Wilson Mar bio photo

Wilson Mar

Hello!

Email me Calendar Skype call

LinkedIn Twitter Gitter Instagram Youtube

Github Stackoverflow Pinterest

Enterprise data risks and vulnerabilities and how to mitigate them with controls

US (English)   Español (Spanish)   Français (French)   Deutsch (German)   Italiano   Português   Cyrillic Russian   中文 (简体) Chinese (Simplified)   日本語 Japanese   한국어 Korean

Overview

Here are my notes on resources for Cyber Security, which is a vast field. But nevertheless all the info is on this single page to make for easy searching.

“Security is always excessive until it’s not enough.” – Robbie Sinclair


Security Engineer

Here are “Essential Job Functions” based on various job descriptions:

  • Apply established and ad hoc processes and techniques to identify, validate, prioritize, and track security risks.
  • Identify uncontrolled risks and recommend control improvements.
  • Proactively identify security requirement deficiencies.
  • Engage business and technology personnel to elicit security requirements.
  • Architect and design security control systems to address requirements.
  • Operate and monitor established security controls.
  • Identify control deficiencies and make appropriate recommendations.
  • Ensure that controls are operating effectively; resolve operating discrepancies.
  • Review, triage, and prioritize control output.
  • Take appropriate action to resolve security discrepancies.
  • Identify, evaluate, and recommend new security technologies, techniques, and tools.
  • Define, review, and promote information security policies, standards, guidelines, and procedures.

  • As compliance subject matter expert, enforce and monitor compliance with internal and external regulations, policies, and standards.
  • Establish and promote strategies to ensure that compliance is effectively monitored and enforced.
  • Lead/Co-lead internal process improvement initiatives. Provide feedback on processes by offering suggestions.

  • Mentor and supervise junior staff in project-level tasks.
  • Assist with adherence to technology policies and comply with all security controls.

Education/Experience Requirements:

  • Experience must include direct experience in several of the key areas listed: securing networks and systems architecture, design and implementation, secure software assurance, intrusion detection, defense and incident response, security configuration management, access controls design and implementation and security policy and standards development.
  • In-depth knowledge of communications protocols (HTTP/HTTPS, SSL/TLS, OAuth, JWT, SAML).
  • Experience with Cyber Security tools, including: Configuration Assessment, Log Aggregation, Integrity Verification, Web Application Security Testing, Network Access Control System, Network Intrusion prevention systems, and Endpoint Security Solutions.

  • Strong written and verbal technical communication skills.
  • Demonstrated ability to develop effective working relationships that improved the quality of work products.
  • Should be well organized, thorough, and able to handle competing priorities.
  • Ability to maintain focus and develop proficiency in new skills rapidly.
  • Ability to work in a fast paced environment.
  • In-depth knowledge of more than one Information Security principle and discipline.

Glossary

My Quizlet of Cyber Security Aconyms

  • Policies - general statements from management
  • Standards - specific mandatory security controls
  • Procedures - step-by-step instructions
  • Guidelines - recommended actions to follow

Definitions: REMEMBER:

  • A threat is a potential harmful incident.
  • A threat agent (a malicious actor) is an individual or group that can manifest a threat.
  • A threat event is a specific instance of a threat

  • A vulnerability is a (potentially expliotable) weakness where there is absence of a countermeasure in place.
  • An exposure is an instance of being subjected or exposed to losses from a threat.
  • A trigger is an event that indicates that a risk has occurred or is about to occur.
  • Enticements are apparent flaws deliberately made available for penetration and exploitation.

  • Attacks are attempts to violate an organization’s security or privacy
  • An exploit is when a threat agent successfully takes advantage of a vulnerability
  • A breach is an attack that has been successful in reaching its goal.
  • Impact is the magnitude of harm caused by a threat source

  • Likelihood (of occurence) is a weighted factor that a given threat agent is capable of exploiting a given vulnerability
  • Level of risk before treatment is the inherent risk

Quantitative risk analysis:

REMEMBER:VIDEO:

Asset Value (AV) x Exposure Factor (EF) = Single Loss Expectancy (SLE).

Annualized Rate of Occurrence (ARO) X Single Loss Expectancy (SLE) = Annual Loss Expectancy (ALE).

Cost/benefit of implementing a particular safeguard, where
ALE is the annual loss expectancy = (ALE before safeguard) – (ALE after safeguard) – (annual cost of safeguard)

Residual risk = total risk – countermeasures.

CIA triad tenents: +IAAA

  • Confidentiality vs. Disclosure (IPSec encryption in transit, social engineering)
  • Integrity vs. Alteration (shared among authorized persons or organizations)
  • Availability vs. Destruction (RAID-5, DDoS)

  • Accountability (auditing)

Privacy Threshold Assesssment is used to identify PI and determine how to treat the data.

OCTAVE (Operationally Critical Threat, Asset, and Vulnerability Evaluation) developed at Carnegie Mellon SEI.

Cloud Security Posture Management (CSPM) monitors continuously identifies and remediaties cloud infrastructure risks in each cloud service using application programming interfaces (APIs) configuration data against compliance benchmarks. For example, they can ensure logs are being gathered from host operating systems and the network (NetFlow), and that API event logging is turned on.

The newer acronym CIEM (Cloud Infrastructure Entitlements Management) was coined by ermetic.com for their product which ensures that identities (both human and machine) do not have excessive permissions that can be exploited by threat actors or malicious insiders.

Jericho Commandments

https://collaboration.opengroup.org/jericho/commandments_v1.2.pdf define the 11 areas and principles that must be observed when planning for a de-perimeterized future in cloud environments.

Vendor Compliance

aws.Amazon.com/Compliance /Programs covers security requirements in Canada, Asia Pacific, and Europe. aws-compliance

Type I compliance.

Microsoft Cybersecurity Reference Architecture

VIDEO Distilling Infographic in PowerPoint: Microsoft Azure Cybersecurity Reference Architecture

Adobe Common Control Framework

Adobe open-sourced its own Common Control Framework which encompasses several security frameworks. Adobe’s CCF covers ISO 27001/27002, SOC, FedRAMP, PCI DSS, GLBA, FERPA, and others. Download the pdf. Adobe’s control families is most comprehensive:

  1. Asset management
  2. Business Continuity
  3. Backup Management
  4. Configuration Management
  5. Change Management
  6. Data Management
  7. Identity and Acccess Management
  8. Incident Response
  9. Mobile Device Management
  10. Network Operations
  11. People Resources
  12. Risk Management
  13. System Design Documentation
  14. Security Governance
  15. Service Lifecycle
  16. Systems Monitoring
  17. Site Operations
  18. Training and Awareness
  19. Third Party Management
  20. Vulnerability Management

HITRUST CSF

HITRUST Common Security Framework (CSF) includes, harmonizes, and cross-references existing, globally recognized standards, regulations, and business requirements, including ISO, EU GDPR, NIST, and PCI.


ISO 27002

https://iso27001security.com
ISO Code of practice for information security controls defines 114 controls grouped into 14 categories. REMEMBER:

  • ISO/IEC 27002 Controls (Counter-measures) of ISMS (Information Security Management System) lists:

  • ISO/IEC 27005 addresses risk management
  • ISO/IEC 27007 addresses auditing [as in James Bond]
  • ISO/IEC 27012 addresses controls (counter-measures)
  • ISO/IEC 27033 addresses network security
  • ISO/IEC 27034 addresses application security
  • ISO/IEC 27037 addresses digital evidence guidelines

  • ISO/IEC 27011 addresses telecommunications organization guidelines
  • ISO/IEC 27015 addresses financial organization guidelines
  • ISO/IEC 27799 addresses health organization guidelines

ISO/IEC 15288:2015

Four categories of processes:

  1. Agreement processes, including acquisition and supply
  2. Organizational project-enabling processes, including infrastructure management, quality management, and knowledge management
  3. Technical management processes, including project planning, risk management, configuration management, and quality assurance
  4. Technical processes, including system requirements definition, system analysis, implementation, integration, operation, maintenance, and disposal

Center for Internet Security (CIS)

“The Center for Internet Security (CIS) is a community of users, vendors and subject matter experts working together through consensus collaboration to deliver a framework that provides a starting point for organizations interested in implementing …

  1. CIS creates hardened versions of images running on various clouds:

    https://www.cisecurity.org/benchmark/amazon_web_services/

    https://www.cisecurity.org/blog/cis-hardened-images-now-in-microsoft-azure-marketplace/

  2. Download the CIS Controls poster (CIS-Controls-V7-Poster.pdf) from:

    https://www.cisecurity.org/white-papers/cis-controls-v7-poster

    cybersecurity-CIS-Center-for-Internet-Security-CIS-Controls.png

  3. Download CIS Benchmark pdf files for each product (Amazon Linux, MongoDB, etc.) from:

    https://www.cisecurity.org/cis-benchmarks

    PROTIP: View the “Distribution Independent Linux Benchmark” first because Benchmarks specific to a Linux distribution repeat much of its contents.

  4. Download and review “Measures and Metrics” pdf and excel:

    https://www.cisecurity.org/white-papers/cis-controls-v7-measures-metrics/

CIS Security Benchmarks for Linux

These are common asset items to be protected, as addressed by CIS Benchmarks across several Linux distributions:

  1. Initial setup 1.1. Filesystem Configuration 1.2. Configure Software Updates 1.3. Filesystem Integrity Checking 1.4. Secure Boot Settings 1.5. Additional Processing Hardening 1.6. Mandatory Access Control 1.7. Warning Banners

  2. Services 2.1. inetd Services 2.2. Special Purpose Services 2.3. Service Clients

  3. Network Configuration 3.1. Network Parameters (Host Only) 3.2. Network Parametres (Host and Router) 3.3. IPv6 3.4. TCP Wrappers 3.5. Uncommon Network Protocols 3.6. Firewall Configuration

  4. Logging and Auditing [MINDMAP] 4.1. Configure System Accounting (auditd) 4.2. Configure Logging

  5. Access, Authentication, and Authorization 5.1. Configure cron 5.2. SSH Server Configuration 5.3. Configure PAM 5.4. User Accounts and Environment

  6. System Maintenance 6.1. System File Permissions 6.2. User and Group Settings

Under each sub-item above are specific recommendations with Bash script commands to implement them out and commands to audit whether they have been implemented. That code is incorporated in the “CIS-CAT Lite (CIS Configuration Assessment Tool)” below.

Items in the Benchmark described as (Scored) indicates when compliance with the given recommendation impacts the assessed target’s benchmark score. Failure to comply with “Scored” recommendations will decrease the final benchmark score. Compliance with “Scored” recommendations will increase the final benchmark score. Compliance on “(Unscored)” items make no difference to the total score.

Compliance scores go to 100.

“CIS Controls Measures and Metrics for Version 7” Excel spreadsheet (file CIS-Controls-Version-7-cc.xlsx) contains 170 sub-controls applicable to these 20 controls (“best practices”) described by the CIS Controls Companion Guide:

file CIS-Controls-Version-7-cc.pdf from https://learn.cisecurity.org/20-controls-download

      Basic:

  1. Inventory and Control of Hardware Assets
  2. Inventory and Control of Software Assets
  3. Continuous Vulnerability Management
  4. Controlled Use of Administrative Privileges
  5. Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers
  6. Maintenance, Monitoring and Analysis of Audit Logs

    Foundational:

  7. Email and Web Browser Protections
  8. Malware Defenses
  9. Limitation and Control of Network Ports, Protocols and Services
  10. Data Recovery Capabilities
  11. Secure Configuration for Network Devices, such as Firewalls, Routers and Switches
  12. Boundary Defense
  13. Data Protection
  14. Controlled Access Based on the Need to Know
  15. Wireless Access Control
  16. Account Monitoring and Control

    Organizational:

  17. Implement a Security Awareness and Training Program
  18. Application Software Security
  19. Incident Response and Management
  20. Penetration Tests and Red Team Exercises

The AWS (Amazon Web Services) Well Architected Framework books cover many of the above, but at a rather high-level.

Below is an approach that can be used for Gap Analysis of what needs to be done to protect hardware, software, and data assets.

CIS Sub-Controls alphabetically by Sensor

A. Active Device Discovery System

  • 1.1 Utilize an Active Discovery Tool

B. Anti-Spam Gateway

  • 7.8 Implement DMARC and Enable Receiver-Side Verification
  • 7.9 Block Unnecessary File Types
  • 7.10 Sandbox All Email Attachments

C. Application Aware Firewall

  • 9.5 Implement Application Firewalls

D. Asset Inventory System

  • 1.4 Maintain Detailed Asset Inventory
  • 1.5 Maintain Asset Inventory Information
  • 1.6 Address Unauthorized Assets

E. Backup / Recovery System

  • 10.1 Ensure Regular Automated Back Ups
  • 10.2 Perform Complete System Backups
  • 10.3 Test Data on Backup Media
  • 10.4 Ensure Protection of Backups
  • 10.5 Ensure Backups Have At least One Non-Continuously Addressable Destination

F. Data Inventory / Classification System

  • 13.1 Maintain an Inventory Sensitive Information
  • 13.2 Remove Sensitive Data or Systems Not Regularly Accessed by Organization
  • 14.5 Utilize an Active Discovery Tool to Identify Sensitive Data

G. Dedicated Administration Systems

  • 4.6 Use of Dedicated Machines For All Administrative Tasks
  • 11.6 Use Dedicated Machines For All Network Administrative Tasks
  • 11.7 Manage Network Infrastructure Through a Dedicated Network

H. DNS Domain Filtering System

  • 7.6 Log all URL requests
  • 7.7 Use of DNS Filtering Services
  • 8.7 Enable DNS Query Logging

I. Endpoint Protection System

  • 8.1 Utilize Centrally Managed Anti-malware Software
  • 8.2 Ensure Anti-Malware Software and Signatures are Updated
  • 8.4 Configure Anti-Malware Scanning of Removable Devices
  • 8.6 Centralize Anti-malware Logging
  • 13.7 Manage USB Devices
  • 13.8 Manage System’s External Removable Media’s Read/write Configurations
  • 13.9 Encrypt Data on USB Storage Devices

J. Host Based Data Loss Prevention (DLP) System

  • 14.7 Enforce Access Control to Data through Automated Tools
  • 14.8 Encrypt Sensitive Information at Rest

Egress monitoring occurs when an organization monitors the outbound flow of information from one network to another. The most popular form of egress monitoring is carried out using firewalls that monitor and control outbound traffic. Continuous monitoring and Continuous Monitoring as a Service (CMaaS) are not specific enough to answer this question. Any logging and monitoring activities should be part of an organizational continuous monitoring program. The continuous monitoring program must be designed to meet the needs of the organization and implemented correctly to ensure that the organization’s critical infrastructure is guarded. Organizations may want to look into CMaaS solutions deployed by cloud service providers.

