PROVEN FAST, EFFECTIVE & AFFORDABLE EXAM PREP with Pete Zerger CISSP, vCISO, MVP securiTY+ EXAM CRAM ©2022 No reuse without written permission DOMAIN 1 PROVEN FAST, EFFECTIVE & AFFORDABLE EXAM PREP with Pete Zerger CISSP, vCISO, MVP securiTY+ EXAM CRAM EXAM OBJECTIVES (DOMAINS) 1.0 Attacks, Threats, and Vulnerabilities 24% 2.0 Architecture and Design 21% 3.0 Implementation 25% 4.0 Operations and Incident Response 16% 5.0 Governance, Risk, and Compliance 14% ULTIMATE STRATEGY GUIDE PROVEN FAST, EFFECTIVE & AFFORDABLE EXAM PREP securiTY+ EXAM CRAM with Pete Zerger CISSP, vCISO, MVP CompTIA Security+ Exam Cram EXAM NUMBER: SY0-601 • 1.0 Threats, Attacks and Vulnerabilities Covering all topics in the official Security+ exam objectives 1.0 Threats, Attacks and Vulnerabilities 1.1 • • • • • • • • • • • • Compare and contrast different types of social engineering techniques Phishing Smishing Vishing Spam Spam over instant messaging (SPIM) Spear phishing Dumpster diving Shoulder surfing Pharming Tailgating Eliciting information Whaling • • • • • • • • • • • Prepending Identity fraud Invoice scams Credential harvesting Reconnaissance Hoax Impersonation Watering hole attack Typosquatting Pretexting Influence campaigns • Hybrid warfare • Social media • Principles (reasons for effectiveness) • • • • • • • Authority Intimidation Consensus Scarcity Familiarity Trust Urgency Classifying Social engineering attacks At a high level, two categories of social engineering attacks: ✓ Tailgating ✓ Shoulder surfing ✓ Dumpster diving ✓ ✓ ✓ ✓ ✓ ✓ Phishing Spear Phishing Whaling Vishing Hoax Watering hole attack 1.1 Compare and contrast different types of social engineering techniques Social engineering techniques Best defense for both is security awareness training (user education) an attempt by an attacker to convince someone to provide info (like a password) or perform an action they wouldn’t normally perform (such as clicking on a malicious link) Social engineers often try to gain access to the IT infrastructure or the physical facility. commonly used to try to trick users into giving up personal information (such as user accounts and passwords), click a malicious link, or open a malicious attachment. Spear phishing targets specific groups of users Whaling targets high-level executives phishing is #1 cyber attack! Vishing (voice phishing) phone-based An entry point for ransomware! Smishing uses sms(text) messaging on mobile Know all these variants! spam and spim Unsolicited email, generally considered an irritant defeat with strong spam filtering SPAM over instant messaging, also generally considered an irritant IM and mobile providers providing some protection here Create cryptic usernames and do not list your ID in the IM service public directory Not always just an irritant! Both are delivery channels for ransomware! SOCIAL ENGINEERING TECHNIQUES WHAT IS Gathering important details (intelligence) from things that people have thrown out in their trash. Often legal, and may target individuals or organizations SOCIAL ENGINEERING TECHNIQUES when an unauthorized individual might follow you in through that open door without badging in themselves. Usually not an accident! aka ‘elicitation’ strategic use of casual conversation to extract information without the arousing suspicion of the target Can involve complex cover stories and co-conspirators! SOCIAL ENGINEERING TECHNIQUES when an unauthorized individual might follow you in through that open door without badging in themselves. Usually not an accident! aka ‘elicitation’ strategic use of casual conversation to extract information without the arousing suspicion of the target Techniques include flattery, false statements, artificial ignorance, bracketing SOCIAL ENGINEERING TECHNIQUES a criminal practice where thieves steal your personal data by spying over your shoulder Can happen anywhere with any device an online scam similar to phishing, where a website's traffic is manipulated, and confidential information is stolen. a portmanteau of the words "phishing" and "farming", SOCIAL ENGINEERING TECHNIQUES use of another person's personal information, without authorization, to commit a crime or to deceive or defraud that person or other 3rd party aka “identity theft” Prepending is adding words or phrases like “SAFE” to a malicious file or suggesting topics via social engineering to uncover information of interest. fake invoices with a goal of receiving money or by prompting a victim to put their credentials into a fake login screen. SOCIAL ENGINEERING TECHNQUES attackers trying to gain access to your usernames and passwords that might be stored on your local computer This is a frequent goal of phishing attempts SOCIAL ENGINEERING TECHNQUES attackers trying to gain access to your usernames and passwords that might be stored on your local computer COUNTERMEASURES: email defense, anti-malware, EDR/XDR solutions that will check URLs and block the scripts often used to execute the attack reconnaissance A common technique that comes in multiple forms Passive discovery Techniques that do not send packets to the target; like Google hacking, phone calls, DNS and WHOIS lookups Semi-passive discovery Touches the target with packets in a non-aggressive fashion to avoid raising alarms of the target Active discovery More aggressive techniques likely to be noticed by the target, including port scanning, and tools like nmap and Metaspoit SOCIAL ENGINEERING TECHNIQUES Intentional falsehoods coming in a variety of forms ranging from virus hoaxes to fake news. Social media plays a prominent role in hoaxes today A form of fraud in which attackers pose as a known or trusted person to dupe the user into sharing sensitive info, transferring money, etc. Attack strategy in which an attacker guesses or observes which websites an organization often uses and infects one or more of them with malware typosquatting aka “URL hijacking” a form of cybersquatting (sitting on sites under someone else’s brand or copyright) targeting users who type an incorrect website address Often employ a drive-by download that can infect a device even if the user does not click anything pretexting an attacker tries to convince a victim to give up information of value, or access to a service or system. The distinguishing feature… Is that the attacker develops a story, or pretext, in order to fool the victim. The pretext often leans on establishing authority for the attacker as someone who should have access to information. The pretext often includes a character played by the scam artist, and a plausible situation in which that character needs access to information. INFLUENCE CAMPAIGNS A social engineering attack intended to manipulate the thoughts and minds of large groups of people Attack using a mixture of conventional and unconventional methods and resources to carry out the campaign Social media May use multiple social platforms leveraging multiple/many individuals to amplify the message, influencing credibility. May involve creating multiple fake accounts to post content and seed the spread. and may even include paid advertising. principles of social engineering Authority Citing position, responsibility, or affiliation that grants the attacker the authority to make the request. Intimidation Suggesting you may face negative outcomes if you do not facilitate access or initiate a process. Consensus Claiming that someone in a similar position or peer has carried out the same task in the past. Scarcity quantity Limited opportunity, diminishing availability that requires we get this done in a certain amount of time, similar to urgency. principles of social engineering Familiarity aka ‘liking’ Attempting to establish a personal connection, often citing mutual acquaintances, social proof. Trust Citing knowledge and experience, assisting the to target with a issue, to establish a relationship. Urgency Time sensitivity that demands immediate action, similar to scarcity 1.0 Threats, Attacks and Vulnerabilities Given a scenario, analyze potential indicators 1.2 to determine the type of attack • Malware • • • • • • • • • • • • • • Ransomware Trojans Worms Potentially unwanted programs (PUPs) Fileless virus Command and control Bots Crypto-malware Logic bombs Spyware Keyloggers Remote access Trojan (RAT) Rootkit Backdoor • Password attacks • • • • • • • Spraying Dictionary Brute force Offline Online Rainbow table Plaintext/unencrypted • Physical attacks • Malicious Universal Serial Bus (USB) cable • Malicious flash drive • Card cloning • Skimming • Adversarial artificial intelligence (AI) • Tainted training data for machine learning (ML) • Security of machine learning algorithms • Supply-chain attacks • Cloud-based vs. onpremises attacks • Cryptographic attacks • Birthday • Collision • Downgrade application attacks attacks attackers use to exploit poorly written software. Rootkit (escalation of privilege) freely available on the internet and exploit known vulnerabilities in various operating systems enabling attackers to elevate privilege. keep security patches up-to-date anti-malware software, EDR/XDR Back Door undocumented command sequences that allow individuals with knowledge of the back door to bypass normal access restrictions. often used in development and debugging. countermeasures: firewalls, anti-malware, network monitoring, code review TYPES OF VIRUSES WHAT IS A a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another. a class of threat with many types TYPES OF VIRUSES You should know key characteristic(s) of each for the exam! Crypto-malware Ransomware that encrypts files stored on a computer or mobile device in order to extort money. Hoaxes Virus hoaxes are a nuisance that result in wasted resources. Used to spread through “email from a friend” but have changed with social media. Logic Bombs Logic bombs are malicious code objects that infect a system and lie dormant until they are triggered by the occurrence of one or more conditions, such as time, program launch, website logon, etc. TYPES OF VIRUSES WHAT IS A a software program that appears good and harmless but carries a malicious, hidden payload that has the potential to wreak havoc on a system or network. good defense? 1) only allow software from trusted sources. 2) don’t let users install software Malware Worm a type of malware that spreads copies of itself from computer to computer, replicating itself without human interaction. Potentially unwanted programs (PUPs) a program that may be an unwanted app, often delivered alongside a program the user wants. PUPs include spyware, adware, and dialers. Keylogger Designed to log keystrokes, creating records of everything you type on a computer or mobile keyboard. Spyware Malware designed to obtain information about an individual, system, or organization. malware a type of malicious software that does not rely on virus-laden files to infect a host. Instead, it exploits applications that are commonly used for legitimate and justified activity to execute malicious code in resident memory. a computer controlled by an attacker or cybercriminal which is used to send commands to systems compromised by malware and receive stolen data from a target network. a malware program that gives an intruder administrative control over a target computer. MOST COMMON ATTACKS WHAT IS infects a target machine and then uses encryption technology to encrypt documents, spreadsheets, and other files stored on the system with a key known only to the malware creator. MOST COMMON ATTACKS WHAT IS user is then unable to access their files and receives an ominous pop-up message warning that the files will be permanently deleted unless a ransom is paid within a short period of time. ransomware is a trojan variant ransomware countermeasures & prevention There are a number of countermeasures and prevention techniques: countermeasures - Back up your computer - Store backups separately - File auto-versioning cloud-hosted email and file storage ease this process ©2022 Inside Cloud and Security. No reuse without written permission ransomware countermeasures & prevention There are a number of countermeasures and prevention techniques: Prevention - Update and patch computers - Use caution with web links - Use caution with email attachments - Verify email senders AI-driven cloud services offer help with these - Preventative software programs - User awareness training Most important defense! Password attacks Use programs with built in dictionaries. They attempt all dictionary words to try and find the correct password, in the hope that a user would have used a standard dictionary word. Effective countermeasures include MFA, biometric authentication, limit number of attempts, force resets after certain number of failed attempts. Password attacks Password spraying a type of brute force attack Attacker tries a password against many different accounts to avoid lockouts that typically come when brute forcing a single account. Succeeds when admin or application sets a default password for new users. Effective countermeasures include MFA, CAPTCHA, and forcing password change on first login. Password attacks Attempt to discover passwords from a captured database or captured packet scan. Attempts to discover a password from an online system. For example, an attacker trying to log on to an account by trying to guess a user’s password. most web and wi-fi attacks are online attacks Protocols and authentication methods that leave credentials unencrypted, like basic authentication and telnet. Password attacks Brute Force Attack Attempts to randomly find the correct cryptographic key attempting all possible combinations (trial and error) Password complexity and attacker resources will determine effectiveness of this attack. rainbow tables and powerful compute resources make this attack more effective Effective countermeasures include cryptographic salts, Captcha, throttling the rate of repeated logins, and IP blocklists Password attacks Attackers may use rainbow tables, which contain precomputed values of cryptographic hash functions to identify commonly used passwords Cryptographic A salt is random data that is used as an additional input to a one-way function that hashes data, a password or passphrase. Adding salts to the passwords before hashing them reduces the effectiveness of rainbow table attacks. multi-attack prevention Something you know (pin or password) Something you have (trusted device) Something you are (biometric) prevents: — Phishing — Credential stuffing — Spear phishing — Brute force and reverse brute force attacks — Keyloggers — Man-in-the-middle (MITM) attacks BOTS, BOTNETS, AND BOT HERDERS represent significant threats due to the massive number of computers that can launch attacks Botnet a collection of compromised computing devices (often called bots or zombies). Bot Herder criminal who uses a command-and-control server to remotely control the zombies often use the botnet to launch attacks on other systems, or to send spam or phishing emails physical attacks Attack comes in two common forms: Drives dropped where they are likely to be picked up. Sometime effectively a trojan, shipped with malware installed after leaving the factory. Less likely to be noticed than a flash drive. May be configured to show up as a human interface device (e.g. keyboard) Less common because it requires dedicated engineering physical attacks Focuses on capturing info from cards used for access, like RFID and magnetic stripe cards. Involve fake card readers or social engineering and handheld readers to capture (skim) cards, then clone so attacker may use for their own purposes Device (skimmer) often installed at POS devices like ATM and gas pumps adversarial artificial intelligence A rapidly developing field targeting AI and ML Tainted training data for machine learning (ML) Data poisoning that supplies AI and ML algorithms with adversarial data that serves the attackers purposes, or attacks against privacy. Security of machine learning algorithms Validate quality and security of the data sources. Secure infrastructure and environment where AI and ML is hosted. Review, test, and document changes to AI and ML algorithms. Know the difference between AI & ML for the exam ARTIFICIAL INTELLIGENCE VS MACHINE LEARNING Knowing the difference will help on the exam! Focuses on accomplishing “smart” tasks combining machine learning and deep learning to emulate human intelligence A subset of AI, computer algorithms that improve automatically through experience and the use of data. a subfield of machine learning concerned with algorithms inspired by the structure and function of the brain called artificial neural networks. supply chain attacks a cyber-attack that seeks to damage an organization by targeting less-secure elements in the supply chain. Often attempt to compromise devices, systems, or software before it reaches an organization. Sometimes focus on compromising a vulnerable vendors in the organization’s supply chain, and then attempting to breach the target organization. Known as an “island hopping” attack Supply chain attacks can have massive consequences for organizations upstream and downstream in the supply chain cloud-based vs on-premises attacks Data center is often more secure and less vulnerable to disruptive attacks (like DDoS) On the downside, you will not have facilitylevel or physical system-level audit access. Changes (and limits) the attacks you will worry about You do not benefit from the cloud’s shared responsibility model. You have more control but are responsible for security of the full stack. Org has to defend a wider range of attacks and greater expense and effort to defend against them. common cryptographic attacks attack on a cryptographic hash to find two inputs that produce the same hash value beat with collision-resistant hashes when a protocol is downgraded from a higher mode or version to a low-quality mode or lower version. commonly targets TLS common cryptographic attacks an attempt to find collisions in hash functions. commonly targets digital signatures an attempt to reuse authentication requests. targets authentication (often Kerberos) common cryptographic attacks an attempt to find collisions in hash functions. defeat with long hash output (to make it computationally infeasible) an attempt to reuse authentication requests. defeat with date/time stamps 1.0 Threats, Attacks and Vulnerabilities Given a scenario, analyze potential indicators 1.3 associated with application attacks • Privilege escalation • Cross-site scripting • Injections • Race conditions • Time of check/time of use • Structured query language (SQL) • Dynamic-link library (DLL) • Lightweight Directory Access Protocol (LDAP) • Extensible Markup Language (XML) • Pointer/object dereference • Directory traversal • Buffer overflows • Error handling • Improper input handling • Replay attack • Session replays • Integer overflow • Request forgeries • Server-side • Cross-site • Application programming interface (API) attacks • Resource exhaustion • Memory leak • Secure Sockets Layer (SSL) stripping • Driver manipulation • Shimming • Refactoring • Pass the hash ©2022 Inside Cloud and Security. No reuse without written permission APPLICATION ATTACKS A security hole created when code is executed with higher privileges than those of the user running it. Request forgeries a type of injection using malicious scripts Cross-site scripting (XSS) a client-side vulnerability A type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. Occur when an attacker uses a web application to send malicious code to a different end user. occur when web apps contain ‘reflected input’ Input validation and filtering. Validate data length AND data type. This filters out malicious input (like a <SCRIPT> tag) Request forgeries exploits website trust to execute code Cross-site request forgery (XSRF or CSRF) similar to cross-site scripting attacks but exploits a different trust relationship. exploits trust a website has for your browser to execute code on the user’s computer. create web apps that use secure tokens, and sites that check the referring URL in requests to ensure it came from local site! injections (injection attacks) Dynamic-link library (DLL) Is a situation in which the malware tries to inject code into the memory process space of a library using a vulnerable/compromised DLL. Lightweight Directory Access Protocol (LDAP) exploits weaknesses in LDAP implementations. This can occur when the user’s input is not properly filtered, and the result can be executed commands, modified content, or results returned to unauthorized queries. Extensible Markup Language (XML) when users enter values that query XML (known as XPath) with values that take advantage of exploits, it is known as an XML injection attack. XPath works in a similar manner to SQL, except that it does not have the same levels of access control, so exploits can return entire documents. The best defense is to filter the user’s input and sanitize it to make certain that it does not cause XPath to return more data than it should. injections (injection attacks) Improper input handling used to compromise web front-end and backend databases SQL injection attacks Use unexpected input to a web application to gain unauthorized access to an underlying database. NOT new and can be prevented through good code practices Countermeasures: Input validation, use prepared statements, and limit account privileges. pointer/object dereference An attack that consists of finding null references in a target program and dereferencing them, causing an exception to be generated. Dereferencing means taking away the reference and giving you what it was actually referring to. The vulnerability in memory that usually causes the applications to crash or a denial of service is a NULL Pointer dereference. In this case, there is nothing at that memory address to dereference (it is empty, or NULL) and the application crashes. Good coding is the best protection. Code should check to make sure it is not NULL BEFORE dereferencing it. directory traversal If an attacker is able to gain access to restricted directories through HTTP, it is known as a . One of the simplest ways to perform directory traversal is by using a command injection attack that carries out the action. If successful, may allow attacker to get to site’s root directory, Most vulnerability scanners will check for weaknesses with directory traversal/command injection and inform you of their presence. To secure your system, you should run a scanner and keep the web server software patched. Buffer overflows attacks attackers use to exploit poorly written software. Buffer Overflow exist when a developer does not validate user input to ensure that it is of an appropriate size (allows Input that is too large can “overflow” memory buffer). prevent with INPUT VALIDATION ! race conditions A condition where the system's behavior is dependent on the sequence or timing of other uncontrollable events. Time-of-Check-to-Time-of-Use (TICTOU) a timing vulnerability that occurs when a program checks access permissions too far in advance of a resource request. file locking, transactions in file system or OS kernel It becomes a bug when one or more of the possible behaviors is undesirable. Related to input validation is error handling Every function that has any meaningful functionality should have appropriate error handling. Properly done, the user will simply see an error message box If a program crashes, it is a sign of poor error handling! Error handling is an element of good coding practices common cryptographic attacks an attempt to reuse authentication requests. targets authentication (Kerberos a frequent target) an attacker steals a valid session ID of a user and reuses it to impersonate an authorized user and perform fraudulent transactions or activities. Disallow session ID reuse in web apps integer overflow Putting too much information into too small of a space that has been set aside for numbers. A type of arithmetic overflow error when the result of an integer operation does not fit within the allocated memory space. Instead of an error handled in the program, it usually causes the result to be unexpected. Often lead to buffer overflows, and generally ranked as one of the most dangerous software errors. Error messages may include ‘overflow’ or ‘arithmetic overflow’ Countermeasures: Good coding practices, appropriate typing of variables, using larger variable types, like long (Java) or long int (C) Attempts to manipulate the application programming interface (API) Include DDoS, Man in the Middle, and injection attacks focused on an API Goals are to gain additional resource or data access, or interrupt service Countermeasures: Transport Layer Security (TLS), OAuth, request timestamps, key/password hash resource exhaustion a form of DoS attack (when intentional) When an application continuously allocates additional resources, exhausting machine resources, leading the system to hang or crash. When exploited, resource exhaustion vulnerabilities in apps, software, or system security that hang, crash, or interfere with external programs perform designated tasks properly. Memory leaks can lead to resource exhaustion (see “memory leaks” in this session). However, these attacks can be executed by exhausting other resource subsystems, such as CPU, disk, or network. Countermeasures: Good software development practices (e.g. preventing memory leaks), limiting what files and apps can be executed on endpoints. memory leak Which languages are susceptible? Many modern programming languages (such as C# and Java) don’t allow the programmer to directly allocate or deallocate memory. Therefore, those programming languages are not prone to memory leaks. However, certain older languages, most notably C and C++, give the programmer a great deal of control over memory management. Cause Memory leaks are usually caused by failure to deallocate memory that has been allocated. A static code analyzer can check to see if all memory allocation commands (malloc, alloc, and others) have a matching deallocation command. secure sockets layer (ssl) stripping aka ‘SSL downgrading’. A technique by which a website is downgraded from https to http This attack downgrades your connection from HTTPS to HTTP and exposes you to eavesdropping and data manipulation. To execute an SSL strip attack, there must be three entities – victim’s system, secure web server, and attacker’s system. In order to “strip” the TLS/SSL, an attacker intervenes in the redirection from HTTP to HTTPS and intercepts a request from the user to the server. TLS has replaced SSL, so this attack affects TLS as well Countermeasures: Enable HTTPS on ALL pages of your website. Implement a HTTP Strict Transport Security (HSTS) policy, so the browser requires HTTPS. driver manipulation Shimming A shim is a small library that is created to intercept API calls transparently and do one of three things: 1) handle the operation itself, 2) change the arguments passed, or 3) redirect the request elsewhere. Involves creating a library (or modifying an existing) to bypass a driver and perform a function other than the one for which the API was created. Refactoring The name given to a set of techniques used to identify the flow and then modify the internal structure of code without changing the code’s visible behavior. In legitimate scenarios, this is done in order to improve the design, to remove unnecessary steps, and to create better code. In malware, this is often done to look for opportunities to take advantage of weak code and look for holes that can be exploited. pass the hash typically targets NTLM a technique whereby an attacker captures a password hash (as opposed to the password characters) and then passes it through for authentication and lateral access. Pass-the-ticket targets Kerberos One primary difference between pass-the-hash and pass-the-ticket, is ticket expiration Kerberos TGT tickets expire (10 hours by default) whereas NTLM hashes only change when the user changes their password. A TGT ticket must be used within its lifetime, or it can be renewed for a longer period (7 days). Enforce least privilege access, analyze applications to determine which require admin privileges, use flexible policies that allow only trusted applications to run and in specific context. “Credential Guard” in Windows 10 encrypts hash in memory, stopping this attack 1.0 Threats, Attacks and Vulnerabilities Given a scenario, analyze potential indicators 1.4 associated with network attacks • Wireless Evil twin Rogue access point Bluesnarfing Bluejacking Disassociation Jamming Radio frequency identification (RFID) • Near-field communication (NFC) • Initialization vector (IV) • • • • • • • • On-path attack (previously known as man-in-themiddle attack/ man-in-thebrowser attack) • Layer 2 attacks • Address Resolution Protocol (ARP) poisoning • Media access control (MAC) flooding • MAC cloning • Domain name system (DNS) • Domain hijacking • DNS poisoning • Uniform Resource Locator (URL) redirection • Domain reputation • Distributed denial-ofservice (DDoS) • Network • Application • Operational technology (OT) • Malicious code or script execution • • • • • PowerShell Python Bash Macros Visual Basic for Applications (VBA) On-path (Man-in-the-middle) attack Attacker sits in the middle between two endpoints and is able to intercept traffic, capturing (and potentially changing) information. Fools both parties into communicating with the attacker (in between the two) instead of directly with each other. Different versions of the attack exist, some affecting websites, email communications, DNS lookups, or Wi-Fi networks. Countermeasures: only use secured Wi-Fi, VPN, HTTPS, and use multi-factor authentication. Mobile and wireless attacks to prevent, use long pin, 2FA, and disable discovery mode annoyance data theft eavesdropping or hacking pranksters push unsolicited messages to engage or annoy other nearby Bluetooth through a loophole in Bluetooth messaging options data theft using Bluetooth. Vulnerable devices are those using bluetooth in public places with device in discoverable mode. developed a year after bluejacking, creates a backdoor attack before returning control of the phone to its owner. Mobile and wireless attacks A malicious fake wireless access point set up to appear as a legitimate, trusted network. Common in airports and coffee shops A type of DoS attack in which the attacker breaks the wireless connection between the victim device and the access point. Gives attacker a window to inject an evil twin A DoS attack that prevents other nodes from using the channel to communicate by occupying the channel that they are communicating on. Can be difficult to detect & often unintentional Mobile and wireless attacks RADIO FREQUENCY IDENTIFICATION NEAR FIELD COMMUNICATION Vulnerable to several classes of attack, like sniffing (or eavesdropping), spoofing, cloning, replay, relay, and DoS attacks RFID commonly used in access badge systems Built on RFID, often used with payment systems. Subject to many of the same vulnerabilities as RFID The touch pay system at the grocery modifies the initialization vector of an encrypted wireless packet during transmission. Enables attacker to compute the RC4 key stream generated by IV used and decrypt all other packets. Fairly uncommon today (legacy) DNS attacks attacker alters the domain-name-to-IPaddress mappings in a DNS system may redirect traffic to a rogue system OR perform denial-of-service against system. attacker sends false replies to a requesting system, beating the real reply from the valid DNS server. COUNTERMEASURES: allow only authorized changes to DNS, restrict zone transfers, verified forwarders and log all privileged DNS activity. network attacks Similar to DNS spoofing Can take the form of DNS spoofing or can simply be an alteration of the hyperlink URLs is usually successful because people just click links! Use same precautions used against DNS spoofing, and services that mask and test links in detonation chamber. network attacks these are a class of attacks is a resource consumption attack intended to prevent legitimate activity on a victimized system. Distributed a DoS attack utilizing multiple compromised computer systems as sources of attack traffic. COUNTERMEASURES: firewalls, routers, intrusion detection (IDS), SIEM, disable broadcast packets entering/leaving, disable echo replies, patching Types of ddos attacks Cloud service providers (MSFT, AWS) have DDoS protection built-in Network volume-based attacks targeting flaws in network protocols, often using botnets, using techniques such as UDP, ICMP flooding, or SYN flooding (TCP-based). Application exploit weaknesses in the application layer (Layer 7) by opening connections and initiating process and transaction requests that consume finite resources like disk space and available memory. Operational Technology (OT) Targets the weaknesses of software and hardware devices that control systems in factories, power plants, and other industries, such as IoT devices. Often target weaknesses using the network and application techniques described above. COUNTERMEASURES: IDS, IPS, rate-limiting, firewall ingress/egress filters NETWORK & DENIAL-OF-SERVICE KNOW THE ORDER OF THE 3-WAY It comes up commonly in discussions of TCP/IP-based network attacks! 1) SYN 2) SYN-ACK 3) ACK network attacks a vulnerability which allows an attacker to force users of your application to an untrusted external site. Comes in multiple forms - parameter-based, session restoration, domain-based services and tools provide info as to whether a domain is a trusted email sender or is a source of spam email. SPF and DMARC are all commonly used to ensure email comes from approved senders NETWORK ATTACKS involves an individual changing the domain registration information for a site without the original registrant’s permission. COUNTERMEASURES: domain registration auto-renewal, privacy protection (blocking your name from WHOIS), a trusted domain provider network attacks Layer 2 attacks (OSI model) forcing legitimate MAC table contents out of the switch and forcing a unicast flooding behavior. potentially sends sensitive info to areas of the network where it is not normally intended to go. sending ARP packets across the LAN that contain the attacker’s MAC address and the target’s IP address. Aka “ARP spoofing” network attacks Layer 2 attacks (OSI model) Duplicates the MAC address (hardware address) of a device, allowing attacker to appear as a trusted device. Can be difficult to detect without additional info about the device Countermeasures: network access control (NAC) to provide a validation gate to network access. application attacks Malicious code or scripts that are not malware Commonly PowerShell, Python, Bash, macros, and VBA Comprehensive endpoint security (like XDR), spam/phishing defense, and user education are good countermeasures Microsoft Defender Application Control and Attack Surface Reduction features are effective on Windows endpoints 1.0 Threats, Attacks and Vulnerabilities Explain different threat actors, vectors, 1.5 and intelligence sources • Actors and threats Advanced persistent threat (APT) Insider threats State actors Hacktivists Script kiddies Criminal syndicates Hackers • Authorized • Unauthorized • Semi-authorized • Shadow IT • Competitors • • • • • • • • Attributes of actors • • • • Internal/external Level of sophistication / capability Resources/funding Intent/motivation • • • • • • • Direct access Wireless Email Supply chain Social media Removable media Cloud • Vectors ©2022 Inside Cloud and Security. No reuse without written permission 1.0 Threats, Attacks and Vulnerabilities Explain different threat actors, vectors, 1.5 and intelligence sources • Threat intelligence sources • • • • • • • • Open-source intelligence (OSINT) Closed/proprietary Vulnerability databases Public/private information sharing centers Dark web Indicators of compromise Automated Indicator Sharing (AIS) Structured Threat Information eXpression (STIX)/Trusted Automated eXchange of Intelligence Information (TAXII) • Predictive analysis • Threat maps • File/code repositories • Research sources • • • • • • • • • Vendor websites Vulnerability feeds Conferences Academic journals Request for comments (RFC) Local industry groups Social media Threat feeds Adversary tactics, techniques, and procedures (TTP) actors and threats Threat Actor Skill Description High Conduct sophisticated series of related attacks taking place over an extended period of time. Typically wellorganized, well-funded and highly skilled. Varies people inside the targeted organization and are either responsible for the attack or are colluding with outsiders (who are responsible). State actors High Well-funded, often driving warfare conducted against information processing equipment and municipal services (water, power, etc.) Hacktivists Varies, but often Medium-High a group of hackers working together for a collectivist effort, usually on the behalf of some cause. Low Individuals who use hacking techniques but have limited skills. Often rely almost entirely on automated tools they download from the Internet. Advanced Persistent Threat (APT) Insider threats Script kiddies Actors, threats, skill, funding, and motivation Threat Actor Criminal syndicates Hackers Skill High Med/High Shadow IT Varies Competitors Varies, but often Med/High Description A “structured” threat. Structured threats are conducted over a longer period of time, have more financial backing, and possibly help from insiders. Skilled actor falling into various categories: Unauthorized (malicious), Authorized (Good), Semiauthorized (usually finding but not exploiting) The use of information technology systems, devices, software, applications, and services without explicit IT department approval, often done with good intentions. May encourage individuals within a competitive organization to steal/sell intellectual property. D O M A I N 7 : SECURITY OPERATIONS INSIDE THE Collusion, Fraud, Espionage, and Sabotage preventing fraud and collusion Collusion is an agreement among multiple persons to perform some unauthorized or illegal actions. Separation of duties a basic security principle that ensures that no single person can control all the elements of a critical function or system. Job rotation employees are rotated into different jobs, or tasks are assigned to different employees. Implementing these policies helps prevent fraud by limiting actions individuals can do without colluding with others. espionage & sabotage external insider when a competitor tries to steal information, and they may use an internal employee. malicious insiders can perform sabotage against an org if they become disgruntled for some reason Attack vectors - Methods of attack Countermeasures Vector Description Direct access Physical access to facilities, hardware and infrastructure. Keylogger, flash drive common here. Wireless Unsecure access points, rogue access points, evil twin. Emails SPAM, phishing, ransomware, fake invoice scams. User training Phishing simulations Supply chain Attack on vendors in an organizations supply chain, sometimes as a precursor to direct attack. Vendor screening Social media Individuals who use hacking techniques but have limited skills. However, does factor in hybrid warfare. Acceptable use policies Cloud Unsecure apps, misconfigured infrastructure, shadow IT CASB and config management Physical security Secure Wi-Fi netwks 1.0 Threats, Attacks and Vulnerabilities Explain different threat actors, vectors, 1.5 and intelligence sources • Threat intelligence sources • • • • • • • • Open-source intelligence (OSINT) Closed/proprietary Vulnerability databases Public/private information sharing centers Dark web Indicators of compromise Automated Indicator Sharing (AIS) Structured Threat Information eXpression (STIX)/Trusted Automated eXchange of Intelligence Information (TAXII) • Predictive analysis • Threat maps • File/code repositories • Research sources • • • • • • • • • Vendor websites Vulnerability feeds Conferences Academic journals Request for comments (RFC) Local industry groups Social media Threat feeds Adversary tactics, techniques, and procedures (TTP) ©2022 Inside Cloud and Security. No reuse without written permission threat intelligence sources Open-source intelligence (OSINT) Enables orgs to conduct cyber-threat intelligence gathering free of charge. Sources include threatcrowd.org, openphish.com. Closed/proprietary You may see these vendor-specific threat intelligence feeds limited to paying customers, which are intended to keep customers informed and secure, while not tipping off threat actors (hackers). Vulnerability databases such as www.shodan.io, allow you to search for vulnerabilities. The National Institute of Standards and Technology (NIST) maintains a comprehensive database of vulnerabilities. This is the National Vulnerability Database and it keeps within that database a list of CVEs or Common Vulnerabilities and Exposures. threat intelligence sources Public/private information sharing centers. Programs, groups, and feeds to designed to share cyber intelligence in various forms to government and commercial organizations around the world. The Cybersecurity Infrastructure and Security Agency (CISA), an agency of the US federal government, maintains a list of information sharing centers at https://www.cisa.gov/information-sharing-and-awareness . Dark web This is an overlay to the existing internet that requires specialized software to be able to access these private websites. There’s extensive information to gather from the dark web, including the activities of hacker groups. Indicators of compromise sometimes called “threat indicators” are “pieces of forensic data, such as data found in system log entries or files, that identify potentially malicious activity on a system or network.” threat intelligence sources SIEM solutions can often ingest threat intelligence feeds Sources of shared threat intelligence Automated Indicator Sharing (AIS) a Cybersecurity and Infrastructure Security Agency (CISA) capability, enables the realtime exchange of machine-readable cyber threat indicators and defensive measures. It’s provided free to help protect participants of the AIS community and ultimately reduce the prevalence of cyberattacks. Find it at https://www.cisa.gov/ais Trusted Automated eXchange of Intelligence Information (TAXII) short for Trusted Automated eXchange of Intelligence Information, defines how realtime cyber threat information can be shared via services and message exchanges. Structured Threat Information eXpression (STIX) TAXII is designed specifically to support STIX information, which it does by defining an API that aligns with common sharing models. Created by MITRE, maintained by OASIS threat intelligence sources Predictive analysis. Leverages predictive intelligence, a mix of automation and human intelligence capabilities to optimize your cybersecurity program and gradually build capacity to predict and prevent attacks before they hit. Threat maps A cyber threat map, also known as a cyber attack map, is a real-time map of the computer security attacks that are going on at any given time. Find cyber threat maps from Fortinet, FireEye and other in the Top 8 Cyber Threat Maps File/code repositories. Google searching code repositories on sources like Github can show you what threat actors are using. For example, full source code of Mimikatz is available at https://github.com/ParrotSec/mimikatz. If you’re using open-source software for your business, know that hackers often review popular open-source apps looking for vulnerabilities. Research sources Vendor websites There's usually a page on a vendor's website where they keep track of all of the known vulnerabilities. Often, there's some type of notification process so they can inform you immediately when a new vulnerability is discovered. Vulnerability feeds It's common to supplement vulnerability databases with third party feeds from other organizations. You might roll up all of those vulnerability feeds into one central vulnerability management system. Conferences These are great events to network with experts, hear talks often based on experiences of others, and even hear from members of product teams talking in-depth about security of their app or service. R E S E A R C H SOURCES Offer information about attack types and how others have responded or recovered from them. Available from a variety of government, education, and community sources, often peer-reviewed! usually results in EXAMPLES: Oxford Academic Journal of Cybersecurity https://academic.oup.com/cybersecurity MDPI Switzerland https://www.mdpi.com/journal/jcp higher quality Research sources A publication in a series, from the principal technical development and standards-setting bodies for the Internet, most prominently the Internet Engineering Task Force (IETF). An RFC is authored by individuals or groups of engineers and computer scientists in the form of a memorandum describing methods, behaviors, research, or innovations applicable to the working of the Internet and Internet-connected systems. Research sources A publication in a series, from the principal technical development and standards-setting bodies for the Internet, most prominently the Internet Engineering Task Force (IETF). The IETF adopts some of the proposals published as Internet Standards. However, many are informational or experimental in nature and are not standards. Research sources A publication in a series, from the principal technical development and standards-setting bodies for the Internet, most prominently the Internet Engineering Task Force (IETF). The IETF adopts some of the proposals published as Internet Standards. However, many are informational or experimental in nature and are not standards. RFCs have become official documents of Internet specifications, communications protocols, procedures, and events. Research sources Learning from your peers and community experts Local industry groups You’ll find local interest groups or user groups around cybersecurity (and many related topics) where you can learn from your peers and experts in your local community. Social media Hackers often publish recent vulnerabilities on Twitter Security interest groups and certification study groups on LinkedIn. Video learning content on YouTube on cybersecurity certification, concepts, and entertainment. Research sources automated threat feed that delivers information about the most important threats you need to know about. Tactics, Techniques, and Procedures the behaviors, methods, tools and strategies that cyber threat actors and hackers use to plan and execute cyber attacks on business networks. TTPs are the “why” and “how” of cyber attacks, guidance on response and prevention. 