1: Risk management Flashcards
CIA triad
Security goals: confidentiality, integrity (permissions) and availability + Auditing&Accountability, Non-Repudiation (user cannot deny communication).
Risk
Threats x Vulnerabilities = risk SP800-30
Threat Actors
(Internal/External): Script kiddies - amateur Hacktivist - intent & motivation Organized crime Nation states/advanced persistent threat (APT) Insiders Competitors
Risk Assessment
List of assets->value->vulnerabilities
cve.mitre.org - common vulnerabilities
Nessus, Penetration testing - vulnerability assessment tool
Threat Types
Adversarial
Accidental
Structural
Environmental
Risk Response
Mitigation
Risk transference
Risk acceptance
Risk avoidance
Frameworks
NIST Risk Management Framework 800-37
ISACA Risk IT Infrastructure
Guides for Risk Assessment
Benchmarks Thresholds Secure configurations Network infrastructure devices - info by CISCO, etc. General Purpose guides
Security Controls
(Protect IT infrastructure and remediate problems)
Administrative Control
Technical Control
Physical Control
Security Control Functions
Deterrent Preventative Detective Corrective Compensating
Security Control Examples
Mandatory Vacation Job Rotation Multižperson Control Seperation of Duties (Administrative). Principle of least priviledge
Sources of Security Controls
- Laws and regulations - for ex. HIPAA
- Standards (government and industry, PCI-DSS - for credit cards)
- Best Practices
- Common Sense
Security Controls
- Policies
- Organizational Standards - higher level of detail than policies
Procedures - how to
Guidelines (optional)
Security Policies
Acceptable Use Policy - what a person can and cannot do on company assets
Data Sensitivity and Classification - confidential, etc.
Access Control Policies - what and how access data, etc.
Password policy
Care and Use of Equipment
Privacy Policies - in house or customers
Personnel policy
Framework
regulatory, non-regulatory, national standards, international standards, industry-specific. (NIST SP800-37 - regulatory, ISACA IT Infrastructure - non-regulatory, ISO 27000 - international)
NIST: Categorize Systems->Select Security Controls->Implement Security Controls->Asses Security Controls (Sandbox)->Authorize Information Systems->Monitor Security Controls