Security Fundamentals Flashcards
MITRE
Not An AcronymThe Mitre Corporation is an American non-profit organization. It manages federally funded research and development centers (FFRDCs) supporting various U.S. government agencies in the aviation, defense, healthcare, homeland security, and cybersecurity fields, among others.MITRE formed in 1958 as a military think tank, spun out from the radar and computer research at the MIT Lincoln Laboratory. Over the years, MITRE’s field of study had greatly diversified. In the 1990s, with the winding down of the cold war, private companies complained that MITRE had an unfair advantage competing for civilian contracts; in 1996 this led to the civilian projects being spun off to a new company, Mitretek. Mitretek was renamed Noblis in 2007.
CVE
Common Vulnerabilities and Exposures- CVE (Common Vulnerabilities and Exposures) identify, define and catalog publicly disclosed cybersecurity vulnerabilities.- Its is important to stay aware of relevant CVEs for the tech stack that you or your company uses.- It is maintained by Mitre (A US non-profit)- Ratings: Low, Medium, High, and Critical - Ratings are aligned to CVSS- Famous CVEs: - CVE-2014-0160 - Heartbleed (OpenSSL) - CVE-2017-0143 - SMB (Used by WannaCry) - CVE-2019-0708 - BlueKeep (RDP) - CVE-2021-44229 - Log4j
CVSS
Common Vulnerability Scoring System- Standard for assessing severity of security vulnerabilities- Scores are calculated based on separate metrics, given a score of 0 - 10 (one decimal place) - Low : 0.1 - 3.9 - Medium : 4.0 - 6.9 - High : 7.0 - 8.9 - Critical : 9.0 - 10.0- Used by CVEs- The CVSS base score is a measure of theseverity of a vulnerability.
FIRST
Forum of Incident Response and Security TeamsTheForum of Incident Response and Security Teams(FIRST) is a global forum of incident response and security teams. They aim to improve cooperation between security teams on handling major cybersecurity incidents.FIRST is an association of incident response teams with global coverage.The 2018 Report of the United Nations Secretary-General’s High-Level Panel on Digital Cooperation noted FIRST as a neutral third party which can help build trust and exchange best practices and tools during cybersecurity incidents.Known for governing the EPSS (Exploit Prediction Scoring System).
EPSS
Exploit Prediction Scoring System- EPSS aims to measure the probability of a vulnerability being used in an exploit, and therefore determine the risk that a CVE will be used in an attack.- While other industry standards have been useful for capturing innate characteristics of a vulnerability and provide measures of severity, they are limited in their ability to assess threat. EPSS fills that gap because it uses current threat information from CVE and real-world exploit data.- The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.- EPSS is governed by the Forum of Incident Response and Security Teams (FIRST), a team responsible for a number of vulnerability scoring protocols.- Because EPSS is driven by the data and has a strong temporal aspect, it only learns from the exploitation activity it sees (from data partners) and predicts on the vulnerability attributes presented.- Note that EPSS relies onindustry partners, (Fortinet, GreyNoise Intelligence, The Shadowserver Foundation, F5, Efflux, AlienVault and Cisco) and does not curate any of our own exploitation activity.
What is the difference between CVSS vs EPSS?
- The CVSS base score is a measure of the severity of a vulnerability.* EPSS aims to measure the probability of a vulnerability being used in an exploit, and therefore determine theriskthat a CVE will be used in an attack.
What is the benefit of EPSS vs CVSS?
EPSS provides a real-time assessment; a method for prioritizing the riskiest vulnerabilities where CVSS provides the severity score. In addition, the details of a CVSS base score, e.g. the specific attack vector, can help refine that prioritization under knowledge of the specifics of a user’s environment. Used together, EPSS and CVSS allow network defenders to prioritize the most severe and riskiest CVEs for remediation efforts.
CISA
Cybersecurity & Infrastructure Security Agency - A US federal agency which provides information on how to defend against threats to cyber and physical infrastructure- They maintain helpful information such as: - KEV - Known Exploited Vulneralbilites catalog - Alerts- Many countries have their own equivalent - ex. UK has NCSC- But CISA is not necessarily US specific and will be applicable to anyone in the security field
KEV
Known Exploited VulnerabilitiesCISA KEV is a database of security flaws in software applications and weaknesses that have been exposed and leveraged by attackers. This catalog is publicly available online atCISA KEV.The Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) released a Binding Directive mandating organizations to patch a list of Known Exploited Vulnerabilities (KEV) on November 03, 2021, with specified deadlines. This catalog started with 287 vulnerabilities, and the count stands at over 1000 today (1076).**
NIST
(US) National Institute of Standards and Technology- TheNational Institute of Standards and Technology(NIST) is an agency of the[United States Department of Commerce] whose mission is to promote American innovation and industrial competitiveness.- NIST’s activities are organized intophysical sciencelaboratory programs that includenanoscale science and technology,engineering,information technology,neutronresearch, material measurement, and physical measurement.
