SlideShare a Scribd company logo
1 of 36
Proprietary & Confidential
@GoCyberSec | January, 2020
Chapter 9
Implementing Controls to
Protect Assets
CompTIA Security +
Proprietary & Confidential
@GoCyberSec | January, 2020
Introduction
• Implementing defense in depth
• Comparing physical security controls
• Adding redundancy and fault tolerance
• Protecting data with backups
• Comparing business continuity elements
Proprietary & Confidential
@GoCyberSec | January, 2020
Implementing Defense in Depth
• Layered security
• Control diversity
• Vendor diversity
Proprietary & Confidential
@GoCyberSec | January, 2020
Physical Security Controls
• Perimeter
• Building
• Secure work areas
• Server and network rooms
• Hardware (such as cable locks)
• Airgap
Proprietary & Confidential
@GoCyberSec | January, 2020
Threat Assessment
• Signs
• Door access systems
– Cipher locks
– Proximity cards
– Biometrics
Proprietary & Confidential
@GoCyberSec | January, 2020
Physical Security Controls
• Tailgating and mantraps
• Security guards
Proprietary & Confidential
@GoCyberSec | January, 2020
Physical Security Controls
• Cameras and video surveillance (CCTV)
• Fencing, lighting, and alarms
• Barricades
• Bollards
Proprietary & Confidential
@GoCyberSec | January, 2020
Physical Security Controls
• Hardware locks
• Doors
• Cable locks
• Locked cabinets
• Safes
Proprietary & Confidential
@GoCyberSec | January, 2020
Asset Management
• Tracking valuable asset throughout their life cycle
–Reduce Vulnerabilities
• Architecture and Design weaknesses
• System sprawl and Undocumented assets
Proprietary & Confidential
@GoCyberSec | January, 2020
Environmental Controls
HVAC systems
• Higher-tonnage HVAC systems provide more cooling capacity
–Keeps server rooms at lower operating temperatures
–Results in fewer failures and longer MTBF times
• Temperature control systems
–Help ensure a relatively constant temperature
• Humidity controls
–Reduce the potential for ESD damage
–Reduce damage from condensation
Proprietary & Confidential
@GoCyberSec | January, 2020
Environmental Controls
• Hot and cold aisles
–Regulate the cooling
Proprietary & Confidential
@GoCyberSec | January, 2020
Environmental Controls
• HVAC systems
–Should be integrated with the fire alarm systems
–Have dampers or the ability to be turned off in the event of a fire
• Extinguish fire
–Remove the heat
–Remove the oxygen
–Remove the fuel
–Disrupt chain reaction
Proprietary & Confidential
@GoCyberSec | January, 2020
Shielding
• Shielded cables
–Protects against EMI and RFI
–Prevent someone from capturing network traffic
• EMI shielding
–Prevents outside interference sources from corrupting data
–Prevents data from emanating outside the cable
• Protected distribution of cabling
• Faraday cage
Proprietary & Confidential
@GoCyberSec | January, 2020
Redundancy and Fault Tolerance
• Single point of failure
–Any component whose failure results in the failure of an entire
system
• Remove single points of failure with
–RAID (disk)
–Failover clustering (server)
–UPS and generators (power)
• Single points of failure are often overlooked until a disaster occurs
Proprietary & Confidential
@GoCyberSec | January, 2020
Disk Redundancies
• Inexpensive
• Adds fault tolerance and increases availability
• Hardware RAID more efficient than software RAID
Proprietary & Confidential
@GoCyberSec | January, 2020
Disk Redundancies
• RAID-0 (striping) no redundancy
–Two or more disks
• RAID-1 (Mirroring) uses two disks as a mirror
–Two disks
• RAID-5 can survive failure of one disk
–Three or more disks
• RAID-6 can survive failure of two disks
–Four or more disks
• RAID-10 combines RAID-1 and RAID-0
–Even number of disks
Proprietary & Confidential
@GoCyberSec | January, 2020
Server Redundancy
• Failover clusters for high availability
• Remove a server as a single point of failure
Proprietary & Confidential
@GoCyberSec | January, 2020
Server Redundancy
• Load balancing for high availability
• Round-robin
• Affinity
Proprietary & Confidential
@GoCyberSec | January, 2020
Disk Redundancies
• UPS
–Provides short-term fault tolerance for power
–Can protect against power fluctuations
• Generators provide long-term fault tolerance for power
Proprietary & Confidential
@GoCyberSec | January, 2020
Protecting Data with Backups
• Full backups
–Fastest recovery time
• Differential backup
–Backs up all the data that has changed since the last full or is
different since the last full backup
• Incremental backup
–Backs up all the data that has changed since the previous
backup
Proprietary & Confidential
@GoCyberSec | January, 2020
Protecting Data with Backups
• Snapshot backup
• Testing backups
• Test restores
– Best way to test the integrity of backup data
– Full test restore
• Verifies a backup can be recovered in its entirety
• Partial test restore
– Verifies that individual files can be restored
