Week 2 Notes
Week 2 Notes
Security controls are safeguards designed to reduce specific security risks. Security
controls are the measures organizations use to lower risk and threats to data and
privacy. For example, a control that can be used alongside frameworks to ensure a
hospital remains compliant with HIPAA is requiring that patients use multi-factor
authentication (MFA) to access their medical records. Using a measure like MFA to
validate someone’s identity is one way to help mitigate potential risks and threats to
private data.
According to the Office of the Director of National Intelligence, the CTF was
developed by the U.S. government to provide “a common language for describing
and communicating information about cyber threat activity.” By providing a common
language to communicate information about threat activity, the CTF helps
cybersecurity professionals analyze and share information more efficiently. This
allows organizations to improve their response to the constantly evolving
cybersecurity landscape and threat actors' many tactics and techniques.
Week 2 notes
Controls
Controls are used alongside frameworks to reduce the possibility and impact of a
security threat, risk, or vulnerability. Controls can be physical, technical, and
administrative and are typically used to prevent, detect, or correct security issues.
Firewalls
MFA
Antivirus software
Separation of duties
Authorization
Asset classification
Types of Controls:
1. Encryption is the process of converting data from a readable format to an
encoded format. Typically, encryption involves converting data from plaintext
to ciphertext. Ciphertext is the raw, encoded message that's unreadable to
humans and computers. Ciphertext data cannot be read until it's been
decrypted into its original plaintext form. Encryption is used to
ensure confidentiality of sensitive data, such as customers' account
information or social security numbers.
Week 2 notes
To learn more about controls, particularly those used to protect health-related assets
from a variety of threat types, review the U.S. Department of Health and Human
Services’ Physical Access Control presentation.
Week 2 notes
Confidentiality
Confidentiality is the idea that only authorized users can access specific
assets or data. In an organization, confidentiality can be enhanced through the
implementation of design principles, such as the principle of least privilege. The
principle of least privilege limits users' access to only the information they need to
complete work-related tasks. Limiting access is one way of maintaining the
confidentiality and security of private data.
Integrity
Integrity is the idea that the data is verifiably correct, authentic, and reliable.
Having protocols in place to verify the authenticity of data is essential. One way to
verify data integrity is through cryptography, which is used to transform data so
unauthorized parties cannot read or tamper with it (NIST, 2022). Another example of
how an organization might implement integrity is by enabling encryption, which is the
process of converting data from a readable format to an encoded format. Encryption
can be used to prevent access and ensure data, such as messages on an
organization's internal chat platform, cannot be tampered with.
Availability
Availability is the idea that data is accessible to those who are authorized to
use it. When a system adheres to both availability and confidentiality principles, data
can be used when needed. In the workplace, this could mean that the organization
allows remote employees to access its internal network to perform their jobs. It’s
worth noting that access to data on the internal network is still limited, depending on
what type of access employees need to do their jobs. If, for example, an employee
works in the organization’s accounting department, they might need access to
corporate accounts but not data related to ongoing development projects.
Week 2 notes
The CSF is a voluntary framework that consists of standards, guidelines, and best
practices to manage cybersecurity risk. This framework is widely respected and
essential for maintaining security regardless of the organization you work for. The
CSF consists of five important core functions, identify, protect, detect, respond, and
recover, which we'll discuss in detail in a future video. For now, we'll focus on how
the CSF benefits organizations and how it can be used to protect against
threats, risks, and vulnerabilities by providing a workplace example.
The core functions of the NIST CSF provide specific guidance and direction for
security professionals. This framework is used to develop plans to handle an incident
appropriately and quickly to lower risk, protect an organization against a threat, and
mitigate any potential vulnerabilities. The NIST CSF also expands into the protection
of the United States federal government with:
Identify
Protect
Detect
Respond
Recover
These core functions help organizations manage cybersecurity risks, implement risk
management strategies, and learn from previous mistakes. Basically, when it comes
to security operations, NIST CSF functions are key for making sure an organization
is protected against potential threats, risks, and vulnerabilities. So let's take a little
time to explore how each function can be used to improve an organization's security.
Week 2 notes
4. Respond, which means making sure that the proper procedures are used to
contain, neutralize, and analyze security incidents, and implement
improvements to the security process. As an analyst, you could be working
with a team to collect and organize data to document an incident and
suggest improvements to processes to prevent the incident from happening
again.
Security incidents are going to happen, but an organization must have the ability to
quickly recover from any damage caused by an incident to minimize their level of
risk.
Week 2 notes
Security principles
In the workplace, security principles are embedded in your daily tasks. Whether you
are analyzing logs, monitoring a security information and event management (SIEM)
dashboard, or using a vulnerability scanner, you will use these principles in some
way.
Minimize attack surface area: Attack surface refers to all the potential
vulnerabilities a threat actor could exploit.
Principle of least privilege: Users have the least amount of access required to
perform their everyday tasks.
Fix security issues correctly: When security incidents occur, identify the root
cause, contain the impact, identify vulnerabilities, and conduct tests to ensure
that remediation is successful.
