NetPro Template Sent
NetPro Template Sent
NetPro Template Sent
Giảng viên:
www.netpro.com.vn
Module/Chuyên đề
Giảng viên:
www.netpro.com.vn
Content Outline
• Introduction
• Domain 01 – Concept, Architecture and Design
• Domain 02 – Cloud Data Security
• Domain 03 – Platform and Infra Security
• Domain 04 – Application Security
• Domain 05 – Security Operations
• Domain 06 – Legal, Risk and Compliance
OVERVIEW
Giảng viên:
www.netpro.com.vn
WHY CCSP…?
Giảng viên:
www.netpro.com.vn
DOMAIN 01:
Architecture, concept and design
5 characteristics of Cloud
Deployment Model
• 4 deployment Models:
– Public
– Private
– Hybrid
– Community
• Discuss:
– Community Cloud vs others ?
Service Model
• 3 Service Model
– IaaS (Infrastructure as a Service)
– PaaS (Platform as a Service)
– SaaS (Software as a Service)
• Cloud lock-in:
– Restrict customers move to another cloud via proprietary technology or strict
SLA
• Cloud lock-out:
– Out-of-business
• Discussion:
– How to “lock” and overcome/avoid ?
CONSIDERATION (CLOUD)
• Interoperability
• Portability
• Reversibility (multi-cloud needs feature)
• Availability
• Security + Privacy
• Resiliency
• Performance
• Governance
• Maintain & Versioning
• SLA
• Auditability + Regulatory
SLA
– Access Management
• Application and Grant permission per profile
PROVISIONING AND DE-PROVISIONING
• The goal of provisioning is to standardize, streamline, and create an
efficient account creation process, while creating a consistent,
measurable, traceable and auditable framework for providing access to
end users.
• Malicious insiders
• Abuse of cloud services: Inherent weakness of any
internet service
• Insufficient Due Diligence/Due Care
Due diligence investigating and understanding risks
Due care: Developing policies and procedures to address risks
• Shared Technology Vulnerabilities: multiple tenants
brings in risks
SECURITY…
• IaaS:
– VM attack /Virtual Switches/Network
– VM Based Rootkits/malicious hypervisor
– Single Point of Access
• PaaS:
– System/Resource isolation
– User-level permissions /User Access Management
– Protection against malware
• SaaS:
– Data (segregation), Data Access & Policy
– Web Application Security
BCP & DRP
• Business Continuity
– is the process in which risks and threats to the ongoing availability
of services, business functions and the organization are actively
reviewed and managed at set intervals
– (Plan) Business operates and maintain at the minimum
– Recovery Point Object how much data restored (how much data allowance
lost)
• Standard:
– ISO 27001, 27002, 27017, 27018, 27701;
– PCI-DSS
• Regulation:
– SOX, GDPR, HIPPA…
Note:
– Cloud Service Provider --> consult about security and compliance; know threats
cloud service
• Important:
– Shared Roles & Responsibilities
– Blockchain | IoT
– Quantum
OTHER NOTES
Giảng viên:
www.netpro.com.vn
DOMAIN 02 – CLOUD DATA SECURITY
• Storage Architecture
• Data Lifecycle Security
• Database security
• Data Loss Prevention (DLP)
• Data Encryption
• Key Management
Storage Architecture - IaaS
Archive Use
Share
FUNCTIONS, ACTORS AND CONTROLS
Users /
Customers /
CSP Where (store,
operate…)
data
Controls to Controls to
enhance security enhance
security
• Discuss….(some notes)
– Encryption need decrypt (in process data)
– Need resource to perform (slow ...)
– ….
DATA DISCOVERY
• Provides a way to make sense of big data – the sheer volume and
diversity of data makes this challenging for the old means of
static reporting
• Can provide agile, near real-time analytics
DATA DISCOVERY TECHNIQUES
• Data Discovery is a user-driven process of searching for patterns or specific items in a data
set.