Proprietary & Confidential
@GoCyberSec | January, 2020
Protecting Data with Backups
• Protecting backups
–Label clearly to identify the data
–Use physical security prevent unauthorized access
–Protect it during location transfers
• Copy should be stored in separate location
• Destroy when no longer needed
–Degauss the media, shred or burn the media, or scrub with
software to overwrite data
Proprietary & Confidential
@GoCyberSec | January, 2020
Protecting Data with Backups
• Geographic considerations
–Off-site backups
–Distance
–Location selection
–Legal implications
–Data sovereignty
Proprietary & Confidential
@GoCyberSec | January, 2020
Backup Policies and Plans
• Data to backup
• Off-site backups
• Label media
• Testing
• Retention requirements
• Frequency of backups
• Protect backups
• Disposing of media
Proprietary & Confidential
@GoCyberSec | January, 2020
Business Continuity Elements
• Protect against disasters and outages
–Fires
–Attacks
–Power outages
–Data loss from any cause
–Hardware and software failures
–Natural disasters, such as hurricanes, floods, tornadoes, and
earthquakes
Proprietary & Confidential
@GoCyberSec | January, 2020
Business Continuity Elements
• Business impact analysis (BIA) identifies:
–Systems and components that are essential to the
organization’s success (must continue to operate)
–Maximum downtime limits for these systems and components
–Scenarios that can impact these systems and components
–Potential losses from an incident
–Assets to include in recovery plans
Proprietary & Confidential
@GoCyberSec | January, 2020
Business Impact Analysis
• Impact
• Privacy impact
• Privacy threshold assessment
–Identifies PII
–Typically uses a simple questionnaire
• Privacy impact assessment
–Do if system holds/processes PII
–Identifies risks related to PII, such as data loss
Proprietary & Confidential
@GoCyberSec | January, 2020
Business Impact Analysis
• Recovery Time Objective (RTO)
–Identifies maximum amount of time it should take to restore a
system after an outage
–Derived from maximum allowable outage time identified in the
BIA
• Recovery Point Objective (RPO)
–Refers to the amount of data an organization can afford to lose
Proprietary & Confidential
@GoCyberSec | January, 2020
Risk Metrics
• Mean time between failures (MTBF)
–Provides a measure of a system’s reliability
–Usually represented in hours
–MTBF indicates the device can be repaired
• Mean time to recover or mean time to repair (MTTR)
–The time it takes to restore a failed system
–Often specified in contracts as a target
Proprietary & Confidential
@GoCyberSec | January, 2020
Risk Metrics
• Mean time between failures (MTBF)
–Provides a measure of a system’s reliability
–Usually represented in hours
–MTBF indicates the device can be repaired
• Mean time to recover or mean time to repair (MTTR)
–The time it takes to restore a failed system
–Often specified in contracts as a target
Proprietary & Confidential
@GoCyberSec | January, 2020
Continuity of Operations Sites
• Provides an alternate location for operations after a critical outage
• Most common sites are hot, cold, and warm sites
• Hot site
–Includes personnel, equipment, software, and communications
capabilities of the primary site
–All the data is up to date
–Can take over for a failed site within an hour
–Most effective disaster recovery
solution for an alternate site
–Most expensive to maintain
Proprietary & Confidential
@GoCyberSec | January, 2020
Continuity of Operations Sites
• Cold site
–Has power and connectivity needed for COOP activation, but
little else
–Least expensive and hardest to test
• Warm site
–Compromise between a hot site and a cold site
• Mobile site
–Do not have dedicated locations
–Can provide temporary support during a disaster.
Proprietary & Confidential
@GoCyberSec | January, 2020
Continuity of Operations Sites
• Mirrored site
–Identical to the primary location
–Provide 100 percent availability
• Order of restoration
–Return least critical functions first
Proprietary & Confidential
@GoCyberSec | January, 2020
Disaster Recovery Plan (DRP)
• Part of BCP
• Includes a hierarchical list of critical systems
• Prioritizes services to restore after an outage
• Testing validates a DRP
• Recovered systems tested before returning to operation
–Can include a comparison to baselines
Proprietary & Confidential
@GoCyberSec | January, 2020
BCP and DRP Testing
• Validate BCPs and DRPs through testing
• Tabletop exercises
–Discussion-based only
–Typically performed in a classroom or conference setting
• Functional exercises
–Hands-on exercises
–Test backups, server restoration, and server redundancy
Proprietary & Confidential
@GoCyberSec | January, 2020
Chapter 9 Summary
• Implementing defense in depth
• Comparing physical security controls
• Adding redundancy and fault tolerance
• Protecting data with backups
• Comparing business continuity elements

