Uploaded by sairajmncl

2024 CISSP Workbook: Information Security Guide

advertisement
2024
CISSP Workbook
Contents
Domain 1 ..................................................................................................................................................................... 24
1.1
Understand, adhere to, and promote professional ethics ........................................................................ 25
What are ethics based on? ..................................................................................................................................25
How can an organization have consistent ethics?...............................................................................................25
(ISC)2 Code of Ethics Preamble ............................................................................................................................25
(ISC)2 Code of Ethics Canons................................................................................................................................25
1.2
Understand and apply security concepts .................................................................................................. 26
Goals of Information Security..............................................................................................................................26
Confidentiality .....................................................................................................................................................26
Integrity ...............................................................................................................................................................26
Availability ...........................................................................................................................................................26
Authenticity .........................................................................................................................................................26
Non-repudiation ..................................................................................................................................................26
5 Pillars of Information Security ..........................................................................................................................26
1.3
Evaluate, apply and sustain security governance principles...................................................................... 27
How do we align the security function to business strategy, goals, mission, and objectives? ...........................27
Alignment of security function to business strategy, goals, mission, and objectives .........................................27
For security to be effective, it is imperative that? ..............................................................................................27
Accountability vs. Responsibility .........................................................................................................................27
Security roles & responsibilities ..........................................................................................................................28
Who is ultimately accountable for security? .......................................................................................................28
Who is specifically responsible for security? .......................................................................................................28
Due care and due diligence .................................................................................................................................28
1.4
Understand legal, regulatory and compliance issues that pertain to information security in a holistic
context 29
Cyber crimes and data breaches .........................................................................................................................29
Licensing and intellectual property requirements ..............................................................................................29
Import/export controls........................................................................................................................................30
ITAR & EAR ..........................................................................................................................................................30
Wassenaar Arrangement.....................................................................................................................................30
Trans-border data flow........................................................................................................................................30
Data residency (data localization) .......................................................................................................................30
Privacy .................................................................................................................................................................30
Sensitive data ......................................................................................................................................................30
Personal Data ......................................................................................................................................................31
Privacy roles & responsibilities ............................................................................................................................31
Privacy requirements ..........................................................................................................................................31
OECD Privacy Guidelines .....................................................................................................................................32
Organizations cannot achieve privacy without? .................................................................................................32
2
© Destination Certification Inc.
Privacy Impact Assessment (PIA).........................................................................................................................32
Typical elements of a PIA ....................................................................................................................................32
Compliance ..........................................................................................................................................................33
Contractual, legal, industry standards, and regulatory requirements ................................................................33
1.5
Understand requirements for investigation types .................................................................................... 34
1.6
Develop, document, and implement security policy, standards, procedures, and guidelines .................. 35
Policies are ultimately? .......................................................................................................................................35
Perfect Model for Security ..................................................................................................................................35
Policies, Standards, Procedures, Baselines & Guidelines ....................................................................................36
1.7
Identify, analyze, assess, prioritize and implement Business Continuity (BC) requirements .................... 37
1.8
Contribute to and enforce personnel security policies and procedures ................................................... 38
Candidate screening and hiring ...........................................................................................................................38
Employment agreements and policies ................................................................................................................38
Personnel security controls .................................................................................................................................38
Onboarding and termination processes ..............................................................................................................39
Vendor, consultant, and contractor agreements and controls ...........................................................................39
Reasonable expectation of privacy......................................................................................................................39
Privacy policy requirements ................................................................................................................................39
1.9
Understand and apply risk management concepts ................................................................................... 40
Risk ......................................................................................................................................................................40
Risk Management Process...................................................................................................................................40
Asset valuation ....................................................................................................................................................40
Risk Analysis ........................................................................................................................................................41
Risk analysis key factors ......................................................................................................................................41
Threats & Vulnerabilities .....................................................................................................................................41
Identify threats & vulnerabilities .........................................................................................................................42
Qualitative & quantitative analysis .....................................................................................................................42
Quantitative risk calculation (ALE, SLE, Asset value, Exposure factor & ARO) ...................................................43
Risk response / treatment ...................................................................................................................................44
Cybersecurity Insurance ......................................................................................................................................44
Types of controls .................................................................................................................................................44
Countermeasure selection and implementation ................................................................................................45
Control types .......................................................................................................................................................45
Functional & Assurance .......................................................................................................................................45
Risk Management Terms .....................................................................................................................................46
How much security is enough?............................................................................................................................46
Selecting controls ................................................................................................................................................46
Continuous improvement ...................................................................................................................................47
Risk management supply chain ...........................................................................................................................47
Risk Frameworks .................................................................................................................................................47
© Destination Certification Inc.
3
NIST 800-37 – Risk Management Framework (RMF) Steps .................................................................................47
1.10
Understand and apply threat modeling concepts and methodologies ..................................................... 48
Threat modeling ..................................................................................................................................................48
STRIDE .................................................................................................................................................................48
PASTA ..................................................................................................................................................................49
DREAD .................................................................................................................................................................49
Social Engineering ...............................................................................................................................................50
1.11
Apply Supply Chain Risk Management (SCRM) concepts .......................................................................... 51
What can companies acquire? ............................................................................................................................51
Risks associated with hardware, software, and service ......................................................................................51
Minimum security requirements.........................................................................................................................51
Service Level Requirements (SLR) .......................................................................................................................51
Service Level Agreement (SLA) ............................................................................................................................51
Service Level Report ............................................................................................................................................51
Third-party assessment and monitoring .............................................................................................................51
Risks associated with the acquisition of products and services ..........................................................................52
Risk mitigations ...................................................................................................................................................52
1.12
Establish and maintain a security awareness, education, and training program ...................................... 53
Who is responsible for security? .........................................................................................................................53
Awareness, training & education ........................................................................................................................53
Methods and techniques to present awareness and training .............................................................................53
Prioritization of topics .........................................................................................................................................53
Periodic content reviews .....................................................................................................................................53
Program effectiveness evaluation .......................................................................................................................53
Domain 2 ..................................................................................................................................................................... 54
2.1 Identify and classify information and assets ..................................................................................................... 55
Data Classification ...............................................................................................................................................55
Information classification benefits ......................................................................................................................55
Who determines classification? ..........................................................................................................................55
Classification process ..........................................................................................................................................55
Classification vs. Categorization ..........................................................................................................................56
Classification examples .......................................................................................................................................56
Labeling & Marking .............................................................................................................................................56
Labeling methods ................................................................................................................................................56
2.2 Establish information and asset handling requirements .................................................................................. 57
Handling requirements........................................................................................................................................57
Media handling....................................................................................................................................................57
Media storage .....................................................................................................................................................57
Media retention & destruction ...........................................................................................................................57
2.3 Provision information and assets securely ....................................................................................................... 58
4
© Destination Certification Inc.
Who is the data owner? ......................................................................................................................................58
Data classification policy .....................................................................................................................................58
Information classification policy considerations .................................................................................................58
2.4 Manage data lifecycle ....................................................................................................................................... 59
Data roles ............................................................................................................................................................59
Data life cycle ......................................................................................................................................................59
What is Data Remanence? ..................................................................................................................................60
Categories of sanitization ....................................................................................................................................60
Data deletion methods ........................................................................................................................................61
Object Reuse .......................................................................................................................................................62
Solid State Drives data destruction .....................................................................................................................62
Encryption ...........................................................................................................................................................62
2.5 Ensure appropriate asset retention .................................................................................................................. 63
How do we keep data for a long time? ...............................................................................................................63
Data archiving......................................................................................................................................................63
Data archiving policies.........................................................................................................................................63
2.6 Determine data security controls and compliance requirements .................................................................... 64
Best way to ensure data receives appropriate protection based on classification? ...........................................64
Methods for protecting data ...............................................................................................................................64
What is data at Rest?...........................................................................................................................................64
Protecting data at Rest ........................................................................................................................................64
What is data in Transit? .......................................................................................................................................64
Protecting data in Transit ....................................................................................................................................64
End-to-end encryption ........................................................................................................................................65
Link encryption ....................................................................................................................................................65
Onion network.....................................................................................................................................................65
Information obfuscation methods ......................................................................................................................66
Data protection methods ....................................................................................................................................66
Domain 3 ..................................................................................................................................................................... 67
3.1
Research, implement and manage engineering processes using secure design principles.......... 69
Security’s involvement in building anything........................................................................................................69
How do we know what security controls to include at each phase? ..................................................................69
Secure design principles ......................................................................................................................................69
Keep it simple ......................................................................................................................................................69
Zero Trust ............................................................................................................................................................69
Principles for zero trust .......................................................................................................................................70
Trust but verify ....................................................................................................................................................70
Privacy by Design .................................................................................................................................................70
Shared responsibility ...........................................................................................................................................71
Cyber Kill / Attack Chain ......................................................................................................................................71
© Destination Certification Inc.
5
3.2
Understand the fundamental concepts of security models ...................................................................... 72
What is a model? .................................................................................................................................................72
Concept of security..............................................................................................................................................72
Enterprise Security Architecture .........................................................................................................................72
3 major Enterprise Security Architectures ..........................................................................................................73
Security Models ...................................................................................................................................................73
Bell-LaPadula .......................................................................................................................................................74
Biba......................................................................................................................................................................74
Lipner implementation ........................................................................................................................................75
Information flow..................................................................................................................................................75
Covert channels ...................................................................................................................................................75
Clark-Wilson: 3 Goals of Integrity ........................................................................................................................75
Clark-Wilson: 3 Rules ...........................................................................................................................................75
Brewer-Nash (The Chinese Wall) Model .............................................................................................................76
Graham–Denning Model .....................................................................................................................................76
Harrison–Ruzzo–Ullman Model ...........................................................................................................................76
Evaluation Criteria ...............................................................................................................................................76
Certification and accreditation ............................................................................................................................76
Orange Book / Trusted Computer System Evaluation Criteria (TCSEC) ...............................................................77
Orange Book Evaluation Criteria .........................................................................................................................77
Information Technology Security Evaluation Criteria (ITSEC)..............................................................................77
ITSEC (Assurance) E Levels...................................................................................................................................77
Common Criteria .................................................................................................................................................78
Common Criteria Process ....................................................................................................................................78
Common Criteria EAL levels ................................................................................................................................79
3.3
Select controls based upon systems security requirements ..................................................................... 80
What do security control frameworks provide?..................................................................................................80
Security control frameworks ...............................................................................................................................80
ISO 27001 ............................................................................................................................................................81
ISO 27000 family..................................................................................................................................................81
3.4
Understand security capabilities of information systems ......................................................................... 82
Subjects & objects ...............................................................................................................................................82
Reference Monitor Concept (RMC) .....................................................................................................................82
Security Kernel ....................................................................................................................................................83
3 principles of RMC & Security Kernel .................................................................................................................83
Trusted Computing Base (TCB) ............................................................................................................................83
Processors ...........................................................................................................................................................84
Processor States ..................................................................................................................................................84
Process Isolation ..................................................................................................................................................84
Secure Memory Management.............................................................................................................................84
6
© Destination Certification Inc.
Secure Memory Management vs. Memory Segmentation .................................................................................85
Types of Storage ..................................................................................................................................................85
Virtual Memory ...................................................................................................................................................85
Firmware .............................................................................................................................................................85
System Kernel ......................................................................................................................................................85
Privilege Levels ....................................................................................................................................................86
Ring protection model .........................................................................................................................................86
Middleware .........................................................................................................................................................86
Data Hiding ..........................................................................................................................................................87
Virtualization .......................................................................................................................................................87
Layering / Defense in depth ................................................................................................................................87
3.5
Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements .......... 88
Single point of failure ..........................................................................................................................................88
Reduce risk of single point of failure ...................................................................................................................88
Bypass controls ....................................................................................................................................................88
Reduce risk of bypass controls ............................................................................................................................88
Race conditions ...................................................................................................................................................89
Reduce risk of race conditions ............................................................................................................................89
Emanations ..........................................................................................................................................................89
Reduce risk of emanations ..................................................................................................................................89
Vulnerabilities in systems ....................................................................................................................................89
Where is it hardest to detect vulnerabilities? .....................................................................................................89
To protect anything: ............................................................................................................................................90
Reduce risk in mobile-based systems ..................................................................................................................90
Reduce risk in client & server-based systems .....................................................................................................90
OWASP ................................................................................................................................................................90
Mobile devices ....................................................................................................................................................90
Reduce risk of mobile devices & mobile workers................................................................................................90
Mobile device policy ............................................................................................................................................91
Remote access security .......................................................................................................................................91
End-point security ...............................................................................................................................................91
Distributed systems .............................................................................................................................................91
Grid computing....................................................................................................................................................91
Data warehouse ..................................................................................................................................................92
Big Data ...............................................................................................................................................................92
Data mining / analytics ........................................................................................................................................92
Inference & aggregation ......................................................................................................................................92
Reduce risk of inference & aggregation ..............................................................................................................92
Industrial Control Systems (ICS) ..........................................................................................................................93
OT vs ICS ..............................................................................................................................................................93
© Destination Certification Inc.
7
Types of ICS .........................................................................................................................................................93
Reduce risk in Industrial Control Systems ...........................................................................................................93
Internet of Things (IoT) ........................................................................................................................................93
Reduce risk of Internet of Things (IoT) ................................................................................................................93
Cloud Computing .................................................................................................................................................94
Characteristics of cloud computing .....................................................................................................................94
Cloud service models...........................................................................................................................................94
Cloud deployment models ..................................................................................................................................95
Virtual Private Cloud (VPC) ..................................................................................................................................95
Cloud computing roles ........................................................................................................................................95
Accountability vs. Responsibility .........................................................................................................................96
Compute ..............................................................................................................................................................96
Virtual Machines .................................................................................................................................................96
Hypervisor Types (VM Monitors) ........................................................................................................................97
Cloud VM forensics..............................................................................................................................................97
Containers ...........................................................................................................................................................97
Dividing up services .............................................................................................................................................97
Microservices ......................................................................................................................................................98
Serverless ............................................................................................................................................................98
Common cloud protocols ....................................................................................................................................98
Edge Computing ..................................................................................................................................................98
Secure Access Service Edge (SASE) ......................................................................................................................98
Embedded devices ..............................................................................................................................................98
High Performance Computing .............................................................................................................................99
Cross Site Scripting (XSS) .....................................................................................................................................99
Types of XSS.......................................................................................................................................................100
Cross Site Request Forgery (CSRF) .....................................................................................................................100
XSS vs. CSRF .......................................................................................................................................................100
Structured Query Language (SQL) .....................................................................................................................101
SQL Injection......................................................................................................................................................101
SQL Commands .................................................................................................................................................101
SQL Injection code examples .............................................................................................................................101
Root of all evil is?...............................................................................................................................................102
Reduce risk of web-based vulnerabilities ..........................................................................................................102
3.6
Select and determine cryptographic solutions ........................................................................................ 103
History of Cryptography ....................................................................................................................................103
Cryptographic evolution ....................................................................................................................................103
5 Services of Cryptography ................................................................................................................................104
Data protection .................................................................................................................................................104
Everyday uses of cryptography .........................................................................................................................104
8
© Destination Certification Inc.
