SlideShare a Scribd company logo
1 of 37
Chapter 9
Implementing Controls
to
Protect Assets
CompTIA Security+
Get Certified Get Ahead
1
Introduction
• Implementing defense in depth
• Comparing physical security controls
• Adding redundancy and fault
tolerance
• Protecting data with backups
• Comparing business continuity
elements
Implementing
Defense in
Depth
• Layered security
• Control diversity
• Vendor diversity
Physical
Security
Controls
• Perimeter
• Building
• Secure work areas
• Server and network rooms
• Hardware (such as cable locks)
• Airgap
Physical
Security
Controls
• Signs
• Door access systems
– Cipher locks
– Proximity cards
– Biometrics
Physical
Security
Controls
• Tailgating and mantraps
• Security guards
Physical
Security
Controls
• Cameras and video surveillance
(CCTV)
• Fencing, lighting, and alarms
• Barricades
• Bollards
Physical
Security
Controls
• Hardware locks
– Doors
– Cable locks
– Locked cabinets
– Safes
Asset
Management
• Architecture weaknesses
• Design weaknesses
• System sprawl
• Undocumented assets
Environmental
Controls
HVAC systems
• Higher-tonnage HVAC systems provide
more cooling capacity
– Keeps server rooms at lower operating
temperatures
– Results in fewer failures and longer MTBF
times
• Temperature control systems
– Help ensure a relatively constant
temperature
• Humidity controls
– Reduce the potential for ESD damage
– Reduce damage from condensation
Environmental Controls
• Hot and cold aisles
• Regulate the cooling
Server
Cabinet
Server
Cabinet
Hot Aisle
Cold Aisle Cold AisleServer
Cabinet
Server
Cabinet
Environmental
Controls
• HVAC systems
– Should be integrated with the fire alarm
systems
– Have dampers or the ability to be turned off
in the event of a fire
• Extinguish fire
– Remove the heat
– Remove the oxygen
– Remove the fuel
– Disrupt chain reaction
NEVER use water
on an electrical fire
Shielding
• Shielded cables
– Protects against EMI and RFI
– Prevent someone from capturing network
traffic
• EMI shielding
– Prevents outside interference sources from
corrupting data
– Prevents data from emanating outside the
cable
• Protected distribution of cabling
• Faraday cage
Redundancy
and Fault
Tolerance
• Single point of failure
– Any component whose failure results in the
failure of an entire system
• Remove single points of failure with
– RAID (disk)
– Failover clustering (server)
– UPS and generators (power)
• Single points of failure are often
overlooked until a disaster occurs
Disk
Redundancies
• Inexpensive
• Adds fault tolerance and increases
availability
• Hardware RAID more efficient than
software RAID
Disk
Redundancies
• RAID-0 no redundancy
– Two or more disks
• RAID-1 uses two disks as a mirror
– Two disks
• RAID-5 can survive failure of one disk
– Three or more disks
• RAID-6 can survive failure of two disks
– Four or more disks
• RAID-10 combines RAID-1 and RAID-0
– Even number of disks
Server
Redundancy
• Failover clusters for high availability
• Remove a server as a single point of
failure
Server
Redundancy
• Load balancing for high availability
• Round-robin
• Affinity
Power
Redundancies
• UPS
– Provides short-term fault tolerance for
power
– Can protect against power fluctuations
• Generators provide long-term
fault tolerance for power
Protecting
Data with
Backups
• Full backups
– Fastest recovery time
• Differential backup
– Backs up all the data that has changed since
the last full or differential backup
• Incremental backup
– Backs up all the data that has changed since
the last full or incremental backup
Protecting
Data with
Backups
• Snapshot backup
• Testing backups
• Test restores
– Best way to test the integrity of backup data
– Full test restore
• Verifies a backup can be recovered in its entirety
– Partial test restore
• Verifies that individual files can be restored
Protecting
Data with
Backups
• Protecting backups
– Label clearly to identify the data
– Use physical security prevent unauthorized
access
– Protect it during location transfers