1.0 Threats, Attacks and Vulnerabilities Explain the security concerns associated 1.6 with various types of vulnerabilities • Cloud-based vs. on-premises vulnerabilities • Zero-day • Weak configurations • • • • • • • Open permissions Unsecure root accounts Errors Weak encryption Unsecure protocols Default settings Open ports and services • Third-party risks Vendor management System integration Lack of vendor support Supply chain Outsourced code development • Data storage • • • • • • Improper or weak patch management • Firmware • Operating system (OS) • Applications • Legacy platforms • Impacts • • • • • • • Data loss Data breaches Data exfiltration Identity theft Financial Reputation Availability loss Cloud-based vs. on-premises vulnerabilities A few examples User awareness training is the best defense One type of vulnerability is an untrained user. It only takes one person to cause a breach. For IT, training and formal processes Change and release mgmt, infrastructure-as-code An improperly configured account or service be a significant vulnerability in either model. Many cloud platforms have in-built tooling to alert on current misconfigurations, open configurations, least privilege concerns, etc. On-premises will be more susceptible to disruptive attacks at scale, like DDoS. CSPs have many infrastructure, process, and training advantages On-premises IaaS PaaS SaaS Shared responsibility model RESPONSIBILITY ALWAYS RETAINED BY CUSTOMER RESPONSIBILITY VARIES BY SERVICE TYPE RESPONSIBILITY TRANSFERS TO CLOUD PROVIDER CSP CUSTOMER Image courtesy of Microsoft Better security in the cloud? CLOUD-ENABLED Unique business value ON-PREMISES ADDITIONAL ATTACKS AND CONCEPTS an attack that uses a vulnerability that is either unknown to anyone but the attacker or known only to a limited group of people. basic security practices can often prevent! ADDITIONAL ATTACKS AND CONCEPTS an attack that uses a vulnerability that is either unknown to anyone but the attacker or known only to a limited group of people. Today, AI, ML, and UEBA driven antivirus, SIEM, IDPS, and EDR/XDR solutions offer some defense Weak configurations Open permissions Configurations that have greater than necessary permissions, failing to implement least privilege. Unsecure default configurations, lack of standards, and human error frequently factors. Prevent with DevOps, Infra-as-Code, change and release mgmt Unsecure root accounts Root accounts with default or weak passwords, or without an elevation gate (like sudo). Similar issues have been common on Windows in the past. Errors Humans are the weakest link in cybersecurity Researchers from Stanford University found that approximately 88 percent of all data breaches are caused by an employee mistake. Open ports and services Open ports and running services that are not actually being used increase the attack surface and risk of breach. Weak configurations Weak encryption Choosing strong encryption is key here. Some cipher suites are easier to crack than others. Deprecated cryptographic algorithms often remain in production beyond their recommended lifespan. Unsecure protocols TELNET, SNMP v1 and v2, FTP Most networks involve equipment (such as servers, routers, and switches) that support communication protocols that lack security features. Unsecure protocols allow attackers and hackers to easily have access to your data and even to remote controls. Default settings Often a process issue in business scenarios Every device that you put on your network to manage has a default username and a default password. Often, the defaults are open and available for anybody to use. (wi-fi and IoT) Botnets and offensive security tools will find, and exploit devices with weak default settings still in place. Third-party risks Vendor may end support for legacy application versions before an organization is ready to support dependent business processes on another platform. For apps beyond mainstream support, security patches may be expensive or unavailable entirely. Source code storage and access control will be important. Development workstations and environments must be secured to the organization’s standards. Managed virtual desktop Sensitive data stored in vendor repositories, such as cloud services, needs to be secured, access managed, and usage monitored. Third-party risks Supply chain One impacted customer can result in service impact Supply chain security has become a significant concern for organizations. Includes, suppliers, manufacturers, distributors, and customers. A breach at any link in the supply chain can result in business impact. Vendor management Risk of “island hopping attack” Many orgs are reducing the number of vendors they work with and requiring stricter onboarding procedures Vendors may be required to submit to an external audit and agree to strict communication and reporting requirements in event of potential breach. System integration Potential for Increased risk of insider attack System integration partners working on systems often have privileged remote or physical access, necessitating security measures and process controls. Improper or weak patch management Commonly overlooked in IoT devices and other embedded systems, like VoIP phones. Windows has historically been (and continues to be) the biggest target. In the age of the smartphone, mobile systems are a common target of threat actors. Not rooted, min OS version, and manged In many environments, non-Microsoft applications (commonly called third-party apps) get overlooked for patching. Due in part because many management tools (and software vendors) do not offer the same level of automation. Legacy applications that might require an outdated version of an operating system. May run aging business-critical applications for which staff to manage is difficult to find. Isolation, attack surface reduction, and patching (if possible) are important to minimize exposure of legacy vulnerabilities Sandboxing, the process of isolating legacy apps, such as in a VM, can be an effective approach. Legacy applications that might require an outdated version of an operating system. May run aging business-critical applications for which staff to manage is difficult to find. Lack of vendor support for legacy apps poses a risk. end-of-life date, security updates may no longer be available. Sandboxing, the process of isolating legacy apps, such as in a VM, can be an effective approach. impacts Exposure of sensitive data, such as customer data is the first in a long line of consequences of an attack. When a company suffers a data breach and it is known to the public, it can cause their damage to their brand as they lose the respect of the public. Your domain reputation is dependent on the type of emails you send out. An attack that results in spam from your domain can affect your domain reputation and perhaps result in it being blacklisted. Disruptive attacks like DDoS and ransomware can impact an organization's ability to conduct business, including revenue-producing activities. impacts Identity theft can have far reaching consequences for affected individuals. If any data held on a customer is stolen and then used for identity theft, the company can be sued for damages. Data breaches could result in lost revenue AND regulatory fines. With GDPR, the max fine is 20 million euros or 4% of the company's annual global turnover, whichever is greater. IP theft could result in copyrighted material, trade secrets, and patents being stolen by competitors, resulting in a loss of revenue. This data could be used in countries where a legal route to recover your data would be impossible. 1.0 Threats, Attacks and Vulnerabilities Summarize the techniques used 1.7 in security assessments • Threat hunting • • • • Intelligence fusion Threat feeds Advisories and bulletins Maneuver • Vulnerability scans • • • • • • • • • False positives False negatives Log reviews Credentialed vs. noncredentialed Intrusive vs. non-intrusive Application Web application Network Common Vulnerabilities and • Exposures (CVE)/Common Vulnerability Scoring System (CVSS) • Configuration review • Syslog/Security information and event management (SIEM) • • • • • • • • Review reports Packet capture Data inputs User behavior analysis Sentiment analysis Security monitoring Log aggregation Log collectors • Security orchestration, automation, and response (SOAR) threat hunting a dynamic process of seeking out cybersecurity threats inside your network from attackers and malware threats. Intelligence Fusion involves industry and government Fusion centers in the US and abroad play an important role in countering cyber threats, attacks, and crime through gathering, analyzing, and sharing threat information. Threat Feeds Threat intelligence feeds Enable organizations to stay informed about indicators of compromise (IoCs) related to various threats that could adversely affect the network. threat hunting a dynamic process of seeking out cybersecurity threats inside your network from attackers and malware threats. Advisories and Bulletins Advisories and security bulletins provide good advice on how to keep your company safe. The advisories tend to be released government-funded agencies. Bulletins tend to be released by vendors or private companies. Maneuver A cybersecurity maneuver, then, refers to a company's efforts to defend itself by disguising its systems, thereby making it difficult for an attacker to successfully infiltrate. vulnerability scans A vulnerability scan assesses possible security vulnerabilities in computers, networks, and equipment that can be exploited. False Positive: where the scan believes that there is a vulnerability but when physically checked, it is not there. False Negative: When there is a vulnerability, but the scanner does not detect it. True Positive: This is where the results of the system scan agree with the manual inspection. Log Reviews: Following a vulnerability scan, it is important to review the log files/reports that list any potential vulnerabilities. vulnerability scans A vulnerability scan assesses possible security vulnerabilities in computers, networks, and equipment that can be exploited. Credentialed Scan: A credentialed scan is a much more powerful version of the vulnerability scanner. It has higher privileges than a non-credentialed scan. Spot vulnerabilities that require privilege, like non-expiring PWs Non-Credentialed Scan: A non-credentialed scan has lower privileges than a credentialed scan. It will identify vulnerabilities that an attacker would easily find. Scans can find missing patches, some protocol vulnerabilities vulnerability scans A vulnerability scan assesses possible security vulnerabilities in computers, networks, and equipment that can be exploited. Non-Intrusive Scans: These are passive and merely report vulnerabilities. They do not cause damage to your system. Intrusive Scans: can cause damage as they try to exploit the vulnerability and should be used in a sandbox and not on your live production system. Configuration Review: Configuration compliance scanners and desired state configuration in PowerShell ensure that no deviations are made to the security configuration of a system. The combination of techniques can reveal which vulnerabilities are most easily exploitable in a live environment. vulnerability scans Network Scans: These scans look at computers and devices on your network and help identify weaknesses in their security. Application Scans: Before applications are released, coding experts perform regression testing that will check code for deficiencies. Web Application Scans: Crawl through a website as if they are a search engine looking for vulnerabilities. Perform and automated check for site/app vulnerabilities, such as cross-site scripting and SQL injection. Also know difference between SAST and DAST for the exam There are many sophisticated web application scanners available, due in part due to mass adoption of cloud computing. vulnerability scans Common Vulnerabilities and Exposures (CVE) and Common Vulnerability Scoring System (CVSS) CVSS is the overall score assigned to a vulnerability. It indicates severity and is used by many vulnerability scanning tools. CVE is simply a list of all publicly disclosed vulnerabilities that includes the CVE ID, a description, dates, and comments. The CVSS score is not reported in the CVE listing – you must use the National Vulnerability Database (NVD) to find assigned CVSS scores. The CVE list feeds into the NVD The National Vulnerability Database (NVD) is a database, maintained by NIST, that is synchronized with the MITRE CVE list. SIEM and SOAR Security Information Event Management Security Orchestration Automation, & Response uses AI, ML, and threat intelligence system that collects data from many other sources within the network. provides real-time monitoring, analysis, correlation & notification of potential attacks. centralized alert and response automation with threat-specific playbooks. response may be fully automated or single-click. Many providers deliver these capabilities together Syslog/Security information and event management (SIEM) SIEM has built-in log collector tooling that can collect information from both the syslog server and multiple other servers. An agent is placed on the device that can collect log information, parse and restructure data, and pass to SIEM for aggregation. Ingestion may be with via an agent, syslog, or API Can correlate and aggregate events so that duplicates are filtered and a better understanding network events is achieved to help identify potential attacks. Can capture packets and analyze them to identify threats as soon as they reach your network, providing immediate alert to security team if desired. The SIEM system collects a massive amount of data from various sources. May include network devices, IDM, MDM, CASB, XDR, and more Syslog/Security information and event management (SIEM) This is based on the interaction of a user that focuses on their identity and the data that they would normally access on a normal day. It tracks the devices that the user normally uses and the servers that they normally visit. Artificial intelligence and machine learning to identify attacks. Cybersecurity sentiment analysis can monitor articles on social media, look at the text and analyze the sentiment behind the articles. Over time, can identify a users' attitudes to different aspects of cybersecurity. Real-time protection and event monitoring system that correlates the security events from multiple resources, identifies a breach, and helps the security team to prevent the breach. UEBA, AI, ML, and threat intel feeds all factor here ARTIFICIAL INTELLIGENCE VS MACHINE LEARNING From section 1.2 Knowing the difference will help on the exam! Focuses on accomplishing “smart” tasks combining machine learning and deep learning to emulate human intelligence A subset of AI, computer algorithms that improve automatically through experience and the use of data. a subfield of machine learning concerned with algorithms inspired by the structure and function of the brain called artificial neural networks. Syslog/Security information and event management (SIEM) A SIEM typically includes dashboard and collects reports that can be reviewed regularly to ensure that the policies have been enforced and that the environment is compliant. Also highlight whether the SIEM system is effective and working properly. Are incidents raised true positives? False positives may arise because the wrong input filters are being used or the wrong hosts monitored. For the exam, Know the difference between UEBA, machine learning, AI, and deep learning. Security orchestration, automation, and response (SOAR) Tooling that allows an organization to define incident analysis and response procedures in a digital workflow format. Integrates your security processes and tooling in a central location. Log Collection Response automation, using machine learning and artificial intelligence SIEM SOC These make it faster than humans in identifying and responding to true incidents. Reduces MTTD and accelerates response Uses playbooks that define an incident and the action taken. Capabilities vary by situation & vendor SOAR Over time, should produce faster alerting and response for the SOC team. 1.0 Threats, Attacks and Vulnerabilities 1.8 Explain the techniques used in penetration testing • Penetration testing • • • • • • • • • • Known environment Unknown environment Partially known environment Rules of engagement Lateral movement Privilege escalation Persistence Cleanup Bug bounty Pivoting • Passive and active reconnaissance • • • • • Drones War flying War driving Footprinting OSINT • • • • Red-team Blue-team White-team Purple-team Exercise types ©2022 Inside Cloud and Security. No reuse without written permission Penetration testing CONCEPTS Known environment white box test penetration tester is given a map of target systems and networks. They go into the test with substantial/full information of the target systems and networks. Unknown environment black box test penetration tester knows nothing about target systems and networks. They go into the test completely blind and build out the database of everything they find as they go. Partially known environment grey box test limited information is shared with the tester, sometimes in the form of login credentials. Simulate the level of knowledge that a hacker with long-term access to a system would achieve through research and system footprinting. Rules of engagement Rules of engagement define the purpose of the test, and what the scope will be for the people who are performing this test on the network. They ensure everyone will be aware of what systems will be considered, date and time, and any constraints all should be aware of. Penetration testing CONCEPTS Lateral movement Gaining access to an initial system, then moving to other devices on the inside of the network. Privilege escalation A security hole created when code is executed with higher privileges than those of the user running it. Generally, a higher-level account, but in some cases, it is a horizontal privilege escalation where a user gains access to another users' resources. Persistence in the context of penetration testing refers to the testers ability to achieve a persistent presence in the exploited system— long enough for a bad actor to gain in-depth access. Enabling the ability to reconnect to the compromised host and use it as a remote access tool. Penetration testing Cleanup The final stage of a penetration test, in which all work done during the testing process is cleaned up / removed. Bug bounty A monetary reward given to ethical hackers for successfully discovering and reporting a vulnerability or bug to the application's developer. Bug bounty programs allow companies to leverage the hacker community to improve their systems’ security posture over time continuously. Pivoting Also known as island hopping , a compromised system is used to attack another system on the same network following the initial exploitation . If the compromise is introduced at a different time than the attack, then it is said to involve persistence. Passive and active reconnaissance Passive reconnaissance one is not interacting directly with the target and as such, the target has no way of knowing, recording, or logging activity. War driving Gathering wireless network information while driving around the streets of the city. Drones Can be leveraged in multiple ways for passive reconnaissance, from assessing physical security to gathering wireless network information. War flying Combines war driving with a drone and simply float above all of these organizations to gather wireless details. Enables accumulation of information like SSID or wireless network names, and encryption status of these networks. Passive and active reconnaissance Passive reconnaissance one is not interacting directly with the target and as such, the target has no way of knowing, recording, or logging activity. OSINT Much of this information in the open source can be categorized as open-source intelligence or OSINT. The data that you can gather through these open sources is extensive. A site that gives you a base of information that you can gather is available at https://osintframework.com ©2022 Inside Cloud and Security. No reuse without written permission Passive and active reconnaissance Active reconnaissance interacts directly with the target in some way and as such, the target may discover, record, or log these activities. Footprinting Includes active and passive methods An ethical hacking technique used to gather as much data as possible about a specific targeted computer system, infrastructure and networks to identify opportunities to penetrate them. Active footprinting Ping sweep Tracert analysis Nmap Extracting DNS information Passive footprinting Browsing target website Google search (Google hacking) Performing WHOIS lookup Visiting social media profiles Penetration testing Red Team offense are internal or external entities dedicated to testing the effectiveness of a security program by emulating the tools and techniques of likely attackers in the most realistic way possible. Blue Team defense the internal security team that defends against both real attackers and Red Teams. Purple Team process improvement exist to ensure and maximize the effectiveness of the Red and Blue teams. Team judge / referee responsible for overseeing an engagement/competition between a Red Team of mock attackers and a Blue Team of actual defenders. DOMAIN 2 PROVEN FAST, EFFECTIVE & AFFORDABLE EXAM PREP with Pete Zerger CISSP, vCISO, MVP securiTY+ EXAM CRAM EXAM OBJECTIVES (DOMAINS) 1.0 Attacks, Threats, and Vulnerabilities 24% 2.0 Architecture and Design 21% 3.0 Implementation 25% 4.0 Operations and Incident Response 16% 5.0 Governance, Risk, and Compliance 14% 2.0 architecture and design Explain the importance of security concepts 2.1 in an enterprise environment • Configuration management • • • • Diagrams Baseline configuration Standard naming conventions Internet protocol (IP) schema • • • • • • • • Data loss prevention (DLP) Masking Encryption At rest In transit/motion In processing Tokenization Rights management • Data sovereignty • Data protection • Geographical considerations • Response and recovery controls • Secure Sockets Layer (SSL)/Transport Layer Security (TLS) inspection • Hashing • API considerations • Site resiliency • Deception and disruption • • • • • Honeypots Honeyfiles Honeynets Fake telemetry DNS sinkhole • Hot site • Cold site • Warm site enterprise = large and complex D O M A I N 2 : CONFIGURATION MANAGEMENT Can prevent security related incidents and outages Configuration Management ensures that systems are configured similarly, configurations are known and documented. Baselining ensures that systems are deployed with a common baseline or starting point, and imaging is a common baselining method. Change Management helps reduce outages or weakened security from unauthorized changes. Versioning uses a labeling or numbering system to track changes in updated versions of software. requires changes to be requested, approved, tested, and documented. D O M A I N 2 : CONFIGURATION MANAGEMENT Diagrams: detailed diagrams to show the relationship of all the interconnected devices ensuring security team have visibility of the security in place. Standard Naming Conventions: standard naming convention make identifying device type (router, server, printer) easier. Naming prefixes (e.g. rtr, svr prt) can help Asset Management: Maintain an up-to-date asset register to ease the process of tracking and maintaining assets. Scan for unknown devices, ensure devices are patched Baseline Configurations: It is vital that each type of device being placed on the network has a secure baseline configuration. Image-based deployment, infrastructure-as-code (IaC) Firewall Rules: Firewalls can be used to block traffic and we can use either an MDM solution or group policy to change the configuration on endpoint devices. Standardize and automate configuration (IaC) D O M A I N 2 : CONFIGURATION MANAGEMENT Mobile Device Management (MDM): An MDM solution can be used to push configuration changes to mobile devices. Min iOS/Android version, 6-digit pin, no rooted devices, app management Content Filter/URL Filter: Blocking harmful content with filtering appliances like Unified Threat Management (UTM) or Next Generation (NG) firewalls. UTM bundles features (URL, email, AV, IPS) NG use threat intel feeds Update or Revoke Certificates: Certificates facilitate authentication and secure connectivity (TLS/HTTPS web, IPSec VPN connectivity). Track certificate expiration and ensure minimum TLS version support. IP Schema. Use network segmentation to reduce broadcast traffic and enable filtering/restricting traffic to subnets containing sensitive resources. Matching resources to specific segments maximizes data and resource security. IP subnetting, port filtering Security concepts Digital data is subject to the laws and regulations of the country in which it was created. Sovereignty It cannot be moved to another region—even for a backup-related reason. Data is subject to the laws of where it is stored, which can bring significant legal implications. Moving data out of the EU does not remove GDPR requirements! A company’s Legal department should be consulted to offer guidance on legal impact of geography on data sovereignty. D O M A I N 2 : SECURITY CONCEPTS Confidentiality is often protected through encryption (at rest and in transport) We cover cryptography in section 2.8 of this video DATA PROTECTION Stateless, stronger than encryption, keys not local Reversal requires access to another data source where meaningful data is replaced with a token that is generated randomly, and the original data is held in a vault. de-identification procedure in which personally identifiable information (PII) fields within a data record are replaced by one or more artificial identifiers, or pseudonyms. D O M A I N 2 : DATA PROTECTION when only partial data is left in a data field. for example, a credit card may be shown as **** **** **** 1234 Commonly implemented within the database tier, but also possible in code of frontend applications Data Loss Prevention (DLP) is a way to protect sensitive information and prevent its inadvertent disclosure. can identify, monitor, and automatically protect sensitive information in documents Data Loss Prevention DLP reports showing content that matches the organization's DLP policies policies can be typically applied to email, SharePoint, cloud storage, and in some cases, even databases Protecting data at rest How can we encrypt different types of data at rest? Storage Service Encryption CSPs usually encrypt by default CSP storage providers usually protect data at rest by automatically encrypting before persisting it to managed disks, Blob Storage, file, or queue storage. Full Disk Encryption helps you encrypt Windows and Linux IaaS VMs disks using BitLocker (Windows) and dm-crypt feature of Linux to encrypt OS and data disks. Transparent data encryption (TDE) Helps protect SQL Database and data warehouses against threat of malicious activity with real-time encryption and decryption of database, backups, and transaction log files at rest without requiring app changes. Protecting data at rest Trusted Platform Module (TPM): is on the motherboard and is used to store the encryption keys so when system boots, it can compare keys and ensure that the system has not been tampered with. Hardware Root of Trust: When using certificates for FDE, they use a hardware root of trust that verifies that the keys match before the secure boot process takes place. The OPAL storage specification is the industry standard for self-encrypting drives. This is a hardware solution, and typically outperform software-based alternatives. They don't have the same vulnerabilities as software and therefore are more secure. SEDs are Solid State Drives (SSDs) and are purchased already set to encrypt data at rest. The encryption keys are stored on the hard drive controller. They are immune to a cold boot attack and are compatible with all operating systems SED is effective in protecting the data on lost or stolen devices (such as a laptop). Only the user and vendor can decrypt the data. Protecting data in motion How can we encrypt different types of data in motion? Data in motion is most often encrypted using TLS or HTTPS This is typically how a session is encrypted before a user enters the credit card details. “ “ While similar in function, TLS has largely replaced SSL Protecting data in use / in processing How can we encrypt different types of data in use? Data-in-use/in processing occurs when we launch an application such as Microsoft Word or Adobe Acrobat Apps not running the data from the disk drive but running the application in random access memory (RAM). This is volatile memory, meaning that, should you power down the computer, the contents are erased. Data “in use” is sometimes called data “in processing” Protecting secrets A secret is anything that you want to tightly control access to, such as API keys, passwords, certificates, tokens, or cryptographic keys Protecting Secrets Password access management solutions (PAM) centralized secure storage and access for application secrets This is a common component in DevOps and DevSecOps Enterprise solutions typically offer policy-based access controls and programmatic access to secrets digital rights management Allow content owners to enforce restrictions on the use of their content by others. Digital Rights Management Commonly protect entertainment and media content, such as music, movies, and e-books Occasionally found in the enterprise, protecting sensitive information stored in documents. Information rights management IRM programs enforce data rights, provisioning access, and implementing access control models Information Rights Management For example, Microsoft’s IRM provides policybased control over data Can be used to block specific actions, like print, copy/paste, download, and sharing Provide file expiration so that documents can no longer be viewed after a specified time This is a continually evolving space, and Microsoft and other vendors offers multiple avenues for protecting data. Geographic considerations Considerations for data, systems, services, and personnel Distance. While the fastest site to restore service is a hot site, a site hundreds of miles away is impractical/inconvenient in some respects. Location selection. The location of the hot site is critical to speed of data, system, and service recovery. Considerations for personnel may vary Should be far enough away to ensure recoverability in the event of a natural disaster (hurricane, tornado). Off-site backups. When we back up our data, physical backup media (like tapes) should be stored in a fire-proof safe offsite. Similarly, disk-based backups should be stored offsite in a cloud or other secure remote repository. Cloud services are a common solution How csps handle site failover GEOGRAPHIES How csps handle site failover REGIONS How csps handle site failover REGION PAIRS chosen by cloud service provider 300+ miles RESPONSE AND RECOVERY CONTROLS Read-through test You distribute copies of incident response plans to the members of the incident response team for review. Team members then provide feedback about any updates needed to keep the plan current. Structured walkthrough aka “tabletop exercise” Members of the disaster recovery team gather in a large conference room and role-play a disaster scenario. Usually, the exact scenario is known only to the test moderator, who presents the details to the team at the meeting. The team members refer to the document and discuss the appropriate responses to that particular type of disaster. these exercises are ‘all talk’ RESPONSE AND RECOVERY CONTROLS Simulation test Similar to structured walk-through, except some of the response measures are then tested (on non-critical functions). This one involves some form of ‘doing’ Enterprises need these controls to minimize service interruption, coordinate recovery at scale with appropriate security securing TRAFFIC Standards for encrypted messages include S/MIME protocol and Pretty Good Privacy (PGP). The de facto standard for secure web traffic is the use of HTTP over Transport Layer Security (TLS), largely replacing the older SSL IPsec protocol standard provides a common framework for encrypting network traffic and is built into many common operating systems. hashing vs encryption Encryption Encryption is a two-way function; what is encrypted can be decrypted with the proper key. Hashing no way to reverse if properly designed a one-way function that scrambles plain text to produce a unique message digest. ©2022 Inside Cloud and Security. No reuse without written permission HASH FUNCTION REQUIREMENTS Good hash functions have five requirements: 1. They must allow input of any length. 2. Provide fixed-length output. 3. Make it relatively easy to compute the hash function for any input. 4. Provide one-way functionality. 5. Must be collision free. MODERN COMPUTE & SECURITY is a set of exposed interfaces that allow programmatic interaction between services. REST uses the HTTPS protocol for web communications to offer API end points Security mechanisms include API gateway, authentication, IP filtering, throttling, quotas, data validation Also ensure that storage, distribution, and transmission of access keys is performed in a secure fashion. recovery site types Three primary types of recovery sites: recovery site types DESCRIPTION A “recovery” cold site is essentially just data center space, power, and network connectivity that’s ready and waiting for whenever you might need it. cost = LOW effort = HIGH TO RECOVER If disaster strikes, your engineering and logistical support teams can readily help you move your hardware into the data center and get you back up and running. recovery site types DESCRIPTION A “preventative” warm site allows you to pre-install your hardware and preconfigure your bandwidth needs. TO RECOVER cost = MEDIUM effort = MEDIUM If disaster strikes, all you have to do is load your software and data to restore your business systems. recovery site types DESCRIPTION A “proactive” hot site allows you to keep servers and a live backup site up and running in the event of a disaster. You replicate your production environment in that data center. cost = HIGH effort = LOW TO RECOVER This allows for an immediate cutover in case of disaster at your primary site. A hot site is a must for mission critical sites. Deception and disruption Lure bad people into doing bad things. Lets you watch them. Only ENTICE, not ENTRAP. You are not allowed to let them download items with “Enticement”. A group of honeypots is called a honeynet. For example, allowing download of a fake payroll file would be entrapment. Goal is to distract from real assets and isolate in a padded cell until you can track them down. honeypot, padded cell, pseudo flaws a system that often has pseudo flaws and fake data to lure intruders. lures and distracts attackers as long as attackers are in the honeypot, they are not in the live network. …and admins can observe Some IDPS systems have the ability to transfer attackers into a padded cell after detection Deception and disruption a decoy file deceptively named so it attracts the attention of an attacker. When security teams/tools send false information back to an attacker spotted using offensive security tools, like port scanners A honeypot can be used to examine the attack methods that hackers use to help direct fake telemetry response. Deception and disruption A DNS Blacklist can be created on a firewall so that it can identify malicious traffic trying to gain access to your network. Protects users by intercepting DNS requests attempting to connect to known malicious domains and returning a false address. Notice how tools in this section work together? The false (or controlled) address can point to a sinkhole server in a honeypot. 2.0 architecture and design Summarize virtualization and 2.2 cloud computing concepts • Cloud models • • • • • • • • Infrastructure as a service (IaaS) Platform as a service (PaaS) Software as a service (SaaS) Anything as a service (XaaS) Public Community Private Hybrid • Cloud service providers • Managed service provider (MSP) / managed security service provider (MSSP) Summarize = Explain • On-premises vs. offpremises • Fog computing • Edge computing • Thin client • Containers • Microservices/API • Infrastructure as code • Software-defined networking (SDN) • Software-defined visibility (SDV) • • • • • Serverless architecture Services integration Resource policies Transit gateway Virtualization • Virtual machine (VM) sprawl avoidance • VM escape protection COMPARE CLOUD MODELS & SERVICES SHARED RESPONSIBILITY MODEL shared responsibility model 100% YOURS Applications Applications Applications Applications Data Data Data Data Runtime Runtime Runtime Runtime Responsible Middleware Middleware Middleware Middleware CSP Customer Shared OS OS OS OS Virtualization Virtualization Virtualization Virtualization Servers Servers Servers Servers Storage Storage Storage Storage Networking Networking Networking Networking On-premises IaaS PaaS SaaS For free cybersecurity exam prep content, follow Inside Cloud and Security on Youtube! CLOUD MODELS & SERVICES - IAAS Applications Applications Data Data Runtime Runtime Middleware Middleware OS OS Virtualization Virtualization Servers Servers Storage Storage Networking Networking On-premises IaaS CSP provides building blocks, like networking, storage and compute CSP manages staff, HW, and datacenter For free cybersecurity exam prep content, follow Inside Cloud and Security on Youtube! CLOUD MODELS & SERVICES - IAAS Applications Applications Data Data Runtime Runtime Middleware Middleware OS OS Virtualization Virtualization Servers Servers Storage Storage Networking Networking On-premises IaaS Azure Virtual Machines Amazon EC2 GCP Compute Engine For free cybersecurity exam prep content, follow Inside Cloud and Security on Youtube! CLOUD MODELS & SERVICES - PAAS Applications Applications Data Data Runtime Runtime Middleware Middleware OS OS Virtualization Virtualization Servers Servers Storage Storage Networking Networking On-premises PaaS Customer is responsible for deployment and management of apps CSP manages provisioning, configuration, hardware, and OS For free cybersecurity exam prep content, follow Inside Cloud and Security on Youtube! CLOUD MODELS & SERVICES - PAAS Applications Applications Data Data Runtime Runtime Middleware Middleware OS OS Virtualization Virtualization Servers Servers Storage Storage Networking Networking On-premises PaaS Azure SQL Database API Management Azure App Service For free cybersecurity exam prep content, follow Inside Cloud and Security on Youtube! CLOUD MODELS & SERVICES - SAAS Applications Applications Data Data Runtime Runtime Middleware Middleware OS OS Virtualization Virtualization Servers Servers Storage Storage Networking Networking On-premises SaaS Customer has some responsibility in access management and data recovery Customer just configures features. CSP is responsible for management, operation, and service availability. For free cybersecurity exam prep content, follow Inside Cloud and Security on Youtube! CLOUD MODELS & SERVICES - SAAS Applications Applications Data Data Runtime Runtime Middleware Middleware OS OS Virtualization Virtualization Servers Servers Storage Storage Networking Networking On-premises SaaS For free cybersecurity exam prep content, follow Inside Cloud and Security on Youtube! describe CLOUD CONCEPTS Describe the differences between Public, Private and Hybrid cloud models Benefits of Cloud Computing Cloud is cost-effective, global, secure, scalable, elastic, and always current For free cybersecurity exam prep content, follow Inside Cloud and Security on Youtube! DOMAIN 1: Describe cloud concepts Describe the differences between Public, Private and Hybrid cloud models Describe Public Cloud Everything runs on your cloud provider's hardware. For free cybersecurity exam prep content, follow Inside Cloud and Security on Youtube! DOMAIN 1: Describe cloud concepts Describe the differences between Public, Private and Hybrid cloud models Describe Public Cloud Advantages include scalability, agility, PAYG, no maintenance, and low skills For free cybersecurity exam prep content, follow Inside Cloud and Security on Youtube! DOMAIN 1: Describe cloud concepts Describe the differences between Public, Private and Hybrid cloud models Describe Private Cloud A cloud environment in your own datacenter For free cybersecurity exam prep content, follow Inside Cloud and Security on Youtube! DOMAIN 1: Describe cloud concepts Describe the differences between Public, Private and Hybrid cloud models Describe Private Cloud Advantages include legacy support, control, and compliance For free cybersecurity exam prep content, follow Inside Cloud and Security on Youtube! describe CLOUD CONCEPTS Describe the differences between Public, Private and Hybrid cloud models Describe Hybrid Cloud Combines public and private clouds, allowing you to run your apps in the right location For free cybersecurity exam prep content, follow Inside Cloud and Security on Youtube! describe CLOUD CONCEPTS Describe the differences between Public, Private and Hybrid cloud models Describe Hybrid Cloud Advantages include flexibility in legacy, compliance, and scalability scenarios For free cybersecurity exam prep content, follow Inside Cloud and Security on Youtube! Cloud models Anything as a Service May be managed by members or 3rd party describes the range of other cloud –aaS offerings, from Desktop-aaS or Backup-aaS, to any new –aaS offerings that appear a collaborative effort in which infrastructure is shared between several organizations from a specific community with common concerns (security, compliance, etc) CSP and MSSP entities that resell cloud services to customers. Cloud Service Provider may provide infrastructure, software, VMs, and other services (IaaS, PaaS, SaaS, etc.) may also provide day-to-day management maintains the security environment for companies Managed Security Service Provider may manage firewalls, IDPS, and SIEM systems, and other security services and infrastructure. may provide an outsourced security operations center (SoC) and incident response ON-PREMISES and OFF-PREMISES On-premises servers are the traditional enterprise computing model. A business purchases and maintains its own servers, located in a secure, climate-controlled room onsite. Moving to cloud shifts some responsibilities to the CSP Shifts IT spending from capital expense (CAPEX) to operational expense (OPEX). Know the advantages of cloud and on-premises for the exam Covered in the “cloud models” content in this video MODERN COMPUTE & SECURITY Some compute operations require processing activities to occur locally, far from the cloud. Common in various Internet-of-things scenarios, like agricultural, science/space, military. All the processing of data storage is closer to the sensors rather than in the cloud data center. With large network-connected device counts in varied locations, data encryption, spoofing protection, and authentication are key MODERN COMPUTE & SECURITY Complements cloud computing by processing data from IoT devices. Often places gateway devices in the field to collect and correlate data centrally at the edge. Generally, brings cloud computing nearer to the sensor to process data closer to the device. Important to speed processing time and reduce dependence on cloud/Internet connectivity mission critical situations (healthcare) MODERN COMPUTE & SECURITY A thin client is a client that has limited resources that are insufficient to run applications. It connects to a server and processes the application on its resources. May be a purpose-built device or PC with client app/software MODERN COMPUTE & SECURITY Examples include Docker and Kubernetes A lightweight, granular, and portable way to package applications for multiple platforms. Reduces overhead of server virtualization by enabling containerized apps to run on a shared OS kernel. containers don’t have their own OS ! Share many concerns of server virtualization: isolation at host, process, network, and storage levels Can be used in some cases to isolate existing applications developed to run in a VM with a dedicated operating system. MODERN COMPUTE & SECURITY SOA is creation of discrete services that may be accessed by users in a black box fashion. Microservices are fine-grained services with a discrete function. a modern adaptation of SOA to cloud computing. Code-level vulnerabilities should be identified early in the development lifecycle. static code analysis and dynamic testing incorporated early in the CI/CD process can identify deficiencies before release. MODERN COMPUTE & SECURITY is a set of exposed interfaces that allow programmatic interaction between services. REST uses the HTTPS protocol for web communications to offer API endpoints They are loosely coupled and can be reused when creating applications. Cloud service providers (CSP) offer multiple security controls, some 3rd parties adding accounting features Recommended security controls mentioned briefly in section 2.1 in this video Infrastructure as code is the management of infrastructure (networks, VMs, load balancers, and connection topology) described in code Infrastructure as Code just as the same source code generates the same binary, code in the IaC model results in the same environment every time it is applied. IaC is a key DevOps practice and is used in conjunction with continuous integration and continuous delivery (CI/CD). IaC is very common (the standard) in the cloud Infrastructure as code a network architecture approach that enables the network to be intelligently and centrally controlled, or ‘programmed,’ using software Software Defined Networks and has capacity to reprogram the data plane at any time. use cases include SD-LAN and SD-WAN Separating the control plane from the data plane opens up a number of security challenges SDN vulnerabilities can include man-in-the-middle attack (MITM) and a service denial (DoS) secure with TLS ! Infrastructure as code provides visibility of the network traffic use. Software Defined Visibility can collect and aggregate network traffic data and provide better reports to the network admins. may extend the capabilities of a platform so that it can programmatically tie together security tools. Can increase the effectiveness of multi -tiered security architecture in stopping data loss and theft. Cloud computing concepts a cloud computing execution model where the cloud provider dynamically manages the allocation and provisioning of servers. hosted as a pay-as-you-go model based on use. Example: Function-as-service Resources are stateless, servers ephemeral and often capable of being triggered Provisioning of multiple business services is combined with different IT services to provide a single business solution. HOW is SERVERLESS Different from PAAS in terms of responsibility? PaaS More control over deployment environment Application has to be configured to auto-scale Application takes a while to spin up Serverless Devs have to write code No server management Less control over deployment environment Application scales automatically Application code only executes when invoked Cloud computing concepts policies that state what level of access someone has to data or a particular resource. Most CSPs have solutions to automate enforcement a network hub that acts as a regional virtual router to interconnect virtual private clouds (VPC) and VPN connections. DOMAIN 2: VIRTUALIZATION Server virtualization the process of dividing a physical server into multiple unique and isolated virtual servers by means of a software application (hypervisor). related concepts indicate server virtualization is the focus where an attacker gains access to a VM, then attacks either the host machine that holds all VMs, the hypervisor, or any of the other VMs. Protection: ensure patches and hypervisor and VMs are always up to date, guest privileges are low. Server-level redundancy and HIPS/HIDS protection also effective. When unmanaged VMs have been deployed on your network. Because IT doesn't know it is there, it may not be patched and protected, and thus more vulnerable to attack Avoidance: enforcement of security policies for adding VMs to the network, as well as periodic scanning to identify new virtualization hosts. 