CSF
CSF - NIST Cyber Security Framework- A set of guidelines for mitigatingorganizationalcybersecurityrisks, published by the USNational Institute of Standards and Technology(NIST) based on existing standards, guidelines, and practices.[1]- The Framework is voluntary guidance, based on existing standards, guidelines, and practices for organizations to better manage and reduce cybersecurity risk. In addition to helping organizations manage and reduce risks, it was designed to foster risk and cybersecurity management communications amongst both internal and external organizational stakeholders. - The NIST Cybersecurity Framework is designed for individual businesses and other organizations to assess risks they face. - The framework is divided into three parts, “Core”, “Profile” and “Tiers”. - Core - The “Framework Core” contains an array of activities, outcomes and references about aspects and approaches to cybersecurity. - Tiers - The “Framework Implementation Tiers” are used by an organization to clarify for itself and its partners how it views cybersecurity risk and the degree of sophistication of its management approach. - Profile - A “Framework Profile” is a list of outcomes that an organization has chosen from the categories and subcategories, based on its needs and risk assessments. It is documentation of those outcomes. - An organization typically starts by using the framework to develop a “Current Profile” which describes its cybersecurity activities and what outcomes it is achieving. - It can then develop a “Target Profile”, or adopt a baseline profile tailored to its sector (e.g. infrastructure industry) or type of organization. It can then define steps for switching from its current profile to its target profile.The Framework Core is made up of 5 functions: - Identify - ID - Protect - PR - Detect - DE - Respond - RS - Recover - RC
CSA
Cloud Security AllianceCloud Security Alliance(CSA) is a not-for-profit organization with the mission to “promote the use of best practices for providing security assurance withincloud computing, and to provide education on the uses of cloud computing to help secure all other forms of computing.”[1]- Cloud Controls Matrix (CCM). Security controls framework for cloud provider and cloud consumers.
CCM
Cloud Controls MatrixTheCSA Cloud Controls Matrix (CCM)is a cybersecurity control framework for cloud computing. It is a spreadsheet that lists 16 domains covering all key aspects of cloud technology. Each domain is broken up into 133 control objectives. It can be used as a tool to systematically assess cloud implementation, by providing guidance on which security controls should be implemented by which actor within the cloud supply chain.The controls framework is aligned to theSecurity Guidance v4and is currently considered a de-facto standard for cloud security assurance and compliance.
FedRamp
Federal Risk and Authorization Management ProgramAt its core,FedRAMP is a government-wide programstandardizing the approach to security assessment, authorization, and continuous monitoring for cloud products and services. That’s a mouthful, but in simpler terms, it’s a seal of approval, ensuring cloud services have the right level of security to be used by federal agencies.For cloud professionals, FedRAMP can sometimes feel like a high bar to clear. But once you understand its essence, it’s really about maintaining the highest standard of data protection. It follows a “do once, use many times” framework which reduces the efforts, time, and costs that would otherwise be required for the security assessment of a cloud service.Three levels of security impact are defined in FedRAMP - Low, Moderate, and High, each corresponding to the potential impact of a security breach.FedRAMP may feel like a tough nut to crack, but it’s worth it. Adhering to its guidelines not only helps you serve government clients but also elevates your overall cloud security posture. So, despite the challenges it may pose, it’s a badge of honor in the cloud industry.
HIPPA
Health Insurance Portability and Accountability ActHealthcare and cloud computing - a match made in heaven? Well, if you’re in the healthcare sector or deal with health-related data in the U.S., you’ve likely come across the term HIPAA.HIPAA, or theHealth Insurance Portability and Accountability Act, is not a framework like some of our previous entries. Instead, it’s a U.S. law designed to provide privacy standards to protect patients’ medical records and other health information provided to health plans, doctors, hospitals, and other healthcare providers.In the context of cloud services, HIPAA applies to cloud providers that process, store, or transmit “Protected Health Information” (PHI). To be considered HIPAA-compliant, cloud providers must implement a robust set of physical, network, and process security measures. Moreover, they need to sign a Business Associate Agreement (BAA) in which they commit to comply with certain provisions of HIPAA rules.HIPAA compliance might feel like navigating through a maze at times, but it’s ultimately about ensuring the privacy and security of sensitive health information. Adhering to its guidelines means you’re treating your customers’ health data with the care and respect they deserve.