K. Host Based Firewall

  • 9.4 Apply Host-based Firewalls or Port Filtering

L. Identity & Access Management System

  • 16.1 Maintain an Inventory of Authentication Systems
  • 16.2 Configure Centralized Point of Authentication
  • 16.4 Encrypt or Hash all Authentication Credentials
  • 16.5 Encrypt Transmittal of Username and Authentication Credentials
  • 16.6 Maintain an Inventory of Accounts
  • 16.7 Establish Process for Revoking Access
  • 16.8 Disable Any Unassociated Accounts
  • 16.9 Disable Dormant Accounts
  • 16.10 Ensure All Accounts Have An Expiration Date
  • 16.11 Lock Workstation Sessions After Inactivity

M. Incident Management Plans

  • 19.1 Document Incident Response Procedures
  • 19.2 Assign Job Titles and Duties for Incident Response
  • 19.3 Designate Management Personnel to Support Incident Handling
  • 19.4 Devise Organization-wide Standards for Reporting Incidents
  • 19.5 Maintain Contact Information For Reporting Security Incidents
  • 19.6 Publish Information Regarding Reporting Computer Anomalies and Incidents
  • 19.7 Conduct Periodic Incident Scenario Sessions for Personnel
  • 19.8 Create Incident Scoring and Prioritization Schema

N. Log Management System / SIEM

  • 1.3 Use DHCP Logging to Update Asset Inventory
  • 4.8 Log and Alert on Changes to Administrative Group Membership
  • 4.9 Log and Alert on Unsuccessful Administrative Account Login
  • 6.2 Activate audit logging
  • 6.3 Enable Detailed Logging
  • 6.4 Ensure adequate storage for logs
  • 6.5 Central Log Management
  • 6.6 Deploy SIEM or Log Analytic tool
  • 6.7 Regularly Review Logs
  • 6.8 Regularly Tune SIEM
  • 8.8 Enable Command-line Audit Logging
  • 14.9 Enforce Detail Logging for Access or Changes to Sensitive Data
  • 16.12 Monitor Attempts to Access Deactivated Accounts
  • 16.13 Alert on Account Login Behavior Deviation

O. Multi-Factor Authentication System

  • 4.5 Use Multifactor Authentication For All Administrative Access
  • 11.5 Manage Network Devices Using Multi-Factor Authentication and Encrypted Sessions
  • 12.11 Require All Remote Login to Use Multi-factor Authentication
  • 16.3 Require Multi-factor Authentication

P. Network Based Data Loss Prevention (DLP) System

  • 13.3 Monitor and Block Unauthorized Network Traffic
  • 13.5 Monitor and Detect Any Unauthorized Use of Encryption

Q. Network Based Intrusion Detection System (NIDS)

  • 12.6 Deploy Network-based IDS Sensor

R. Network Based Intrusion Prevention System (IPS)

  • 12.7 Deploy Network-Based Intrusion Prevention Systems

S. Network Device Management System

  • 11.1 Maintain Standard Security Configurations for Network Devices
  • 11.2 Document Traffic Configuration Rules
  • 11.3 Use Automated Tools to Verify Standard Device Configurations and Detect Changes
  • 11.4 Install the Latest Stable Version of Any Security-related Updates on All Network Devices
  • 12.8 Deploy NetFlow Collection on Networking Boundary Devices
  • 15.1 Maintain an Inventory of Authorized Wireless Access Points
  • 15.7 Leverage the Advanced Encryption Standard (AES) to Encrypt Wireless Data
  • 15.8 Use Wireless Authentication Protocols that Require Mutual, Multi-Factor Authentication
  • 15.10 Create Separate Wireless Network for Personal and Untrusted Devices

T. Network Firewall / Access Control System

  • 2.10 Physically or Logically Segregate High Risk Applications
  • 12.1 Maintain an Inventory of Network Boundaries
  • 12.3 Deny Communications with Known Malicious IP Addresses
  • 12.4 Deny Communication over Unauthorized Ports
  • 12.9 Deploy Application Layer Filtering Proxy Server
  • 12.10 Decrypt Network Traffic at Proxy
  • 13.4 Only Allow Access to Authorized Cloud Storage or Email Providers
  • 14.1 Segment the Network Based on Sensitivity
  • 14.2 Enable Firewall Filtering Between VLANs
  • 14.3 Disable Workstation to Workstation Communication

U. Network Level Authentication (NLA)

  • 1.7 Deploy Port Level Access Control

V. Network Packet Capture System

  • 12.5 Configure Monitoring Systems to Record Network Packets

W. Network Time Protocol (NTP) Systems

  • 6.1 Utilize Three Synchronized Time Sources

X. Network URL Filtering System

  • 7.4 Maintain and Enforce Network-Based URL Filters
  • 7.5 Subscribe to URL-Categorization service

Y. Passive Device Discovery System

  • 1.2 Use a Passive Asset Discovery Tool

Z. Patch Management System

  • 3.4 Deploy Automated Operating System Patch Management Tools
  • 3.5 Deploy Automated Software Patch Management Tools

AA. Penetration Testing Plans

  • 20.1 Establish a Penetration Testing Program
  • 20.2 Conduct Regular External and Internal Penetration Tests
  • 20.3 Perform Periodic Red Team Exercises
  • 20.4 Include Tests for Presence of Unprotected System Information and Artifacts
  • 20.5 Create Test Bed for Elements Not Typically Tested in Production
  • 20.6 Use Vulnerability Scanning and Penetration Testing Tools in Concert
  • 20.7 Ensure Results from Penetration Test are Documented Using Open, Machine-readable Standards
  • 20.8 Control and Monitor Accounts Associated with Penetration Testing

AB. Privileged Account Management System

  • 4.1 Maintain Inventory of Administrative Accounts
  • 4.2 Change Default Passwords
  • 4.3 Ensure the Use of Dedicated Administrative Accounts
  • 4.4 Use Unique Passwords

AC. Public Key Infrastructure (PKI)

  • 1.8 Utilize Client Certificates to Authenticate Hardware Assets

AD. SCAP Based Vulnerability Management System

  • 3.1 Run Automated Vulnerability Scanning Tools
  • 3.2 Perform Authenticated Vulnerability Scanning
  • 3.3 Protect Dedicated Assessment Accounts
  • 3.6 Compare Back-to-back Vulnerability Scans
  • 3.7 Utilize a Risk-rating Process
  • 5.5 Implement Automated Configuration Monitoring Systems
  • 9.1 Associate Active Ports, Services and Protocols to Asset Inventory
  • 9.2 Ensure Only Approved Ports, Protocols and Services Are Running
  • 9.3 Perform Regular Automated Port Scans

AE. Secure Coding Standards

  • 18.1 Establish Secure Coding Practices
  • 18.2 Ensure Explicit Error Checking is Performed for All In-house Developed Software
  • 18.3 Verify That Acquired Software is Still Supported
  • 18.4 Only Use Up-to-date And Trusted Third-Party Components
  • 18.5 Use Only Standardized and Extensively Reviewed Encryption Algorithms
  • 18.9 Separate Production and Non-Production Systems

Secure Coding Practices Specialization” consists of 4 courses on Coursera:

by Matthew Bishop, PhD at UCDavis

AF. Software Application Inventory

  • 2.1 Maintain Inventory of Authorized Software
  • 2.2 Ensure Software is Supported by Vendor
  • 2.3 Utilize Software Inventory Tools
  • 2.4 Track Software Inventory Information
  • 2.5 Integrate Software and Hardware Asset Inventories
  • 2.6 Address unapproved software

AG. Software Vulnerability Scanning Tool

  • 18.7 Apply Static and Dynamic Code Analysis Tools
  • 18.8 Establish a Process to Accept and Address Reports of Software Vulnerabilities

AH. Software Whitelisting System

  • 2.7 Utilize Application Whitelisting
  • 2.8 Implement Application Whitelisting of Libraries
  • 2.9 Implement Application Whitelisting of Scripts
  • 4.7 Limit Access to Script Tools
  • 7.1 Ensure Use of Only Fully Supported Browsers and Email Clients
  • 7.2 Disable Unnecessary or Unauthorized Browser or Email Client Plugins

AI. System Configuration Baselines & Images

  • Baselines are used assess the security state
  • Procedures provide all the detailed actions that personnel are required to follow.
  • Standards provide the steps necessary to achieve security.
  • Guidelines provide recommended actions to carry out under certain conditions.
  • Initiation is not a component of configuration management!

  • 5.1 Establish Secure Configurations
  • 5.2 Maintain Secure Images
  • 5.3 Securely Store Master Images

AJ. System Configuration Enforcement System

  • 5.4 Deploy System Configuration Management Tools
  • 7.3 Limit Use of Scripting Languages in Web Browsers and Email Clients
  • 8.3 Enable Operating System Anti-Exploitation Features/ Deploy Anti-Exploit Technologies
  • 8.5 Configure Devices Not To Auto-run Content
  • 12.2 Scan for Unauthorized Connections across Trusted Network Boundaries
  • 12.12 Manage All Devices Remotely Logging into Internal Network
  • 14.4 Encrypt All Sensitive Information in Transit
  • 14.6 Protect Information through Access Control Lists
  • 15.2 Detect Wireless Access Points Connected to the Wired Network
  • 15.4 Disable Wireless Access on Devices if Not Required
  • 15.5 Limit Wireless Access on Client Devices
  • 15.6 Disable Peer-to-peer Wireless Network Capabilities on Wireless Clients
  • 15.9 Disable Wireless Peripheral Access of Devices
  • 18.11 Use Standard Hardening Configuration Templates for Databases

AK. Training / Awareness Education Plans

  • 17.1 Perform a Skills Gap Analysis
  • 17.2 Deliver Training to Fill the Skills Gap
  • 17.3 Implement a Security Awareness Program
  • 17.4 Update Awareness Content Frequently
  • 17.5 Train Workforce on Secure Authentication
  • 17.6 Train Workforce on Identifying Social Engineering Attacks
  • 17.7 Train Workforce on Sensitive Data Handling
  • 17.8 Train Workforce on Causes of Unintentional Data Exposure
  • 17.9 Train Workforce Members on Identifying and Reporting Incidents
  • 18.6 Ensure Software Development Personnel are Trained in Secure Coding

AL. Web Application Firewall (WAF)

  • 18.10 Deploy Web Application Firewalls (WAFs)

AM. Whole Disk Encryption System

  • 13.6 Encrypt the Hard Drive of All Mobile Devices.

AN. Wireless Intrusion Detection System (WIDS)

  • 15.3 Use a Wireless Intrusion Detection System

CIS states the status of the above Control Measures as the percentage among all the organization’s assets. But CIS doesn’t weight some parts of the organization more over others.

CIS borrows from Statistics for the area under the curve at integer levels of Standard Deviation (called a Sigma). CIS scores are named “Sigma Level One” to “Sigma Level Six”, with One at 69% or Less 31% or Less 6.7% or Less 0.62% or Less 0.023% or Less 0.00034% or Less

PROTIP: Also identify and count the base of consideration whether controls are applicable. A control may not be applicable to every item or organizational role assessed. Such are a separate set of calculation not addressed by CIS but need to be considered nonetheless to measure progress toward assessment completion.

The above form the basis for Security Implementation Plans provided by services vendors such as GuidePoint. Such plans sequence work so that technical and organizational dependencies among tasks are achieved in the appropriate order.

CIS Lite

  1. Make a full backup of your machine before starting this procedure.
  2. Request an email to download the free “CIS-CAT Lite (CIS Configuration Assessment Tool)” at https://learn.cisecurity.org/cis-cat-lite (file CIS-CAT Lite v3.0.56.zip).

    “CIS-CAT Lite provides a fast, detailed assessment of your system’s conformance with CIS Benchmarks for Windows 10, Mac OS, Ubuntu, and Google Chrome. Simply run the tool,receive a compliance score (1 - 100) and quickly view remediation steps for non-compliant settings.”