Cryptographic definitions ..................................................................................................................................105
Encryption / Decryption ....................................................................................................................................106
Key Space ..........................................................................................................................................................106
Methods of encryption ......................................................................................................................................106
Substitution .......................................................................................................................................................107
Transposition .....................................................................................................................................................107
Transposition: Rail Fence (zigzag) cipher...........................................................................................................107
Transposition ciphers ........................................................................................................................................107
Synchronous vs. asynchronous .........................................................................................................................108
Repeating patterns must be avoided ................................................................................................................108
Substitution patterns in monoalphabetic ciphers .............................................................................................109
Substitution - Polyalphabetic ciphers ................................................................................................................109
Substitution - Running key ciphers ....................................................................................................................109
Substitution - One-time pads ............................................................................................................................109
Stream vs. block ciphers ....................................................................................................................................110
Stream ciphers...................................................................................................................................................110
Block ciphers .....................................................................................................................................................110
Symmetric Block modes ....................................................................................................................................111
Which are faster: stream or block ciphers?.......................................................................................................111
Symmetric Cryptography ...................................................................................................................................112
Symmetric Algorithms .......................................................................................................................................112
DES / 3DES .........................................................................................................................................................113
Rijndael / Advanced Encryption Standard (AES) ...............................................................................................113
Out-of-band key distribution .............................................................................................................................113
Asymmetric Cryptography .................................................................................................................................114
Asymmetric Algorithms .....................................................................................................................................114
Hard math problems .........................................................................................................................................115
Diffie-Hellmann Key Exchange Protocol ............................................................................................................115
Hybrid Cryptography .........................................................................................................................................116
Steganography & null cipher .............................................................................................................................116
Message Integrity Controls ...............................................................................................................................117
Hashing functions ..............................................................................................................................................117
Hashing ..............................................................................................................................................................117
Key properties of hashing algorithms................................................................................................................117
Hashing Algorithms ...........................................................................................................................................117
Collisions............................................................................................................................................................117
Birthday Attack/Paradox ...................................................................................................................................118
Digital Signatures...............................................................................................................................................118
Services provided by Digital Signatures.............................................................................................................118
Creating Digital Signatures ................................................................................................................................118
© Destination Certification Inc.
9
Uses of Digital Signatures ..................................................................................................................................118
Code signing and validation...............................................................................................................................118
How can we be certain we have someone’s public key? ..................................................................................119
Digital Certificates .............................................................................................................................................119
Digital Certificate Standard ...............................................................................................................................120
Root of trust ......................................................................................................................................................120
Who issues certificates? ....................................................................................................................................120
Digital Certificate Replacement & Revocation ..................................................................................................121
Revocation methods..........................................................................................................................................121
Certificate lifecycle ............................................................................................................................................121
Certificate Pinning .............................................................................................................................................121
Public Key Infrastructure ...................................................................................................................................122
Components of PKI ............................................................................................................................................123
MIME headers ...................................................................................................................................................124
S/MIME..............................................................................................................................................................124
Key Management ..............................................................................................................................................124
Kerckhoffs’s Principle ........................................................................................................................................124
Key management activities ...............................................................................................................................124
Key Creation ......................................................................................................................................................124
Key Distribution .................................................................................................................................................124
Key Storage........................................................................................................................................................125
Key Rotation ......................................................................................................................................................125
Key Recovery .....................................................................................................................................................125
Key disposition / destruction.............................................................................................................................125
Putting it all together ........................................................................................................................................126
3.7
Understand methods of cryptanalytic attacks .................................................................................... 127
Cryptanalysis .....................................................................................................................................................127
Types of Cryptanalysis attacks...........................................................................................................................127
What is the primary goal of Cryptanalytic attacks?...........................................................................................127
Brute force attack ..............................................................................................................................................127
Cryptanalytic attacks .........................................................................................................................................127
Linear & differential ..........................................................................................................................................127
Factoring............................................................................................................................................................127
Man-in-the-middle attack .................................................................................................................................128
Replay attack .....................................................................................................................................................128
Pass the Hash ....................................................................................................................................................128
Temporary files attack .......................................................................................................................................128
Implementation attacks ....................................................................................................................................128
Fault injection ....................................................................................................................................................128
Side channel attacks ..........................................................................................................................................129
10
© Destination Certification Inc.
Dictionary attacks ..............................................................................................................................................129
Rainbow tables ..................................................................................................................................................129
Reducing the risk of rainbow tables ..................................................................................................................129
Birthday attack ..................................................................................................................................................129
Kerberos exploitation ........................................................................................................................................129
Social engineering .............................................................................................................................................129
3.8
Apply security principles to site and facility design ................................................................................. 130
Goals of Physical Security ..................................................................................................................................130
Primary goal of physical security? .....................................................................................................................130
Physical security controls ..................................................................................................................................130
Threats to physical security ...............................................................................................................................130
Example physical security threats .....................................................................................................................130
Layered defense model .....................................................................................................................................130
Physical security systems and methods ............................................................................................................131
How do we decide which physical security controls to put in place? ...............................................................131
Risk Management Process.................................................................................................................................131
Security Survey ..................................................................................................................................................131
Site Planning ......................................................................................................................................................131
Higher Value Areas ............................................................................................................................................131
3.9
Design site and facility security controls ............................................................................................ 132
Perimeter...........................................................................................................................................................132
Closed Circuit TV (CCTV) ....................................................................................................................................132
Passive infrared devices ....................................................................................................................................132
External Monitoring / Lighting ..........................................................................................................................132
Interior monitoring ............................................................................................................................................132
Doors .................................................................................................................................................................132
Interior Access Control (mantraps) ...................................................................................................................132
Locks ..................................................................................................................................................................133
What determines the security of a combination lock? .....................................................................................133
Card Access / Biometrics ...................................................................................................................................133
Windows............................................................................................................................................................133
Shock / glassbreak sensors ................................................................................................................................133
Walls ..................................................................................................................................................................134
Intrusion Detection Systems .............................................................................................................................134
Skimming ...........................................................................................................................................................134
Site Location ......................................................................................................................................................134
Infrastructure Support Systems ........................................................................................................................134
Power ................................................................................................................................................................134
Uninterruptible Powers Supply (UPS) ...............................................................................................................134
Generators.........................................................................................................................................................135
© Destination Certification Inc.
11
Power Outages & Degradation ..........................................................................................................................135
Heating Ventilation & Air Conditioning (HVAC).................................................................................................135
Positive Pressurization ......................................................................................................................................135
Ideal Temperature & Humidity..........................................................................................................................135
Fire.....................................................................................................................................................................136
Dealing with the Risk of Fire ..............................................................................................................................136
Fire Detectors ....................................................................................................................................................136
Best way to prevent or limit damage from a fire? ............................................................................................136
Water Based Fire Suppression Systems ............................................................................................................136
Gas Based Fire Suppression Systems .................................................................................................................137
Fire Extinguishers ..............................................................................................................................................137
3.10
Manage the information system lifecycle ............................................................................................... 138
Information System Lifecycle ............................................................................................................................138
Domain 4 ................................................................................................................................................................... 140
4.1
Assess and implement secure design principles in network architectures ............................................. 141
What is a network? ...........................................................................................................................................141
What is a protocol? ...........................................................................................................................................141
What is the OSI Model? .....................................................................................................................................141
Open System Interconnection (OSI) Model .......................................................................................................142
OSI Model names ..............................................................................................................................................143
Layer 1: Physical ................................................................................................................................................143
Transmission media ...........................................................................................................................................143
Optical fiber .......................................................................................................................................................143
Crosstalk ............................................................................................................................................................144
Crosstalk is least of an issue with which media? ...............................................................................................144
Criteria for selecting media ...............................................................................................................................144
Network Topologies ..........................................................................................................................................145
Planes ................................................................................................................................................................146
Transmission Methods ......................................................................................................................................146
Dealing with collisions .......................................................................................................................................148
Layer 1 Devices ..................................................................................................................................................149
Layer 2: Data Link ..............................................................................................................................................149
Physical addressing............................................................................................................................................150
Circuit Switched Network ..................................................................................................................................150
Transmission of digital data over analog connections ......................................................................................150
Packet Switched Network .................................................................................................................................150
Authentication Protocols...................................................................................................................................151
Protected Extensible Authentication Protocol (PEAP) ......................................................................................151
Common types of EAP .......................................................................................................................................151
Layer 2 Devices ..................................................................................................................................................152
12
© Destination Certification Inc.
Layer 2 Protocols ...............................................................................................................................................152
Layer 3: Network ...............................................................................................................................................153
Internet Protocol (IP) .........................................................................................................................................153
Logical Addressing .............................................................................................................................................153
LAN technologies ...............................................................................................................................................153
Internet protocol v4 ..........................................................................................................................................154
Internet protocol v6 ..........................................................................................................................................154
IPv4 vs. IPv6 ......................................................................................................................................................154
Private IPv4 addresses .......................................................................................................................................155
Network Classes (subnetting) ............................................................................................................................155
Layer 3 Protocols ...............................................................................................................................................155
Layer 3 Devices ..................................................................................................................................................155
Layer 4: Transport .............................................................................................................................................156
TCP & UDP .........................................................................................................................................................156
TCP vs. UDP headers..........................................................................................................................................156
TCP 3-Way Handshake.......................................................................................................................................157
Ports ..................................................................................................................................................................157
Common Ports ...................................................................................................................................................157
Layer 4 Protocols ...............................................................................................................................................157
Layer 5: Session .................................................................................................................................................158
Layer 5 Protocols ...............................................................................................................................................158
Layer 6: Presentation ........................................................................................................................................158
Layer 7: Application ...........................................................................................................................................159
Layer 7: Protocols ..............................................................................................................................................159
Secure Shell (SSH) ..............................................................................................................................................159
Layer 7 Devices ..................................................................................................................................................160
Convergence ......................................................................................................................................................160
Converged protocols .........................................................................................................................................160
Voice ..................................................................................................................................................................160
Vishing ...............................................................................................................................................................160
Network Attack Phases .....................................................................................................................................161
Network attacks ................................................................................................................................................161
Passively Eavesdropping....................................................................................................................................161
Actively Scanning Ports .....................................................................................................................................161
SYN Scanning .....................................................................................................................................................161
SYN Flooding......................................................................................................................................................162
IP Based Attacks ................................................................................................................................................162
DoS & DDoS .......................................................................................................................................................163
Man-in-the-Middle ............................................................................................................................................163
Spoofing.............................................................................................................................................................163
© Destination Certification Inc.
13
Network Exploit Tools .......................................................................................................................................163
ARP Poisoning ....................................................................................................................................................164
Wireless .............................................................................................................................................................164
Wireless Radio Spectrum ..................................................................................................................................164
Wireless Technologies .......................................................................................................................................165
Wireless Network Architecture .........................................................................................................................165
Radio Frequency Management .........................................................................................................................165
802.11 wireless ..................................................................................................................................................166
Wireless LAN Security Mechanisms ..................................................................................................................166
802.11 Security Solutions ..................................................................................................................................166
Wireless Authentication ....................................................................................................................................166
Wireless Encryption ...........................................................................................................................................166
Wireless Integrity Protection.............................................................................................................................166
TKIP....................................................................................................................................................................167
5G ......................................................................................................................................................................167
Common Tools ..................................................................................................................................................167
Virtual Local Area Network (VLAN) ...................................................................................................................168
Software-Defined Networks ..............................................................................................................................168
SDN architecture ...............................................................................................................................................168
Third-party connectivity ....................................................................................................................................169
Wide Area Networks (WAN) ..............................................................................................................................169
Wide Area Network (WAN) Technology ............................................................................................................169
Monitoring and management ...........................................................................................................................170
4.2
Secure network components ................................................................................................................... 171
Defense in Depth ...............................................................................................................................................171
Partitioning ........................................................................................................................................................171
Network Perimeter ............................................................................................................................................171
Logical segmentation.........................................................................................................................................171
Network Segmentation .....................................................................................................................................172
Bastion Host ......................................................................................................................................................172
Network Segment / Subdomain Isolation .........................................................................................................173
Proxy ..................................................................................................................................................................173
NAT & PAT .........................................................................................................................................................173
Private Addresses ..............................................................................................................................................173
What is a firewall? .............................................................................................................................................174
Firewall Technologies ........................................................................................................................................174
Standard Firewall Architectures ........................................................................................................................175
Data inspection..................................................................................................................................................177
Data Inspection Applications .............................................................................................................................177
IDS & IPS ............................................................................................................................................................177
14
© Destination Certification Inc.
Network based vs. Host based ..........................................................................................................................177
IDS/IPS Network Architecture ...........................................................................................................................178
Mirror / Span / Promiscuous Port .....................................................................................................................178
IDS/IPS Detection Methods ...............................................................................................................................179
Ingress & egress monitoring ..............................................................................................................................179
Whitelisting & Blacklisting .................................................................................................................................179
Sandbox .............................................................................................................................................................180
False Positives & False Negatives ......................................................................................................................180
Honeypots / Honeynets.....................................................................................................................................180
Enticement & Entrapment ................................................................................................................................180
4.3
Implement secure communication channels according to design .......................................................... 181
Remote Access ..................................................................................................................................................181
Tunneling ...........................................................................................................................................................181
Generic Routing Encapsulation (GRE) ...............................................................................................................181
Split tunneling ...................................................................................................................................................181
Virtual Private Network (VPN) ...........................................................................................................................182
Tunnelling & VPN Protocols ..............................................................................................................................182
IPSec ..................................................................................................................................................................182
IPSec modes ......................................................................................................................................................183
Internet Key Exchange (IKE) ..............................................................................................................................183
SSL .....................................................................................................................................................................184
Unencrypted SSL ...............................................................................................................................................184
Remote Authentication .....................................................................................................................................184
Remote Access / Management Services ...........................................................................................................184
Domain 5 ................................................................................................................................................................... 186
5.1
Control physical and logical access to assets ........................................................................................... 187
Access control....................................................................................................................................................187
Access control principles ...................................................................................................................................187
Access control applicability ...............................................................................................................................187
Access control system .......................................................................................................................................187
Logical access modes .........................................................................................................................................188
Administration approaches ...............................................................................................................................188
5.2
Design identification and authentication strategy (e.g., people, devices, and services) ......................... 189
Access control services ......................................................................................................................................189
Identification .....................................................................................................................................................189
User identification guidelines ............................................................................................................................189
Authentication types (factors)...........................................................................................................................189
Authentication by Knowledge ...........................................................................................................................190
Password vault ..................................................................................................................................................190
Authentication by Ownership ...........................................................................................................................190
© Destination Certification Inc.
15
One-time Passwords..........................................................................................................................................190
Smart / Memory cards ......................................................................................................................................191
Smart Card .........................................................................................................................................................191
Authentication by characteristics (biometric types) .........................................................................................191
Biometric device considerations .......................................................................................................................191
Biometric device accuracy / Types of errors .....................................................................................................191
Cross Over Error Rate (CER)...............................................................................................................................191
Biometric Devices ..............................................................................................................................................192
Templates ..........................................................................................................................................................192
Factors of authentication ..................................................................................................................................193
Kerberos ............................................................................................................................................................194
Typical Kerberos issues......................................................................................................................................194
SESAME .............................................................................................................................................................194
Authenticator Assurance Levels (AAL)...............................................................................................................195
Session management ........................................................................................................................................195
Session hijacking................................................................................................................................................195
How do you prevent session hijacking? ............................................................................................................195
Session termination ...........................................................................................................................................195
Registration and proofing of identity ................................................................................................................195
Federated Identity Management (FIM) .............................................................................................................196
Federated access standards ..............................................................................................................................196
SAML .................................................................................................................................................................196
SAML components ............................................................................................................................................197
Accountability....................................................................................................................................................197
5.3
Federated identity with a third-party service .......................................................................................... 198
Cloud-based authentication or identity management ......................................................................................198
Types of identities / accounts............................................................................................................................198
IdaaS Capabilities...............................................................................................................................................198
5.4
Implement and manage authorization mechanisms ............................................................................... 199
1. Discretionary Access Control (DAC) ...............................................................................................................199
Role-Based Access Control (RBAC) ....................................................................................................................200
Types of RBAC....................................................................................................................................................200
Groups and Roles ..............................................................................................................................................200
Rule-based access control .................................................................................................................................200
Attribute / Context based access control ..........................................................................................................201
eXtensible Access Control Markup Language (XACML) .....................................................................................201
2. Mandatory Access Control (MAC) .................................................................................................................201
3. Non-Discretionary Access Control .................................................................................................................201
Access control summary....................................................................................................................................202
5.5
16
Manage the identity and access provisioning lifecycle............................................................................ 203
© Destination Certification Inc.
