CySA+ Study Guide Public
CySA+ Study Guide Public
This guide is brief on purpose. This guide is an excellent resource to review information, to be
reminded of terms you’ve learned about but may have forgotten, and to understand how to
mentally organize the information so you can recall it easier.
This guide is thorough, but incomplete. I follow along very closely to Jason Dion's Udemy
Course, which as a consequence means this guide has some of the same weaknesses as his
course. I supplemented missing information with my own independent research, and the Sybex
textbook where I could, but there was a lot to learn and I didn’t have time to write every little bit
down.
A Note On the Test: CySA+ was much harder than I expected, easily the hardest CompTIA
test I’ve taken yet. You should absolutely take time to review both my Security+ study guide and
my Network+ study guide. The CySA might as well include all of their objectives on their test,
and I found myself frequently blindsided by topics that I hadn’t seen since taking Net+.
I really hope this guide helps you pass the test. I know not everyone likes to take notes while
they read, but it helps me process information quickly, and it allows me to give back to the IT
community in some small way.
If you really appreciate this study guide and found it useful, why not buy me a coffee?
You can send a few dollars my way at paypal.me/electricintheforest if you feel so inclined, and if
you guys are generous enough, I’ll put that money to more certifications and keep building out
study guides as I go.
Please Upvote This Guide on Reddit for Visibility! And feel free to share!
CySA Broad Strokes
● Cybersecurity Analysis
○ Threat Detection
○ Data Analysis
○ Securing and Protecting Apps and Systems
● Four Domains
○ Threat Management
○ Vulnerability Management
○ Cyber Incident Response
○ Security Architecture and Tools
● CySA is for those who want to stay Technical, rather than the managerial track of CASP
○ This can actually improve the Managerial Track - by ensuring a foundation of
technical skills.
Threat Management
Broad Strokes
● Identifying Threats
● Network Security Measures
● Understanding Response and Countermeasures
● Threats, Vulnerabilities, and Risk
● Footprinting and Recon
● Threats to Confidentiality, Integrity, and Availability
● Controls to secure networks and endpoints
● Evaluation of Security Controls
● Information Gathering (passive and active)
CIA Triad
● Seem familiar?
● Confidentiality - Integrity - Availability
● Confidentiality
○ How secure is info?
○ How secure does it need to be?
■ Public data should be public, but PII needs to be secure
○ Physical Protection
■ Doors, fences, security guards and cameras
○ Electronic Protection
■ Encryption, passwords, authentication, and firewalls
● Integrity
○ How correct is the information?
○ Has it been modified or corrupted?
■ Hashing and checksums help monitor and verify
● Availability
○ Is data always user-accessible?
○ Redundancy in storage, power, and transit helps improve availability
○ Backup strategies and disaster recovery alleviate problems
● CIA values don’t need to be balanced. They must instead be designed around the needs
of the system.
○ Sometimes availability is more important that integrity - such as for public info.
● Security v. Operations
○ Security can interfere with functionality.
○ Sometimes you have to increase risk to improve usability - again, focus on the
system’s needs.
■ An unplugged device in a cement cube in the ocean is secure, but how
useful is it, really?
Risk Consideration
● Risk is the centerpoint of another triad: Threats, Vulnerabilities, and Assets.
○ If you have nothing worth stealing, you’ve got no risk.
○ If your system is flawless (cement cube in the ocean), there are no vulnerabilities.
○ If nobody wants your assets or has the means to go after them, you’re free from
threats.
● Assets
○ Information or Data
○ Network equipment
○ Servers/Computers
○ Software
○ Personnel
○ Processes
● Vulnerabilities
○ Any weakness in a system design, such as a bug, that allows an attacker
physical or digital access
○ These weaknesses are internal factors. Patches, or additional security guards,
can cover those weaknesses.
■ Sometimes a weakness is out of your control - such as when using
proprietary software.
■ Your job is to compensate for those weaknesses
● Threats
○ Any condition that can cause harm, loss, damage, or compromise of an asset
○ Natural disasters, cyber attacks, or malware
○ These threats do not have to be intentional - mother nature is dangerous as well,
and accidents happen.
○ Your job is to cover vulnerabilities appropriate to your threats - NOT to defeat the
the threat itself.
■ You don’t have to worry about Quantum Computers brute force hacking
through your system if… Quantum Computers don’t exist.
Risk Assessment
● Should be performed regularly to understand existing threats, vulnerabilities, and the
appropriate mitigations.