• Copy should be stored in separate location
• Destroy when no longer needed
– Degauss the media, shred or burn the
media, or scrub with software to overwrite
data
Protecting
Data with
Backups
• Geographic considerations
– Off-site backups
– Distance
– Location selection
– Legal implications
– Data sovereignty
Backup
Policies and
Plans
• Data to backup
• Off-site backups
• Label media
• Testing
• Retention requirements
• Frequency of backups
• Protect backups
• Disposing of media
Business
Continuity
Elements
• Protect against disasters and outages
– Fires
– Attacks
– Power outages
– Data loss from any cause
– Hardware and software failures
– Natural disasters, such as hurricanes,
floods, tornadoes, and earthquakes
Business
Continuity
Elements
• Business impact analysis (BIA)
identifies:
– Systems and components that are essential
to the organization’s success (must continue
to operate)
– Maximum downtime limits for these
systems and components
– Scenarios that can impact these systems
and components
– Potential losses from an incident
– Assets to include in recovery plans
Business
Impact
Analysis
• Impact
• Privacy impact
• Privacy threshold assessment
– Identifies PII
– Typically uses a simple questionnaire
• Privacy impact assessment
– Do if system holds/processes PII
– Identifies risks related to PII, such as data
loss
Business
Impact
Analysis
• Recovery Time Objective (RTO)
– Identifies maximum amount of time it
should take to restore a system after an
outage
– Derived from maximum allowable outage
time identified in the BIA
• Recovery Point Objective (RPO)
– Refers to the amount of data an
organization can afford to lose
Risk Metrics
• Mean time between failures (MTBF)
– Provides a measure of a system’s reliability
– Usually represented in hours
– MTBF indicates the device can be repaired
• Mean time to recover or mean time to
repair (MTTR)
– The time it takes to restore a failed system
– Often specified in contracts as a target
Continuity of
Operations
Sites
• Provides an alternate location for
operations after a critical outage
• Most common sites are hot, cold, and
warm sites
• Hot site
– Includes personnel, equipment, software,
and communications capabilities of the
primary site
– All the data is up to date
– Can take over for a failed site within an
hour
– Most effective disaster recovery
solution for an alternate site
– Most expensive to maintain
Continuity of
Operations
Sites
• Cold site
– Has power and connectivity needed for
COOP activation, but little else
– Least expensive and hardest to test
• Warm site
– Compromise between a
hot site and a cold site
• Mobile site
– Do not have dedicated locations
– Can provide temporary support during a
disaster.
Continuity of
Operations
Sites
• Mobile site
– Do not have dedicated locations
– Can provide temporary support during a
disaster.
• Mirrored site
– Identical to the primary location
– Provide 100 percent availability
• Order of restoration
– Return least critical functions first
Disaster
Recovery Plan
(DRP)
• Part of BCP
• Includes a hierarchical list of critical
systems
• Prioritizes services to restore after an
outage
• Testing validates a DRP
• Recovered systems tested before
returning to operation
– Can include a comparison to baselines
Disaster
Recovery Plan
(DRP)
• Phases
– Activate the disaster recovery plan
– Implement contingencies
– Recover critical systems
– Test recovered systems
– Document and review
• Includes a review to identify any lessons learned
• May include an update of the plan
BCP and DRP
Testing
• Validate BCPs and DRPs through
testing
• Tabletop exercises
– Discussion-based only
– Typically performed in a classroom or
conference setting
• Functional exercises
– Hands-on exercises
– Test backups, server restoration, and server
redundancy
Chapter 9
Summary
• Implementing defense in depth
• Comparing physical security controls
• Adding redundancy and fault
tolerance
• Protecting data with backups
• Comparing business continuity
elements

