Week 1 Review: Cybersecurity Basics INFOSEC GOALS// supports the mission of the organization, implement protections to satisfy the risk appetite of the organization (no more, no less, just enough). - Risk can never completely be eliminated, find a balance between security requirements and usability Roles and responsibilities must be explicit Infosec is not a static process; it must be assessed regularly and methodically WHY do we need security? - Reduction in financial losses Protection of brand and reputation Competitive advantage Customer retention Partner relationships and confidence Reduction in regulatory fines CIA TRIAD// Confidentiality, Integrity, Availability - CONFIDENTIALITY/ Keep data private. Only authorized users and processes should be able to access or modify data (Access control, cryptography, etc.) INTEGRITY/ Data can be trusted. Data should be maintained in a correct state, kept from being tampered with, and should be correct, authentic, and reliable (Protection and verification) AVAILABILITY/ Data should be available to authorized users whenever they require it. Keep systems, networks, and devices up and running (Fault-tolerant architecture, redundancy, disaster recovery, etc.) DEFENSE IN DEPTH// Combining controls into multiple layers of security helps ensure that if one layer fails to counteract a threat, other layers are in place to help prevent a breach in the systems Week 1 Review: Cybersecurity Basics SHADOW IT// use of IT systems, devices, software, applications, and services without explicit IT department approval - Can introduce serious security risks to the organization (data leaks, etc.) Potential compliance violations Lack of monitoring and auditing options ** Can be tempting for employees to bypass integrated security systems to gain time and efficiency but puts the system at risk. Communicate with IT department to find safe and approved upon solutions to do the work if the system in place is slowing you down. RACI CHART-MATRIX-MODEL// diagram that identifies the key roles and responsibilities of users against major tasks within a project - RESPONSIBLE/ Who is responsible for doing the actual project’s work? ACCOUNTABLE/ Who is accountable for the success (or failure) of the project tasks and is the decision maker **Should be only one individual, typically the PM CONSULTED/ Who needs to be consulted for details and information on the requirements? **Subject matter experts INFORMED/ Who needs to be kept informed of major updates? **Senior leadership SECURITY CONTROLS// safeguard measures to reduce the chances a threat will exploit a vulnerability **GOAL == RISK MITIGATION Week 1 Review: Cybersecurity Basics RISK MANAGEMENT LIFECYCLE// continual improvement process to ensure steady progress and compliance with changing internal and external constraints - IDENTIFICATION/ List the different risks and define their characteristics with project context in mind (brainstorming sessions, tabletop exercises, feasibility study, study data from previous projects, etc.) - ASSESSMENT/ Sort risk according to quantitative and qualitative criteria; this helps categorize risks (high, moderate, low) and their impact in terms of scope, delay, or costs o QUANTITATIVE → If expected loss > cost of control then implement the control Single Loss Expectancy = Asset Value x Risk Factor (Exposure Factor) SLE = AV x RF (or EF) Annualized Loss Expectancy = Single Loss Expectancy x Annualized Rate of Occurrence ALE = SLE x ARO Week 1 Review: Cybersecurity Basics o QUALITATIVE → Measures risk impact through the use of relative scale/risk rating matrix RISK = LIKELIHOOD x IMPACT o CVSS → Common Vulnerability Scoring System o CEV → Common Vulnerabilities and Exposures - TREATMENT or MITIGATION/ Based on control strategies and careful response planning. The goal is to describe the actions to be taken to treat the risk: o ACCEPTANCE → Risk is accepted with no action taken to mitigate it. Will not reduce the impact but sometimes the mitigation cost is not worth it o TRANSFERENCE → Risk is transferred via a contract to an external party who will assume the risk on an organization’s behalf. This does not eradicate the risk, only the responsibility for it (cyber insurance) o AVOIDANCE → Risk is eliminated by not taking any action that would mean the risk could occur o REDUCTION → Risk becomes less