2.0 architecture and design Summarize secure application development, 2.3 deployment, and automation concepts • Environment • • • • • Development Test Staging Production Quality assurance (QA) • Provisioning and deprovisioning • Integrity measurement • Secure coding techniques • Normalization • Stored procedures • Obfuscation/camouflage • Code reuse/dead code • Server-side vs. client-side execution and validation • Memory management • Use of third-party libraries and software development kits (SDKs) • Data exposure • Open Web Application Security Project (OWASP) • Software diversity • Compiler • Binary • Automation/scripting • • • • • • Automated courses of action Continuous monitoring Continuous validation Continuous integration Continuous delivery Continuous deployment • Elasticity • Scalability • Version control CI/CD (DevOps)! and DevSecOps environment Secure environments for development, testing, and staging before moving the application into production are necessary. Environments map to phases of application development, debugging, testing, and release. DEV Development. Where the application is initially coded, often through multiple iterations (versions). TESTING PROD Testing. where developers integrate all of their work into a single application. Regression testing to ensure functionality is as expected. Staging. where we ensure quality assurance before we roll it out to production. QA happens here ! STAGING Production. where the application goes live, and end-users have the support of the IT team. APPLICATION DEVELOPMENT is the process of making an application or service available. may also refer to the lifecycle of designing, preparing, creating, and managing the applications. occurs when the application meets its end of life. should be deprovisioned in accordance with local regulations, such as HIPAA or GDPR. APPLICATION DEVELOPMENT is the measuring and identification of changes to a system, away from its expected or baseline value. ensures that the application performs as it should do and conforms to data industry standards and regulations. code updates should be regression tested to ensure functionality is intact and no security vulnerabilities exist The result is a secure baseline configuration Should be performed regularly to ensure applications and systems have not drifted from security baseline SECURE CODING TECHNIQUES Secure coding techniques should address conditions that may result in vulnerabilities that can be exploited by attackers. Normalization Each database has a list of tables that are broken down into rows and columns. In a large relational database, data may be retained in multiple places. The goal of normalization is to reduce and eliminate redundancy to make fewer indexes per table and make searching faster. Stored Procedures A stored procedure is reusable, prepared SQL code (T-SQL). When apps use stored procedures, it will provide the required information while ensuring an attacker will not be able to modify the code it contains. SECURE CODING TECHNIQUES Secure coding techniques should address conditions that may result in vulnerabilities that can be exploited by attackers. Obfuscation/Camouflage the process of obscuring source code so that if it was stolen, it could not be interpreted or reverse engineered by the attacker. XOR and ROT 13 can be used to mask data, and steganography can be used to hide or camouflage the source code. Code Reuse/Dead Code reuse is good if code is high quality When developing a new application, a developer may start with previously developed code and then modify it for the new application. Dead code is code that is never executed but may consume resources and increase attack surface. dead code should be removed! SECURE CODING TECHNIQUES Secure coding techniques should address conditions that may result in vulnerabilities that can be exploited by attackers. Server-side vs client-side execution and validation Server-side (backend) includes databases, application servers, and domain controllers are known as server-side or backend servers C# and .NET are server-side programming languages Client-side (frontend) validation happens on client in browser JavaScript and HTML5 are client-side languages Memory management Code should be written to minimize memory consumption and return memory to the system when no longer needed. Failure to manage memory in code may result in memory leaks SECURE CODING TECHNIQUES Secure coding techniques should address conditions that may result in vulnerabilities that can be exploited by attackers. Use of third-party libraries and SDKs Third party libraries can speed development time, but may provide users with greater access than desired. and may come with security vulnerabilities! An SDK is a set of software development tools that a vendor creates to make application development easier. Data exposure masking common for credit card and password data Sensitive data should be encrypted to prevent it from being stolen by attackers, and sometimes masked even to user. Data allocation to a user should be limited. Protect through input validation and data protection techniques. XOR (IN SECURE CODING) Used to mask, obfuscate, or camouflage source code The Exclusive-OR option (XOR, also known as binary addition) is used in cryptology, sounds more complicated than it actually is: a function of flipping bits in a simple, systematic fashion. Original Value Key Value Cipher Value 1 1 0 0 1 0 1 0 0 1 1 0 binary values match = 0, otherwise cipher value is 1 O W A S P (OPEN WEB APP SECURITY PROJECT) A non-profit foundation (relies on donations) Organization that provides an up-to-date list of the most recent web application security concerns. “OWASP TOP 10” Mission is to improve software security through opensource initiatives and community education. -Tools, news, and information -Community and networking -Education and training Application development Creation of software that’s different on each user endpoint/device Techniques include dynamic paths in compiler at compile time Results in a binary that is slightly different on every endpoint Minimizes attack surface if vulnerability is discovered Makes the process of exploiting a software vulnerability more difficult for attackers Automation/scripting Processes designed to carry out tasks automatically without the need for human intervention. Continuous integration (CI) Happens in Testing environment The process where multiple software developers consolidate and test their code to ensure functionality is as expected. Continuous delivery (CD) The process of fixing bugs before the application moves into production. Generally happens in the Staging environment. Continuous deployment (CD) The process of pushing out new updates into production software, such as new versions, patches, and bugfixes. In DevOps, these concepts are referred to as “CI/CD” Automation/scripting Processes designed to carry out tasks automatically without the need for human intervention. Continuous validation Testing the to make sure that it is fit for its purpose and fulfills the user's requirements, and security requirements are met. Help ensure application and system updates do not introduce new security vulnerabilities elasticity Elasticity The ability of a system to automatically grow and shrink based on app demand For free cybersecurity exam prep content, follow Inside Cloud and Security on Youtube! scalability Scalability The ability of a system to handle growth of users or work For free cybersecurity exam prep content, follow Inside Cloud and Security on Youtube! Application development As updates are released, major or minor version numbers are updated. Ensures newer and older versions of the software can be identified. Allows security team to track security vulnerabilities and vendor support Versions typically factor in vendor support statements Vendor may only support current and X previous versions 2.0 architecture and design Summarize authentication and 2.4 authorization design concepts Authentication methods • • • • • • • • • • • • • Directory services Federation Attestation Technologies Time-based onetime password (TOTP) HMAC-based one-timepassword (HOTP) Short message service (SMS) Token key Static codes Authentication applications Push notifications Phone call Smart card authentication Biometrics • • • • • • • • • • • Fingerprint Retina Iris Facial Voice Vein Gait analysis Efficacy rates False acceptance False rejection Crossover error rate • Multifactor authentication (MFA) factors and attributes • Factors • Something you know • Something you have • Something you are • Attributes • Somewhere you are • Something you can do • Something you exhibit • Someone you know • Authentication, authorization, and accounting (AAA) • Cloud vs. on-premises requirements Authentication methods is based on HOTP but where the moving factor is time instead of the counter. Time-based OneTime Password uses time in increments called the timestep, which is usually 30 or 60 seconds. each OTP is valid for duration of the timestep uses a keyed-hash message authentication code, or an HMAC HMAC-based OneTime Password aka “HOTP” relies on two pieces of info: the seed, a secret known only by the token and validating server the second is a moving factor - a counter. Authentication methods one-time password provided on a hardware of software token generator. Authenticator apps are a common software solution for token keys. a static set of numbers and letters to provide for authentication. A password or passphrase is an example of an alphanumeric static code. a credit-card-sized token that contains a certificate and is used for authentication in conjunction with a PIN. Generally requires physical proximity to or insertion into a reader. Authentication methods Authentication applications “Authenticator apps” is a software-based authenticator that implements two-step verification services using the Time-based One-time Password Algorithm and HMAC-based One-time Password algorithm, for authenticating users of software applications. Examples include Microsoft Authenticator and Google Authenticator. Authenticator apps from companies like Microsoft and Google generate one-time passcodes using open standards developed by the Initiative for Open Authentication (OATH). You’ll hear HMAC and TOTP tokens called OATH tokens with some of these providers. Push notifications where the server is pushing down the authentication information to your mobile device. uses the mobile device app to be able to receive the pushed message and display the authentication information. Authentication methods SMS This is used as an additional layer of security where the user is authenticated, and an SMS message is sent to the user’s mobile phone. Phone call You could also use a phone call to perform the same type of function. Instead of having an app, an automated process calls you You then respond with a pin or other input via voice or keypad SMS and phone are less desirable (considered less secure) than Authenticator apps and biometrics D O M A I N 2 : CONFIGURATION MANAGEMENT One of the conditions to access corporate resources may require the access request originate from an approved, managed device. Attestation is the process of confirming the device (laptop, mobile device, etc) is an approved device compliant with company policies. Remote attestation involves checks that occur on a local device and are reported to a verification server. as with an MDM solution Generally, includes validation of a unique identifier for the hardware that confirms the device is known. device attestation is common in zero trust architecture, AUTHENTICATION METHODS used to store, retrieve, and manage information about objects, such as user accounts, computer accounts, mail accounts, and information on resources LDAP is a common protocol for a directory service (used by Microsoft Active Directory Domain Services) AUTHENTICATION METHODS is coupled with an authentication service to authenticate entities (users, computers, etc.) attempting to access resources Kerberos is a example of protocol for authentication (used by Microsoft Active Directory Domain Services) describe the concept of Federated services is a collection of domains that have established trust. The level of trust may vary, but typically includes authentication and almost always includes authorization. Often includes a number of organizations that have established trust for shared access to a set of resources. You can federate your on-premises environment with Azure Active Directory (Azure AD) and use this federation for authentication and authorization. This sign-in method ensures that all user authentication occurs onpremises. Allows administrators to implement more rigorous levels of access control. Certificate authentication, key fob, card token identity federation (example) Twitter Azure AD idP-A trusts idP-B idP-A idP-B User authenticates with idP-B may be cloud or on-premises Website (app or services) authenticates with idP-A shared access user website trust is not always bi-directional Biometrics a method of authentication using an individual’s physical characteristics, which are unique to the individual. Fingerprint Scanner Fingerprint scanners are now very common, and used not only in MFA, but various travel, financial, and legal situations. Retina Scanner With appropriate lighting, the retina can be accurately identified as the blood vessels of the retina absorb light more readily than the surrounding tissue. Biometrics a method of authentication using an individual’s physical characteristics, which are unique to the individual. Iris Scanner Confirms the identity of the user by scanning of their iris. Both retina and iris scanners are physical devices. Voice Recognition The voice patterns can be stored in a database and used for authentication. Biometrics a method of authentication using an individual’s physical characteristics, which are unique to the individual. Facial Recognition Looks at the shape of the face and characteristics such as mouth, jaw, cheekbone, and nose. Light and angle/direction can be a factor, especially in software. Microsoft facial recognition, called Windows Hello, was released with Windows 10. It uses a special USB infrared camera and, as such, is better than other facial recognition programs that can have problems with light. Biometrics a method of authentication using an individual’s physical characteristics, which are unique to the individual. Vein Using blood vessels in the palm can be used as a biometric factor of authentication. Gait Analysis gait is the way an individual walks. Identification and/or authentication using gait is possible even with lower resolution video Biometrics A false acceptance occurs when an invalid subject is authenticated. Type 2 error Sometimes called a false positive authentication. A false rejection occurs when a valid subject is rejected. Type 1 error Sometimes called a false negative authentication. False rejection is undesirable, but false acceptance is worse Biometrics A false acceptance occurs when an invalid subject is authenticated. Type 2 error Sometimes called a false positive authentication. A false rejection occurs when a valid subject is rejected. Type 1 error Sometimes called a false negative authentication. For the exam, remember FAR=false acceptance rate and FRR=false rejection rate. Biometrics Biometric methods identify users based on characteristics such as fingerprints. The crossover error rate (CER) identifies the accuracy of a biometric method. It shows where the false rejection rate is equal to the false acceptance rate. to move the CER higher or lower, you can increase or decrease the sensitivity of the biometric device. Multifactor authentication (mfa) MFA works by requiring two or more of the following authentication methods: MFA MFA factors and attributes Something you know (pin or password) Something you have (trusted device) MFA Authenticator app Something you are (biometric) Voice call SMS (text msg) OATH HW token MFA factors and attributes includes two or more authentication factors more secure than using a single authentication factor. passwords are the weakest form of authentication, password policies help increase their security by enforcing complexity and history requirements. Smartcards include microprocessors and cryptographic certificates tokens create onetime passwords Biometric methods identify users based on individual characteristics such as fingerprints and facial recognition. MFA FACTORS AND ATTRIBUTES Somewhere you are Your expected location, such as the company office, your home or home city. Something you can do such as writing your signature. Something you exhibit The personalized manner you perform an action, such as your gait (the way you walk). Someone you know Responding to challenge with knowledge of a characteristic of a specific individual you know. AAA protocols Several protocols provide centralized authentication, authorization, and accounting services. Network Access Server is a client to a RADIUS server, and the RADIUS server provides AAA services. RADIUS uses UDP and encrypts the password only. TACACS+ uses TCP and encrypts the entire session. Diameter is based on RADIUS and improves many of the weaknesses of RADIUS, but Diameter is not compatible with RADIUS. Network access (or remote access) systems use AAA protocols. CLOUD vs ON-PREMISES Considerations and differences between authentication in the cloud or on-premises. On-Premises The perimeter of on-premises location is easy to establish and control. Proximity cards (badge system), and security guards at a reception can also control access to the company. Does not always assume Internet access is available. In the Cloud Internet access is assumed to authenticate and connect to cloud resources. With the adoption of cloud computing, the security perimeter is no longer confined to the on-premises environment A zero-trust model is recommended (nothing trusted by default) conditional access enforcing “conditions of access” signal > decision > enforcement image credit: Microsoft 2.0 architecture and design 2.5 Given a scenario, implement cybersecurity resilience • Redundancy • Geographic dispersal • Disk • Redundant array of • inexpensive disks (RAID) levels • Multipath • Network • Load balancers • Network interface card (NIC) teaming • Power • Uninterruptible power supply (UPS) • Generator • Dual supply • Managed power distribution units (PDU) • Replication • Storage area network • VM • On-premises vs. cloud Implement = choose the right option for a scenario Disk redundancy RAID (Redundant Array of Inexpensive Disks) is a technology that is used to increase the performance and/or reliability of data storage with two or more drives working in parallel RAID Levels RAID 0 – striping RAID 1 – mirroring RAID 5 – striping with parity RAID 6 – striping with double parity RAID 10 – combining mirroring and striping Replication to another site for availability through site failures. In the cloud, this will come down to choosing a disk/storage tier/sku For storage Multipathing, aka SAN multipathing or I/O multipathing, is the establishment of multiple physical routes between a server and the storage device that supports it. You are not expected to know the details of RAID levels for the exam. Network redundancy Methods for building redundancy into network connectivity for systems and services Network Interface Card (NIC) Teaming Dual network cards, paired together to give maximum throughput. Should one adapter fail, the other can ensure the server or client maintains network connectivity. Windows and Linux support teaming Load Balancers Can balance multiple types of traffic across multiple servers. Includes logic to determine server availability. Often used for web (HTTPS) traffic but support other protocols. Can help maintain service availability in cyber attack scenarios POWER redundancy Uninterruptible Power Supply (UPS) Essentially a battery that is a standby device so that when primary power fails, it provides power. Designed to keep connected systems running for a limited period of time, enabling graceful system shutdown. Also used to clean up the power coming from the grid, eliminating spikes, surges, and voltage fluctuations. Protects systems and data from damage. Generator A standby power source that is powered by diesel, gasoline, propane, or natural gas. When power from the grid fails, can be started to provide electricity for an extended period of time. Used by hospitals, data centers, and other facilities hosting critical services. Provides sustained alternate power source to support continued operation POWER redundancy Dual Supply Most servers will have a dual power supply so that if one power supply fails, then the other power supply keeps the server running. Managed Power Distribution Units (PDUs) Generally, a device that provides multiple power outlets (for power cable plugs). A managed PDU includes network connectivity for remote connection and management of the power outlets. Distributes clean power to multiple, critical network resources, such as servers, routers, switches, and data centers. Replication Method wherein data is copied from one location to another. (on-premises) Storage Area Network (SAN): A hardware device that contains a large number of fast disks, such as Solid-State Drives (SSDs), usually isolated from the LAN on its own network: Host Bus Adapters (HBAs): Connects servers to storage device. Using two HBAs with each node provides multiple paths. SAN Fabric: A collection of servers, storage, switches, and other devices. Redundant SAN fabrics would enable more robust redundancy. SAN nodes with one HBA connected to Fabric 1 and the other to Fabric 2 Data replication between SAN fabrics can provide service-level resilience. replication Method wherein data is copied from one location to another. Virtual Machine (VM) Replication Where a copy of a VM is copied across to another physical host. With live migration, VM files can be copied across onto a second physical host with no downtime With SAN migration, the files for a virtual machine are not copied from one server to another and thus downtime is minimized. Each node in the hypervisor cluster can see the storage LUN and has a cluster disk resource for the LUN. VM migration in this scenario means transferring control of the storage from one hypervisor host to another! While terminology differs by vendor, this capability exists for Hyper-V, VMware, and other popular Type 1 hypervisors Resilience: cloud vs on-premises Considering cloud vs on-premises for data resilience Hybrid Cloud Usually an agent-based replication operation for VMs We could also consider hosting a backup of our environment in the cloud. We could replicate data and VMs from on-premises to the cloud so that if we have a disaster, we could switch quickly to the cloud. Cloud Native (Public Cloud) Storage replication in the cloud is often a simple service-level selection. VM replication is also greatly simplified Reduces infrastructure complexity, but comes at additional cost 2.0 architecture and design 2.5 Given a scenario, implement cybersecurity resilience • Backup types • Full • Incremental • Snapshot • Differential • Tape • Disk • Copy • Network-attached storage (NAS) • Storage area network • Cloud • Image • Online vs. offline • Offsite storage • Distance considerations • Non-persistence • Revert to known state • Last known-good configuration • Live boot media • High availability • Scalability • Restoration order • Diversity • Technologies • Vendors • Crypto • Controls The “A” in the CIA Triad = Availability! D O M A I N 2 : BACKUP TYPES Tape: backup to magnetic tape, and this would be the slowest form of restore. Can be stored offsite with a vaulting service in a fireproof vault. Disk: backup to a USB, removable hard drive, or disk on another server. Copy: using xcopy/robocopy to copy to another server on the network. Useful in one-off / ad hoc scenarios. Network-attached storage (NAS): useful when data is accessed by using a Universal Naming Convention (UNC) path rather than a LUN, as with a SAN. A good solution for large volume of data (multiple terabytes) Storage area network (SAN): Good for fast backups of large datasets, common with SQL databases or email. Also enables tiered storage access for prioritizing by workload. D O M A I N 2 : BACKUP TYPES Cloud: backup to cloud storage for multiple scenarios. For user files, solutions like Dropbox and OneDrive enable automated sync and versioning. Cloud backup solutions support server and file share backups. Image: clone of OS to enable quick restore of the image to bare metal Online vs offline: Offline media needs to be labeled and securely stored. Online backups will be faster to restore. Distance and bandwidth should be considered in planning, such as travel time for retrieving tapes or copying from cloud Non-persistence Non-persistence refers to systems that are not permanent and can be returned to a previous state. Revert to Known State. In a Windows environment, you can save the system state, and the system’s settings, to removable media. If the computer is corrupt, then you can repair the computer and then insert the media and revert to the system state data. Last Known Good Configuration. Where the system has recorded the configuration state as you log in. This can be reverted to at a later stage. In Windows, new last known good is created at each login. Live Boot Media. A copy of the operating system is saved to a USB flash drive or DVD. Enables booting from the removable media. High availability Concepts that relate to and support cyber resilience. Scalability The ability of a system to handle growth of users or work For free cybersecurity exam prep content, follow Inside Cloud and Security on Youtube! High availability Concepts that relate to and support cyber resilience. Fault Tolerance The ability of a system to handle faults in a service like power, network, or hardware failures For free cybersecurity exam prep content, follow Inside Cloud and Security on Youtube! High availability Concepts that relate to and support cyber resilience. Fault Tolerance Generally refers to componentlevel failures For free cybersecurity exam prep content, follow Inside Cloud and Security on Youtube! High availability Concepts that relate to and support cyber resilience. High Availability The ability to keep services up and running for long periods of time. For free cybersecurity exam prep content, follow Inside Cloud and Security on Youtube! High availability Concepts that relate to and support cyber resilience. High Availability The ability to keep services up and running for long periods of time. Generally refers to service-level failures For free cybersecurity exam prep content, follow Inside Cloud and Security on Youtube! High availability Concepts that relate to and support cyber resilience. Disaster Recovery The ability to recover from an event which has taken down a service or site For free cybersecurity exam prep content, follow Inside Cloud and Security on Youtube! High availability Concepts that relate to and support cyber resilience. Disaster Recovery Generally, refers to recovery in the event of a service or site failure For free cybersecurity exam prep content, follow Inside Cloud and Security on Youtube! Restoration order Establishing the order in which components, systems, and services should be restored based on defined criteria. Order of restoration Prioritized restore sequence based on business impact assessment (BIA) Most critical systems will be restored first. RTO (recovery time objective) Service-focused Maximum amount of time that a process or service is allowed to be down and the consequences still to be considered acceptable. RPO (recovery point objectives) Data-focused Point of last known good data prior to an outage that is used to recover systems. time that can pass before loss exceeds maximum tolerance. DIVERSITY can improve security and resiliency if well managed Impact of diversity on availability, resiliency, and security Vendor diversity involves getting a service from multiple (different) providers at the same time. Technology diversity different technologies in service delivery (OS, apps, appliances). Crypto diversity is when a company uses multiple algorithms to protect their data. Controls diversity implements a compensating (backup) control that could replace a primary control should it fail. 2.0 architecture and design Explain the security implications of 2.6 embedded and specialized systems • Embedded systems • Raspberry Pi • Field-programmable gate array (FPGA) • Arduino • Supervisory control and data acquisition (SCADA) / industrial control system (ICS) • Facilities • Industrial • Manufacturing • Energy • Logistics • Internet of Things (IoT) • Sensors • Smart devices • Wearables • Facility automation • Weak defaults • Specialized • Medical systems • Vehicles • Aircraft • Smart meters • Voice over IP (VoIP) computer system that has a dedicated function within a larger mechanical or electronic system. MODERN COMPUTE & SECURITY the technology component of an IOT device is often referred to as an embedded system. a full computer system embedded inside of another larger system. examples: hosts of embedded systems include printers, GPS, drones, semi-autonomous vehicles. D O M A I N 2 : EMBEDDED SYSTEMS An embedded system is both hardware and software combined in a single device. Some such devices will have updates, but some have no update mechanism, making them more vulnerable to attack. Raspberry Pi This is a credit card size computer that allows you to run programming languages such as Python or Scratch. Can be plugged into a monitor or computer. Can typically run with relatively low power draw. Field-Programmable Gate Array (FPGA) an array of programmable logic blocks, designed to be configured by customer or designer after manufacturing. Accepts custom code and stores it in multiple hardware blocks. Flexible in that it allows field modification to your use case. D O M A I N 2 : EMBEDDED SYSTEMS An embedded system is both hardware and software combined in a single device. Arduino This is an open-source programmable microprocessor/microcontroller. Boards are programmable through a USB. Can read inputs, such as light on a sensor, or an activity such as turning on a LED, publishing something online, or activating a motor. Can run from a 9-volt battery and can be used to control electronic components. The Arduino has shields, and these allow you to add wireless or Bluetooth to it so that it could be used to build a robot. SCADA You will often find SCADA systems in place where there is a large amount of industrial equipment. In an industrial, manufacturing, or public utility setting, equipment is often network-connected and monitored. And it can all be centrally configured, controlled, and monitored from a computer using a SCADA network. Usually do not have direct internet access for greater security. Should be segmented off from the rest of the network and protected by security controls to restrict access. internet of things A class of devices connected to the internet in order to provide automation, remote control, or AI processing in a home or business setting more scenarios involving IoT devices likely to appear in 2021 exam update smart devices Mobile devices that offer customization options, typically through installing apps, and may use on-device or in-the-cloud artificial intelligence (AI) processing. A smart device has three main features: context-awareness, autonomous computing, and connectivity. smart devices Mobile devices that offer customization options, typically through installing apps, and may use on-device or in-the-cloud artificial intelligence (AI) processing. Many devices can be called “smart” if you add a sensor, a tiny bit of computing capabilities and network connectivity. internet of things Default settings in business scenarios, lingers due to a process issue Every device that you put on your network to manage has a default username and a default password. Often, the defaults are open and available for anybody to use. (wi-fi and IoT) Botnets and offensive security tools will find, and exploit devices with weak default settings still in place. Simply change defaults to shut down this attack vector! Wearables. You might be wearing an IoT device, such as a fitness tracker or smartwatch. Facility automation. In a large facility, IoT devices able to manage the heating and AC, lights, and motion/fire/water detection. Enable facility managers to be able to configure automation and monitoring of device function. Sensors. Vehicles have very specialized sensors embedded, assisting with vehicle function D O M A I N 2 : SPECIALIZED SYSTEMS Medical Systems With these devices, human life is at stake A broad category that covers everything from small implantable devices to tools for measuring vital signs to MRI machines. An issue is how to patch discovered vulnerabilities as considerable testing is required to ensure human safety Vehicles Our automobiles have now very specialized and multiple embedded systems. Today, almost every aspect of the car has sensors monitoring function or surroundings. Some of these communicate with each other to make driving experience safer. Security updates (patches) and network security are going to be major concerns in securing specialized systems. D O M A I N 2 : SPECIALIZED SYSTEMS Aircraft A similar set of specialized embedded system exists on aircraft. Many different networks and many different sensors, all communicating amongst each other. Smart Meters In homes and businesses, we’re starting to put more and more sensors on our utilities. Increasingly, embedded systems that are watching water, electrical, and other types of utility use. Protecting against denial-of-service attacks is going to be of paramount concern In addition to secure network access, ensuring device access is secured will be important. VOICE OVER IP (VOIP) Embedded systems for voice communication and more. IP phones can be entry points into your business network and are susceptible to data network attacks. Use security features on VoIP system to restrict system access, call types, and call hours. Ensure users delete sensitive voice mails when they are no longer needed. e.g. firewall, IPS, apply updates, restrict network access Essentially standalone computers, so we can use many of the same security controls you would employ to protect a typical computer network. 2.0 architecture and design Explain the security implications of 2.6 embedded and specialized systems • Heating, ventilation, air conditioning (HVAC) • Drones • Multifunction printer (MFP) • Real-time operating system (RTOS) • Surveillance systems • System on chip (SoC) • Communication considerations • 5G • Narrow-band • Baseband radio • Subscriber identity module (SIM) cards • Zigbee Constraints • Power • Compute • Network • Crypto • Inability to patch • Authentication • Range • Cost • Implied trust EMBEDDED AND SPECIALIZED SYSTEMS Embedded systems are often in the heating, ventilation, and air conditioning (HVAC) systems in businesses and data center. are usually very complex systems, especially in larger environments, usually integrated with the fire system, as well. in large HVAC implementations have a computer that monitors and maintains all of the HVAC for the facility. as HVAC systems play a role in human safety, security in HVAC and HVAC monitoring system is critical. unauthorized access by an attacker may allow full control of the system, with potentially dangerous or disastrous results. Smart buildings allow turning HVAC systems on or off based on occupancy and use, reducing costs, but Internet access adds risk. EMBEDDED AND SPECIALIZED SYSTEMS The security implications of an embedded systems are of special concern with drones These may be devices that are manually controlled, but some have autonomous functions not requiring human intervention. In the United States, you have to have a federal license to be able to fly one of these drones of a certain size. It’s very common to find security features and fail-safe functionality built into these drones. That way, if anything occurs while this device is in the air, you can land it safely without harming anyone in the vicinity. EMBEDDED AND SPECIALIZED SYSTEMS In a multi-function device (MFD) you can have a scanner, a printer, a fax machine all within this single embedded device. These devices have become increasingly complex with very sophisticated firmware. Scans and faxes are stored somewhere on this device, usually with the internal memory of this multi-function device. Bi-directional communication with user endpoints for document sending and retrieval opens an attack vector. Logs on the device can also provide an attacker with a list of users and endpoints the device has communicated with. EMBEDDED AND SPECIALIZED SYSTEMS Smart devices like wearables and embedded systems like in cars and industrial equipment often use an RTOS. is an operating system that’s designed to work on a very deterministic schedule. This means that the hardware and software of this device is able to operate with very specific scheduling. Security of these devices is important, but it’s often difficult to know exactly what’s running inside of those embedded systems. They process data immediately, and if a task or process does not complete within a certain time, the process will fail. EMBEDDED AND SPECIALIZED SYSTEMS The cameras and the monitoring systems used for video surveillance are also embedded systems. Some are high-end, feature-rich, and expensive, often with advanced networking to protect their content. Others are cheap, ubiquitous security cameras used for surveillance at home and in public. May have motion sensitive (activated) functionality, or even object tracking capabilties. Important to ensure that the proper access security is implemented, so that only authorized users can view camera data. Due to location (often on the roof or building exterior), remotely upgradable firmware and patching may be very desirable. EMBEDDED AND SPECIALIZED SYSTEMS used in a variety of embedded systems and smart devices is a complete computer system miniaturized on a single integrated circuit, providing full computing platform on a chip. includes networking and graphics display capabilities, though memory may be located elsewhere. SoCs are very common in the mobile computing market and are on billions of devices worldwide. has multiple components on the single platform and often, a single chip may handle multiple functions on that single board. common with embedded systems, primarily because they are widely available, multi-functional, and customizable. Communication considerations Faster speeds and lower latency Unlike 4G, 5G doesn’t identify each user through their SIM card. Can assign identities to each device. 5th Generation Cellular Some air interface threats, such as session hijacking, are dealt with in 5G. Standalone (SA) version of 5G will be more secure than the non-standalone (NSA) version NSA anchors the control signaling of 5G networks to the 4G Core Communication considerations Diameter protocol, which provides authentication, authorization, and accounting (AAA), will be a target. 