (SOW)/Work Order (WO):
▪ Definition: Details scope, deliverables, timelines, and responsibilities of a
project.
▪ Purpose: Clarifies tasks, expectations, and deliverables.
• Questionnaires:
o Definition: Gather information about vendor security practices, controls, and risk
management strategies.
o Purpose: Assess security posture, identify vulnerabilities, and evaluate capabilities.
o Validation: Request supporting documentation, conduct site visits or audits,
perform background checks, contact references, and use third-party verification
services.
• Rules of Engagement (RoE):
o Definition: Define parameters and expectations for vendor relationships.
o Purpose: Establish guidelines for behavior, activities, and access to sensitive
information.
o Elements:
▪ Roles and Responsibilities: Define who manages risks.
▪ Security Requirements: Outline security standards and practices.
▪ Compliance Obligations: State regulatory and compliance requirements.
▪ Reporting and Communication: Establish protocols for incident reporting.
409
▪ Change Management: Outline procedures for managing changes.
▪ Contractual Provisions: Include indemnification, liability, insurance, and
termination rights.
Key Points:
• Initial Agreements:
o MOU: Nonbinding, outlines intentions and goals.
o NDA: Ensures confidentiality.
o MOA: Formal, legally binding.
o BPA: Long-term strategic partnerships.
o MSA: Overall terms and conditions.
• Detailed Agreements:
o SLA: Performance metrics and service levels.
o SOW/WO: Scope, deliverables, timelines, responsibilities.
• Questionnaires:
o Gather Information: Security practices, controls, risk management.
o Validation: Documentation, site visits, audits, background checks, references, third-
party verification.
• Rules of Engagement (RoE):
o Define Parameters: Responsibilities, security, compliance, reporting, change
management, contractual provisions.
410
o Benefits: Provides assurance to stakeholders about the adequacy and effectiveness
of security measures.
• Internal and External Assessments:
o Internal Assessments:
▪ Conducted by: Organization's own employees.
▪ Purpose: Provide in-depth assessment of business processes, support
continuous monitoring, and improve internal controls.
o External Assessments:
▪ Conducted by: Independent third-party service providers.
▪ Purpose: Provide impartial evaluation, ensure practices meet industry
standards, and identify improvement areas.
• Benefits of Combining Internal and External Assessments:
o Balanced View: Comprehensive evaluation of risk management practices, controls,
and compliance efforts.
o Enhanced Risk Management: Continuous monitoring and validation of controls.
o Transparency and Accountability: Builds trust among stakeholders.
o Knowledge Sharing: Collaboration between internal and external auditors
improves assessment quality.
• Internal Assessments:
o Compliance Assessment: Ensures alignment with laws, regulations, standards,
policies, and ethical requirements.
o Audit Committee: Provides independent oversight of financial reporting, internal
controls, and risk management.
o Self-Assessment: Allows evaluation of performance and practices against
established criteria.
• External Assessments:
o Regulatory: Performed by authorities to ensure compliance with laws and
regulations.
o Examination: Independent evaluation of financial statements, processes, and
controls.
o Assessment: Broad evaluation of performance, practices, and capabilities by
external experts.
o Independent Third-Party Audit: Objective assessment of systems, controls,
processes, and compliance.
Key Points:
411
• Attestation:
o Verify and Validate: Accuracy, reliability, and effectiveness of security controls.
o Provide Assurance: To stakeholders about security measures.
• Internal and External Assessments:
o Internal: Conducted by employees, supports continuous improvement.
o External: Conducted by third parties, ensures impartial evaluation.
• Benefits of Combining Assessments:
o Comprehensive Evaluation: Balanced view of risk management.
o Enhanced Risk Management: Continuous monitoring and validation.
o Transparency and Accountability: Builds stakeholder trust.
o Knowledge Sharing: Improves assessment quality.
• Internal Assessments:
o Compliance Assessment: Align with laws and regulations.
o Audit Committee: Independent oversight.
o Self-Assessment: Evaluate performance and practices.
• External Assessments:
o Regulatory: Ensure compliance with laws.
o Examination: Independent evaluation.
o Assessment: Broad evaluation by experts.
o Independent Third-Party Audit: Objective assessment.
Penetration Testing
Summary: Penetration testing, or pen testing, uses authorized hacking techniques to discover
exploitable weaknesses in security systems. It involves verifying threats, bypassing security
controls, actively testing security controls, and exploiting vulnerabilities to assess the effectiveness
of security measures.
Detailed Explanation:
• Penetration Testing Steps:
o Verify a Threat Exists: Identify vulnerabilities using surveillance, social
engineering, network scanners, and vulnerability assessment tools.
o Bypass Security Controls: Look for easy ways to attack the system, such as gaining
physical access to a computer.
