Lesson 2: Comparing and Contrasting Security Controls Flashcards
Frameworks
Best practice guides to implementing IT and cybersecurity
Cybersecurity
mostly about selecting and implementing effective security controls
Security control
countermeasure is something designed to make a particular asset or information system secure (that is, give it the properties of confidentiality, integrity, availability, and non-repudiation)
Broad classes of controls
- Administrative/management Controls
- determine way people act, including policies, procedures, and guidance (annual or regularly scheduled security scans and audits can check for compliance with security policies)
- Technical Controls
- implemented in operating systems, software, and security appliances (for ex: Access Control Lists (ACL) and Intrusion Detection Systems
- Physical Controls
- alarms, gateways, and locks that deter access to premises and hardware are often classed separately
Functions of controls
- Preventive
- Control physically or logically restricts unauthorized access
- Deterrent
- Control may not physically or logically prevent access, but psychologically discourages an attacker from attempting an intrusion
- Detective
- Control may not prevent or deter access, but it will identify and record and any attempted or successful intrusion
- Corrective
- Control responds to and fixes an incident and may also prevent its recurrence
- Compensating
- Control does not prevent attack but restores function of system through some other means, such as using data backup or an alternative site
Layered security
- typically seen as best protection for systems security because it provides defense in depth
- Attacker must get past multiple security controls, providing control diversity
Control diversity
Combine different classes of technical and administrative controls with range of control functions (prevent, deter, detect, correct, and compensate)
Vendor diversity
- security controls are sourced from multiple suppliers
- Single vendor
- Advantages
- Interoperability
Training reduction
Support Costs - Disadvantages
- Not obtaining best-in-class performance
Less complex attack surface
Less innovation
Cybersecurity framework
- List of activities and objectives undertaken to mitigate risks
- Makes an objective statement of its current cybersecurity capabilities
- Identifies target level of capability
- Prioritizes investments to achieve target
- Valuable for giving a structure to internal risk management procedures and also provides an externally verifiable statement of regulatory compliance
Critical security management activity
Governed by formal policies and procedures, setting out roles and responsibilities for an incident response team
Incident Response Procedures
- Procedures and guidelines for dealing with security incidents
- Incident where security is breached or there is an attempted breach
Stages of an Incident Response Lifecycle
- Preparation: making system resilient to attack in the first place
- Identification: determining whether an incident has taken place and assessing how severe it might be
- Containment, Eradication, and Recovery: limits scope and impact of incident
- Lessons Learned: analyze incident and responses to identify whether procedures or systems could be improved
Incident Response Plan
Preparing for incident response means establishing policies and procedures for dealing with security breaches and personnel and resources
Data Integrity
Value of data
Downtime
degree to which an incident disrupts business processes