Provisioning lifecycle .........................................................................................................................................203
User access review ............................................................................................................................................203
How often should access reviews be performed? ............................................................................................203
Which type of accounts should be reviewed most often? ................................................................................203
5.6
Implement authentication systems ......................................................................................................... 204
Domain 6 ................................................................................................................................................................... 206
6.1
Design and validate assessment, test, and audit strategies .................................................................... 207
Purpose of Security Assessment and Testing? ..................................................................................................207
Validation & verification ....................................................................................................................................207
Validation ..........................................................................................................................................................207
Verification ........................................................................................................................................................207
Effort to invest in testing? .................................................................................................................................207
Testing Strategies ..............................................................................................................................................207
Role of Security Professional .............................................................................................................................208
6.2
Conduct security control testing.............................................................................................................. 209
Examples of testing performed .........................................................................................................................209
When should security become involved in testing? ..........................................................................................209
Software Testing Stages ....................................................................................................................................209
Testing Techniques ............................................................................................................................................210
Methods / Tools ................................................................................................................................................210
Runtime .............................................................................................................................................................210
Access to Code ..................................................................................................................................................210
Types of fuzzing .................................................................................................................................................211
Application security testing ...............................................................................................................................211
Test types ..........................................................................................................................................................212
Equivalence partitioning & boundary value analysis.........................................................................................212
More test types .................................................................................................................................................213
Testing examples ...............................................................................................................................................213
Test coverage analysis .......................................................................................................................................214
Vulnerability analysis .........................................................................................................................................214
Purpose of vulnerability assessment .................................................................................................................214
Vulnerability Assessment vs. Penetration Test .................................................................................................214
Typical Process ..................................................................................................................................................215
Red, Blue and Purple Teams ..............................................................................................................................215
Testing Techniques ............................................................................................................................................216
Perspective ........................................................................................................................................................216
Approach ...........................................................................................................................................................216
Knowledge .........................................................................................................................................................216
Automated vulnerability scanners ....................................................................................................................217
Additional testing techniques............................................................................................................................217
© Destination Certification Inc.
17
Banner grabbing & Fingerprinting .....................................................................................................................217
Interpreting & understanding results ................................................................................................................217
False positives & false negatives .......................................................................................................................217
Security Content Automation Protocol (SCAP)..................................................................................................218
Breach attack simulation ...................................................................................................................................218
Compliance checks ............................................................................................................................................218
Log reviews / analysis ........................................................................................................................................219
Logging overview ...............................................................................................................................................219
Log data generation ..........................................................................................................................................219
Limiting log sizes................................................................................................................................................220
Log event time ...................................................................................................................................................220
Operational Testing - Synthetic Transactions & RUM ......................................................................................220
Regression testing .............................................................................................................................................220
Reporting testing results ...................................................................................................................................220
6.3
Collect security process data (e.g., technical and administrative) .......................................................... 221
SMART Metrics ..................................................................................................................................................221
Key performance and risk indicators .................................................................................................................221
How do you decide what to focus metrics on? .................................................................................................221
Example areas for metrics .................................................................................................................................221
6.4
Analyze test output and generate report ................................................................................................ 222
Error handling ....................................................................................................................................................222
Remediation ......................................................................................................................................................222
Ethical disclosure ...............................................................................................................................................222
6.5
Conduct or facilitate security audits ........................................................................................................ 223
Audit & Assessment ..........................................................................................................................................223
Audit approaches ..............................................................................................................................................223
SAS70 > SSAE16 > SSAE18 .................................................................................................................................223
ISAE 3402 / SSAE18 Third-party Audit reports .................................................................................................223
Audit Roles & Responsibilities ...........................................................................................................................224
Domain 7 ................................................................................................................................................................... 226
7.1
Understand and comply with investigations ........................................................................................... 227
Securing the scene ............................................................................................................................................227
Forensic Investigation Process ..........................................................................................................................227
Evidence collection and handling ......................................................................................................................227
Sources of information / evidence ....................................................................................................................227
Locard’s Exchange Principle ..............................................................................................................................227
Types of evidence ..............................................................................................................................................228
Digital / Computer forensics..............................................................................................................................229
Live evidence .....................................................................................................................................................229
Forensic Copies..................................................................................................................................................229
18
© Destination Certification Inc.
Investigative Techniques ...................................................................................................................................229
Why is it harder to do forensic analysis of mobile devices?..............................................................................229
Chain of Custody ...............................................................................................................................................229
Five Rules of Evidence .......................................................................................................................................230
Digital forensics tools, tactics, and procedures .................................................................................................230
Reporting and documentation ..........................................................................................................................230
Types of investigations ......................................................................................................................................231
7.2
Conduct logging and monitoring activities .............................................................................................. 232
Logging & monitoring ........................................................................................................................................232
Security Information and Event Management (SIEM) .......................................................................................232
SIEM Capabilities ...............................................................................................................................................232
Example sources of event data .........................................................................................................................232
Continuous monitoring .....................................................................................................................................233
7.3
Perform Configuration Management (CM) ............................................................................................. 234
Asset Inventory..................................................................................................................................................234
Asset Management ...........................................................................................................................................234
Configuration management ..............................................................................................................................234
7.4
Apply foundational security operations concepts ................................................................................... 235
Need to know / Least Privileges ........................................................................................................................235
Separation of duties and responsibilities ..........................................................................................................235
Privileged account management .......................................................................................................................235
Job rotation .......................................................................................................................................................235
Service Level Agreements (SLA) ........................................................................................................................235
7.5
Apply resource protection ....................................................................................................................... 236
Protecting media ...............................................................................................................................................236
Media ................................................................................................................................................................236
Media management ..........................................................................................................................................236
Hardware and software asset management .....................................................................................................236
7.6
Conduct incident management ............................................................................................................... 237
Incident Management .......................................................................................................................................237
Goals of Incident Response ...............................................................................................................................237
Events and Incidents .........................................................................................................................................237
Detection examples ...........................................................................................................................................237
Examples of incidents ........................................................................................................................................237
Incident Response .............................................................................................................................................238
7.7
Operate and maintain detective and preventative measures ................................................................. 239
Malware ............................................................................................................................................................239
Types of malware ..............................................................................................................................................239
Zero Day ............................................................................................................................................................240
Anti-malware .....................................................................................................................................................240
© Destination Certification Inc.
19
Updating ............................................................................................................................................................240
Machine Learning (ML) and Artificial Intelligence (AI) based tools ...................................................................240
7.8
Implement and support patch and vulnerability management ............................................................... 241
Patch management ...........................................................................................................................................241
Determining patch levels...................................................................................................................................241
Deploying patches .............................................................................................................................................241
7.9
Understand and participate in change management processes ............................................................. 242
Change management ........................................................................................................................................242
Change Management Process ...........................................................................................................................242
7.10
Implement recovery strategies ................................................................................................................ 243
Failure modes ....................................................................................................................................................243
Backup storage strategies .................................................................................................................................243
Archive bit .........................................................................................................................................................243
Incremental vs. Differential ...............................................................................................................................243
Backup strategy summary .................................................................................................................................244
Backup storage strategies .................................................................................................................................245
Spare parts ........................................................................................................................................................245
RAID ...................................................................................................................................................................246
RAID 0 – Striping ................................................................................................................................................246
RAID 1 – Mirroring .............................................................................................................................................246
RAID 10 – Mirroring & Striping ..........................................................................................................................246
RAID 5 – Parity Protection .................................................................................................................................246
RAID 6 – Double Parity Protection.....................................................................................................................247
RAID summary ...................................................................................................................................................247
Cyclic Redundancy Check (CRC).........................................................................................................................247
Clustering vs Redundancy .................................................................................................................................247
Recovery Site Strategies ....................................................................................................................................248
Geographically remote / geographic disparity ..................................................................................................248
Multiple Processing Sites...................................................................................................................................248
Internal vs. External Recovery Sites ..................................................................................................................249
Reciprocal Agreements .....................................................................................................................................249
Disaster Recovery Solutions Summary ..............................................................................................................249
System resilience, high availability, Quality of Service (QoS), and fault tolerance ...........................................249
7.11
Implement Disaster Recovery (DR) processes ......................................................................................... 250
A disaster is: ......................................................................................................................................................250
Focus of business continuity .............................................................................................................................250
BCM, BCP & DRP ................................................................................................................................................250
BCP / DRP Steps .................................................................................................................................................251
Three primary goals of BIA ................................................................................................................................251
The BIA Process .................................................................................................................................................252
20
© Destination Certification Inc.
MTD, RTO, RPO, WRT ........................................................................................................................................252
Declaring a Disaster ...........................................................................................................................................253
Response ...........................................................................................................................................................253
Personnel...........................................................................................................................................................253
Communications................................................................................................................................................253
Restoration Order..............................................................................................................................................253
How is the order determined for restoring systems? .......................................................................................253
Dependency charts ............................................................................................................................................254
What systems / operations should be moved FIRST to DR site? .......................................................................254
Once primary site is fixed, what systems / operations should be moved back FIRST? .....................................254
7.12
Test Disaster Recovery Plans (DRP) ......................................................................................................... 255
When should a full-interruption test be performed?........................................................................................255
7.13
Participate in Business Continuity (BC) planning and exercises .............................................................. 256
Goals of BCM .....................................................................................................................................................256
Focus of BCM .....................................................................................................................................................256
7.14
Implement and manage physical security ............................................................................................... 257
7.15
Address personnel safety and security concerns .................................................................................... 258
Domain 8 ................................................................................................................................................................... 260
8.1
Understand and integrate security in the Software Development Life Cycle (SDLC) .............................. 261
Security’s involvement in development ............................................................................................................261
SDLC & SLC.........................................................................................................................................................261
Development & maintenance lifecycle .............................................................................................................262
Development methodologies ............................................................................................................................262
Waterfall vs. Agile..............................................................................................................................................262
Agile Scrum Master ...........................................................................................................................................263
Integrated Product Team ..................................................................................................................................263
DevOps Security ................................................................................................................................................263
Combining Development Methodologies .........................................................................................................264
Maturity models ................................................................................................................................................264
Operation and maintenance .............................................................................................................................264
Change management (review) ..........................................................................................................................265
8.2
Identify and apply security controls in development environments ....................................................... 266
Programing Language Generations ...................................................................................................................266
Integrated Development Environment (IDE) .....................................................................................................266
Programming Language Translators ..................................................................................................................266
Continuous Integration, Delivery & Deployment ..............................................................................................266
SOAR (Security Orchestration, Automation, and Response) .............................................................................267
Software Configuration Management (SCM) ....................................................................................................267
Secure Programming .........................................................................................................................................267
Polyinstantiation ...............................................................................................................................................267
© Destination Certification Inc.
21
Software / code obfuscation .............................................................................................................................268
Security of the Software Environments.............................................................................................................268
Databases ..........................................................................................................................................................269
Components of DBMS .......................................................................................................................................269
Relational Database...........................................................................................................................................269
Databases: Attributes & Tuples .........................................................................................................................269
Databases: Primary & Foreign Keys ...................................................................................................................270
Database Terms .................................................................................................................................................270
Concurrency & Locks .........................................................................................................................................271
Locks & Concurrency Controls ...........................................................................................................................271
8.3
Assess the effectiveness of software security ......................................................................................... 272
Assess the Effectiveness of Software Security ..................................................................................................272
8.4
Assess security impact of acquired software ........................................................................................... 273
Acquiring Software ............................................................................................................................................273
Software Assurance Phases for Acquisition ......................................................................................................273
8.5
Define and apply secure coding guidelines and standards ...................................................................... 274
Security Weaknesses and Vulnerabilities at the Source-Code Level .................................................................274
Buffer Overflow .................................................................................................................................................275
Buffer Overflow Prevention ..............................................................................................................................275
APIs ....................................................................................................................................................................276
Security of Application Programming Interfaces ...............................................................................................276
Secure coding practices .....................................................................................................................................276
Exam Strategy ....................................................................................................................................................... 277
22
© Destination Certification Inc.
Domain 1
Security and Risk Management
24
© Destination Certification Inc.
1.1
Understand, adhere to, and promote professional ethics
Determining what is the appropriate ethical action can be difficult
Video #199
What are ethics based on?
How can an organization have consistent ethics?
(ISC)2 Code of Ethics Preamble
Safety of the commonwealth, duty to our principals, and to each other
requires that we adhere, and be seen to adhere, to the highest ethical
standards of behavior.
Therefore, strict adherence to this code is a condition of certification.
(ISC)2 Code of Ethics Canons
1.
2.
3.
4.
© Destination Certification Inc.
25
Understand and apply security concepts
Video #94
Focus of security:
Goals of Information Security
Confidentiality
Integrity
Availability
Authenticity
Non-repudiation
5 Pillars of Information Security
26
Non-repudiation
Authenticity
Availability
Information Security
Integrity
Video #252
Confidentiality
1.2
© Destination Certification Inc.
1.3
Evaluate, apply and sustain security governance principles
How do we align the security function to business strategy, goals,
mission, and objectives?
Video #25
Alignment of security function to business strategy, goals, mission, and
objectives
•
•
•
Business must support security through more than just budgets;
must be involved & committed: conviction
The Board of Directors should drive tone from the top
Security should be an enabler
For security to be effective, it is imperative that?
Accountability vs. Responsibility
© Destination Certification Inc.
Video #42
27
Security roles & responsibilities
Organizations must assign security related functions to designated
employees
Who is ultimately accountable for security?
Who is specifically responsible for security?
Due care and due diligence
Video #120
28
© Destination Certification Inc.
1.4
Understand legal, regulatory and compliance issues that pertain to information security in a holistic
context
Cyber crimes and data breaches
Organizations must understand global security trends
Cannot prevent all attacks so security must make attacks:
• Not worthwhile
• Too time consuming
• Too expensive
Video #142
Licensing and intellectual property requirements
Protects
Disclosure
Required
© Destination Certification Inc.
Term of
Protection
Prohibited by
protection
29
Import/export controls
Video #253
ITAR & EAR
Wassenaar Arrangement
Trans-border data flow
• Globalized world economy
• Data is flowing around the globe on the internet
• Organizations must consider flow of data across physical
borders
Data residency (data localization)
Video #203
Privacy
Sensitive data
30
© Destination Certification Inc.
