Random Notes - mccright/rand-notes GitHub Wiki

My blog is at, Completosec Channel. This page is just for random, transient notes.

Review

Utilities

Think About

Application Security

The applications that support all of our organization's operations incorporate security features that protect our customers‘ data in transit and at rest, and help prevent unauthorized access to our customers' sensitive information.

We invest in secure software practices throughout the entire software development/acquisition lifecycle. We train all members of the technical workforce about secure software concepts and activities, and support them with continuously-evolving reference materials and templates. We ensure that security and risk management requirements are made explicit in business analysis and application architecture, that testing incorporate validation of those requirements, that formal security testing is performed against application source code (static code security analysis) and against deployed applications (dynamic security analysis), and that we maintain interfaces to receive feedback from a range of inputs. A foundational goal of this work is to ensure that the applications hosting business activities resist hostile activities, emit safe outputs, and (as a last resort) fail in risk-appropriate ways.

User Access — In our identity directories, user passwords are hashed, and password policies are configured to include requirements for complexity, expiration periods, password history, and user lockouts. In high-security situations, user access is also limited to those using strong, two-factor authentication, or/and white-listed endpoints/endpoint-configurations, white-listed geo-location(s), white-listed time-of-day, white-listed source IP addresses, and so on. In some situations, for example, for some types of infrastructure and operations administrative roles, user access is limited to only those who have passed through a physical security perimeter at one of our secured corporate facilities.

Data at Rest — We encrypt a range of sensitive categories of data and carefully constrain access to the encryption keys. We strictly control access to bulk private data to those having a formal business need to know and who have been approved by the company data owner/steward. We store sensitive bulk data on platters that our company owns and manages, in state-of-the-art data center environments. (finish this...)

Data in Transit — All non-public data communications on untrusted networks are secured using protocols such as HTTPS/TLS, Secure FTP, and Secure RTP.

Is this a useful model? Started from a list at: http://www.five9.com/cloud-security-office

Other Topics

  • Infrastructure activity trails (identities, network, endpoints, flows, events/activities, geoIP).
    • Risk detection ('IDS/IPS,' analysis, event correlation, alerting/alarming, reporting)
  • Integrating risk management into the software development/acquisition/assembly life-cycle (traditional or any flavor of agile).
  • NAC (add 'proximity' to qualities identified/measured)
  • Mobile workforce (security architecture, security metrics, forensics, security posture, risk appetite [MDM?]).
    • What about iOS?
    • What about Android?
    • What about Windows?
  • Integrating risk management into virtualized environments.
  • Cloud (risk issues, required qualities, controls, 'transparency,' risk assessments)
  • Risk management governance.
  • Risk management leadership.

Interesting related quote about metrics:

 "...measured data does not need to be perfect, 
  provided that it contains the information required, 
  is adequately correct and practically measurable."

From “Risk-Driven Security Metrics in Agile Software Development.” R.M.Savola, S.Fruhwirth, & A.Pietikainen, 06-28-2012, p. 1682, Journal of Universal Computer Science. http://www.jucs.org/jucs_18_12/risk_driven_security_metrics/jucs_18_12_1679_1702_savola.pdf

Also from the same paper/same page, a table of key security metric concepts:

 +------------------------+---------------------------------------------+
 |Security Objective (SO) | High-level statements of intent to counter  |
 |                        | identified threats and/or satisfy identified|
 |                        | security policies and/or assumptions.       |
 +------------------------+---------------------------------------------+
 |Security Requirement    | Requirement, stated in a standardized       |
 |(SR)                    | language, that is meant to contribute to    |
 |                        | achieving the SOs.                          |
 +------------------------+---------------------------------------------+
 |Security Control (SC)   | Means of managing risk, which can be        |
 |                        | administrative, technical, management, or   |
 |                        | legal in nature.                            |
 +------------------------+---------------------------------------------+
 |Security Correctness    | Assurance that security controls have been  |
 |                        | correctly implemented in the SuI, and the   |
 |                        | system, its components, interfaces, and the |
 |                        | processed data meet the sec. requirements.  |
 +------------------------+---------------------------------------------+
 |Security Effectiveness  | Assurance that the stated SOs are met in the|
 |                        | SuI and the expectations for resiliency in  |
 |                        | the use environment are satisfied in the    |
 |                        | presence of actual security risks.          |
 +------------------------+---------------------------------------------+
 |Security Efficiency     | Assurance that the adequate security quality|
 |                        | has been achieved in the SuI, meeting the   |
 |                        | resource, time and cost constraints.        |
 +------------------------+---------------------------------------------+
 "SuI" (System under Investigation)

Additional model:

Trustworthy Financial Services Infrastructure & Operations

How We Keep Your Data Secure

The ______ Security organization is responsible for securing our infrastructure, applications, and operations against security breaches and associated unforeseen events.

Infrastructure Security

Security Standards — Secures our infrastructure by standards & guidelines established by the ISO 27001/27002, COBIT, PCI-DSS, and Cloud Security Alliance (CSA).

Access Control — Our infrastructure and operations are regularly audited using the SSAE 16 (previously SAS 70) standard, which means we utilize stringent identity, security and continuity controls such as two-factor authentication/access control including RSA SecurID at our network perimeter, and proximity card/badge plus biometrics at the perimeter of sensitive facilities like data center & supporting network rooms, along with 24/7 security monitoring, video monitoring, and more. We also use process safeguards to ensure that employee access is controlled appropriately.

Security Patch Updates — We update our systems based on our patch management policy and internal operating level agreements to ensure all systems have the very latest critical security and antivirus patches.

Vulnerability Management — Our real-time intrusion detection and vulnerability management software runs around the clock to immediately identify and respond to any threats


Managing risk in the context of a long time-horizon.

See the "Global Risks 2014 - Ninth Edition" Insight Report from the World Economic Forum. [http://www3.weforum.org/docs/WEF_GlobalRisks_Report_2014.pdf] (http://www3.weforum.org/docs/WEF_GlobalRisks_Report_2014.pdf)

Especially part 2, pages 38-49. It is a short read on risks associated with -- among other topics -- the way the Internet is evolving, risks associated with "trust," and "managing risk" in the context of a long time-horizon.

Also: "Global Risks 2015 - Tenth Edition" http://www3.weforum.org/docs/WEF_Global_Risks_2015_Report15.pdf.

And for 2016: "Global Risks 2016 - 11th Edition" [http://www3.weforum.org/docs/GRR/WEF_GRR16.pdf] (http://www3.weforum.org/docs/GRR/WEF_GRR16.pdf)

And for 2017: "Global Risks 2017 - 12th Edition" http://www3.weforum.org/docs/GRR17_Report_web.pdf

And for 2018:
"The Global Risks Report 2018 - 13th Edition" http://www3.weforum.org/docs/WEF_GRR18_Report.pdf

And most recently:
"The Global Risks Report 2019 - 14th Edition" http://www3.weforum.org/docs/WEF_Global_Risks_Report_2019.pdf


My blog, Completosec Channel