412
o Actively Test Security Controls: Probe for configuration weaknesses and errors,
like weak passwords or software vulnerabilities.
o Exploit Vulnerabilities: Prove high-risk vulnerabilities by exploiting them to gain
access to data or install backdoors.
• Active and Passive Reconnaissance:
o Active Reconnaissance:
▪ Definition: Actively probing and interacting with target systems to gather
information.
▪ Techniques: Port scanning, service enumeration, OS fingerprinting, DNS
enumeration, web application crawling.
o Passive Reconnaissance:
▪ Definition: Gathering information without directly interacting with target
systems.
▪ Techniques: Open-source intelligence (OSINT), network traffic analysis.
▪ Purpose: Less intrusive, lower detection risk, gathers initial information on
the target's digital footprint.
• Known, Partially Known, and Unknown Testing Methods:
o Known Environment Penetration Testing:
▪ Definition: Tester has detailed knowledge about the target system.
▪ Purpose: Assess known vulnerabilities.
o Partially Known Environment Penetration Testing:
▪ Definition: Tester has limited knowledge about the target system.
▪ Purpose: Gather additional information and assess security controls.
o Unknown Environment Penetration Testing:
▪ Definition: Tester has little prior knowledge about the target system.
▪ Purpose: Mimic an attacker with no preexisting information, identify
potential vulnerabilities.
Key Points:
• Penetration Testing Steps:
o Verify Threats: Identify vulnerabilities.
o Bypass Controls: Find easy attack methods.
o Test Controls: Probe ffNor weaknesses.
o Exploit Vulnerabilities: Prove high-risk vulnerabilities.
• Active and Passive Reconnaissance:
413
o Active: Probing and interacting with systems.
o Passive: Gathering information without interaction.
• Testing Methods:
o Known Environment: Detailed knowledge of the system.
o Partially Known Environment: Limited knowledge, gather additional information.
o Unknown Environment: Little prior knowledge, mimic an attacker.
Exercise Types
Summary: Penetration testing involves simulating real-world attacks on systems, networks, or
applications to identify vulnerabilities. Different types of penetration tests address specific security
objectives, such as testing systems, assessing incident response, and evaluating physical controls.
Detailed Explanation:
• Offensive and Defensive Penetration Testing:
o Offensive Penetration Testing (Red Teaming):
▪ Definition: Simulates real-world cyberattacks to identify vulnerabilities.
▪ Goal: Identify weaknesses and potential attack vectors.
▪ Performed by: Skilled cybersecurity professionals mimicking attackers'
tactics.
o Defensive Penetration Testing (Blue Teaming):
▪ Definition: Evaluates defensive security measures and incident response.
▪ Goal: Assess effectiveness of security controls and identify improvement
areas.
• Physical Penetration Testing:
o Definition: Assesses physical security practices and controls.
o Goal: Identify vulnerabilities in physical security systems.
o Techniques: Social engineering, tailgating, lock picking, bypassing alarms,
exploiting physical vulnerabilities.
• Integrated Penetration Testing:
o Definition: Combines different penetration testing methodologies to assess overall
security.
o Goal: Provide a comprehensive evaluation of security operations.
o Importance: Identifies potential risks often overlooked in isolated tests.
o Example: Combining offensive and defensive testing for a thorough assessment.
414
Key Points:
• Offensive and Defensive Penetration Testing:
o Offensive (Red Teaming): Simulates attacks, identifies vulnerabilities.
o Defensive (Blue Teaming): Evaluates defenses, assesses incident response.
• Physical Penetration Testing:
o Assess Physical Security: Identify vulnerabilities in access controls, surveillance,
and perimeter defenses.
o Techniques: Social engineering, tailgating, lock picking, bypassing alarms.
• Integrated Penetration Testing:
o Holistic Approach: Combines methodologies for comprehensive security
evaluation.
o Importance: Identifies overlooked risks, improves overall security posture.
Data Types
Summary: Data types categorize data based on characteristics, structure, and intended use. This
classification aids in analyzing, processing, interpreting, and securing information. Key data types
include regulated data, trade secrets, legal and financial data, and human-readable vs. non-human-
readable data.
Detailed Explanation:
• Regulated Data:
o Definition: Information subject to legal or regulatory requirements for handling,
storage, and protection.
o Examples: Financial information, healthcare records, social security numbers,
credit card details.
o Regulations: HIPAA for healthcare data, PCI DSS for credit card information.
o Compliance: Involves security measures, data encryption, access controls, breach
notification, and data handling protocols.
• Trade Secrets:
415
o Definition: Confidential information providing a business with a competitive
advantage.
o Examples: Formulas, processes, methods, techniques, customer lists, pricing
information, marketing strategies.
o Protection: Non-disclosure agreements (NDAs), legal action against unauthorized
use or disclosure.
o Laws: Aim to prevent unfair competition and provide remedies for
misappropriation.