5th Generation Cellular Because 5G has to work alongside older tech (3G/4G), old vulnerabilities may be targeted. Because scale of IoT endpoint counts on 5G is exponentially greater, DDoS is a concern. Some carriers originally launched an NSA version of 5G, which continues to rely on availability of the 4G core. Communication considerations Refers to radio communications that carry signals in a narrow band of frequencies Used in a variety of scenarios requiring shortrange, wireless communication Examples include security Radio-Frequency Identification (RFID) or keyless vehicle entry products. DDoS attacks that disrupt communications, impacting device function or sending telemetry are a major concern Communication considerations used for audio signals over a radio frequency transmitted over a single channel uses a single frequency for communication, and is digital EXAMPLE: truck drivers communicating with one another on a specific channel. Communication considerations small computer chips that contain the information about mobile subscription Subscriber Identity Module cards allows user to connect to telecommunication provider to make calls, send text messages, or use the Internet. Used as a second factor in authentication One of the auth factors most prone to attack Communication considerations uses the modulation of light intensity to transmit data (uses LED). Light Fidelity can safely function in areas otherwise susceptible to electromagnetic interference can theoretically transmit at speeds of up to 100 Gbit/s LI-FI only requires working LED lights “visible light” in that it cannot penetrate opaque walls. Communication considerations Personal Area Network (PAN) IoT smart home hub A short-range wireless PAN (Personal Area Network) technology developed to support automation, machine-to-machine communication, remote control and monitoring of IoT devices. supports both centralized and distributed security models, and mesh topology assumes that symmetric keys used are transmitted securely (encrypted in-transit) During pre-configuration of a new device, in which a single key might be sent unprotected, creating a brief vulnerability. D O M A I N 2 : CONSTRAINTS There are many constraints associated with embedded devices, due to their size, location, cost and architecture. Common constraints: Power and compute. Limited size and remote/unusual locations results in limited compute capacity and low power consumption. Network: Embedded systems are not scalable, and some can only communicate through Wi-Fi or Bluetooth and are short-ranged. It is difficult to transfer data from one system to another. Authentication: Some embedded systems are incapable of joining a network and may only support local logon. Change defaults Crypto: PKI needs at least a 32-bit processor, and embedded devices are limited to 8 or 16. As a result, authentication may be very slow. D O M A I N 2 : CONSTRAINTS There are many constraints associated with embedded devices, due to their size, location, cost and architecture. Common constraints: Hardware Upgrade/Patching: Most embedded devices cannot have their hardware upgraded and may require physical access to patch. Some vendors may not produce patches Range: Many have a very short range, and so are not flexible or scalable in terms of management and use. Cost: are mainly customized and function-specific to keep costs down, making upgrade to new hardware versions impractical. Implied Trust: It may not be feasible to troubleshoot these devices. When you purchase an embedded system, there is implied trust that the system functions as documented. Ask manufacturer if they pen tested 2.0 architecture and design 2.7 Explain the importance of physical security controls Bollards/barricades Access control vestibules Badges Alarms Signage Cameras • Motion recognition • Object detection • Closed-circuit television (CCTV) • Industrial camouflage • • • • • • • Personnel • Guards • Robot sentries • Reception • Two-person integrity/control • Locks • Biometrics • Electronic • Physical • Cable locks • • • • USB data blocker Lighting Fencing Fire suppression “explain the importance” means you need to know not only what, but why! functional order of security controls Deterrence Denial Detection Delay Layers of security Defense in Depth is the concept of protecting a company's data with a series of protective layers. if one layer fails, another layer will already be in place to thwart an attack. Physical security plays a role in data security, service resilience, and more. Fence CCTV Guards Secure Area Encryption Permissions Data Understanding types of security controls can be a major advantage in your cybersecurity career ! physical security controls Physical security controls can be divided into three groups: Operational aka “managerial” or “administrative” controls include policies and procedures, like site management, personnel controls, awareness training, and emergency response and procedures. Logical aka “technical” controls implemented through technology like access controls, intrusion detection, alarms, CCTV, monitoring, HVAC, power supplies, and fire detection and suppression. Physical use physical means to protect objects and includes fencing, lighting, locks, construction materials, mantraps, dogs, and guards. physical security requirements Know the logical controls for physical security Technical controls for physical security include: - access controls intrusion detection alarms CCTV and monitoring HVAC power supplies fire detection and suppression physical security requirements Know administrative controls for physical security Administrative controls for physical security include: - facility construction facility selection site management personnel controls awareness training emergency response emergency procedure physical security requirements Know the physical controls for physical security Physical controls for physical security include: - fencing lighting locks construction materials mantraps dogs guards physical security requirements There is no security without physical security Without control over the physical environment, no amount of administrative or technical/logical access controls can provide adequate security. If a malicious person can gain physical access to your facility or equipment, they can do just about anything they want, from destruction to disclosure and alteration. Bollards and barricades a short post used to divert vehicle traffic from an area or road. can be placed in front of a building to stop a car from driving at desired point. bollard may be used to establish different zones of physical security. For the exam, be familiar with the different physical controls related to entry/entrance security. Access control vestibules Turnstile devices that only allow one person in at a time. A mantrap is a common example. An airlock is a similar concept that also restricts airflow. mantrap mantrap = access control vestibule Badges, Signage, and Alarms Signage: Before anyone reaches your main entrance, there should be highly visible signs warning them that they are entering a secure area with armed guards and dogs. This is used as a deterrent to prevent possible intruders. discourage intruders Badges: The form of identification is retained (or captured/photocopied), and they are allocated a visitor's badge that is a different color to that of employees. They return the badge when they leave. These badges should be visible at all times, and anyone that isn't displaying a badge should be challenged. train employees in this behavior FOR STAFF: Badges for members of staff might be RFID-enabled cards so that they can access the building via a card reader (requiring physical proximity). Burglar Alarms: Enabled when the premises are not occupied, so when someone attempts a break-in, it will trigger the alarm and notify the monitoring company or local police. Fire Alarms/Smoke Detectors: In a company building, there should be fire alarms or smoke detectors in every room so that when a fire breaks out and the alarms go off, the people inside the premises are able to escape. cameras Detective and deterrent controls for physical security Cameras can be set up in areas around the perimeter and on doorways to detect motion. They can be set up to detect objects both day and night to alert the security team by raising an alarm. Object detection in higher quality cameras can recognize the type of object (a vehicle, a person, etc.) and may be able to lock onto object (e.g. person’s face) and track it as it moves from place to place. Closed circuit television (cctv) You should consider monitoring entry points with CCTV. Through CCTV, you can compare the audit trails and access logs with a visually recorded history of the events. Audit trails and visitor access logs are useful tools for managing for physical access control. Logs may need to be created manually by security guards or may generated automatically (with RFID badges and proximity readers) Audit trail + visitor access log are valuable in reconstructing timeline of events in intrusion, breach, or attack. Through CCTV, you can compare the audit trails and access logs with a visually recorded history of the actual events. Industrial camouflage Designing a facility or other resources to obscure it from identification via aerial photography and other means of observation. For company facilities housing important resources and operations, designing the building to prevent recognition. This is another layer of physical security. Entrances will often be disguised as well to prevent visual identification by potential attackers and intruders. You would also avoid placing signs that explain the purpose of the facility or resources it contains. The need for secrecy will also influence physical security decisions, such as fencing, lighting, and camera selection. D O M A I N 2 : PERSONNEL Guards: work at the entrance reception desk to check the identity of people entering the building to stop unauthorized access. In high security scenarios, an armed guard and a dog may be appropriate. Procedures for staff and visitors should be clearly defined. Robot sentries: can be used patrol the facility perimeter and raise warnings to deter any intruders or alert security staff. Reception: The desk/station at facility entrance where guards will check employees and visitors. Two-person integrity/control: ensures that no single person would have access to any particular asset in the building. Also reduces the risk of a malicious insider attack. threats to physical access controls No matter which physical access control is used, a security guard or other monitoring system must be deployed to prevent: Abuses of physical access control include propping open secured doors and bypassing locks or access controls. Masquerading is using someone else’s security ID to gain entry to a facility. Piggybacking is following someone through a secured gate or doorway without being identified and authorized. All are related to badged entry lock types Biometric locks Something you are Electronic locks Something you have . Usually a PIN code. Cable Locks attached to laptops or tablets to secure them against theft. Physical Locks A device that prevents access to data, such as a key lock switch on a computer D O M A I N 2 : PHYSICAL SECURITY CONTROLS device blocks the data pins on the USB device, which prevents attacks in unsecure scenarios For example, this can prevent juice jacking, where data is stolen when you are charging a USB device in a public area. lighting Attackers avoid any place that may be lit, because they don’t want to be seen. proper lighting is one of the best security controls you can implement, particularly in environments that need to be monitored 24 hours a day. You want to make sure you’re providing enough light levels for the cameras & guards monitoring that area. Consider lighting angles especially if there are shadows and you’re doing some type of facial recognition. lighting EXTRA CREDIT should not illuminate the positions of guards, dogs, patrol posts, or other similar security elements lighting used for perimeter protection should illuminate critical areas with 2 feet of candle power from a height of 8 feet light poles should be placed the same distance apart as the diameter of the illuminated area 20 feet of coverage means poles 20 feet apart Fencing basics Fences protect resources for which access should be restricted Also advertise that you have something in this area that you don’t want people to gain access to. If it is OK for people to be able to see into a particular area, then you may want a fence that you can look through. which can help police, fire, and security professionals An opaque fence that prevents seeing what is behind will prevent anyone seeing contents – if it’s tall enough. Height and material will factor in how effective a fence will be in access prevention. Multiple physical security controls (fencing, lighting, cameras) together can improve their effectiveness. FENCES 3-4 feet deters the casual trespasser 6-7 feet Fence is a DETERRENT control PIDAS is a DETECTIVE control too difficult to climb easily may block vision (providing additional security) 8-feet (topped with barbed wire) will deter determined intruders EXPENSIVE and may generate false positives PIDAS (perimeter intrusion detection and assessment system) will detect someone attempting to climb a fence. Fire suppression basics Fire is one of the worst-case scenarios we must plan for to protect human safety. First, proper monitoring and warning, consisting of fire detection and fire alarm. Next, clearly marked fire exits ensure both employees and visitors can find safe egress from facilities in event of a fire. When a fire is detected, suppression will vary by the nature of the fire. Different materials (electronics, oil, chemicals) require specific response damage from fire and fire suppression The destructive elements of a fire include smoke and heat but also the suppression medium, such as water or soda acid. Smoke is damaging to most storage devices. Heat can damage any electronic or computer component. Suppression mediums can cause short circuits, initiate corrosion, or otherwise render equipment useless. All of these issues must be addressed when designing a fire response system. #1 concern is ALWAYS human safety! damage from fire and fire suppression The destructive elements of a fire include smoke and heat but also the suppression medium, such as water or soda acid. Smoke is damaging to most storage devices. Heat can damage any electronic or computer component. Suppression mediums can cause short circuits, initiate corrosion, or otherwise render equipment useless. All of these issues must be addressed when designing a fire response system. #1 concern is ALWAYS human safety! fire and suppression agents EXTRA CREDIT Class A (ASH) fires are common combustibles such as wood, paper, etc. This type of fire is the most common and should be extinguished with water or soda acid. Class B (BOIL) – fires are burning alcohol, oil, and other petroleum products such as gasoline. They are extinguished with gas or soda acid. You should never use water to extinguish a class B fire. Class C (CONDUCTIVE) – fires are electrical fires which are fed by electricity and may occur in equipment or wiring. Electrical fires are conductive fires, and the extinguishing agent must be non-conductive, such as any type of gas. Class D (DILYTHIUM) – fires are burning metals and are extinguished with dry powder. Class K (KITCHEN) – fires are kitchen fires, such as burning oil or grease. Wet chemicals are used to extinguish class K fires. The three categories of fire detection systems include smoke sensing, flame sensing, and heat sensing. fire extinguisher classes EXTRA CREDIT Fire extinguishers and suppression agents Class Can use water A Don’t use water! B C D K Type Suppression material Common combustibles Liquids Electrical Metal Kitchen Water, soda acid (a dry powder or liquid chemical) CO2, halon, soda acid CO2, halon Dry powder Wet chemicals 2.0 architecture and design 2.7 Explain the importance of physical security controls • Sensors • Motion detection • Noise detection • Proximity reader • Moisture detection • Cards • Temperature • Drones • Visitor logs • Faraday cages • Air gap • Screened subnet (previously known as demilitarized zone) • Protected cable distribution • Secure areas • Air gap • Vault • Safe • Hot aisle • Cold aisle • Secure data destruction • Burning • Shredding • Pulping • Pulverizing • Degaussing • Third-party solutions Sensors The role of sensors in physical security Motion detection Deterrent control When someone is walking past a building and the motion sensors detect movement and turn on lights to discourage would-be intruders. A building with a CCTV camera in a prominent position and a sign warning people that they are being recorded may act as a deterrent. Noise detection Noise monitoring devices can detect excessive noise to detect a variety of issues, depending on where they are placed, including intruders or other negative events. Proximity reader and cards Proximity cards are commonly used to gain access to doors, or door locks. By moving the card close to the proximity reader, info on the card is checked, and then the system can either allow or disallow access through that lock. Sensors Moisture detection Humidity sensors measure the amount of moisture in the air. If there is too much moisture in the air it could lead to condensation, which can damage sensitive equipment and lead to formation of harmful mold. Temperature Temperature sensors detect that it is getting too hot, it can trigger corrective action, such as injecting cold air into a space. Critical systems could fail if the temperature gets too hot. CO2 Sensors measure the CO2 in the air, as workers could become ill with headaches or get drowsy if the CO2 levels get too high. As with most security processes and equipment, sensors require ongoing maintenance and management. and periodic testing TEMPERATURE AND HUMIDITY Know ideal levels as well as effects of temperature and humidity Humidity 40% – 60% ideal Temperature for computers ideal is 60-75F (15-23C), damage at 175F. Managed storage devices damaged at 100F humidity and static electricity “ Too much humidity can cause corrosion. Too little humidity causes static electricity. Even on non-static carpet, low humidity can generate 20,000-volt static discharge! D O M A I N 2 : PHYSICAL SECURITY are used to monitor facility perimeters and conduct constant surveillance over large areas. can also be sent out as a response mechanism before personnel can respond and conduct an initial site assessment. enables personnel to assess risks before responding or entering a secure area. Visitor logs Understand how to handle visitors in a secure facility. If a facility employs restricted areas to control physical security, then a mechanism to handle visitors is required. Often an escort is assigned to visitors, and their access and activities are monitored closely. Tracking actions of outsiders when they are granted access to prevent malicious activity against the most protected assets. Visitor Logs The guards at the main entrance to a base or company will ask visitors to complete the visitor logs, and then provide some form of identification. PHYSICAL SECURITY an enclosure used to block electromagnetic fields. prevents wireless or cellular phones from working inside the enclosure. Signals such as HF RFID are likely to break through a Faraday cage. A boundary layer between the LAN and the WAN that holds information that companies may want people from the internet to access. Front-end web and email servers may reside in a screened subnet. Systems with sensitive data or hosting identity and access management would not. e.g. Active Directory Other names for a screened subnet are Demilitarized Zone (DMZ) or perimeter network. D O M A I N 2 : PROTECTED CABLE DISTRIBUTION A protected distribution system (PDS) encases network cabling within a carrier. enables data to be securely transferred directly between two high-security areas through an area of lower security. Hardened carrier In a hardened carrier PDS, network cabling is run within metal conduit. All conduit connections are permanently welded or glued to prevent external access. To identify signs of tampering, regular visual inspections of the carrier should be conducted. Alarmed carrier Welds and/or glue used to secure a hardened carrier are replaced with an electronic alarm system that can detect attempts to compromise the carrier and access the protected cable within it. Continuously viewed carrier Security guards continuously monitor the carrier to detect any intrusion attempt by attackers. Secure areas create “air gaps” between some systems that are used internally to separate confidential systems from standard systems. The only way to insert or remove data from an air-gapped machine is by using removable media such as a USB or CD-ROM drive. SECURE AREAS and Aisles The cold aisle is where the cold air enters and is contained; it faces the front of the servers. The rear of the servers face each other. They push hot air out into the hot aisles Hot air is allowed to escape through a vent or chimney. or may be captured and channeled back to HVAC unit Hot and cold aisles need to be considered in data center design. This is the CSPs responsibility in the cloud. Secure areas where data can be encrypted and stored in the cloud, giving you an extra-secure storage area. “vault” may also be mentioned in solutions for storing passwords and secrets there are safes for the storage of laptops and tablets. The Information Lifecycle Creation Destruction Classification Can be created by users a user creates a file Can be created by systems Archive Storage Usage a system logs access The Information Lifecycle Creation Destruction Classification To ensure it’s handled properly, it’s important to ensure data is classified as soon as possible. Archive Storage Usage The Information Lifecycle Creation Destruction Classification Data should be protected by adequate security controls based on its classification. Archive Storage Usage The Information Lifecycle Creation Destruction Classification refers to anytime data is in use or in transit over a network Archive Storage Usage The Information Lifecycle Creation Destruction Classification archival is sometimes needed to comply with laws or regulations requiring the retention of data. Archive Storage Usage The Information Lifecycle Creation Destruction Classification When data is no longer needed, it should be destroyed in such a way that it is not readable. Archive Storage Usage D O M A I N 2 : SECURE DATA DESTRUCTION Erasing. performing a delete operation against a file, files, or media. Clearing (overwriting). preparing media for reuse and ensuring data cannot be recovered using traditional recovery tools. Purging. a more intense form of clearing that prepares media for reuse in less secure environments. Media is reusable with any of these methods Data may be recoverable with forensic tools May be “distractors” in exam questions D O M A I N 2 : SECURE DATA DESTRUCTION Destroying data on media such as a hard drive or DVD/CD ROM Degaussing. creates a strong magnetic field that erases data on some media and destroy electronics. Shredding. You can shred a metal hard drive into powder. Pulverizing. Use a hammer and smash drive into pieces, or drill through all the platters. Media is not reusable with any of these methods Data is also not recoverable by any means D O M A I N 2 : SECURE DATA DESTRUCTION Destroying data on paper so it cannot be stolen. Burn: Burning with fire, as with an incinerator on site or via a third-party vendor providing a destruction certificate. Pulping: If burning is not available, pulping, which turns the data into paper mâché, is the best option. Shredding: If burning or pulping is not possible; a cross-cut shredder is best, as it makes reassembly much more difficult. These methods are listed in order of effectiveness Third parties may use different methods, but will certify task is complete 2.0 architecture and design 2.8 Summarize the basics of cryptographic concepts • • • • • • • • • Digital signatures Key length Key stretching Salting Hashing Key exchange Elliptic-curve cryptography Perfect forward secrecy Quantum • Communications • Computing • Post-quantum • Ephemeral • Modes of operation • Authenticated • Unauthenticated • Counter • Blockchain • Public ledgers • Cipher suites • Stream • Block • Symmetric vs. asymmetric • Lightweight cryptography D O M A I N 2 : CRYPTOGRAPHIC CONCEPTS Digital signatures are similar in concept to handwritten signatures on printed documents that identify individuals, but they provide more security benefits. is an encrypted hash of a message, encrypted with the sender’s private key. in a signed email scenario, it provides three key benefits: Authentication. This positively identifies the sender of the email. ownership of a digital signature secret key is bound to a specific user Non-repudiation. The sender cannot later deny sending the message. This is sometimes required with online transactions Integrity. provides assurances that the message has not been modified or corrupted. Recipients know that the message was not altered in transit These are the basics important for the Security+ exam Digital Signature Standard The Digital Signature Standard uses the SHA-2, and SHA-3 message digest functions… Digital Signature Standard Works in conjunction with one of three encryption algorithms: Digital Signature Algorithm (DSA) Rivest, Shamir, Adleman (RSA) algorithm Elliptic Curve DSA (ECDSA) algorithm. DSS is documented in FIPS 186-4 from NIST at https://csrc.nist.gov/publications/detail/fips/186/4/final Cryptographic concepts some cipher suites are easier to crack than others. larger keys tend to be more secure, because there are more possible key combinations processes used to take a key that may be weak and make it stronger, by making it longer and more random a longer key has more combinations a brute force attack has to go through to crack Quantum computing will impact this recommendation Since 2015, NIST recommends a minimum of 2048-bit keys for RSA. This will change over time as computing power advances. hashing vs encryption Encryption Encryption is a two-way function; what is encrypted can be decrypted with the proper key. Hashing no way to reverse if properly designed a one-way function that scrambles plain text to produce a unique message digest. Common uses Verification of digital signatures Generation of pseudo-random numbers Integrity services file hash comparison SALTING Attackers may use rainbow tables of precomputed values to identify commonly used passwords Cryptographic A salt is random data that is used as an additional input to a one-way function that hashes data, a password or passphrase Adding salts to the passwords before hashing them reduces the effectiveness of rainbow table attacks. is a small, fast key that is used for encryption in small mobile devices. was created because of the constraints that we have associated with the calculations that we use in asymmetric encryption. Curves in ECC are easier to calculate than the large primes typical in asymmetric encryption. asymmetric algorithm comparison Smaller key makes ECC attractive for resource-constrained systems Name Type Algorithm Type RSA Asymmetric Key transport Diffie-Hellman Asymmetric Key exchange El Gamal Asymmetric Key exchange ECC Asymmetric Elliptic Curve Size 1,024, 2,048, and 4,096 are typical 1024 minimum, 2048 for PCIDSS 1024 minimum 2048 common Variable (smaller key size due to EC, 160-bit EC key = 1025 RSA) Strength Replaced By Strong - Moderate El Gamal Very Strong - Very Strong - For comparison only. No need to memorize these key details for the exam! Perfect forward secrecy a feature of specific key agreement protocols that assures session keys will not be compromised if long-term secrets (private key) used in session key exchange are compromised. indicates that a cryptographic system generates random public keys for each session and it does not use a deterministic algorithm in the process. given the same input, the algorithm will create a different public key, ensuing systems do not reuse keys. Protects data on the Transport layer that uses TLS protocols, like OpenSSL. uses more computing power than if you’re using a single private key on a web server, so it will not be a fit for all scenarios. The value of forward secrecy is that it protects past communication, reducing motivation for an attacker to compromise keys CONCEPT: Symmetric vs Asymmetric Relies on the use of a shared secret key. Lacks support for scalability, easy key distribution, and nonrepudiation Public-private key pairs for communication between parties. Supports scalability, easy key distribution, and nonrepudiation example: asymmetric cryptography Franco sends a message to Maria, requesting her public key Maria sends her public key to Franco Franco uses Maria’s public key to encrypt the message and sends it to her Maria uses her private key to decrypt the message asymmetric key types Public keys are shared among communicating parties. Private keys are kept secret. To encrypt a message: use the recipient’s public key. To decrypt a message: use your own private key. To sign a message: use your own private key. To validate a signature: use the sender’s public key. each party has both a private key and public key! common uses Symmetric Example: AES256 Typically used for bulk encryption / encrypting large amounts of data. Asymmetric Example: RSA, DSS, ECC Distribution of symmetric bulk encryption keys (shared key) Identity authentication via digital signatures and certificates Non-repudiation services and key agreement Hash functions Verification of digital signatures Generation of pseudo-random numbers Integrity services (data integrity and authenticity) D O M A I N 2 : QUANTUM Quantum cryptography the practice of harnessing the principles of quantum mechanics to improve security and to detect whether a third party is eavesdropping on communications. Leverages fundamental laws of physics such as the observer effect, which states that it is impossible to identify the location of a particle without changing that particle. Quantum Key Distribution is the most common example of quantum cryptography. by transferring data using photons of light instead of bits, a confidential key transferred between two parties cannot be copied or intercepted secretly. Post-quantum cryptography Post-quantum cryptography refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a quantum computer. Post-quantum cryptography focuses on preparing for the era of quantum computing by updating existing mathematical-based algorithms and standards. POST-QUANTUM CRYPTOGRAPHY What is post-quantum cryptography? The development of new kinds of cryptographic approaches that can be implemented using today’s conventional computers. …but will be impervious (resistant) to attacks from tomorrow’s quantum computers. Which algorithms are susceptible? Which algorithms are resistant? POST-QUANTUM CRYPTOGRAPHY How well do current encryption algorithms hold up to the power of quantum computing? Shared Key Public Key Cryptography bulk encryption (fast) key exchange, digital signatures Holds up fairly well to quantum computing Quantum poses more immediate threats here POST-QUANTUM CRYPTOGRAPHY How well do current encryption algorithms hold up to the power of quantum computing? Shared Key bulk encryption (fast) Grover’s algorithm shows that a quantum computer speeds up these attacks to effectively halve the key length. This would mean that a 256-bit key is as strong against a quantum computer as a 128-bit key is against a conventional computer. Doubling key length from 128 to 256 does not make the key twice as strong, it makes it 2128 times as strong. POST-QUANTUM CRYPTOGRAPHY How well do current encryption algorithms hold up to the power of quantum computing? Shor’s algorithm can easily break all of the commonly used public-key algorithms based on both factoring and the discrete logarithm problem Public Key Cryptography key exchange, digital signatures This means RSA is vulnerable This means Elliptic Curve is vulnerable However, Lattice offers some resistance! Doubling the key length increases the difficulty to break by a factor of eight. That’s not a sustainable advantage. POST-QUANTUM CRYPTOGRAPHY How well do current encryption algorithms hold up to the power of quantum computing? However, Lattice offers some resistance! QUICK NOTES ON Based on different types of problems: the shortest vector problem and the closest vector problem Potentially enables us to replace essentially all of our currently endangered schemes Lattice-based cryptographic schemes make up the lion’s share of scientific publications on postquantum cryptography Research, selection, and standards development is ongoing What exactly is a lattice? a 3-dimensional array of regularly spaced points CRYPTOGRAPHIC CONCEPTS The two primary categories of asymmetric keys are static and ephemeral. Static Keys RSA uses static keys. Static keys are semi-permanent and stay the same over a long period of time. A certificate includes an embedded public key matched to a private key. This key pair is valid for the lifetime of a certificate. Certificates have expiration dates and systems continue to use these keys until the certificate expires. 1-2 years is a common certificate lifetime A certification authority (CA) can validate a certificates static key with a certificate revocation list (CRL) or using the Online Certificate Status Protocol (OCSP). CRYPTOGRAPHIC CONCEPTS The two primary categories of asymmetric keys are static and ephemeral. Ephemeral Keys Ephemeral keys have very short lifetimes and are re-created for each session. An ephemeral key pair includes a private ephemeral key and a public ephemeral key. Systems use these key pairs for a single session and then discard them. Some versions of Diffie-Hellman use ephemeral keys. MODES OF OPERATION Electronic Codebook Mode (ECB) Simplest & least secure mode. Processes 64-bit blocks, encrypts block with the chosen key. If same block encountered multiple times, same encrypted block is produced, making it easy to break. Cipher Block Chaining (CBC) Each block of unencrypted text is XORed with the block of ciphertext immediately preceding. Decryption process simply decrypts ciphertext and reverses the XOR operation. Counter (CTR) Uses an incrementing counter instead of a seed. Errors do not propagate. blockchain Blockchain was originally the technology that powered Bitcoin but has broader uses. A distributed, public ledger that can be used to store financial, medical, or other transactions. Anyone is free to join and participate does not use intermediaries such as banks and financial institutions. data is “chained together” with a block of data holding both the hash for that block and the hash of the preceding block. To create a new block on the chain, the computer that wishes to add the block solves a cryptographic puzzle and sends the solution to the other computers participating in that blockchain. This is known as “proof of work” Cipher suites is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream). each plaintext digit is encrypted one at a time with the corresponding digit of the keystream, to give a digit of the ciphertext stream. is a method of encrypting text in which a cryptographic key and algorithm are applied to a block of data (for example, 64 contiguous bits) at once as a group rather than to one bit at a time. Widely used today because it is faster than stream cipher Lightweight cryptography An encryption method that features a small footprint and/or low computational complexity. For the exam, ECC (asymmetric) is the go-to option for low power small devices, and AES 256 (symmetric) for military. NIST is working on standards for lightweight cryptography Lightweight cryptography is important for embedded systems and other resource-constrained devices. 2.0 architecture and design 2.8 Summarize the basics of cryptographic concepts • Steganography • Audio • Video • Image • Homomorphic encryption • Common use cases • • • • • • • • Low power devices Low latency High resiliency Supporting confidentiality Supporting integrity Supporting obfuscation Supporting authentication Supporting non-repudiation • Limitations • • • • • • • • • • Speed Size Weak keys Time Longevity Predictability Reuse Entropy Computational overheads Resource vs. security constraints symmetric & asymmetric algorithms work together to solve for these!! Cryptographic concepts a computer file, message, image, or video is concealed within another file, message, image, or video. a type of obfuscation an attacker may hide info in this way to exfiltrate sensitive company data. allows users to run calculations on data while it is still encrypted allows data to be encrypted and outsourced to commercial cloud for processing D O M A I N 2 : CRYPTOGRAPHIC CONCEPTS Common scenarios for specific cryptographic choices. Low power devices. devices often use ECC for encryption, as it uses a small key. IoT devices do not have the processing power for conventional encryption. Low latency. Means “encryption and decryption should not take a long time”. Specialized encryption hardware is a common answer in this scenario. a VPN concentrator or encryption accelerator cards can improve efficiency High resiliency. Use the most secure encryption algorithm practical to prevent the encryption key from being cracked by attackers. Device, application, or service compatibility may influence decisions Supporting confidentiality. Encryption should be implemented for exchange of any sensitive data, and in a way that ensures only authorized parties can view. For example, connecting remote offices via IPSec VPN D O M A I N 2 : CRYPTOGRAPHIC CONCEPTS Common scenarios for specific cryptographic choices. Supporting integrity. two important scenario for ensuring integrity: ensuring file data has not been tampered with, and that communications not altered in transit. File hash to check file integrity, digital signature or DKIM for email. Supporting obfuscation. obfuscation is commonly used in source code to ensure it cannot be read by anyone who steals it. ROT13, XOR, or steganography can be used to obscure data. Supporting authentication. a single-factor username and password as they are not as secure as multifactor usernames and passwords. MFA for user authentication, certificate-based auth for devices Supporting non-repudiation. When you digitally sign an email with your private key, you cannot deny that it was you, as there is only one private key. Non-repudiation is important in any legally binding transaction D O M A I N 2 : CRYPTOGRAPHIC CONCEPTS Common scenarios for specific cryptographic choices. Speed. Application and hardware must be able to keep pace with the selected encryption. Size. if encrypting 16 bytes of data with a block cipher, the encrypted information is also 16 bytes. This overhead must be considered in resource planning Need enough memory, storage, and network to support the result Weak keys. Larger keys are generally stronger and thus more difficult to break. Find balance between security, compatibility, and capacity Time. encryption and hashing take time. Larger amounts of data and asymmetric encryption take more time than small data and symmetric encryption. Selections need to match time constraints in transactions Longevity. consider how long encryption algorithms select can be used. Older algorithms will generally be retired sooner D O M A I N 2 : CRYPTOGRAPHIC CONCEPTS Common scenarios for specific cryptographic choices. Predictability. cryptography relies on randomization. Random number generation that can’t be easily predicted is crucial for any type of cryptography. Reuse. using the same key is commonly seen in a number of encryption mechanisms. If an attacker gains access to the key, they can decrypt data encrypted with it. some IoT devices may not allow a key change Entropy. a measure of the randomness or diversity of a data-generating function. Data with full entropy is completely random with no meaningful patterns. Resource vs security constraints. more secure the encryption used and the higher the key length, the more processing power, and memory the server will need. requires balance between algorithms and hardware selections DOMAIN 3 PROVEN FAST, EFFECTIVE & AFFORDABLE EXAM PREP with Pete Zerger CISSP, vCISO, MVP securiTY+ EXAM CRAM EXAM OBJECTIVES (DOMAINS) 1.0 Attacks, Threats, and Vulnerabilities 24% 2.0 Architecture and Design 21% 3.0 Implementation 25% 4.0 Operations and Incident Response 16% 5.0 Governance, Risk, and Compliance 14% 3.0 implementation 3.1 Given a scenario, implement secure protocols • Protocols • Domain Name System Security Extensions (DNSSEC) • SSH • Secure/Multipurpose Internet Mail Extensions (S/MIME) • Secure Real-time Transport Protocol (SRTP) • Lightweight Directory Access Protocol Over SSL (LDAPS) • File Transfer Protocol, Secure (FTPS) • SSH File Transfer Protocol (SFTP) • Simple Network Management • Protocol, version 3 (SNMPv3) • Hypertext transfer protocol over SSL/TLS (HTTPS) • IPSec • Authentication header (AH)/Encapsulating Security Payloads (ESP) • Tunnel/transport • Post Office Protocol (POP)/ Internet Message Access Protocol (IMAP) • Use cases • • • • • • • • • • Voice and video Time synchronization Email and web File transfer Directory services Remote access Domain name resolution Routing and switching Network address allocation Subscription services Implement = choose the right protocol for a use case SECURE PROTOCOLS & USE CASES PROTOCOL PORT USE CASES Secure Shell (SSH) 22 Secure remote access (Linux and network) Secure copy protocol (SCP) 22 Secure copy to Linux/Unix SSH File Transfer Protocol (SFTP) 22 Secure FTP download 55 Secure DNS traffic 88 Secure authentication DNSSEC TCP/UDP TCP/UDP Kerberos Simple Network Management Protocol version 3 (SNMP v3) Lightweight Directory Access Protocol over SSL (LDAPS) Hypertext Transport Protocol over TLS/SSL (HTTPS) Transport Layer Security (TLS) / Secure Sockets Layer (SSL) Internet Protocol Security (IPSec) UDP 162 636 UDP remote monitoring and configuration of SNMP entities (such as network devices) Secure directory services information (e.g. - Active Directory Domain Services) 443 Secure web browsing 443 Secure data in transit 500 Secure VPN session between two hosts Know the protocols and modes for IPSec SECURE PROTOCOLS & USE CASES PROTOCOL Secure Simple Mail Transfer Protocol (SMTPS) Secure Internet Message Access Protocol (IMAP4) TCP/UDP PORT USE CASES 587 Secure SMTP (email) 993 Secure IMAP (email) Secure Post Office Protocol 3 (POP3) 995 Secure POP3 (email) Secure/Multipurpose Internet Mail Extensions (S/MIME) 993 Encrypt or digitally sign email File Transfer Protocol, Secure (FTPS) 989/990 Download large files securely Remote Desktop Protocol (RDP) 3389 Session Initiated Protocol (SIP) 5060/5061 Secure Real Time Protocol (SRTP) 5061 Secure remote access Signaling and controlling in Internet telephony for voice and video Encryption, message auth, and integrity for audio and video over IP networks For the exam,, grouping by use case may be helpful in memorization IPSec Protocols and Modes Authentication Header (AH) and Encapsulating Security Payload (ESP) protocols AH protocol provides a mechanism for authentication only. Because AH does not perform encryption, it is faster than ESP. ESP protocol provides data confidentiality (encryption) and authentication (data integrity, data origin authentication, and replay protection). ESP can be used with confidentiality only, authentication only, or both confidentiality and authentication. In transport mode, the IP addresses in the outer header are used to determine the IPsec policy that will be applied to the packet. It is good for ESP host-to-host traffic In tunnel mode, two IP headers are sent. The inner IP packet determines the IPsec policy that protects its contents. It is good for VPNs, and gateway-to-gateway security. 