More Related Content

What's hot

7. Security Operations
7. Security Operations7. Security Operations
7. Security OperationsSam Bowne
 
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementCISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementSam Bowne
 
6. Security Assessment and Testing
6. Security Assessment and Testing6. Security Assessment and Testing
6. Security Assessment and TestingSam Bowne
 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical securityKarthikeyan Dhayalan
 
CNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and TestingCNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and TestingSam Bowne
 
CNIT 125: Ch 4. Security Engineering (Part 1)
CNIT 125: Ch 4. Security Engineering (Part 1)CNIT 125: Ch 4. Security Engineering (Part 1)
CNIT 125: Ch 4. Security Engineering (Part 1)Sam Bowne
 
CISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and TestingCISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and TestingSam Bowne
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk ManagementSam Bowne
 
CNIT 121: 16 Report Writing
CNIT 121: 16 Report WritingCNIT 121: 16 Report Writing
CNIT 121: 16 Report WritingSam Bowne
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)Sam Bowne
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security EngineeringSam Bowne
 
CNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset SecurityCNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset SecuritySam Bowne
 
CNIT 50: 9. NSM Operations
CNIT 50: 9. NSM OperationsCNIT 50: 9. NSM Operations
CNIT 50: 9. NSM OperationsSam Bowne
 
2. Asset Security
2. Asset Security2. Asset Security
2. Asset SecuritySam Bowne
 
Operations Security Presentation
Operations Security PresentationOperations Security Presentation
Operations Security PresentationWajahat Rajab
 
CNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsCNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsSam Bowne
 
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsSam Bowne
 
CNIT 125 6. Identity and Access Management
CNIT 125 6. Identity and Access ManagementCNIT 125 6. Identity and Access Management
CNIT 125 6. Identity and Access ManagementSam Bowne
 
CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)Sam Bowne
 
CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)Sam Bowne
 

What's hot (20)

7. Security Operations
7. Security Operations7. Security Operations
7. Security Operations
 
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementCISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access Management
 
6. Security Assessment and Testing
6. Security Assessment and Testing6. Security Assessment and Testing
6. Security Assessment and Testing
 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical security
 
CNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and TestingCNIT 125 7. Security Assessment and Testing
CNIT 125 7. Security Assessment and Testing
 
CNIT 125: Ch 4. Security Engineering (Part 1)
CNIT 125: Ch 4. Security Engineering (Part 1)CNIT 125: Ch 4. Security Engineering (Part 1)
CNIT 125: Ch 4. Security Engineering (Part 1)
 
CISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and TestingCISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and Testing
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
CNIT 121: 16 Report Writing
CNIT 121: 16 Report WritingCNIT 121: 16 Report Writing
CNIT 121: 16 Report Writing
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
 
CNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset SecurityCNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset Security
 
CNIT 50: 9. NSM Operations
CNIT 50: 9. NSM OperationsCNIT 50: 9. NSM Operations
CNIT 50: 9. NSM Operations
 
2. Asset Security
2. Asset Security2. Asset Security
2. Asset Security
 
Operations Security Presentation
Operations Security PresentationOperations Security Presentation
Operations Security Presentation
 
CNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsCNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security Operations
 
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security Operations
 
CNIT 125 6. Identity and Access Management
CNIT 125 6. Identity and Access ManagementCNIT 125 6. Identity and Access Management
CNIT 125 6. Identity and Access Management
 
CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)
 
CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)CISSP Prep: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)
 

Similar to 501 ch 9 implementing controls

04. availability-concepts
04. availability-concepts04. availability-concepts
04. availability-conceptsMuhammad Ahad
 
501 ch 9 implementing controls to protect assets
501 ch 9 implementing controls to protect assets501 ch 9 implementing controls to protect assets
501 ch 9 implementing controls to protect assetsgocybersec
 