• Legal and Financial Data:
o Legal Data:
▪ Definition: Data for legal compliance, including documents, contracts, court
records, intellectual property filings.
▪ Importance: Critical for corporate governance and compliance with laws.
o Financial Data:
▪ Definition: Information on financial activities, performance, and
transactions.
▪ Examples: Financial statements, balance sheets, income statements, tax
records, budgets.
▪ Sensitivity: Highly confidential due to potential impact on reputation, legal
standing, and financial stability.
• Human-Readable and Non-Human-Readable Data:
o Human-Readable Data:
▪ Definition: Information easily understood by humans (e.g., text, images,
multimedia).
▪ Examples: Documents, reports, emails, web pages.
o Non-Human-Readable Data:
▪ Definition: Data not easily interpreted by humans in raw form (e.g., binary
code, encrypted data).
▪ Processing: Requires specialized software or algorithms for interpretation.
o Security Implications:
▪ Human-Readable Data: Security monitoring, user awareness, DLP, content
filtering, web security.
▪ Non-Human-Readable Data: Encryption, access controls, intrusion
detection, secure data exchange, code/application security.
▪ Challenges: Non-human-readable data can impede traditional security
controls, requiring specialized approaches.
416
Key Points:
• Regulated Data:
o Legal Requirements: Handling, storage, protection.
o Examples: Financial, healthcare, PII.
o Compliance: Security measures, encryption, access controls.
• Trade Secrets:
o Confidential Information: Competitive advantage.
o Examples: Formulas, processes, customer lists.
o Protection: NDAs, legal action.
• Legal and Financial Data:
o Legal Data: Compliance, governance.
o Financial Data: Performance, transactions.
o Sensitivity: Confidential and impactful.
• Human-Readable and Non-Human-Readable Data:
o Human-Readable: Easily understood (text, images).
o Non-Human-Readable: Requires processing (binary, encrypted).
o Security: Different implications and controls.
Data Classifications
Summary: Data classification and typing schemas tag data assets to manage them through their
lifecycle. These schemas often categorize data based on confidentiality levels, such as public,
confidential, secret, and top secret. They also classify information assets like proprietary,
private/personal, sensitive, and restricted data.
Detailed Explanation:
• Confidentiality-Based Classification:
o Public (Unclassified):
▪ Definition: No restrictions on viewing.
▪ Risk: No risk if disclosed, but risk if modified or unavailable.
o Confidential:
▪ Definition: Sensitive information, viewable by organization personnel and
trusted third parties under NDAs.
▪ Risk: Does not require national security-level protection.
417
o Secret:
▪ Definition: Information that could cause serious national security damage if
disclosed.
▪ Access: Restricted to individuals with a need to know.
o Top Secret:
▪ Definition: Highest classification, unauthorized disclosure could cause
exceptionally grave national security damage.
▪ Access: Extremely restricted and monitored.
• Information Asset Classification:
o Proprietary:
▪ Definition: Intellectual property (IP) created and owned by the company.
▪ Examples: Product/service information, formulas, processes.
▪ Risk: Target for competitors and foreign governments, counterfeiting
opportunities.
o Private/Personal Data:
▪ Definition: Information related to individual identity.
▪ Examples: PII such as names, addresses, social security numbers, financial
information, health records.
o Sensitive:
▪ Definition: Personal data that could harm individuals if made public.
▪ Examples: Religious beliefs, political opinions, trade union membership,
gender, sexual orientation, racial/ethnic origin, genetic data, health
information.
▪ Regulation: Defined by GDPR.
o Restricted:
▪ Definition: Highly confidential information requiring stringent controls and
limited access.
▪ Risk: Significant harm if disclosed or accessed by unauthorized individuals.
Key Points:
• Confidentiality-Based Classification:
o Public: No viewing restrictions, risk if modified/unavailable.
o Confidential: Sensitive, viewable by organization personnel/trusted third parties.
o Secret: Serious national security risk if disclosed, restricted access.
418
o Top Secret: Highest classification, grave national security risk, extremely restricted
access.
• Information Asset Classification:
o Proprietary: Company-owned IP, target for competitors/governments.
o Private/Personal Data: PII, sensitive data like health records.
o Sensitive: Personal data that could harm individuals, regulated by GDPR.
o Restricted: Highly confidential, stringent controls, limited access.
419
▪ Data Replication and Dispersion: Affected by geolocation restrictions.
o Incident Investigation and Forensics:
▪ Jurisdiction-Specific Restrictions: Impact data access, sharing, and legal
requirements.
Key Points:
• Data Sovereignty:
o Jurisdictional Restrictions: Prevent processing/storage outside specific
boundaries.
o Example: GDPR protections for EU citizens.
o Compliance: Local datacenters, cloud providers, contractual safeguards.