3.0 implementation Given a scenario, implement host or 3.2 application security controls • Endpoint protection • Antivirus • Anti-malware • Endpoint detection and response (EDR) • DLP • Next-generation firewall (NGFW) • Host-based intrusion prevention system (HIPS) • Host-based intrusion detection system (HIDS) • Host-based firewall • Boot integrity • Boot security/Unified Extensible Firmware Interface (UEFI) • Measured boot • Boot attestation • Database • Tokenization • Salting • Hashing • Application security • Input validations • Secure cookies • Hypertext Transfer Protocol (HTTP) headers • Code signing • Allow list • Block list/deny list • Secure coding practices • Static code analysis • Manual code review • Dynamic code analysis • Fuzzing • Hardening • • • • • Open ports and services Registry Disk encryption OS Patch management • Third-party updates • Auto-update • Self-encrypting drive (SED)/ full-disk encryption (FDE) • Opal • Hardware root of trust • Trusted Platform Module (TPM) • Sandboxing Endpoint protection These capabilities are generally delivered together in a single solution Antivirus is a software program designed to detect and destroy viruses and other malicious software from the system. Anti-malware a program that protects the system from all kinds of malware including viruses, Trojans, worms, and potentially unwanted programs. Endpoint Detection and Response (EDR) an integrated endpoint security solution that combines: real-time continuous monitoring and collection of endpoint data with rules-based automated response and analysis capabilities. Usually go beyond AV signature-based protection to identify potentially malicious behaviors (aka zero-day or “emerging threats”) describe Data Loss Prevention (DLP) is a way to protect sensitive information and prevent its inadvertent disclosure. Data Loss Prevention can identify, monitor, and automatically protect sensitive information in documents Protects personally identifiable information (PII), protected health information (PHI) and more policies can be typically applied to email, SharePoint, cloud storage, and in some cases, even databases modern firewalls protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet. Web Application aka “WAF” typically protects web applications from common attacks like XSS, CSRF, and SQL injection. Some come pre-configured with OWASP rulesets a deep-packet inspection firewall that moves beyond port/protocol inspection and blocking. Next Generation aka “NGFW” adds application-level inspection, intrusion prevention, and brings intelligence from outside the firewall. IDS and IPS analyzes whole packets, both header and payload, looking for known events. When a known event is detected, a log message is generated. analyzes whole packets, both header and payload, looking for known events. When a known event is detected, packet is rejected. Host-based IDS and IPS IDS/IPS in software form, installed on a host (often a server) Host-based Intrusion Detection System Host-based Intrusion Prevention System analyzes whole packets, both header and payload, looking for known events. When a known event is detected, a log message is generated. analyzes whole packets, both header and payload, looking for known events. When a known event is detected, packet is rejected. Endpoint protection an application firewall that is built into desktop operating systems, like Windows or Linux. Because it is an application, it is more vulnerable to attack in some respects (versus hardware FW). Restricting service/process access to ensure malicious parties cannot stop/kill is important. Host-based and network-based firewalls are often used together in a layered defense BOOT INTEGRITY Boot integrity ensures host are protected during the boot process, so all protections are in place when system is fully operational. Unified Extensible Firmware Interface (UEFI) a modern version of the Basic Input/Output System (BIOS) that is more secure and is needed for a secure boot of the OS. The older BIOS cannot provide secure boot. Measured Boot where all components from the firmware, applications, and software are measured and information stored in a log file The log file is on the Trusted Platform Module (TPM) chip on the motherboard. Trusted Secure Boot and Boot Attestation Operating Systems such as Windows 10 can perform a secure boot at startup where the OS checks that all of the drivers have been signed. If they have not, the boot sequence fails as the system integrity has been compromised. This can be coupled with attestation, where the software integrity has been confirmed. Bitlocker implements attestation and its keys are stored on the TPM databases is deemed more secure than encryption because it cannot be reversed takes sensitive data, such as a credit card number, and replaces it with random data. For example, many payment gateway providers store the credit card details securely and generate a random token. Tokenization can help companies meet PCI DSS, HIPAA compliance requirements A database may contain a massive amount of data, and hashing is used to index and fetch items from a database. This makes the search faster as the hash key is shorter than the data. The hash function maps data to where the actual records are held. Salting passwords in a database adds random text before hashing to increase the compute time for a brute-force attack. and renders rainbow tables ineffective APPLICATION SECURITY Implement application security controls to prevent attacks. Input Validation ensures buffer overflow, integer overflow, and SQL injection attacks cannot be launched against applications and databases. use where data is entered either using a web page or wizard. only accept data in the correct format within a range of minimum and maximum values. Incorrect format should be rejected, forcing user to re-enter Secure Cookies used by web browsers and contain information about your session. can be stolen by attackers to carry out a session hijacking attack. setting the secure flag in website code to ensure that cookies are only downloaded when there is a secure HTTPS session. APPLICATION SECURITY Implement application security controls to prevent attacks. Hypertext Transfer Protocol (HTTP) Headers HTTP headers are designed to transfer information between the host and the web server. an attacker can carry out cross-site scripting (XSS) as it is mainly delivered through injecting HTTP response headers. can be prevented by entering the HTTP Strict Transport Security (HSTS) header: HSTS ensures that the browser will ignore all HTTP connections Code Signing uses a certificate to digitally sign scripts and executables to verify their authenticity and to confirm that they are genuine. Allow List An allow list enable only explicitly allowed applications to run. This can be done by setting up an application whitelist. Firewalls, IDS/IPS, and EDR systems can have an allow list APPLICATION SECURITY Implement application security controls to prevent attacks. Block List/Deny List prevents specified applications from being installed or run by using a block/deny list in the specified security solution. Firewalls, IDS/IPS, and EDR systems can have a block list. APPLICATION SECURITY Implement application security controls to prevent attacks. Secure Coding Practices: developer who creates software writes code in a manner that ensures that there are no bugs or flaws. Intent is to prevent attacks such as buffer overflow or integer injection. Static Code Analysis: analysis where the code is not executed locally but is analyzed by a static code analyzer tool. source code is run inside the tool that reports any flaws or weaknesses. Requires source code access Dynamic Code Analysis: code is executed, and a technique called fuzzing is used to inject random input into the application. output is reviewed to ensure appropriate handling of unexpected input. exposes flaws in an application before it is rolled out to production. Does not require source code access APPLICATION SECURITY Static and dynamic testing, as described in the CISSP exam analysis of computer software performed without actually executing programs Application Security Testing tests “inside out” tester has access to the underlying framework, design, and implementation requires source code a program which communicates with a web application (executes the application). Application Security Testing tests “outside in” tester has no knowledge of the technologies or frameworks that the application is built on no source code required APPLICATION SECURITY Implement application security controls to prevent attacks. Manual Code Review code is reviewed line by line to ensure that the code is well-written and error free. tends to be tedious and time-consuming. Fuzzing random information is input into an application to see if the application crashes or memory leaks result, or if error information is returned. used to remedy any potential problems within application code before a new application is released. white box testing scenario can also be used to find any vulnerabilities with the application after release. This is called improper input validation. black box testing scenario HARDENING listening ports should be restricted to those necessary, filtered to restrict traffic, and disabled entirely if unneeded. Block through firewalls, disable by disabling underlying service. access should be restricted, and updates controlled through policy where possible. always take a backup of the registry before you start making changes. drive encryption can prevent unwanted access to data in a variety of circumstances. Using FDE or SED, described later in this module OS hardening can often be implemented through security baselines Can be applied through group policies or management tools (like MDM) Baselines can implement all the above Hardening ensures that systems are kept up-to-date with current patches. will evaluate, test, approve, and deploy patches. system audits verify the deployment of approved patches to system aka “update management” Patch both native OS and 3rd party apps Apply out-of-band updates promptly. Orgs without patch management will experience outages from known issues that could have been prevented Drive encryption Full Disk Encryption Self-Encrypting Device Full Disk Encryption is built into the Windows operating system. Bitlocker is an implementation of FDE. Keys are stored on the TPM encryption on a SED that’s built into the hardware of the drive itself. anything that’s written to that drive is automatically stored in encrypted form. A good SED should follow the Opal Storage Specification HARDENING When certificates are used in FDE, they use a hardware root of trust for key storage. It verifies that the keys match before the secure boot process takes place TPM is often used as the basis for a hardware root of trust HARDENING A chip that resides on the motherboard of the device. Multi-purpose, like storage and management of keys used for full disk encryption (FDE) solutions. Provides the operating system with access to keys, but prevents drive removal and data access HARDENING application is installed in a virtual machine environment isolated from our network. enables patch, test, and ensure that it is secure before putting it into a production environment. Also facilitates investigating dangerous malware. In a Linux environment, this is known as “chroot Jail“. 3.0 implementation Given a scenario, implement 3.3 secure network designs • Load balancing • • • • • Active/active Active/passive Scheduling Virtual IP Persistence • Network segmentation • Virtual local area network (VLAN) • Screened subnet (previously known as demilitarized zone) • East-west traffic • Extranet • Intranet • Zero Trust • Virtual private network (VPN) Always-on Split tunnel vs. full tunnel Remote access vs. site-to-site IPSec SSL/TLS HTML5 Layer 2 tunneling protocol (L2TP) • DNS • Network access control (NAC) • Agent and agentless • • • • • • • • Out-of-band management • Port security • Broadcast storm prevention • Bridge Protocol Data Unit (BPDU) guard • Loop prevention • Dynamic Host Configuration Protocol (DHCP) snooping • Media access control (MAC) filtering LOAD BALANCING A network load balancer (NLB) is a device that is used to direct traffic to an array of web servers, application servers, or other service endpoints Configurations There are several ways to set up a load balancer (LB). Active/Active. the load balancers act like an array, dealing with the traffic together as both are active. Single LB failure may degrade performance Active/Passive. the active node is fulfilling load balancing duties and the passive node is listening and monitoring the active node. Should the active node fail, then the passive node will take over, providing redundancy. NLB = network load balancer = load balancer LOAD BALANCING A network load balancer (NLB) is a device that is used to direct traffic to an array of web servers, application servers, or other service endpoints Virtual IP A virtual IP address eliminates a host's dependency upon individual network interfaces. Web traffic comes into the NLB from the Virtual IP address (VIP) on the frontend Request is sent to one of the web servers in the server farm (on the backend). VIP FE NLB BE LOAD BALANCING A network load balancer (NLB) is a device that is used to direct traffic to an array of web servers, application servers, or other service endpoints Scheduling Scheduling options, which determine how the load is distributed by the load balancer, include: Least Utilized Host: NLB knows the status of all servers in the server farms and which web servers are the least utilized by using a scheduling algorithm. DNS Round Robin. when the request comes in, the load balancer contacts the DNS server and rotates the request based on the lowest IP address first. Affinity. When the LB is set to Affinity, the request is sent to the same web server based on the requester's IP address, IP+port, and/or session ID. Affinity configuration may be referred to in tuples (2-tuple, 3-tuple) This is also known as persistence or a sticky session, where the load balancer uses the same server for the session. network segmentation a private network that is designed to host the information internal to the organization. a cross between Internet & intranet a section of an organization’s network that has been sectioned off to act as an intranet for the private network but also serves information to external business partners or the public Internet. an extranet for public consumption is typically labeled a demilitarized zone (DMZ) or perimeter network. used to control traffic and isolate static/sensitive environments addresses the limitations of the legacy network perimeter-based security model. treats user identity as the control plane Assumes compromise / breach in verifying every request. no entity is trusted by default VERIFY IDENTITY MANAGE DEVICES MANAGE APPS PROTECT DATA network segmentation Boosting Performance can improve performance through an organizational scheme in which systems that often communicate are located in the same segment, while systems that rarely or never communicate are located in other segments. Reducing Communication Problems reduces congestion and contains communication problems, such as broadcast storms, to individual subsections of the network. Providing Security can also improve security by isolating traffic and user access to those segments where they are authorized. Secure Network Design where traffic moves laterally between servers within a data center. north-south traffic moves outside of the data center. Virtual Local Area Network a collection of devices that communicate with one another as if they made up a single physical LAN. Creates a distinct broadcast domain a subnet is placed between two routers or firewalls. bastion host(s) are located within that subnet. aka “DMZ”: Virtual private network (vpn) extends a private network across a public network, enabling users and devices to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. Always On mode. a low-latency point-to-point connection between two sites. A tunnel between two gateways that is “always connected” L2TP/IPSec: This is the most secure tunneling protocol that can use certificates, Kerberos authentication, or a pre-shared key. L2TP/IPSec provides both a secure tunnel and authentication. Secure Socket Layer (SSL) VPN: works with legacy systems and uses SSL certificates for authentication. HTML 5 VPN: similar to the SSL VPN, as it uses certificates for authentication. easy to set up and you just need an HTML5-compatible browser such as Opera, Edge, Firefox, or Safari. Virtual private network (vpn) extends a private network across a public network, enabling users and devices to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. Split tunnel vs full tunnel Full tunnel means using VPN for all traffic, both to the Internet and corporate network. Split tunnel uses VPN for traffic destined for the corporate network only, and Internet traffic direct through its normal route. Remote access vs site-to-site In site-to-site, IPSec site-to-site VPN uses an always on mode where both packet header and payload are encrypted. IPSec tunnel mode In a remote access scenario, a connection is initiated from a users PC or laptop for a connection of shorter duration. IPSec transport mode DOMAIN NAME SYSTEM (DNS) a hierarchical naming system that resolves a hostname to an IP address. Fully-Qualified Domain Name (FQDN) A hostname + domain, for example server1.contoso.com Record Types A: IPv4 host Used together to secure email AAAA: IPv6 host CNAME: Alias SRV records: Finds services such as a domain controller MX: Mail server Sender Policy Framework (SPF) : This is a text (TXT) record used by DNS to prevent spam and confirm the email has come from the domain it appears to come from. Domain-based Message Authentication, Reporting and Conformance (DMARC): This is another DNS text (TXT) that is used by Internet Service Providers (ISPs) to prevent malicious email, such as phishing or spear phishing attacks. DOMAIN NAME SYSTEM (DNS) a hierarchical naming system that resolves a hostname to an IP address. DNS Cache: stores recently resolved DNS requests for later reuse, reducing calls to the DNS server. Hosts File: This is a flat-file where name and IP pairs are stored on a client. Often checked before request is sent to DNS server DNS Server: This normally maintains only the hostnames for domains it is configured to serve. Server is said to be “authoritative” for those domains Root Server: DNS nameservers that operate in the root zone. they can also refer requests to the appropriate Top-Level Domain (TLD) server. DNSSEC a digitally signed record Prevents unauthorized access to DNS records on the server. Each DNS record is digitally signed, creating an RRSIG record to protect against attacks DNS attacks DNS Poisoning when an attacker alters the domain-name-to-IP-address mappings in a DNS system to redirect traffic to a rogue system or perform DoS against a system. DNS Spoofing occurs when an attacker sends false replies to a requesting system, beating the real reply from the valid DNS server. DNS Hijacking aka “DNS Redirection” attack many ways to perform DNS Hijacking, the most common way we see is used by a captive portal such as a pay-for-use WiFi hotspot. Homograph Attack leverages similarities in character sets to register phony international domain names (IDNs) that appear legitimate to the naked eye. e.g. Latin character "a" is replaced with the Cyrillic character "а“ in example.com DNS attacks End goal of most DNS attacks Network access control A desktop or laptop off the network for an extended period may need multiple updates upon return. After a remote client has authenticated, Network Access Control (NAC) checks that the device being used is patched and compliant with corporate security policies. A compliant device is allowed access to the LAN. A non-compliant device may be redirected to a boundary network where a remediation service address issues Boundary network is sometimes called a “quarantine network” Network access control These are “agentless” Some operating systems include network access control as part of the operating system itself. And no additional agent is required. These generally perform checks when the system logs into the network and logs out of the network, making them less configurable. If you need additional functionality, you may require a persistent or dissolvable agent. Persistent: A permanent agent is installed on the host. Dissolvable: A dissolvable agent is known as temporary and is installed for a single use. Out-of-band management These are “agentless” Enable IT to work around problems that may be occurring on the network. Out-of-Band Management Out-of-band management on devices may include cellular modems and serial interfaces In larger environments, this out-of-band management function may be centralized. PORT SECURITY There are two types, 802.1x and switch port security Port Security. When anyone, authorized or not, plugs their Ethernet cable into the wall jack, the switch allows all traffic. With port security, the port is turned off. Undesirable as it limits the functionality of the switch 802.1x. user or device is authenticated by a certificate before a connection is made. prevents an unauthorized device from connecting and allows an authorized device to connect. Preferred, as it does not require limiting switch functionality and other protection that can be configured: Loop Protection: When two or more switches are joined together, they can create loops that create broadcast storms. Spanning Tree Protocol (STP) prevents this from happening by forwarding, listening, or blocking on some ports. Bridge Protocol Data Units (BPDU): These are frames that contain information about the STP. A BPDU attack will try and spoof the root bridge so that the STP is recalculated. A BPDU Guard enables the STP (Spanning Tree Protocol) to stop such attempts. DHCP Snooping: layer 2 security that prevents a rogue DHCP server from allocating IP addresses to a host on your network. Port security a list of authorized wireless client interface MAC addresses used by a wireless access point to block access to all non-authorized devices. also factors in some Ethernet (wired) network scenarios. “MAC spoofing” is a way some attackers get around this 3.0 implementation Given a scenario, implement 3.3 secure network designs • Network appliances • Jump servers • Proxy servers • Forward • Reverse • Network-based intrusion detection system (NIDS) /network-based intrusion prevention system (NIPS) • Signature-based • Heuristic/behavior • Anomaly • Inline vs. passive • HSM • Sensors • Collectors • Aggregators • Firewalls • Web application firewall (WAF) • NGFW • Stateful • Stateless • Unified threat management (UTM) • Network address translation (NAT) gateway • Content/URL filter • Open-source vs. proprietary • Hardware vs. software • Appliance vs. host-based vs. virtual • • • • • Access control list (ACL) Route security Quality of service (QoS) Implications of IPv6 Port spanning/port mirroring • Port taps • Monitoring services • File integrity monitors Network appliances typically placed on a screened subnet, allows admins to connect remotely to the network. server that controls requests from clients seeking resources on the internet or an external network. placed on a screened subnet, performs the authentication and decryption of a secure session to enable it to filter the incoming traffic. flavors of intrusion detection systems host-based IDS network-based IDS can monitor activity on a single system only. A drawback is that attackers can discover and disable them. can monitor activity on a network, and a NIDS isn’t as visible to attackers. Network-based IDS and IPS IDS/IPS at the network level, often in hardware form Network-based Intrusion Detection System Network-based Intrusion Prevention System analyzes whole packets, both header and payload, looking for known events. When a known event is detected, a log message is generated. analyzes whole packets, both header and payload, looking for known events. When a known event is detected, packet is rejected. types of ids systems aka “anomaly-based” or “heuristic-based” creates a baseline of activity to identify normal behavior and then measures system performance against the baseline to detect abnormal behavior. can detect previously unknown attack methods uses signatures similar to the signature definitions used by anti-malware software. aka “knowledge-based” only effective against known attack methods Both host-based and network-based systems can be knowledge based, behavior based, or a combination of both. Modes of Operation aka “in-band” aka “out-of-band” NIDS/NIPS placed on or near the firewall as an additional layer of security. traffic does not go through the NIPS/NIDS. sensors and collectors forward alerts to the NIDS. Network appliances can be placed on a network to alert NIDS of any changes in traffic patterns on the network. If you place a sensor on the Internet side of the network, it can scan all of the traffic from the Internet. Hardware security module (hsm) a physical computing device that safeguards and manages digital keys, performs encryption and decryption functions for digital signatures, strong authentication and other cryptographic functions. Like a TPM, but are often removable or external devices Types of firewalls Web Application aka “WAF” protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet. typically protects web applications from common attacks like XSS, CSRF, and SQL injection. Some come pre-configured with OWASP rulesets Next Generation aka “NGFW” a “deep-packet inspection” firewall that moves beyond port/protocol inspection and blocking. adds application-level inspection, intrusion prevention, and brings intelligence from outside the firewall. types of firewalls packet inspection inspects and filters both the header and payload of a packet that is transmitted through an inspection point. can detect protocol non-compliance, spam, viruses, intrusions a multifunction device (MFD) composed of several security features in addition to a firewall; aka “UTM” may include IDS, IPS, a TLS/SSL proxy, web filtering, QoS management, bandwidth throttling, NAT, VPN anchoring, and antivirus. More common in small and medium businesses (SMB) Firewall and state Watch network traffic and restrict or block packets based on source and destination addresses or other static values. Not 'aware' of traffic patterns or data flows. Typically, faster and perform better under heavier traffic loads. Can watch traffic streams from end to end. Are aware of communication paths and can implement various IP security functions such as tunnels and encryption. Better at identifying unauthorized and forged communications. Types of firewalls Network Address Translation Gateway allows private subnets to communicate with other cloud services and the Internet but hides the internal network from Internet users. The NAT gateway has the Network Access Control List (NACL) for the private subnets. . Looks at the content on the requested web page and blocks request depending on filters. Used to block inappropriate content in the context of the situation. Open-source vs proprietary firewalls one in which the vendor makes the license freely available and allows access to the source code, though it might ask for an optional donation. There is no vendor support with open source, so you might pay a third party to support in a production environment One of the more popular open-source firewalls is pfsense, the details for which can be found at https://www.pfsense.org/. are more expensive but tend to provide more/better protection and more functionality and support (at a cost). many vendors in this space, including Cisco, Checkpoint, Pal Alto, Barracuda. but “no source code access” hardware vs software A piece of purpose-built network hardware. May offer more configurable support for LAN and WAN connections. Often has superior throughput versus software because it is hardware designed for the speeds and connections common to an enterprise network. Software based firewalls that you might install on your own hardware. Provide flexibility to place firewalls anywhere you’d like in your organization. On servers and workstations, you can run a host-based firewall. Host-based (software) are more vulnerable in some respects as discussed earlier application vs host-based vs virtual typically catered specifically to application communications. often that is HTTP or Web traffic. an example is called a next generation firewall (NGFW) An application installed on a host OS, such as Windows or Linux, both client and server operating systems. In the cloud, firewalls are implemented as virtual network appliances (VNA). Available from both the CSP directly and third-party partners (commercial firewall vendors) network device types Firewalls Varies by type, but may filter at layers 3 through 7 Firewalls are essential tools in managing and controlling network traffic. A firewall is a network device used to filter traffic. Switch repeats traffic only out of the port on which the destination is known to exist. Switches offer greater efficiency for traffic delivery, create separate collision domains, and improve the overall throughput of data. usually layer 2, sometimes layer 3 Routers used to control traffic flow on networks and are often used to connect similar networks and control traffic flow between the two. They can function using statically defined routing tables, or they can employ a dynamic routing system. layer 3 Gateways a gateway connects networks that are using different network protocols. Also known as protocol translators, can be stand-alone hardware devices or a software service. network gateways work at layer 3. Route security Routers are not designed to be security devices but include some built-in capabilities that do provide some security functions. One of these is an access control list (ACL), which is used to allow or deny traffic. If no allow rules, last rule (deny) is applied (implicit deny) Configure an access control list on the ingress (inbound traffic) or egress (outbound traffic) of an interface ACL evaluate traffic on multiple criteria similar to a firewall Quality of Service (QOS) Ensures that applications have the bandwidth they need to operate by prioritizing traffic based on importance and function. Traffic of real-time functions (like voice and video streaming) might be given greater priority. Priorities are human-configurable Implications of ipv6 Network security focus changes somewhat with IPv6 One change is that there are many more IPv6 addresses compared to IPv4. This means it is more difficult to perform a complete port scan or interface scan when we’re working with IPv6 addresses. Many of the security tools like port scanners and vulnerability scanners have already been updated to take advantage of IPv6. Because there are so many IP addresses available with IPv6, there is less need to perform port address translation (PAT) or outbound network address translation (NAT) on the network. This can simplify the communications process, but… Network address translation is itself a security feature, as it removes direct access to source (user) in some use cases (like Internet browsing). with IPv6 we removed the Address Resolution Protocol or ARP. without ARP there cannot be any ARP spoofing! Does not imply IPv6 is any more or less secure than IPv4 but changes the attack vectors! For example, a Neighbor Cache Exhaustion attack can use IPv6 protocols to fill up the neighbor cache, interrupting network communication. PORT SPANNING/PORT MIRRORING Port mirroring (also known as port spanning) sends a copy of all data that arrives at a port to another device or sensor for investigation later or in near real-time the switch, a reserved port will “mirror” all traffic that passes through to that reserved port. works across multiple switches, whereas a physical device like a network (port) tap requires installation connected to every switch May be leveraged inform the Network Intrusion Detection System (NIDS) of changes in traffic patterns. Increases load on the switch, so should be configured with knowledge of traffic type and volume monitoring To help provide additional security on the network, some organizations employ a monitoring service -a group that monitors network security/activity. Common with SIEM and SOAR functions (covered in 1.7) Often an outsourced security operations center (SOC) function to provide 24x7 monitoring and alert or remediate issues after business hours. May also be helpful in maintaining compliance (HIPAA, GDPR, PCI DSS). Monitors and detects changes to files that should not be modified, automating notification (and potentially remediation). Commonly monitors files that would never change: things like your operating system files, where changes indicate some type of malicious activity. Can also be used to detect unwanted changes to baseline configurations 3.0 implementation Given a scenario, install and configure 3.4 wireless security settings • Cryptographic protocols • • • • • Wi-Fi Protected Access 2 (WPA2) Wi-Fi Protected Access 3 (WPA3) Counter-mode/CBC-MAC Protocol (CCMP) Simultaneous Authentication of Equals (SAE) • Authentication protocols • Extensible Authentication Protocol (EAP) • Protected Extensible Authentication Protocol (PEAP) • EAP-FAST • EAP-TLS • EAP-TTLS • IEEE 802.1X • Remote Authentication Dial-in User Service (RADIUS) Federation • Methods • Pre-shared key (PSK) vs. Enterprise vs. Open • Wi-Fi Protected Setup (WPS) • Captive portals • Installation considerations • Site surveys • Heat maps • Wi-Fi analyzers • Channel overlaps • Wireless access point (WAP) placement • Controller and access point security wireless technologies Version Speed Frequency 2 Mbps 2.4 GHz 802.11a 54 Mbps 5 GHz 802.11b 11 Mbps 2.4 GHz 802.11g 54 Mbps 2.4 GHz 802.11n 200+ Mbps 2.4 GHz 802.11ac 1 Gbps 5 GHz * 802.11 802.11 standard also defines WEP TKIP was designed as the replacement for WEP without the need to replace legacy hardware Temporal Key Integrity Protocol implemented into 802.11 wireless networking under the name WPA (Wi-Fi Protected Access). CCMP Counter Mode with Cipher Block Chaining Message Authentication Code Protocol Counter-mode / CBC-MAC Protocol created to replace WEP and TKIP/WPA uses AES (Advanced Encryption Standard) with a 128-bit key used with WPA2, which replaced WEP and WPA wpa2 an encryption scheme that implemented the Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP), CCMP is based on the AES encryption scheme wpa3 released in 2018 to address the weaknesses in WPA2. uses a much stronger 256-bit Galois/Counter Mode Protocol (GCMP-256) for encryption There are two versions: WPA3-Personal for home users, and WPA3-Enterprise for corporate users SAE SAE is a relatively new 802.11 authentication method. used with WPA3-Personal and replaces the WPA2-PSK Protects against brute-force attacks Simultaneous Authentication of Equals uses a secure Diffie Hellman handshake, called dragonfly uses perfect forward secrecy, so immune to offline attacks Wpa3 personal Vs enterprise uses Simultaneous Authentication of Equals (SAE). PERSONAL SAE means users can use passwords that are easier to remember. uses perfect forward secrecy (PFS) supports 256-bit AES, whereas, WPA2 only supported 128 bits 256-bit required by US gov’t ENTERPRISE uses Elliptic-Curve Diffie Hellman Ephemeral (ECDHE) for the initial handshake. Wireless authentication protocols Lightweight… Protected… extensible authentication protocol a Cisco proprietary alternative to TKIP for WPA. developed to address deficiencies in TKIP before the 802.11i/WPA2 system was ratified as a standard. encapsulates EAP methods within a TLS tunnel that provides authentication and potentially encryption. an authentication framework. allows for new authentication technologies to be compatible with existing wireless or point-to-point connection technologies WIRELESS AUTHENTICATION PROTOCOLS EAP-FAST developed by Cisco, is used in wireless networks and point-to-point connections to perform session authentication. It replaced LEAP, which was insecure. EAP-TLS a secure version of wireless authentication that requires X509 certification. involves 3 parties: the supplicant (user’s device), the authenticator (switch or controller), and the authentication server (RADIUS server). EAP-TTLS uses two phases; the first is to set up a secure session with the server, by creating a tunnel, utilizing certificates that are seamless to the client Second phase use a protocol such as MS-CHAP to complete the session. designed to connect older legacy systems. WIRELESS AUTHENTICATION PROTOCOLS IEEE 802.1x is transparent to users because it uses certificate authentication can be used in conjunction with a RADIUS server for enterprise networks. RADIUS Federation enables members of one organization to authenticate to another with their normal credentials. trust is across multiple RADIUS servers across multiple organizations. a federation service where network access is gained using wireless access points (WAPs). WAP forwards the wireless device's credentials to the RADIUS server for authentication. commonly uses 802.1X as the authentication method. which relies on EAP WIRELESS AUTHENTICATION METHODS was introduced for the home user who does not have an enterprise setup. the home user enters the password of the wireless router to gain access to the home network. PSK in WPA2 Replaced by SAE in WPA3 Home use scenario password is already stored and all you need to do is to press the button to get connected to the wireless network. Password is stored locally, so could be brute-forced a corporate version of WPA2 or WPA3, used in a centralized domain environment. Often where a RADIUS server combines with 802.1x, using certificates for authentication CAPTIVE PORTALS Common in airports and public spaces, wi-fi redirects users to a webpage when they connect to SSID. User provides additional validation of identity, normally through an email address or social identity. May include acceptable use policy and premium upgrade offer site survey The process of investigating the presence, strength, and reach of wireless access points deployed in an environment. site survey usually involves walking around with a portable wireless device, taking note of the wireless signal strength, and mapping this on a plot or schematic of the building. CONTROLLER AND ACCESS POINT SECURITY If you’re installing a new access point, you want to make sure that you place it in the right location. You want minimal overlap with other access points and maximize the coverage that’s being used in your environment. This should minimize the number of physical access points, optimizing costs Avoid placement near electronic devices that could create interference, and areas where signals can be absorbed. Metal objects and bodies (like elevators) and concrete walls absorb signal. Ensure access point in a place doesn’t send signal outside of your existing work areas, enabling unwanted access attempts. CONTROLLER AND ACCESS POINT SECURITY In addition to minimizing coverage overlap, choose different channels per device so there are no conflicts between access points. In a large office, you will deploy a large number of access points, which need to be managed. And each one has a separate configuration. A wireless controller enables central management of configuration, as well as security patches and firmware updates of the access points. Use HTTPS to encrypt traffic to controller and WAP web interfaces. On the access points themselves, use strong authentication methods. 3.0 implementation Given a scenario, implement 3.5 secure mobile solutions • Connection methods and receivers • • • • • • • • • • Cellular Wi-Fi Bluetooth NFC Infrared USB Point-to-point Point-to-multipoint Global Positioning System (GPS) RFID • Mobile device management (MDM) • • • • • • • • Application management Content management Remote wipe Geofencing Geolocation Screen locks Push notifications Passwords and PINs • Mobile devices • MicroSD hardware security module (HSM) • MDM/Unified Endpoint Management (UEM) • Mobile application management (MAM) • SEAndroid Communication considerations Faster speeds and lower latency Unlike 4G, 5G doesn’t identify each user through their SIM card. Can assign identities to each device. 5th Generation Cellular Some air interface threats, such as session hijacking, are dealt with in 5G. Standalone (SA) version of 5G will be more secure than the non-standalone (NSA) version NSA anchors the control signaling of 5G networks to the 4G Core Communication considerations Diameter protocol, which provides authentication, authorization, and accounting (AAA), will be a target. 5th Generation Cellular Because 5G has to work alongside older tech (3G/4G), old vulnerabilities may be targeted. Because scale of IoT endpoint counts on 5G is exponentially greater, DDoS is a concern. Some carriers originally launched an NSA version of 5G, which continues to rely on availability of the 4G core. Communication considerations small computer chips that contain the information about mobile subscription Subscriber Identity Module cards allows user to connect to telecommunication provider to make calls, send text messages, or use the Internet. Used as a second factor in authentication One of the auth factors most prone to attack BLUETOOTH Bluetooth, or IEEE 802.15, personal area networks (PANs) are another area of wireless security concern. (IEEE 802.15) Connects headsets for cell phones, mice, keyboards, GPS, and other devices Connections are set up using pairing, where primary device scans the 2.4 GHz radio frequencies for available devices Pairing uses a 4-digit code (often 0000) to reduce accidental pairings but is not actually secure. Mobile connection methods & receivers RADIO FREQUENCY IDENTIFICATION uses radio frequency to identify electromagnetic fields in a tag to track assets. commonly used in shops as the tags are attached to high-value assets to prevent theft. Common in access badge systems and retail anti-theft use cases NEAR FIELD COMMUNICATION Built on RFID, often used with payment systems. Subject to many of the same vulnerabilities as RFID The touch pay system at the grocery uses satellites in the Earth's orbit to measure the distance between two points. Used in map and find-my-phone use cases Mobile connection methods & receivers UNIVERSAL SERIAL BUS Some mobile devices can be tethered to a USB dongle to gain access to the internet. A flash USB device can be used to transfer data between devices It is a data exfiltration concern, often blocked through policy device is purely line-of-sight and has a maximum range of about 1 meter. Can be used to print from your laptop to an infrared printer. Not encrypted, but attack requires close physical proximity Mobile connection methods & receivers one-to-one connection between the two devices communicating on a network, typically wireless A directional antenna connecting two wireless networks or wireless repeater connecting WAPs 802.11 networks are more commonly communicating from point-to-multipoint. A WAP connecting to multiple wireless devices Mobile device management (MDM) Common features in secure mobile device management Passwords and PINs: Some mobile devices, such as smartphones, are very easy to steal and you can conceal them by putting them in a pocket. Strong passwords and PINs with six or more characters must be used. Also allows device to be disabled on X failed attempts Geofencing: Geofencing uses the Global Positioning System (GPS) or RFID to define geographical boundaries. Once the device is taken past the defined boundaries, the security team will be alerted. For the exam: remember Geofencing prevents mobile devices from being removed from the company's premises. Mobile device management (MDM) Application Management: Application management uses whitelists to control which applications are allowed to be installed onto the mobile device. Content Management: Content management stores business data in a secure area of the device in an encrypted format to protect it against attacks. Prevents confidential or business data from being shared with external users. Remote Wipe: When a mobile device has been lost or stolen, it can be remotely wiped. Device will revert to its factory settings and the data will no longer be available. wipe options allow removing business data only (BYOD) Screen Locks: Screen locks are activated once the mobile device has not been accessed for a period of time. After it is locked, the user gets a fixed number of attempts to correctly enter the PIN before the device is disabled. Mobile device management (MDM) Geolocation: Geolocation uses GPS to give the actual location of a mobile device. can be very useful if you lose or drop a device. For the exam: remember that geo-tracking will tell you the location of a stolen device. Push Notification: messages that appear on your screen, even when your system is locked. this information is usually pushed your device without intervention from the end user and may include sensitive information. some MDM platforms provide policy-based control whether app notifications can appear with the notifications on lock screen. Mobile devices a physical device that provides cryptographic features for your computer in a smaller, mobile form factor. enables associating a smaller piece of hardware with the cryptographic functions for encryption, key generation, digital signatures or authentication. provides management of the hardware, such as desktops, tablets, smartphones, and IoT devices ensuring that they secure and compliant. can manage the security and applications running on the devices can identify and block devices have been jailbroken (iOS) or rooted (Android). Multi-platform support is a key characteristic An example is Microsoft Intune, which manages Windows, iOS, Android, and MacOS Mobile devices allows a security team to manage application and data security, even on unmanaged devices. controls access to company applications and data and can restrict the exfiltration of data from the company applications. Useful in BYOD scenarios, enabling business data access on personal mobile devices includes SELinux functionality as part of the Android operating system. provides additional access controls (MAC and DAC), security policies and includes policies for configuring the security of these mobile devices. prevents any direct access to the kernel of the Android operating system provides centralized management for policy configuration and device management. 