More Related Content

What's hot

(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...
(Sacon) Sumanth Naropanth  - IoT network & ecosystem security attacks & secur...(Sacon) Sumanth Naropanth  - IoT network & ecosystem security attacks & secur...
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...Priyanka Aash
 
CSA Presentation - Software Defined Perimeter
CSA Presentation - Software Defined PerimeterCSA Presentation - Software Defined Perimeter
CSA Presentation - Software Defined PerimeterVishwas Manral
 
The Cloud Security Rules
The Cloud Security RulesThe Cloud Security Rules
The Cloud Security RulesKai Roer
 
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous ComplianceReaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous ComplianceAlgoSec
 
Cryptzone: What is a Software-Defined Perimeter?
Cryptzone: What is a Software-Defined Perimeter?Cryptzone: What is a Software-Defined Perimeter?
Cryptzone: What is a Software-Defined Perimeter?Cryptzone
 
Cloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and TechniquesCloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and TechniquesGokul Alex
 
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...Government Technology & Services Coalition
 
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four ReviewCompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four ReviewDCPS
 
Securing Healthcare Data on AWS for HIPAA
Securing Healthcare Data on AWS for HIPAASecuring Healthcare Data on AWS for HIPAA
Securing Healthcare Data on AWS for HIPAAAlert Logic
 
How to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network SecurityHow to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network SecurityCryptzone
 
AppGate: Achieving Compliance in the Cloud
AppGate: Achieving Compliance in the CloudAppGate: Achieving Compliance in the Cloud
AppGate: Achieving Compliance in the CloudCryptzone
 
Operational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS EnvironmentOperational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS EnvironmentCryptzone
 
La mia lavatrice collegata a internet? - Valter Minute - Codemotion Milan 2014
La mia lavatrice collegata a internet? - Valter Minute - Codemotion Milan 2014La mia lavatrice collegata a internet? - Valter Minute - Codemotion Milan 2014
La mia lavatrice collegata a internet? - Valter Minute - Codemotion Milan 2014Codemotion
 
Cloud security comparisons between aws and azure
Cloud security comparisons between aws and azureCloud security comparisons between aws and azure
Cloud security comparisons between aws and azureAbdul Khan
 
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access SystemsValerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systemscentralohioissa
 
Technologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the CloudTechnologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the CloudCloudPassage
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iotST_World
 

What's hot (20)

Cloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption ExplainedCloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption Explained
 
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...
(Sacon) Sumanth Naropanth  - IoT network & ecosystem security attacks & secur...(Sacon) Sumanth Naropanth  - IoT network & ecosystem security attacks & secur...
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...
 