severe through actions taken to prevent or minimize its impact - MONITORING/ There should be a process in place for tracking and monitoring risk throughout the project development. Update the risk register regularly. When risks arise, re-evaluate the measures taken previously. - REPORTING/ Save analyses and record tracking to make the history available to others. Derive good practices for future projects from experience. Week 1 Review: Cybersecurity Basics INFOSEC DOMAINS// - APPLICATION SECURITY/ o Web/Desktop/Mobile applications, web services, APIs, etc. o Software development security/SDLC → SHIFT LEFT Bring security early on in the application development process! o OWASP Top 10 → OPEN WEB APPLICATION SECURITY PROJECT A01:2021 – Broken Access Control A02:2021 – Cryptographic Failures A03:2021 – Injection A04:2021 – Insecure Design A05:2021 – Security Misconfiguration A06:2021 – Vulnerable and Outdated Components A07:2021 – Identification and Authentication Failures A08:2021 – Software and Data Integrity Failures A09:2021 – Security Logging and Monitoring Failures A10:2021 – Server-Side Request Forgery o Bug Bounty programs → Companies provide financial incentives to independent bug bounty hunters who discover security vulnerabilities in systems o SaaS applications and management → Valuable target for threat actors, SaaS security is critically important Week 1 Review: Cybersecurity Basics o SAST vs DAST → STATIC vs DYNAMIC APPLICATION SECURITY TESTING - NETWORK SECURITY/ o Infrastructure → WAN/LAN, routers, switches, 802.11, firewalls, VPNs, servers, OS, PKI, and certification management o Network Access Control → 802.1x, employee and guest wired/wireless access o Remote connections/BYOD → VPN, SFTP Week 1 Review: Cybersecurity Basics - HARDWARE SECURITY/ o Physical infrastructure, IoT devices, embedded devices, desktop/laptops (disk encryption, DLP) - PHYSICAL SECURITY/ o Physical access control → badging systems, gates, mantraps, guest check-in procedures, security guards, CCTV, alarm systems o Physical security personnel → should be integrated with or work closely with the Infosec team (CSO/CISO) - MOBILE SECURITY/ o MDM → Mobile Device Management protocols/solutions in place - OPERATIONAL SECURITY/ o SOC → Security Operations Center to handle day to day security incidents and alerts o Monitoring → Response based on SLAs (Service Level Agreements) o Support structure in place for escalating incidents o Events vs Incidents → Not all events are incidents, but all incidents are events ▪ EVENT: log entry/alert ▪ INCIDENT: event/alert that has a negative effect on operations - INCIDENT RESPONSE/ o Internal vs External or both o Response → Escalated security incidents that require immediate attention ▪ CONTAIN ▪ REMEDIATE ▪ ROOT CAUSE ANALYSIS o Critical → Preparation phase (tabletop exercises) - IDENTITY & ACCESS MANAGEMENT (IAM)/ o Onboarding/Off-boarding protocols o Single Sign On (SSO) with Multifactor Authentication (MFA) ▪ SSO: One set of credentials used across multiple application, based on the federation that exists between applications (SAML – Security Assertion Markup Language) ▪ MFA: 1. Something you KNOW → password, passphrase, PIN, ect. 2. Something you HAVE → smart phone, keys, badge, access card, etc. 3. Something you ARE → biometrics, retina scans, face ID, etc. o User Access reviews o Managing and rotating API keys and cryptographic keys Week 1 Review: Cybersecurity Basics RISK vs THREAT vs VULNERABILITY// THREAT - RISK VULNERABILITY THREAT/ Something that has the potential to cause harm RISK/ Something that can potentially cause harm, loss or damage VULNERABILITY/ Weakness of an asset RISK → THREAT EXPLOITS A VULNERABILITY AAA// *now has 5 elements 1. 2. 3. 4. 