ISC2 - Study Notes 17 Flashcards
Gain permissions, Perform Vulnerability Assessment (discovery/recon, fingerprinting, identify Vuln.s), Attempt to exploit Vuln.’s, Report Results to Management (report with recommendations for controls to mitigate any of the Vuln.’s.
Steps for Penetration Testing :
The cost of a control is justified if the cost of the control is significantly lower than the annual loss expectancy (ALE) without the control. The cost is usually not justified if the cost of the control is significantly higher than the ALE without the control. When the costs and savings are about the same, management may request a return on investment (ROI) analysis to determine whether the cost is justified. The ROI looks at the cost over a longer period of time.
Info
(1) Select Security Controls (The evaluation often includes a risk assessment, including either a quantitative analysis or a qualitative analysis, and a cost-benefit analysis to determine the benefit of the control), (2) Implement Security Controls, (3) Assess Security Controls (verify controls to see if they are implemented correctly), (4) Monitor Security Controls (monitoring on continual basis to see their effectiveness - and also monitor additional factors such as changes to the protected system and changes to external laws, regulations, policies, and guidelines).
Controls have three primary goals: prevention, detection, and correction.
Security Controls Lifecycle / Info
Intrusion prevention systems
Written policies and procedures
Background checks on prospective employees
Implementation of separation of duties and least privilege policies
Strong access control processes (starting with strong authentication)
Technical password policies that force users to create strong passwords and change them periodically
Termination processes that ensure personnel disable accounts for terminated employees
Classification of data (such as public, private, and proprietary) and implementation of varying levels of protection based on the classification
Encryption of data (both at rest and in transit)
Security cameras, fences, and guards
Preventative Controls
Forensics analysis
Physical inventories
Intrusion detection systems
Scripts to automate discovery of events of interest
AV software that can detect malware installed on a system
Audit logs (including logs on servers and network resources such as firewalls)
Reconciliation (comparing different sets of data with each other, such as comparing a database inventory with a physical inventory)
Detective Controls
Intrusion detection systems (that can actively make changes)
AV software that can remove or isolate malware
Procedures to back up data and restore backups
Disaster recovery and business continuity plans
Scripts to automate corrective processes
Corrective Controls
Many controls combine preventive, detective, and corrective measures. For example, AV software is detective when it identifies malware and corrective when it removes it. Similarly, a backup policy is a preventive control because it attempts to prevent the loss of data. The procedures to restore data from backups are corrective controls because they provide the means to restore data after a data loss.
Info
Directive controls These are controls mandated by a higher authority. For example, the Health Insurance Portability and Accountability Act (HIPAA) directs organizations to implement specific safeguards to protect private health information (PHI). The controls that an organization implements to protect PHI are directive controls.
Info
Written documents such as security policies and standards that provide direction to employees
Step-by-step procedures for routine operations such as performing backups and verifying proper operation of fire prevention and detection equipment
Baseline templates to provide a starting point for security controls
Clear processes for configuration, change, and patch management
Tests and assessments such as risk assessments and vulnerability assessments
Plans (such as incident response plans) that help an organization respond to incidents
User awareness and training programs to help users take an active role in security
Administrative Controls
Identification and authentication controls that allow users to prove their identity
Technical password policies that enforce the written security policies, such as password aging settings that force users to change their password periodically
Access controls that ensure only authorized entities have access to systems and data
Auditing and accountability controls that track activity and detect unauthorized access
Network access controls that restrict access to networks to clients that do not meet minimum security requirements
Encryption protocols that scramble data and provide confidentiality
Session timeout settings that lock a user’s system or close a web browser session after a period of inactivity
Technical Controls