● NIST SP 800-30 is a framework to properly perform these assessments based on
current technology
○ Prepare for Assessment
○ Conduct Assessment
■ Identify Threats and Events
■ Identify Vulnerabilities
■ Determine Likelihood of Occurrence
■ Determine Magnitude of Impact
■ Determine Risk
○ Communicate Results
○ Maintain Assessment
Identifying Threats
● Adversarial Threats
○ Consider capability, intent, and likelihood
○ Customers, foreign governments, suppliers, and competitors can all be
considered
● Accidental Threats
○ Mistakes that hurt the security of the system
○ Fat-fingering (mistyping)
○ Accidentally taking a device home
○ Accidentally hitting a kill-switch, power button, fire-alarm, etc
● Structural Threats
○ Equipment, software, or environmental control failure
○ Hard drive failure, overheating, bugs and crashes
○ ST’s are the reason redundancy is key!
● Environmental Threats
○ Natural or man-made disasters
○ Fires, floods, storms, loss of power, wire-cuts, etc
○ Another good reason for backups and redundancy
● Remember: Threats go beyond “attackers.” Disgruntled employees, accidents, and bugs
can all cause asset loss or compromise security
● Risks change!
○ Quantum Computers aren’t a threat now, but they may be in a few years, and
they’ll drastically shift vulnerabilities.
Identifying Vulnerabilities
● Largely internal
● If you have a threat without a vulnerability - it isn’t a risk.
○ Snowstorms are a threat… but not in Florida.
○ A Windows XP vulnerability is a threat… but not to a company that only uses
IOS.
Risk Controls
● Acceptance
○ When risk is low, and/or countermeasures are expensive
○ A high risk that’s been largely mitigated can then be accepted
● Avoidance
○ When risk is too expensive, and you completely avoid vulnerability
○ XP is no longer supported, so you move your company to Windows 10.
● Mitigation
○ Minimizing risk down to acceptable levels
○ Closing vulnerable ports, patching bugs, etc.
○ Everytime you drive, you take some risk. But if you wear you’re seatbelt and drive
the speed limit, you’ve mitigated the risk.
● Transference
○ The risk is unavoidable, but you don’t want it
○ Insurance companies, basically.
○ Data Breach Protection Insurance - get paid back if you fall victim of cyber attack
● Technical Controls
○ Firewalls, IDS, IPS, antivirus, and endpoint security
● Operational Controls
○ Policies, pentest, SOPs, settings, and configurations
Penetration Testing
● Simulated cyber attack to test your defenses and vulnerabilities
● Goal is to gain access to your systems and report findings
● Pentesters
○ Company may have a dedicated Red Team
○ External Consultants
○ Requires highly skilled individuals
○ Time intensive and costly
● Phases
○ Planning
■ Read through resumes
■ News articles, open source content, etc
■ Do not touch the network
■ Figure out Timing, Scope, and Authorization with the owner of the
network you’re testing
○ Discovery
■ Port scanning, enumeration, vulnerability scanning, web app scanning
■ Plan around vulnerabilities
○ Attack (Exploitation)
■ Exploit vulnerabilities, loop back to discovery for further vulnerabilities
■ Gain Access
■ Escalate Privileges
■ Jump from System to System
■ Install Additional Tools
○ Reporting
■ Explain your findings after you’ve gone deep as you can
■ Describe successful tests, and possible solutions
■ List secure assets as well!
■ Prioritized based on risk posed by vulnerability
● Don’t PenTest without permission unless you wanna go to prison, dummy
Reverse Engineering
● Taking a finished product and dismantling it until you understand its inner workings and
components
● Dynamic Analysis
○ Launch malware in virtualized environment and see what it does
○ What ports does it communicate on?
○ What websites does it reach for?
○ Some Automated systems can use dynamic analysis to check for malware in
attachments, emails, etc
○ Quickest way to discover the EFFECTS of malware
● Static Analysis
○ Analysis of the code of the malware
○ Easy if code is in interpreted language like Python or Ruby
○ Difficult with compiled code like C/C++ or Java
■ Requires a decompiler or binary for compiled code
● Hardware Reverse Engineering
○ Difficult due to device firmware
○ Usually use dynamic analysis
○ Hardware should come from a trusted source to ensure security
○ Refurbished or second-hand devices can be compromised with bad firmware
Regulatory Requirements
● Ooh boy isn’t this a fun one
● HIPAA, GLBA, FERPA - govern info storage and processing
● PCI DSS, FISMA - require vulnerability management program
● All set out requirements based on the kind of business you do and the data you handle
● Corporate Policy can mandate additional requirements
Scanning
● Scan Targets
○ What do you scan, and why?