5. IDENTIFICATION/ Claiming to be an identity when attempting to access a secured area or system AUTHENTICATION/ Proving that you are that identity AUTHORIZATION/ Defining the permissions of a resource and object access for a specific identity AUDITING/ Recording a log of the event and activities related to the system and subjects ACCOUNTING or ACCOUNTABILITY/ Reviewing log files to check for compliance and violations in order to hold subjects accountable for their actions SUPPLY CHAIN ATTACKS// An emerging kind of threat that targets software developers and suppliers. The goal is to access source code, build processes, or update mechanisms by infecting legitimate applications to distribute malware. - TYPES/ o Compromised software building tools or updated infrastructure o Stolen code-sign certificates or signed malicious apps using the identity of dev company o Compromised specialized code shipped into hardware or firmware components o Pre-installed malware on devices (camera, USB, phones, etc.) Week 1 Review: Cybersecurity Basics - PROTECTION/ o Deploy strong code integrity policies to allow only authorized applications to run o Use endpoint detection and response solutions that can automatically detect and remediate suspicious activities o Maintain a highly secure build and update infrastructure ▪ Immediately apply security patches for OS and software ▪ Implement mandatory integrity controls to ensure only trusted tools run ▪ Require multi-factor authentication for admins o Build secure software updaters as part of the SDLC ▪ Require SSL (Secure Socket Layer) for update channels and implement certificate pinning ▪ Sign everything, including configuration files, scripts, XML files, and packages ▪ Check for digital signatures and don’t let the software updater accept generic input and commands o Develop an incident response process for supply chain attacks ▪ Disclose supply chain incidents and notify customers with accurate and timely information o VRM – Vendor Risk Management → Helps you identify, monitor, assess, and mitigate risks emanating from your supply chain ecosystem rather than just sticking to incident response (IR) DR & BCP// - DISASTER RECOVERY/ Focuses on what happens after a disaster; in many cases it is a part of the overall continuity plan and tends to focus more on the technical side of the business (data backup and recovery, computer systems, etc.) - BUSINESS CONTINUITY PLAN/ Umbrella policy, with DR as part of it. A plan that covers the way a business plans for and maintains critical business functions, directly before, during, and after a disaster. o Maintenance o Stability o Recoverability of service o Day-to-day basis o Covers the whole organization Week 1 Review: Cybersecurity Basics WHAT should the DR and BCP contain? - An operational plan for potential disasters in your geographical area A succession plan for you or your top management Employee training and cross-training A communication plan that includes ways of communicating if networks are down Off-site locations for staff and managers to meet and work A focus on safety. Foster partnerships and communication with local and emergency response services Daily backups of your systems and data Training and testing of all employees to practice recovery activities Regular audits and updates of your plans GOVERNANCE, RISK MANAGEMENT & COMPLIANCES (GRC)// **PCAOB – Public Company Accounting Oversight Board → Non-profit corporation created by the SarbanesOxley Act of 2002 to oversee the audits of public companies and other issuers to protect the interests of investors and further the public interest in the preparation of informative, accurate and independent audit reports Some examples of legal and regulatory requirements: - FFIEC/ Federal Financial Institutions Examination Council NERC SIP/ North American Electric Reliability Corporation Critical Infrastructure Protection EDPD/ European Data Protection Directive GDRP/ General Data Protection Regulation (EU) **Very strict; heavy fines FISMA/ Federal Information Security Management Act PCI DSS/ Payment Card Industry Data Security Standard SOX/ Sarbanes-Oxley Act of 2002 HIPAA/ Health Insurance Portability and Accountability Act SLAs/ Service Level Agreements Policies Controls: - GUIDELINES/ FYI PROCEDURE/ How do we actually do it? STANDARD/ What is our requirement? POLICY/ Why do we need to do this? Common Frameworks used in the US: - ISO27000 SERIES/ International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) o ISO27001:2013 → Standard for auditing; organizations can get certified against this one o ISO27002:2013 → Guidance to obtain your certification against 27001 Week 1 Review: Cybersecurity Basics - NIST/ National Institute of Standards and Technology (US) o CORE → Identify, Protect, Detect, Respond, Recover o IMPLEMENTATION TIERS → Partial, Risk Informed, Repeatable, Adaptive o PROFILE → Security Roadmap - SOC1 vs SOC2 vs SOC3/ System and Organization Controls (US)