• Geographical Considerations:
o Storage Locations: Mitigate sovereignty issues, choose compliant datacenters.
o Access Requirements: Validate geographic location for data access.
• Impact on Business Functions:
o Data Protection: Geolocation affects replication, dispersion.
o Incident Investigation: Jurisdiction-specific restrictions on data access/sharing.
Privacy Data
Summary: Privacy data includes personally identifiable or sensitive information that, if
mishandled, could infringe on an individual's privacy rights. Examples include names, addresses,
social security numbers, and medical records. Both privacy and confidential data require protection,
but privacy data specifically pertains to personal information and individual privacy rights.
Detailed Explanation:
• Privacy Data:
o Definition: Personally identifiable or sensitive information associated with an
individual's identity.
o Examples: Names, addresses, contact information, social security numbers, medical
records, financial transactions.
o Protection: Requires safeguarding due to its sensitive nature.
o Legal and Ethical Considerations: Compliance with data protection and privacy
laws.
• Differences Between Privacy and Confidential Data:
o Confidential Data:
420
▪ Definition: Any information requiring protection due to its confidential
nature.
▪ Examples: Trade secrets, intellectual property, financial statements,
proprietary algorithms.
▪ Focus: Protecting business competitiveness and sensitive company data.
o Privacy Data:
▪ Definition: Information that can identify or impact an individual's privacy.
▪ Focus: Protecting personal information and individual privacy rights.
▪ Rights: Individuals have rights to access, correct, and request deletion of
their data.
▪ Consent: Often requires explicit consent for collection, use, and disclosure.
• Legal Implications:
o Global Impact: Privacy laws dictate how personal data should be handled.
o Enforcement: Data protection authorities oversee compliance and can issue fines.
o GDPR: Sets high privacy standards, applies to organizations processing EU
residents' data.
o Cross-Border Transfers: Subject to specific requirements and restrictions.
• Roles and Responsibilities:
o Data Controller:
▪ Definition: Determines purposes and means of processing personal data.
▪ Responsibilities: Compliance, obtaining consent, providing privacy notices,
handling data subject requests.
o Data Processor:
▪ Definition: Processes personal data on behalf of the Data Controller.
▪ Responsibilities: Implement security measures, maintain data
confidentiality, cooperate with Data Controller.
o Data Subject:
▪ Definition: Individual whose personal data is processed.
▪ Rights: Access, rectification, erasure, restriction, data portability, objection,
withdrawal of consent.
• Right to Be Forgotten:
o Definition: Right to request erasure of personal data under certain circumstances.
o Importance: Empowers individuals to control their personal information.
o Limitations: May be restricted for legal obligations or freedom of expression.
421
• Ownership of Privacy Data:
o Complexity: Traditional ownership notions do not apply.
o Focus: Rights and protections of the data subject.
o Organizations: Act as custodians or stewards, responsible for secure and lawful
handling.
• Data Inventories and Retention:
o Impact of Privacy Laws: Require detailed records of personal data.
o Data Inventories: Document data processing activities, legal basis, and retention
periods.
o Retention: Retain data only as long as necessary, ensure secure deletion or
anonymization.
o Facilitating Rights: Enable prompt response to data subject requests.
Key Points:
• Privacy Data:
o Sensitive Information: Personal, financial, social identity.
o Examples: Names, addresses, social security numbers, medical records.
o Protection: Legal and ethical considerations.
• Differences Between Privacy and Confidential Data:
o Confidential Data: Business competitiveness, intellectual property.
o Privacy Data: Individual privacy rights, personal information.
• Legal Implications:
o Global Privacy Laws: GDPR, data protection authorities.
o Cross-Border Transfers: Specific requirements and restrictions.
• Roles and Responsibilities:
o Data Controller: Determines processing purposes, compliance.
o Data Processor: Processes data on behalf of controller, security measures.
o Data Subject: Rights to access, rectification, erasure, etc.
• Right to Be Forgotten:
o Erasure Request: Control over personal information.
o Limitations: Legal obligations, freedom of expression.
• Ownership of Privacy Data:
o Custodianship: Organizations as stewards, not owners.
422
o Focus: Data subject rights and protections.
• Data Inventories and Retention:
o Detailed Records: Document processing activities.
o Retention Periods: Compliance with data storage limitations.
o Facilitating Rights: Respond to data subject requests.
423
o Senior Decision-Makers: Involvement required for personal data and IP breaches.
• Public Notification and Disclosure:
o Regulatory Requirements: Notification to law enforcement, affected individuals,
third parties, and the public.
o HIPAA: Requires notification to affected individuals, the Secretary of the US
Department of Health and Human Services, and the media if over 500 individuals
are affected.
o GDPR: Notification within 72 hours of becoming aware of a breach.
o Disclosure Requirements: Description of breached information, contact details,
consequences, and mitigation measures.