CSA Presentation - Software Defined Perimeter
CSA Presentation - Software Defined PerimeterCSA Presentation - Software Defined Perimeter
CSA Presentation - Software Defined Perimeter
 
The Cloud Security Rules
The Cloud Security RulesThe Cloud Security Rules
The Cloud Security Rules
 
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous ComplianceReaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
 
SDP Glossary v2.0
SDP Glossary v2.0 SDP Glossary v2.0
SDP Glossary v2.0
 
Cryptzone: What is a Software-Defined Perimeter?
Cryptzone: What is a Software-Defined Perimeter?Cryptzone: What is a Software-Defined Perimeter?
Cryptzone: What is a Software-Defined Perimeter?
 
Cloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and TechniquesCloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and Techniques
 
Cloud security
Cloud securityCloud security
Cloud security
 
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
 
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four ReviewCompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
 
Securing Healthcare Data on AWS for HIPAA
Securing Healthcare Data on AWS for HIPAASecuring Healthcare Data on AWS for HIPAA
Securing Healthcare Data on AWS for HIPAA
 
How to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network SecurityHow to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network Security
 
AppGate: Achieving Compliance in the Cloud
AppGate: Achieving Compliance in the CloudAppGate: Achieving Compliance in the Cloud
AppGate: Achieving Compliance in the Cloud
 
Operational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS EnvironmentOperational Complexity: The Biggest Security Threat to Your AWS Environment
Operational Complexity: The Biggest Security Threat to Your AWS Environment
 
La mia lavatrice collegata a internet? - Valter Minute - Codemotion Milan 2014
La mia lavatrice collegata a internet? - Valter Minute - Codemotion Milan 2014La mia lavatrice collegata a internet? - Valter Minute - Codemotion Milan 2014
La mia lavatrice collegata a internet? - Valter Minute - Codemotion Milan 2014
 
Cloud security comparisons between aws and azure
Cloud security comparisons between aws and azureCloud security comparisons between aws and azure
Cloud security comparisons between aws and azure
 
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access SystemsValerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
 
Technologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the CloudTechnologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the Cloud
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iot
 

Similar to 501 ch 9 implementing controls to protect assets

501 ch 9 implementing controls
501 ch 9 implementing controls501 ch 9 implementing controls
501 ch 9 implementing controlsgocybersec
 
Momentum in Big Data, IoT and Machine Intelligence
Momentum in Big Data, IoT and Machine IntelligenceMomentum in Big Data, IoT and Machine Intelligence
Momentum in Big Data, IoT and Machine IntelligenceShamshad Ansari
 
501 ch 7 protecting against advanced attacks
501 ch 7 protecting against advanced attacks501 ch 7 protecting against advanced attacks
501 ch 7 protecting against advanced attacksgocybersec
 
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...CloudSmartz
 
Cloud Based Business Continuity - Murat Lostar @ ISACA EUROCACS 2013
Cloud Based Business Continuity - Murat Lostar @ ISACA EUROCACS 2013Cloud Based Business Continuity - Murat Lostar @ ISACA EUROCACS 2013
Cloud Based Business Continuity - Murat Lostar @ ISACA EUROCACS 2013Lostar
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the CloudCloudPassage
 
How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...
How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...
How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...Amazon Web Services
 
Data Con LA 2022 - Supercharge your Snowflake Data Cloud from a Snowflake Dat...
Data Con LA 2022 - Supercharge your Snowflake Data Cloud from a Snowflake Dat...Data Con LA 2022 - Supercharge your Snowflake Data Cloud from a Snowflake Dat...
Data Con LA 2022 - Supercharge your Snowflake Data Cloud from a Snowflake Dat...Data Con LA
 
Winning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our TimeWinning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our TimeCloudHesive
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!MarketingArrowECS_CZ
 
04. availability-concepts
04. availability-concepts04. availability-concepts
04. availability-conceptsMuhammad Ahad
 
Rapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdfRapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdfTony Pearson
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramEnergySec
 
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?Perficient
 
The Tools and Machinery behind the curtain
The Tools and Machinery behind the curtainThe Tools and Machinery behind the curtain
The Tools and Machinery behind the curtainJan Van Bruaene
 