3.0 implementation Given a scenario, implement 3.5 secure mobile solutions • Enforcement and monitoring of: Third-party application stores Rooting/jailbreaking Sideloading Custom firmware Carrier unlocking Firmware over-the-air (OTA) updates Camera use SMS/Multimedia Messaging Service (MMS)/Rich Communication • Services (RCS) • External media • USB On-The-Go (USB OTG) • • • • • • • • • • • • • • Recording microphone GPS tagging Wi-Fi direct/ad hoc Tethering Hotspot Payment methods • Deployment models • Bring your own device (BYOD) • Corporate-owned personally enabled (COPE) • Choose your own device (CYOD) • Corporate-owned • Virtual desktop infrastructure (VDI) Enforcement and monitoring There is a danger of downloading apps from third-party app stores as there is no guarantee of the security of the app being installed. This could pose a security risk, as vetting process for mobile apps in third-party stores may be less rigorous than official app stores. Enables installing an application package in .apk format on a mobile device. Useful for developers to run trial of third-party apps, but also allows unauthorized software to be run on a mobile device. Enforcement and monitoring Custom firmware downloads are used to root an Android mobile device. Gives user a higher level of permissions on that device and removes some elements of vendor security. Jailbreaking is the Apple's iOS equivalent of rooting on Android: it allows you to run unauthorized software and remove device security restrictions. You can still access the Apple App Store even though jailbreaking has been carried out. For the exam: Rooting and jailbreaking remove the vendor restrictions on a mobile device to allow unsupported software to be installed. Enforcement and monitoring Custom firmware downloads are used so that you can root your mobile device. Gives the user a higher level of permissions on that device and removes some elements of vendor security. When a mobile device is no longer tied to the original carrier. This will allow you to use your device with any provider, and also install third-party apps. Firmware is software that is installed on a small, read-only memory chip on a hardware device and is used to control the hardware running on device. Firmware OTA updates are pushed out periodically by the vendor, ensuring that the mobile device is secure. One example is when the mobile device vendor sends a notification that there is a software update. Enforcement and monitoring Text messaging and has become a common method of communication. Can be sent between two people in a room without other people in the room knowing about their communication. Text messages can be used to launch an attack. A way to send pictures as attachments, similar to sending SMS messages. An enhancement to SMS and is used in Facebook and WhatsApp to send messages so that you can see the read receipts. You can also send pictures and videos. Image capability makes MMS and RCS paths for data theft. Enforcement and monitoring External media. SD card or other external storage media may enable unauthorized transfer of corporate data USB On-The-Go (USB OTG). allows USB devices plugged into smartphones and tablets to act as a host for other USB devices. Attaching USB devices can pose security problems as it makes it easy to steal information. Apple does not allow USB OTG. Recording microphone. smartphones and tablets can record conversations with their built-in microphones. They could be used to take notes, but they could also be used to tape conversations or record the proceedings of a confidential meeting. GPS tagging. When you take a photograph, GPS tagging adds the location where the photograph was taken. Most modern smartphones do this by default. Enforcement and monitoring Wi-Fi direct wireless network allows two Wi-Fi devices to connect to each other without requiring a WAP. It is single-path and therefore cannot be used for internet sharing. Ad-hoc wireless network is where two wireless devices can connect without a WAP, but it is multipath and can share an internet connection with someone else. When a GPS-enabled smartphone can be attached to a laptop or mobile device device to provide internet access. If a user uses a laptop to connect to the company's network and then tethers to the internet, it may result in split tunneling. This presents a security risk if device is compromised. Mobile devices can often function as a wifi hotspot over USB or Bluetooth. Enforcement and monitoring Smartphones allow credit card details to be stored locally so that the phone can be used to make contactless payments using Near-Field Communications (NFC). For BYOD, it needs to be carefully monitored as someone could leave the company with a company credit card and continue to use it. MDM may prevent the payment function by disabling this tool in the mobile device management policies. MDM can also disable screen captures Smartphone cameras pose a security risk to companies, as trade secrets could be stolen very easily. Research and development departments ban the use of personal smartphones in the workplace. Prevents theft of intellectual property MDM policies can disable cameras on company-owned smartphones. Deployment models is where an employee is encouraged to bring in their own device so that they can use it for work. cost effective for the company and more convenient for the user. needs two policies to be effective, Acceptable Use Policy and On/Offboarding Acceptable Use Policy (AUP): An AUP outlines what the employee can do with the device during the working day. Onboarding Policy: Device configuration requirements to access corporate data (min OS system, not rooted/jailbroken, etc.) Offboarding Policy: How corporate data will be wiped from the device (most MDM platforms support a selective wipe, removing only company data). MDM solutions with MAM (mobile app management) functionality can manage corporate data on BYOD devices Deployment models fully owned and managed by the company, enabling full IT control over MAM and MDM options. new employee chooses from a list of approved devices. avoids problems of ownership because the company has a limited number of tablets, phones, and laptops, simplifying management compared to BYOD. when they leave the company and offboard, the devices are taken from them as they belong to the company (corporate-owned). when the company purchases the device, such as a tablet, phone, or laptop, and allows the employee to use it for personal use. often better solution for the company than BYOD from a management perspective, as IT can limit what applications run on the devices. also frees the company to perform full device wipe if lost or stolen. Deployment models Hosted desktop environments on a central server / cloud environment. Provides a high degree of control and management automation. In the event of security issues, the endpoint can easily be isolated for forensic investigation if desired. Provisioning a new desktop is also generally a push-button operation. VDI is a common deployment solution for contractors and offshore teams. 3.0 implementation Given a scenario, apply cybersecurity 3.6 solutions to the cloud • Cloud security controls • High availability across zones • Resource policies • Secrets management • Integration and auditing • Storage • Permissions • Encryption • Replication • High availability • Network • Virtual networks • Public and private subnets • Segmentation • API inspection and integration • Compute • Security groups • Dynamic resource allocation • Instance awareness • Virtual private cloud (VPC) endpoint • Container security • Solutions • CASB • Application security • Next-generation secure web gateway (SWG) • Firewall considerations in a cloud environment • Cost • Need for segmentation • Open Systems Interconnection (OSI) layers • Cloud native controls vs. third-party solutions High availability across zones GEOGRAPHIES High availability across zones REGIONS High availability across zones REGION PAIRS chosen by the CSP 300+ miles High availability across zones Zone redundant Availability Zones Unique physical locations within a region with independent power, network, and cooling Comprised of two or more datacenters Tolerant to datacenter failures via redundancy and isolation Cloud Security Controls policies that state what access level a user has to a particular resource. ensuring the principle of least privilege is followed is crucial for resource security and audit compliance. CSP will provide details on how their cloud platform can help organizations meet a variety of compliance standards Cloud security controls CSPs offer a cloud service for centralized secure storage and access for application secrets A secret is anything that you want to control access to, such as API keys, passwords, certificates, tokens, or cryptographic keys. Service will typically offer programmatic access via API to support DevOps and continuous integration/continuous deployment (CI/CD) Access control at vault instance-level and to secrets stored within. Cloud Security Controls Integration and Auditing Integration is the process of how data is being handled from input to output. A cloud auditor is responsible for ensuring that the policies, process, and security controls defined have been implemented. Auditor will be a third party from outside the company They test to verify that process and security controls and the system integration are working as expected. Some of these controls may include the following: - Encryption Levels - Access Control Lists - Privilege Account Use - Password Policies - Anti-Phishing Protection - Data Loss Prevention Controls Process will be repeated periodically (annually) Self-audits ahead of external audits are common Cloud Security Controls - storage permissions, encryption, replication, and high availability for cloud storage. Permissions: Customers have a storage identity and are put into different storage groups that have appropriate rights to restrict access at a tenant/subscription level. Encryption: With cloud storage, encryption at the service level is generally in place by default, with configurable encryption within the storage service For relational databases (SQL), Transparent Data Encryption (TDE) is common. Encryption for data in transit, such as TLS/SSL. Replication: a method wherein data is copied from one location to another immediately to ensure recovery in case of an outage. In the cloud, multiple copies of your data are always held for redundancy. There are locally redundant, zone redundant, and geo-redundant options. High Availability: High availability ensures that copies of your data are held in different locations. Automatic failover between region pair in event of an outage is common Cloud Security Controls - network virtual networks, public and private subnets, segmentation, and API inspection and integration are important elements of cloud network security. A virtual network that consists of cloud resources, where the VMs for one company are isolated from the resources of another company. Separate VPCs can be isolated using public and private networks. The environment needs to be segmented public subnets that can access the Internet directly (through a firewall) and protected private networks. Virtual networks can be connected to other networks with a VPN gateway or network peering. For VDI/client scenarios, a NAT gateway for Internet access makes sense. Cloud Security Controls - network Not for public services (like websites) Our VPC contains private subnets. Each of these subnets has its own CIDR IP address range and cannot connect directly to the internet. They could be configured go through the NAT gateway if outbound internet connectivity is desired. Client VMs and database servers will often be hosted in a private subnet. The private subnet will use one of the following IP address ranges: 10.0.0.0 172.16.x.x – 172.31.x.x 192.168.0.0 Private IP ranges are defined in RFC 1918 All other IP address ranges, except the APIPA 169.254.x.x, are public addresses. Cloud Security Controls - network Resources on the public subnet can connect directly to the internet. Therefore, public-facing web servers will be placed within this subnet. Public subnet will have a NAT gateway or firewall for communicating with the private subnets, and an internet gateway. Public services, like websites, will be published through a firewall To create a secure connection to your VPC, you can connect a VPN using L2TP/IPsec using a VPN gateway (aka transit gateway). Network peering is another method is another method for connecting virtual networks in the cloud. Peering is the more common option between cloud networks Site-to-site VPN common for on-premises to cloud connectivity Cloud Security Controls - network Security of services that are permitted to access or be accessible from other zones involves a strict set of rules controlling this traffic. Rules are enforced by the IP address ranges of each subnet. Within a private subnet, segmentation can be used to achieve departmental isolation. Representational State Transfer (REST) is the modern approach to writing web service APIs. Enables multi-language support, can handle multiple types of calls, return different data formats. APIs published by an organizations should include encryption, authentication, rate limiting, throttling, and quotas. Covered in Domain 2 Cloud Security Controls - compute Security controls and concerns for compute in the public cloud platforms Security Groups Cloud provider has to secure multiple customers. They do use firewalls but cannot grant individual customers direct firewall access. Instead, they use security groups to define permissible network traffic, consisting of rules similar to a firewall ruleset. Dynamic Resource Allocation Varies by service and configuration This uses virtualization technology to scale the cloud resources up and down as the demand grows or falls. Instance Awareness VM instances need to be monitored to prevent VM sprawl and unmanaged VMs, which would have security consequences, but also add costs in the cloud. Tools like NIDS/NIPS can help to detect new instances, and process controls like privileged identity management, change and configuration management help. CSPs offer policy tooling to help tenants enforce governance policies Cloud Security Controls - compute Virtual Private Cloud (VPC) Endpoint This allows you to create a private connection between your VPC and another cloud service without crossing over the internet. CSPs offer site-to-site connectivity options for hybrid cloud. Most will offer a premium option to connect on-premises data centers to cloud without the need to traverse the Internet. Most enterprise (large) organizations today have Implemented a hybrid cloud model Container security Containers offer a more granular option for application and process isolation. Containers run in a VM Managed Kubernetes Most CSPs offer hosted Kubernetes service, handles critical tasks like health monitoring and maintenance for you. Platform-as-a-Service You pay only for the agent nodes within your clusters, not for the management cluster. Kubernetes has become the de facto standard Containers enable more efficient utilization of hardware resources Containers offer a more granular level of isolation for resources (CPU, memory), process isolation, and restricted system access. Cloud Security Controls - solutions Enforces the company's policies between on-premises and the cloud. Can detect (and optionally, prevent) data access with unauthorized apps and data storage in unauthorized locations. Help stop “Shadow IT” Using solutions such as Web App Firewalls (WAF), Next Gen Firewalls (NGFW), IDP/IPS. Firewalls function at the packet level, using rules to allow or deny each packet inbound or outbound. Secure web gateways work at the application level (layer 7), looking at the actual traffic over the protocol to detect malicious intent. Functions include web proxy, policy enforcement, malware detection, traffic inspection, data loss protection, and URL filtering. Cloud Security Controls - solutions One reason that we need a good firewall is to filter incoming traffic to protect our cloudhosted infrastructure and applications from hackers or malware. For example, the most common cloud firewall is the Web Application Firewall (WAF) Cost Cost is one of the reasons for WAF popularity. It meets a common need, is easy to configure, and is less expensive than more function-rich NGFW and SWG options. Need for Segmentation: Network segmentation should be supported with appropriate traffic filtering/restriction with the firewall type that is most appropriate for the use case. The firewall can filter traffic between virtual networks and the Internet. Open Systems Interconnection (OSI) Layers A network firewall works on Layer 3, stateful packet inspection at layers 3/4. Many cloud firewalls, like Web Application Firewalls work at Layer 7 of the OSI. THE OSI MODEL 7 Application 6 Presentation 5 Session 4 Transport 3 Network 2 Data Link 1 Physical Where protocols live in the model SSH, HTTP, FTP, LPD, SMTP, Telnet, TFTP, EDI, POP3, IMAP, SNMP, NNTP, S-RPC, and SET Encryption protocols and format types, such as ASCII, EBCDICM, TIFF, JPEG, MPEG, MIDI SMB, RPC, NFS, and SQL SPX, SSL, TLS, TCP, and UDP | ICMP, RIP, OSPF, BGP, IGMP, IP, IPSec, IPX, NAT, and SKIP ARP, SLIP, PPP, L2F, L2TP, PPTP, FDDI, ISDN EIA/TIA-232, EIA/TIA-449, X.21, HSSI, SONET, V.24, V.35, Bluetooth, 802.11 – Wifi, and Ethernet THE OSI MODEL 7 6 Presentation 5 Session 4 Transport 3 Network 2 Data Link 1 Physical Application Quick functionality overview interfacing user applications, network services, or the operating system with the protocol stack. transforming data received from the Application layer into a format that any system following the model can understand. establishing, maintaining, and terminating communication sessions between two computers. managing the integrity of a connection and controlling the session. [segment or datagram] adding routing and addressing information (source and destination) to the data. [packet] formatting the packet from the Network layer into the proper format for transmission. [frame] contains the device drivers that tell the protocol how to use the hardware for the transmission and reception of bits. Cloud native vs third-party solutions Platforms like Microsoft Azure and Amazon Web Services (AWS) have their own tools, such as Azure Resource Manager (ARM) and AWS Cloud Formation. These tools make managing Microsoft and AWS cloud resources easier, supporting Infrastructure-as-Code. Separate tools, for separate platforms, separate skillsets Third-party tools adds more flexibility, functionality, and multi-platform support. Organizations will typically move to third-party solutions when the native cloud solutions do not meet their functionality needs. For example, some organizations move to Terraform for infrastructure-as-Code because it supports the major CSPs using a single language . CSPs offer a marketplace where third-parties can publish offers 3.0 implementation Given a scenario, implement identity and 3.7 account management controls • Identity • Identity provider (IdP) • Attributes • Certificates • Tokens • SSH keys • Smart cards • Account types • User account • Shared and generic accounts/credentials • Guest accounts • Service accounts • Account policies • Password complexity • Password history • Password reuse • Network location • Geofencing • Geotagging • Geolocation • Time-based logins Access policies Account permissions Account audits Impossible travel time/risky login • Lockout • Disablement • • • • identity providers Creates, maintains, and manages identity information while providing authentication services to applications. Identity Providers For example, Azure Active Directory is the identity provider for Office 365 Other examples include Active Directory, OKTA, and DUO identity Attribute: a unique property in a user’s account details, such as employee ID. Smart Card: a credit card-like token with a certificate embedded on a chip; it is used in conjunction with a pin. physical card Certificates. a digital certificate where two keys are generated, a public key and a private key. The private key is used for identity. Token. a digital token, such as a SAML token used for federation services, or a token used by Open Authentication (OAuth2). SSH Keys. typically used by an administrator for secure authentication to a remote Linux server, instead of using username and password. The public key is stored on the server, with the private key remaining on the administrator's desktop. Account types Types of accounts you may be tested on in Security+ a standard user account with limited privileges. cannot install software, limited access to the computer systems. two types of user accounts: those that are local to the machine, and those that access a domain. a legacy account that was designed to give limited access to a single computer without the need to create a user account. normally disabled as it is no longer used, and some administrators see it as a security risk. Account types privileged accounts have greater access to the system and tend to be used by members of the IT team. Administrators are an example of privileged accounts. can install software and manage the configuration of a server or client computer computer. also have privileges to create, delete, and manage user accounts. administrators have been told they should have two accounts: one for routine tasks, and another for administrative duties. Account types privileged accounts have greater access to the system and tend to be used by members of the IT team. Administrators are an example of privileged accounts. can install software and manage the configuration of a server or client computer computer. also have privileges to create, delete, and manage user accounts. administrators have been told they should have two accounts: one for routine tasks, and another for administrative duties. some cloud providers now eliminate this need, and instead enable an admins to activate privilege just-in-time for a single account. Account types aka “Service Principal” when software is installed on a computer or server, it may require privileged access to run. a lower-level administrative account, and the service account fits the bill. a service account is a type of administrator account used to run an application. example: account to run an anti-virus application. When a group of people performs the same duties, such as members of customer services, they can use a shared account. when user-level monitoring, auditing, or non-repudiation are required, you must eliminate the use of shared accounts. Most cloud IDPs have options to eliminate the need for shared accounts Account types default administrative accounts created by manufacturers of a wide range smart and Internet-connected devices. most have a default username and password. default passwords should always be changed identifying presence of these accounts should be part of the onboarding process. address through configuration management This is a common attack vector (covered in Domain 1) Account policies Complex passwords (sometimes known as strong passwords) are formatted by choosing at least three of the following four groups: lowercase (a, b, and c), uppercase (A, B, and C), numbers (1, 2, and 3), special characters ($, @) prevents someone from reusing the same password. For example, if number remembered is 12 passwords, only on 13th change could it be reused. is a term used in the exam that means the same as password history. both prevent someone from reusing the same password. For the Security+ exam, password reuse and history are the same thing. Account policies an auditor will review accounts periodically to ensure that old accounts are not being used after an employee changes departments or leaves the company. auditor will also ensure that all employees have the only necessary permissions and privileges to carry out their jobs. principle of least privilege can be added as an additional factor in authentication. Geofencing can be used to establish a region and can pinpoint whether you are in that region. If you are not, you will not be able to log in. Context-Aware Location: can be used to block any attempt to log in outside of the locations that have been determined as allowed regions. Geolocation can track your location by your IP address and the ISP. Smart Phone Location Services: This can be used to identify where your phone is located by using Global Positioning System (GPS). Many identity providers enable admins to pre-define “trusted locations” Account policies This is a security feature used by cloud providers such as Microsoft with their Office 365 package to prevent fraud. If a person is in Houston and then 15 minutes later is determined to be New York, their attempt to log in will be blocked. A security feature used by cloud providers, leveraging a record of devices used by each user. Response will vary by provider but may include confirmation email to validate identity or responding to a prompt in an authenticator app. How user and sign-in risk are used varies by provider. Account management (the identity lifecycle) ranges from account creation at onboarding to its disablement when a user leaves the company. Account policies May be established for users based on role as a company may have many different shift patterns Employers may not wish their employees to access their network outside of their working hours. For example, employees may be restricted to accessing the network between 7 am and 6 pm. This prevents data theft by preventing users from coming in at 3 a.m. when nobody is watching and stealing corporate data. Can be effective in preventing individual fraud, as well as collusion, by enforcing restrictions of schedule rotations. Common in some industries, such as financial services 3.0 implementation Given a scenario, implement authentication 3.8 and authorization solutions • Authentication management • Password keys • Password vaults • TPM • HSM • Knowledge-based authentication • Authentication/authorization • EAP • Challenge-Handshake Authentication Protocol (CHAP) • Password Authentication Protocol (PAP) 802.1X RADIUS Single sign-on (SSO) Security Assertion Markup Language (SAML) Terminal Access Controller Access Control System Plus (TACACS+) • OAuth • OpenID • Kerberos • Access control schemes • Attribute-based access control (ABAC) • • • • • • Role-based access control Rule-based access control MAC Discretionary access control (DAC) • Conditional access • Privileged access management • File system permissions • • • • Authentication management looks like a USB device and works in conjunction with your password to provide multi-factor authentication One example is YubiKey is a FIPS 140-2 validation that provides code storage within a tamper-proof container Authentication management stored locally on the device and store passwords so user does not need to remember them. Uses strong encryption (e.g. AES-256) for secure storage. only as secure as the owner password that is used to protect the vault itself Typically uses multi-factor authentication A type of password vault exists in the cloud for DevOps scenarios, which will be discussed later in this module. Authentication management are normally built into the motherboard of a computer, and they are used when you are using Full Disk Encryption (FDE) used to store encryption keys, a key escrow that holds the private keys for third parties Authentication management This is normally used by banks, financial institutions, or email providers to identify someone when they want a password reset. There are two different types of KBA, dynamic and static, and they have their strengths and weaknesses: Static KBA: These are questions that are common to the user. For example, "What is the name of your first school?" Dynamic KBA: These are deemed to be more secure because they do not consist of questions provided beforehand. For example, confirm identity, a bank may ask the customer to name three direct debit mandates, the date, and the amount paid. AUTHENTICATION PROTOCOLS PASSWORD AUTH PROTOCOL CHALLENGE HANDSHAKE AUTH PROTOCOL EXTENSIBLE AUTH PROTOCOL password-based authentication protocol used by Pointto-Point Protocol to validate users. supported by almost all network OS remote access servers but is considered weak. a user or network host to an authenticating entity. That entity may be, for example, an Internet service provider. requires that both the client and server know the plaintext of the secret, although it is never sent over the network. an authentication framework. allows for new authentication technologies to be compatible with existing wireless or point-to-point connection technologies Authentication/Authorization an authentication mechanism to devices wishing to attach to a LAN or WLAN. defines the encapsulation of EAP protocol. involves three parties: a supplicant, an authenticator, and an authentication server supplicant = client defines the encapsulation of EAP over IEEE 802.11, which is also known as "EAP over LAN" AAA protocols Several protocols provide centralized authentication, authorization, and accounting services. Network Access Server is a client to a RADIUS server, and the RADIUS server provides AAA services. RADIUS (remote access) uses UDP and encrypts the password only. TACACS+ (admin access to network devices) uses TCP and encrypts the entire session. Diameter (4G) is based on RADIUS and improves many of the weaknesses of RADIUS, but Diameter is not compatible with RADIUS. Network access (or remote access) systems use AAA protocols. Authentication/Authorization Single Signon (SSO) Single sign-on means a user doesn't have to sign into every application they use. Authentication/Authorization Single sign-on means a user doesn't have to sign into every application they use. Single Signon (SSO) The user logs in once and that credential is used for multiple apps. Authentication/Authorization Single sign-on means a user doesn't have to sign into every application they use. Single Signon (SSO) The user logs in once and that credential is used for multiple apps. Single sign-on based authentication systems are often called "modern authentication". Authentication/Authorization is a mechanism that allows subjects to authenticate once and access multiple objects without authenticating again. Common SSO methods/standards include: — SAML — SESAME — KryptoKnight — OAuth — OpenID Know enough to differentiate these three on the exam The three to know for the exam are SAML, Oauth 2.0, and OpenID. Authentication / authorization Security Assertion Markup Language (SAML) is an XML-based, open-standard data format for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider. common in on-prem federation scenarios OAuth 2.0 Azure AD (the identity provider for Office 365) is an open standard for authorization, commonly used as a way for Internet users to log into third party websites using their Microsoft, Google, Facebook, Twitter, One Network etc. accounts without exposing their password. OpenID Example – logging into Spotify with your FB account is an open standard, It provides decentralized authentication, allowing users to log into multiple unrelated websites with one set of credentials maintained by a third-party service referred to as an OpenID provider. Authentication / authorization authorization protocol in Microsoft’s Azure Directory (and is preferred is to NTLM). stronger encryption, interoperability, and mutual authentication. client and server verified runs as a third-party trusted server known as the Key Distribution Center (KDC) Includes an authentication server, a ticket granting service, and database of secret keys for users and services. Helps prevent replay attacks through timestamps ACCESS CONTROL SCHEMES Non-discretionary Access Control Object = resource Subject = user Enables the enforcement of system-wide restrictions that override object-specific access control. RBAC is considered non-discretionary Discretionary Access Control (DAC) Use-based, user-centric A key characteristic of the Discretionary Access Control (DAC) model is that every object has an owner, and the owner can grant or deny access to any other subject. Example: New Technology File System (NTFS), Role Based Access Control (RBAC) A key characteristic is the use of roles or groups. Instead of assigning permissions directly to users, user accounts are placed in roles and administrators assign privileges to the roles. Typically mapped to job roles. Rule-based access control A key characteristic is that it applies global rules that apply to all subjects. Rules within this model are sometimes referred to as restrictions or filters. example: a firewall uses rules that allow or block traffic to all users equally. MADATORY ACCESS CONTROL “ A key point about the MAC model is that every object and every subject has one or more labels. These labels are predefined, and the system determines access based on assigned labels. D O M A I N 3 : ACCESS CONTROL SCHEMES access is restricted based on an attribute on the account, such as department, location, or functional designation. For example, admin my require user accounts have the ‘Legal’ department attribute to view contracts D O M A I N 3 : PRIVILEGED ACCESS MANAGEMENT a solution that helps protect the privileged accounts within a domain, preventing attacks such as pass the hash and privilege escalation. also provides visibility into who is using privileged accounts and what tasks they are being used for D O M A I N 3 : PRIVILEGED ACCESS MANAGEMENT a solution that helps protect the privileged accounts within a domain, preventing attacks such as pass the hash and privilege escalation. Native to some cloud identity providers today, and may include a just-in-time elevation feature FILE SYSTEM PERMISSIONS NTFS (Windows) SUID and SGID (Linux) Are applied to every file and folder stored on a volume with NTFS file system The Linux permissions model has two special access modes called suid (set user id) and sgid (set group id). Recognizes three types of permissions at three levels: read(r), write(w), and execute(x) Read = 4 Write = 2 Execute = 1 7 = read, write, and execute 6 = read and write 5 = read and execute 3.0 implementation Given a scenario, implement 3.9 public key infrastructure • Public key infrastructure (PKI) • • • • • • • • • • • Key management Certificate authority (CA) Intermediate CA Registration authority (RA) Certificate revocation list (CRL) Certificate attributes Online Certificate Status Protocol (OCSP) Certificate signing request (CSR) CN Subject alternative name Expiration certificate services • Types of certificates • • • • • • • • • • Wildcard Subject alternative name Code signing Self-signed Machine/computer Email User Root Domain validation Extended validation • Certificate formats • Distinguished encoding rules (DER) • Privacy enhanced mail (PEM) • Personal information exchange (PFX) • .cer • P12 • P7B • Concepts • • • • • • Online vs. offline CA Stapling Pinning Trust model Key escrow Certificate chaining ©2022 Inside Cloud and Security. No reuse without written permission Public key infrastructure (pki) CONCEPTS Key management management of cryptographic keys in a cryptosystem. Operational considerations include dealing with the generation, exchange, storage, use, crypto-shredding (destruction) and replacement of keys. Design considerations include cryptographic protocol design, key servers, user procedures, and other relevant protocols. Certificate authority (CA) Certification Authorities create digital certificates and own the policies. PKI hierarchy can include a single CA that serves as root and issuing, but this is not recommended. Public key infrastructure (pki) Subordinate CA CONCEPTS aka “Intermediate CA” or “Policy CA” Also known as a Registration Authority (RA) sits below root CAs in the CA hierarchy. Regularly issue certificates, making it difficult for them to stay offline as often as root CAs. Do have the ability to revoke certificates, making it easier to recover from any security breach that does happen Certificate revocation list (CRL) Contains information about any certificates that have been revoked by a subordinate CA due to compromises to the certificate or PKI hierarchy. CAs are required to publish CRLs, but it’s up to certificate consumers if they check these lists and how they respond if a certificate has been revoked. Public key infrastructure (pki) CONCEPTS Online Certificate Status Protocol (OCSP) Offers a faster way to check a certificate’s status compared to downloading a CRL. With OCSP, the consumer of a certificate can submit a request to the issuing CA to obtain the status of a specific certificate. Certificate signing request (CSR) Records identifying information for a person or device that owns a private key as well as information on the corresponding public key. It is the message that's sent to the CA in order to get a digital certificate created. CN (common name) the Fully Qualified Domain Name (FQDN) of the entity (e.g. web server) Public key infrastructure (pki) Subject alternative name CONCEPTS SAN an extension to the X. 509 specification that allows users to specify additional host names for a single SSL certificate. Is standard practice for SSL certificates, and it's on its way to replacing the use of the common name. Enables support for FQDNs from multiple domains in a single certificate. Expiration certificates are valid for a limited period from the date of issuance, as specified on the certificate. Current industry guidance on maximum certificate lifetime from widely trusted issuing authorities (like Digicert) is currently 1 year (398 days). Types of certificates Wildcard Supports multiple FQDNs in the same domain Can be used for a domain and a subdomain. For example: In the contoso.com domain, there are two servers called web and mail. The wildcard certificate is *.contoso.com and, when installed, it would work for the Fully Qualified Domain Names (FQDNs) for both of these. A wildcard can be used for multiple servers in the same domain, saving costs. Subject alternative name (SAN) multiple domains in a single cert Can be used on multiple domain names, such as abc.com or xyz.com. You can also insert other information into a SAN certificate, such as an IP address. Code signing Provides proof of content integrity When code is distributed over the Internet, it is essential that users can trust that it was actually produced by the claimed sender. An attacker would like to produce a fake device driver or web component (actually malware) that purported to be from a software vendor. Using a code signing certificate to digitally sign the code mitigates this danger. Types of certificates Self-signed A self-signed certificate is issued by the same entity that is using it. However, it does not have a CRL and cannot be validated or trusted. It is the cheapest form of internal certificates and can be placed on multiple servers. Machine/computer A computer or machine certificate is used to identify a computer within a domain. Email Allow users to digitally sign their emails to verify their identity through the attestation of a trusted third party known as a certificate authority (CA). Allow users to encrypt the entire contents (messages, attachments, etc.) Types of certificates User Used to represent a user's digital identity. In most cases, a user certificate is mapped back to a user account. Root CA Root A trust anchor in a PKI environment is the root certificate from which the whole chain of trust is derived; this is the root CA. Domain validation A Domain-Validated (DV) certificate is an X.509 certificate that proves the ownership of a domain name. Subordinate CA Extended validation Extended validation certificates provide a higher level of trust in identifying the entity that is using the certificate. Commonly used in the financial services sector. Issuing CA CERTIFICATE FORMATS X.509 certificate formats and descriptions FORMAT EXT PRI KEY DESCRIPTION Distinguished encoding rules DER NO Secure remote access (Linux and network) Privacy enhanced mail Personal information exchange PEM YES Secure copy to Linux/Unix PFX YES Supports storage of all certificates in path Base64-encoded CER NO Storage of a single certificate. PKCS#12 standard P12 YES Supports storage of all certificates in path Cryptographic Message Syntax Standard P7B NO Supports storage of all certificates in path. KCS #12 is the successor to Microsoft's "PFX“. EXT = File extension PRI KEY = File includes private key? Certificates are not whole without the private key! example: asymmetric cryptography Franco sends a message to Maria, requesting her public key Maria sends her public key to Franco Franco uses Maria’s public key to encrypt the message and sends it to her Maria uses her private key to decrypt the message Concepts Online vs. offline CA. Online CA is always running, offline kept offline expect for specific issuance and renewal operation. Offline is best practice for your root ca. Stapling. a method used with OCSP, which allows a web server to provide information on the validity of its own certificate. Done by the web server essentially downloading the OCSP response from the certificate vendor in advance and providing it to browsers. Pinning. a method designed to mitigate the use of fraudulent certificates. Once a public key or certificate has been seen for a specific host, that key or certificate is pinned to the host. Should a different key or certificate be seen for that host, that might indicate an issue with a fraudulent certificate. Concepts Trust model A model of how different certificate authorities trust each other and how their clients will trust certificates from other certification authorities. The four main types of trust models that are used with PKI are bridge, hierarchical, hybrid, and mesh. Key escrow Addresses the possibility that a cryptographic key may be lost. The concern is usually with symmetric keys or with the private key in asymmetric cryptography. If that occurs, then there is no way to get the key back, and the user cannot decrypt messages. Organizations establish key escrows to enable recovery of lost keys. Concepts Certificate chaining Refers to the fact that certificates are handled by a chain of trust. You purchase a digital certificate from a certificate authority (CA), so you trust that CA’s certificate. In turn, that CA trusts a root certificate. DOMAIN 4 PROVEN FAST, EFFECTIVE & AFFORDABLE EXAM PREP with Pete Zerger CISSP, vCISO, MVP securiTY+ EXAM CRAM EXAM OBJECTIVES (DOMAINS) 1.0 Attacks, Threats, and Vulnerabilities 24% 2.0 Architecture and Design 21% 3.0 Implementation 25% 4.0 Operations and Incident Response 16% 5.0 Governance, Risk, and Compliance 14% 4.0 Operations and Incident Response Given a scenario, use the appropriate tool 4.1 to assess organizational security • Network reconnaissance and discovery • • • • • • • • • • • • • • tracert/traceroute nslookup/dig ipconfig/ifconfig nmap ping/pathping hping netstat netcat IP scanners arp route curl theHarvester sn1per • • • • scanless dnsenum Nessus Cuckoo • • • • • • head tail cat grep chmod logger • File manipulation • Shell and script environments • SSH • PowerShell • Python • OpenSSL • Packet capture and replay • Tcpreplay • Tcpdump • Wireshark • Forensics • • • • • dd Memdump WinHex FTK imager Autopsy • Exploitation frameworks • Password crackers • Data sanitization Hands-on learning will be helpful! Do NOT use active reconnaissance tools to explore or exploit resources without permission Network reconnaissance and discovery Tracert/Traceroute: This shows the route taken from a computer to a remote host such as a website. It also shows response latency (in ms) at each hop. Nslookup: Nslookup is a diagnostic tool for verifying the IP address of a hostname (A record by default) in the DNS server database. Using the set type= command, you can change the type of records it searches. “Set type=MX” scopes search to mail exchange records Dig: Dig is the equivalent of nslookup in a Linux/Unix environment. ipconfig/ifconfig: These commands show the IP configuration. The Windows version is ipconfig, but Unix/Linux can use ifconfig. Nmap: a free and open-source network mapper that can be used to create an inventory of devices on your network Also good for banner grabbing (computer and service info). Network reconnaissance and discovery Pathping: has the functionality of both ping and tracert. also calculates statistics after the trace, showing the packet loss at each router (each hop) it passes through. Hping: an open-source packet generator and analyzer for the TCP/IP protocol, often used for auditing firewalls and networks. for example, testing firewall rules and open ports, and analyzes network traffic, including packet formats and traceroute. Netstat: a native tool on Windows operating system. used to see the established connections, listening ports, and even running services. Netstat shows listening ports and established connections, but if you reboot the computer, the established connections disappear. Network reconnaissance and discovery netcat: or nc, is a Linux/UNIX utility for showing network connections, port scanning, and even file transfer. IP Scanners: the Angry IP scanner is a popular free and opensource, that will scan addresses in a range and ID open ports. will export results to TXT, CSV, or XML format. Comes in command line and GUI versions Address Resolution Protocol (ARP): a protocol for mapping an IP address to a physical MAC address on a local area network. the arp -a command shows the ARP cache. route. enables listing existing routes in the local routing table, as well as adding manual entries into the network routing