■ All systems, or merely critical?
■ Time and effort
○ What tools do you use?
■ QualysGuard can be used to build an automatic asset inventory
■ Admins can take that asset inventory and set priorities for scans
● Scan Frequency
○ Continuous, daily, weekly, yearly?
○ Determined by goals, requirements, and capacity
○ Automated reports can save time and effort
■ Tenable’s Nessus Vulnerability Scanner
■ Automatically identifies vulnerabilities
● Scanning Tools
○ QualysGuard
■ Port scans, vulnerability scans, scheduling, asset management, etc
○ Nessus
■ Port scans, vulnerability scans, scheduling, asset management, etc
■ Has default policies to meet certain regulatory requirements
○ Nexpose
■ Port scans, vulnerability scans, scheduling, asset management, etc
○ OpenVAS
■ Open-source, low cost, good for home network security
○ Nikto
■ Web Application Scanner
■ Other tools are good on the database and network, but Nikto supplements
by looking at the code of the app
○ Microsoft’s Baseline Security Analyzer
■ Client-side to monitor for updates, registry changes, firewall, hashing, etc
■ Home use, not effective for central network scan
○ Be prepared to recognize these products, more than their details!
● Scanning Scope
○ What networks and systems are covered
○ What tests are performed on each asset
○ Staff and management should know what/when is being scanned
○ Minimizing the Scope
■ Network segmentation allows you to scan smaller clusters to achieve
regulation compliance
● If only one machine is processing credit cards, only it needs to
meet PCI DSS standards IF you segment it properly
■ Increases security, and decreases labor
● Configuring Scans
○ Scheduling
○ Producing reports
○ Authenticated Access for Scans
○ Plugins and Scan Agents
○ Scan perspective: internal v external
● Scanning Sensitivity
○ Anyone else think scope, targets, and sensitivity overlap hard?
○ Certain targets, such as production environments, require lighter scans or safe
scans to prevent taking them down during production hours
○ Some scans can disrupt systems or cause loss of data
○ Plugins can be grouped by “family” to focus on certain environments
○ Templates can be used to group settings and plugins for certain
situations/environments/times.
■ Useful if you have a light weekly scan, and a heavier monthly scan, etc
■ Prevents config errors
○ Nessus has default policies to meet certain regulatory requirements
● Scanning Perspective
○ Insider threat viewpoint
○ Attacker threat viewpoint
○ Different perspectives may highlight different issues
○ Some regulatory bodies require both internal AND external scans
○ Useful to get the internal worked out before you hire an external group
● Authenticated/Credentialed Scanning
○ What Rights does the scanner have while traversing servers, apps, firewalls, etc
○ Without credentials, scanner can appear as an attacker
○ Scanner should have read only rights so that if it becomes compromised, it's still
limited
○ Agent-Based Scanning
■ Install agent on each client to provide an “inside-out” perspective of
vulnerabilities
■ Data then sent to centralized server for review
■ Can be resource intensive, but provides a very detailed view
● Maintaining Scanners
○ Scanners must be updated before use
○ They can become vulnerable themselves, but also need the latest signatures to
catch up-to-date threats
○ Vulnerabilities are unavoidable, but can be managed
● Other Considerations:
○ Organizational Risk Appetite
■ How much risk are you willing to handle?
■ Determines scan frequency
○ What Regulatory Requirements do you have?
○ How long does a scan take can determine how often you can scan.
○ Scans may be limited to evening hours due to network latency during business
hours
○ Licensing Limitations: How many scanners are you paying for?
● Best Practices:
○ Start small - core assets
○ Expand slowly - add scope and monitor the expense
○ Prevent overwhelming the enterprise system, network, and sysadmin team
Remediation
● Standardizing Vulnerabilities
○ SCAP - Security Content Automation Protocol
■ Led by NIST SP 800-117
■ CCE - Common Configuration Enumeration
● Naming convention for system config
■ CPE - Common Platform Enumeration
● Standard names for products and versions
■ CVE - Common Vulnerabilities and Exposure
● Standard names for security-related software flaws
■ CVSS - Common Vulnerability Scoring System
● Standard approach for categorizing severity of software flaws
● 10 = most critical
● 1 = least critical
■ XCCDF - Extensible Configuration Checklist Description Format
● Checklist and reporting standards
■ OVAL - Open Vulnerability and Assessment Language
● Low-level testing procedures for XCCDF checklist
● Workflow for Remediation
○ Vulnerability Management Lifecycle: ...Detection -> Testing -> Remediation ->
Detection...