501 ch 8 risk managment tool
501 ch 8 risk managment tool501 ch 8 risk managment tool
501 ch 8 risk managment toolgocybersec
 
Create a Data Encryption Strategy using ADE
Create a Data Encryption Strategy using ADECreate a Data Encryption Strategy using ADE
Create a Data Encryption Strategy using ADERocket Software
 
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfCIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfBabyBoy55
 

Similar to 501 ch 9 implementing controls to protect assets (20)

501 ch 9 implementing controls
501 ch 9 implementing controls501 ch 9 implementing controls
501 ch 9 implementing controls
 
Momentum in Big Data, IoT and Machine Intelligence
Momentum in Big Data, IoT and Machine IntelligenceMomentum in Big Data, IoT and Machine Intelligence
Momentum in Big Data, IoT and Machine Intelligence
 
501 ch 7 protecting against advanced attacks
501 ch 7 protecting against advanced attacks501 ch 7 protecting against advanced attacks
501 ch 7 protecting against advanced attacks
 
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
 
Cloud Based Business Continuity - Murat Lostar @ ISACA EUROCACS 2013
Cloud Based Business Continuity - Murat Lostar @ ISACA EUROCACS 2013Cloud Based Business Continuity - Murat Lostar @ ISACA EUROCACS 2013
Cloud Based Business Continuity - Murat Lostar @ ISACA EUROCACS 2013
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud
 
ASIS Presentation_07112013
ASIS Presentation_07112013ASIS Presentation_07112013
ASIS Presentation_07112013
 
How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...
How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...
How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...
 
DCNCBC
DCNCBCDCNCBC
DCNCBC
 
Data Con LA 2022 - Supercharge your Snowflake Data Cloud from a Snowflake Dat...
Data Con LA 2022 - Supercharge your Snowflake Data Cloud from a Snowflake Dat...Data Con LA 2022 - Supercharge your Snowflake Data Cloud from a Snowflake Dat...
Data Con LA 2022 - Supercharge your Snowflake Data Cloud from a Snowflake Dat...
 
Winning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our TimeWinning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our Time
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
 
04. availability-concepts
04. availability-concepts04. availability-concepts
04. availability-concepts
 
Rapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdfRapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdf
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure Program
 
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
 
The Tools and Machinery behind the curtain
The Tools and Machinery behind the curtainThe Tools and Machinery behind the curtain
The Tools and Machinery behind the curtain
 
501 ch 8 risk managment tool
501 ch 8 risk managment tool501 ch 8 risk managment tool
501 ch 8 risk managment tool
 
Create a Data Encryption Strategy using ADE
Create a Data Encryption Strategy using ADECreate a Data Encryption Strategy using ADE
Create a Data Encryption Strategy using ADE
 
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfCIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdf
 

More from gocybersec

501 ch 3 network technologies and tools
501 ch 3 network technologies and tools501 ch 3 network technologies and tools
501 ch 3 network technologies and toolsgocybersec
 
501 ch 10 understanding cryptography and pki
501 ch 10 understanding cryptography and pki501 ch 10 understanding cryptography and pki
501 ch 10 understanding cryptography and pkigocybersec
 
501 ch 6 threats vulnerabilities and common attacks
501 ch 6 threats vulnerabilities and common attacks501 ch 6 threats vulnerabilities and common attacks
501 ch 6 threats vulnerabilities and common attacksgocybersec
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies toolsgocybersec
 
501 ch 2 understanding iam
501 ch 2 understanding iam501 ch 2 understanding iam
501 ch 2 understanding iamgocybersec
 
501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacksgocybersec
 
501 ch 11 operational security
501 ch 11 operational security501 ch 11 operational security
501 ch 11 operational securitygocybersec
 
501 ch 8 risk management tools
501 ch 8 risk management tools501 ch 8 risk management tools
501 ch 8 risk management toolsgocybersec
 
501 ch 6 threats vulnerabilities attacks
501 ch 6 threats vulnerabilities attacks501 ch 6 threats vulnerabilities attacks
501 ch 6 threats vulnerabilities attacksgocybersec
 
