02. Information Security Control Implementation and Integrations (265) Flashcards
InfoSec Control Implementation and Integrations
After a control has been designed and put into service, it needs to be managed throughout its life
265
InfoSec Control Implementation and Integrations
May take time when implementing a control designed to harden standards to ensure it does not adversely affect performance, integrity, availability of affected system(s)
265
Controls Development
- Control Development is foundational to a security program
- Security manager must understand intimately organisations mission, goals and objectives, risk tolerance
Controls Development from Scratch
For organisations developing their own controls from ground up must first develop high-level control objectives, seen as overreaching principles from which individual controls will be developed
266
Developing Control Details
Security manager must develop several elements of each control
267
Control number
Index number assigned to control
Mapping
Relationship to other controls in other control frameworks
Title
Name
Control Objective
Desired activity
Narraitive
Detailed description of the control
Scope
Locations. business units, departments
Risk
Risk that control intends to address
Owner
Business owner
Affected and Related business Process
Business processes related to control
Control Frequency
How often performed or used
Classification
Automatic or manual, preventive or detective etc…
Measurements
Metrics, KPI
Testing procedure and Frequency
Steps to determine control effectiveness
Developed By
Person who developed control
Approved By
Person who approved control
Approval Date
Date control approved
Version
Version number
Cross References
Cross references to other controls, control frameworks, systems, documents etc..
Modification History
List of changes
Control Implementation
New control implementation shuld be guided by a foral process, with a new control having a;
- Control objective
- Design reviewed by stakeholders
- Test plan (results reviewed)
- Authorization to implement
- Change management process to plan implementation
268
Control Implementation
- Controls must have control owners. They are responsible for operation of each control
- New controls audited or reviewed more frequently to ensure operating as expected
268
Security and Control Operations
- Controls in service will transition into routine operations
- Control owners should/try to be aware of problems
- Modern information security control frameworks comprise multiple categories
268
Security and Control Operations
Control Frameworks comprise multiple categories;
- Event monitoring
- Vulnerability management
- Secure Engineering and Development
- Network protection
- Endpoint Protection and Mangaement
- Identify and Access Management
- Security Incident Management
- Security awareness and training
- Managed security services providers
- Data Security
- Business continuity planning
269
Event Monitoring
- Event Monitoring is the practice of examining security events that occur on information systems
Log Review
* An event log in an information system is examined
Centralised Log Management
* A practice where event logs on numerous sytems are sent over network to a central log server
Security Information Event Management (SIEM)
* Collects and analyses log data from many systems
Threat Intelligence Platform (TIP)
* Part of a modern SIEM that can receive and process threat intelligence information and correlate with received logs
Security Orchestration, Automation, and Response (SOAR)
* Orchestration refers to a scripted response automatically or manually triggered when a specific event occurs
269
Vulnerability Management
- Vulnerability management is practice of periodically examining information systems to discover exploitable vulnerabilities for the purpose of related analysis and decisions about remediation
- Primary activity to reduce likelihood of successful attacks
- Organisations often establish SLA’s for maximum time required for remediation
270
Periodic Scanning
Analysis of Scan Results
Delivery of Scan results to asset owners
Remediation
Vulnerability Management
Vulnerability management process includes the following activities;
- Periodic Scanning
- Analysis of Scan Results
- Delivery of Scan results to asset owners
- Remediation
271
Common Vulnerability Scoring System (CVSS)
Open framework that can be used to provide common methodology for scoring vulnerabilities
271
MITRE ATT&CK Framework
- Freely available knowledge base of threats, attack techniques, attack models adopted and used by organistaions to increase their understanding of and prevent cyber attacks
- Matrix classifies threats into several areas
- Reconnaissance
- Resource Development
- Initial Access
- Execution
- Persistence
- Privilege escalation
- Defense evasion
- Credential access
271
Vulnerability Identification Techniques
Security Scan
One or more vulnerability scanning tools used to identify vulnerabilities on target systems
Penetration Test
Used to mimic a realistic attack
Social Engineer Assessment
An assessment of the judgement of personnel in the organisation on how well they recognise various phishing techniques
272
Patch Management
- Practice of ensuring that IT systems, tools, applications have consistent version and patch levels
- Typically requiest automation of deployment to be fully successful