  3. Expand downloaded file “CIS-CAT Lite v3.0.56.zip” to folder cis-cat-lite.

  4. Read the CIS-CAT Users Guide.pdf (104 pages).
  5. Install a JVM because the CISCAT.jar is Java-based.
  6. Move the folder under “temp” or other folder of your choice. Change to that directory.
  7. On a Mac, open a Terminal and run CIS-CAT.sh

    chmod CIS-CAT.sh
    ./CIS-CAT.sh
    

    Alternately, run CIS-CAT.BAT on Windows machines.

  8. Click “Accept” to the pop-up GUI.
  9. Click “Benchmark” to select from the pull-down.

    There is also the LiteCIS-CAT Pro (for paid members) which covers CLI as well and provides more Benchmark items to scan (for a price).

  10. Select “CIS_Apple_OSX_10.12_Benchmark” even if you have a more recent version.

    View the misc folder benchmarks.txt to see this list:

    • /benchmarks/CIS_Apple_OSX_10.12_Benchmark_v1.0.0.xml
    • /benchmarks/CIS_Google_Chrome_Benchmark_v1.3.0-xccdf.xml
    • /benchmarks/CIS_Microsoft_Windows_10_Enterprise_Release_1803_Benchmark_v1.5.0-xccdf.xml
    • /benchmarks/CIS_Ubuntu_Linux_18.04_LTS_Benchmark_v1.0.0-xccdf.xml

  11. Click “Next”.
  12. Selet Profile Level 1.
  13. Notice that the report goes to your user home folder, not your present Working Directory containing the program.
  14. Click “Next” then “Start Assessment”, and watch the progress scroll by.
  15. Click “View Reports”.
  16. Exit the program.
  17. Click on the Benchmark link associated with a number in the “Fail” column.
  18. Assess each Fail.

Some people prefer to hold off on automatic updates until hearing if early adopters experienced problems. The risk is fending off “zero day” security issues.

2.2.2 Ensure time set is within appropriate limits

The default NTP server is time.apple.com.

sudo ntpdate -sv time.apple.com

However, the ntpdate tool was removed in macOS Mojave 10.14 because the ntpd daemon since Mavericks (10.9) and Yosemite (10.10) is no longer responsible for adjusting the time. and instead a new program pacemaker has been introduced — so how can I know things are working or need adjustment to keep time?

sudo sntp -sS pool.ntp.org

See https://apple.stackexchange.com/questions/117864/how-can-i-tell-if-my-mac-is-keeping-the-clock-updated-properly

2.4.3 Disable Screen Sharing

CIT Fails thinking that Screen Sharing is enabled. But in System Preferences, Sharing, only Printer sharing is selected.

3.1.1 Retain system.log for 90 or more days

Edit /etc/asl.conf to change from

> system.log mode=0640 format=bsd rotate=seq compress file_max=5M all_max=50M

to

> system.log mode=0640 format=bsd rotate=utc compress file_max=5M ttl=90

Add for 3.1.2 Retain appfirewall.log for 90 or more days

> appfirewall.log mode=0640 format=bsd rotate=utc compress file_max=5M ttl=90

3.1.3 Retain authd.log for 90 or more days

sudo vim /etc/asl/com.apple.authd

Replace or edit the current setting

* file /var/log/authd.log mode=0640 compress format=bsd rotate=seq file_max=5M all_max=20M

with a compliant setting:

* file /var/log/authd.log mode=0640 format=bsd rotate=utc compress file_max=5M ttl=90

3.2 Enable security auditing

Run:

sudo launchctl load -w /System/Library/LaunchDaemons/com.apple.auditd.plist

RESPONSE: /System/Library/LaunchDaemons/com.apple.auditd.plist: service already loaded

3.5 Retain install.log for 365 or more days

subl /etc/asl/com.apple.install

Replace:

* file /var/log/install.log format='$((Time)(JZ)) $Host $(Sender)[$(PID)]: $Message'

with

* file /var/log/install.log mode=0640 format=bsd rotate=utc compress file_max=5M ttl=365

5.1.1 Secure Home Folders

Run one of the following commands in Terminal, substituting user name:

sudo chmod -R og-rwx /Users/username
sudo chmod -R og-rw /Users/username

RESPONSE: chmod: Unable to change file mode on /Users/wilsonmar/projects/WM/bin/jad.readme.txt: Operation not permitted


Change management

VIDEO: REMEMBER memonic: Ricard Rarely Approves The Scheduled Deployment

  1. Request the change
  2. Review the change
  3. Approve/reject the change
  4. Test the change
  5. Schedule and implement the change
  6. Document the change

Docker CIS

https://github.com/dev-sec/cis-docker-benchmark

There is also a Docker CAT: https://www.cisecurity.org/benchmark/docker/

https://github.com/docker/docker-bench-security The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production.

https://blog.theodo.fr/2017/12/security-best-practices-tool-vms-including-dockers-host/

https://nvd.nist.gov/ncp/checklist/740

https://nvd.nist.gov/vuln/search for known issues

NIST NVD CVE

http://csrc.nist.gov (Computer Security Resource Center) maintains the NIST 800-53 “National Vulnerability Database” by MITRE’s CVE (Computer Vulnerabilities and Exposures) system using OSCAL (Open Security Controls Assessment Language), currently available in JSON, XML, and YAML. OVAL : (Open Vulnerability and Assessment Language) for use world-wide.

[MINDMAP] PROTIP: Many Software Component Vulnerabity scan programs (Rapid7, JFrog Xray, etc.) refer to the NVD online as the basis for scanning.

READ: SP 800-53 Rev 5 “Security and Privacy Controls for Information Systems and Organizations”
cybersecurity-NIST-Functions-382x390-19166.jpg

NIST also publishes SP1800 (Cybersecurity practice guides) and the broader SP 500 (Information Technology).

FedRAMP/FISMA compliance

VIDEOS from info.fedramp.gov

Every federal agency is covered by the FISMA (Federal Information Security Management Act) of 2002 law. It’s implemented according to NIST (National Institute of Standards and Technology) Special Publication (SP) 800-53 [pdf]. The security controls development framework contains of 157 controls within 19 control families. Each control is designated as low, moderate, or high impact.

DISA’s Cloud Service Support

Coalfire came up with this count of controls: cyber-fisma-fedramp-counts-683x586-55388

FedRAMP added 144 control to 728 in FISMA, for a total of 872 controls. Control Families:

  • AC - Access Control
  • AU - Audit and Accountability
  • AT - Awareness and Training
  • CM - Configuration Management
  • CP - Contingency Planning
  • IA - Identification and Authentication
  • IR - Incident Response
  • MA - Maintenance
  • MP - Media Protection
  • PS - Personnel Security
  • PE - Physical and Environmental Protection
  • PL - Planning
  • PM - Program Management
  • RA - Risk Assessment
  • CA - Security Assessment and Authorization
  • SC - System and Communications Protection
  • SI - System and Information Integrity
  • SA - System and Services Acquisition

NIST SP 800-53 is within section 4 SECURITY CONTROL SELECTION of https://csrc.nist.gov/publications/fips NISP FIPS-200 and 201-3 catagorizes by impact.

Cybersecurity Maturity Model Certification (CMMC) framework March 18, 2020 at https://www.acq.osd.mil/cmmc

SP 800-30 steps for a risk assessment:

  1. Identify the assets and their value.
  2. Identify threats.
  3. Identify vulnerabilities.
  4. Determine likelihood.
  5. Identify impact.
  6. Determine risk as a combination of likelihood and impact.

SP 800-34

  • A CIP (critical infrastructure protection) plan is a set of policies and procedures that serve to protect and recover assets and mitigate risks and vulnerabilities.

  • An OEP (occupant emergency plan) outlines first-response procedures for occupants of a facility in the event of a threat or incident to the health and safety of personnel, the environment, or property.

  • An ISCP (information system contingency plan) provides established procedures for the assessment and recovery of a system following a system disruption.

  • A COOP (Continuity Of Operations) plan focuses on restoring an organization’s mission-essential functions (MEFs) at an alternate site and performing those functions for up to 30 days before returning to normal operations.

SP 800-40 Guide to Enterpise Patch Management Technologies

800-34 RMF (Risk Management Framework) - to obtain cATO (continuous Authority To Operate):

  1. Categorize
  2. Select security controls
  3. Implement controls
  4. Assess controls
  5. Authorize
  6. Monitor

FedRAMP

In 2011 a “cloud first” policy was defined in the Federal Risk and Authorization Program (FedRAMP) [pdf] where federal agencies make use of cloud service providers (CSPs) given authority to operate (ATO) after receiving system authorization from an independent security assessment conducted by a 3PAO (third-party Assessor).

A System Security Plan (SSP) is required by the OMB Security Authorization of Information Systems in Cloud Computing [pdf].

Each SSP authorization package can be in a machine-readable (JSON or XML format) https://github.com/usnistgov/OSCAL Open Security Controls Assessment Language - based on templates created based on this Excel xlsx file which defines fields (extensions), identifiers, and values in the FedRAMP Registry at https://github.com/GSA/fedramp-automation. The template is from FedRAMP PMO and NIST.

DISA SIST & SRG

Security Technical Implementation Guides (STIGs) [Wiki] defines (over 425) “lock down” configuration settings to minimize vulnerabilities to malicious attack of DOD IA (Information Assurance) and IA-enabled devices/systems, both Windows and Apache Unix. Cloud Computing Security Requirements Guide (CC SRG) are also defined by DISA (Defense Information Systems Agency) which provides a Viewer to scan for them.

SCAP (Security Content Automation Protocol) [Wikipedia] checklists enable automated vulnerability management, measurement, and policy compliance evaluation of systems deployed in an organization. See the 2015 viewer video.

See https://www.open-scap.org for tools.

  • ITAR (International Traffic in Arms Regulations)
  • ECCN (Export Control Classification Number)

Source of Vulnerabilities

The Top Five Security Metrics

Top 50 Products By Total Number Of “Distinct” Vulnerabilities - for all time include product versions now obsolete.

(At the top of the list is Debian.)

International

International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) 27018:2019 Code of practice for protection of Personally Identifiable Information (PII) in public clouds acting as PII processors covers the processing of personal information by cloud service providers. 27018 interprets rather than duplicates ``ISO/IEC 27002:2013. For example, advising cloud service providers to advise their customers if they use sub-contractors.

MTCS (Multi-Tier Cloud Security) Singapore 584:2013 Certification covers

  • Infrastructure as a Service (IaaS),
  • Platform as a Service (PaaS), and
  • Software as a Service (SaaS).

PLA (Privacy Level Agreement)

GDPR (General Data Protection Regulation) states that the data gathered for private individuals should be used only for the purpose for which it is collected. The European Union (EU) Principles on Privacy state that data gathered for private individuals should be used only for the purpose for which it is collected.

EU Cookie Law http://ec.europa.eu/ipg/basics/legal/cookies/index_en.htm

OECD.org Privacy Principles for Canada, Mexico, EU GDPR

Canada’s

eDiscovery EDRM (electronic Discovery Reference Model):

  • Preserving
  • Collection
  • Processing
  • Review
  • Analysis production

Rules of evidence:

  • Be authentic.
  • Be accurate.
  • Be complete.
  • Be convincing.
  • Be admissible.

ISO/IEC 27050

CSA (Cloud Security Alliance) guidelines

US Laws

  • Jurisdiction is the power or right of a legal or political agency to exercise its authority over a person, subject matter, or territory. Jurisdiction can be affected when the organization that owns the data is in one country while the data itself is stored in a facility in another country
  • Standing
  • Jurisprudence
  • Authority

QUESTION: How does CIS relate to ITIL?

Criminal Justice Information Services (CJIS) Security Policy compliance for any US state or local agency that wants to access the FBI’s CJIS database.

As of May 25, 2018, European privacy law GDPR (General Data Protection Regulation) imposes new rules on companies, government agencies, non-profits, and other organizations that offer goods and services to people in the European Union (EU), or that collect and analyze data tied to EU residents. But the GDPR applies no matter where they are located.

UK Government G-Cloud is a cloud computing certification for services used by government entities in the United Kingdom.

HIPAA (Health Insurance Portability and Accountability Act) is a US federal law that regulates patient Protected Health Information (PHI). A Business Associate Agreement (BAA) stipulates adherence to security and privacy provisions in HIPAA and the Health Information Technology for Economic and Clinical Health Act (HITECH) Act. HIPAA security rules prevent medical organizations (including health insurance companies, hospitals, and doctors’ offices) from sharing patient healthcare information without consent.

Service Organization Controls (SOC) 1, 2, and 3 report is a framework by independent third-party auditors covering controls for data security, availability, processing integrity, and confidentiality as applicable to in-scope trust principles for each service. SOC reports are internal control reports on the services provided by a service organization.

  • SOC 3 is the only SOC report that should be shared with the general public.
  • SOC 2 Type II, along with ISO 27001

AICPA (American Institue of Certified Public Accountants) Trust Service Principles, including Security, Availability and Confidentiality. PDF: SSAE #18 (Statement on Standards for Attestation Agreement #18). GAPP (Generally Accepted Privacy Principles) component of SOC2:

  1. Management. The entity defines, documents, communicates, and assigns accountability for its privacy policies and procedures.
  2. Notice. The entity provides notice about its privacy policies and procedures and identifies the purposes for which personal information is collected, used, retained, and disclosed.
  3. Choice and consent. The entity describes the choices available to the individual and obtains implicit or explicit consent with respect to the collection, use, and disclosure of personal information.
  4. Collection. The entity collects personal information only for the purposes identified in the notice.
  5. Use, retention, and disposal. The entity limits the use of personal information to the purposes identified in the notice and for which the individual has provided implicit or explicit consent. The entity retains personal information for only as long as necessary to fulfill the stated purposes or as required by law or regulations and thereafter appropriately disposes of such information.
  6. Access. The entity provides individuals with access to their personal information for review and update.
  7. Disclosure to third parties. The entity discloses personal information to third parties only for the purposes identified in the notice and with the implicit or explicit consent of the individual.
  8. Security for privacy. The entity protects personal information against unauthorized access (both physical and logical).
  9. Quality. The entity maintains accurate, complete, and relevant personal information for the purposes identified in the notice.

