Operations Security CISSP Guide to Security Essentials Chapter

  • Slides: 67
Download presentation
Operations Security CISSP Guide to Security Essentials Chapter 7

Operations Security CISSP Guide to Security Essentials Chapter 7

Objectives • Applying security concepts to computer and business operations • Records management security

Objectives • Applying security concepts to computer and business operations • Records management security controls • Backups • Anti-virus software and other anti-malware controls

Objectives (cont. ) • Remote access • Administrative management and control of information security

Objectives (cont. ) • Remote access • Administrative management and control of information security • Resource protection • Incident management

Objectives (cont. ) • High availability architectures • Vulnerability management • Change management and

Objectives (cont. ) • High availability architectures • Vulnerability management • Change management and configuration management • Operations attacks and countermeasures

Applying Security Operations Concepts

Applying Security Operations Concepts

Security Operations Concepts • Need to know • Least privilege • Separation of duties

Security Operations Concepts • Need to know • Least privilege • Separation of duties • Job rotation • Monitoring of special privileges

Security Operations Concepts (cont. ) • Records management controls • Backups • Anti-virus and

Security Operations Concepts (cont. ) • Records management controls • Backups • Anti-virus and anti-malware • Remote access

Flow of Control • From chapter 1 1. Policy 2. Guidelines 3. Processes 4.

Flow of Control • From chapter 1 1. Policy 2. Guidelines 3. Processes 4. Procedures 5. Recordkeeping

Need to Know • Individual personnel should have access to only the information that

Need to Know • Individual personnel should have access to only the information that they require in order to perform their stated duties • Independent of security clearance • This reduces risk, but can be an administrative burden

Least Privilege • Users should have the fewest or lowest number of privileges required

Least Privilege • Users should have the fewest or lowest number of privileges required to accomplish their duties • Independent of security clearance

Separation of Duties • High-value or high-risk tasks require two or more different individuals

Separation of Duties • High-value or high-risk tasks require two or more different individuals to complete • Examples – Open a bank vault – Issue an arrest warrant – Provision a privileged-access computer account – Change a firewall rule

Job Rotation • Move individual workers through a range of job assignments • Reduces

Job Rotation • Move individual workers through a range of job assignments • Reduces monotony, risk • Reduces likelihood that employees will perform inappropriate or illegal actions if they fear being caught when next job rotation occurs

Monitoring of Special Privileges • Privileged users have more power • Mistakes have greater

Monitoring of Special Privileges • Privileged users have more power • Mistakes have greater impact • Record activities – Network administrator – System administrator – Database administrator – Application administrator

Records Management Controls • Data classification • Access management • Records retention • Backups

Records Management Controls • Data classification • Access management • Records retention • Backups • Data destruction

Data Classification • Establish sensitivity levels • Establish handling procedures for each level –

Data Classification • Establish sensitivity levels • Establish handling procedures for each level – Creation, storage, transmittal, destruction

Access Management • Policies, procedures, and controls that determine how information is accessed and

Access Management • Policies, procedures, and controls that determine how information is accessed and by whom – User account provisioning – Privilege management – Password management – Review of access rights – Secure log on

Records Retention • Policies that specify how long different types of records must be

Records Retention • Policies that specify how long different types of records must be retained (minimums and maximums) • Manage risks related to business records – Risk of compromise of sensitive information – Risk of loss of important information – E-Discovery – Regulation

Backups • Protection against loss due to malfunctions, failures, mistakes, and disasters • Activities

Backups • Protection against loss due to malfunctions, failures, mistakes, and disasters • Activities – Data restoration – Protection of backup media – Off-site storage of backup media

Data Restoration • Periodic testing to ensure that data that is backed up can

Data Restoration • Periodic testing to ensure that data that is backed up can be restored – Same computer – Different computer • Best way to prove that backups are being performed properly

Protection of Backup Media • Backup media contains sensitive information • Requires same level

Protection of Backup Media • Backup media contains sensitive information • Requires same level of control as original information • Keep in locked cabinets – Least privilege and need to know

Offsite Storage of Backup Media • Reduce risk of loss of backup media in

Offsite Storage of Backup Media • Reduce risk of loss of backup media in the event of a disaster that destroys data center – Fire, flood, sabotage • Factors – Distance from business location – Security of transportation – Security of storage center – Resilience of storage center against disasters