This principle means that the optimal security state of an application is also its
default state for users; it should take extra work to make the application insecure.
Week 2 notes
Fail securely
Fail securely means that when a control fails or stops, it should do so by defaulting to
its most secure option. For example, when a firewall fails it should simply close all
connections and block all new ones, rather than start accepting everything.
Many organizations work with third-party partners. These outside partners often have
different security policies than the organization does. And the organization shouldn’t
explicitly trust that their partners’ systems are secure. For example, if a third-party
vendor tracks reward points for airline customers, the airline should ensure that the
balance is accurate before sharing that information with their customers.
The security of key systems should not rely on keeping details hidden. Consider the
following example from OWASP (2016):
The security of an application should not rely on keeping the source code secret. Its
security should rely upon many other factors, including reasonable password
policies, defense in depth, business transaction limits, solid network architecture,
and fraud and audit controls.
Security audits
A security audit is a review of an organization's security controls, policies, and
procedures against a set of expectations. Audits are independent reviews that
evaluate whether an organization is meeting internal and external criteria. Internal
criteria include outlined policies, procedures, and best practices. External criteria
include regulatory compliance, laws, and federal regulations.
Audits help ensure that security checks are made (i.e., daily monitoring of security
information and event management dashboards), to identify threats, risks, and
vulnerabilities. This helps maintain an organization’s security posture. And, if there
are security issues, a remediation process must be in place.
Security audits must be performed to safeguard data and avoid penalties and fines
from governmental agencies. The frequency of audits is dependent on local laws and
federal compliance regulations.
Industry type
Organization size
There are three main categories of controls to review during an audit, which are
administrative and/or managerial, technical, and physical controls. To learn more
about specific controls related to each category, click the following link and select
“Use Template.”
OR
Week 2 notes
If you don’t have a Google account, you can download the template directly from the
following attachment
Control categories
DOCX File
Audit checklist
It’s necessary to create an audit checklist before conducting an audit. A checklist is
generally made up of the following areas of focus:
o Note how the audit will help the organization achieve its desired goals
When conducting an internal audit, you will assess the security of the
identified assets listed in the audit scope.
Control categories
Control categories
Controls within cybersecurity are grouped into three main categories:
Administrative/Managerial controls
Technical controls
Physical controls
Physical controls include door locks, cabinet locks, surveillance cameras, badge
readers, etc. They are used to limit physical access to physical assets by
unauthorized personnel.
Control types
Control types include, but are not limited to:
1. Preventative
2. Corrective
Week 2 notes
3. Detective
4. Deterrent
These controls work together to provide defense in depth and protect assets.
Preventative controls are designed to prevent an incident from occurring in the first
place. Corrective controls are used to restore an asset after an incident. Detective
controls are implemented to determine whether an incident has occurred or is in
progress. Deterrent controls are designed to discourage attacks.
Review the following charts for specific details about each type of control and its
purpose.
Administrative Controls
Least Privilege Preventative Reduce risk and overall impact of malicious insider
or compromised accounts
Technical Controls
information
Physical Controls
etc.)
Current assets
Assets managed by the IT Department include:
On-premises equipment for in-office business needs
Employee equipment: end-user devices (desktops/laptops, smartphones),
remote workstations, headsets, cables, keyboards, mice, docking stations,
surveillance cameras, etc.
Management of systems, software, and services: accounting,
telecommunication, database, security, ecommerce, and inventory
management
Internet access
Internal network
Vendor access management
Data center hosting services
Data retention and storage
Badge readers
Legacy system maintenance: end-of-life systems that require human
monitoring
Administrative Controls
Administrative Controls
Technical Controls
Physical Controls
Availability: The idea that data is accessible to those who are authorized to access it
Biometrics: The unique physical characteristics that can be used to verify a person’s identity
Confidentiality: The idea that only authorized users can access specific assets or data
Confidentiality, integrity, availability (CIA) triad: A model that helps inform how
organizations consider risk when setting up systems and security policies
Detect: A NIST core function related to identifying potential security incidents and
improving monitoring capabilities to increase the speed and efficiency of detections
Encryption: The process of converting data from a readable format to an encoded format
Identify: A NIST core function related to management of cybersecurity risk and its effect on
an organization’s people and assets
Integrity: The idea that the data is correct, authentic, and reliable
National Institute of Standards and Technology (NIST) Special Publication (S.P.) 800-
53: A unified framework for protecting the security of information systems within the U.S.
federal government
Protect: A NIST core function used to protect an organization through the implementation of
policies, procedures, training, and tools that help mitigate cybersecurity threats
Recover: A NIST core function related to returning affected systems back to normal
operation
Week 2 notes
Respond: A NIST core function related to making sure that the proper procedures are used to
contain, neutralize, and analyze security incidents, and implement improvements to the
security process
Risk: Anything that can impact the confidentiality, integrity, or availability of an asset
Security frameworks: Guidelines used for building plans to help mitigate risk and threats to
data and privacy
Security posture: An organization’s ability to manage its defense of critical assets and data
and react to change