Cloud Based Business Continuity - Murat Lostar @ ISACA EUROCACS 2013
Cloud Based Business Continuity - Murat Lostar @ ISACA EUROCACS 2013Cloud Based Business Continuity - Murat Lostar @ ISACA EUROCACS 2013
Cloud Based Business Continuity - Murat Lostar @ ISACA EUROCACS 2013Lostar
 
05. performance-concepts-26-slides
05. performance-concepts-26-slides05. performance-concepts-26-slides
05. performance-concepts-26-slidesMuhammad Ahad
 
It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery Brian Pichman
 
05. performance-concepts
05. performance-concepts05. performance-concepts
05. performance-conceptsMuhammad Ahad
 
MySQL enterprise backup overview
MySQL enterprise backup overviewMySQL enterprise backup overview
MySQL enterprise backup overview郁萍 王
 
Backup and recovery
Backup and recoveryBackup and recovery
Backup and recoverydhawal mehta
 
MySQL Enterprise Backup
MySQL Enterprise BackupMySQL Enterprise Backup
MySQL Enterprise BackupMario Beck
 
KoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBegan
KoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBeganKoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBegan
KoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBeganTobias Koprowski
 
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfCIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfBabyBoy55
 
Data and database administration(database)
Data and database administration(database)Data and database administration(database)
Data and database administration(database)welcometofacebook
 
Dependable Systems - Introduction (1/16)
Dependable Systems - Introduction (1/16)Dependable Systems - Introduction (1/16)
Dependable Systems - Introduction (1/16)Peter Tröger
 
Mtc learnings from isv & enterprise (dated - Dec -2014)
Mtc learnings from isv & enterprise (dated - Dec -2014)Mtc learnings from isv & enterprise (dated - Dec -2014)
Mtc learnings from isv & enterprise (dated - Dec -2014)Govind Kanshi
 
Mtc learnings from isv & enterprise interaction
Mtc learnings from isv & enterprise  interactionMtc learnings from isv & enterprise  interaction
Mtc learnings from isv & enterprise interactionGovind Kanshi
 
API Training 10 Nov 2014
API Training 10 Nov 2014API Training 10 Nov 2014
API Training 10 Nov 2014Digital Bond
 

Similar to 501 ch 9 implementing controls (20)

04. availability-concepts
04. availability-concepts04. availability-concepts
04. availability-concepts
 
501 ch 9 implementing controls to protect assets
501 ch 9 implementing controls to protect assets501 ch 9 implementing controls to protect assets
501 ch 9 implementing controls to protect assets
 
Cloud Based Business Continuity - Murat Lostar @ ISACA EUROCACS 2013
Cloud Based Business Continuity - Murat Lostar @ ISACA EUROCACS 2013Cloud Based Business Continuity - Murat Lostar @ ISACA EUROCACS 2013
Cloud Based Business Continuity - Murat Lostar @ ISACA EUROCACS 2013
 
05. performance-concepts-26-slides
05. performance-concepts-26-slides05. performance-concepts-26-slides
05. performance-concepts-26-slides
 
It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery
 
05. performance-concepts
05. performance-concepts05. performance-concepts
05. performance-concepts
 
MySQL enterprise backup overview
MySQL enterprise backup overviewMySQL enterprise backup overview
MySQL enterprise backup overview
 
Backup and recovery
Backup and recoveryBackup and recovery
Backup and recovery
 
MySQL Enterprise Backup
MySQL Enterprise BackupMySQL Enterprise Backup
MySQL Enterprise Backup
 
KoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBegan
KoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBeganKoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBegan
KoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBegan
 
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfCIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdf
 
Data and database administration(database)
Data and database administration(database)Data and database administration(database)
Data and database administration(database)
 
Disaster Recover : 10 tips for disaster recovery planning
Disaster Recover : 10 tips for disaster recovery planningDisaster Recover : 10 tips for disaster recovery planning
Disaster Recover : 10 tips for disaster recovery planning
 