Key Points:
• Data Breach:
o Unauthorized Access: Reading, modifying, deleting information.
o Scope: Corporate information, intellectual property.
• Privacy Breach:
o Personal Data: Loss or disclosure of sensitive information.
• Organizational Consequences:
o Reputation Damage: Negative publicity, loss of trust.
o Identity Theft: Legal actions, damages.
o Fines: Regulatory penalties.
o IP Theft: Revenue loss, commercial losses.
• Notifications of Breaches:
o Legal Requirements: Who must be notified.
o Types of Breaches: Loss, theft, accidental disclosure.
• Escalation:
o Detection: Technical staff, senior decision-makers.
o Legal Jeopardy: Importance of notification.
• Public Notification and Disclosure:
o Regulatory Requirements: HIPAA, GDPR.
o Disclosure: Description, contact details, consequences, mitigation.
424
Compliance
Summary: Security compliance involves adhering to security standards, regulations, and best
practices to protect sensitive information and ensure data confidentiality, integrity, and availability.
Noncompliance can lead to severe consequences, including legal sanctions, reputational damage,
and financial penalties. Effective compliance requires implementing policies, procedures, controls,
and technical measures.
Detailed Explanation:
• Security Compliance:
o Definition: Adherence to security standards, regulations, and best practices.
o Purpose: Protect sensitive information, mitigate risks, ensure data confidentiality,
integrity, and availability.
o Implementation: Policies, procedures, controls, technical measures.
• Impacts of Noncompliance:
o Legal Sanctions: Financial penalties, legal liabilities.
o Reputational Damage: Erosion of customer trust, loss of business opportunities.
o Regulatory Scrutiny: Increased audits, investigations, mandated remediation
measures.
o Due Diligence: Comprehensive assessment of data protection practices and
compliance.
• Software Licensing:
o Noncompliance Consequences: Revocation of usage rights, fines, legal actions.
o Violations: Exceeding permitted installations, unauthorized sharing, modifying
code.
o Impact: Disruption of business operations, reputational damage.
o Compliance Measures: License remediation, proper license management, audits.
• Impacts of Contractual Noncompliance:
o Breach of Contract:
▪ Definition: Failure to meet contractual obligations related to data protection
and cybersecurity.
▪ Consequences: Legal liability for damages or loss.
o Termination of Contracts:
▪ Grounds: Noncompliance may lead to contract termination.
▪ Impact: Termination penalties, loss of business relationships.
o Indemnification and Liability:
425
▪ Definition: Noncompliant party assumes liability for damages caused by
security breaches.
▪ Impact: Financial burdens, reputational damage.
o Noncompliance Penalties:
▪ Definition: Monetary fines or contractual damages for noncompliance.
▪ Purpose: Incentivize adherence to cybersecurity measures.
Key Points:
• Security Compliance:
o Adherence: Security standards, regulations, best practices.
o Implementation: Policies, procedures, controls, technical measures.
• Impacts of Noncompliance:
o Legal Sanctions: Financial penalties, legal liabilities.
o Reputational Damage: Loss of trust, business opportunities.
o Regulatory Scrutiny: Audits, investigations, remediation.
• Software Licensing:
o Noncompliance: Revocation of rights, fines, legal actions.
o Compliance: License management, audits.
• Impacts of Contractual Noncompliance:
o Breach of Contract: Legal liability for damages.
o Termination: Loss of relationships, penalties.
o Indemnification: Financial burdens, reputational damage.
o Penalties: Monetary fines, contractual damages.
426
o Purpose: Identify noncompliance, enhance risk management, maintain stakeholder
trust.
o Internal Monitoring: Self-assessments, internal audits, reviews.
o External Monitoring: Independent audits, assessments, regulatory inspections.
o Automation: Use of compliance management software for data collection, analysis,
and reporting.
• Compliance Reporting:
o Definition: Communicating compliance performance, identifying issues,
recommending actions.
o Internal Reporting:
▪ Audience: Internal stakeholders (risk managers, executives, security
analysts, privacy officers).
▪ Focus: Operational details, supports decision-making.
o External Reporting:
▪ Audience: External stakeholders (shareholders, customers, clients,
regulators, vendors, business partners).
▪ Focus: High-level summaries, regulatory requirements.
• Internal and External Compliance Reporting:
o Internal Reporting:
▪ Purpose: Assess and disclose compliance status to internal stakeholders.
▪ Details: Operational details, supports internal decision-making.
o External Reporting:
▪ Purpose: Assess and disclose compliance status to external stakeholders.
▪ Details: High-level summaries, adheres to regulatory requirements.