Personal Data
Information that can be used on its own or in combination to identify an
individual
• Name
• Phone number
• Government ID
(e.g. SIN, SSN,
Driver’s License)
• Account numbers
• Certificate /
license numbers
• Biometric data
• Age
• Gender
• Ethnicity
• City
• State
• Zip/postal code
• Email address
• IP Address
• Cookies
Privacy roles & responsibilities
As with security, privacy related functions must be assigned to
designated employees
Privacy requirements
GDPR
United States
•
GLBA, HIPAA, SOX, COPPA
Canada
•
Personal Information Protection and Electronic Documents Act (PIPEDA)
European Union
•
General Data Protection Regulation (GDPR) 2016/679
Argentina
•
Personal Data Protection Law Number 25,326 (PDPL)
South Korea
•
Personal Information Protection Act (PIPA)
Australia
•
Privacy Act
•
Australian Privacy Principles (APPs)
© Destination Certification Inc.
31
OECD Privacy Guidelines
Limit the collection of PII, obtain lawfully, and where
appropriate, with the knowledge or consent of the data
subject
PII should be relevant, accurate, complete and kept upto-date
The purposes for which PII is collected should be
specified when collected
PII should only be used / disclosed based on the purposes
for which it was collected with consent of subject or by
authority of law
PII should be protected by reasonable security
safeguards against loss, unauthorized access,
destruction, use, modification, etc.
There should be a general policy of openness about
developments, practices and policies with respect to PII
An individual (data subject) should have the right to
obtain their data from the controller, and have their data
removed
A data controller should be accountable for complying
with the other principles
Organizations cannot achieve privacy without?
Video #308
Privacy Impact Assessment (PIA)
Typical elements of a PIA
• Data flow analysis
• Legal compliance
• Risk identification
• Mitigation strategies
• Document & reporting
• Review & monitoring
32
© Destination Certification Inc.
Compliance
Organizations must comply with the laws and regulations in the regions /
countries in which they operate
Contractual, legal, industry standards, and regulatory requirements
© Destination Certification Inc.
33
Video #254
1.5
Understand requirements for investigation types
Covered in Section 7.1
34
© Destination Certification Inc.
1.6
Develop, document, and implement security policy, standards, procedures, and guidelines
Policies are ultimately?
Video #84
Perfect Model for Security
Policies
© Destination Certification Inc.
35
Policies, Standards, Procedures, Baselines & Guidelines
Policy
Standard
Examples of Standards:
• Specific anti-virus software
• Specific access control system
• Specific firewall system
• Published guideline (e.g. ISO 27001) adopted
by an organization as a standard.
Procedure
Examples of Procedures:
• User registration
• Contracting for security purposes
• Information system material destruction
• Incident response
Baseline
Examples of Baselines:
• Configurations for intrusion detection systems
• Configurations for access control systems
Guideline
36
Examples of Guidelines:
• Government Recommendations
• Security Configuration Recommendations
• Organizational Guidelines
• Product/System Evaluation Criteria
© Destination Certification Inc.
1.7
Identify, analyze, assess, prioritize and implement Business Continuity (BC) requirements
Covered in Section 7.11
© Destination Certification Inc.
37
1.8
Contribute to and enforce personnel security policies and procedures
Video #26
Candidate screening and hiring
Security should evaluate the following as part of screening and hiring:
Employment agreements and policies
Examples of personnel security policies:
• Acceptable use
• Non-disclosure
• Non-compete
• Ethics
• Code of conduct
Personnel security controls
38
© Destination Certification Inc.
Onboarding and termination processes
Vendor, consultant, and contractor agreements and controls
Enforcement of organizational personnel policies & controls is achieved
through:
Reasonable expectation of privacy
Privacy policy requirements
© Destination Certification Inc.
39
1.9
Understand and apply risk management concepts
Video #7
Risk
The likelihood that a given threat source will exercise a vulnerability and
the resulting impact
Risk Management Process
1.
2.
3.
Video #298
Asset valuation
Focus efforts on tangible or intangible assets that are of greatest value
Assets can be valued using:
40
© Destination Certification Inc.
Risk Analysis
Video #298
Risk analysis key factors
• Obtain Management Support
• Define and approve purpose and scope
• Review findings & recommendations with Management
Threats & Vulnerabilities
© Destination Certification Inc.
41
Identify threats & vulnerabilities
Examples include:
• Natural / Environmental
• Cultural
• Human
• Operational / Process
• Technical
• Physical
Qualitative & quantitative analysis
42
© Destination Certification Inc.
Quantitative risk calculation (ALE, SLE, Asset value, Exposure factor &
ARO)
© Destination Certification Inc.
Video #89
43
Risk response / treatment
Video #8
Cybersecurity Insurance
Specialized insurance product designed to help organizations protect
against financial losses resulting from cyber-related incidents
Types of controls
Video #104
44
© Destination Certification Inc.
Countermeasure selection and implementation
Video #143
Control types
Functional & Assurance
© Destination Certification Inc.
45
Video #129
Video #9
Risk Management Terms
How much security is enough?
Selecting controls
46
© Destination Certification Inc.
Measuring control effectiveness & reporting
Various stakeholders expect reports on control status including:
management, regulators, customers, etc.
Data for control status can originated from: internal monitoring, internal
or external auditors, third-party reports, etc.
Continuous improvement
Risk management supply chain
Video #150
Risk Frameworks
Frameworks provide comprehensive guidance for structuring and
conducting risk management
NIST 800-37 | ISO 31000 | COSO | ISACA Risk IT
NIST 800-37 – Risk Management Framework (RMF) Steps
1
2
3
4
5
6
7
© Destination Certification Inc.
47
1.10 Understand and apply threat modeling concepts and methodologies
Video #172
Threat modeling
Threat modeling methodologies
STRIDE
Threat
Violation
Definition
S
T
R
I
D
E
48
© Destination Certification Inc.
PASTA
1.
Define Objectives
2.
Define Technical Scope
3.
Application Decomposition
4.
Threat Analysis
5.
Vulnerability & Weakness Analysis
6.
Attack Modeling
7.
Risk & Impact Analysis
DREAD
Video #218
Key Point
Definition
D
R
E
A
D
© Destination Certification Inc.
49
Social Engineering
Video #96
50
© Destination Certification Inc.
1.11 Apply Supply Chain Risk Management (SCRM) concepts
Video #35
What can companies acquire?
Risks associated with hardware, software, and service
Security must be considered for acquisitions:
• Baseline Security Requirements
• Security Training
• Common Definitions
Security must be part of procurement process:
• Contracts
• Agreements
• SLAs
Minimum security requirements
• Consult with the appropriate stakeholders
• Define clear & concise security requirements
• Document, share & validate
• Obtain agreement on requirements from stakeholders
Service Level Requirements (SLR)
When acquiring a service define organizational requirements:
• Detailed service descriptions
• Detailed service level targets
• Mutual responsibilities
SLR informs the procurement process and subsequently the SLA
Service Level Agreement (SLA)
Video #51
Service Level Report
Example report components:
• Achievement of metrics defined in the SLA
• Identification of issues
• Reporting channels
• Management
• 3rd parties
Third-party assessment and monitoring
• Many service providers will not allow an organizations auditor’s
onsite to perform an audit
• Instead organizations can rely on the audit report from a
trusted third-party audit firm
• This is known as third-party assurance
© Destination Certification Inc.
51
Video #257
Risks associated with the acquisition of products and services
Risks: malfunction, health hazards, compromised
integrity & introduction of malicious code or
vulnerabilities
Risks: reduced performance, potential hazards, noncompliance with regulations, lack of proper security
measures, increasing vulnerability
Risks: secretly transmit sensitive information to
unauthorized entities, allow unauthorized access to
systems, can remain undetected for extended
periods
Risk mitigations
Third-party
assessment and
monitoring
Evaluating and continuously monitoring the security
practices and performance of third-party vendors or
suppliers
Minimum
security
requirements
Predefined baseline security standards that vendors
must meet
Service level
requirements
Specifications set in contracts that dictate the
expected performance, availability, and
responsiveness of a service provided by a vendor
52
© Destination Certification Inc.
1.12
Establish and maintain a security awareness, education, and training program
Who is responsible for security?
•
•
Video #144
However, people must know what to do
Awareness, Training & Education deliver key principles
Awareness, training & education
Methods and techniques to present awareness and training
•
•
•
•
•
Live in-person
Live online
Pre-recorded
Requirements / rewards
Regular communications / campaigns
Prioritization of topics
Organizations cannot provide awareness, training & education on
everything to everyone
• Determine topics of greatest value
• Specifically tailor to audience
Periodic content reviews
Organizations and their threat environments are constantly changing
Awareness, training & education materials must be updated accordingly
Program effectiveness evaluation
•
•
Participant survey
Participant knowledge testing
© Destination Certification Inc.
53
Domain 2
Asset Security
54
© Destination Certification Inc.
2.1 Identify and classify information and assets
Video #85
Identification & ownership come before classification.
Must create an asset inventory and identify owners for assets
Data Classification
Data classification ensures that information (assets) receive an
appropriate level of protection
Information classification benefits
•
•
•
Identification of critical information
Identification of sensitivity to modification
Commitment to protect
Who determines classification?
Classification process
© Destination Certification Inc.
55
Video #200
Classification vs. Categorization
Classification examples
• Financially sensitive
• Proprietary
• Trade Secret
• Personally Identifiable Information (PII)
Labeling & Marking
Labeling methods
56
© Destination Certification Inc.
2.2 Establish information and asset handling requirements
Video #46
Handling requirements
Media handling
Media storage
Storage requirements for media are based on the classification of the
data
Media retention & destruction
Retention and destruction are based on data classification and data
archiving policies
© Destination Certification Inc.
57
2.3 Provision information and assets securely
Video #44
Who is the data owner?
Owners need to have clearly defined accountabilities including:
• Defining classification
• Approving access
• Retention & destruction
Different types of owner
• Data Owners
• Process Owners
• System Owners
Video #2
Data classification policy
Information classification policy considerations
58
© Destination Certification Inc.
2.4 Manage data lifecycle
Data roles
Video #202
Data life cycle
© Destination Certification Inc.
59
Manage the data life cycle
Video #233
What is Data Remanence?
Categories of sanitization
1
2
3
60
© Destination Certification Inc.
Data deletion methods
© Destination Certification Inc.
61
Object Reuse
Video #258
Solid State Drives data destruction
• Flash memory cannot be overwritten
• Some manufacturers provide sanitization or crypto erasure
capabilities
• Best option is always destruction of media
Encryption
__________________ destruction of media is best
62
© Destination Certification Inc.
2.5 Ensure appropriate asset retention
How do we keep data for a long time?
Video #45
Data archiving
Must understand requirements for protecting information when it is
archived:
• Media type
• Security requirements
• Availability requirements
• Retention period
Retention policies are part of the overall Data Classification policy
Data archiving policies
• Archiving / retention policy is based on laws, regulations &
business needs
• Classify records accordingly
• Train employees
• Provide employees with the right tools
Questions to consider when writing policy:
• Who needs access to the data?
• Do access requirements change over time?
• How long does data need to be kept?
• Data disposal requirements?
© Destination Certification Inc.
63
2.6 Determine data security controls and compliance requirements
Video #59
Best way to ensure data receives appropriate protection based on
classification?
Methods for protecting data
What is data at Rest?
Protecting data at Rest
What is data in Transit?
Protecting data in Transit
64
© Destination Certification Inc.
End-to-end encryption
Link encryption
Onion network
© Destination Certification Inc.
65
Video #207
Information obfuscation methods
Information Pruning
Scoping and Tailoring
Video #261
Data protection methods
Digital Rights
Management
(DRM)
Information
Rights
Management
Data Loss
Prevention
(DLP)
Cloud Access
Security
Broker (CASB)
66
Set of access control technologies for restricting the
use, distribution, modification, etc. of data and other
intellectual property
Subset of DRM focused on protecting sensitive
information from unauthorized access. Typically
deployed in an organizational setting (e.g. Secure PDF
files)
Suite of technologies designed to detect and prevent
the exposure / loss / leakage of sensitive information
Security technology that provides visibility, policy
enforcement, and threat protection for cloud-based
applications and services
© Destination Certification Inc.
Domain 3
Security Architecture
and Engineering
© Destination Certification Inc.
67
3.1
Research, implement and manage engineering processes using secure design principles
Security’s involvement in building anything
Video #211
How do we know what security controls to include at each phase?
Secure design principles
• Threat modeling
• Least privilege
• Defense in depth
• Secure defaults
• Fail securely
• Separation of Duties (SoD)
• Keep it simple
• Zero trust
• Trust but verify
• Privacy by design
• Shared responsibility
• Cyber Kill/Attack Chain
Keep it simple
Zero Trust
© Destination Certification Inc.
69
Principles for zero trust
1
know your architecture including users, devices, and services
2
know your user, service and device identities
3
know the health of your users, devices and services
4
use policies to authorise requests
5
authenticate everywhere
6
focus your monitoring on devices and services
7
don’t trust any network, including your own
8
choose services designed for zero trust
Trust but verify
• Locking down architectures and focusing on prevention only is
outdated
• instead, focus on complete controls based on detection and
response as well
• this is especially important for reliance on third party services,
including Cloud
• increased need to monitor, and trust through assurance
mechanisms
o audits
o ongoing monitoring
o SOC reporting
o Contracts/agreements
Privacy by Design
70
© Destination Certification Inc.
Shared responsibility
• Relating to security in third party services, eg Cloud
• Increased reliance on third party services requires clarity on
shared security expectations
• Responsibility vs accountability must be clearly understood by
the company using 3rd parties
• consumers and providers must take action on these
responsibilities by having clear contracts and agreements and
then implementing appropriate policies and procedures and
controls.
Cyber Kill / Attack Chain
© Destination Certification Inc.
Video #315
71
3.2
Understand the fundamental concepts of security models
Video #99
What is a model?
Concept of security
Enterprise Security Architecture
Video #1
Enterprise
Security
Architecture
72
© Destination Certification Inc.
3 major Enterprise Security Architectures
Security Models
© Destination Certification Inc.
Video #72
73
Bell-LaPadula
Biba
Layer of
Read
Write
Send
Layer of
74
© Destination Certification Inc.
Lipner implementation
Information flow
Video #27
Covert channels
Clark-Wilson: 3 Goals of Integrity
1
2
3
2
3
Clark-Wilson: 3 Rules
1
© Destination Certification Inc.
75
Brewer-Nash (The Chinese Wall) Model
Graham–Denning Model
Harrison–Ruzzo–Ullman Model
Deals with integrity of access rights
Finite set of procedures available to edits access rights of a subject
Video #47
Evaluation Criteria
Certification and accreditation
76
© Destination Certification Inc.
Orange Book / Trusted Computer System Evaluation Criteria (TCSEC)
Orange Book Evaluation Criteria
A1
Verified design
B3
Security labels, verification of no covert channels, and must
stay secure during start-up
B2
Security labels and verification of no covert channels
B1
Security labels
C2
Strict login procedures
C1
Weak protection mechanisms
D1
Failed or was not tested
Information Technology Security Evaluation Criteria (ITSEC)
ITSEC improves on the Orange Book by:
•
Functional measurements are the same as Orange Book
•
Assurance measurements are E levels
ITSEC (Assurance) E Levels
E6
Formal end-to-end security tests + source code reviews
E5
Semi-formal system + unit tests and source code review
E4
Semi-formal system + unit tests
E3
Informal system + unit tests
E2
Informal system tests
E1
System in development
E0
Inadequate assurance
© Destination Certification Inc.
77
Video #60
Common Criteria
Common Criteria Process
78
© Destination Certification Inc.
Common Criteria EAL levels
EAL7
EAL6
EAL5
EAL4
EAL3
EAL2
EAL1
© Destination Certification Inc.