Dependable Systems - Introduction (1/16)
Dependable Systems - Introduction (1/16)Dependable Systems - Introduction (1/16)
Dependable Systems - Introduction (1/16)
 
Andrew waugh
Andrew waughAndrew waugh
Andrew waugh
 
Data center
Data centerData center
Data center
 
1588494157-15.pptx
1588494157-15.pptx1588494157-15.pptx
1588494157-15.pptx
 
Mtc learnings from isv & enterprise (dated - Dec -2014)
Mtc learnings from isv & enterprise (dated - Dec -2014)Mtc learnings from isv & enterprise (dated - Dec -2014)
Mtc learnings from isv & enterprise (dated - Dec -2014)
 
Mtc learnings from isv & enterprise interaction
Mtc learnings from isv & enterprise  interactionMtc learnings from isv & enterprise  interaction
Mtc learnings from isv & enterprise interaction
 
API Training 10 Nov 2014
API Training 10 Nov 2014API Training 10 Nov 2014
API Training 10 Nov 2014
 

More from gocybersec

501 ch 3 network technologies and tools
501 ch 3 network technologies and tools501 ch 3 network technologies and tools
501 ch 3 network technologies and toolsgocybersec
 
501 ch 10 understanding cryptography and pki
501 ch 10 understanding cryptography and pki501 ch 10 understanding cryptography and pki
501 ch 10 understanding cryptography and pkigocybersec
 
501 ch 8 risk managment tool
501 ch 8 risk managment tool501 ch 8 risk managment tool
501 ch 8 risk managment toolgocybersec
 
501 ch 7 protecting against advanced attacks
501 ch 7 protecting against advanced attacks501 ch 7 protecting against advanced attacks
501 ch 7 protecting against advanced attacksgocybersec
 
501 ch 6 threats vulnerabilities and common attacks
501 ch 6 threats vulnerabilities and common attacks501 ch 6 threats vulnerabilities and common attacks
501 ch 6 threats vulnerabilities and common attacksgocybersec
 
501 ch 5 securing hosts and data
501 ch 5 securing hosts and data501 ch 5 securing hosts and data
501 ch 5 securing hosts and datagocybersec
 
501 ch 4 securing your network
501 ch 4 securing your network501 ch 4 securing your network
501 ch 4 securing your networkgocybersec
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies toolsgocybersec
 
501 ch 2 understanding iam
501 ch 2 understanding iam501 ch 2 understanding iam
501 ch 2 understanding iamgocybersec
 
501 ch 1 mastering security basics
501 ch 1 mastering security basics501 ch 1 mastering security basics
501 ch 1 mastering security basicsgocybersec
 
501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacksgocybersec
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies toolsgocybersec
 
501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basics501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basicsgocybersec
 

More from gocybersec (13)

501 ch 3 network technologies and tools
501 ch 3 network technologies and tools501 ch 3 network technologies and tools
501 ch 3 network technologies and tools
 
501 ch 10 understanding cryptography and pki
501 ch 10 understanding cryptography and pki501 ch 10 understanding cryptography and pki
501 ch 10 understanding cryptography and pki
 
501 ch 8 risk managment tool
501 ch 8 risk managment tool501 ch 8 risk managment tool
501 ch 8 risk managment tool
 
501 ch 7 protecting against advanced attacks
501 ch 7 protecting against advanced attacks501 ch 7 protecting against advanced attacks
501 ch 7 protecting against advanced attacks
 
501 ch 6 threats vulnerabilities and common attacks
501 ch 6 threats vulnerabilities and common attacks501 ch 6 threats vulnerabilities and common attacks
501 ch 6 threats vulnerabilities and common attacks
 
501 ch 5 securing hosts and data
501 ch 5 securing hosts and data501 ch 5 securing hosts and data
501 ch 5 securing hosts and data
 
501 ch 4 securing your network
501 ch 4 securing your network501 ch 4 securing your network
501 ch 4 securing your network
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies tools
 