501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacksgocybersec
 
501 ch 5 securing hosts and data
501 ch 5 securing hosts and data501 ch 5 securing hosts and data
501 ch 5 securing hosts and datagocybersec
 
501 ch 4 securing your network
501 ch 4 securing your network501 ch 4 securing your network
501 ch 4 securing your networkgocybersec
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies toolsgocybersec
 
501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basics501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basicsgocybersec
 

More from gocybersec (14)

501 ch 3 network technologies and tools
501 ch 3 network technologies and tools501 ch 3 network technologies and tools
501 ch 3 network technologies and tools
 
501 ch 10 understanding cryptography and pki
501 ch 10 understanding cryptography and pki501 ch 10 understanding cryptography and pki
501 ch 10 understanding cryptography and pki
 
501 ch 6 threats vulnerabilities and common attacks
501 ch 6 threats vulnerabilities and common attacks501 ch 6 threats vulnerabilities and common attacks
501 ch 6 threats vulnerabilities and common attacks
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies tools
 
501 ch 2 understanding iam
501 ch 2 understanding iam501 ch 2 understanding iam
501 ch 2 understanding iam
 
501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacks
 
501 ch 11 operational security
501 ch 11 operational security501 ch 11 operational security
501 ch 11 operational security
 
501 ch 8 risk management tools
501 ch 8 risk management tools501 ch 8 risk management tools
501 ch 8 risk management tools
 
501 ch 6 threats vulnerabilities attacks
501 ch 6 threats vulnerabilities attacks501 ch 6 threats vulnerabilities attacks
501 ch 6 threats vulnerabilities attacks
 
501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacks
 
501 ch 5 securing hosts and data
501 ch 5 securing hosts and data501 ch 5 securing hosts and data
501 ch 5 securing hosts and data
 
501 ch 4 securing your network
501 ch 4 securing your network501 ch 4 securing your network
501 ch 4 securing your network
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies tools
 
501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basics501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basics
 