– Data Discovery applications uses visual tools such as geographical maps, pivot-tables, and heat-maps to make the
process of finding patterns or specific items rapid and intuitive.
• Data Discovery may leverage statistical and data mining techniques to accomplish these goals.
• There are several different ways Data Discovery tools make their analysis:
– Metadata provides data its meaning and describes its attributes
– Labels provide a logical grouping of data elements and gives the a “tag” describing the data
– Content analysis examines the data itself
DATA CLASSIFICATION
• Categorizes data based on its value and drives the controls that are
put in place to secure it
• Separation of Duties
• Training
• Authentication and Authorization procedures
• Vulnerability Assessments
• Backup & Recovery processes
• Logging
• Data-retention control
• Secure disposal
DATA RIGHTS MANAGEMENT
• IRM requires that all users with access should have matching encryption
key. This requires a strong and comprehensive identity structure
• Each user will need to be provisioned with an access policy and keys
• Access can be identity based or role based (RBAC)
• Identity can be implemented with a single director location or across
federated trust
• End users will likely have to install a local IRM agent for key storage or
authenticating and retrieval of protected information
• Can be challenging with disparate systems and document readers
DATA PROTECTION POLICES: RETENTION
• Data archiving is the process of identifying and moving inactive data out
of current production systems and into specialized long-term archival
storage systems. Considerations include:
– Encryption
– Monitoring
– Granular retrieval
– Electronic discovery (e-discovery) any process in which electronic data is sought, located,
secured and searched with the intent of using it as evidence in a civil or criminal legal case
– Backup & recovery | Media type
– Restoration procedures
AUDITABILITY
Giảng viên:
www.netpro.com.vn
DOMAIN 03 - OBJECTIVE
• Hypervisor security
• VM Concerns, vulnerabilities and weaknesses
• Performance and operational complexity
• Data Center Operations
• Perimeter security
• Physical Security
SECURING THE HYPERVISOR
• Install all update to the hypervisor as they are released by the vendor.
Centralized patch management solutions can also be used to administer
updates.
• Restrict administrative access to the management interfaces of the hypervisor
• Protect all management communication channels using a dedicated
management network
• Synchronize the virtualized infrastructure to a trusted authoritative time server.
• (con’t)
SECURING THE HYPERVISOR
• Disconnect unused physical hardware from the host system (external drives,
NICs)
• Disable all hypervisor services such as clipboard or file sharing between the
guest OS and the host OS unless they are needed
• Consider using introspection capabilities to monitor the security of each
guest OS and their interactions
• Carefully monitor the hypervisor itself for signs of compromise. This includes
using self-integrity monitoring capabilities that hypervisors may provide, as
well as monitoring and analyzing hypervisor logs on an ongoing basis
SECURING THE GUEST OS
• In each guest OS, disconnect unused virtual hardware. This is particularly important for
virtual drives (usually virtual CDs and floppy drives), but is also important for virtual
network adapters other than primary network interface and serial and/or parallel ports.
• Use separate authentication solutions for each guest OS unless there is a particular
• Ensure that virtual devices for the guest OS are associated only with the appropriate
physical devices on the host system, such as the mappings between virtual and
physical NICs
VIRTUALIZATION CONCERNS
• Inter-VM attacks
– Traffic between the VMs traverses a virtual network and are visible to the physical security elements and is sometimes
• Performance:
– Many security tools affect performance, perhaps more so on VMs
– Understanding the virtual environment and the use of proper sizing, planning and balancing the needs of the environment
• VM Sprawl:
– The increasing number of VMs in use leaves the potential for oversights and misconfigurations
– Automation and proper governance and long term framework to mitigate the risk associated with operational complexity
VIRTUALIZATION CONCERNS
• Instant-on Gaps
– Vulnerabilities exists from when a VM is powered on and when its security rules
can be updated.