• Compliance Monitoring Activities:
o Investigations and Assessments: Ensure third-party compliance with regulations.
o Precautions and Controls: Protect sensitive information, prevent noncompliance.
o Attestation and Acknowledgment: Formal acknowledgment of compliance
obligations through signed agreements, policy acknowledgments, training activities.
Key Points:
• Compliance Monitoring:
o Systematic Assessment: Adherence to laws, regulations, standards.
o Activities: Risk assessments, data collection, analysis.
427
o Internal Monitoring: Self-assessments, internal audits.
o External Monitoring: Independent audits, regulatory inspections.
o Automation: Compliance management software.
• Compliance Reporting:
o Communication: Performance, issues, actions.
o Internal Reporting: Operational details, internal stakeholders.
o External Reporting: High-level summaries, external stakeholders.
• Internal and External Compliance Reporting:
o Internal: Operational details, decision-making.
o External: Regulatory requirements, high-level summaries.
• Compliance Monitoring Activities:
o Investigations: Third-party compliance.
o Controls: Protect information, prevent noncompliance.
o Attestation: Formal acknowledgment of obligations.
Data Protection
Summary: Classifying data as "at rest," "in motion," and "in use" is essential for effective data
protection. This classification helps organizations tailor security measures to address specific risks
associated with each data state, ensuring appropriate safeguards throughout the data lifecycle and
facilitating compliance with data protection regulations.
Detailed Explanation:
• Data at Rest:
o Definition: Data stored in persistent storage media.
o Examples: Financial information in databases, archived media, operational policies,
system configuration data.
o Protection Methods: Whole disk encryption, database encryption, file/folder-level
encryption, access control lists (ACLs).
• Data in Transit (Data in Motion):
o Definition: Data transmitted over a network.
o Examples: Website traffic, remote access traffic, data synchronization between
cloud repositories.
o Protection Methods: Transport encryption protocols like TLS or IPSec.
• Data in Use (Data in Processing):
428
o Definition: Data present in volatile memory (RAM, CPU registers, cache).
o Examples: Documents open in applications, database data being modified, event
logs being generated.
o Protection Methods: Trusted execution environments (TEEs) like Intel Software
Guard Extensions.
• Data Protection Methods:
o Geographic Restrictions:
▪ Definition: Limiting data access based on geographic locations.
▪ Use Case: Cloud computing and data storage services to comply with data
protection laws.
o Encryption:
▪ Definition: Converting data into a coded format accessible only with an
encryption key.
▪ Purpose: Protects data confidentiality.
o Hashing:
▪ Definition: Converting data into a fixed-length string using a hashing
algorithm.
▪ Purpose: Verifies data integrity, securely stores passwords.
o Masking:
▪ Definition: Replacing sensitive data with fictional or partially concealed
values.
▪ Purpose: Prevents exposure of sensitive information.
o Tokenization:
▪ Definition: Replacing sensitive data with a randomly generated token.
▪ Use Case: Payment processing systems to protect payment card information.
o Obfuscation:
▪ Definition: Modifying data to make it difficult to understand without
altering functionality.
▪ Purpose: Protects source code intellectual property.
o Segmentation:
▪ Definition: Dividing networks, data, and applications into isolated
components.
▪ Use Case: Healthcare systems to control access to patient information.
o Permission Restrictions:
429
▪ Definition: Controlling data access based on user permissions.
▪ Purpose: Reduces risk of unauthorized access and data breaches.
Key Points:
• Data at Rest:
o Storage: Persistent media.
o Protection: Encryption, ACLs.
• Data in Transit:
o Transmission: Over a network.
o Protection: Transport encryption protocols.
• Data in Use:
o Memory: Volatile memory.
o Protection: Trusted execution environments.
• Data Protection Methods:
o Geographic Restrictions: Limit access by location.
o Encryption: Coded format, encryption key.
o Hashing: Fixed-length string, data integrity.
o Masking: Concealed values, sensitive data.
o Tokenization: Random tokens, secure storage.
o Obfuscation: Difficult to understand, protect IP.
o Segmentation: Isolated components, access control.
o Permission Restrictions: User permissions, least privilege.
430
▪ Tasks: Logs incidents, compiles reports.
o Endpoint Agents:
▪ Function: Enforces policy on client computers, even when offline.
o Network Agents:
▪ Function: Scans communications at network borders.
▪ Tasks: Interfaces with web and messaging servers to enforce policy.
• DLP Agents:
o Structured Formats: Scans content in databases with formal access control models.
o Unstructured Formats: Scans content in emails, word processing documents.
o Data Transformation: Renders unstructured data in a consistent, scannable format
for policy enforcement.
o Blocking Unauthorized Transfers: Prevents data transfer to removable media,
email, instant messaging, or social media if it violates policy.
o Cloud Storage Protection: Extends protection to cloud services using proxies or
cloud service provider APIs.