Data Destruction • Purpose: ensure that discarded information is truly destroyed and not salvageable

Data Destruction • Purpose: ensure that discarded information is truly destroyed and not salvageable by either employees or outsiders

Data Destruction (cont. ) • Once information has reached the end of its need,

Data Destruction (cont. ) • Once information has reached the end of its need, its destruction needs to be carried out in a manner that is proportional to its sensitivity – Degaussing – Shredding – Wiping

Anti-virus and Anti-malware • Effects of uncontrolled malware – Loss of business information –

Anti-virus and Anti-malware • Effects of uncontrolled malware – Loss of business information – Disclosure or compromise of business information – Corruption of business information – Disruption of business information processing – Inability to access business information – Loss of productivity • Apply defense in depth to protect assets • Central anti-malware management

Remote Access • Connectivity to a network or system from a location away from

Remote Access • Connectivity to a network or system from a location away from the network or system, usually from a location apart from the organization’s premises • Usually through a VPN

Remote Access (cont. ) • Improves productivity by permitting employees to access business information

Remote Access (cont. ) • Improves productivity by permitting employees to access business information from any location • Risk mitigation – Encryption, strong authentication, anti-malware, firewall

i. Clicker Questions

i. Clicker Questions

Which security operation concept does "User Account Control" implement? A. B. C. D. E.

Which security operation concept does "User Account Control" implement? A. B. C. D. E. Need to know Least privilege Separation of duties Anti-virus and anti-malware Remote access

What security concept makes confidential information less likely to leak out, but can make

What security concept makes confidential information less likely to leak out, but can make normal business slow and complex? A. B. C. D. E. Need to know Least privilege Separation of duties Job rotation Monitoring of special privileges

Which security concept includes labeling files as "confidential" or "unclassified"? A. B. C. D.

Which security concept includes labeling files as "confidential" or "unclassified"? A. B. C. D. E. Need to know Least privilege Monitoring of special privileges Records management controls Backups

When an administrator shuts down a server, this box appears, asking why the server

When an administrator shuts down a server, this box appears, asking why the server is being shut down. Which security principle does this implement? A. B. C. D. E. Need to know Least privilege Separation of duties Job rotation Monitoring of special privileges

Administrative Management and Control

Administrative Management and Control

ISO 27001 • Widely accepted model for top-down security management – – – –

ISO 27001 • Widely accepted model for top-down security management – – – – – Define scope and boundaries Establish a security policy Risk assessments Establish control objectives and activities Security awareness and training Allocate resources Internal audits Monitor and review the security program Enact continual improvement

Types of Controls • Technical – Such as firewalls and antivirus software • Physical

Types of Controls • Technical – Such as firewalls and antivirus software • Physical – Locks, guards, etc. • Administrative – Such as policies and audits • See link Ch 7 a for a good discussion, and link CISSP 12 for good whitepapers on all ten CISSP domains

Categories of Controls • Detective • Deterrent • Preventive • Corrective • Recovery •

Categories of Controls • Detective • Deterrent • Preventive • Corrective • Recovery • Compensating

Employing Resource Protection

Employing Resource Protection

Resource Protection • Facilities – Water and sewage – Electricity – Fire alarms and

Resource Protection • Facilities – Water and sewage – Electricity – Fire alarms and suppression – Environmental controls – Communications – Security controls

Resource Protection (cont. ) • Hardware – Servers – Workstations – Network devices –

Resource Protection (cont. ) • Hardware – Servers – Workstations – Network devices – Wireless networks – Printers, copiers – Cabling

Resource Protection (cont. ) • Software requires control and management – Licensing – Access

Resource Protection (cont. ) • Software requires control and management – Licensing – Access control – Source code (preventing disclosure) • Intellectual property • Security – Source code control • Software development lifecycle

Resource Protection (cont. ) • Documentation – May contain trade secrets and sensitive information

Resource Protection (cont. ) • Documentation – May contain trade secrets and sensitive information – Processes, procedures, and instructions – Version control – Access control

Incident Management

Incident Management

Incident • An Incident is – An unexpected event that results in an interruption

Incident • An Incident is – An unexpected event that results in an interruption of normal operations • A Security Incident is – An event in which security policy has been violated OR – Unauthorized access to a system or information OR – An event that prevents legitimate access to a system or information

Incident Management • Incident declaration • Triage • Investigation • Analysis • Containment •