Policies, procedures, governance structures in place to protect privacy. Clearly define roles of data owner, steward, custodian.

Others:

  • The Federal Privacy Act of 1974 ensures that only authorized persons should have access to personal information and that personal records should be up to date and accurate. The act affects any computer that contains records used by a federal agency.

  • The Federal Intelligence Surveillance Act (FISA) of 1978 affects law enforcement and intelligence agencies and gives procedures for the physical and electronic surveillance and collection of “foreign intelligence information” between “foreign powers” and “agents of foreign powers.”

  • 1986 Computer Fraud and Abuse Act (CFAA) affects any entities that may engage in hacking of “protected computers” as defined in the Act. It was the first law written to require a formal computer security plan. It also requires appropriate training of system users or owners where the systems house sensitive information.

  • 1986 Electronic Communications Privacy Act (ECPA) extended government restrictions on wiretaps from telephone calls to include transmissions of electronic data by computer.

  • 1991 United States Federal Sentencing Guidelines of affects individuals and organizations convicted of felonies and serious (Class A) misdemeanors. It provides guidelines to prevent sentencing disparities that existed across the United States.

  • 1996 US Economic Espionage Act provides a framework to deal with espionage attacks on corporations. According to the Act, all the assets of the organization, whether substantial or not, require protection. The Economic Espionage Act of 1996 affects companies that have trade secrets and any individuals who plan to use encryption technology for criminal activities.

  • 1994 Communications Assistance for Law Enforcement Act (CALEA) requires telecommunications carriers and manufacturers of telecommunications equipment to modify and design their equipment, facilities, and services to ensure that they have built-in surveillance capabilities.

  • 1999 GLBA (Gramm-Leach-Bliley Act) affects all financial institutions, including banks, loan companies, insurance companies, investment companies, and credit card providers.

  • The Personal Information Protection and Electronic Documents Act (PIPEDA) affects private sector organizations that collect, use, and disclose personal information in the course of commercial business in Canada.

  • The Federal Information Security Management Act (FISMA) of 2002 affects every federal agency. It requires the federal agencies to develop, document, and implement an agency-wide information security program. It requires the federal agencies to develop, document, and implement an agency-wide information security program.

  • Basel II affects financial institutions and addresses minimum capital requirements, supervisory review, and market discipline.

  • The Sarbanes-Oxley (SOX) Act provides guidelines on accurately reporting corporate financial data to shareholders.

  • The Payment Card Industry Data Security Standard (PCI DSS) affects any organizations that handle cardholder information for the major credit card companies.

  • COPPA - online collection and use of data for minors under 13

  • FERPA (Family Educational Rights and Privacy Act) requires educational institutions to protect the privacy of student records.

Reporting

https://threatmap.checkpoint.com/ThreatPortal/livemap

Interpol: https://www.interpol.int/Crime-areas/Cybercrime/Cybercrime

FBI https://fbi.gov/investigate/cyber

DHS (Department of Homeland Security): https://www.dhs.gov/topic/cybersecurity

Property Law: https://www.bsa.org

US State laws

  • 2003 Calif. SB 1386 Security Breach Information Act is the first state to require notification
  • 2010 201 CMR 17 Massachusetts Standards for the Protection of Personal Information of Residents

  • ncsl.org (National Conference of State Legislators) has research on data-security-laws (Private Sector), data-disposal-lawsx, security-breach-notification-laws.

FIPS

FIPS 199 says federal organizations

  1. determine the security category of their information system in accordance with FIPS (Federal Information Processing Standard) Publication 199, Standards for Security Categorization of Federal Information and Information Systems
  2. derive the information system impact level from the security category in accordance with FIPS Publication 200
  3. apply the appropriately tailored set of baseline security controls in NIST Special Publication 800-53 Rev. 4.

Military classifications:

  • Unclassified,
  • Controlled Unclassified (CUI),
  • Confidential,
  • Secret,
  • Top-secret

CUI (Controlled Unclassified) previously marked:

  • For Official Use Only (FOUO)
  • Sensitive But Unclassified (SBU)
  • Dozens of other “sensitive” labels used by different U.S. agencies
  • Sensitive Security Information (SSI)

Data classification program:

  1. Define the classification levels.
  2. Specify the data classification criteria.

  3. Identify the data owners who determine the classification level of the information he owns and protects the data for which he is responsible.
  4. Identify the data custodian who implements (records) the information classification and controls determined by the data owner.

  5. Indicate the controls required for each classification level. The System owner ensures that the appropriate controls are in place.
  6. Document any known exceptions to the controls.

  7. Document information custody transfer guidelines.
  8. Create data classification review procedures.
  9. Document data declassification procedures.

  10. Develop the data classification security awareness program.
    • Security administrator maintains security devices and software, including firewalls, antivirus software, etc.

Commercial data classification levels:

  1. Public — Information that is freely available and accessible to the public without any restrictions or adverse consequences, such as marketing material, corporate contact information, customer service contracts, and website data.

  2. Internal — Data with low security requirements, but not meant for public disclosure, such as client communications, sales playbooks, and organizational charts. Unauthorized disclosure of such information can lead to short-term embarrassment and loss of competitive advantage.

  3. Confidential — Sensitive data that, if compromised, could negatively impact operations, including harming the company, its customers, partners, or employees. Examples include trade secrets, vendor contracts, employee reviews and salaries, and customer information.

  4. Restricted — Highly sensitive corporate data that if compromised could put the organization at financial, legal, regulatory, and reputational risk. Examples include customers’ PII, PHI, employee ID number, and credit card information.

  • Private = Medical information

NIST

NIST CSRC (Computer Security Resource Center)

NIST Information Technology Laboratory emails out bulletins about vulnerabilities

The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) is a voluntary Framework that consists of standards, guidelines, and best practices to manage cybersecurity-related risks.

Through a validated assessment performed by the Health Information Trust Alliance (HITRUST), a leading security and privacy standards development and accreditation organization, Office 365 is certified to the objectives specified in the NIST CSF.

NIACAP (National Information Assurance Certification and Accreditation Process) evaluates an application or system that is distributed to a number of different locations. System accreditation evaluates an application or support system. Site accreditation evaluates the application or system at a specific self-contained location.

CSF Functions and Categories maps NIST 800-53 to CIS Controls: cybersecurity-nist-342x275

NIST SP 800-39 provides guidance for an integrated, organization-wide program for managing information security risk to organizational operations (i.e., mission, functions, image, and reputation), organizational assets, individuals, other organizations, and the nation resulting from the operation and use of federal information systems.

Among The many NIST SP 800 documents:

  • NIST SP 800-60 provides guidelines for mapping types of information and information systems to security categories.
  • SP 800-183 describes the Internet of Things (IoT).

NIST SP 800-57 Key management lifecycle:

  1. Pre-operational phase
  2. Operational phase
  3. Post-operational phase
  4. Destroyed phase

NIST SP 800-92 log management infrastructure functions:

  • General functions (log parsing, event filtering, and event aggregation)
  • Storage (log rotation, log archival, log reduction, log conversion, log normalization, log file integrity checking)
  • Log analysis (event correlation, log viewing, log reporting)
  • Log disposal (log clearing)

NIST SP 800-137 ISCM (information security continuous monitoring) plan:

  1. Define an ISCM strategy.
  2. Establish an ISCM program.
  3. Implement an ISCM program.
  4. Analyze the data collected, and report findings.
  5. Respond to findings.
  6. Review and update the monitoring program.

Tiers in an organization defined by SP 800-139

  1. Organization view, which addresses risk from an organizational perspective by establishing and implementing governance structures that are consistent with the strategic goals and objectives of organizations and the requirements defined by federal laws, directives, policies, regulations, standards, and missions/business functions.
    • Tier 2 is the mission/business process view, which designs, develops, and implements mission/business processes that support the missions/business functions defined at Tier 1.
    • Tier 3 is the information systems view, which includes operational systems, systems under development, systems undergoing modification, and systems in some phase of the system development life cycle.

SP 800-139 Functions to implement the appropriate safeguards to ensure delivery of critical infrastructure services

  • Identify (ID): Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities.
  • Protect (PR): Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services.
  • Detect (DE): Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event.
  • Respond (RS): Develop and implement the appropriate activities to take action regarding a detected cybersecurity event.
  • Recover (RC): Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event.

SP 800-139 framework implementation maturity tiers:

  • Tier 1: Partial - risk management practices are not formalized, and risk is managed in an ad hoc and sometimes reactive manner.
  • Tier 2: Risk Informed - risk management practices are approved by management but may not be established as organizational-wide policy.
  • Tier 3: Repeatable - the organization’s risk management practices are formally approved and expressed as policy.
  • Tier 4: Adaptive - the organization adapts its cybersecurity practices based on lessons learned and predictive indicators derived from previous and current cybersecurity activities through a process of continuous improvement.

NIST SP 800-154 is a draft publication for data-centric system threat modeling. Its steps:

  1. Identify and characterize the system and data of interest.
  2. Identify and select the attack vectors to be included in the model.
  3. Characterize the security controls for mitigating the attack vectors.
  4. Analyze the threat model.

NIST SP 800-160 defines the systems security engineering framework. It defines, bounds, and focuses the systems security engineering activities, both technical and nontechnical, toward the achievement of stakeholder security objectives and presents a coherent, well-formed, evidence-based case that those objectives have been achieved. Contexts within which security activities are conducted:

  • Problem context
  • Solution context
  • Trustworthiness context

NIST SP 800-66 provides guidelines for implementing the HIPAA Security Rule, which requires securing protected health information (PHI) - any individually identifiable health information, also referred to as EPHI or ePHI (electronic protected health information).

NIST SP 800-122 gives guidelines on protecting the confidentiality of PII (Personally identifiable information) considered information that should be classified and protected. PII are assigned confidentiality impact levels based on FIPS 199 designations:

  • LOW if the loss of confidentiality, integrity, or availability could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals.
  • MODERATE if the loss of CIA could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals.
  • HIGH if the loss of CIA could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.

U.S. federal agencies use the SBU (Sensitive But Unclassified) designation for information not secret but still needs to be protected and requires strict controls over its distribution.

http://ethics-wg.org/framework.htm says: “Do not appropriate other people’s intellectual output” is one of the Computer Ethics Institute (CEI) Ten Commandments of Computer Ethics, but is not part of the(ISC)2 code of ethics preamble.

Components of configuration management:

  • configuration control
  • configuration status accounting
  • configuration auditing

Fagan inspections:

  1. Planning - prework to prepare
  2. Overview - assign roles, provide overview of software
  3. Preparation - independent review of code for potential defects
  4. Meeting - formally identify issues as a team
  5. Rework - fix. May return to the planning phase.
  6. Follow-up to confirm defects corrected

Defense in Depth

  1. Physical security
  2. Identity
  3. Perimeter
  4. Network
  5. Compute
  6. Application
  7. Data

Security Testing

OSSTMM (Open Source Security Testing Methodology Manual) published by Pete Herzog of ISECOM (Institute for Security and Open Methodologies) covers the different kinds of security tests of physical, human (processes), and communication systems. It does not cover any specific tools that can be used to perform these tests. It defines five risk categorizations:

  • vulnerability,
  • weakness,
  • concern,
  • exposure, and
  • anomaly.

Once a risk is detected and verified, it is assigned a risk assessment value.

COSCO (Committee of Sponsoring Organizations) broadly defines ERM (Enterprise Risk Management) as “the culture, capabilities and practices integrated with strategy-setting and its execution, that organizations rely on to manage risk in creating, preserving and realizing value.” The ERM framework is presented in the form of a three-dimensional matrix. The matrix includes eight components of enterprise risk management and four categories of objectives across the top: strategic, operations, reporting, and compliance.

The organization, its divisions, and business units are depicted as the third dimension of the matrix for applying the framework.

RFCs

RFC’s https://tools.ietf.org/html/rfc1087

  • RFC 1087 outlines concepts pertaining to what the IAB considers unethical and unacceptable. It considers destroying the integrity of computer-based information unethical.
  • RFC 2010 Operational Criteria for Root Name Servers
  • RFC 1589 A Kernel Model for Precision Timekeeping
  • RFC 1150 F.Y.I. on F.Y.I.

Credential Rotation Lifecycle

Different periods for rotating different key types. Here is the “regular basis” recommended:

Key TypeRotation Period
Tokens ADFS – 24 hours
Domain Passwords 70 days
Connection strings 70 days
Shared Access Signatures 60 days
Self-Signed Certificate 2 Years
Symmetric Keys 2 Years
Asymmetric Keys 2 years
Storage Account Keys 2 years

Book copyright in the US & UK is 70 years after death of author.