○ Continuous Monitoring provides for early detection
○ Automation
■ Many scanner products can automatically create tickets for remediating
detected vulnerabilities, and automatically close when vulnerability is fixed
● Vulnerability Reporting
○ Analysts need to communicate known issues to SysAdmins
○ Scanners provide detailed reporting that can automatically alert sysadmins
periodically
○ Low-priority vulnerabilities can wait, but critical must be communicated
immediately
○ Dashboards provide a high-level summary that’s easy to understand at a glance
■ Can indicate priorities, trends, etc
■ Host Overview allows you to see which hosts are most vulnerable
● Useful for allocating remediation resources
■ Overview of Criticality shows the worst vulnerabilities at the top
● Remediation Priority
○ CVSS scores and priorities can help you know what vulnerabilities are worst, but
you can’t fix everything, and some fixes cost more time, money, and resources
○ How critical is the system and the information it contains?
■ If a system has a lot of PII, financial, or classified data, it needs fixed.
■ If all the data is encrypted, it might be less dangerous if it’s accessed.
○ How difficult is it to fix the vulnerability?
■ If you can fix four vulnerabilities for the same cost as one, well… prioritize
○ How Severe is the vulnerability?
■ CVSS score helps here.
○ How exposed is a server to that vulnerability?
■ If an external facing server has a moderate vulnerability, it might pose a
greater risk than a critical vulnerability on an internal server.
○ A lot of these are judgment calls, rather than clear-cut.
● Implementing and Testing
○ Vulnerability Analysts don’t implement fixes
■ Sysadmins do.
■ Larger fixes need to be run by a Change Control Board
■ Fixes must be tested in a lab environment to ensure they don’t break
things worse
○ Analysts view fixes as the highest priority, but not everyone does
■ Fixes often must avoid causing service degradation or breaking promises
to customers
■ Scanning, patching, etc can slow, or take down systems
■ Operations and Security are always in a struggle of balance
○ MOUs and SLAs
■ Security team needs to be involved in their formulation
■ Must address scope of security needs
■ Times for scanning, patches, etc
○ IT Governance
■ Even in an emergency, it can be necessary to get higher-ups to approve
actions which will affect production to push fixes
● Go Practice with a product like Nessus
Analyzing Vulnerability Scans
● While scanners identify vulnerabilities, analysts must interpret those results
○ Eliminate False Positives
○ Identify root causes
○ Prioritize Remediation
● Parsing Reports
○ Identities
○ Synopsis
○ Description
○ See Also
■ References on the vulnerability
○ Solution
■ List of patches or contingencies for if your system is unsupported
○ Risk Factor
○ CVSS Score
■ 3.0 is newer, and not addressed on the exam. Recognize 2.0
○ STIG Severity
■ Military - cat 1 is critical, cat 3 is informational
○ References
■ Related vulnerabilities to the plugin
○ Exploitable With
■ Good way to know how prevalent the methods of attack are
○ Plugin Info
■ When the plugin to scan the vulnerability was made
○ Hosts
■ Where the vulnerability exists
Validation of Results
● Some vulnerabilities are false positives, documented exceptions, or informational
● False Positives
○ False Positive Error Rate
○ If a report says a patch is missing, check
○ Verify configs
● Documented Exceptions
○ Known-issues that you don’t plan to deal with or have properly mitigated
○ Implement exceptions in the scan so it doesn’t keep firing the alerts
● Informational Results
○ Not everything reported is a vulnerability
○ Some configs just allow attacker to perform some recon
● Compare results with other sources, like log files, config files, SIEM utilities
● Conduct Trend Analysis
○ Understand why you sometimes find more vulnerabilities (patch tuesday?)