79
3.3
Select controls based upon systems security requirements
Video #299
What do security control frameworks provide?
Security control frameworks
80
© Destination Certification Inc.
ISO 27001
ISO 27000 family
ISO 27001 domains:
1. Information security policies
2. Organization of information security
3. Human resource security
4. Asset management
5. Access control
6. Cryptography
7. Physical and environmental security
8. Operations security
9. Communications security
10. System acquisition, development and maintenance
11. Supplier relationships
12. Information security incident management
13. Information security aspects of business continuity
management
14. Compliance
© Destination Certification Inc.
81
3.4
Understand security capabilities of information systems
Video #117
Subjects & objects
Video #130
Reference Monitor Concept (RMC)
RMC features include:
• must mediate all access
• be protected from modification
• be verifiable as correct
• always be invoked
82
© Destination Certification Inc.
Security Kernel
3 principles of RMC & Security Kernel
To have security, the RMC and its implementation, the Security Kernel,
must satisfy 3 principles
Trusted Computing Base (TCB)
Totality of protection mechanisms within an architecture:
Examples of components within the TCB:
• Processors (CPUs)
• Memory
• Primary Storage
• Secondary Storage
• Virtual Memory
• Firmware
• Operating Systems
• System Kernel
Example TCB, RMC & Security Kernel Question
A user logs into their laptop by entering their username and password. Is
this?
TCB
RMC
Security Kernel
© Destination Certification Inc.
83
Video #262
Processors
Processor States
Operating modes for the processor that restrict the operations that can
be performed by certain processes
Process Isolation
Prevents objects from interacting with each other and their resources
Actions of one object should not affect the state of other objects
Secure Memory Management
Prevent a process from accessing memory that has not been allocated to
it
84
© Destination Certification Inc.
Secure Memory Management vs. Memory Segmentation
Memory Segmentation
Secure Memory Management
Allows for setting access control
rules on each segment of
memory.
Focused on protecting memory
from unauthorized access and
corruption
The OS can control which
processes have read, write, or
execute permissions for each
segment.
Broader Term
Includes: Memory
segmentation, preventing buffer
overflows, etc.
Types of Storage
Video #10
Examples of primary storage:
• Cache
• Registers
• RAM
Examples of secondary storage:
• Magnetic drives
• Optical media
• Tapes
• SSD
Virtual Memory
Firmware
Software that provides low-level control of hardware
Firmware is the code that boots the hardware up
Video #173
System Kernel
Supervisory element that coordinates the components
© Destination Certification Inc.
85
Privilege Levels
Subjects of higher trust can access more system instructions and operate
in privileged mode
Subjects with lower trust can only access a smaller portion of system
instructions and operate in user mode
Video #151
Ring protection model
Middleware
Layer of software that enables interoperability (glue) between different
incompatible applications
86
© Destination Certification Inc.
Data Hiding
Prevent data at one security level from being seen at another level
Virtualization
Creating a virtual version of something to abstract away from the true
underlying hardware or software
Video #52
Layering / Defense in depth
Combining multiple security controls to protect systems
© Destination Certification Inc.
87
3.5 Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
Video #79
Single point of failure
Reduce risk of single point of failure
Bypass controls
Reduce risk of bypass controls
88
© Destination Certification Inc.
Race conditions
TOCTOU
Reduce risk of race conditions
Emanations
Reduce risk of emanations
Vulnerabilities in systems
Video #174
Where is it hardest to detect vulnerabilities?
© Destination Certification Inc.
89
To protect anything:
Reduce risk in mobile-based systems
Reduce risk in client & server-based systems
OWASP
Video #106
Mobile devices
Reduce risk of mobile devices & mobile workers
90
© Destination Certification Inc.
Mobile device policy
Remote access security
End-point security
OWASP Mobile Top 10
M1
Improper Platform Usage
M2
Insecure Data Storage
M3
Insecure Communication
M4
Insecure Authentication
M5
Insufficient Cryptography
M6
Insecure Authorization
M7
Poor Client Code Quality
M8
Code Tampering
M9
Reverse Engineering
M10
Extraneous Functionality
Video #152
Distributed systems
Grid computing
© Destination Certification Inc.
91
Data warehouse
Big Data
Examples of big data tools:
• Hadoop
• MongoDB
• Tableau
Data mining / analytics
Inference & aggregation
Reduce risk of inference & aggregation
92
© Destination Certification Inc.
Industrial Control Systems (ICS)
General term for control systems (hardware & software) used in
industrial processes and critical infrastructure
Video #131
OT vs ICS
Types of ICS
SCADA
DCS
PLC
Reduce risk in Industrial Control Systems
Internet of Things (IoT)
Reduce risk of Internet of Things (IoT)
© Destination Certification Inc.
93
Video #164
Cloud Computing
Characteristics of cloud computing
On-demand
self-service
Users can request services and sophisticated
software at cloud provider automatically
provisions
Broad network
access
Access to cloud resources are available from
multiple device types from multiple locations
Resource
pooling
Easily provisionable and scalable resources which
can appear infinite (compute, storage, network)
Rapid elasticity
and scalability
Ability to quickly provision and de-provision
resources
Measured
service
Usage of resources is monitored and reported to
the consumer, providing visibility and
transparency of rates and costs
Multi-tenancy
Resources are allocated such that multiple
consumer’s (Tenant’s) computations and data are
isolated from and inaccessible to one another
Cloud service models
Video #132
94
© Destination Certification Inc.
Cloud deployment models
Virtual Private Cloud (VPC)
Provides a logically isolated and customizable portion of a public cloud
provider's infrastructure to a customer
Cloud computing roles
© Destination Certification Inc.
Video #204
95
Accountability vs. Responsibility
Video #303
Compute
Virtual Machines
Instead of running directly on the hardware, code (e.g. an operating
system) runs on top of an abstraction layer (more code)
96
© Destination Certification Inc.
Hypervisor Types (VM Monitors)
Cloud VM forensics
Containers
Highly portable code execution environments that run within an
operating system, sharing and leveraging resources of that operating
system
Dividing up services
© Destination Certification Inc.
97
Microservices
Application services are divided up and loosely coupled. Each service can
run in its own container. Services communicate via APIs
Serverless
Simple functions are written and stored in the cloud. Functions can be
called as much or as little as desired. Zero usage = zero costs
Common cloud protocols
Video #198
Video #263
Edge Computing
Distributed computing paradigm that brings computation and data
storage closer to the location where it is needed to improve response
times and save bandwidth
Secure Access Service Edge (SASE)
Combines network security and wide-area networking (WAN)
capabilities into a cloud-based service
Embedded devices
Combination of computer hardware and software designed for a specific
function
98
© Destination Certification Inc.
High Performance Computing
Ability to process data and perform complex functions at high speeds
(e.g. Supercomputers)
Cross Site Scripting (XSS)
Video #68
2
3
1
4
3
2
5
4
1
© Destination Certification Inc.
99
Types of XSS
Injected code is stored on the server and
sent to all subsequent visitors (victims)
Injected code is passed to vulnerable server
via URL and reflected to the victim
Client-side DOM environment is modified
and malicious code injected
Video #90
Cross Site Request Forgery (CSRF)
2
3
1
4
XSS vs. CSRF
Unwanted action performed on
the user’s browser
Unwanted action performed on
a trusted website
User’s browser (Client) runs
malicious JavaScript code
Website (Server) executes a
command from Trusted User’s
browser
100
© Destination Certification Inc.
Structured Query Language (SQL)
Video #90
SQL Injection
SQL Commands
CREATE
ALTER
DROP
TRUNCATE
RENAME
SELECT
INSERT
UPDATE
DELETE
MERGE
LOCK TABLE
GRANT
REVOKE
COMMIT
ROLLBACK
SAVEPOINT
SQL Injection code examples
SELECT * FROM users
INSERT INTO users (userID, password) VALUES (rob, Pass123)
DROP accountsReceivable
© Destination Certification Inc.
101
Video #118
Root of all evil is?
Input Validation
Reduce risk of web-based vulnerabilities
102
© Destination Certification Inc.
3.6
Select and determine cryptographic solutions
History of Cryptography
Video #14
Cryptographic evolution
© Destination Certification Inc.
103
Video #112
5 Services of Cryptography
Data protection
Everyday uses of cryptography
104
© Destination Certification Inc.
Cryptographic definitions
• Art and science of writing secrets
• Accomplished by a cryptosystem
© Destination Certification Inc.
Video #138
105
Encryption / Decryption
Key Space
Methods of encryption
Video #138
106
© Destination Certification Inc.
Substitution
Transposition
Transposition: Rail Fence (zigzag) cipher
Transposition ciphers
© Destination Certification Inc.
107
Synchronous vs. asynchronous
Video #73
Repeating patterns must be avoided
Most common letter in the English language?
Most common 3 letter word in the English language?
Most common 4 letter word in the English language?
108
© Destination Certification Inc.
Substitution patterns in monoalphabetic ciphers
Substitution - Polyalphabetic ciphers
Substitution - Running key ciphers
Substitution - One-time pads
© Destination Certification Inc.
109
Video #86
Stream vs. block ciphers
Stream ciphers
Block ciphers
110
© Destination Certification Inc.
Symmetric Block modes
Which are faster: stream or block ciphers?
© Destination Certification Inc.
111
Video #3
Symmetric Cryptography
Advantages
Disadvantages
Symmetric Algorithms
Algorithm
Key length
Block length
Other Symmetric
Algorithms
Strength
Weak
Medium
Strong
Very
Strong
112
Name
Key Length
RC2-40
40
DES
56
RC5-64/16/7
56
RC5-64/16/10
80
Skipjack
80
RC2-128
128
RC5-64/12/16
128
IDEA
128
Blowfish
128
3DES
168 = 112
RC5-64/12/32
256
Twofish
256
RC6
256
Rijndael (AES)
128, 192, or 256
© Destination Certification Inc.
DES / 3DES
Rijndael / Advanced Encryption Standard (AES)
• US government saw that DES was getting obsolete and started
the Advanced Encryption Standard competition
• 30 algorithms were evaluated over 4 years
Out-of-band key distribution
© Destination Certification Inc.
113
Video #87
Asymmetric Cryptography
Advantages
Disadvantages
Asymmetric Algorithms
114
© Destination Certification Inc.
Hard math problems
Factoring & Discrete Logs asymmetric algorithms depend on using very
large prime numbers
When using such large numbers, it is very difficult to work backwards to
determine the original integers
Diffie-Hellmann Key Exchange Protocol
Video #113
© Destination Certification Inc.
115
Video #80
Hybrid Cryptography
Steganography & null cipher
Video #15
116
© Destination Certification Inc.
Message Integrity Controls
Video #28
Message
Integrity
Controls
Parity
Hash Functions
Keyed Hash
HMAC
Checksum
CRC
(Cyclical Redundancy Check)
Digital
Signature
Hashing functions
Hashing
Key properties of hashing algorithms
Hashing Algorithms
Collisions
© Destination Certification Inc.
117
Birthday Attack/Paradox
Video #145
Digital Signatures
Services provided by Digital Signatures
Creating Digital Signatures
Uses of Digital Signatures
• In many countries digital signatures have the same legal
significance as traditional signed documents
• Verify integrity and authenticity of software updates / patches
• Nonrepudiation:
o Sender cannot deny sending the message.
o Recipient cannot claim receiving a different message
than the original
Video #304
Code signing and validation
Method of using a digital signature to sign executables and scripts in
order to verify the author's identity and ensure that the code has not
been changed or corrupted since it was signed by the author
118
© Destination Certification Inc.
How can we be certain we have someone’s public key?
Digital Certificates
© Destination Certification Inc.
Video #146
119
Digital Certificate Standard
Video #91
Root of trust
Who issues certificates?
120
© Destination Certification Inc.
Digital Certificate Replacement & Revocation
Revocation methods
Certificate lifecycle
Enrollment
Issuance
Validation
Revocation
Renewal
Certificate Pinning
© Destination Certification Inc.
121
Video #180
Public Key Infrastructure
122
© Destination Certification Inc.
Components of PKI
Certificate
Authority (CA)
Registration
Authority (RA)
Intermediate /
Issuing CA
Certificate DB
Certificate Store
Without a PKI it is possible to encrypt and send data, but you cannot
verify the identities of the other parties
© Destination Certification Inc.
123
Video #264
MIME headers
Used by protocols such as email, HTTP, and others to indicate the nature
and format of a document or file being transmitted
S/MIME
Provides a secure way to send and receive MIME data
Video #146
Key Management
Kerckhoffs’s Principle
Key management activities
Key Creation
Key Distribution
124
© Destination Certification Inc.
Key Storage
Key Rotation
Key Recovery
Key disposition / destruction
© Destination Certification Inc.
125
Putting it all together
126
© Destination Certification Inc.
3.7
Understand methods of cryptanalytic attacks
Video #20
Cryptanalysis
Science of:
• Cracking codes
• Decoding secrets
• Violating authentication schemes
• Breaking cryptographic protocols
• Finding and correcting weaknesses in encryption algorithms
Types of Cryptanalysis attacks
Cryptanalytic Attacks
•
•
•
•
•
•
•
Cryptographic Attacks
Brute force
Ciphertext only
Known plaintext
Chosen plaintext
Chosen ciphertext
Linear & Differential
Factoring
•
•
•
•
•
•
•
•
•
•
•
•
Man-in-the-middle
Replay
Pass the hash
Temporary files
Implementation
Fault injection
Side channel
Dictionary attack
Rainbow tables
Birthday
Kerberos exploitation
Social engineering
What is the primary goal of Cryptanalytic attacks?
Brute force attack
Key Length
Key Space
Attack Time
56
7.2 x 1016
20 hours
80
1.2 x 1024
54,800 years
128
3.4 x 1038
1.5 x 1019 years
256
1.15 x 1077
5.2 x 1057 years
Cryptanalytic attacks
Algorithm
Ciphertext
Plaintext
Device
Details
Ciphertext
only
Known
plaintext
Chosen
plaintext
Chosen
ciphertext
Linear & differential
Factoring
© Destination Certification Inc.
127
Video #176
Man-in-the-middle attack
Replay attack
Pass the Hash
Video #177
Temporary files attack
Implementation attacks
Fault injection
128
© Destination Certification Inc.
Side channel attacks
Dictionary attacks
Video #305
Rainbow tables
Reducing the risk of rainbow tables
Birthday attack
Video #178
Kerberos exploitation
• Kerberos IV only uses DES encryption and therefore prone to
brute force attacks
• Kerberos V supports plug-in encryption such as 3DES, IDEA, etc.
• Authentication requires good implementation practices, to
prevent ticket stealing and replay attacks
• Kerberos authentication may be prone to brute force attacks
against the KDC
Social engineering
© Destination Certification Inc.
129
3.8
Apply security principles to site and facility design
Video #220
Goals of Physical Security
Physical security provides protection from outside the perimeter…
… to all assets within
Primary goal of physical security?
Physical security controls
Threats to physical security
Example physical security threats
• Theft
• Espionage
• Dumpster diving
• Social engineering
• Shoulder surfing
• HVAC access
Layered defense model
130
© Destination Certification Inc.
Physical security systems and methods
How do we decide which physical security controls to put in place?
Video #185
Risk Management Process
Security Survey
Site Planning
Higher Value Areas
© Destination Certification Inc.
131
3.9 Design site and facility security controls
Perimeter
Video #306
Closed Circuit TV (CCTV)
Passive infrared devices
External Monitoring / Lighting
Interior monitoring
Doors
Interior Access Control (mantraps)
132
© Destination Certification Inc.