Security Engineer

Here are “Essential Job Functions” from various job descriptions:

  • Apply established and ad hoc processes and techniques to identify, validate, prioritize, and track security risks.
  • Identify uncontrolled risks and recommend control improvements.
  • Proactively identify security requirement deficiencies.
  • Engage business and technology personnel to elicit security requirements.
  • Architect and design security control systems to address requirements.
  • Operate and monitor established security controls.
  • Identify control deficiencies and make appropriate recommendations.
  • Ensure that controls are operating effectively; resolve operating discrepancies.
  • Review, triage, and prioritize control output.
  • Take appropriate action to resolve security discrepancies.
  • Identify, evaluate, and recommend new security technologies, techniques, and tools.
  • Define, review, and promote information security policies, standards, guidelines, and procedures.

  • As compliance subject matter expert, enforce and monitor compliance with internal and external regulations, policies, and standards.
  • Establish and promote strategies to ensure that compliance is effectively monitored and enforced.
  • Lead/Co-lead internal process improvement initiatives. Provide feedback on processes by offering suggestions.

  • Mentor and supervise junior staff in project-level tasks.
  • Assist with adherence to technology policies and comply with all security controls.

Education/Experience Requirements:

  • Experience must include direct experience in several of the key areas listed: securing networks and systems architecture, design and implementation, secure software assurance, intrusion detection, defense and incident response, security configuration management, access controls design and implementation and security policy and standards development.
  • In-depth knowledge of one or more communications protocols.
  • Experience with more than one Cyber Security tools, including: Configuration Assessment, Log Aggregation, Integrity Verification, Web Application Security Testing, Network Access Control System, Network Intrusion prevention systems, and Endpoint Security Solutions.

  • Strong written and verbal technical communication skills.
  • Demonstrated ability to develop effective working relationships that improved the quality of work products.
  • Should be well organized, thorough, and able to handle competing priorities.
  • Ability to maintain focus and develop proficiency in new skills rapidly.
  • Ability to work in a fast paced environment.
  • In-depth knowledge of more than one Information Security principle and discipline.

Hierarchical storage management (HSM) is type of backup management system that provides a continuous online backup by using optical or tape “jukeboxes.”

RAID (Redundant Array of Independent Disks): parity information is used to regenerate the data in the case of a single drive failure.

  • RAID-0 Striping of data parts over 2 drives
  • RAID-1 Mirroring of 2 drives
  • RAID-10 Mirroring+Striping
  • RAID-2 stripes the data across all drives at the bit level rather than the byte level.
  • RAID-3 parity information is written to a single dedicated drive. Data is written across all drives like striping.
  • RAID-5 Parity information is written across all drives like striping as well. Min. 3 drives?
  • RAID-6 Parity of 2
  • RAID-7 enables the drive array to continue to operate if any disk or any path to any disk fails. The multiple disks in the array operate as a single virtual disk.

Threats

PDF: VIDEO: Cyber Kill Chain
cyber-kill-chain-lockheed-3144x1246

CRAMM is an abbreviation of “C” for the UK government’s Central Computer and Telecommunications Agency (CCTA) Risk Analysis and Management Method. CRAMM reviews includes three steps:

  1. Identify and value assets.
  2. Identify threats and vulnerabilities and calculate risks.
  3. Identify and prioritize countermeasures.

A threat modeling program continually reassess the threat environment, including new adversaries, and proactively adapt their information security program. Threat modeling process:

  1. Decompose the application or infrastructure
  2. Determine the threats
  3. Determine countermeasures and mitigations
  4. Rank the threats

Costs include annual maintenance.

Microsoft’s STRIDE

Microsoft Threat Model Tool uses “STRIDE” as a memonic for classification of threats in an application:

  • Spoofing of user identity
  • Tampering
  • Repudiation
  • Information disclosure (privacy breach or data leak)
  • Denial of service (DoS)
  • Elevation of privilege

Threat Hunting - MITRE ATT&CK & Dragos

Since 2013, MITRE’s ATT&CK process looks at Tactics, Techniques, and Procedures (TTPs) for Enterprise IT. PROTIP: Click on the icon to the right of each item for additional info.

Dragos PDF: ATT&CK for IoC (Industrial Control Systems)

MITRE Dragos ICS
1. Reconnaissance -
2. Resource Development (new) -
3. Initial Access [Intrusion] 1. Initial access
4. Execution [Exploitation] 2. Execution
5. Persistence [new] 3. Persistence
6. Privilege Escalation -
7. Defense Evasion (Obfuscation Anti-forensics) 4. Evasion
8. Credential Access -
9. Discovery [new] 5. Discovery
10. Lateral Movement 6. Lateral Movement
11. Collection [new] 7. Collection
12. Command and Control
[Denial of service]
8. Command and Control
13. Exfiltration -
14. Impact [new] 9. Inhibit response function [+]
10. Impair process control [+]
11. Impact process

Attacks

Cryptoanalytic attacks try to deduce the key via brute-force (dictionary most likely)

Cryptographic attacks: man-in-the-middle, replay, timing, radiation,

Attacks: attempts to violate an organization’s security or privacy: REMEMBER:

  • A smurf attack uses a type of ping packet called an ICMP ECHO REQUEST.
  • In a side-channel attack, the attacker gains information about the encryption algorithms from the cryptosystem that is implemented in the network.
  • Evesdropping (traffic analysis). Countermeasures are sending noise, padding messages, mix non-info in data.
  • In a known plaintext attack, an attacker uses the plaintext and ciphertext versions of a message to discover the key used.
  • In an analytic attack, an attacker uses known structural weaknesses or flaws to determine the algorithm used.
  • In a replay attack, an attacker monitors the traffic stream in a network and maliciously repeats or delays the transmission of valid data over the network.
  • A race condition causes processes to execute in a different order to affect the result.
  • A Time-Of-Check/Time-Of-Use (TOC/TOU) attack, also called asynchronous attack, interrupts a task and changes something to affect the result while the tasks occur in the correct order. A countermeasure is making critical sets of instructions atomic.
  • Emanations capturing is eavesdropping on wave frequencies to capture traffic.
  • A maintenance hook is a backdoor in an application that is designed by the application developers to perform maintenance tasks, which can enable code to be executed without the usual security checks. A countermeasure for maintenance hooks is code reviews.
  • A buffer overflow transmits too much data to an application or operating system. A countermeasure for buffer overflows is input validation.
  • A covert storage channel attack is when one process writes data to a hard drive and another process reads it. In this attack a higher-level subject writes data to a storage area and a lower-level subject reads it.
  • A land attack sends a spoofed TCP SYN packet with the target host’s IP address and an open port as both the source and the destination to the target host on an open port.
  • Network address hijacking reroutes data traffic from a network device to the attacker.
  • A ping of death attack floods target computers with oversized packets, causing the target computer to either freeze or crash.
  • In SMTP relay attacks outbound mail folders fill up with spam relayed through an email server.
  • A salami attack is when small changes to data are made over time.
  • Data diddling is when changes to data are made before and after an attack.

Attacks to data and databases VIDEO [MINDMAP]

  • An inference attack is the development of a detailed version of an object from another object using different values in the new object, such as the difference between totals versus details allowed. A countermeasure is Polyinstantiation which prevents low-level database users from inferring the existence of higher-level data. It enables a relation to contain multiple tuples (rows) with the same primary keys, with each instance distinguished by a security level. [WIKIPEDIA]
  • A data contamination attack. Proper implementation of security levels is a countermeasure for data contamination.

A breach is an attack that has been successful in reaching its goal.

  • Means is how a criminal committed a crime.
  • Motive is why a crime is committed.
  • Opportunity is when and where a crime occurred.
  • Exigent circumstances are when evidence might be destroyed.

Events: System-level, application-level, or user-level? REMEMBER

  • User-level events include Authentication attempts, command run, security violations.
  • System-level events include logon attempts, logon IDs, logon attempts, Administration tools usage, user and client computer lockout, system performance, time/date, administration tools usage, and device usage.
  • Application-level events include files opened and closed, error messages, security violations, and file modifications.

Malware (malicious software):

  • A worm is a program that spreads itself through network connections.
  • A companion is a new file created with a similar name so users activate it.
  • A virus relies upon other application programs to execute itself and infect a system.
  • An armored virus includes protective code that prevents examination of critical elements, such as scans by antivirus software.

  • Spyware uses tracking cookies to collect and report on a user’s activities to the spyware programmer.
  • A Trojan is malware disguised as a useful utility but embeds malicious code in itself. A symptom of a Trojan horse is that unknown software is using covert channels to perform malicious activities, such as deleting system files and planting a backdoor into a system. The term is based on the “Trojan horse” story where soldiers hid in a large wooden horse which the opposition pulled inside their gates.
  • A RAT is a Remote Access Trojan
  • A Macro is written into like VB in Excel.
  • Adware is a software application that displays advertisements (which generates revenue) while the application is executing.
  • Logic bombs are triggered by events like a specific date.

  • Multipartite spreads in different ways
  • Polymorphic can change to avoid detection.

Risk ratings

DREAD is a mnemonic for categories used to rate security threats for a given issue:

  • Damage
  • Reproducibility
  • Exploitability, such as allowing RCE (Remote Control Execution)
  • Affected users
  • Discoverability

Each category is given a rating from 1 to 10. The sum of all ratings is used to prioritize among different issues.

CVSS

Models & Lifecycles

Focus of security awareness training:

  • Senior management: risk to the organization and the laws and regulations that affect the organization.
  • Middle management: policies, standards, baselines, guidelines, and procedures that affect security.
  • Technical staff: configuring and maintaining security controls, including how to recognize an attack when it occurs.
  • Regular staff: responsibilities regarding security for performing day-to-day tasks in a secure manner.

FERMA (Federation of European Risk Management Associatitions) provides guidelines for managing risk in an organization.

The PASTA methodology provides a seven-step process for analyzing applications to align business objectives and technical requirements. This method provides a threat identification, enumeration, and scoring process. It is intended to provide an attacker-centric view of the application and infrastructure from which defenders can develop an asset-centric mitigation strategy.

The Open Group Architecture Framework (TOGAF) is an enterprise architecture framework that is based on four interrelated domains: technology, applications, data, and business.

Sherwood Applied Business Security Architecture (SABSA) is a framework in addition to a methodology in that it prescribes the processes to follow to build and maintain the architecture. It uses the six communication questions (What, Where, When, Why, Who, and How) that intersect with six layers (operational, component, physical, logical, conceptual, and contextual).

The SABSA (Sherwood Applied Business Security Architecture) is a “customizable” framework and methodology for enterprises, based on business requirements (like NIST for private businesses). The framework uses six communication questions (What, Where, When, Why, Who, and How) that intersect with six layers of Enterprise Security Architecture (ESA) (operational, component, physical, logical, conceptual, and contextual):

cyber-scaba-matrix

The Zachman Framework is a two-dimensional model that intersects communication interrogatives (What, Why, Where, and so on) with various viewpoints (Planner, Owner, Designer, and so on).

The ISO/IEC 27000 Series establishes information security standards published jointly by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC).

The Trike methodology is an implementation model created and then analyzed to produce a threat model. Risk values are assigned to the identified threats. Mitigating controls are assigned to the vulnerabilities that lead to the identified threats.

COBIT: Auditors’ Control Objectives for Information and Related Technology (COBIT) is a set of control objectives used as a framework for IT governance.

  1. Provide stakeholder value
  2. Holistic approach [end-to-end]
  3. Dynamic governance system
  4. Governance distinct from management
  5. Tailored to enterprise needs
  6. End-to-end governance system

Security program life cycle:

  1. Plan and Organize
  2. Implement
  3. Operate and Maintain
  4. Monitor and Evaluate

  • Stakeholder refers to any individuals, teams, and departments, including groups outside the organization, with interests or concerns that should be considered.
  • View refers to the representation of the system from the perspective of a stakeholder or a set of stakeholders.
  • Viewpoint is a template used to develop individual views that establish the audience, techniques, and assumptions made.
  • Architecture describes the organization of the system, including its components and their interrelationships along with the principles that guided its design and evolution.
  • Architectural description (AD) refers to the set of documents that convey the architecture in a formal manner.

Software Capability Maturity Model (SCCM) - REMEMBER: Memonic: I Read Data Maps Online:

  1. Initial (chaotic, ad hoc, individual heroics) - the starting point for use of a new or undocumented repeat process.
  2. Repeatable - process is at least documented sufficiently such that repeating the same steps may be attempted.
  3. Defined - the process is defined/confirmed as a standard business process.
  4. Managed/Capable - the process is quantitatively managed in accordance with agreed-upon metrics.
  5. Optimized - process management includes deliberate process optimization/improvement.

Process improvement approaches:

  • Capability Maturity Model Integration (CMMI) addresses development, services, and acquisitions.

  • Six Sigma includes methodologies DMAIC (Define, Measure, Analyze, Improve existing, Control process) or DMADV (Define, Measure, Analyze, Design, Verify new customer)

  • Control Objectives for Information and Related Technology (COBIT) is a security controls development framework that uses a process model to subdivide IT into four domains: 1) Plan and Organize (PO), 2) Acquire and Implement (AI), 3) Deliver and Support (DS), and 4) Monitor and Evaluate (ME).

  • Department of Defense Architecture Framework (DoDAF) is an architecture framework that organizes a set of products under eight viewpoints: Capability Viewpoint (CV), Data and Information Viewpoint (DIV), Operation viewpoint (OV), Project Viewpoint (PV), SerViCes Viewpoint (SvcV), STanDards Viewpoint (STDV), and Systems viewpoint (SV), All Viewpoint (required) (AV).

  • British Ministry of Defense Architecture Framework (MODAF) is an architecture framework that divides information into seven viewpoints: STrategic viewpoint (StV), Operational Viewpoint (OV), Service-Oriented Viewpoint (SOV), Acquisition Viewpoint (AcV), Technical viewpoint (TV), Systems Viewpoint (SV), All viewpoint (AV).