○ Notice when sudden issues appear
Common Vulnerabilities
● There are thousands
● Five Basic Categories (the next headers)
Network Vulns
● Missing Firmware Updates
● SSL and TLS Issues
○ Must use TLS 1.2 or newer
○ Must use current, secure ciphers
○ Certificates must remain valid and uncompromised
● Domain Name Server Issues
○
● Internal IP Disclosure
○ Bad packet headers revealing information that should be hidden by NAT
● VPN Issues
○ Protocols, encryption tunnels can be vulnerable
Virtualization Vulns
● VM Escape
○ Break from the virtual machine, and reach the hypervisor (host)
○ Uncommon, but very dangerous
● Management Interface Access
○ Access to the configuration utility for virtual machines
● Virtual Host Patching
○ Host, and all guests must be patched
● Virtual Guest Issues
○ Vulnerability scans can’t stop at the host, need to check the guests as well
● Virtual Network Issues
○ Virtual firewalls, routers, and switches must be patched and scanned
Security Incidents
● Event - Any observable occurrence in a system
○ Can be good or bad - such as logon event, or incorrect password event
● Adverse Event - Any event that has a negative consequence
● Incidents - An imminent threat of violation, or a violation, of a security policy, acceptable
use policy, or security standard practice
○ Coworker logging in under your account credentials, against policy
○ Coworker downloads and installs malware
● CSIRT - Computer Security Incident Response Team
Post-Incident Activity
● Recreate a timeline of the incident
● Identify root cause of intrusion/incident
● Consult with sysadmins and management on findings
○ Utilize timeline and root-cause report to address vulnerabilities, improve
response time, evaluate response successfulness, and prevent future attacks
○ What did we do well?
○ What can we do better?
● Evidence Retention
○ Understand legal requirements for what data you retain
○ Archive whatever you need to keep, usually 2-3 years minimum
Incident Classification
● Methods of Attack
○ Removable Media
○ Attrition
■ Brute-force
○ Web
■ Web app or website
○ Email
■ Attachments or Spoofing
○ Impersonation
■ Spoofing, SQL Inject
○ Improper Usage
■ Violation of Policy
○ Loss or Theft of Equipment
○ Unknown
○ Other
■ Known origin, but not quite a category
○ APT - Advanced Persistent Threat
■ Highly funded/skilled attackers that are willing to work overtime, or wait
■ Could have access that they aren’t actively exploiting
● Severity
○ Functional Impact
■ none, low, medium, or high
○ Economic Impact
■ none, low, medium, or high
○ Recoverability Impact
■ Regular, supplemented, extended, or not-recoverable
○ Informational Impact
■ None, privacy breach, proprietary breach, integrity loss
■ OR - Regulated info breach, intellectual property breach, confidential
proprietary breach
Digital Forensics
● Determine changes, activities, or actions that have occured on a system
● Allows incident responders to determine what occured by collecting info
● Documentation
○ Must follow chain of custody and be properly handled
○ Chain of Custody is easier to maintain by having a second tech validate actions
○ Any data needs date, time, and method of collection
○ Proper handling is essential in case the incident is reported to law enforcement
● Forensic personnel should be trained and CERTIFIED for their evidence to be
admissible in court
Forensic Toolkits
● Special software and hardware for disk imaging and analysis
● Free open source versions, or very expensive versions
● Digital Forensic Workstation
○ Powerful computer for data capture and a nalysis
○ 16++ gigs of ram
○ Lots of storage, preferably RAID
■ Must be capable of containing images of MANY computers
○ Powerful CPU
● Forensic Investigation Software
○ Software to capture and analyze forensic images
○ Forensic Toolkit (FTK)
○ EnCase
○ SANS Investigative Forensic Toolkit (SIFT)
○ The Sleuth Kit (TSK)
● Write Blocker
○ Could be hardware or software
○ Ensures integrity of captured disk by preventing its data from being written to or
changed
○ Hashing improves this integrity
○ Hardware write blockers can be expensive, but are more secure
● Forensic Drive Duplicator
○ Simply copies a drive perfectly without wasting the energy of a workstation
○ Useful to have multiple if you’ve got a lot of big drives to copy
● Wiped Drives or removable media
○ Clean drives ready to receive disk images
● Cables and Drive Adapters
○ Everything’s gotta get plugged in, and you don’t know what you’ll have on-site
○ Prepare for old tech and new tech
● Digital Camera
○ Document system layout and config, labels, etc
○ Good for fixing something if you have to make hasty changes during an attack
○ Pictures back up written documentation
● Label Maker and Labels
○ You can’t just unhook stuff without keeping track of what it is, where it went, etc
● Documentation and Checklists
○ Playbooks, incident response forms, custody forms, checklists, etc
● Mobile Forensic Tools
○ SIM Card Extractor
○ Connection Cables
■ Lightning, 30-pin, USB-c, USB micro, an array of proprietary cables
○ Mobile Forensic Software
Forensic Software
● Imaging
○ FTK or EnCase or dd
○ FTK is free, and even documents chain of custody, hashes, and creates
metadata tags for analysis
○ Always create a hash, and log it, immediately after capturing an image
○ Bit by bit copies preserve slack, or blank, space, preserving file layout and
partitions
● Analysis
○ Creates timeline of system changes including hidden files and metadata changes
○ Validates files against known-good
○ Registry Analysis
○ Log file parsing and analysis
● Hashing/Validation
○ Chain of custody file integrity check
○ Should use MD5 or SHA1/SHA256
● Process and Memory Dumps
○ State of OS and currently running processes from memory
○ Difficult to collect without changing the contents
○ Can capture decryption keys
○ Hibernation files and crash dumps contain similar info
○ Tools
■ Fmem and LiME (linux)
■ DumpIt (windows)
■ Volatility Framework (Any)