Incident Management • Incident declaration • Triage • Investigation • Analysis • Containment • Recovery • Debriefing – See chapter 6 for details

High Availability Architectures

High Availability Architectures

Fault Tolerance • Makes devices less prone to failure – Multiple power supplies –

Fault Tolerance • Makes devices less prone to failure – Multiple power supplies – Multiple network interfaces – Multiple processor units – RAID (Redundant Array of Inexpensive / Independent Disks)

Clustering • A group of two or more servers that operate functionally as a

Clustering • A group of two or more servers that operate functionally as a single logical server • Active-active mode • Active-passive mode – Failover: when active status is transferred • Geo-cluster – servers located at great distances from one another

Replication • Data changes are transmitted to a counterpart storage system • An adjunct

Replication • Data changes are transmitted to a counterpart storage system • An adjunct to clustering, makes current data available to all cluster nodes

Business Continuity Management • A management activity where analysis is performed to better understand

Business Continuity Management • A management activity where analysis is performed to better understand the risks associated with potential disaster scenarios, and the steps that can be taken to reduce the impact of a disaster should one occur

Vulnerability Management

Vulnerability Management

Vulnerability Management • Penetration testing • Application scanning • Patch management • Code reviews

Vulnerability Management • Penetration testing • Application scanning • Patch management • Code reviews

Penetration Testing • A scan of many or all TCP / IP “ports” on

Penetration Testing • A scan of many or all TCP / IP “ports” on one or more target systems – Followed by locating and exploiting vulnerabilities • Mimics the actions of a hacker who scans a system or network for active, exploitable ports and services

Application Scanning • The process of performing security tests on an application (usually, but

Application Scanning • The process of performing security tests on an application (usually, but not always, a web-based application) in order to find vulnerabilities in the application code itself

The ‘new’ OWASP Top Ten (2010 rc 1) http: //www. owasp. org/index. php/Top_10

The ‘new’ OWASP Top Ten (2010 rc 1) http: //www. owasp. org/index. php/Top_10

Code Reviews • Manual and automated inspections of software source code – Examine and

Code Reviews • Manual and automated inspections of software source code – Examine and validate approved changes – Detection of inappropriate changes, unsafe code, security issues

Patch Management • The process – usually assisted with management tools – to manage

Patch Management • The process – usually assisted with management tools – to manage the installation of patches on target systems • Reduces risks associated with malware, hacking attacks that exploit weaknesses – Don't just put on all available patches – Analyze and test them first and only put on the ones that pass a risk analysis

Change Management

Change Management

Change Management • Prepare the change • Circulate and review the change • Discuss

Change Management • Prepare the change • Circulate and review the change • Discuss and agree to the change • Perform the change • Recordkeeping

Configuration Management

Configuration Management

Configuration Management • Configuration of hardware, software components • Configuration management database (CMDB) •

Configuration Management • Configuration of hardware, software components • Configuration management database (CMDB) • Automated tools

Operations Attacks and Countermeasures

Operations Attacks and Countermeasures

Attacks on Operations • Social engineering • Sabotage • Theft and Disappearance • Extortion

Attacks on Operations • Social engineering • Sabotage • Theft and Disappearance • Extortion • Bypass – Circumventing security measures • Denial of service

i. Clicker Questions

i. Clicker Questions

The Army banned all use of USB flash drives. What category of control was

The Army banned all use of USB flash drives. What category of control was this? A. B. C. D. E. Technical Physical Administrative Detective Corrective

What type of control is a burglar alarm? A. B. C. D. E. Detective

What type of control is a burglar alarm? A. B. C. D. E. Detective Deterrent Preventive Corrective Recovery

After a security incident is declared, a security officer interviews employees in the affected

After a security incident is declared, a security officer interviews employees in the affected department to quickly identify clues that may help understand what happened. Which process is being performed? A. B. C. D. E. Triage Investigation Analysis Containment Recovery

A data entry worker threatened to post confidential medical records on the Internet and

A data entry worker threatened to post confidential medical records on the Internet and demanded money. What sort of attack was that? A. B. C. D. E. Social engineering Sabotage Theft and Disappearance Extortion Bypass

This license plate is intended to protect the driver from automated ticketing cameras. What

This license plate is intended to protect the driver from automated ticketing cameras. What vulnerability would make this possible? A. B. C. D. E. Injection XSS CSRF Insecure cryptography Unvalidated redirects