  • DHS (Department of Homeland Security) is involved in promoting software security best practices. Its Build Security In (BSI) initiative promotes a process-agnostic approach that makes security recommendations with regard to architectures, testing methods, code reviews, and management processes. cyber-sec-bsi-500x331

System Development Life Cycle:

  1. Initiate
  2. Acquire/Develop
  3. Implement
  4. Operate/Maintain
  5. Dispose

Security program lifecycle:

  1. Plan and organize
  2. Implement
  3. Monitor and evaluate (review audit logs)
  4. Operate and Maintain (perform audits)

IDEAL model: REMEMBER MEMONIC: I Do Every exAm Live

  1. Initiating - provide business reasons behind change
  2. Diagnosing - need for changes by analysing current state
  3. Establishing - plan of action from recommendations
  4. Acting - develop, test, refine, implement solutions
  5. Learning - analyzing results and proposing new actions

Information life cycle:

  1. Create/receive
  2. Distribute
  3. Use
  4. Maintain
  5. Dispose/store

The process of acquiring software:

  1. Planning: During this phase, the organization performs a needs assessment, develops the software requirements, creates the acquisition strategy, and develops evaluation criteria and a plan.
  2. Contracting: Once planning is complete, the organization creates a request for proposal (RFP) or other supplier solicitation forms, evaluates the supplier proposals, and negotiates the final contract with the selected seller.
  3. Monitoring and accepting: When a contract is in place, the organization establishes the contract work schedule, implements change control procedures, and reviews and accepts the software deliverables.
  4. Follow-up: When the software is in place, the organization must sustain the software, including managing risks and changes. At some point, it may be necessary for the organization to decommission the software.

Change control process of each change:

  1. requested.
  2. approved.
  3. documented in the change log.
  4. tested and presented.
  5. implemented.
  6. reported to management (CCB)

VIDEO: REMEMBER picmonic: Incident response process: DRMRRRL (drumroll)

  1. Detect (identify) using monitoring tools, IPs, firewalls, users, notifications
  2. Respond (triage) in decision to declare a real incident
  3. Mitigate (correction & containment) with malware - disconnect device
  4. Report the incident to relevant stakeholders (legal, customers, regulatory)
  5. Recover (return to normal) from the incident.
  6. Remediate (root cause) so all components affected by the incident to ensure that all traces of the incident have been removed.
  7. Lessons Learned review of the incident and document all findings (to prevent reccurence)

Incident response:

  1. Triage: The incident response team examines the incident to see what was affected and sets priorities.
  2. Investigation: Involves the collection of relevant data.
  3. Containment: The damage is mitigated or contained.
  4. Analysis: Where the root cause of the incident is discovered.
  5. Tracking: Where the source (user or device) of the incident is determined.
  6. Post-mortem review: Record lessons learned.
  7. Recovery: Necessary adjustments or enhancements are made to policies and procedures.

See ASD (Australian) Mitigations

Forensic investigation process: REMEMBER:

  1. Identification - start action log, reviewing audit logs, monitoring systems, analyzing user complaints, analyzing detection mechanisms, signature resolution.
  2. Preservation - chain of custody standards, imaging technologies, and time synchronization. All while folling chain of custody standards.
  3. Collection - making system images, implementing chain of custody, documenting the evidence, and recording timestamps. Data reduction.
  4. Examination determining and documenting characteristics, such as timestamps and identification properties. Examination includes traceability, validation techniques, filtering techniques, pattern matching, hidden data discovery, and hidden data extraction. After the evidence has been fully analyzed using scientific methods, the full incident should be reconstructed and documented.
  5. Analysis
  6. Presentation
  7. Decision

Order evidence should be saved: REMEMBER: ephemeral first

  1. Memory contents
  2. Swap files
  3. Network processes
  4. System processes
  5. File system information
  6. Raw disk blocks

Cohesion is opposite of Coupling

  • Low cohesion describes a module that carries out many tasks, making it harder to maintain and reuse.
  • High cohesion describes a software module that does NOT affect many other modules, so is easier to update.

  • High coupling describes a module that must interact with many other modules.
  • Low coupling describes a module that performs its job without using other modules.

ACID properties: REMEMBER: MEMONIC: Analysts Can Interpret Data

  • Atomicity - either all operations are complete or changes are rolled back.
  • Consistency - transaction follows an integrity process that ensures that data is consistent in all places where it exists.
  • Isolation - transaction separately from each other, does not interact with other transactions until completion.
  • Durability is present when, once verified, the transaction is committed and cannot be rolled back.

Polyinstantiation is a process used to prevent data inference violations.

Relationship cardinality means whether a relationship is one-to-one, many-to-one, or many-to-many. High cardinality means a high number of distinct (unique) values in a table column, relative to the number of rows in the table.

Aggregation is a database security concern that arises when a user does not have complete access to sensitive data but can access portions of it.

The domain of a relation is the set of allowable values that an attribute can take, composed of values that can be entered in a column (attribute) of a table (relation).

WASC (Web Application Security Consortium) is an organization that provides best practices for web-based applications along with a variety of resources, tools, and information that organizations can make use of in developing web applications.

To establish a relationship with a third party which accesses organizational assets both remotely and locally:

  1. Perform a risk assessment on the third party’s network, to determine its compliance with organizational security policies and standards.
  2. Establish a written security policy with the third party.
  3. Provide access to internal resources for the third-party personnel.
  4. Audit the third party’s access to internal resources.

Types of control function:

  • Preventive - Reduces the probability or impact of a threat, like firewalls.
  • Detective - dentifies attacks as they happen, like surveillance.
  • Corrective - Controls how the system responds to an ongoing attack, like system patches.
  • Deterrent - Keeps attackers away from the system, like least privilege.
  • Recovery - Recovers system from an attack, like backups.

  • A DBMS is a technical control.
  • Operational controls: backup control, software testing, anti-virus,
  • Data backups are recovery logical controls.
  • Recovery administrative controls do NOT include data backups.
  • Server images are both corrective and technical controls.
  • Disaster recovery plans are recovery administrative controls.
  • Job rotation and background checks are detective administrative controls.

Risk Resolution Description

  • Avoid - The part of the system containing the issue will be cut.
  • Reduce - Issue will be addressed with bug fixes or redesign to reduce or eliminate threat impact and severity.
  • Transfer - Issue will be handled by another system or team.
  • Accept - (without a resolution). Based on threat severity.

DRP (Disaster Recovery Plan) defines “how” is implemented when the emergency occurs and includes the steps to restore functions and systems. Includes identification of specific hardware. DRP lifecycle phases:

  1. BIA (Business impact analysis) is a functional analysis that lists the critical and necessary business functions, their resource dependencies, and their level of criticality to the overall organization. Risks. Minimum Operating Requirements (MOR)
  2. Define strategies
  3. Define Plans and Procedures
  4. Train users
  5. Exercise the plan
  6. Review and update the plan
  • OEP (Occupant Emergency Plan)
  • The BCP (business continuity plan) defines “what” – considers all aspects that are affected by a disaster, including functions, systems, personnel, and facilities, and lists and prioritizes the services that are needed.
  • A contingency plan provides instruction on what personnel should do until the functions and systems are restored to full functionality.
  • A CCP (Crisis Communication Plan)

DRP activation:

  1. Mitigation
  2. Preparation (for preparedness)
  3. Response (activation, execution)
  4. Recovery toward normalcy

Resilience is the ability of a system, device, or data center to recover quickly and continue operating after an equipment failure, power outage, or other disruption. It involves the use of redundant components or facilities.

Metrics defined by BIA (Business Impact Assessment): REMEMBER: MTD <= RTO + WRT cyber-sec-bia-terms-581x239

  1. Identify Essential Services & Dependencies
  2. Determine MTD (Maximum Tolerable Downtime) = Max. total time process can be disrupted
  3. Determine RPO (Recovery Point Objective) = Maximum tolerable data loss period
  4. Identify infrastructure and Dependencies
  5. Determine current RPO & RTO (Recovery Time Objective) = Recovery time to a defined service level, including WRT (Work Recovery Time) = Max. time to verify integrity of systems & data
  6. Gap Analysis
  7. Report to management


  • Mean time to repair (MTTR) is the average amount of time it takes to get a device fixed and back online.
  • Mean time between failure (MTBF) describes how often a component fails on average.

Roles:

  • System owners are responsible for the systems on which data resides.
  • Data owners own the data
  • Data custodian configures the appropriate permissions for user access to the data,
  • System owner determines the parameters that govern the system, such as what types of data and applications can be stored on the system, who owns the data and applications, and who determined the users that can access the data and applications.

Dedicated security mode employs a single classification level.

“system integrity” implies that a system will work as intended.

REMEMBER: Aspects of identity management whereby users are identified, authenticated, and authorized: entities, attributes, credentials, and entitlements.

[MINDMAP] Trusted Computer System Evaluation Criteria (TCSEC) functionality at least once. Enhanced by EU in ITSEC to assurance every time:

  • F6 + E6 = A1 = Mathamatically Verified protection
  • F5 + E5 = B3 = Mandatory Protection (military) resistant to penetration attempts.
  • F4 + E4 = B2 = Structured Protection (military)
  • F3 + E3 = B1 = Mandatory Protection (military)
  • F2 + E2 = C2 = Controlled access protection
  • F1 + E1 = C1 = Discretionary Protection (commercial)
  •     E0 = D  = Minimal Protection

Covert channel analysis is introduced at B2 and above.

ISO 15408 2005 = Common Criteria on TOE (Target of Evaulation) for Security Target report satisfies independently verified by NIAP (National Information Assurance Partnership) to “compliant” instead of previous EAL (Evaluation Assurance Levels) 1 - 7 highest: REMEMBER:

  1. A user wants the system to operate but ignore security threats.
  2. Developers use good design practices but security is not a high priority.
  3. Security configuration is based on good commercial development. This level is the common benchmark for commercial systems, including operating systems and products.
  4. Security is implemented starting in early design. Provides high levels of security assurance.
  5. Specialized security engineering provides high levels of assurance. Highly secure from penetration attackers.
  6. Extremely high levels of security are provided. This level requires extensive testing, measurement, and independent testing.

Security Models: REMEMBER VIDEO: 2,3

  • The Bell-LaPadula (BLP) model focuses on data confidentiality and controlled access to classified information. It uses a state machine with transition functions to control information flow, characterized by the phrase “write up, read down” (WURD). MEMONIC: Bell. It was the first mathematical model of a multilevel system for enforcing access control. Not dynamic. It’s a multilevel security model because it allows simultaneous processing of classified information across the security levels.

  • The Brewer-Nash (Chinese Wall) model introduced the concept of allowing dynamic access controls based on a user’s previous actions (conflicts of interest). Based on RBAC.

  • The Clark-Wilson integrity model concerns itself with data integrity by allowing data to be altered only through programs and not directly by users.

  • The Lipner model shares characteristics with the Clark-Wilson model in that it separates objects into data and programs.

  • The Biba Integrity Model describes rules for the protection of data integrity.

  • Graham-Denning model

  • HRU (Harrison-Ruzzo-Ullman) uses ACL matrix of subject roles with columns of objects.

  • The Take-Grant model is represented as a directed graph, called a protection graph. The subjects and objects of the computer system are the vertices and the access rights of subjects to objects are represented by arcs.

  • The Goguen-Meseguer model is the foundation of the noninterference model. With this model, the list of objects that a subject can access is predetermined.

  • The Sutherland model defines a set of system states, initial states, and state transitions. Using these predetermined secure states, the Sutherland model maintains integrity and prohibits interference.

TCB RMC

The TCB (Trusted Computer Base) [MINDMAP] comprises the components (hardware, firmware, and/or software) that are trusted to enforce the security policy of the system that, if compromised, jeopardize the security properties of the entire system.

The RMC Reference monitor Concept has active Subject and passive Object, with Rules component enforces access controls on an object.

  • A PLD (programmable logic device) is an integrated circuit with connections or internal logic gates that can be changed through a programming process.
  • A FPGA (field-programmable gate array) is a type of PLD that is programmed by blowing fuse connections on the chip or using an antifuse that makes a connection when a high voltage is applied to the junction.
  • Flash memory is a type of electrically programmable ROM.
  • Firmware is a type of ROM where a program or low-level instructions are installed.

Multithreading allows multiple tasks to be performed within a single process. A thread is a self-contained sequence of instruction that can execute in parallel with other threads that are part of the same process. Multithreading is often used in applications to reduce overhead and increase efficiency.

Multitasking …

A protection domain is memory space isolated from other running processes in a multiprocessing system.

State machine models:

  • A state machine model examines every possible state the system could be in and ensures that the system maintains the proper security relationship between objects and subjects in each state.
  • The multilevel lattice and information flow model types focus mainly on information flow. The multilevel lattice model was developed mainly to deal with confidentiality issues, and the information flow model focuses on controlling information flows that relate two versions of the same object.
  • A non-interference model is less concerned with the flow of information and more concerned with a subject’s knowledge of the state of the system at a point in time; it concentrates on preventing the actions that take place at one level from altering the state presented to another level.
  • A matrix-based model organizes tables of subjects and objects indicating what actions individual subjects can take upon individual objects.


Cryptography

[MINDMAP]

Cryptographic key life cycle:

  1. Creation
  2. Initialization
  3. Distribution
  4. Activation

  5. Inactivation
  6. Termination

PROTIP: Creation before Initialization; Activation after Distribution.