■ EnCase or FTK
● Password Cracking
○ Tools like John The Ripper or Cain and Abel
○ Some passwords can take forever to be cracked
○ DOC, XLS, PPT, and ZIP files have specialized tools that can crack those
passwords
Forensic Process
1. What are you trying to find out?
2. Where would that information be?
3. Document your plan.
4. Acquire/preserve the relevant evidence
5. Perform initial analysis (log actions)
6. Conduct deeper analysis (log actions)
7. Report your findings
● Order of Volatility
○ CPU Cache, Registers, Running Processes, and Memory
○ Network Traffic
○ Hard Disk Drives and USB Drives
○ Backups, Printouts, Optical Media
● What do you do when you find something you didn’t expect?
○ Evidence of illegal activities, or activities against policy
○ Stop everything
○ Call either management, or law, if relevant.
○ Seek guidance
Target Locations
● Windows Registry
○ Information about files and services, locations of deleted files, evidence of
applications run
● Autorun keys
○ Programs set to run at startup
● MFT - Master File Table
○ Details of inactive/removed records
● Event Logs
○ Logins, services start/stop, evidence of apps being run
● INDX Files and Change Logs
○ Evidence of deleted files, Mac timestamps
● Volume Shadow Copies
○ Point-in-time information from prior copies
● User directories and files
● Recycle bin contents
● Hibernation files and memory dumps
○ Artifacts of run commands, possible encryption keys
● Temporary directories
○ Artifacts of software installs, user temporary file storage
● Removable Drives
○ System logs may indicate drives were plugging in
○ USB Historian
Incident Containment
● Containment can be quick and dirty
○ Can cause loss of business functionality
○ Coordinate with stakeholders to perform risk analysis - but quickly
● Segmentation
○ Isolate infected network segments, and try to cut them off from unaffected
segments
○ Routers and firewalls are typically the delineation marks
● Isolation or Removal
○ Remove infected segments entirely
○ Recognize you lose their function and perform cost benefit analysis
○ You can isolate segments by allowing them to continue to work, while
disconnecting them from the rest of the network
● Objective of Containment
○ Is it worse to take a system offline, or leave it running to spread infection or allow
an attacker to move further?
● Identifying Attackers
○ Is this important?
○ It might not matter as much as stopping the attack
○ It might be too expensive and difficult to be worth pursuing - especially if that’s
not your business goal
○ Law enforcement might be willing to pursue it further, using the data you
collected
Policy Frameworks
Policy Documents
● High level statements of intent
● Broad statements of security objectives
● Basically a catch-phrase.
● Policy Examples
○ Information Security Policy
○ Acceptable Use
○ Data Ownership
○ Data Classification
○ Data Retention
○ Account Management
○ Password
● Policy usually approved by the C-Suite or management
● Standards
○ Mandatory Actions, steps, or rules
○ Approved below C-Suite
○ Standards also exist across the industry, so can be borrowed
● Procedures
○ Step-by-step instructions to perform an action
○ Creates consistent methods and outcomes for security objectives
● Guidelines
○ Recommendations, not requirements
○ Flexible so users can adapt to unique sitations
○ Easily, quickly changed
● Exceptions
○ Framework should have method for granting “exceptions” to rules
○ Usually signed by higher managers, indicated within framework
○ Should understand:
■ What rule is being broken
■ Why its being broken
■ Scope and duration
■ Risks associated
■ Risk Mitigations
Standard Frameworks
● Your company/team doesn’t need to build everything out manually - frameworks exist to
simplify this process
● NIST - National Institute Standard of Technology
○ Describe Current Posture
○ Describe Desired State
○ Identify/Prioritize areas for improvement
○ Assess progress toward desired state
○ Communicate risk among stakeholders
○ EXCELLENT Overview of NIST
○ Tiers
■ Partial
● Informal, Reactive
■ Risk Informed
■ Repeatable
● Understands dependencies and partners
■ Adaptive
● Formal, well-thought-out, good with partners, etc
■ TLDR: How well prepared your company is
■ https://www.cciitool.info/section/tier
○ Risk Assessment
■ Threats
■ Vulnerabilities
■ Likelihood
■ Impact
● ISO 27001
○ Used to be most common standard
○ International
○ Regulated companies are required to use this, but many switching to NIST
○ 14 Categories, go look ‘em up
● ITIL - Information Technology Infrastructure Library
○ Security Management Meets Service Business Needs
● COBIT - Control Objectives for Information and Related Technologies
■ Plan and Organize
■ Acquire and Implement
■ Deliver and Support
■ Monitor And Evaluate
○ Less popular than the others
● TOGAF - The Open Group Architecture Framework
○ 4 Domains: Business, Application, Data, and Technology - working together in
harmony
■ ...but everything changed when the application nation attacked
■ Technical Architecture supports the other domains
■ Business Architecture defines governance and organization
■ Application Architecture includes the apps and systems
■ Data Architecture is company’s approach to storing and managing
assets
● SABSA - Sherwood Applied Business Security Architecture
○ Similar to TOGAF
○ Uncommon
Policy-Based Controls
● Physical Controls
● Logical Controls
● Administrative Controls
● Combining Control Objectives is obviously better
● No I’m not detailing these didn’t you take Sec+?