tables. route print to view local route table, route add to add a route Network reconnaissance and discovery Curl: command-line tool used to transfer data using any of these supported protocols: HTTP, FTP, IMAP, POP3, SCP, SFTP, SMTP, TFTP, TELNET, LDAP, or FILE TheHarvester: This is a passive tool that comes with Kali Linux used to harvest the email addresses of an organization. EXAMPLE: search for email addresses in kali.org domain, limiting results to 500, using Google: theharvester -d kali.org -l 500 -b google You can run Linux on Windows 10 or 11 using the Windows Subsystem for Linux (WSL). Includes a Kali Linux distribution Network reconnaissance and discovery Sn1per: a penetration test reconnaissance tool that can be used for automated tests. can scan for vulnerabilities, open ports, web application vulnerabilities and perform attack surface discovery. dynamic code analysis used by pen testers, bug bounty researchers, and red teams. all-in-one offensive security tool with free and paid versions Scanless: pentesting tool to perform anonymous open port scans on target hosts, such as web servers. (free and open-source) developed in Python, utilizes a number of port scanners, like ipfingerprints, pingeu, spiderip, portcheckers Network reconnaissance and discovery Dnsenum: is a command-line tool that automatically identifies basic DNS records and it has the ability to attempt reverse DNS resolution. brute forces (queries for the existence of hostnames) in order to get their IP address of subdomains and hostnames. used in web penetration testing to identify potential targets for further exploration. Nessus: a network security (vulnerability) scanner. It utilizes plug-ins, which are separate files, to handle the vulnerability checks. raises an alert if it discovers any vulnerabilities that malicious hackers could use to gain access. Cuckoo: This tool creates a sandbox that can be used for analyzing files for malware inspection. File manipulation You may want to look deeper into different files, including the log files that are produced. Here are a few tools in the file manipulation category. Concatenate (cat): The cat command in Linux can be used to create files, view files, and also concatenate several files into another file. To create a new file called weblog, we use the following syntax: cat > weblog You can also concatenate the contents of three files and combine them in an output file using the following syntax: cat file1.txt file2.txt file3.txt | sort > samplefile.txt Head: the /var/log/messages file is an important log file, which shows system events such as shutdown and reboot. We can use the head command to check the top 10 messages from that log head /var/log/messages -n 10 File manipulation Tail: views the last X lines at the end of a log file EXAMPLE: view the last 10 messages in the /var/log/messages log file: tail /var/log/messages -n 10 Grep: used to search text and log files for specific values. EXAMPLE: search a file called users.txt for the name PETE, we would use the following syntax: grep -f PETE users.txt EXAMPLE: search a whole directory for the word project, we can use the following syntax: grep -r project File manipulation chmod: The chmod command is used to change the permission level, for example: chmod 766 Linux permissions covered briefly in Domain 3 In example above, the owner has rwx, the group has rw-, and others have rw-. Logger: can add a message to the local system log file or to a remote syslog server. Frequently used to send log messages from automation scripts to record actions performed and errors encountered. EXAMPLE: logger -n 10.10.10.10 'hostname’ found a potential backdoor attack The tools in this category are core (everyday) commands present in just about any flavor of Linux Shell and script environments SSH: created to serve as a secure alternative to telnet for running commands remotely; it is commonly used when you want remote access to network devices. It can be used as a command-line tool or in a Graphical User Interface (GUI), but it is not browser-based. Unlike telnet, SSH traffic is encrypted PowerShell: PowerShell can perform tasks in a Windows environment. Each command is known as a cmdlet and can be saved to a script with a .ps1 extension. Each PowerShell cmdlet is comprised of a noun and a verb. EXAMPLE: Get-Help will show the help commands. Python: a popular and powerful programming language used by open source developers, and data scientists. Widely used in cybersecurity OpenSSL: a suite that can be used to create and manage Transport Layer Security (TLS) and Secure Socket Layer (SSL) protocol. often used to generate private keys, create CSRs, install your SSL/TLS certificate, and identify certificate information. can create a self-signed certificate Packet capture and replay A protocol analyzer can also be referred to as a packet sniffer. Protocol analyzers can save the data that they collect to a packet capture file (PCAP). tcpreplay: This is an open-source tool that can be used to analyze .pcap files generated by either Wireshark or tcpdump It can then replay the traffic and send it to the NIPS. tcpdump: a network packet analyzer command line tool on Linux/UNIX EXAMPLE: tcpdump -i eth0 shows information on the first Ethernet adapter Wireshark: a free and open-source packet analyzer, with commandline and GUI versions, available for Windows and Linux. forensics Tools in the forensics category are often used in forensic investigation. dd. when the forensics team needs to investigate an image on a desktop or laptop, the dd command can be used to clone a disk or copy a folder in a Linux/Unix environment. In a SCSI environment, the first disk is /dev/sda, the second as /dev/sdb, If the first disk has two partitions, they will be sda1 and sda2. The if command is the input file and the of command represents the output file. Copy Entire Hard Disk: We are going to copy the first SCSI disk to the second SCSI disk. The syntax would be: dd if = /dev/sda of = /dev/sdb Create an Image: We are going to make a disk image of /dev/sda. We would use the this syntax: dd if=/dev/sda of=~/sdadisk.img forensics Tools in the forensics category are often used in forensic investigation. WinHex: a hexadecimal editor that can be used on any version of Windows operating systems to help forensics teams find evidence. can be used to find and recover deleted or lost data from a corrupt drive. Capturing System Memory Dump Files: When a computer system crashes (commonly known as the blue screen of death), all of the content of the memory is saved in a dump file (.dmp). dump files can be analyzed by using a tool such as BlueScreenReview. the Linux equivalent is memdump. FTK imager: a data preview and imaging tool that lets you quickly assess electronic evidence to determine if further analysis with a forensic tool is warranted. Autopsy: can be used to analyze hard drives, smartphones, and media cards. has a built-in translator to translate foreign languages into English. Exploitation frameworks such as the open-source Metasploit Framework, contain capabilities to detect and then exploit vulnerabilities on remote systems. can be used to harden your IT systems before they are attacked. use information from the National Vulnerability Database, which is comprised of Common Vulnerabilities and Exposures (CVE) Uses the Common Vulnerability Scoring System (CVSS), to show the level of severity of each of the vulnerabilities. MOST POPULAR EXPLOIT FRAMEWORKS Metasploit Framework (http://www.metasploit.com) CORE IMPACT (http://www.coresecurity.com) Immunity CANVAS (http://www.immunitysec.com) Password crackers AND DATA SANITIZATION such as the Cain portion of Cain and Able or LOphtcrack, can be used to crack the passwords and create password hashes. In the Security+ exam, when you see names in clear text followed by hashes, the hash is a password hash. the process of irreversibly removing or destroying data stored on a memory device (hard drives, flash memory, SSDs, etc.) It is important to use the proper technique to ensure that all data is purged. 4.0 Operations and Incident Response Summarize the importance of policies, processes, 4.2 and procedures for incident response • Incident response plans • Incident response process • • • • • • Preparation Identification Containment Eradication Recovery Lessons learned • Exercises • Tabletop • Walkthroughs • Simulations • Attack frameworks • MITRE ATT&CK • The Diamond Model of Intrusion Analysis • Cyber Kill Chain • Stakeholder management • Communication plan • Disaster recovery plan • Business continuity plan • Continuity of operations planning (COOP) • Incident response team • Retention policies ©2022 Inside Cloud and Security. No reuse without written permission Plan, process, and procedure Plan vs Process vs Procedure: What is the difference? Plan High-level (light on the details) A set of intended actions, usually mutually related, through which one expects to achieve a goal. Ordered task list or flow chart A series of related tasks or methods that together turn inputs into outputs. Process LOW Level of detail Procedure Task-level details (the “HOW”) A prescribed way of undertaking a process or part of a process. A particular method for performing a task HIGH managing INCIDENT response 6 phases of incident response 1 2 3 4 5 6 Preparation Where incident response plans are written, and configurations documented. Identification determining whether or not an organization has been breached. Is it really an incident? Containment Limiting damage (scope) of the incident. Eradication Once affected systems are identified, coordinated isolation or shutdown, rebuild, and notifications. Recovery Root cause is addressed and time to return to normal operations is estimated and executed. Lessons Learned Helps prevent recurrence, improve IR process. INCIDENT RESPONSE PLANS AND EXERCISES Tabletop Paper-based, hypothetical You distribute copies of incident response plans to the members of the incident response team for review. Team members then provide feedback about any updates needed to keep the plan current. Walkthrough Test team response without full simulation Members of the incident response team gather in a large conference room and role-play an incident scenario. Usually, the exact scenario is known only to the test moderator, who presents the details to the team at the meeting. Can ensure needed tools and resources are available, and team members are familiar with their roles. INCIDENT RESPONSE PLANS AND EXERCISES Simulation Similar to structured walkthrough, except some of the response measures are then tested (on non-critical functions). This one involves some form of ‘doing’ ATTACK FRAMEWORKS An online framework that can be used by commercial organizations. Developed by MITRE, a US Government-sponsored company whose aim is to help prevent cyber-attacks. Provides information about adversaries and their attack methods. Uses the acronym ATT&CK to better articulate the attack vectors used by attackers: Adversarial Tactics, Techniques, & Common Knowledge Adversarial: This looks at the behavior of potential attackers who are put into different groups. Tactics: the medium by which (how) the attack will be carried out. Techniques: a breakdown of the processes of how an attack will be launched. Common Knowledge: documentation relating to the attackers’ tactics and techniques that have been made available online to the general public. The Cyber Kill Chain Lockheed Martin Edition Traces stages of a cyberattack from early reconnaissance to the exfiltration of data Harvesting email addresses, company info, etc. Delivering weaponized bundle to victim via email, web, USB, etc. Installing malware on the asset With ‘hands on keyboard’ access, intruders accomplish their original goals RECONNAISSSANCE DELIVERY INSTALLATION ACTIONS ON OBJECTIVEES 1 2 3 4 5 6 WEAPONIZATION EXPLOITATION COMMAND & CONTROL Actor creates malware tailored to vulnerabilities of the remote target Exploiting a vulnerability to execute code on the victim’s system Command channel for remote manipulation of the victim 7 Diamond Model of Intrusion Analysis A framework for gathering intelligence on network intrusion attacks, comprised four key elements: Adversary The threat actor group Capabilities where the adversary develops an exploit that they use to carry out the attack. Infrastructure This is how the attacker can get to the victim. Victim The person targeted by the adversary. was used by the intelligence community until it was declassified in 2013. Communication Plan The plan that details how relevant stakeholders will be informed in event of an incident. (like a security breach) Would include plan to maintain confidentiality, such as encryption to ensure that the event does not become public knowledge. Contact list should be maintained that includes stakeholders from the government, police, customers, suppliers, and internal staff. Compliance regulations, like GDPR, include notification requirements, relevant parties and timelines Confidentiality amongst internal stakeholders is desirable so external stakeholders can be informed in accordance with the plan. Stakeholder Management When we have an incident, there are multiple groups of relevant stakeholders that we need to inform and manage, and may include: -Internal stakeholders -Cyber insurance provider -Business partners -Customers -Law enforcement A stakeholder is a party with an interest in an enterprise; corporate stakeholders include investors, employees, customers, and suppliers. Regulated industries, such as banking and healthcare will have requirements driven by the regulations governing their industries. BCP Definitions Some BCP-related definitions worth knowing BCP (Business Continuity Plan) the overall organizational plan for “how-to” continue business. DRP (Disaster Recovery Plan) the plan for recovering from a disaster impacting IT and returning the IT infrastructure to operation. COOP (Continuity of Operations Plan) the plan for continuing to do business until the IT infrastructure can be restored. BCP vs DRP Business Continuity Planning (BCP) vs Disaster Recovery Planning (DRP) – What is the difference? BCP focuses on the whole business DRP focuses more on the technical aspects of recovery BCP will cover communications and process more broadly BCP is an umbrella policy and DRP is part of it Incident response team When an incident occurs, it is important to get an incident response team together to deal with the incident. Includes the following roles: Incident Response Manager: A top-level manager who takes charge. Security Analyst: Technical support to the incident. IT Auditor: Checks that the company is compliant. Risk Analyst: Evaluates all aspects of risk. HR: Sometimes employees are involved in the incident. Legal: Gives advice and makes decisions on legal issues. Public Relations: Deals with the press to reduce the impact. The Information Lifecycle Creation Destruction (from a functional perspective) Classification Can be created by users a user creates a file Can be created by systems Archive Storage Usage a system logs access The Information Lifecycle Creation Destruction (from a functional perspective) Classification To ensure it’s handled properly, it’s important to ensure data is classified as soon as possible. Archive Storage Usage The Information Lifecycle Creation Destruction (from a functional perspective) Classification Data should be protected by adequate security controls based on its classification. Archive Storage Usage The Information Lifecycle Creation Destruction (from a functional perspective) Classification refers to anytime data is in use or in transit over a network. Archive Storage Usage The Information Lifecycle Creation Destruction (from a functional perspective) Classification Archive Storage Usage archival is sometimes needed to comply with laws or regulations requiring the retention of data. a data retention policy ensures a company retains data as long as necessary. “as long as necessary” is defined by company policies or regulatory requirements. The Information Lifecycle Creation Destruction (from a functional perspective) Classification When data is no longer needed, it should be destroyed in such a way that it is not readable. Archive Storage Usage Keeping data longer than necessary increases risk The Information Lifecycle Creation Destruction (from a functional perspective) Classification When data is no longer needed, it should be destroyed in such a way that it is not readable. Archive Storage Usage The Information Lifecycle to know for the exam is covered in DOMAIN 5 RETENTION POLICY More on classifications in Domain 5 Labeling / tagging of data based on type, like personally identifiable info (PII), protected health info(PHI), etc. for legal and compliance reasons, you may need to keep certain data for different periods of time. EXAMPLES: some financial data needs to be retained for 7 years Some medical data may need to be retained up to 20-30 years. ensure that legal and compliance issues are addressed. 4.0 Operations and Incident Response Given an incident, utilize appropriate data 4.3 sources to support an investigation • Vulnerability scan output • SIEM dashboards • • • • • • • • • • • • Sensor Sensitivity Trends Alerts Correlation • Log files • Network • System • Application • • • • Security Web DNS Authentication Dump files VoIP and call managers Session Initiation Protocol (SIP) traffic syslog / rsyslog / syslog-ng journalctl NXLog Bandwidth monitors Metadata • • • • Email Mobile Web File Netflow / sFlow • Netflow • sFlow • IPFIX Protocol analyzer output VULNERABILITY SCAN OUTPUT A vulnerability scanner can identify and report various vulnerabilities before they are exploited, such as: Examples include: -software flaws -missing patches -open ports -services that should not be running -weak passwords will help companies avoid known attacks such as SQL injection, buffer overflows, denial of service, and other type of malicious attacks. A credentialed vulnerability scan is the most effective as it provides more information than any other vulnerability scan. SIEM DASHBOARDS dashboards are very useful to the security operations centers as they provide centralized visibility and information on threats in real time. Sensor: Sensors are deployed across your network to monitor and collect changes in network patterns or monitor changes in log file entries as events occur. Varies by solution and device. May be a sensor, syslog, text log, API or other format. Sensitivity: can monitor PII, PHI, and other sensitive information to ensure regulatory compliance (HIPAA, PCI DSS, GDPR) Trends: can identify trends in network traffic, event volume, or changes in activities/ activity levels across identities, endpoints, network and infrastructure. Alerts: provide information about events on hosts and network devices. Email notification and response automation (playbooks, SOAR) optional. Correlation: correlates, aggregates, and analyzes the log files from multiple sources can generate a broad, centralized view. Because sequence of events crosses multiple sources, time sync matters (NTP). LOG FILES Log files play a core role in providing evidence for investigations. You’ll want to be familiar with the many different types of log files for the Security+ exam. Network: This log file can identify the IP and MAC addresses of devices that are attached to your network. Usually sent to a central syslog server NIDS/NIPS can be important in identifying threats and anomalies from these. log files from a proxy server can reveal who’s visiting malicious sites. The collective insight may be useful in stopping DDoS attack Web: web servers log many types of information about the web requests, so evidence of potential threats and attacks will be visible here. information collected about each web session: IP address request, Date and time, HTTP method, such as GET/POST, Browser used, and HTTP Status code. 400 series HTTP response codes are client-side errors 500 series HTTP response codes are server-side errors These logs must be fed to a SIEM, IDS/IPS or other system to analysis this data LOG FILES These files exist on client and server systems. Sending these to a SIEM can help establish a central audit trail and visibility into the scope of an attack. System: contains information about hardware changes, updates to devices, and time synchronization, group policy application, etc. Application: contains information about software applications, when launched, success or failure, and warnings about potential problems or errors. Security: contains information about a successful login, as well as unauthorized attempts to access the system and resources. can identify attackers trying to log in to your computer systems. captures information on file access and can determine who has downloaded certain data. You will find log files with these names in the Event Viewer on any Windows client or server LOG FILES Log files play a core role in providing evidence for investigations. You’ll want go be familiar with the many different types of log files for the Security+ exam. DNS: contains virtually all DNS server-level activity, such as zone transfer, DNS server errors, DNS caching, and DNSSEC. DNS query logging often disabled by default due to volume. Authentication: information about login events, logging success or failure. multiple sources authenticating log files in a domain environment, including RADIUS, Active Directory, and cloud providers Azure Active Directory. Dump Files: file generated when a computer crashes, with contents in the memory are saved in a dump file (.dmp). dump files can be analyzed by using a tool such as the BlueScreenReview, Windows Debugger, and Kernel Debugger. LOG FILES VoIP phones are embedded systems that must be secured Log files related to voice applications can be valuable in identifying anomalous activity, unauthorized users, and even potential attacks. VoIP and Call Managers: These systems provide information on the calls being made and the devices that they originate from. may also capture call quality by logging the Mean Optical Score (MOS), jitter, and loss of signal. Significant loss in quality may indicate attack each call is logged (inbound and outbound calls), the person making the call, and the person receiving the call. Including long-distance calls Session Initiation Protocol (SIP) Traffic: SIP is used for internet-based calls and the log files generally show: the 100 events, known as the INVITE, the initiation of a connection, that relates to ringing. the 200 OK is followed by an acknowledgement. Large number of calls not connecting may indicate attack syslog / rsyslog / syslog-ng These log management solutions all perform the same basic functions – SYSLOG Linux solutions Syslog the original is known as a log collector as it collects event logs from various devices and often sent to a central syslog server. in the Linux version, it is implemented as syslogd or syslog daemon, which stores the log files in the var/log/syslog directory. Rsyslog called rocket-fast as it has a high performance. receives data, transforms, and can send output to destinations such as a SIEM server or other syslog. Log forwarding Syslog-ng an open-source logging solution for Unix and Linux systems. broader platform support than Rsyslog. Great opensource options that came later Journalctl and nxlog Other logging solutions provides several system components for Linux journalctl a utility for querying and displaying logs from journald, which is systemd's logging service. journald collects and stores log data in binary format. journalctl is used to query and display these logs in a readable format. NXLog an open-source log management tool that helps identify security risks in a Linux/ Unix environment. a multi-platform log collection and centralization tool that offers log processing features, including log enrichment and log forwarding. similar to syslog-ng or Rsyslog but it is not limited to UNIX and syslog only. Supports Linux, Windows, and Android Bandwidth monitors can be used to understand your network traffic flow. monitor changes in traffic patterns and identify devices on the network that are causing bottlenecks. can detect broadcast storms and potential denial-of-service attacks. a way for IT professionals to determine actual bandwidth availability on your systems. metadata data that provides information about other data. Email: headers contain detailed information, including source, destination, and route through the email providers to the recipient. can be used when phishing emails are received to identify the bad actor Mobile: Telecom providers retain information about phone calls, including calls made, calls received, text messages, internet usage, and location information. can be used in an investigation to provide evidence of suspect’s location Web: Website metadata provides information about every page created on a website, including author, date created, images, and other files (videos, pdfs, etc.) File: When investigations are being carried out, the file metadata can be used to track information such as the author, date created, date modified, and file size. file metadata does not include info on actions like printing or copying Photograph: When someone takes a photograph, the metadata might include geotagging that documents the location in which a photograph was taken. you cannot get metadata from a deleted file after recovery Netflow, sflow, IPFIX Network monitoring solutions Netflow Proprietary a CISCO product that monitors network traffic can identify the load on the network. in an investigation, it can help identify patterns in network traffic. Sflow Supports a wide variety of network hardware vendors a multi-vendor product that provides visibility into network traffic patterns. can help identify malicious traffic to help in securing the network. IP Flow Information Export (IPFIX) Open source, similar to and can be used to capture traffic from the node itself. patterned after Netflow data can then be exported to a collector within the node. can be used to identify data traveling through a switch to facilitate billing. can format IP Flow data and forward it to a collector. Protocol analyzer output Details on output format, compatibility and use in forensic investigation A protocol analyzer can also be referred to as a packet sniffer. Protocol analyzers can save the data that they collect to a packet capture file (.PCAP). PCAP file format is a binary format, with support for nanosecond-precision timestamps Wireshark, Tcpreplay, and tcpdump all support .PCAP format Can be used for forensics by replaying network traffic sent to network devices from which they capture traffic. Law enforcement has used PCAP data successfully in prosecuting cybercrime 4.0 Operations and Incident Response Given an incident, apply mitigation techniques 4.4 or controls to secure an environment • Reconfigure endpoint security solutions • Application approved list • Application blocklist/deny list • Quarantine • Configuration changes • • • • • Firewall rules MDM DLP Content filter/URL filter Update or revoke certificates • • • • Isolation Containment Segmentation SOAR • Runbooks • Playbooks Reconfigure Endpoint Security Solutions When technologies change or we suffer a data breach, we might have to reconfigure the endpoint security solutions. Approved Applications List Where the approved applications are listed. If an application is not listed, it cannot be launched. Application Block List/Deny List List of apps deemed dangerous, such as certain offensive security tools. If the app is on the blocklist, the app cannot run. Quarantine When a device has been infected with a virus, it is removed from the network. With Network Access Control (NAC) user is authenticated and device checked to confirm patched and compliant before being granted access. Will be blocked and may be placed in a quarantine network for remediation. Configuration changes As new attacks emerge, configuration changes may be necessary to secure the environment. will vary for network and host-based firewalls can be used to block traffic and we can use either an MDM solution or group policy to change the configuration on endpoint devices. can be used to push configuration changes to mobile devices. can enforce device settings from password policy to blocking camera. policy-based protection of sensitive data, usually based on labels or pattern match. new patterns to identify sensitive data may emerge Protects data at-rest or in-transit, in email, Intranet, cloud drives, etc. Configuration changes As new attacks emerge, configuration changes may be necessary to secure the environment. Changes in attacks, might require an update to the content filters on either a proxy server or a UTM firewall. Some devices, like a NGFW, may automatically detect new threats and adjust accordingly : Endpoints reporting a host or trust error may indicate a certificate problem. This may require updating a certificate that has expired or revoke a certificate because it has been compromised. Internet-facing services need a certificate issued by a commercial CA Isolation Air gap endpoints are used to view classified data to isolate the endpoint from the network to protect against a network-based attack. Air gap eliminates all network connectivity (wired, wi-fi) The only way to add or extract data from an air gapped computer is by using a removable device such as a USB drive. Requiring users entering an area for confidential meetings or to view secret research to place their phones in a faraday cage. It blocks electromagnetic signals from entering or exiting the cage, rendering cellular signals useless containment Containment is about minimizing damage and limiting the scope of an incident. Examples of containment If an endpoint has been compromised and may be infected by a virus, IT Security will contain to stop the malware spreading. removing infected machines from the network. disabling user accounts that have been used to breach your network. A containment process that minimizes downtime and disruption is preferable Remember the incident response process. Containing the incident comes before finding root cause and full remediation. segmentation Mobile device management. in a BYOD mobile device scenario, mobile app management (MAM) will keep personal and business data separate. Prevents personal data from being removed in remote wipe. Endpoints. segment devices that have become vulnerable, such as an unpatched printer where there are no updates. You could place these printers in a VLAN. Non-compliant devices can be quarantined until remediated. This is possible with network access control (NAC) Applications. Within a private subnet, VLANs can be used to carry out segmentation and traffic filtering for sensitive apps and data. These rules could be enforced with subnets and firewalls SIEM and SOAR often use AI, ML, and threat intelligence Security Information Event Management Security Orchestration Automation, & Response system that collects data from many other sources within the network. provides real-time monitoring, traffic analysis & notification of potential attacks. centralized alert and response automation with threat-specific playbooks. response may be fully automated or single-click. these capabilities are commonly delivered together in a single solution SOAR Playbooks and runbooks documents with info on events and the necessary actions to stop threats. can be used to configure automated response in a playbook. Documents the human analyst response steps contain a set of rules and actions to identify incidents and take preventative action. may need to be amended for better automated response as threats evolve. This is the response automation 4.0 Operations and Incident Response 4.5 Explain the key aspects of digital forensics • Documentation/evidence • • • • • • • • • Legal hold Video Admissibility Chain of custody Timelines of sequence of events • Time stamps • Time offset Tags Reports Event logs Interviews • Acquisition • Order of volatility • Disk • Random-access memory (RAM) • Swap/pagefile • OS • Device • Firmware • Snapshot • Cache • Network • Artifacts • On-premises vs. cloud • Right-to-audit clauses • Regulatory/jurisdiction • Data breach notification laws • Integrity • • • • • • Hashing • Checksums • Provenance Preservation E-discovery Data recovery Non-repudiation Strategic intelligence/ counterintelligence Documentation and evidence protecting any documents that can be used in evidence from being altered or destroyed. sometimes called litigation hold tracks the movement of evidence through its collection, safeguarding, and analysis lifecycle documents each person who handled the evidence, the date/time it was collected or transferred, and the purpose for the transfer. Confirms appropriate collection, storage, and handling EVIDENCE ADMISSIBILITY Requirements for evidence to be admissible in a court of law: TO BE ADMISSIBLE: Evidence must be relevant to a fact at issue in the case. makes a fact more or less probable than without The fact must be material to the case. the evidence Is important in proving a case The evidence must be competent or legally collected. competent means “reliable” here Must be obtained by legal means. To prevail in court, evidence must be sufficient, which means “convincing without question, leaving no doubt” DOCUMENTATION/EVIDENCE CCTV can be a good source of evidence for helping to identify attackers and the time the attack was launched. Can be vital in apprehending suspects and reconstructing timeline of events. Time stamps. Each file has timestamps showing when files were created, last modified, and last accessed Time offset. where evidence is collected across multiple time zones, you must record offset based on time zone. For example, recording the time offset, it looks as if it started in Chicago, but if we apply time normalization, when it is 4 a.m. in London, the time in Chicago is 10 p.m. eDiscovery tags virtual are virtual 'sticky notes’ or labels attached to documents, making them easier to search/find. Helps legal team stay organized and build a defensible case. DOCUMENTATION/EVIDENCE To support an effective post incident review, all key discussions and decisions made during the eradication event should be well documented. A report should be produced from the post incident review and presented to all relevant stakeholders. Provide a means to reconstruct sequence of events. Centralized log collection helpful here, and audit trail a requirement. Maintaining audit trail is a legal requirement in some cases To track incidents, we need to be actively monitoring and actively logging changes to patterns in our log files or traffic patterns in our network. SIEM can help with log collection, aggregation, and analysis A photofit is a reconstructed picture of a suspect The police may also take witness statements to try and develop a picture of who was involved and maybe then use photofits so that they can be apprehended. TYPES OF evidence EXTRA CREDIT Best. Original, preferred by courts. Secondary evidence. Copy. Direct. Proves or disproves an act based on the five senses. Conclusive. Incontrovertible, overrides all other types. Circumstantial. Inference from other info. Corroborative. Supporting evidence but cannot stand on its own. Opinions. Expert and non-expert. Hearsay. Not based on first-hand knowledge. Evidence must be relevant, complete, sufficient and reliable ACQUISITION OF EVIDENCE As soon you discover an incident… Importance of collecting You must begin to collect evidence and as much information about the incident as possible. Evidence can be used in a subsequent legal action or in finding attacker identity. Evidence can also assist you in determining the extent of damage. evidence storage Understand the concerns for evidence storage How to retain logs, drive images, VM snapshots, and other datasets for recovery, internal and forensic investigations. Protections for evidence storage include: - locked cabinets or safes dedicated/isolated storage facilities offline storage access restrictions and activity tracking hash management and encryption ACQUISITION Areas and considerations in evidence acquisition. Disk aka hard drive. Was the storage media itself damaged? Random-access memory (RAM). Volatile memory used to run applications. Swap/Pagefile. used for running applications when RAM is exhausted. OS (operating system). Was there corruption of data associated with the OS or the applications? Device. When the police are taking evidence from laptops, desktops, and mobile devices they take a complete system image. The original image is kept intact, installed on another computer, hashed, then analyzed to find evidence of any criminal activity. ACQUISITION Firmware. embedded code, could be reversed engineered by an attacker, so original source code must be compared to code in use. a coding expert to compare both lots of source code in a technique called regression testing. rootkits and backdoors are concerns Snapshot. If the evidence is from a virtual machine, a snapshot of the virtual machine can be exported for investigation. Cache. special high-speed storage that can be either a reserved section of main memory or an independent high-speed storage device. memory cache AND disk cache, both are volatile Network. OS includes command-line tools (like netstat) that provide information that could disappear if you reboot the computer. Like RAM, connections are volatile and lost on reboot. Artifacts. any piece of evidence, including log files, registry hives, DNA, fingerprints, or fibers of clothing normally invisible to the naked eye. ORDER OF VOLATILITY To determine what happened on a system, you need a copy of the data. What evidence you collect first? most volatile (perishable) information should be collected first. If it disappears with a system reboot or passage of time, it is volatile In approximate order: 1. CPU, cache, and register contents 2. Routing tables, ARP cache, process tables, kernel statistics 3. Live network connections and data flows 4. Memory (RAM) 5. Temporary file system and swap/pagefile 6. Data on hard disk 7. Remotely logged data 8. Data stored on archival media and backups Collection must also consider questions of storage and chain of custody! On premises vs cloud Customer rights and capabilities to perform forensic investigation varies in the cloud versus on-premises. written into supply chain contracts, allow an auditor can visit the premises to inspect and ensure that the contractor is complying with contractual obligations. This would help an auditor identify: - Faulty or inferior quality of goods - Short shipments - Goods not delivered - Kickbacks - Gifts and gratuities to company employees - Commissions to brokers and others - Services allegedly performed that were not actually necessary On premises vs cloud Customer rights and capabilities to perform forensic investigation varies in the cloud versus on-premises. Cloud data should be stored and have data sovereignty in region stored. Many countries have laws requiring businesses to store data within their borders. The US introduced the Clarifying Lawful Overseas Use of Data (CLOUD) Act in 2018 due to the problems that FBI faced in forcing Microsoft to hand over data stored in Ireland. Aids in evidence collection in investigation of serious crimes In 2019, the US and the UK signed a data-sharing agreement to give law enforcement agencies in each country faster access to evidence held by cloud service providers. Verifying right-to-audit and audit procedures with your cloud provider to ensure you understand your rights and their legal obligations before you sign contracts is critical. On premises vs cloud Forensic investigators should know their legal rights in every jurisdiction (region or country) where the organization hosts data in the cloud. Some countries will not allow eDiscovery from outside their borders In traditional forensic procedures, it is “easy” to maintain an accurate history of time, location, and handling. In the cloud, physical location is somewhat obscure. However, investigators can acquire a VM image from any workstation connected to the internet. Time stamps and offsets can be more challenging due to location. Maintaining a proper chain of custody is more challenging in the cloud. Varies by country and regulations. For example, GDPR requires notification within 72 hours. and applies to ANY company with customers in the EU ! integrity When either the forensic copy or the system image is being analyzed, the data and applications are hashed at collection. It can be used as a checksum to ensure integrity later. File can be hashed before and after collection to ensure a match on the original hash value to prove data integrity. Data provenance effectively provides a historical record of data and its origin and forensic activities performed on it. Similar to data lineage, but also includes the inputs, entities, systems and processes that influenced the data PRESERVATION Data needs to be preserved in its original state so that it can be produced as evidence in court. original data must remain unaltered and pristine. What is a “forensic copy” of evidence? an image or exact, sector by sector, copy of a hard disk or other storage device, taken using specialized software, preserving an exact copy of the original disk. Deleted files, slack space, system files and executables (and documents renamed to mimic system files and executables) are all part of a forensic image. Putting a copy of the most vital evidence in a WORM drive will prevent any tampering with the evidence (you cannot delete data from a WORM drive.) You could also write-protect/put a legal hold on some types of cloud storage. E-discovery (electronic discovery) e-discovery is about gathering the data. the process of identifying, preserving, collecting, processing, reviewing, and producing electronically stored information (ESI) in litigation. The digital forensics process involves identifying, preserving, collecting, recovering, analyzing, and reporting on digital information. During e-discovery, Cloud Service Providers (CSP) may be subpoenaed to allow collection, review, and interpretation of electronic documents and data. Digital forensics vs eDiscovery: what’s the difference? computer forensics involves the use of a forensic expert to protect data integrity and to copy/capture/recover the data stored on a device. eDiscovery firms typically do not analyze the data they collect. Forensic investigators have specialized training enabling them to analyze data, protect data integrity, and recover missing or deleted data. Data recovery requires specialized training and knowledge A process used to retrieve data which will be used for legal purposes. Investigators must work with information in a way that will not change or compromise the original source. They can use a variety of techniques to fill in missing pieces or make information meaningful. EXAMPLE: restoring a damaged or deleted partition, looking for traces of information which could reveal how and when the partition was used. may be working with computers which have been seeded with safety measures to prevent legal investigations, requiring special procedures. E-discovery works in conjunction with digital forensics - their functions are complementary. Non-repudiation Non-repudiation is the guarantee that no one can deny a transaction. Digital Signatures prove that a digital message or document was not modified—intentionally or unintentionally—from the time it was signed. based on asymmetric cryptography (a public/private key pair) the digital equivalent of a handwritten signature or stamped seal. message authentication code (MAC). the two parties that are communicating can verify non-repudiation. is generated via a cryptographic algorithm that depends on both the message and session key known only to the sender and receiver Digital signatures are covered in more detail in Domain 2 Strategic intelligence/ counterintelligence Historically, when governments gather (and potentially exchange) data about cyber criminals so that they can work together to reduce threats. In the context of forensic investigation, gathering evidence can also be performed using strategic intelligence methods. Focuses gathering threat information about a domain, including business info, geographic info, or other details on a specific country. Counterintelligence The target of someone’s strategic intelligence may want to prevent that intelligence gathering from occurring. The target may perform strategic counterintelligence (CI) to identify and disrupt the adversary gathering intelligence. EXAM OBJECTIVES (DOMAINS) 1.0 Attacks, Threats, and Vulnerabilities 24% 2.0 Architecture and Design 21% 3.0 Implementation 25% 4.0 Operations and Incident Response 16% 5.0 Governance, Risk, and Compliance 14% 5.0 Governance, Risk, and Compliance 5.1 Compare and contrast various types of controls • Category • Managerial • Operational • Technical • Control type • Preventive • Detective • Corrective • Deterrent • Compensating • Physical Know the security controls that fall into each category! D O M A I N 5 : CONTROLS Security measures for countering and minimizing loss or unavailability of services or apps due to vulnerabilities D O M A I N 5 : CONTROLS The terms safeguards and countermeasure may seem to be used interchangeably D O M A I N 5 : CONTROLS are proactive are reactive functional order of security controls Deterrence Denial Detection Delay SECURITY CONTROLS There are three categories of security controls: Managerial. Policies and procedures defined by org’s security policy, other regulations and requirements. Operational. are executed by company personnel during their day-to-day operations. security awareness training, change mgmt, BCP Technical. aka “logical”, involves the hardware or software mechanisms implemented by IT team to reduce risk. firewall rules, antivirus/malware, IDS/IPS, etc. CONTROL TYPES Deterrent. Deployed to discourage violation of security policies. Preventative. Deployed to thwart or stop unwanted or unauthorized activity from occurring. Detective. Deployed to discover or detect unwanted or unauthorized activity. Compensating. Provides options to other existing controls to aid in enforcement of security policies. CONTROL TYPES Deterrent. Deployed to security policies. Preventative. Deployed to thwart or of from occurring. Detective. Deployed to unwanted or unauthorized activity. Compensating. Provides to aid in enforcement of security policies. CONTROL TYPES Corrective. modifies the environment to return systems to normal after an unwanted or unauthorized activity has occurred. Physical. a control you can physically touch. CONTROL TYPES Corrective. modifies the environment to after an unwanted or unauthorized activity has occurred. Physical. a control you can . CONTROL TYPES Preventative deployed to stop unwanted or unauthorized activity from occurring, EXAMPLES: fences, locks, biometrics, mantraps, alarm systems, job rotation, data classification, penetration testing, access control methods, Deterrent deployed to discourage the violation of security policies. A deterrent control picks up where prevention leaves off. EXAMPLES: locks, fences, security badges, security guards, mantraps, security cameras, trespass or intrusion alarms, separation of duties, awareness training, encryption, auditing, and firewalls. . CONTROL TYPES Detective deployed to discover unwanted or unauthorized activity. Often are after-the-fact controls rather than real-time controls. EXAMPLES: security guards, guard dogs, motion detectors, job rotation, mandatory vacations, audit trails, intrusion detection systems, violation reports, honey pots, and incident investigations, Physical barriers deployed to prevent direct contact with systems or portions of a facility. EXAMPLES: guards, fences, motion detectors, locked doors, sealed windows, lights, cable protections, laptop locks, swipe cards, guard dogs, video cameras, mantraps, and alarms. CONTROL TYPES Corrective deployed to restore systems to normal after an unwanted or unauthorized activity has occurred. minimal capability to respond to access violations. EXAMPLES: intrusion prevention systems, antivirus solutions, alarms, mantraps, business continuity planning, and security policies, Compensating deployed to provide options to other existing controls to aid in the enforcement and support of a security policy. EXAMPLES: security policy, personnel supervision, monitoring, and work task procedures. 