Cipher strategies:

  • Substitution exchanges one byte in a message for another. The key is the shift pattern, as in the “Caesar cipher”.

  • A running key cipher uses a physical component, usually a book, to provide the polyalphabetic characters. All the other options are substitution ciphers.

  • Confusion substitutes values during each round of encryption, on the entire key. As in RC4 stream ciphers.

  • Transposition shuffles or reorders plaintext to another place in the block. The key is the transposition code.
  • Diffusion changes the order/location of plaintext within the ciphertext through multiple rounds, for block ciphers. Dissipates redunancy such as “u” after “q”.

  • Key stretching to output an enhanced (stronger) key

A salt is a non-secret, random value that’s used to ensure that the same plaintext will not consistently hash to the same output value; A salt is used to prevent pre-computation attacks such as Rainbow Tables (hash of passwords).

A nuonce (“number used once”) is typically used to prevent replay attacks. A nounce is typically a randomly generated value associated with a message in a cryptographic scheme, and must be unique within some specified scope (such as a given time interval, or a session).

Steganography:

  • Distortion techniques are when the knowledge of original cover in the decoding process is essential at the receiver side.
  • Least significant bit steganography is when some or all the bits or bytes inside an image are replaced with bits of the secret message. quality of the image is degraded.
  • Transform domain techniques are when secret information is embedded in the frequency domain of the signal.
  • Statistical methods encode information by changing several statistical properties of a cover.
  • Linguistic steganography hides a message in a nonobvious way like within another file.
    • Visual and text semagrams hide a message using signs or symbols that look innocuous.
    • Open codes, which include jargon code and covered ciphers, hide a message in a legitimate looking carrier, sometimes called overt communication.

  • The payload is the message that is hidden.
  • The cover medium is the file or object before the message is hidden within it.
  • stego medium is the file or object after the message has been hidden.
  • The carrier is the method of transmitting the stego medium (Email, Instagram, Facebook).

  • Due care means an organization has taken the necessary steps to protect the organization, its resources, and personnel.
  • Due diligence means an organization has evaluated information to identify vulnerabilities, threats, and issues related to risk.

Model:

  • A state machine model examines every possible state the system could be in and ensures that the system maintains the proper security relationship between objects and subjects in each state.
  • The non-interference model is less concerned with the flow of information and more concerned with a subject’s knowledge of the state of the system at a point in time; it concentrates on preventing the actions that take place at one level from altering the state presented to another level.
  • The matrix-based model organizes tables of subjects and objects indicating what actions individual subjects can take upon individual objects.
  • The multilevel lattice model was developed mainly to deal with confidentiality issues and focuses mainly on information flow.
  • The information flow model focuses on controlling information flows that relate two versions of the same object.

Cryptography

Ciphers:

  • A concealment cipher occurs when plaintext is interspersed somewhere within other written material. Also called “Null” cipher.
  • Vigenere cipher VIDEO was used by US Confederates using a brass cipher disk. It aims to defeat simple frequency analysis.

  • A running key cipher uses a physical component, usually a book, to provide the polyalphabetic characters.
  • Enigma
  • “Lucifer” was created by IBM and used a Feistel cipher a framework to build ciphers. based on DES. Used by TwoFish. Its innovation is decryption.

Kerckhoff’s Principle - the only safe part is the key.

  • discrete logarithms ?? https://crypto.stanford.edu/pbc/notes/crypto/factoring.html

REMEMBER Algorithms: https://competitions.cry.yp.to/aes.html

http://thedigitalstandard.blogspot.com/2009/11/why-fuzzy-hashing-is-really-cool.html

Hashing digital signatures:

  • MD5 (128-bit)
  • RIPEMD-160 (originally based on MD4, obsoleted)
  • SHA-1 by NSA (160 bit), SHA-256, 384, 512 VIDEO QUIZ
  • Whirlpool 512 hash

Symmetric algorithms (same key for encrypt/decrypt, so one time), uses a private or secret key that must remain secret between the two parties. It provides confidentiality but NOT authentication or nonrepudiation.

Asymmetic (2 keys) include both stream-based and block ciphers:

  • Diffie-Hellman key exchange published 1976. First public/private key.
  • RSA is defacto commercial asymmetic algorithm
  • ECC (Elliptic Curve Cryptosystem) is US govt. std asymmetric (efficient) support digital signatures and encryption.
  • DSA,
  • Knapsack

  • IDEA provides a key size up to 128 bits.
  • 3DES provides a key size up to 168 bits. 3 costly rounds. Not widely used.
  • AES supports a 128-, 192-, or 256-bit (16 byte) block size, weaved through data blocks. Subset of Rijndael, winner of NIST contest for faster in 1998.
  • RC6 (written by Ron Rivest) provides the largest key size up to 2,048 bits. From NSA. RC6 supports a 32-, 64-, or 128-bit block size.

Rounds of computations: REMEMBER:

  • HAVAL performs 3, 4, or 5
  • MD5 performs 4
  • IDEA performs 8
  • AES (Rijndael) performs 14
  • Twofish performs 16
  • Tiger performs 24
  • Skipjack performs 32
  • SHA-256 performs 64

Stream ciphers are generally cheaper to implement than block ciphers.

  • RC4 is a symmetric stream cipher, so does not have a block size.

Block symmetric cipher modes use IVs to ensure that patterns are not produced during encryption. But IVs are not modes.

  • Block ciphers are generally less susceptible to security issues.
  • Block ciphers are generally used more in software implementations.

  • ECB (Electronic Code Book) blocks have no relationship with other blocks. Least secure but fastest because it doesn’t use initialization vector. Used for small random code.
  • CTR (DES CounTeR Mode) turns into a string cipher used in IEEE 802.11i which details security mechanisms. Has best balance of speed and security.
  • CBC (Cipher Block Chaining) can have pipeline stalls
  • CFB (Cipher FeedBack)
  • GCM (Galois field/Counter Mode) parallel 128 bits https://www.wikiwand.com/en/Galois/Counter_Mode

VIDEO: Hybrid cryptography combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem. Public-key cryptosystems are convenient in that they do not require the sender and receiver to share a common secret in order to communicate securely:

  1. The symmetric algorithm provides keys used for encryption.
  2. The symmetric keys are passed to the asymmetric algorithm, which encrypts the symmetric keys and automatically distributes them.
  3. The message is encrypted with the symmetric key.
  4. Both the message and the public key are sent to the receiver.
  5. The receiver decrypts the symmetric key and uses the symmetric key to decrypt the message.

Implementation of Confusion is the process of changing a key value during each round of encryption.

  • 3DES-EEE3 encrypts each block of data three times, each time with a different key.
  • 3DES-EDE3 encrypts each block of data with the first key, decrypts each block with the second key, and encrypts each block with the third key.
  • 3DES-EDE2 encrypts each block of data with the first key, decrypts each block with the second key, and then encrypts each block with the first key.
  • 3DES-EEE2 encrypts each block of data with the first key, encrypts each block with the second key, and then encrypts each block with the third key.

PKI (Public Key Infrastructure):

  • A subject is an entity that seeks to have a certificate validated.
  • A target is a path to a public key.
  • A verifier is an entity that verifies a public key chain.
  • A trust anchor is a public key that verifies the certificate used in a digital signature.

Network Protocols

CHAP (Challenge Auth Protocol) from Microsoft negotiates a 3-way handshake asymmetric algorithm to supports mutual auth. can randomly require re-auth. Based on username and password, so is vulnerable.

FHRP (First Hop Redundancy Protocol) for shared IP routing redundancy VRRP group

RARP (Reverse Address Resolution Protocol) when communicating for the first time to find the IP address matching the MAC.

OCSP (Online Certificate Status Protocol) is the Internet protocol that obtains the revocation status of an X.509 digital certificate. A certificate revocation list (CRL) contains a list of all the certificates that have been revoked. Pinned.

Key clustering occurs when different encryption keys generate the same ciphertext from the same plaintext message. Cryptanalysis is the science of decrypting ciphertext without prior knowledge of the key or cryptosystem used. A keyspace is all the possible key values when using a particular algorithm or other security measure.

A TPM (Trusted Platform Module) protects the contents of an encrypted hard drive by storing the decryption key in the host computer. If the hard drive is removed, the data cannot be decrypted.

Secure Electronic Transaction (SET) was used to verify credit card transactions in 1966.

SAML (Security Assertion Markup Language) is an XML-based open standard data format for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider.

OVAL (Open Vulnerability and Assessment Language) is a standard written in XML that provides open and publicly available security content. Its purpose is to standardize information between different security tools.

Memory:

  • Associative memory searches for a specific data value in memory rather than using a specific memory address.
  • Indirect addressing is the type of memory addressing where the address location that is specified in the program instruction contains the address of the final desired location.
  • Absolute addressing addresses the entire primary memory space. Implied addressing refers to registers usually contained inside the CPU.
  • A memory leak occurs when a computer program incorrectly manages memory allocations, which can exhaust available system memory as an application runs.

A process is a series of actions or steps taken in order to achieve a particular end. Organizations will define individual processes and their relationship to one another.

Workflow

Confinement is a term used to describe processes in a system. When a process is confined, the process is only allowed to read from and write to certain memory locations and resources. Confinement is usually carried out using the operating system, through a confinement service, or using a hypervisor.

The bounds of a process set limits on the memory addresses and resources the process can access. The bounds logically segment memory areas for each process to use.

For list of ports, see my https://wilsonmar.github.io/ports-open

MPLS is a protocol-independent transport mechanism. Uses labels, but not for IP routing.

Convergence to use IP protocol for a variety of formats (data, voice, etc.)

IDS (Intrusion Detection System)

  • HIDS (Host-based IDS) on servers
  • A heuristic-based (or rule-based) IDS is an expert system that uses a knowledge base, inference engine, and rule-based programming.
  • A signature-based IDS analyzes traffic and compares it to attack or state patterns, called signatures, that reside within the IDS database.
  • A traffic anomaly-based IDS tracks traffic pattern changes. All future traffic patterns are compared to the sample.
  • An anomaly-based IDS analyzes traffic and compares it to normal traffic to determine if said traffic is a threat.
  • An application-based IDS is a specialized IDS that analyzes transaction log files for a single application.

Backups:

  • GRS (grandfather-father-son) backup rotation scheme Three sets of backup media
  • ASR (Automated System Recovery) from disk image to restore
  • Remote journaling
  • Electronic vaulting - files copies auto transmitted to backup location
  • Disk shadowing - written to independent disks, transparent to the user

RAM

  • DRAM (Dynamic Random Access Memory) capacitors
  • SRAM keeps data stored as long as it has power
  • SDRAM (Synchronous Dynamic Access Memory) access commands simultaneously,
  • DDR (DD2, DD3, DDR4)

Physical Security

[MINDMAP]

Strategies: Deter, Delay, Detect, Assess, Respond. Acronym?

CPTED (Crime Prevention Through Environmental Design):

  • natural access control
  • natural territorials reinforcement
  • natural surveillance

  • People protect territory they feel is their own
  • People have a certain respect for the territory of others
  • Intruders do not want to be seen
  • Limiting access discourages intruders and/or marks them as intruders

Perimeter of two lines: sterile zone

Default to lock: fail-secure

Fail-soft is the capability of a system to terminate non-critical processes when a failure occurs.

Gates:

  • Class 1 gates are suitable for residential use.
  • Class 2 gates are suitable for commercial usage.
  • Class 3 gates are suitable for industrial usage.
  • Class 4 gates are suitable for restricted areas.

Alternative sites:

  • A redundant site provides a site that is recoverable in the least amount of time and will allow the organization to have the most control of the resources.
  • A hot site contains telecommunications and computers and is the most expensive alternative site. It takes the shortest amount of time to recover. Has Backups??
  • A cold site does not contain any computers or telecommunications equipment. It does contain wiring, heating and air, and raised flooring. It is much cheaper than a hot site. However, it takes much longer to recover.
  • A warm site contains telecommunications equipment but no computers and is cheaper than a hot site but more expensive than a cold site. It takes longer to recover than a hot site but shorter to recover than a cold site.
  • A tertiary site provides an alternate in case both the primary and hot site, warm site, or cold site is unavailable.

Fail-over testing:

  • A full-interruption test involves a hard switchover from the primary facility to the alternative facility.
  • A structured walk-through test is a representative of each department or functional area thoroughly reviews the business continuity plan’s accuracy.
  • A functional drill tests a single department to see whether the department’s disaster recovery plan (DRP) is complete.
  • An evacuation drill has personnel follow the exiting or shelter-in-place guidelines for a particular disaster type.

Fire extinguisher classes:

  • Class A - ordinary combustibles.
  • Class B - flammable liquids and flammable gases.
  • Class C - electrical equipment.
  • Class D - combustible metals.
  • Class K - cooking oil or fat.

A dry pipe system (filled with pressurized air. Preaction extinguisher pipe sprinkler heads holds a thermal-fusible link that melts before the water is released. This is currently the recommended system for a computer room.

Locks:

  • A warded lock has a spring-loaded bolt with a notch in it. The lock has wards or metal projections inside the lock with which the key will match and enable opening the lock.
  • A tumbler lock has more moving parts than the warded lock, with the key raising the lock metal piece to the correct height.
  • A combination lock requires rotating the lock in a pattern, which if correct lines up the tumblers and opens the lock.
  • A cable lock has vinyl-coated steel cables that connect to the laptop and then lock around an object.

