Security: Best Practices and Secure Configuration Guides - Paiet/Tech-Journal-for-Everything GitHub Wiki

  • Industry-standard frameworks and reference architectures
    • Regulatory
      • Sarbanes-Oxley(SOX)- passed as a countermeasure to fraud (Eron, WorldCom,Tyco_
        • Security requirements for applications and financial data processing systems
        • Access managements, general IT controls...etc
      • Payment Card Industry-Data Security Standard
        • Protects the security of credit card holders
        • Made up of multiple levels
        • Standards enforced are based on the PCI-DSS level
      • Health Insurance Portability and Accountability Act
        • Safeguards medical information
        • Protects personal health information or PHI
      • COBIT
        • Control Objectives for Information and Related Technology
        • is a framework developed in the mid-90s by ISACA,
        • Used to achieve Sarbanes-Oxley Compliances
      • ISO 27000 Suite
        • ISO
  • Benchmarks/secure configuration guides
  • Defense-in-depth/layered security
    • Layers
      • Layer 1 = Policies, Procedures, Awareness
      • Layer 2 = Physical Security
      • Layer 3 = Perimeter Security
        • Border Routers, Firewalls, DMZs, IDS/IPS,
      • Layer 4 = Network Security
        • Access control(NAC), network-based firewalls, anti-malware gateway, network segmentation, wireless security
      • Layer 5 = Host Security
        • Anti-malware, host-based firewalls, host-based IPS, patch management, backups
      • Layer 6 = Application Security
        • Application layer firewalls
        • Application Configuration Baselines
        • Input validation(server-side/client-side)
      • Layer 7 = Data Security
    • Vendor diversity
    • Control diversity
      • Administrative
        • Implemented through policies, procedures and quidelines
      • Technical
        • Implemented through technology
        • Firewalls, anti-malware, IDS/IPS
      • Physical(Objective 5.7)
      • Preventative(Objective 5.7)
        • Any controls that stop something from happening
        • Locks, biometric devices, mantraps
      • Deterrent(Objective 5.7)
        • Any type of control that warns an attacker to stay away and not attack
        • Lighting, Security Guards, strobe lights, security cameras
      • Detective(Objective 5.7)
        • The purpose is to uncover violations
        • Anti-malware, IDS/IPS, motion sensors
        • Alarms triggered when a door is opened
      • Corrective(Objective 5.7)
        • Restores a system or systems to the state prior to the event
        • They seek to minimize the impact to the company
        • Backup sofware, backups, snapshots, OS upgrades
      • Compensating(Objective 5.7)
        • These controls come to the assistance of controls that fail
        • Signs are deterrents but alarms compensate signs,
        • Emergency exit with sign(both are deterrents, however if and alarms are triggered then the alarm is a compensating control)
        • UPS, DR Sites
  • User training