• Remediation Mechanisms:
o Alert Only:
▪ Action: Allows copying but logs the incident and may alert an administrator.
o Block:
▪ Action: Prevents copying the original file but retains access.
▪ Logging: Logs the incident, may or may not alert the user.
o Quarantine:
▪ Action: Denies access to the original file, either by encrypting it or moving it
to a quarantine area.
o Tombstone:
▪ Action: Replaces the original file with a notice of the policy violation and
instructions for release.
• Email Protection:
o Client-Side Mechanisms: Prevents attaching files to emails before sending.
o Server-Side Mechanisms: Scans email attachments and message contents, strips
out certain data, or stops the email from reaching its destination.
Key Points:
• Components of DLP Solutions:
431
o Policy Server: Configures rules, logs incidents, compiles reports.
o Endpoint Agents: Enforces policy on client computers.
o Network Agents: Scans communications, interfaces with servers.
• DLP Agents:
o Formats: Structured and unstructured data.
o Data Transformation: Consistent, scannable format.
o Blocking Transfers: Prevents unauthorized data transfer.
o Cloud Protection: Extends to cloud services.
• Remediation Mechanisms:
o Alert Only: Logs incident, may alert administrator.
o Block: Prevents copying, logs incident.
o Quarantine: Denies access, encrypts or moves file.
o Tombstone: Replaces file with notice.
• Email Protection:
o Client-Side: Prevents attaching files.
o Server-Side: Scans, strips data, stops email.
Conduct Policies
Summary: Operational policies include privilege/credential management, data handling, and
incident response. Important security policies also govern employee conduct and respect for
privacy, such as acceptable use policies, codes of conduct, and clean desk policies.
Detailed Explanation:
• Acceptable Use Policy (AUP):
o Definition: Protects the organization from security and legal implications of
equipment misuse.
o Prohibitions: Defrauding, defaming, obtaining illegal material, installing
unauthorized hardware/software, snooping on confidential data.
o Guidelines: Must be reasonable and not interfere with job duties or privacy rights.
o Internet Use: May restrict to work-related duties or break times.
• Code of Conduct and Social Media Analysis:
432
o Definition: Sets out expected professional standards.
o Risks: Virus infection, system intrusion, lost work time, copyright infringement,
defamation.
o Data Communications: Likely stored, logged, and monitored.
o Social Media Monitoring: Employers may analyze personal accounts for policy
infringements.
o Privileged Access: Clauses to prevent misuse of privileges by technicians and
managers.
• Use of Personally Owned Devices in the Workplace:
o Threats: File copying, camera, and voice-recording functions.
o Controls: Network access control, endpoint management, data loss prevention
solutions.
o Enforcement: Difficult to prevent staff from bringing personal devices on-site.
o Shadow IT: Unauthorized use of personal software/services poses security
vulnerabilities.
• Clean Desk Policy:
o Definition: Work areas should be free from documents.
o Purpose: Prevent unauthorized access to sensitive information.
Key Points:
• Acceptable Use Policy (AUP):
o Protection: Security and legal implications.
o Prohibitions: Unauthorized activities, hardware/software installation.
o Guidelines: Reasonable, non-intrusive.
• Code of Conduct and Social Media Analysis:
o Standards: Professional behavior.
o Risks: Security threats, legal issues.
o Monitoring: Data communications, social media.
• Use of Personally Owned Devices:
o Threats: Data security risks.
o Controls: Network access, endpoint management.
o Shadow IT: Unauthorized software/services.
• Clean Desk Policy:
o Work Areas: Free from documents.
433
o Purpose: Protect sensitive information.
434
o Vulnerability: Susceptibility to attacks, data mishandling.
o Scope: All employee levels.
• General Training Topics:
o Security Policies: Organizational policies, penalties.
o Incident Reporting: Identification, reporting procedures.
o Site Security: Procedures, safety drills, secure areas.
o Data Handling: Confidentiality, PII, backup, encryption.
o Password Management: Account, security features.
o Threat Awareness: Social engineering, malware, phishing.
o Software Use: Browsers, email clients, Internet access.
• Role-Based Training:
o Identification: Security-sensitive roles.
o Grading: Training levels based on roles.
o Focus: Job roles, not titles.
• NIST Framework:
o NICE Framework: KSAs for cybersecurity roles.
o SP800-50: Security awareness programs.
435
o Simulations: Recreating system interfaces or using emulators for practice.
o Branching Scenarios: Choosing options to solve cybersecurity incidents.
o Gamification Elements: Badges, level-up bonuses, digitized loot to enhance
engagement.