Locks
Video #183
What determines the security of a combination lock?
Card Access / Biometrics
Windows
• Standard Plate Glass
• Tempered Glass
• Wired Glass
• Laminated Glass
• Polycarbonate
• Solar Films
Video #37
Shock / glassbreak sensors
© Destination Certification Inc.
133
Video #155
Walls
Intrusion Detection Systems
Video #181
Skimming
Site Location
• Crime
• Riots
• Natural disasters
• Adjacent buildings
• Airport
• Highway / railway
• Military base
• Emergency support services
Video #166
Infrastructure Support Systems
Power
Disruptions in electrical power can have a serious business impact.
Goal is to have clean and steady power
Uninterruptible Powers Supply (UPS)
134
© Destination Certification Inc.
Generators
Power Outages & Degradation
period of time
period of time
Heating Ventilation & Air Conditioning (HVAC)
Positive Pressurization
Ideal Temperature & Humidity
© Destination Certification Inc.
135
Video #21
Fire
Requires: Fuel, oxygen & heat
Dealing with the Risk of Fire
Fire Detectors
Best way to prevent or limit damage from a fire?
Video #54
Water Based Fire Suppression Systems
136
© Destination Certification Inc.
Gas Based Fire Suppression Systems
Fire Extinguishers
Class
Type of fire
Suppression agents
D
Combustible metals
Dry powders
K
Commercial kitchens
Wet chemicals
© Destination Certification Inc.
137
3.10 Manage the information system lifecycle
Information System Lifecycle
The entire lifespan of an information system, from its initial
conceptualization to its eventual decommissioning
138
© Destination Certification Inc.
Domain 4
Communication and Network
Security
4.1
Assess and implement secure design principles in network architectures
Video #4
What is a network?
What is a protocol?
What is the OSI Model?
© Destination Certification Inc.
Video #62
141
Open System Interconnection (OSI) Model
OSI
Description
Devices & Protocols
Network capabilities of
applications
Formatting of data
Interhost communication
End-to-end connection
with error correction &
detection
Logical addressing, routing
and delivery of packets
Physical addressing, and
reliable point-to-point
connection
Binary transmission of
data across physical media
(wire, fiber, etc.)
142
© Destination Certification Inc.
TCP/IP
OSI Model names
Layer
Protocol Data Unit
7 Application
6 Presentation
Example
HTTPS
Data
5 Session
JPEG
NetBIOS
4 Transport
Segments/datagrams
3 Network
Packets
Router
2 Data Link
Frames
Switch
1 Physical
Bits
TCP/UDP Ports
Fiber Optic Cable
Layer 1: Physical
• Binary transmission of data across physical media (wire,
wireless, etc.)
• Conversion of bits into light, electrons or radio waves
• Provides transfer of a bit stream over wires, optical cable or
airwaves
• Physical or virtual connection for transmission between data
link entities
Video #88
Transmission media
Optical fiber
© Destination Certification Inc.
143
Crosstalk
Crosstalk is least of an issue with which media?
Criteria for selecting media
• Confidentiality
• Bandwidth
• Distance
• Geography
Video #88
Transport architecture
144
© Destination Certification Inc.
Network Topologies
Video #267
topology
topology
E.g. In a physically star-shaped network, the logical
topology might be a bus if all communications are
being broadcast to all nodes.
© Destination Certification Inc.
145
Planes
plane
plane
(Route calculation / path determination, OSPF,
BGP)
plane
(Packet forwarding & switching)
Cut-through vs. Store-and-forward
Transmission Methods
Video #268
146
© Destination Certification Inc.
North-south and east-west traffic patterns
Crucial considerations when designing network architecture, as they
impact the choice of network topologies, routing protocols, and security
strategies
Traffic flows
traffic
Traffic between clients on the Internet and servers
within the data center (southbound), or vice versa
(northbound)
traffic
The data that moves laterally between servers,
storage systems, and applications within the data
center or across data centers
Considerations N-S and E-W traffic
Traditionally, E-W traffic is considered safer and typically trusted
N-S traffic requires stricter security policies
Advent of Zero Trust requires scrutiny for both through more granular
attribute-based access control and monitoring
© Destination Certification Inc.
147
Video #270
Video #271
Dealing with collisions
Physical segmentation
148
© Destination Certification Inc.
Performance metrics
Video #272
Layer 1 Devices
Video #307
Layer 2: Data Link
• Physical addressing, and reliable point-to-point connection
• Responsible for reliable delivery of information over a point-topoint or multi-point network
• Translates data info bits and formats in Frames
• Can be divided into Logical Link Control and Media Access
Control
• Common place to implement link encryption
• Provides error detection via checksums
© Destination Certification Inc.
149
Video #100
Physical addressing
Circuit Switched Network
Connection is established permanently or on demand and is maintained
between switches in order to route traffic to the correct destination
Transmission of digital data over analog connections
Encapsulate the Internet Protocol to enable transmission of digital data
over analog connections
Packet Switched Network
Each data packet contains information such as addresses and sequence
numbers
Switches switch the packets to the final destination based on the header
information and network conditions
150
© Destination Certification Inc.
Authentication Protocols
Video #125
Protected Extensible Authentication Protocol (PEAP)
Encapsulates EAP within an encrypted and authenticated TLS tunnel
Common types of EAP
Video #319
Type
Client
Authentication
Server
Authentication
Security
Industry
Support
Proprietary
EAPTLS
Certificate
Certificate
High
High
No
EAPTTLS
ID &
Password
Certificate
Medium
Medium
EAPPEAP
ID &
Password
Certificate
Medium
High
LEAP
ID &
Password
ID &
Password
Low
High
EAPMD5
ID &
Password
-
Low
Low
Yes
Certicom
Kinda
© Destination Certification Inc.
Cisco,
RSA &
Microsoft
Yes
Cisco
No
151
Layer 2 Devices
Layer 2 Protocols
152
© Destination Certification Inc.
Layer 3: Network
• Logical addressing, routing and delivery of packets
• Selects and manages a route chosen from the available links
arranged as a network
• Can determine alternate routes to avoid congestion or node
failure
• Data is transferred via packets
• A place to implement link, or end-to-end encryption
Video #229
Internet Protocol (IP)
Logical Addressing
LAN technologies
IEEE – Institute of Electric and Electronic Engineers
Wired
Wireless
Virtual LANS
Ethernet
IEEE 802.3
WLAN
IEEE 802.11
VLAN
IEEE 802.1Q
© Destination Certification Inc.
153
Video #139
Internet protocol v4
Internet protocol v6
IPv4 vs. IPv6
Deployed
1974
1999
4,294,967,296
340,282,366,920,938,463,463,374,607,431,768,211,456
10.0.0.1
2001:0db8:85a3:0000:
0000:8a2e:0370:7334
Address
Size
Address
space
Address
format
IPSec
154
© Destination Certification Inc.
Private IPv4 addresses
Video #208
Network Classes (subnetting)
# of addresses
Class
Class
Class
Class
Multicast address
Class
Reserved
Layer 3 Protocols
Layer 3 Devices
© Destination Certification Inc.
155
Video #74
Layer 4: Transport
• End-to-end connection with error correction & detection
• Ensures host-to-host information transfer
• Provides reliable, transparent data transfers between session
entities
• Isolates the user from any concerns about the actual movement
of the information
• A place to implement end-to-end encryption
TCP & UDP
TCP vs. UDP headers
156
© Destination Certification Inc.
TCP 3-Way Handshake
Video #114
Ports
Common Ports
Video #320
Layer 4 Protocols
© Destination Certification Inc.
157
Video #30
Layer 5: Session
• Interhost communication
• Coordinates communications dialogue between cooperating
application processes
• Maintains a logical connection between two processes on end
hosts
• Ideal place for identification and authentication
Layer 5 Protocols
Layer 5 technologies
Circuit, Proxy, Firewalls
Layer 6: Presentation
• Formatting & encryption of data for end user
• Ensures compatible syntax in how the information is
represented for exchange by applications
• Provide translation, encryption/decryption and
compression/decompression
158
© Destination Certification Inc.
Layer 7: Application
• Network process of applications
• Provides a user interface through which the user gains access to
the communication services
• Ideal place for end-to-end encryption and access control
Layer 7: Protocols
Secure Shell (SSH)
Secure remote administration protocol (remote command-line, login,
and remote command execution)
Layer 7 technologies
• Gateways
• Application, Proxy, Firewalls
© Destination Certification Inc.
159
Layer 7 Devices
Video #126
Convergence
Converged protocols
Voice
VoIP Protocols
Secure (encryption,
Initiating, maintaining, and
authentication, integrity & replay terminating voice and video
attack protection) of RTP for
sessions
streaming voice and video over IP
Vishing
160
© Destination Certification Inc.
Network Attack Phases
Video #321
Network attacks
Passively Eavesdropping
Actively Scanning Ports
SYN Scanning
© Destination Certification Inc.
161
SYN Flooding
Video #75
IP Based Attacks
162
© Destination Certification Inc.
DoS & DDoS
Man-in-the-Middle
Spoofing
Network Exploit Tools
© Destination Certification Inc.
163
ARP Poisoning
Video #101
Wireless
Wireless Radio Spectrum
Wireless Radio Spectrum
0
100
200
300
400
500
600
700
800
900
1GHz
3GHz
5GHz
10GHz
28GHz
Digital Cellular (1850-1900 MHz)
Cordless Phones, Baby Monitors, Toys (900 MHz)
Analog Cellular (824-894 MHz)
UHF TV (512 – 806 MHz)
FM Radio (88 – 108 MHz)
VHF TV (174 – 216 MHz)
AM Radio (535 – 1605 KHz)
164
© Destination Certification Inc.
38GHz
Wireless Technologies
Wireless Network Architecture
Radio Frequency Management
© Destination Certification Inc.
165
802.11 wireless
Type
Frequency
Top speed
802.11
2.4 GHz
2 Mbps
802.11a
5 GHz
54 Mbps
802.11b
2.4 GHz
11 Mbps
802.11g
2.4 GHz
54 Mbps
802.11n
2.4 GHz & 5 GHz
72-600 Mbps
802.11ac
5 GHz
422 – 1300 Mbps
Wireless LAN Security Mechanisms
802.11 Security Solutions
802.1x
Dynamic
WEP
Wi-Fi
Protected
Access
(WPA)
Wi-Fi
Protected
Access 2
(WPA2)
Access Control
802.1X
802.1X or
Pre-Shared Key
802.1X or
Pre-Shared Key
Authentication
EAP methods
EAP methods
or Pre-Shared
Key
EAP methods
or Pre-Shared
Key
Encryption
WEP
TKIP (RC4)
CCMP (AES
Counter Mode)
Integrity
None
Michael MIC
CCMP
(AES CBC-MAC)
Wireless Authentication
Require an authenticated key exchange mechanism
Extensible Authentication Protocol (EAP)
• One factor: EAP-MD5, LEAP, PEAP-MSCHAP, TTLS-MSCHAP,
EAP-SIM
• Two factor: EAP-TLS, TTLS with OTP, and PEAP-GTC
Need mutual authentication
Wireless Encryption
Temporal Key Integrity Protocol (TKIP)
• Uses RC4 Stream Cipher with 128 bit per-packet keys
Counter-Mode-CBC-MAC Protocol (CCMP)
• Uses Advanced Encryption Standard (AES) with 128 bit keys
Wireless Integrity Protection
TKIP uses a Message Integrity Code called “Michael”
CCMP uses AES in CBC-MAC mode
166
© Destination Certification Inc.
TKIP
•
•
•
•
•
TKIP (Temporal Key Integrity Protocol)
Designed to replace WEP without requiring the replacement of
legacy hardware
Required due to significant flaw found in WEP
Sends each new packet with a unique encryption key (key
mixing)
TKIP is no longer considered secure and is superseded by AES
5G
•
•
•
Mutual authentication capabilities
Enhanced subscriber identity protection
Provide end-to-end authentication, integrity and
confidentiality protection via signatures and encryption
Common Tools
© Destination Certification Inc.
Video #190
167
Video #69
Virtual Local Area Network (VLAN)
Software-Defined Networks
•
•
•
Video #234
Centralize network intelligence
Programmatic network configuration
Multiple segregated overlapping IP ranges
SDN architecture
168
© Destination Certification Inc.
Third-party connectivity
• Inventory of third-party vendor connections
• Analyze firewall rules for inbound connections
• Run vulnerability scans to look for services that are listening for
inbound connections
• Enterprise password security policies must apply to vendors
• Create & enforce security standards specific to vendors
• Monitor for any security gaps and then mitigate them
Wide Area Networks (WAN)
Connects LANs through technologies such as:
• Dedicated leased lines
• Dial-up phone lines
• Satellite and other wireless links
• Data packet carrier services
Video #102
Wide Area Network (WAN) Technology
© Destination Certification Inc.
Video #196
169
Video #274
Monitoring and management
Practices, tools, and processes aimed at ensuring the availability,
performance, security and reliability of computer networks, systems,
and services
Performance Monitoring, Security Monitoring, Configuration
Management, Log Management, Alerting and Notification, Reporting
and Analytics, etc.
170
© Destination Certification Inc.
4.2
Secure network components
Defense in Depth
Video #275
Partitioning
Network Perimeter
Edge networks
Networks that are situated at the edge of a centralized network, closer
to the end-users. Designed to deliver content and services with reduced
latency and increased performance by being geographically closer to the
user
Logical segmentation
Creating distinct logical or virtual segments within a larger physical
network
Allows a single physical network to be partitioned into
multiple smaller logical networks
Create a private network across public network
infrastructure. Used to connect remote users or
separate branches of a business to the main office's
network
Allows multiple instances of a routing table to coexist
within the same router at the same time.
Ability to create multiple separate security domains
within a single physical device (e.g. Firewall). Allows
multiple virtual firewall instances within a single device
© Destination Certification Inc.
171
Micro-segmentation
Enhances security by minimizing the lateral movement of attackers
within a network, effectively creating a segmented, compartmentalized
architecture where each segment can have its own security policies and
controls down to the workload level
IDS / IPS
Deployed strategically within the network to monitor
and protect individual workloads or network segments
rather than just at the perimeter
Zero Trust
Each micro-segment is treated as its own secure zone.
Access to each zone is given only after the identity and
context of the request have been thoroughly verified
Network Segmentation
Bastion Host
172
© Destination Certification Inc.
Network Segment / Subdomain Isolation
Proxy
Video #76
NAT & PAT
Private Addresses
RFC 1918 lists three segments of private addresses that are not to be
used on the Internet, so they can be used safely behind a NAT
environment:
• 10.0.0.0 - 10.255.255.255
• 172.16.0.0 - 172.31.255.255
• 192.168.0.0 - 192.168.255.255
© Destination Certification Inc.
173
Video #17
What is a firewall?
A firewall is a concept. It could be as simple as a router.
Firewall Technologies
•
Packet
filtering
firewalls
•
•
•
Stateful
Packet
Filtering
Firewall
Circuit-Level
Proxy
Firewalls
ApplicationLevel Proxy
Firewalls
Packet
Filtering
174
•
•
•
•
•
•
•
•
A method or device for limiting network traffic
between two networks by enforcing security
rules.
Examines packet headers to either block or pass
packets.
Uses Access Control Lists (ACLs) that allow it to
accept or deny access.