501 ch 2 understanding iam
501 ch 2 understanding iam501 ch 2 understanding iam
501 ch 2 understanding iam
 
501 ch 1 mastering security basics
501 ch 1 mastering security basics501 ch 1 mastering security basics
501 ch 1 mastering security basics
 
501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacks
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies tools
 
501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basics501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basics
 

Recently uploaded

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 

Recently uploaded (20)

Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 

501 ch 9 implementing controls

  • 1. Chapter 9 Implementing Controls to Protect Assets CompTIA Security+ Get Certified Get Ahead 1
  • 2. Introduction • Implementing defense in depth • Comparing physical security controls • Adding redundancy and fault tolerance • Protecting data with backups • Comparing business continuity elements
  • 3. Implementing Defense in Depth • Layered security • Control diversity • Vendor diversity
  • 4. Physical Security Controls • Perimeter • Building • Secure work areas • Server and network rooms • Hardware (such as cable locks) • Airgap
  • 5. Physical Security Controls • Signs • Door access systems – Cipher locks – Proximity cards – Biometrics
  • 6. Physical Security Controls • Tailgating and mantraps • Security guards
  • 7. Physical Security Controls • Cameras and video surveillance (CCTV) • Fencing, lighting, and alarms • Barricades • Bollards
  • 8. Physical Security Controls • Hardware locks – Doors – Cable locks – Locked cabinets – Safes
  • 9. Asset Management • Architecture weaknesses • Design weaknesses • System sprawl • Undocumented assets
  • 10. Environmental Controls HVAC systems • Higher-tonnage HVAC systems provide more cooling capacity – Keeps server rooms at lower operating temperatures – Results in fewer failures and longer MTBF times • Temperature control systems – Help ensure a relatively constant temperature • Humidity controls – Reduce the potential for ESD damage – Reduce damage from condensation
  • 11. Environmental Controls • Hot and cold aisles • Regulate the cooling Server Cabinet Server Cabinet Hot Aisle Cold Aisle Cold AisleServer Cabinet Server Cabinet
  • 12. Environmental Controls • HVAC systems – Should be integrated with the fire alarm systems – Have dampers or the ability to be turned off in the event of a fire • Extinguish fire – Remove the heat – Remove the oxygen – Remove the fuel – Disrupt chain reaction NEVER use water on an electrical fire
  • 13. Shielding • Shielded cables – Protects against EMI and RFI – Prevent someone from capturing network traffic • EMI shielding – Prevents outside interference sources from corrupting data – Prevents data from emanating outside the cable • Protected distribution of cabling • Faraday cage
  • 14. Redundancy and Fault Tolerance • Single point of failure – Any component whose failure results in the failure of an entire system • Remove single points of failure with – RAID (disk) – Failover clustering (server) – UPS and generators (power) • Single points of failure are often overlooked until a disaster occurs
  • 15. Disk Redundancies • Inexpensive • Adds fault tolerance and increases availability • Hardware RAID more efficient than software RAID
  • 16. Disk Redundancies • RAID-0 no redundancy – Two or more disks • RAID-1 uses two disks as a mirror – Two disks • RAID-5 can survive failure of one disk – Three or more disks • RAID-6 can survive failure of two disks – Four or more disks • RAID-10 combines RAID-1 and RAID-0 – Even number of disks
  • 17.
  • 18. Server Redundancy • Failover clusters for high availability • Remove a server as a single point of failure
  • 19. Server Redundancy • Load balancing for high availability • Round-robin • Affinity
  • 20. Power Redundancies • UPS – Provides short-term fault tolerance for power – Can protect against power fluctuations • Generators provide long-term fault tolerance for power
  • 21. Protecting Data with Backups • Full backups – Fastest recovery time • Differential backup – Backs up all the data that has changed since the last full or differential backup • Incremental backup – Backs up all the data that has changed since the last full or incremental backup