5.0 Governance, Risk, and Compliance 5.2 Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture • Regulations, standards, and legislation • General Data Protection Regulation (GDPR) • National, territory, or state laws • Payment Card Industry Data Security Standard (PCI DSS) • Key frameworks • Center for Internet Security (CIS) • National Institute of Standards and Technology (NIST) Risk Management Framework (RMF)/ Cybersecurity Framework (CSF) • International Organization for Standardization (ISO) 27001/27002/27701/31000 • SSAE SOC 2 Type I/II • Cloud security alliance • Cloud control matrix • Reference architecture • Benchmarks /secure configuration guides • • • • • Platform/vendor-specific guides Web server OS Application server Network infrastructure devices ©2022 Inside Cloud and Security. No reuse without written permission DEFINING SENSITIVE DATA Sensitive data is any information that isn’t public or unclassified. Personally Identifiable Information (PII). any information that can identify an individual (name, SSN, birthdate/place, biometric records, etc) Protected Health Information (PHI). healthrelated information that can be related to a specific person. REGULATIONS, STANDARDS, AND LEGISLATION Deals with the handling of data while maintaining privacy and rights of an individual. General Data Protection Regulation It is international as it was created by the EU, which has 27 different countries as members. GDPR applies to ANY company with customers in the EU REGULATIONS, STANDARDS, AND LEGISLATION Steps to reduce or eliminate GDPR requirements Anonymization. The process of removing all relevant data so that it is impossible to identify original subject or person. If done effectively, then GDPR is no longer relevant for the anonymized data. Good only if you don’t need the data! REGULATIONS, STANDARDS, AND LEGISLATION Steps to reduce or eliminate GDPR requirements Anonymization. The process of removing all relevant data so that it is impossible to identify original subject or person. If done effectively, then GDPR is no longer relevant for the anonymized data. Pseudonymization. The process of using pseudonyms (aliases) to represent other data. Can result in less stringent requirements than would otherwise apply under the GDPR. Use if you need data and want to reduce exposure REGULATIONS, STANDARDS, AND LEGISLATION Gramm-Leach-Bliley Act (GLBA) focused on services of banks, lenders, and insurance severely limited services they could provide and the information they could share with each other LEGAL & REGULATORY Federal Information Security Management Act Required formal infosec operations for federal gov’t Requires that government agencies include the activities of contractors in their security management programs Repealed and replaced the Computer Security Act of 1987 and Government Information Security Reform Act of 2000 NIST responsible for developing the FISMA implementation guidelines Any mention on exam will be brief. Remember it applies to “government” LEGAL & REGULATORY HIPAA (Health Insurance Portability and Accountability Act) HITECH (Health Information Technology for Economic and Clinical Health) Widens scope of privacy protections under HIPAA Gramm-Leach-Bliley Act (financial institutions) Children’s Online Privacy Protection Act (COPPA) was designed to protect children under age 13 Electronic Communications Privacy Act (ECPA) prohibits a third party from intercepting or disclosing communications without authorization REGULATIONS, STANDARDS, AND LEGISLATION Payment Card Industry Data Security Standard a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions created jointly in 2004 by four major credit-card companies: Visa, MasterCard, Discover and American Express BASED ON 6 MAJOR OBJECTIVES > a secure network must be maintained in which transactions can be conducted > cardholder information must be protected wherever it is stored > systems should be protected against the activities of malicious hackers > cardholder data should be protected physically as well as electronically. > networks must be constantly monitored and regularly tested > a formal information security policy must be defined, maintained, and followed KEY FRAMEWORKS (CIS) a not-for-profit organization that publishes information on cybersecurity best practices and threats. has tools to help harden your environment and provide risk management. provides benchmarks for different operating systems and provides controls to help secure your organization. Details at https://www.cisecurity.org/cybersecurity-tools/. (NIST) Cyber Security Framework (CSF): NIST RMF/CSF a set of guidelines and best practices to help organizations build and improve their cybersecurity posture. CSF is aimed at private industry (commercial businesses) replaces NIST's Risk Management Framework (RMF) and was designed to focus on risk management for governmental agencies. CSF available at https://www.nist.gov/cyberframework. RMF available at https://csrc.nist.gov/projects/risk-management/rmf-overview. KEY FRAMEWORKS (ISO) develops global technical, industrial and commercial standards. ISO standards for information systems include ISO 27001 – Security techniques for Information Security Management Systems: an international standard on how to manage information security. Available at https://www.iso.org/standard/54534.html ISO 27002 – Code of Practice for Information Security Controls, which aims to improve the management of information. Available at https://www.iso.org/standard/54533.html. ISO 27701 – An extension to 27001/27002 for Privacy Information Management – provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS). Available at https://www.iso.org/standard/71670.html. ISO 31000 – provides principles, a framework and a process for managing risk for organizations of any size in any sector. Available at https://www.iso.org/standard/65694.html. KEY FRAMEWORKS (SSAE) SSAE 18 is an audit standard to enhance the quality and usefulness of System and Organization Control (SOC) reports. designed for larger organizations, such as cloud providers (the cost of a Type 2 report can run $30,000 or more). SOC 2 Type 1 report that assesses the design of security processes at a specific point in time. SOC 2 Type 2 (often written as “Type II”) assesses how effective those controls are over time by observing operations for six months. KEY FRAMEWORKS (CSA) is a not-for-profit organization that produces resources to help Cloud Service Providers (CSPs), like online training, webinars, discussion groups, and virtual summits. Cloud Control Matrix (CCM) is designed to provide a guide on security principles for cloud vendors and potential cloud customers to assess the overall risk of a cloud provider: CSA Reference Architecture contains best security practices for CSPs and examples, examines topics, such as - Security and risk - Presentation services - Application services - Information services - IT Operation and Support (ITOS) - Business Operation and Support Services (BOSS) FOR THE EXAM: Remember CSA CCM helps potential customers measure the overall risk of a CSP. BENCHMARKS/SECURE CONFIGURATION GUIDES benchmarks are configuration baselines and best practices for securely configuring a system. Platform-/Vendor-Specific Guides: released with new products so that they can be set up as securely as possible, making them less vulnerable to attack. Web Servers: the two main web servers used by commercial companies are Microsoft’s Internet Information Server (IIS), and the Linux-based Apache. because they are public-facing, they are prime targets for hackers. to help reduce the risk, both Microsoft and Apache provide security guides to help security teams reduce the attack surface, making them more secure. These guides advise updates being in place, unneeded services are disabled, and the operating system is hardened to minimize risk of security breach. BENCHMARKS/SECURE CONFIGURATION GUIDES benchmarks are configuration baselines and best practices for securely configuring a system. Operating Systems: Most vendors, such as Microsoft, have guides that detail the best practices for installing their operating systems. OS benchmarks are also available from CIS and others Application Server: Vendors produce guides on how to configure application servers, such as email servers or database servers, to make them less vulnerable to attack. Network Infrastructure Devices: companies like Cisco produce network devices and offer benchmarks for secure configuration. benchmarks aim to ease process of securing a component, reduce attack footprint, and minimize risk of security breach. 5.0 Governance, Risk, and Compliance Explain the importance of policies 5.3 to organizational security • Personnel • • • • • • • • • • • • Acceptable use policy Job rotation Mandatory vacation Separation of duties Least privilege Clean desk space Background checks Non-disclosure agreement (NDA) Social media analysis Onboarding Offboarding User training • Gamification • Capture the flag • Phishing campaigns • Phishing simulations • Computer-based training (CBT) • Role-based training • Diversity of training techniques • Third-party risk management • • • • • • • • • • Vendors Supply chain Business partners Service level agreement (SLA) Memorandum of understanding (MOU) Measurement systems analysis (MSA) Business partnership agreement (BPA) End of life (EOL) End of service life (EOSL) NDA • Data • Classification • Governance • Retention • Credential policies • • • • • Personnel Third-party Devices Service accounts Administrator/root accounts • Organizational policies • Change management • Change control • Asset management LIMITING ACCESS & damage Need-to-know and the principle of least privilege are two standard IT security principles implemented in secure networks. They limit access to data and systems so that users and other subjects have access only to what they require. They help prevent security incidents They help limit the scope of incidents when they occur. When these principles are not followed, security incidents result in far greater damage to an organization. preventing fraud and collusion Collusion is an agreement among multiple persons to perform some unauthorized or illegal actions. Separation of duties a basic security principle that ensures that no single person can control all the elements of a critical function or system. Job rotation employees are rotated into different jobs, or tasks are assigned to different employees. Implementing these policies helps prevent fraud by limiting actions individuals can do without colluding with others. monitoring privileged operations Privileged entities are trusted, but they can abuse their privileges. it’s important to monitor all assignment of privileges and the use of privileged operations. Goal to ensure that trusted employees do not abuse the special privileges they are granted. Monitoring these operations can also detect many attacks because attackers commonly use special privileges espionage & sabotage external insider when a competitor tries to steal information, and they may use an internal employee. malicious insiders can perform sabotage against an org if they become disgruntled for some reason Personnel policies increases the physical security of data by requiring employees to limit what is on their desk to what they are working on at the present time. Anything else is secured and out of sight NON-DISCLOSURE AGREEMENT a legal contract intended to cover confidentiality. The scope of an NDA will vary based on situation. Always review terms before signing any NDA All potential employees should be thoroughly screened with an extensive background check before being hired and granted network access. Should part of employment screening policy personnel describe how the employees in an organization can use company systems and resources, including software, hardware, and access. Should include the consequences of misuse not allowing one person to be in one position for a long period of time. Extended control of assets can result in fraud requiring employees (especially those in sensitive areas) to take their vacations. Replacement provides another measure of oversight personnel a basic security principle that ensures that no single person can control all the elements of a critical function or system. Reduces likelihood of collusion amongst employees a subject should be given only those privileges necessary to complete their job-related tasks. Can prevent or limit scope of security incidents and data theft Analysis of a potential employee's social media during the hiring process to understand more about an individual based on their Internet presence. Helps identify cultural alignment, character concerns personnel process of integrating a new employee into a company and its culture, customers, etc. Often includes review and signing of company policies (like AUP) the process that leads to the formal separation between an employee and the company through resignation, termination, or retirement. Includes return of equipment, access badge, and exit interview Disabling user access in this process should be aligned between IT and HR. personnel used in computer-based training (CBT) to provide employees with a question/challenge. can helps to gauge learner retention of the information presented. May promote competition by awarding points and a leader board a security related competition where someone is trying to hack into a resource to gain access to data. team (offense) attempts to breach, while the team (defense) defend resources. Benefits may include skills development, team-building, employee morale personnel false phishing emails sent to employees by IT using a service that measure response (pass/fail). Fail often triggers just-in-time user training self-paced training available via computer, whether for job role or skills enhancement May be “always available” and use measured when the company carries out related training specific to a user’s specific job role Should include training on role-specific security awareness THIRD-PARTY RISK MANAGEMENT (BPA) is used between two companies who want to participate in a business venture to make a profit. details how much each partner’s contributions, rights and responsibilities, as well as the details of operations, decision-making, and sharing of profits. also has rules for the partnership ending either at a given point or if one of the partners dies or moves on. (MOU) a formal agreement between two or more parties indicating their intention to work together toward a common goal. similar to an SLA in that it defines the responsibilities of each party. more formal alternative to handshake but lacks the binding power of a contract. (MOA) similar to an MOU but serves as a legal document and describes terms and details of the agreement. THIRD-PARTY RISK MANAGEMENT Measurement Systems Analysis provides a way for an organization to evaluate the quality of the process used in their measurement systems. will assess the measurement process itself, and then calculate any uncertainty or variation in the measurement process. evaluates the test method, instruments, and process to ensure the integrity of data used for analysis MSA is an important element of Six Sigma methodology and of other quality management systems. THIRD-PARTY RISK MANAGEMENT NON-DISCLOSURE AGREEMENT END OF LIFE contract with vendors and suppliers not to disclose the company’s confidential information. A “mutual NDA” binds both parties in the agreement point at which a vendor stops selling a product and may limit replacement parts and support. EOL often specific to an older version END OF SERVICE LIFE product is no longer sold by manufacturer, updates cease, and support agreements are not renewed. considered the final phase of product life Products are usually declared EOL before being declared EOSL. THIRD-PARTY RISK MANAGEMENT Today, most services are delivered through a chain of multiple entities THIRD-PARTY RISK MANAGEMENT A secure supply chain includes who are secure, reliable, trustworthy, reputable Due diligence should be exercised in assessing vendor security posture, business practices, and reliability THIRD-PARTY RISK MANAGEMENT A secure supply chain includes who are secure, reliable, trustworthy, reputable May include periodic attestation requiring vendors to confirm continued implementation of security practices THIRD-PARTY RISK MANAGEMENT A secure supply chain includes who are secure, reliable, trustworthy, reputable A vulnerable vendor in the supply chain puts the organization at risk THIRD-PARTY RISK MANAGEMENT When evaluating 3rd parties in the chain, consider: On-Site Assessment . Visit organization, interview personnel, and observe their operating habits. Document Exchange and Review . Investigate dataset and doc exchange, review processes. Process/Policy Review . Request copies of their security policies, processes, or procedures. Third-party Audit. Having an independent auditor provide an unbiased review of an entity’s security infrastructure. THIRD-PARTY RISK MANAGEMENT Stipulate performance expectations such as maximum downtimes and often include penalties if the vendor doesn’t meet expectations. Generally used with vendors (external) Credential policies Internal staff Identity provider will be under management of IT (greater control). Avoid using shared accounts unless necessary. breaks non-repudiation Best practices for MFA, password complexity, and least privilege enforced. Business partners, vendors, suppliers May include accounts from external identity providers (Azure AD, OAuth2, OpenID). Should be required to use multi-factor authentication. Additional conditions should be applied for sensitive operations. Conditions might include location, device, connection method, etc. desktops, laptops, mobile, point-of-sale, IoT Default passwords should be changed on devices with generic accounts. For MDM managed devices, certificate authentication may be possible. Access restricted for unknown/unmanaged and non-compliant devices Credential policies are used to run applications/services such as antivirus. May run as local service accounts with the same rights as a user. A system account provides higher level of privilege, giving a service full control. Administrator accounts (Windows) and root accounts (Linux) should be protected as they enable elevated access. Require periodic password changes and enforce password complexity. Admin users should have two accounts: a normal user account for day-to-day use and an admin account for administrative duties. All accounts should have some form of multi-factor authentication enabled. SMS as a 2nd factor is discouraged Conditional access FROM DOMAIN 3 (3.7) image credit: Microsoft often possible in federation scenarios (SAML, OAuth, OpenID) ORGANIZATIONAL POLICIES Can prevent security related incidents and outages Configuration Management ensures that systems are configured similarly, configurations are known and documented. Baselining ensures that systems are deployed with a common baseline or starting point, and imaging is a common baselining method. Change Management the policy outlining the procedures for processing changes helps reduce risk associated with changes, including outages or weakened security from unauthorized changes. requires changes to be requested, approved, tested, and documented. ORGANIZATIONAL POLICIES Change Control refers to the process of evaluating a change request within an organization and deciding if it should go ahead. requests are sent to the Change Advisory Board (CAB) to ensure that it is beneficial to the company. Change Management Change Control policy that details how changes will be processed in an organization process of evaluating a change request to decide if it should be implemented Guidance on the process The process in action ORGANIZATIONAL POLICIES Asset Management: process where each asset belonging to the company is been tagged and recorded in an asset register. maintain an up-to-date asset register to ease the process of tracking and maintaining assets. includes periodic (usually annual) audits need to be carried out to ensure that all assets are accounted for. Can help Security team identify unauthorized devices on your network. ORGANIZATIONAL POLICIES Asset classifications should match the data classifications. Data policies Data policies ensure data is classified, handled, stored, and disposed of in accordance with applicable regulations. Classification: the process of labeling data with relevant classifications, indicating level of sensitivity, such as top secret, secret, confidential, or sensitive data. classification determines how the data is handled. Discussed in section 5.5 Governance: the oversight and management that describes security controls applied at each stage of the data-handling process, from creation to destruction. details the processes used to manage, store, and dispose of data to ensure that the organization meets their compliance obligations. Retention: Organizations do not want to hold data any longer than they need to, as unnecessary retention increases liability and risk. Org may have to retain data after its usefulness for regulatory compliance. An example, one regulation requires hospitals retain PHI for at least 5 years. 5.0 Governance, Risk, and Compliance Summarize risk management 5.4 processes and concepts • Risk types • • • • • • External Internal Legacy systems Multiparty IP theft Software compliance / licensing • Risk management strategies • • • • • Acceptance Avoidance Transference Cybersecurity insurance Mitigation • Risk analysis • • • • • • • • • • • • • • Risk register Risk matrix/heat map Risk control assessment Risk control self-assessment Risk awareness Inherent risk Residual risk Control risk Risk appetite Regulations that affect risk posture Risk assessment types • Qualitative • Quantitative Likelihood of occurrence Impact Asset value • Single-loss expectancy (SLE) • Annualized loss expectancy (ALE) • Annualized rate of occurrence (ARO) • Disasters • Environmental • Person-made • Internal vs. external • Business impact analysis • • • • • • • • • • Recovery time objective (RTO) Recovery point objective (RPO) Mean time to repair (MTTR) Mean time between failures (MTBF) Functional recovery plans Single point of failure Disaster recovery plan (DRP) Mission essential functions Identification of critical systems Site risk assessment Risk types The six types of risk you should know for the exam Different threat actors, ranging from competitors and script kiddies to criminal syndicates and state actors. Capabilities depend on tools, experience, and funding. Other external environmental threats, such as fire and floods, and manmade threats, such as the accidental deletion of data or users. A malicious insider, a threat actor who may be a dissatisfied employee (someone overlooked for a promotion). Another internal threat is human error, which is when data is accidentally deleted. Risk types Risks may include end of support and security patches because vendor has deemed that the system has reached the end of its service life. As technologies improve, so do the hacking tools, and the legacy systems may have limited or no protection against them. Vulnerabilities to legacy systems tend to increase over time When a contractor wins a contract and then sub-contracts some of the parts of the contract to other companies, who in turn subcontract again. With many parties being involved in a single contract, if any of them goes out of business, it cause disruption to the company. Any party in the agreement with security issues could also put the company at risk. Common in supply chains, these risks should be addressed in BIA Risk types If thieves steal your copyrighted material, trade secrets, and patents, it may result in a loss of revenue. This data could be used in other countries where a legal route to recover your data or seek damages is impossible. Data Loss Prevention (DLP) or document management systems can protect documents even if exfiltrated. Software purchased from a disreputable source may not include valid licenses, could lead to a fine, or may contain malware. This would be a licensing violation Employees may use more copies of the company-purchased software than the licenses that you purchase, sometimes for personal use. Sometimes called a “compliance violation” RISK MANAGEMENT STRATEGIES Risk Acceptance. Do nothing, and you must accept the risk and potential loss if threat occurs. Risk Mitigation. You do this by implementing a countermeasure and accepting the residual risk. The act of reducing risk rd Risk Transference. Transfer (assign) risk to 3 party, like by purchasing insurance against damage. Risk Avoidance. When costs of mitigating or accepting are higher than benefits of the service. RISK MANAGEMENT STRATEGIES Risk Appetite. Sometimes called “risk tolerance”, is the amount of risk that a company is willing to accept. These terms are often used interchangeably, though many experts can articulate a difference. regulations addressing data privacy and security that influence an organizations risk posture include: -General Data Protection Regulation (GDPR) -Sarbanes-Oxley Act (SOX), -Health Insurance Portability Accountability Act (HIPAA) -Payment Card Industry & Data Security Standard regulations (PCI-DSS) Risk analysis A tool in risk management and project management Sometimes used to fulfill regulatory compliance but often to track potential issues that can derail intended outcomes. Typically includes several details, including: -Risk ID -Description -Probability -Impact -Severity -Response -Owner Metrics in a risk register will vary from company to company. Should be considered a living document and updated periodically (at least annually). Risk Matrix/Heat Map A risk matrix is used to a provide visual representation of risks affecting a company. A heat map shows the severity of the situation, with the most severe risks being in red. Likelihood Impact Risk analysis occurs when a company periodically checks that the risk controls that they have in place are still effective with changing technology. May involve an external auditor or expert conducted by employees within the company, often through survey or department-level review. employees evaluate existing risk controls so management-level decision makers can decide if current controls are adequate. A bottom-up approach often used in smaller organizations the process of educating employees to increase their risk awareness and encourage them to identify, review and report concerns. Can bring new insights into reducing risk from those most familiar ! TYPES OF RISK TYPES OF RISK The risk that remains even with all conceivable safeguards in place. TYPES OF RISK The risk management has chosen to accept rather than mitigate. TYPES OF RISK Newly identified risk not yet addressed with risk management strategies TYPES OF RISK The amount of risk that exists in the absence of controls. TYPES OF RISK The amount of risk an organization would face if no safeguards were implemented. RISK MANAGEMENT TYPES OF RISK RISK ANALYSIS the likelihood that cyber incidents will exploit vulnerabilities with an organization’s IT environment. | D O M A I N 5 : RISK ANALYSIS Two ways to evaluate risk to assets: and | Assigns a dollar value to evaluate effectiveness of countermeasures D O M A I N 5 : RISK MANAGEMENT Assigns a to evaluate effectiveness of countermeasures OBJECTIVE, uses formulas D O M A I N 5 : RISK MANAGEMENT Assigns a to evaluate effectiveness of countermeasures To prioritize, often initially calculated using “impact x probability” score D O M A I N 5 : RISK MANAGEMENT | D O M A I N 5 : RISK MANAGEMENT Uses a scoring system to rank threats and effectiveness of countermeasures D O M A I N 5 : RISK MANAGEMENT Uses a to rank threats and effectiveness of countermeasures SUBJECTIVE D O M A I N 5 : RISK MANAGEMENT Uses a to rank threats and effectiveness of countermeasures typically uses low/med/high or number scale RISK ANALYSIS Exposure Factor (EF) . The % of value an asset lost due to an incident, represented in a decimal. Single Loss Expectancy (SLE). How much would it cost you if it happened just ONE time? SLE = Asset Value x Exposure Factor (SLE=AV*EF) Annualized Rate of Occurrence (ARO). How many times does it happen in one year? Watch for AROs longer than 1 year! Annualized Loss Expectancy (ALE). How much you will lose per year? ALE = SLE x ARO or AV x EF x ARO RISK ANALYSIS Annualized Rate of Occurrence (ARO). How many times does it happen in one year? Watch for AROs longer than 1 year will be represented as a fraction. EXAMPLE: One occurrence every 5 years = 0.2 ARO = “Likelihood of occurrence” Do not expect in-depth quantitative risk analysis on the exam. Do not worry about memorizing the formulas RISK ANALYSIS Asset Value (AV). Monetary value of the asset for which we are making calculations. Safeguard Evaluation. Answers the question “is this safeguard cost effective?”. Organizations will not spend more than an asset’s value to protect the asset! RISK ANALYSIS (EXTRA CREDIT) The six major steps in quantitative risk analysis 1. Inventory assets and assign a value (asset value, or AV). 2. Identify threats. Research each asset and produce a list of all possible threats of each asset. (and calculate EF and SLE) 3. Perform a threat analysis to calculate the likelihood of each threat being realized within a single year. (the ARO aka “likelihood of occ”) 4. Estimate the potential loss by calculating the annualized loss expectancy (ALE). 5. Research countermeasures for each threat, and then calculate the changes to ARO and ALE based on an applied countermeasure. 6. Perform a cost/benefit analysis of each countermeasure for each threat for each asset. Environmental (natural) disasters Know the common types of natural disasters that may threaten an organization. - Earthquakes - Floods - Storms - Tsunamis - Volcanic eruptions person-made disasters Know the common types of person-made disasters that may threaten an organization. - Explosions - Electrical fires - Terrorist acts - Power outages - Other utility failures Internal vs external How does disaster location factor in impact to the organization and influence DRP and BCP? If an office is impacted, workers may be able to work from home. Impact of an unavailable office will vary by type of business. If a manufacturing facility, it may impact the organizations' ability to produce products. Risks will vary by site, and impacts by site purpose Business impact analysis focuses on the steps required to restore critical business processes. plans use structured walkthroughs, tabletop exercises, and simulations. any non-redundant part of a system that, if unavailable, would cause the entire system or service to fail. undesirable in any system that requires high availability and reliability, such as supply chains, networks, and applications. Business impact analysis is the age of data that must be recovered from backup storage for normal operations to resume if a system or network goes down is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in continuity. SLAs between a company and customers will influence RPO and RTO BCP Definitions Important BCP-related definitions for the exam Business Impact Analysis (BIA) the process of assessing the impact of disasters to the business, including lost sales, recovery costs, etc. BIA looks at financial loss following a disaster. BCP (Business Continuity Plan) the overall organizational plan for “how-to” continue business. Business-focused DRP (Disaster Recovery Plan) the plan for recovering from an IT disaster and having the IT infrastructure back in operation. Tech-focused Business impact analysis part of business impact assessment that determines what the company's missionessential (business-critical) functions are. the process of identifying the systems that are required to support mission essential functions of the organization. BIA findings, including these areas, will influence BCP and DRP BUSINESS IMPACT ANALYSIS Assesses the security risk of a specific location (site) planned for use (or in use) to meet a business purpose. BUSINESS IMPACT ANALYSIS will assess a variety of risks from exposure to natural and person-made disasters and other events …that may impact business operations or human safety BCP Definitions Important BCP-related definitions for the exam MTBF (Mean Time Between Failures) a time determination for how long a piece of IT infrastructure will continue to work before it fails. MTTR (Mean Time to Repair) a time determination for how long it will take to get a piece of hardware/software repaired and back on-line. goals of bcp and drP What are the core goals of disaster recovery and business continuity planning? Minimizing the effects of a disaster by: Improving responsiveness by the employees in different situations. Easing confusion by providing written procedures and participation in drills. Helping make logical decisions during a crisis. An auditor assessing BIA will likely focus primarily on single points of failure, RPO and RTO in assessing the efficacy of the organizations plan. 5.0 Governance, Risk, and Compliance Explain privacy and sensitive data 5.5 concepts in relation to security • Organizational consequences of privacy and data breaches • • • • Reputation damage Identity theft Fines IP theft • Notifications of breaches • Escalation • Public notifications and disclosures • Data types • • • • • Classifications Public Private Sensitive Confidential • Critical • Proprietary • Personally identifiable information (PII) • Health information • Financial information • Government data • Customer data • Privacy enhancing technologies • • • • • Data minimization Data masking Tokenization Anonymization Pseudo-anonymization • Roles and responsibilities • • • • • • • • • Data owners Data controller Data processor Data custodian/steward Data protection officer (DPO) Information life cycle Impact assessment Terms of agreement Privacy notice ©2022 Inside Cloud and Security. No reuse without written permission Consequences of privacy and data breaches effects may last for years! can result in loss of customer trust and loss of revenue. involves someone using a person’s private information to impersonate that individual, usually for financial gain. might quickly cost customers, credit ratings, and brand reputation. losing IP could mean forfeiture of first-to-market advantage, loss of profitability, or even an entire lines of business to competitors or counterfeiters. and may lead to lawsuits failing to report a breach can result in fines that can reach into the millions of dollars. GDPR outlines fines of up to 4% of a company's annual global revenues or 20 million euros for failing to report a breach. ANY company with a customer in the EU is subject to GDPR Notifications of breaches If a data breach occurs, failing to report a breach can result in fines that can reach into the millions of dollars. The EU sets their standard GDPR, and notifications of data breaches must be reported within 72 hours. Escalations. to external sources, like law enforcement or outside experts to stop/investigate breach. Other countries have their own reporting timescale. Delays sometimes allowed for criminal investigation DATA CLASSIFICATIONS Top Secret Exceptionally grave damage Secret Serious damage Confidential Damage Unclassified No damage Confidential/Proprietary Class 3 Exceptionally grave damage Class 2 Class 1 Class 0 Private Serious damage Sensitive Damage Public No damage DEFINING SENSITIVE DATA Sensitive data is any information that isn’t public or unclassified. Personally Identifiable Information (PII). any information that can identify an individual (name, SSN, birthdate/place, biometric records, etc) Protected Health Information (PHI). and healthrelated information that can be related to a specific person. covered by HIPAA DATA TYPES Other sensitive data types you should know for the exam: Critical Data: data that a company does not want to disclose; could also be classified and encrypted to prevent someone from reading it. Proprietary Data: data generated by a company, such as its trade secrets, or work done by the R&D department. Financial Information: data about a company's bank account, share capital, and any investments that it has made. It could also be credit card and payroll data. Customer Data: data held about individual customers of an organization that should never be divulged. Information of an account manager or representative at a business dealing with a customer is also classified as customer data. Government Data: data collected by governmental agencies, and there are strict rules on how it can be shared, normally only internally. government often have strict rules contractors must follow when the contract has finished, and the data used in the contract is to be disposed of. They CANNOT simply delete the data! DATA ROLES AND RESPONSIBILITIES The most likely to show up on the exam? Data Owner. Usually a member of senior management. Can delegate some day-to-day duties. Cannot delegate total responsibility. Data Custodian. Usually someone in the IT department. Does not decide what controls are needed, but does implement controls for data owner TIP: if question mentions “day-to-day” it’s custodian! DATA ROLES AND RESPONSIBILITIES The most likely to show up on the exam? Data Owner. Usually a member of . Can delegate some day-to-day duties. Cannot delegate total responsibility. Data Custodian. Usually someone in the Does not decide what controls are needed, but does implement controls for data owner TIP: if question mentions “day-to-day” it’s custodian! DATA ROLES AND RESPONSIBILITIES Be prepared to answer questions on other roles Data Processor. A natural or legal person, public authority, agency, or other body, which processes personal data solely on behalf of the data controller. Data Controller. The person or entity that controls processing of the data. Data Protection Officer (DPO). Under GDPR, the DPO is a mandatory appointment within an organization. DPO ensures the organization complies with data regulations PRIVACY ENHANCING TECHNOLOGIES Stateless, stronger than encryption, keys not local Reversal requires access to another data source where meaningful data is replaced with a token that is generated randomly, and the original data is held in a vault. de-identification procedure in which personally identifiable information (PII) fields within a data record are replaced by one or more artificial identifiers, or pseudonyms. PRIVACY ENHANCING TECHNOLOGIES process of removing all relevant data so that it is impossible to identify original subject or person. Only effective if you do NOT need the identity data! PRIVACY ENHANCING TECHNOLOGIES only necessary data required to fulfill the specific purpose should be collected Collect “the minimum amount” to meet the stated purpose and manage retention to meet regulations PRIVACY ENHANCING TECHNOLOGIES when only partial data is left in a data field. for example, a credit card may be shown as **** **** **** 1234 Commonly implemented within the database tier, but also possible in code of frontend applications The Information Lifecycle Creation Destruction What we covered in DOMAIN 4 Classification What do you need for the exam? Archive Storage Usage The Information Lifecycle Creation Disposal What we covered in DOMAIN 4 Classification What you need for exam day is simpler than this! Retention Storage Use The Information Lifecycle Creation What we covered in DOMAIN 4 Disposal Classification Retention Storage Use The Information Lifecycle Creation What we covered in DOMAIN 4 Disposal Classification Retention Storage Use The Information Lifecycle Creation Disposal What we covered in DOMAIN 4 Classification Data should be protected by adequate security controls based on its classification. Retention Storage Use The Information Lifecycle Creation Disposal What we covered in DOMAIN 4 Classification refers to anytime data is in use or in transit over a network Retention Storage Use The Information Lifecycle Creation Disposal What we covered in DOMAIN 4 Classification archival is sometimes needed to comply with laws or regulations requiring the retention of data. Retention Storage Use The Information Lifecycle Creation Disposal What we covered in DOMAIN 4 Classification When data is no longer needed, it should be destroyed in such a way that it is not readable. Retention Storage Use The Information Lifecycle Creation For the Security+ exam classify Disposal Use encrypt Retention One study guide presented this. The Information Lifecycle Creation and Receipt Disposition For the Security+ exam Distribution This is from the “Storage Networking Industry Association” on Wikipedia Maintenance Use Others showed this as the info lifecycle The Information Lifecycle For the Security+ exam This is the diagram from the official study guide (no diagram) ©2022 Inside Cloud and Security. No reuse without written permission IMPACT ASSESSMENT Assesses the potential impact to data security and privacy. Can help Security identify appropriate security controls. Should be conducted for new services, projects, and initiatives. Helps the company avoid data breach! Enables proactive identify and remediate issues before they become a production issue Terms of agreement Protects the company May also be called “terms of service” or “terms and conditions” Tells the customer what will be legally required of them if they subscribe to your service or download and use your mobile app. User must agree to the terms to use the service. NOT required by law, but reduces risk to the company Protects the customer (user) May also be called “privacy policy” Documents handling of personal data, answers questions like: -What data is collected and for what purpose? -With whom will data be shared? Required by law in many regions/countries