Recently uploaded

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

501 ch 9 implementing controls to protect assets

  • 1. Proprietary & Confidential @GoCyberSec | January, 2020 Chapter 9 Implementing Controls to Protect Assets CompTIA Security +
  • 2. Proprietary & Confidential @GoCyberSec | January, 2020 Introduction • Implementing defense in depth • Comparing physical security controls • Adding redundancy and fault tolerance • Protecting data with backups • Comparing business continuity elements
  • 3. Proprietary & Confidential @GoCyberSec | January, 2020 Implementing Defense in Depth • Layered security • Control diversity • Vendor diversity
  • 4. Proprietary & Confidential @GoCyberSec | January, 2020 Physical Security Controls • Perimeter • Building • Secure work areas • Server and network rooms • Hardware (such as cable locks) • Airgap
  • 5. Proprietary & Confidential @GoCyberSec | January, 2020 Threat Assessment • Signs • Door access systems – Cipher locks – Proximity cards – Biometrics
  • 6. Proprietary & Confidential @GoCyberSec | January, 2020 Physical Security Controls • Tailgating and mantraps • Security guards
  • 7. Proprietary & Confidential @GoCyberSec | January, 2020 Physical Security Controls • Cameras and video surveillance (CCTV) • Fencing, lighting, and alarms • Barricades • Bollards
  • 8. Proprietary & Confidential @GoCyberSec | January, 2020 Physical Security Controls • Hardware locks • Doors • Cable locks • Locked cabinets • Safes
  • 9. Proprietary & Confidential @GoCyberSec | January, 2020 Asset Management • Tracking valuable asset throughout their life cycle –Reduce Vulnerabilities • Architecture and Design weaknesses • System sprawl and Undocumented assets
  • 10. Proprietary & Confidential @GoCyberSec | January, 2020 Environmental Controls HVAC systems • Higher-tonnage HVAC systems provide more cooling capacity –Keeps server rooms at lower operating temperatures –Results in fewer failures and longer MTBF times • Temperature control systems –Help ensure a relatively constant temperature • Humidity controls –Reduce the potential for ESD damage –Reduce damage from condensation
  • 11. Proprietary & Confidential @GoCyberSec | January, 2020 Environmental Controls • Hot and cold aisles –Regulate the cooling
  • 12. Proprietary & Confidential @GoCyberSec | January, 2020 Environmental Controls • HVAC systems –Should be integrated with the fire alarm systems –Have dampers or the ability to be turned off in the event of a fire • Extinguish fire –Remove the heat –Remove the oxygen –Remove the fuel –Disrupt chain reaction
  • 13. Proprietary & Confidential @GoCyberSec | January, 2020 Shielding • Shielded cables –Protects against EMI and RFI –Prevent someone from capturing network traffic • EMI shielding –Prevents outside interference sources from corrupting data –Prevents data from emanating outside the cable • Protected distribution of cabling • Faraday cage
  • 14. Proprietary & Confidential @GoCyberSec | January, 2020 Redundancy and Fault Tolerance • Single point of failure –Any component whose failure results in the failure of an entire system • Remove single points of failure with –RAID (disk) –Failover clustering (server) –UPS and generators (power) • Single points of failure are often overlooked until a disaster occurs
  • 15. Proprietary & Confidential @GoCyberSec | January, 2020 Disk Redundancies • Inexpensive • Adds fault tolerance and increases availability • Hardware RAID more efficient than software RAID
  • 16. Proprietary & Confidential @GoCyberSec | January, 2020 Disk Redundancies • RAID-0 (striping) no redundancy –Two or more disks • RAID-1 (Mirroring) uses two disks as a mirror –Two disks • RAID-5 can survive failure of one disk –Three or more disks • RAID-6 can survive failure of two disks –Four or more disks • RAID-10 combines RAID-1 and RAID-0 –Even number of disks
  • 17. Proprietary & Confidential @GoCyberSec | January, 2020 Server Redundancy • Failover clusters for high availability • Remove a server as a single point of failure
  • 18. Proprietary & Confidential @GoCyberSec | January, 2020 Server Redundancy • Load balancing for high availability • Round-robin • Affinity
  • 19. Proprietary & Confidential @GoCyberSec | January, 2020 Disk Redundancies • UPS –Provides short-term fault tolerance for power –Can protect against power fluctuations • Generators provide long-term fault tolerance for power
  • 20. Proprietary & Confidential @GoCyberSec | January, 2020 Protecting Data with Backups • Full backups –Fastest recovery time • Differential backup –Backs up all the data that has changed since the last full or is different since the last full backup • Incremental backup –Backs up all the data that has changed since the previous backup
  • 21. Proprietary & Confidential @GoCyberSec | January, 2020 Protecting Data with Backups • Snapshot backup • Testing backups • Test restores – Best way to test the integrity of backup data – Full test restore • Verifies a backup can be recovered in its entirety • Partial test restore – Verifies that individual files can be restored
  • 22. Proprietary & Confidential @GoCyberSec | January, 2020 Protecting Data with Backups • Protecting backups –Label clearly to identify the data –Use physical security prevent unauthorized access –Protect it during location transfers • Copy should be stored in separate location • Destroy when no longer needed –Degauss the media, shred or burn the media, or scrub with software to overwrite data