– Best practices include network based security and “virtual patching” that inspect
traffic for known attacks before it can get to newly provisioned or newly started
VM. (enforce NAC, isolated state VMs until their rules and pattern files are
updated and scan has been run)
• VM theft or modification
– VM encryption is necessary as VMs are susceptible to modification or theft but it
can affect performance
VIRTUALIZATION CONCERNS
• Data Comingling:
– Data of different classifications could potentially be stored on the same
physical device
– combination of VLANs, firewalls, and IDS/IPS to ensure VM isolation as a
mechanism for supporting mixed mode deployments.
– We also recommend using data categorization and policy based
management to prevent this.
– In Cloud Computing environments, the lowest common denominator of
security could potentially be shared by all tenants in the multi-tenant
virtual environment.
RECOMMENDATION FOR CUSTOMER
• Secure each virtualized OS by using software in each guest or using an inline virtual machine
combined with hypervisor-based APIs such as VMware vShield.
• Virtualized OSs should be augmented by built-in security measures, leveraging 3rd party security
technology to provide layered security controls and reduce dependency on the platform provider
alone.
• Explore the efficacy and feasibility of segregating VMs and creating security zones by type of
usage (e.g., desktop vs. server), production stage (e.g., development, production, and testing) and
sensitivity of data on separate physical hardware components such as servers, storage, etc. *:
encrypt virtual machine if not use
• Make sure that the security vulnerability assessment tools or services cover the virtualization
DATA CENTER OPERATIONS
– Frequency of inaccessibility
TO BE MATCH SENSE…
TO BE MATCH SENSE…
Operations (domain)
needs this info
TO BE MATCH SENSE…
• SDN is the core of IaaS and need to know (in the real world) to
enhance security
• Auditable attestation via certificate like ISO, SOC with
independence (audit) agency
• Think again about backup (cloud)
– You can’t use on-premise to backup on-cloud
• Risk in Virtualization
– Host-Escape vs Guest-Escape
Giảng viên:
www.netpro.com.vn
CLOUD APPLICATION SECURITY
• Remind
SDLC for the cloud
starts
• OWASP
• CVE
• CWE
• NVD
• US CERT
OWASP TOP TEN
• Designed to raise awareness and the stress the need for security
in web-based applications
OWASP TOP 10
• Check for the latest release (CCSP Ref OWASP TOP 10 2017)
– Injection
– Cross-site scripting (XSS) / CSRF
– ….
CSRF MITIGATE STRATEGIES
• CIA Triad
• Tools for Threat Modeling
– Data Flow Diagram
– Use/Misuse Cases
Threat Modeling (EX)
USE/MISUSE CASE
THREAT MODELING
• Code Reuse
• Flaws vs Bug
• Efficacy of Controls
• Economy of Mechanism
• Cost/Benefit Analysis
• Psychological Acceptability
SUPPLEMENTAL SECURITY DEVICES/CONTROLS
• WAF
• DAM
• Firewalls
Giảng viên:
www.netpro.com.vn
DOMAIN 5: OPERATIONS
• Check if the location of the facility falls under any active seismic zone
• Ref to TIER-2, 3, 4
• Secure Entry Points – Access control systems • Fire Exits (must not be locked) Panic Bars in fire
(proximity cards/biometric access) exits
• Access Control System linked with fire control • CCTV Cameras and DVR server (including
backup timelines)
panel for emergency release
• Door Closures and time-delay door
• Emergency auto-release buttons near all
access card readers alarms
–…
SUMMARY
Giảng viên:
www.netpro.com.vn
NOTE
(personal/privacy)
PROCESS If have a breach
• Check and follow the guidance/support of CSP (to investigate), prepare evidences (follow to
forensic steps)
• Remember:
Giảng viên:
www.netpro.com.vn
(ISC)2 STYLE
• Questions
– Overall and sometime not in Official book
– Always have a little survey question (not mark) for detecting trending, evaluating
– Trick is the a part of question
• Not familiar word easy to be wrong context
• Carefully to ‘NOT’ in the exam
• Choose the best answer in 4 options
– Need to commitment if take the exam, because …don’t wait CCSP become
CISSP
– Number of questions 1000 or less
• Almost the concept and not much to absorb