Common Security Principles - Paiet/Tech-Journal-for-Everything GitHub Wiki
-
1.1 Common Security Principles
- 1.1.a Describe confidentiality, integrity, availability (CIA)
- Confidentiality: protects data and keeps data private
- Integrity: protects data and keeps data from unauthorized manipulation
- Availability: Make the data available to authorized users.
- 3 Principles that every security implementation must achieve. e.g. Firewall, Encryption, Hardened Server
- 1.1.b Describe SIEM technology
- Products that makes collecting, correlatiing and acting on event logs and security related information easier.
- Used to provide enterprises with real time reporting
- Used to provide long term analysis of security events.
- Primary evolved from 2 products
- (SIM) Security Information Management
- (SEM) Security Event Management
- two separtate products incorporated in SIEM. Features included:
- Log collections: event records from many sources to provide forensic tools and compliance reporting requirements.
- Normalization: links log messages from diverse systems into a single data model. Even when original format of data sources are different, normalization enables analyzing related events.
- Correlation: links logs from many disparate systems and applications. Helps to speed up detection and reaction to security threats.
- Aggregation: reduces volume of event data by sending summary of the data.
- Reporting: presents correlated and aggregated data in real-time monitoring and long-term summaries.
- 1.1.a Describe confidentiality, integrity, availability (CIA)
-
1.1 Common security principles
- 1.1.c Identify common security terms
- Security Terms | Term | Explanation | |--------|--------| |Asset|Item to be protected, property, people, and data that has value to the company| |Vulnerability|Exploitable weakness| |Threat| Anything that tries to gain unauthorized access to an asset so it can compromize it, destroy it or damage it.| |Risk| Potential for unauthorized access to compromise, destruction or damage to an asset.| |Countermeasure| a device or process to counteract a potential threat|
- Asset Classification | Classfication Type| Terms used | |--------|--------| |Gov't Classification|Unclassified;Sensitive But Classified,Confidential,Secret, and Top Secret| |Private Sector|Public, Sensitive, Private,Confidential| |Classification Criteria|Value, Age, Replacement Cost, Useful lifetime| |Classification Roles|Owner, Custodian, User|
- Attacks Methods | Action | Description | |--------|--------| |Reconnaissance|Discovery Process for information about the Network and determine potential vulnerabilities| |Social Engineering|Targets the user's vulnerabilities e.g. phishing and pharming| |Privilege Escalation|Taking a level of privilege then achieving higher level e.g. User Mode to Privileged Mode| |Back Doors|Attackers gain access to system for future use| |Code Execution|After access to execute code on remote machine| |Covert Channel|Using Programs and Methods in unintended ways| |Trust Exploitation|Attacker leverages a trusted site to gain access to another trusted network.| |Bruce Force|Password Guessing| |Botnet|Collection of Infected Computers ready to take instruction from attacker| |DoS and DDoS|Use of Botnet to attack a target to cause damage|
- Guidelines for Secure Network Architecture | Guideline | Description | |--------|--------| |Rule of Lease Privilege|Only minimal access is provided and no more than necessary| |Defense in Depth| Multiple layers of security controls rather than a single defense| |Separation of Duties| provides checks and balances regarding security implementations| |Auditing|Accounting and keeping records about network events.
- 1.1.d Identify common network security zones (Simple Diagram)
- Campus Area Network (CAN)
- Security is Modular (for each building,data center,WAN links and Edge)
- Functionally provides connectivity, data and services.
- Cloud, Wide Area Network (WAN)
- Security must be considered for on premises and connection betweeen site and cloud provider
- Data Center
- Security is provided by firewall filters
- Small office/Home office (SOHO)
- Security at the SOHO WAN router
- Virtual Environment
- ACI (Application Centric Infrastructure): policy driven security for virtual, cloud and physical components.
- ASAv (virtual ASA): detailed control and visibility of virtual services.
- Security is provided for North-South Traffic and East-West traffic (DataCenter Traffic Patterns)
- East-West Traffic stays within the Data Center
- North-South Traffic enters and exits Data Center
- Physical firewalls such as ASAs do not help to provide security for traffic that never leaves the physical server. This is the context for the ASAv
- Campus Area Network (CAN)
- 1.1.c Identify common security terms
-
Terminology for Common Security Principles
- asset
- BYOD
- brute-force (password-guessing) attacks
- CERT
- RDDoS
- risk
- threat
- Traffic Light Protocol (TLP)
- vulnerability