Defense In Depth
● Security must be redundant and varied, to prevent any single point of failure and to slow
attackers long enough to rebuff them
● Layered Security Defense
○ Data > Application > Endpoint Security > Network > Perimeter
■ Perimeter as outermost layer
○ Difficult to design without affecting business needs
● Four Design Models
○ Uniform Protection
■ Same level of protection for all systems
■ Best for smaller networks
■ Expensive for large networks
○ Protected Enclaves
■ Higher protection for more secure data
■ Credit ops has more than internal network, which has more than web
server
○ Risk or Threat Based
■ Employing specific controls based on the threats and risks you’re most
worried about
○ Information-Classification Based
■ Map data protection to different classes of information
■ Secret, Classified, Top Secret, etc
■ Higher classifications get additional attention and security controls
○ Combining Design Models
■ WOW SURPRISE YOU WANNA USE THEM ALL
Types of Controls
● Controls prevent, detect, counteract, or limit security risks
● Technical Controls
○ Firewalls, IDS/IPS, Authentication Systems, Network Segmentation
● Administrative/Procedural Controls
○ Security through policies and procedures
○ Incident Response Plans
○ User Awareness Training
○ Account Creation Policies
○ Acceptable Use Policy
○ Legal Controls
● Physical Controls
○ Gates, fences, mantraps, and fire suppression systems
● Preventative Controls
○ Proactive measures
○ Stop an incident before it happens
○ Security Guards, antivirus, training
● Detective Controls
○ Designed to detect when an incident occurs, capture details about it, and send an
alarm
● Corrective Controls
○ Reactive - incident response
○ Fix an issue when it occurs
○ Patching, backups, etc
● Compensating Control
○ Minimize threat to acceptable levels
○ Blocking ports on an insecure OS
○ Segmenting vulnerable software that you can’t replace into a distinct network
segement
Layered Network Defense
● AHHH THIS ENTIRE COURSE IS JUST EXCUSES TO PUT FIREWALLS IN
DIFFERENT CATEGORIES
● Can be accomplished through
○ Network Segmentation
■ Compartmentalization (synonyms are FUN)
■ Increases availability and efficiency
■ Makes it harder for incidents to spread
■ Implemented through firewalls, r outers, switches, and VLANs
○ Firewalls
■ Single Firewall or Router
● Isolates a segment into a DMZ
● Router must have good ACL
■ Multiple Interface Firewall
● Different ACL and rulesets applies to each interface, creating
multiple network segments
● Requires a fancy expensive firewall
■ Multi-Firewall
● Different firewalls at each control point
● Allows for more stringent controls
● Can use multiple cheap firewalls, instead of an expensive one
○ Outsourcing Network Segments
■ Remote Services
● Saas or PaaS rely on provider’s security
■ Directly Connected Remote Network
● Acts as an extension of your intranet
● IaaS with direct point-to-point VPNs
● Seems like its just part of your network, but really uses someone
else’s secured system
Data Analytics
● We’ve been through this, scroll up man
● Be ready to correlate data from multiple systems to understand what’s happening
○ Look at the timestamps, bruh
● Splunk
○ Syslogs, auth logs, app logs, event logs, and others combined
● Trend Analysis
○ WE HAVE BEEN THROUGH THIS
● Historical Analysis
Personnel Security
● Humans will ruin everything
● Separation of Duties
○ Each person can only do/access so much
■ One person authorizes a payment, someone else signs it
○ Makes it harder to commit fraud
● Dual Control
○ Two people need to perform a single action
○ Check requires two signatures
○ Safe requires two people’s keycards
● Succession Planning
○ Fleshy meatbags die, which fleshbag moves into their place?