IAM

Identity provisioning life cycle: The identity must be created first. It is then configured, modified, and monitored. The account is is revoked when no longer needed.

IDaaS (Identity as a Service) Provides a set of identity and access management functions to target systems on customers’ premises and/or in the cloud.

SSO

[MINDMAP]

Shibboleth is a SAML standards-based open source software for web single sign-on and attribute exchange framework.

OAuth2 is an auth framework that enables apps to obtain limited access to user account on an HTTP service.

SAML

Access Control IAAA

  1. Identification is the act of a user professing an identity to an access control system.
  2. Authentication is the act of validating a user with a unique identifier by providing the appropriate credentials.
  3. Authorization

Accountability is not a step in access control.
Accountability is the capability of an organization to hold users responsible for their actions.

  • Remote Authentication Dial-In User Service (RADIUS) is a standard published in RFC 2138
  • Terminal Access Controller Access-Control System Plus (TACACS+) is a Cisco-proprietary method.

In a MAC (Mandatory access control) environment: VIDEO

  • a label is required for each subject and object. Each file is an object. Users are subjects. Clearance is a privilege.
  • Rule-based access control is most often used by routers and firewalls to control access to networks.
  • The dedicated mandatory access control (MAC) security mode employs a single classification level.
  • In the system high mandatory access control (MAC) security mode, all users of the system have the same security clearance but do not all possess a need-to-know clearance for all the information in the system.
  • In dedicated security mode, all users can access all data, but they must sign a nondisclosure agreement (NDA) and be formally approved for access on a need-to-know basis.
  • In multilevel security mode allows two or more classification levels of information to be processed at the same time.
  • In the compartmented security mode, all users must possess the highest security clearance (as in both dedicated and system high security), but they must also have a valid need-to-know clearance, a signed NDA, and formal approval for all information to which they have access.

MFA (Multi-Factor Authentication) types:

  • Type 1 – Something You Know (remember)– includes passwords, PINs, combinations, code words, or secret handshakes. Anything that you can type, say, do, perform, or otherwise recall when needed falls into this category.

  • Type 2 – Something You Have (possssion) – includes all items that are physical objects, such as keys, smart phones, smart cards, USB drives, and TOTP token devices. (A token device produces a time-based PIN or can compute a response from a challenge number issued by the server.).

  • Type 3 – Something You Are (characteristic) – includes any part of the human body that can be offered for verification, such as fingerprints, palm scanning, facial recognition, retina scans, iris scans, and voice verification.

A password and pin combo includes only a single knowledge authentication factor type, so is not 2FA.

A capability table lists the access rights that a particular subject has to objects.

PIV (Personal Identity Verification) card, call “CAC” card by the US military. https://piv.idmanagement.gov/ Derived PIV credentials stored securely on mobile device in a TPM.

Type 2 Have Smart Cards

The user private key encrypts a challenge regnerated by the computer.

Type 3 Are Biometrics

Facial recognition:

  • In an eigenfaces facial scan, measurements of facial components are gathered and compared to a set of standard eigenfaces.
  • In an eigenfeatures facial scan, the distances between the facial features are measured and recorded.

  • In an iris scan, the colored portion of the eye, including all rifts, coronas, and furrows, are analyzed.
  • In a retina scan, blood vessel patterns are analyzed.
  • Vascular scan

  • Keystroke dynamics
  • Signature dynamics

A characteristics factor for authentication?

Biometric Errors:

  • A Type I error is false rejection rate (FRR) increases with sensitivity
  • A Type II error is false acceptance rate (FAR) reduces with sensitivity
  • Crossover error rate (CER) is the point at which FRR equals FAR.
  • Throughput rate is the rate at which users are authenticated.

Desktop sessions can be managed through screensavers, timeouts, logon, and schedule limitations. Federal Information Processing Standards (FIPS) Publication 201.2 and NIST Special Publication 800-79-2 are documents that provide guidance on proof of identity. In Kerberos, the Key Distribution Center (KDC) issues a ticket-granting ticket (TGT) to the principal. The principal sends the TGT to the ticket-granting service (TGS) when the principal needs to connect to another entity.

In a MAC environment, each subject and object is given a label.

  • The term for a file in a mandatory access control (MAC) environment is an object.
  • The term for a user in an MAC environment is a subject.
  • The term for a clearance in a MAC environment is a privilege.

DAC controls are determined by the data owner.

RBAC uses roles to provide access to the data.


Networking: OSI (Open System Interconnect)

[MINDMAP]

Memomnic: Please Do Not Throw Sausage Pizza Away or All People Seem To Need Data Processing

PDUs (Process Data Units)

  1. Physical bits - Signal through cable hubs, Repeaters, Amplifiers, patch panels
  2. Data Link frames - MAC address, Logical Link control switching through Ethernet Bridges
  3. Network packets - Fragment logical addressing routers in IP headers IPv4, IPv6, BGP, OSPF
  4. Transport segments - Adds protocol for end-to-end TCP, UDP, SSL, TLS ports sockets (no hardware)
  5. Session data - RPC, tunneling makes a communication session between a service or application on the source device possible with the same service or application on the destination device.
  6. Presentation data - file format operating system, encryption
  7. Application data - encapsulation of content HTTP, FTP, SSH, SMTP, API Gateways, Proxy servers doing conversions. It receives the raw data from the application in use and provides services, such as file transfer and message exchange to the application

Access control lists (ACL) are typically used on routers, which map to layer 3 of the OSI model. The Link layer of the TCP/IP model corresponds to the Data Link and Physical layers of the OSI model. The Transport layer of the TCP/IP model corresponds to the Transport layer of the OSI model.

OSI Resources:

  • https://www.youtube.com/watch?v=G7aVKgGUe9c by Professor Messer has graphic illustrations, using WireShark to display details
  • https://www.youtube.com/watch?v=HEEnLZV2wGI by Kelly Handerhan uses an analogy of a letter being sent among two buildings where each floor is a layer of the OSI stack.
  • https://www.youtube.com/watch?v=H6Jy-P_iFmo by Skillset
  • https://www.youtube.com/watch?v=HEEnLZV2wGI by Eli the computer guy on a whiteboard is a bit repetitive
  • https://www.youtube.com/watch?v=LANW3m7UgWs by CertBros Real World Example https://www.youtube.com/watch?v=LANW3m7UgWs&list=PLF1hDMPPRqGxpYdo0ctaa7MxfOi9vjs1u&index=3
  • https://www.youtube.com/watch?v=Ilk7UXzV_Qc by RealPars

Point-to-Point Tunneling Protocol (PPTP) encapsulates the original LAN packet with another header and trailer, while encrypting the original packet.

Address Resolution Protocol (ARP) resolves IP addresses to MAC addresses. Between layer 2 and 3. RAP (Reverse Address Protocol) resolve MAC address to IP addresses.

Network File System (NFS) is a client/server file-sharing protocol used in UNIX/Linux.

Fibre Channel over Ethernet (FCoE) encapsulates Fibre Channel frames over Ethernet networks.

CSMA/CD (Carrier-sense multiple access with collision detection) Ethernet

Network Address Translation (NAT) was originally designed for IPv4 address conservation, for private IP networks to use unregistered IP addresses to connect to the Internet. The NAT service can operate on a router or by a server to connect two networks together, and translates the private (not globally unique) addresses in the internal network into legal addresses, before packets are forwarded to another network. For additional security, NAT in remote-access environments can be configured to advertise only one address for the entire network to the outside world. (??? Static Address, Dedicated Address, Port Address)

DNP3 is a multilayer protocol used between components in process automation systems in electric and water companies.

IPv4 uses 32 bits.
IPv6 uses 128 bits, has built-in IPSec. Sends Solicited Node (ICMP) Multicast Address unicast to a single node to resolve MAC addr. concatenated with 104-bit addr. SLAAC (StateLess Address Auto Configuration) to auto configure based on network prefix.

Private addresses: REMEMBER: VIDEO QUZ

  • Class A 10.x.x.x (to 10.255.255.255)
  • Class B 172.16.x.x (to 172.31.255.255)
  • Class C 192.168.x.x (to 192.168.255.255) in range of addresses is from 192.0.0.0 to 223.255.255.255.

802.11ac includes multi-user multiple-input, multiple-output (MU MIMO).

High-Data-Rate Digital Subscriber Line (HDSL) can achieve 1.544 Mbps each way over two copper twisted pairs.

Secure HTTP (S-HTTP) encrypts only a single message. Hypertext Transfer Protocol Secure (HTTPS) establishes a session using a digital certificate and encrypts an entire session. Secure Electronic Transaction (SET) secures credit card transaction information over the Internet.

Internet Protocol Security (IPsec) protects data transmitted over a VPN. HMAC (Hashed Message Authentication Code), used by TLS, includes a symmetric key to provie data integrity and data origin auth.

TLS 1.3 server cert. is encrypted when sent to client, which hides the name of the server.

In 2016, DROWN vulnerability (Decrypting RSA with Obsolete and Weakened eNcryption) by taking advantage of backward compatibility to force insecure SSLv2 connection downgrade from TLS. So disable obsolete protocol downgrading.

Implementing an IPS is more expensive than implementing an IDS.

  • IPS (intrusion prevention system) is a network device that detects a network intrusion and prevents the network intrusion.
  • IDS (An intrusion detection system) is a network device that detects network intrusion attempts and either logs the intrusion or contacts the appropriate personnel.

    >

Network access control (NAC) ensures that the computers on the network meet an organization’s security policies. A virtual private network (VPN) is a private network that users can connect to over a public network. Internet Protocol Security (IPsec) is a protocol that secures IP communication over a private or public network. A demilitarized zone (DMZ) is a section of a network that is isolated from the rest of the network with firewalls.

Frame Relay and X.25 are packet-switched technologies.

DSL:

  • Symmetric DSL (SDSL), data travels in both directions at the same rate.
  • Asymmetric DSL (ADSL) provides faster download speed than upload speed.
  • High Bit-Rate DSL (HDSL) offers speeds up to 1.544 Mbps over regular UTP cable.
  • Very High Bit-Rate DSL (VDSL) is capable of supporting high-definition TV (HDTV) and VoIP.

DSA (Digital Signature Algorithm) - US standard

Network Penetration test

[MINDMAP]

Penetration test methodology - To simulate an attack on a system or network to evaluate the risk profile of an environment

  1. Reconnaissance
  2. Enumeration
  3. Vulnerability Analysis
  4. Execution/Exploitation
  5. Document Findings

Firewalls

A three-legged firewall uses three interfaces, one connected to the untrusted network, one to the internal network, and another to a DMZ.

A kernel proxy firewall is an example of a fifth generation firewall. It inspects the packet at every layer of the OSI model but does not introduce the performance hit that an application layer firewall will because it does this at the kernel layer.

  • A stateful firewall forwards packets on behalf of the client. It examines each packet and permits or denies it passage based on many factors, including the state table.
  • A proxy firewall hides a packet’s true origin before sending it through another network.
  • BA packet-filtering firewall forwards packets based on rules that define which traffic is permitted and denied on the network.
  • A bastion host is a hardened machine that usually resides on a demilitarized zone (DMZ) open to the public.

Resources

Miscellaneous

An AUP (acceptable use policy) details appropriate use of information systems, handling standards, monitoring, and privacy expectations.

https://thorteaches.com/the-memory-palace-prashant-mohan/ https://thorteaches.com/wp-content/uploads/2021/06/The-Memory-Palace-CISSP-by-Prashant-Mohan-4th-edition.pdf One large PDF of what to remember while taking the CISSP exam.

###

Open-source intelligence feeds:

  • Malware Information Sharing Project (MISP)
  • AT&T Security (Alien Vault Open Threat Exchange)
  • Spamhaus
  • SANS ISC Suspicious Domains, VirusTotal, an
  • NCAS by US0CERT

Closed-source or proprietary intelligence sources:

  • IBM X-Force Exchange
  • Recorded Future
  • FireEye

Incident Response (DFIR)

tcpdump options:

  • -e includes the ethernet header during packet capture
  • -n flag shows the IP addresses in numeric form
  • -nn shows IP addresses and ports in numeric format
  • -X captures the packet’s payload in hex and ASCII formats

Forest Monsen and Kevin Glisson in Netflix’s Security Intelligence and Response Team (SIRT):

  • open-sourced their “Diffy” Differencing Engine for Digital Forensics in the Cloud tool, which include “osquery” to collect and retain a functional baseline against comparison with all running instances. See https://diffy.readthedocs.io/

  • open-sourced their “Dispatch” crisis management orchestration tool, which leverages existing familiarity with existing tools used throughout an organization (Slack, GSuite, Jira, etc.). Dispatch focuses on managing metadata (incident context) about responses and resources, assembling participants, sending out notifications, tracking tasks, assisting with post-incident reviews, etc. The system builds on past incidents to speed up the resolution of future incidents. It’s made using Python, VueJs, Postgres. Available as a Docker image. See https://hawkins.gitbook.io/dispatch/

UEBA (User and Entity Behavior Analytics), such as Splunk and Microsoft Advanced Threat Analysis provides automated id. of suspicious activity by user accounts and computer hosts, using AI/ML techniques.

More on Security

This is one of a series on Security in DevSecOps:

  1. Git Signing
  2. Hashicorp Vault

  3. WebGoat known insecure PHP app and vulnerability scanners
  4. Test for OWASP using ZAP on the Broken Web App

  5. Encrypt all the things

  6. AWS Security (certification exam)
  7. AWS IAM (Identity and Access Management)

  8. Cyber Security
  9. Security certifications