Chapter 1 Flashcards
AAA
Identification
Authentication
Authorization
Auditing
Accounting
Security Management Planning
Strategic plan - long term 5 years
Tactical plan - 1 year
Operational plan - detailed short-term to support strategic and tactical plans
Most important to do for organization, hardware, software, service acquisition
Identify risks
Security roles (CISSP)
Senior management (approve policy)
Security professional (write policy and implement)
Asset owner (responsible for protection; security classifications)
Custodian (day to day protection activities)
User
Auditor
COBIT
- security framework reference
- used for auditing
Provide Stakeholder Value
Holistic Approach
Dynamic Governance System
Governance Distinct from Management
Tailored to Enterprise Needs
End-to-End Governance System
Due Diligence - planning
Due Care - implementing
Senior management - show due diligence and due care
Documentation review
For gov’t agencies
ATO
Security Management Plan:
Policy, Standards, Procedures, Guidelines
Policy - scope
Standards - support policy
Baseline - minimum level of security for all assets, systems, etc. must meet
Procedures - satisfy standards
Guidelines - recommendations only
Threat Modeling
- Identify
- Categorize
- Analyze
STRIDE - Microsoft, s/w development, threat categorization
PASTA - risk centric around value of assets
VAL - for agile development
STRIDE
Spoof
Tampering
Repudiation
Info disclosure
Denial of service
Elevation of privilege
PASTA
(Threat modeling)
7 stages:
Stage I: Definition of the Objectives (DO) for the Analysis of Risks
Stage II: Definition of the Technical Scope (DTS)
Stage III: Application Decomposition and Analysis (ADA)
Stage IV: Threat Analysis (TA)
Stage V: Weakness and Vulnerability Analysis (WVA)
Stage VI: Attack Modeling & Simulation (AMS)
Stage VII: Risk Analysis & Management (RAM)
Reduction analysis or decomposition of system
Diagram that shows:
Trust boundaries
Data flow
Input points
Privilege operations
Security policy
Threat modeling - Focus on threats
Risk assessment - Focus on assets
Rank threats (Threat modeling)
Probability x Damage
High/Med/Low Matrix
DREAD
DREAD
(Rank threats)
Damage potential
Reproducibility
Exploitability
Affected users
Discoverability