  • 22. Protecting Data with Backups • Snapshot backup • Testing backups • Test restores – Best way to test the integrity of backup data – Full test restore • Verifies a backup can be recovered in its entirety – Partial test restore • Verifies that individual files can be restored
  • 23. Protecting Data with Backups • Protecting backups – Label clearly to identify the data – Use physical security prevent unauthorized access – Protect it during location transfers • Copy should be stored in separate location • Destroy when no longer needed – Degauss the media, shred or burn the media, or scrub with software to overwrite data
  • 24. Protecting Data with Backups • Geographic considerations – Off-site backups – Distance – Location selection – Legal implications – Data sovereignty
  • 25. Backup Policies and Plans • Data to backup • Off-site backups • Label media • Testing • Retention requirements • Frequency of backups • Protect backups • Disposing of media
  • 26. Business Continuity Elements • Protect against disasters and outages – Fires – Attacks – Power outages – Data loss from any cause – Hardware and software failures – Natural disasters, such as hurricanes, floods, tornadoes, and earthquakes
  • 27. Business Continuity Elements • Business impact analysis (BIA) identifies: – Systems and components that are essential to the organization’s success (must continue to operate) – Maximum downtime limits for these systems and components – Scenarios that can impact these systems and components – Potential losses from an incident – Assets to include in recovery plans
  • 28. Business Impact Analysis • Impact • Privacy impact • Privacy threshold assessment – Identifies PII – Typically uses a simple questionnaire • Privacy impact assessment – Do if system holds/processes PII – Identifies risks related to PII, such as data loss
  • 29. Business Impact Analysis • Recovery Time Objective (RTO) – Identifies maximum amount of time it should take to restore a system after an outage – Derived from maximum allowable outage time identified in the BIA • Recovery Point Objective (RPO) – Refers to the amount of data an organization can afford to lose
  • 30. Risk Metrics • Mean time between failures (MTBF) – Provides a measure of a system’s reliability – Usually represented in hours – MTBF indicates the device can be repaired • Mean time to recover or mean time to repair (MTTR) – The time it takes to restore a failed system – Often specified in contracts as a target
  • 31. Continuity of Operations Sites • Provides an alternate location for operations after a critical outage • Most common sites are hot, cold, and warm sites • Hot site – Includes personnel, equipment, software, and communications capabilities of the primary site – All the data is up to date – Can take over for a failed site within an hour – Most effective disaster recovery solution for an alternate site – Most expensive to maintain
  • 32. Continuity of Operations Sites • Cold site – Has power and connectivity needed for COOP activation, but little else – Least expensive and hardest to test • Warm site – Compromise between a hot site and a cold site • Mobile site – Do not have dedicated locations – Can provide temporary support during a disaster.
  • 33. Continuity of Operations Sites • Mobile site – Do not have dedicated locations – Can provide temporary support during a disaster. • Mirrored site – Identical to the primary location – Provide 100 percent availability • Order of restoration – Return least critical functions first
  • 34. Disaster Recovery Plan (DRP) • Part of BCP • Includes a hierarchical list of critical systems • Prioritizes services to restore after an outage • Testing validates a DRP • Recovered systems tested before returning to operation – Can include a comparison to baselines
  • 35. Disaster Recovery Plan (DRP) • Phases – Activate the disaster recovery plan – Implement contingencies – Recover critical systems – Test recovered systems – Document and review • Includes a review to identify any lessons learned • May include an update of the plan
  • 36. BCP and DRP Testing • Validate BCPs and DRPs through testing • Tabletop exercises – Discussion-based only – Typically performed in a classroom or conference setting • Functional exercises – Hands-on exercises – Test backups, server restoration, and server redundancy
  • 37. Chapter 9 Summary • Implementing defense in depth • Comparing physical security controls • Adding redundancy and fault tolerance • Protecting data with backups • Comparing business continuity elements