Transmitted data packets or frames are captured
and analyzed at all communication layers
State and context data are stored and updated
dynamically
Provides information for tracking connectionless
protocols; e.g., Remote Procedure Call (RPC) and
UDP-based applications
Create a circuit between client and server
without requiring knowledge about the service
Have no application specific controls
An example is a SOCKS server
Perform the highest level of security because it
allows the greatest level of control
A different proxy is needed for each service
Can be a performance bottleneck
Stateful Packet
Filtering
Circuit
Proxy
Application
Proxy
© Destination Certification Inc.
Standard Firewall Architectures
© Destination Certification Inc.
Video #115
175
176
© Destination Certification Inc.
Data inspection
Monitoring & examining transmitted data and taking appropriate action
if not allowed by security rules
Video #5
Data Inspection Applications
Virus
scanning
Files are scanned against known signatures for
malware
Stateful
inspection
Dynamic State / context table is maintained to track
and analyze communications between systems
Content
inspection
Content of mobile code is scanned and inspected for
compliance with specific security rules
IDS & IPS
Network based vs. Host based
Video #31
© Destination Certification Inc.
177
IDS/IPS Network Architecture
Mirror / Span / Promiscuous Port
Specific port set on a network device (e.g. switch) to which all traffic
transiting that device will be replicated for monitoring purposes
178
© Destination Certification Inc.
IDS/IPS Detection Methods
Video #127
Ingress & egress monitoring
Whitelisting & Blacklisting
© Destination Certification Inc.
179
Video #48
Sandbox
False Positives & False Negatives
True
False
Positive
Negative
Honeypots / Honeynets
Enticement & Entrapment
180
© Destination Certification Inc.
4.3
Implement secure communication channels according to design
Remote Access
Connecting to corporate resources over an insecure network (Internet)
Video #32
Tunneling
Generic Routing Encapsulation (GRE)
Video #213
Split tunneling
Connection to internet
Encrypted Tunnel
Internet
User
Hotel
Network
User
Hotel
Network
Corporate
Network
Encrypted Tunnel
Internet
Corporate
Network
Connection to internet
© Destination Certification Inc.
181
Virtual Private Network (VPN)
Tunnelling & VPN Protocols
Protocol
Tunnel
Encrypt
OSI
Secure Shell
Socket Secure
Secure Sockets Layer
Transport Layer
Security
Internet Protocol
security
Generic Routing
Encapsulation
Layer 2 Tunneling
Protocol
Layer 2 Forwarding
Protocol
Point-to-Point
Tunneling Protocol
Video #116
IPSec
Security Association (SA)
SA is a simplex establishment of attributes at the start of communication
between entities
Attributes include:
• authentication algorithm
• encryption algorithm
• encryption keys
• mode (transport or tunnel)
• sequence number
• expiry of the SA
For tunneling + encryption between 2 entities,
4 SAs are required
182
© Destination Certification Inc.
IPSec modes
OR
+
Tunnel mode Transport mode
OR
Authentication Header (AH)
Encapsulating Security Payload (ESP)
Transport mode
Original Authentication
Header
Header
Transport mode
Original
Header
Data
ESP
Header
Data
ESP
Trailer
Encrypted
Tunnel mode
Tunnel mode
New
Header
Authentication Original
Header
Header
Data
New
Header
ESP
Header
Original
Header
Data
Encrypted
Internet Key Exchange (IKE)
© Destination Certification Inc.
183
ESP
Trailer
Video #63
SSL
Unencrypted SSL
Remote Authentication
Remote Access / Management Services
• SNMP
• RCP
• RSH
• Telnet
• rlogin
• X11
184
© Destination Certification Inc.
Domain 5
Identity and Access Management
(IAM)
5.1
Control physical and logical access to assets
Access control
Collection of mechanisms that work together to protect the assets of an
organization and at the same time, allow controlled access to authorized
subjects
Access controls enable management to:
• Specify which users can access the system
• Specify what resources they can access
• Specify what operations they can perform
• Provide individual accountability
Access control principles
Access control applicability
Access control includes all aspects and levels of an organization, in other
words assets including:
• Facilities
• Systems / Devices
• Information
• Personnel
Access control system
© Destination Certification Inc.
187
Video #22
Logical access modes
Access control is more granular than just allowing subject to access
objects
Administration approaches
188
© Destination Certification Inc.
5.2
Design identification and authentication strategy (e.g., people, devices, and services)
Video #109
Access control services
Video #277
Identification
• Uniquely asserts user/process identity
• Traces activities to individuals
User identification guidelines
Authentication types (factors)
Video #81
© Destination Certification Inc.
189
Authentication by Knowledge
Video #278
Password vault
Application designed to store and manage credentials
Typically, credentials are kept in an encrypted database and protected
by a master password
Authentication by Ownership
One-time Passwords
Dynamic: Changed after every use or at set interval
190
© Destination Certification Inc.
Smart / Memory cards
Form of Authentication by Ownership
Card holds user authentication information
Smart Card
Credit card sized plastic card
Embedded semiconductor chip that accepts, stores, and sends
information
Works in collaboration with a reader
Authentication by characteristics (biometric types)
Video #11
Biometric device considerations
• Processing Speed
• User Acceptance
• Protection of Biometric Data
Biometric device accuracy / Types of errors
Cross Over Error Rate (CER)
© Destination Certification Inc.
191
Biometric Devices
Video #184
Templates
1: N
1: 1
192
© Destination Certification Inc.
Factors of authentication
Single-factor authentication
Video #38
Multi-factor authentication
Password-less authentication
Method of verifying a user’s identity without requiring them to enter a
password
Relies on alternative forms of verification, such as biometrics, security
tokens, or a mobile device
Video #279
Advantages of password-less authentication
Challenges of password-less authentication
Single sign-on
Video #70
Pros
•
•
•
•
User experience
User’s may create stronger
passwords
Timeout & attempt
thresholds enforced
Centralized administration
Cons
•
•
© Destination Certification Inc.
Single point of failure for
compromise & availability
Inclusion of unique / legacy
systems
193
Kerberos
Provides:
• Accounting
• Authentication
• Auditing
Typical Kerberos issues
SESAME
The Secure European System for Applications in a Multi-Vendor
Environment (SESAME)
194
© Destination Certification Inc.
Authenticator Assurance Levels (AAL)
Measure the robustness of the authentication process
• Some assurance
• Single-factor authentication
• Secure Authentication protocol
• High confidence
• Multi-factor authentication
• Secure Authentication protocol
• Approved cryptographic techniques
• Very high confidence
• Multi-factor authentication
• Secure Authentication protocol
• “Hard” cryptographic authenticator providing proof of
possession of key & impersonation resistance
Session management
Video #55
Session hijacking
How do you prevent session hijacking?
Session termination
Registration and proofing of identity
© Destination Certification Inc.
Video #193
195
Video #93
Federated Identity Management (FIM)
Federated access standards
Authentication
Authorization
SAML
196
© Destination Certification Inc.
SAML components
Just-in-Time (JIT) Access
Access is granted only when needed, and for a set period of time, often
using automated methods that do not impeded productivity
Video #209
What is the Principle of Access Control?
Video #156
Accountability
If users have been
Appropriately
Appropriately
And their actions are
Then you can have
© Destination Certification Inc.
197
5.3
Federated identity with a third-party service
Video #167
Cloud-based authentication or identity management
Types of identities / accounts
Account Stored
Authentication by
IdaaS Capabilities
198
© Destination Certification Inc.
5.4
Implement and manage authorization mechanisms
Video #119
1. Discretionary Access Control (DAC)
Role-based Access
Control (RBAC)
Rule-based access
control
© Destination Certification Inc.
Attribute Based Access
Control (ABAC)
199
Role-Based Access Control (RBAC)
Video #175
Types of RBAC
Groups and Roles
Administrators can assign
When a user is assigned a role,
permissions to the group instead of
they are granted the permissions
individual users, making it easier to
associated with that role
manage large numbers of users
Function-centric, focusing on the
job function and the actions that
need to be performed
User-centric, focusing on the
collective identity of users
Rule-based access control
200
© Destination Certification Inc.
Attribute / Context based access control
Video #236
eXtensible Access Control Markup Language (XACML)
Standard which defines attribute-based access control policy language,
architecture, and processing model
2. Mandatory Access Control (MAC)
3. Non-Discretionary Access Control
© Destination Certification Inc.
201
Video #194
Access control summary
Discretionary
Access Control
(DAC)
Role-based
Access Control
(RBAC)
Rule-based
Access Control
Attribute
Based Access
Controls
(ABAC)
Mandatory
Access Control
(MAC)
Video #281
Access policy enforcement
Enforcing access control policies within an organization to regulate and
manage user access
Two key components: PDP & PEP
Policy
Decision
Point
(PDP)
Policy
Enforcement
Point
(PEP)
202
© Destination Certification Inc.
5.5
Manage the identity and access provisioning lifecycle
Video #23
Provisioning lifecycle
User access review
How often should access reviews be performed?
Which type of accounts should be reviewed most often?
Video #282
Service accounts
Accounts used by applications, services, or systems to interact with
other resources, services, or databases without human intervention
Service accounts management
Focus on ensuring accounts are secured, reducing the risk of
unauthorized access or misuse
© Destination Certification Inc.
203
5.6
Implement authentication systems
Security must be involved in assessing and implementation of
authentication systems (e.g. SAML, OpenID, OAuth, Kerberos, RADIUS,
TACACs+, etc
204
© Destination Certification Inc.
Domain 6
Security Assessment and Testing
6.1
Design and validate assessment, test, and audit strategies
Video #157
Purpose of Security Assessment and Testing?
Ensure that security requirements / controls are defined, tested, and
operating effectively
Security assessment & testing covers both the development of new
apps/systems and the ongoing operation
Validation & verification
Validation
Are we building the right product?
Develop a Level of confidence that software satisfies all stakeholder
requirements as documented
Verification
Are we building the product right?
Completeness: Use cases cover all functionality
Correctness: Each use case accurately represents a requirement
Consistency: Functionality is specified consistently in all areas
Effort to invest in testing?
Testing Strategies
All three strategies can be used in combination based on the type / level
of assurance sought
© Destination Certification Inc.
207
Role of Security Professional
Our role as Security Professionals is to identify risk and advise testing
processes to ensure risks are appropriately evaluated
Video #157
Location
Focuses on evaluating the security measures and
infrastructure within an organization's physical data
centers and facilities
Focuses on assessing the security of data and
applications hosted in cloud service providers
Assess the connectivity and security measures in place
between on-premise and cloud resources
(Access management integration, data flow security
controls, etc.)
208
© Destination Certification Inc.
6.2
Conduct security control testing
Examples of testing performed
Plan
Design
Video #168
Develop
Deploy
• Requirements • System design • Vulnerability
gathering &
• Architecture
• Acceptance
analysis
design
• System
• Module design • Integration
• Unit
• Vulnerability
• Log analysis
• Performance
• Usability
Operate
Retire
• Vulnerability • Integrity of
• Log analysis
transfer
• Config.
• Defensible
management
destruction of
data
When should security become involved in testing?
Software Testing Stages
© Destination Certification Inc.
209
Testing Techniques
Methods / Tools
Runtime
Access to Code
210
© Destination Certification Inc.
Types of fuzzing
Video #187
Application security testing
Static
Application
Security
Testing (SAST)
Testing method that analyzes source code
Dynamic
Application
Security
Testing (DAST)
Examines an application while it's running
© Destination Certification Inc.
211
Test types
Equivalence partitioning & boundary value analysis
0
212
1
2
3
4
5
6
7
8
9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
© Destination Certification Inc.
More test types
Testing examples
Enter a number between 0 and 9
aaa' OR 1=1 -Enter a number between 0 and 9
E
Enter a number between 0 and 9
2
Enter a number between 0 and 9
-1
0
9
10
Enter a number between 0 and 9
-5
5
15
Decision table & state-based analysis
© Destination Certification Inc.
Video #217
213
Test coverage analysis
Video #169
Vulnerability analysis
Purpose of vulnerability assessment
Vulnerability Assessment vs. Penetration Test
214
© Destination Certification Inc.
Typical Process
Red, Blue and Purple Teams
© Destination Certification Inc.
Video #285
215
Video #158
Testing Techniques
Perspective
Approach
Knowledge
216
© Destination Certification Inc.
Automated vulnerability scanners
Scan networks, computers & applications for known vulnerabilities
Additional testing techniques
Automated Vulnerability scanners
Manual tools & techniques
Network devices
Systems: OS & Applications
Physical Security
Social Engineering
Banner grabbing & Fingerprinting
Using active or passive techniques to identify a system’s specific
operating system, applications & versions
Interpreting & understanding results
False positives & false negatives
© Destination Certification Inc.
217
Video #286
Security Content Automation Protocol (SCAP)
•
•
•
•
•
•
•
•
Asset Reporting Format (ARF)
Common Configuration Enumeration (CCE)
Common Platform Enumeration (CPE)
Open Vulnerability and Assessment Language (OVAL)
Open Checklist Interactive Language (OCIL)
Trust Model for Security Automation Data (TMSAD)
The Extensible Configuration Checklist Description Format
(XCCDF)
Software Identification (SWID)
Breach attack simulation
Continuous, automated penetration testing and remediation
SCAP vs. Breach Attach Simulation
Suite of standards for automating
the process of assessing the
security of systems and
monitoring the security posture
of network devices and systems
BAS tools mimic the actions of
attackers to test the defenses of
the network continuously and
automatically.
Combines multiple open
Main goal is to provide real-world
standards to enumerate software
scenarios to test how well a
flaws and configurations, identify network can withstand attacks and
systems, assess the severity of
to help organizations improve their
security vulnerabilities, and
security measures based on the
measure the impact of
results
vulnerabilities
Compliance checks
Review and analyze controls to make sure they meet security
requirements
218
© Destination Certification Inc.
Log reviews / analysis
Video #170
Logging overview
• Generation
• Transmission
• Collection
• Normalization
• Analysis
• Retention
• Disposal
Log data generation
© Destination Certification Inc.
219
Limiting log sizes
Log event time
Operational Testing - Synthetic Transactions & RUM
Video #56
Regression testing
Reporting testing results
• Objective Pass / Fail Decisions
• Right detail for the right audience
• Metrics that matter
220
© Destination Certification Inc.
6.3
Collect security process data (e.g., technical and administrative)
Video #159
SMART Metrics
•
•
•
•
•
Specific - Result clearly stated and easy to understand?
Measurable - Result can be measured / have the data?
Actionable - Results can drive desired outcomes?
Relevant - Aligned to business strategy?
Timely - Results available when needed?
Key performance and risk indicators
•
•
Metrics that indicate the
achievement of
performance targets
Provide insights about risk
events that have already
affected the organization
•
•
Metrics that indicate the
level of exposure to
operational risk
Help to better monitor
potential future shifts in
risk conditions or new
emerging risks
How do you decide what to focus metrics on?
Example areas for metrics
• Account management
• Management review and approval
• Backup verification
• Training and awareness
• Disaster Recovery (DR) and Business Continuity (BC)
© Destination Certification Inc.
221
6.4
Analyze test output and generate report
Video #210
Error handling
Handling exceptions in automated testing & ensuring the test execution
flow is not interrupted
Remediation
• Address output of testing and assessments.
• Security will support and advise.
• Ultimate accountability rests with owners and management
Ethical disclosure
Testing should involve all relevant stakeholders and every finding of
testing should be released and disclosed to all interested parties
(even if it will delay implementation / increase costs)
222
© Destination Certification Inc.