• Critical Elements for Security Awareness Training:
o Policy/Handbooks: Familiarize users with organizational policies and guidelines.
o Situational Awareness: Recognize and respond to potential security threats.
o Insider Threat: Educate about risks and signs of insider threats.
o Password Management: Create strong passwords, avoid reuse, use multifactor
authentication.
o Removable Media and Cables: Risks of unauthorized use, loss, or theft.
o Social Engineering: Awareness of tactics like phishing, pretexting, baiting.
o Operational Security: Promote good security practices in daily operations.
o Hybrid/Remote Work Environments: Address security challenges of remote work.
• Phishing Campaigns:
o Simulated Attacks: Raise awareness and educate employees about phishing risks.
o Training Benefits: Enhance threat awareness, protect sensitive information,
mitigate social engineering risks, promote incident response, strengthen security
practices.
• Anomalous Behavior:
o Recognition: Identify actions or patterns deviating from expectations.
o Examples: Unusual network traffic, user account anomalies, insider threat actions,
abnormal system events, fraudulent transactions.
o Techniques: Network intrusion detection, user behavior analytics, system log
analysis, fraud detection.
• Recognizing Risky Behaviors:
o Risky Behaviors: Actions threatening data security (e.g., clicking suspicious links,
using weak passwords).
o Unexpected Behaviors: Deviations from security protocols (e.g., unauthorized
access, bypassing controls).
o Unintentional Behaviors: Actions without malicious intent but with detrimental
consequences (e.g., accidental data breaches).
Key Points:
• Training Techniques:
436
o Workshops, One-on-One, CBT: Diverse methods for engagement.
o Gamification: Competitive challenges, simulations, branching scenarios.
• Critical Training Elements:
o Policies, Situational Awareness, Insider Threat: Key topics for awareness.
o Password Management, Removable Media, Social Engineering: Practical
security practices.
o Operational Security, Remote Work: Address daily and remote work challenges.
• Phishing Campaigns:
o Simulated Attacks: Educate about phishing risks.
o Training Benefits: Enhance awareness, protect information, mitigate risks.
• Anomalous Behavior:
o Recognition: Identify deviations from expectations.
o Techniques: Detection and analysis methods.
• Recognizing Risky Behaviors:
o Risky, Unexpected, Unintentional: Types of behaviors to be aware of.
o Training and Education: Promote security-conscious culture.
437
o Monitoring and Adaptation: Continuously evaluate the program's impact and
adjust based on emerging risks and changing requirements.
• Development and Execution of Training:
o Content Development: Create engaging materials using clear language and real-
world examples.
o Interactive Elements: Include quizzes, case studies, simulations to encourage
participation and practical application.
o Facilitation: Use dialogue, discussion, and Q&A sessions to enhance learning.
o Effectiveness Assessment: Collect feedback, conduct assessments, and develop
metrics to gauge training impact.
o Regular Updates: Ensure content remains relevant and aligned with evolving
threats.
• Reporting and Monitoring:
o Initial Effectiveness: Measure immediate impact through pre- and post-training
assessments, quizzes, and surveys.
o Recurring Effectiveness: Assess long-term impact and sustainability by examining
behavioral changes and security consciousness over time.
o Assessments and Quizzes: Measure knowledge gained and comprehension.
o Incident Reporting: Track and analyze incident reports to assess training impact on
detection and response.
o Phishing Simulations: Evaluate employees' ability to recognize and respond to
phishing attempts.
o Observations and Feedback: Gather qualitative insights from managers and
supervisors.
o Metrics and Performance Indicators: Track relevant metrics to measure training
impact over time.
o Training Completion Rates: Monitor completion rates to gauge employee
engagement and adherence.
Key Points:
• Lifecycle Stages:
o Assessment: Identify needs and risks.
o Planning and Design: Develop comprehensive plan.
o Development: Create engaging materials.
o Delivery: Implement training sessions.
o Evaluation and Feedback: Assess effectiveness.
438
o Reinforcement: Conduct recurring activities.
o Monitoring and Adaptation: Continuously evaluate and adjust.
• Development and Execution:
o Content Development: Engaging materials, real-world examples.
o Interactive Elements: Quizzes, case studies, simulations.
o Facilitation: Dialogue, discussion, Q&A.
o Effectiveness Assessment: Feedback, assessments, metrics.
o Regular Updates: Align with evolving threats.
• Reporting and Monitoring:
o Initial Effectiveness: Pre- and post-training assessments.
o Recurring Effectiveness: Long-term impact, behavioral changes.
o Assessments and Quizzes: Knowledge and comprehension.
o Incident Reporting: Track and analyze incidents.
o Phishing Simulations: Evaluate phishing response.
o Observations and Feedback: Qualitative insights.
o Metrics and Performance Indicators: Track impact over time.
o Training Completion Rates: Gauge engagement and adherence.
439