Cissp - Domain 7 Handout
Cissp - Domain 7 Handout
Cissp - Domain 7 Handout
They limit access to data and systems so that users and other
subjects have access only to what they require.
They help prevent security incidents
They help limit the scope of incidents when they occur.
Separation of duties
a basic security principle that ensures that no single person can
control all the elements of a critical function or system.
Job rotation
employees are rotated into different jobs, or tasks are
assigned to different employees.
Goal
to ensure that trusted employees do not abuse the special
privileges they are granted.
Destruction Classification
Usage
Creation
The Information Lifecycle
Destruction Classification
Archive Storage
Usage
Creation
The Information Lifecycle
Destruction Classification
Archive Storage
Usage
Creation
The Information Lifecycle
Destruction Classification
Archive Storage
Usage
Creation
The Information Lifecycle
Destruction Classification
Archive Storage
Usage
Creation
The Information Lifecycle
Destruction Classification
Archive Storage
Usage
DOMAIN 7: SECURITY OPERATIONS
100% YOURS
Applications Applications Applications Applications
Data Data Data Data
Runtime Runtime Runtime Runtime
Responsible Middleware Middleware Middleware Middleware
CSP OS OS OS OS
Customer Virtualization Virtualization Virtualization Virtualization
Servers Servers Servers Servers
Storage Storage Storage Storage
Networking Networking Networking Networking
Scan networks
— detection
Botnet
a collection of compromised computing devices (often
called bots or zombies).
Bot Herder
criminal who uses a command-and-control server to
remotely control the zombies
often use the botnet to launch attacks on other
systems, or to send spam or phishing emails
honeypot, padded cell, pseudo flaws
Anti-malware software
with up-to-date definitions installed on each system, at the
boundary of the network, and on email servers.
Policies
enforce basic security principles, like principle of least privilege,
prevent regular users from installing potentially malicious
software.
Education
educating users about the risks and the methods attackers
commonly use to spread viruses helps users understand and
avoid dangerous behaviors.
penetration tests
start by discovering vulnerabilities and then mimicking an attack
to identify what vulnerabilities can be exploited.
should not be done without express consent and
knowledge from management.
can result in damage, so should be done on isolated
systems whenever possible.
help ensure that management programs are effective and being followed.
FOR EXAMPLE:
senior security administrators = full detail senior
management = high-level summary
User entitlements & access reviews
Possession
You must have possession of equipment, software, or
data to analyze it and use it as evidence.
Modification
You must acquire the evidence without modifying it or
allowing anyone else to modify it.
Real evidence
consists of actual objects that can be brought into the courtroom.
Documentary evidence
consists of written documents that provide insight into the facts.
Testimonial evidence
consists of verbal or written statements made by witnesses.
DOMAIN 7: EVIDENCE ADMISSIBILITY
TO BE ADMISSIBLE:
Evidence must be relevant to a fact at issue in the
case
The fact must be material to the case,
The evidence must be competent or legally
collected.
DESCRIPTION
A “recovery” cold site is essentially just
data center space, power, and network
connectivity that’s ready and waiting for
whenever you might need it.
TO RECOVER
cost = LOW If disaster strikes, your engineering and
effort = HIGH logistical support teams can readily help you
move your hardware into the data center and
get you back up and running.
recovery site types
DESCRIPTION
A “preventative” warm site allows you to pre-
install your hardware and pre-configure your
bandwidth needs.
TO RECOVER
cost = MEDIUM If disaster strikes, all you have to do is load
effort = MEDIUM your software and data to restore your
business systems.
recovery site types
DESCRIPTION
A “proactive” hot site allows you to keep
servers and a live backup site up and
running in the event of a disaster. You
replicate your production environment in that
data center.
Benefits of an MAA
Mutual assistance agreements (MAAs) provide an inexpensive
alternative to disaster recovery sites.
Risk of an MAA
Organizations participating in an MAA may also be shut down by the
same disaster, and MAAs raise confidentiality concerns.
Why are MAAs uncommon?
They are not commonly used because they are difficult to enforce.
Business Continuity Planning (BCP)
Read-through test
You distribute copies of disaster recovery plans to the
members of the disaster recovery team for review.
Structured walk-through aka table-top exercise
Members of the disaster recovery team gather in a large
conference room and role-play a disaster scenario.
Usually, the exact scenario is known only to the test moderator, who
presents the details to the team at the meeting.
The team members refer to the document and discuss the
appropriate responses to that particular type of disaster.
so far, these are all talk
5 tYPES OF DISASTER RECOVERY PLAN TESTS
Simulation test
Similar to structured walk-through, except some of the response
measures are then tested (on non-critical functions).
Parallel test
involves relocating personnel to the alternate recovery site and
implementing site activation procedures. The employees relocated to
the site perform their disaster recovery responsibilities just as they
would for an actual disaster.
Full interruption test
like parallel tests but involves actually shutting down operations at the
primary site and shifting them to the recovery site.
all involve some form of ‘doing’
5 tYPES OF DISASTER RECOVERY PLAN TESTS
Non-Disaster
disruption in service from device malfunction or user error.
Disaster
entire facility unusable for a day or longer.
Catastrophe
major disruption that destroys the facility altogether.
Requires a short term and long term solution.
INSIDE CLOUD
THANKS
FOR WATCHING!