6.5
Conduct or facilitate security audits
Audit & Assessment
Video #24
Audit approaches
Internal
External
Third-party
SAS70 > SSAE16 > SSAE18
ISAE 3402 / SSAE18 Third-party Audit reports
© Destination Certification Inc.
223
Audit Roles & Responsibilities
224
© Destination Certification Inc.
Domain 7
Security Operations
7.1
Understand and comply with investigations
Securing the scene
Need to conduct reliable investigations that will stand up to scrutiny and
cross-examination
Forensic Investigation Process
Identify
the scene
Protect
Identify
evidence
Collect
Minimize
Evidence collection and handling
Sources of information / evidence
Locard’s Exchange Principle
When a crime is committed, the perpetrators will
MOM
© Destination Certification Inc.
227
Video #135
Video #216
Types of evidence
Circumstantial Suggests a fact by implication or inference
Evidence
Can prove an intermediate fact
Corroborative
Evidence
Supports facts or elements of the case, not a fact on
its own, but supports other facts
Hearsay
Evidence
Statements made by witnesses who were not present.
No firsthand proof of accuracy or reliability.
228
© Destination Certification Inc.
Digital / Computer forensics
Scientific examination & analysis of data from storage media in such a
way that the information can be used as evidence in a court of law
Live evidence
Examining a live system changes the state of the evidence
Forensic Copies
Investigative Techniques
Why is it harder to do forensic analysis of mobile devices?
Chain of Custody
© Destination Certification Inc.
229
Video #160
Five Rules of Evidence
Digital forensics tools, tactics, and procedures
Running computers require immediate decisions
Tools:
•
•
•
•
•
Malware analysis
Log analysis
Social media account analysis
Traces
Mobile device analysis
Reporting and documentation
Prepare to present evidence to relevant stakeholders:
• Opposition
• Judge / Jury
• Regulators
• Investors
• Insurers
230
© Destination Certification Inc.
Types of investigations
© Destination Certification Inc.
Video #171
231
7.2
Conduct logging and monitoring activities
Video #147
Logging & monitoring
Security Information and Event Management (SIEM)
SIEM Capabilities
Example sources of event data
• Security appliances
• Network devices
• DLP
• Data activity
• Applications
• Operating systems
• Servers
• IPS/IDS
232
© Destination Certification Inc.
Continuous monitoring
© Destination Certification Inc.
233
7.3
Perform Configuration Management (CM)
Video #161
Asset Inventory
Asset Management
Configuration management
• Identify assets to keep under control
• Configure assets
• Document configuration
• Verify configuration
234
© Destination Certification Inc.
7.4
Apply foundational security operations concepts
Need to know / Least Privileges
Video #162
Need-to-know
Least Privileges
Restricting a user’s KNOWLEDGE
(access to data) to only the data
required for them to perform their
role
Restricting a user’s ACTIONS to
only those required for them to
perform their role
Separation of duties and responsibilities
Privileged account management
Job rotation
Service Level Agreements (SLA)
© Destination Certification Inc.
235
7.5
Apply resource protection
Video #136
Protecting media
Media
•
•
•
•
•
Paper
Microforms (microfilm & microfiche)
Magnetic (HD, disks & tapes)
Flash memory (SSD & memory cards)
Optical (CD & DVD)
Media management
• Confidentiality
• Access speeds
• Portability
• Durability
• Media format
• Data format
Hardware and software asset management
• Asset management lifecycle
• Inventories
• Patching
• Software licensing
• Secure configuration
236
© Destination Certification Inc.
7.6
Conduct incident management
Incident Management
Video #148
Goals of Incident Response
• Provide an effective & efficient response to reduce impact to the
organization
• Maintain or restore business continuity
• Defend against future attacks
Events and Incidents
Detection examples
• IPS/IDS
• DLP
• Anti-malware
• SIEM
• Administrative Review
• Motion Sensor
• Camera
• Guard
Examples of incidents
• Malware
• Hacker attack
• Terrorist attack
• Insider attack
• Employee error
• System error
• Data corruption
• Workplace injury
© Destination Certification Inc.
237
Incident Response
238
© Destination Certification Inc.
7.7
Operate and maintain detective and preventative measures
Video #12
Malware
Types of malware
© Destination Certification Inc.
239
Zero Day
Video #39
Anti-malware
Updating
Video #206
Machine Learning (ML) and Artificial Intelligence (AI) based tools
• Empower systems to use data to learn and improve without
being explicitly programmed
• Used mathematical models to analyze patterns which are then
used to make predictions
ML / AI security application
• Threat detection and classification
• Network risk scoring
• Automate routine security tasks and optimize human analysis
• Respond to cyber crime:
o Unauthorized access
o Evasive malware
o Spear phishing
240
© Destination Certification Inc.
7.8
Implement and support patch and vulnerability management
Patch management
Proactive process to create a consistently configured environment that is
secure against known vulnerabilities
Determining patch levels
Deploying patches
© Destination Certification Inc.
241
Video #163
7.9
Understand and participate in change management processes
Video #57
Change management
Ensures that costs & benefits of changes are analyzed and changes are
made in a controlled manner to reduce risks
Change Management Process
Change
request
Assess impact
Approval
Build & test
Notification
Implement
Validation
Version &
baseline
242
© Destination Certification Inc.
7.10 Implement recovery strategies
Failure modes
Video #189
Backup storage strategies
Video #83
Archive bit
Incremental vs. Differential
© Destination Certification Inc.
243
Backup strategy summary
Type
244
Data backed up
Backup
time
Restore
time
© Destination Certification Inc.
Storage
Backup storage strategies
Determine how and where data is stored for recovery in case of data
loss, corruption, or disaster
Video #310
3 – 2 – 1 Rule
• 3 copies of critical files
• 2 backups on different media
• 1 backup stored offsite
Spare parts
Video #322
© Destination Certification Inc.
245
Video #287
RAID
RAID 0 – Striping
Raid controller
Disk 0
Disk 1
RAID 1 – Mirroring
Raid controller
Disk 0
Disk 1
RAID 10 – Mirroring & Striping
RAID 5 – Parity Protection
Raid controller
Disk 0
246
Disk 1
Disk 2
© Destination Certification Inc.
RAID 6 – Double Parity Protection
RAID summary
RAID
Data
Redundancy
Read / Write
Performance
Min. #
of Drives
Cyclic Redundancy Check (CRC)
Clustering vs Redundancy
© Destination Certification Inc.
Video #287
247
Video #288
Recovery Site Strategies
Cold
Warm
Hot
Mobile
Redundant
People
Data
Multiple Processing Sites
Computer
Hardware
Basic
Equipment
Infrastructure
/ HVAC
Cost
Recovery
Geographically remote / geographic disparity
Multiple Processing Sites
248
© Destination Certification Inc.
Internal vs. External Recovery Sites
Reciprocal Agreements
Resource Capacity Agreements
Pre-arranged agreements with vendors to secure the necessary
resources needed after a disruptive event
Ensure an organization has access to resources at a recovery site
Disaster Recovery Solutions Summary
System resilience, high availability, Quality of Service (QoS), and fault
tolerance
•
•
•
•
•
Clustering
Redundancy
Replication
Spare parts
RAID
© Destination Certification Inc.
249
7.11 Implement Disaster Recovery (DR) processes
Video #34
A disaster is:
Focus of business continuity
BCM, BCP & DRP
BCM
BCP
DRP
Business Continuity Management
Business Impact Analysis
RTO
Business Continuity Planning
WRT
MTD
Test & Maintain
BIA
RPO
Disaster Recovery Planning
Video #323
BCP vs DRP
250
© Destination Certification Inc.
BCP / DRP Steps
1
A formal policy provides the authority and
guidance necessary to develop an effective
contingency plan
2
BIA helps identify and prioritize information
systems and components critical to supporting
the organization’s mission/business processes
3
Measures taken to reduce the effects of system
disruptions can increase system availability and
reduce contingency life cycle costs
4
Thorough recovery strategies ensure that the
system may be recovered quickly and effectively
following a disruption
5
Develop contingency plan(s)
6
Testing validates recovery capabilities
Training prepares recovery personnel for plan
activation
Exercising the plan identifies planning gaps
7
Plan should be a living document that is updated
regularly
Business Impact Analysis (BIA)
The BIA is a functional analysis that identifies the impacts should an
outage occur. Impact is measured by the following:
• Organizational Reputation
• Allowable Business Interruption – the Maximum Tolerable
Downtime
• Financial and Operational Considerations
• Regulatory Requirements
•
Video #50
Three primary goals of BIA
1.
2.
3.
© Destination Certification Inc.
251
The BIA Process
MTD, RTO, RPO, WRT
RPO
RTO
WRT
MTD
Values determined through the BIA (Business Impact Assessment)
process
252
Years < Months < Weeks
< Days < Hours < Minutes
Minutes > Hours > Days
> Weeks > Months > Years
RPO
RTO
© Destination Certification Inc.
External Dependencies
Video #292
Video #293
Declaring a Disaster
Response
Personnel
Communications
Restoration Order
How is the order determined for restoring systems?
© Destination Certification Inc.
253
Dependency charts
What systems / operations should be moved FIRST to DR site?
Once primary site is fixed, what systems / operations should be moved
back FIRST?
254
© Destination Certification Inc.
7.12 Test Disaster Recovery Plans (DRP)
Type
Description
Affects backup
/ parallel
systems
Video #58
Affects
production
systems
When should a full-interruption test be performed?
© Destination Certification Inc.
255
7.13 Participate in Business Continuity (BC) planning and exercises
Video #41
Goals of BCM
1.
2.
3.
Focus of BCM
256
© Destination Certification Inc.
7.14 Implement and manage physical security
We covered Physical Security in Domain 3
© Destination Certification Inc.
257
7.15 Address personnel safety and security concerns
Video #296
Personnel safety and security
258
© Destination Certification Inc.
Domain 8
Software Development Security
8.1
Understand and integrate security in the Software Development Life Cycle (SDLC)
Security’s involvement in development
Video #214
SDLC & SLC
© Destination Certification Inc.
261
Development & maintenance lifecycle
Requirements
Analysis
Functional
Design
Detailed
Design
Development /
Construction
Testing
Deployment /
Production
Maintenance
Define
Design
Develop
Deliver
Development methodologies
Waterfall vs. Agile
262
© Destination Certification Inc.
Agile Scrum Master
• Shields team from external interference
• Enforces scrum principles
• Facilitator & removes barriers
• Enables close cooperation
• Improves productivity
Integrated Product Team
Video #312
DevOps Security
Many traditional security techniques are too slow for rapid iteration of
DevOps: Pen tests, WAFs, analysis
Integrating security into DevOps:
• Plan for security
• Strong engagement between developers and security
• Engage developers
• Develop using secure techniques and frameworks
• Automate security testing
• Use traditional techniques sparingly
© Destination Certification Inc.
263
Combining Development Methodologies
Development methodologies summary
Waterfall
Linear approach - each phase must be completed fully
before the next begins. Can be inflexible
Agile
Focuses on iterative development and frequent
feedback loops - collaboration between small selforganizing, cross-functional teams
DevOps
Combines software development (Dev) and IT
operations (Ops) aiming to shorten the systems
development life cycle and provide continuous
delivery
SecDevOps
Extends the DevOps approach by integrating security
practices
Video #191
Canary Deployment / Testing
Video #297
Maturity models
Capability Maturity Model Integration (CMMI)
Video #313
Operation and maintenance
264
© Destination Certification Inc.
Change management (review)
Request for Changes
Service
Request
Incident
Management
SLA
Change Management
Requests
Security
Impact
Assessment
Approval
Build & Test
Notify
Configuration
Management
© Destination Certification Inc.
Implement
Validate
Version &
Baseline
Release
Management
265
8.2
Identify and apply security controls in development environments
Video #215
Programing Language Generations
Generation
Lowlevel
languag
es
Highlevel
languag
es
Type of language
Examples
1
Machine languages
Strings of numbers that CPU
can process
2
Assembly languages
Cryptic
3
Structured
languages
Pascal, C, Cobol, Fortran
4
Object oriented
languages
C++, Visual Basic
5
Natural language
Prolog
Integrated Development Environment (IDE)
Application that provides comprehensive facilities for
software development
• Code editor
• Compiler
• Debugger
• Automation of tasks
Programming Language Translators
Reads entire program
and then converts
low-level assembly
language into
machine language
Reads entire
program and then
converts high-level
language into
machine language
Converts high-level
language one line
at a time into
machine language
at runtime
Continuous Integration, Delivery & Deployment
266
© Destination Certification Inc.
SOAR (Security Orchestration, Automation, and Response)
Collection of software solutions and tools that streamline and automate
security operations in three key areas:
• threat and vulnerability management
• incident response
• security operations automation
Software Configuration Management (SCM)
• Process to systematically manage, organize, and control the
changes in the documents, codes, etc. during the SDLC
• Should be part of overall configuration management / change
management
• Goal is to increase productivity while minimizing mistakes
Secure Programming
Video #237
Polyinstantiation
Can be used to prevent unauthorized inference
Allows the same data to exist at different classification levels
© Destination Certification Inc.
267
Software / code obfuscation
Intentionally creating source code that is difficult for humans to
understand.
Makes it difficult to reverse engineer
Conceal the purpose of the code
Security of the Software Environments
268
© Destination Certification Inc.
Databases
Video #6
Components of DBMS
Database Management Systems (DBMS)
Relational Database
Databases: Attributes & Tuples
© Destination Certification Inc.
269
Databases: Primary & Foreign Keys
Database Terms
Tuple
Attribute
Field
Primary Key
Foreign Key
270
© Destination Certification Inc.
Concurrency & Locks
Locks & Concurrency Controls
A
C
I
D
Metadata
Video #197
© Destination Certification Inc.
271
8.3
Assess the effectiveness of software security
Video #49
Assess the Effectiveness of Software Security
• Risk analysis and mitigation
• Auditing and logging of changes
• Logging & monitoring
• Internal & external audit
• Procurement process
• Certification & accreditation
• Testing & verification
• Code signing
272
© Destination Certification Inc.
8.4
Assess security impact of acquired software
Video #33
Acquiring Software
Software Assurance Phases for Acquisition
• Planning / requirements
• Contracting
• Acceptance
• Monitoring & follow-on
Involve security function is assessing:
• Commercial off the shelf (COTS)
• Open Source
• Third-party
• Managed Services (e.g. SaaS)
© Destination Certification Inc.
Video #314
273
8.5
Define and apply secure coding guidelines and standards
Video #77
Security Weaknesses and Vulnerabilities at the Source-Code Level
Covert
channels
Buffer
overflows
Memory /
object reuse
Executable
mobile code
TOCTOU
Backdoors /
trapdoors
Malformed
input
Citizen
developers
274
© Destination Certification Inc.
Buffer Overflow
Buffer Overflow Prevention
• Parameter / bounds checking
• Address Space Layout Randomization (ASLR)
• Improve software development process
• Run-time checking of array & buffer bounds
• Use safe programming languages & library functions
© Destination Certification Inc.
275
APIs
Application Programming Interfaces (APIs)
Used to interact with web-based applications
Security of Application Programming Interfaces
• Authentication & authorization (access tokens / OAuth)
• Encryption (TLS)
• Data validation
• API gateways
• Quotas & throttling
• Testing & validation
Secure coding practices
• Input validation
• Authentication & password management
• Session management
• Cryptographic practices
• Error handling & logging
• System configuration
• File / database security
• Memory management
276
© Destination Certification Inc.
Exam Strategy
Download