○ OH and employees can quit, too. Who else knows how to do their job?
○ Don’t allow an employee to be a single point of failure, no matter their position
● Cross Training
○ Ensure people know more than just their own job
○ If someone quits, make sure you have people to cover
○ If a project gets too big, make sure people can help
● Background Checks
○ Make sure people aren’t hidden criminals and in millions of dollars of debt
● Mandatory Vacation
○ It’s hard to run fraud if you’re not there
○ Also its a good test to make sure the company can run without you
● Termination
○ Make sure people can’t burn the place down on their way out
○ Recover all of their devices
○ Disable all their accounts
○ Change any codes that they know
○ Make a checklist so this is the same procedure everytime
Outsourcing Concerns
● If you think YOUR humans are a risk, other people’s humans are scarier
● Proper Vetting:
○ What background checks do you perform on the service provider?
○ What background checks does the provider use on their employees?
○ How do they handle internal issues and personnel?
● Access Control
○ What can they touch?
○ How is your data kept separate from another company’s?
● Data Ownership and Control
○ Who owns the data?
○ How is it encrypted?
○ Does the service provider have direct access to that data or the keys?
● Incident Response and Notification Processes
○ What happens during an incident?
○ Will the provider notify you?
○ Will the provider handle it, or just call you in?
Identity
● Identity = User info, rights, credentials, group memberships, and roles
● Name, address, title, contact info, id number, etc
● AAA
○ Authentication
■ Prove you are who you say you are
○ Authorization
■ What are you allowed to access?
○ Accounting
■ A record of what you access and do
■ Logssss
● Account Lifecycle
○ Create -> Provision -> Modify/Maintain -> Disable -> Retire/Delete
○ Must Utilize Least Privilege
■ Users with too much access are both threats, and vulnerable
○ Privilege creep
■ validate accounts have the correct rights
■ If someone keeps moving job positions, promotions, etc, they may end up
with permissions to a dozen places, which means they can do shady stuff
○ Identity Lifecycle Management
■ Centrify, Okta, Ping Identity
● Help you create, manage, monitor, and report on accounts
Identity Systems
● IAM - Centralized Identity Access Management
○ Create, store, and manage identity info
○ Includes group membership, roles, permissions
○ Used for:
■ Provisioning accounts
■ Authentication
■ Single-sign-on
■ LDAP
■ Account Maintenance
■ Reporting
■ Monitoring
■ Logging
■ Auditing
● Directory Services
○ LDAP - Lightweight Directory Access Protocol
■ Hierarchical structure
● dc = domain name
● Ou = organizational unit
● Cn = common unit
■ Securing LDAP
● Enable and require TLS for queries
● Set password storage to salted hash
● Disable unauthenticated or anonymous modes
● Replicate to a redundant server to prevent Denial of Service
● Strong ACLs to limit access to non-privileged users
■ LDAP Injection
● Similar to SQL inject
● Secure web apps and validate queries and input
○ Provides info about systems and users
○ Useful for email and other programs like address books
● Authentication Protocols
○ TACACS+
■ TCP to provide AAA services
■ Lacks integrity checking
■ Encryption flaws
■ Bad
○ RADIUS - Remote Authentication Dial-In User Service
■ Common AAA service
■ Password security isn’t great by default
■ Requires IPSec encryption on traffic
○ Kerberos
■ Designed with security in mind
■ Encrypts all data sent
■ Principles (users)
● Primary - Username
● Instance - Unique ID
● Realm - Groups
■ Replaced NTLM for windows domains
■ Review Kerberos ticket system
● Single-Sign-On SSO
○ Users authenticate once and gain access to multiple services
○ LDAP
○ CAS - Central Authentication Service
○ Reduces password reuse, and less password resets and support calls
○ Shared Authentication
■ OpenID
● Open source standard for decentralized authentication
● Sign in through google, access everything that relies on them
■ OAuth
● User shares elements of their info but doesn’t need an account
■ OpenID Connect
● Uses OAuth info but adds authentication
■ Facebook Connect
● Basically OpenID but for facebook instead of google