  • 23. Proprietary & Confidential @GoCyberSec | January, 2020 Protecting Data with Backups • Geographic considerations –Off-site backups –Distance –Location selection –Legal implications –Data sovereignty
  • 24. Proprietary & Confidential @GoCyberSec | January, 2020 Backup Policies and Plans • Data to backup • Off-site backups • Label media • Testing • Retention requirements • Frequency of backups • Protect backups • Disposing of media
  • 25. Proprietary & Confidential @GoCyberSec | January, 2020 Business Continuity Elements • Protect against disasters and outages –Fires –Attacks –Power outages –Data loss from any cause –Hardware and software failures –Natural disasters, such as hurricanes, floods, tornadoes, and earthquakes
  • 26. Proprietary & Confidential @GoCyberSec | January, 2020 Business Continuity Elements • Business impact analysis (BIA) identifies: –Systems and components that are essential to the organization’s success (must continue to operate) –Maximum downtime limits for these systems and components –Scenarios that can impact these systems and components –Potential losses from an incident –Assets to include in recovery plans
  • 27. Proprietary & Confidential @GoCyberSec | January, 2020 Business Impact Analysis • Impact • Privacy impact • Privacy threshold assessment –Identifies PII –Typically uses a simple questionnaire • Privacy impact assessment –Do if system holds/processes PII –Identifies risks related to PII, such as data loss
  • 28. Proprietary & Confidential @GoCyberSec | January, 2020 Business Impact Analysis • Recovery Time Objective (RTO) –Identifies maximum amount of time it should take to restore a system after an outage –Derived from maximum allowable outage time identified in the BIA • Recovery Point Objective (RPO) –Refers to the amount of data an organization can afford to lose
  • 29. Proprietary & Confidential @GoCyberSec | January, 2020 Risk Metrics • Mean time between failures (MTBF) –Provides a measure of a system’s reliability –Usually represented in hours –MTBF indicates the device can be repaired • Mean time to recover or mean time to repair (MTTR) –The time it takes to restore a failed system –Often specified in contracts as a target
  • 30. Proprietary & Confidential @GoCyberSec | January, 2020 Risk Metrics • Mean time between failures (MTBF) –Provides a measure of a system’s reliability –Usually represented in hours –MTBF indicates the device can be repaired • Mean time to recover or mean time to repair (MTTR) –The time it takes to restore a failed system –Often specified in contracts as a target
  • 31. Proprietary & Confidential @GoCyberSec | January, 2020 Continuity of Operations Sites • Provides an alternate location for operations after a critical outage • Most common sites are hot, cold, and warm sites • Hot site –Includes personnel, equipment, software, and communications capabilities of the primary site –All the data is up to date –Can take over for a failed site within an hour –Most effective disaster recovery solution for an alternate site –Most expensive to maintain
  • 32. Proprietary & Confidential @GoCyberSec | January, 2020 Continuity of Operations Sites • Cold site –Has power and connectivity needed for COOP activation, but little else –Least expensive and hardest to test • Warm site –Compromise between a hot site and a cold site • Mobile site –Do not have dedicated locations –Can provide temporary support during a disaster.
  • 33. Proprietary & Confidential @GoCyberSec | January, 2020 Continuity of Operations Sites • Mirrored site –Identical to the primary location –Provide 100 percent availability • Order of restoration –Return least critical functions first
  • 34. Proprietary & Confidential @GoCyberSec | January, 2020 Disaster Recovery Plan (DRP) • Part of BCP • Includes a hierarchical list of critical systems • Prioritizes services to restore after an outage • Testing validates a DRP • Recovered systems tested before returning to operation –Can include a comparison to baselines
  • 35. Proprietary & Confidential @GoCyberSec | January, 2020 BCP and DRP Testing • Validate BCPs and DRPs through testing • Tabletop exercises –Discussion-based only –Typically performed in a classroom or conference setting • Functional exercises –Hands-on exercises –Test backups, server restoration, and server redundancy
  • 36. Proprietary & Confidential @GoCyberSec | January, 2020 Chapter 9 Summary • Implementing defense in depth • Comparing physical security controls • Adding redundancy and fault tolerance • Protecting data with backups • Comparing business continuity elements

Editor's Notes

  1. Malicious code that attached itself to a host application -host application must be executed to run - Find other host application to infect by replication - payloads delete files, random reboots - join computer botnet
  2. SLE = $2,000 ARO = 12 ALE = $24,000
  3. SLE = $2,000 ARO = 12 ALE = $24,000
  4. SLE = $2,000 ARO = 12 ALE = $24,000
  5. EMI – Electromagnetic interference RFI – Radio Frequency Interference Interferes with normal signal transmission
  6. SLE = $2,000 ARO = 12 ALE = $24,000
  7. SLE = $2,000 ARO = 12 ALE = $24,000
  8. RAID-0 – files are spread across multiple disk - Better read and write performance RAID -1 – Data written to on disk is written to the other disk parity
  9. SLE = $2,000 ARO = 12 ALE = $24,000
  10. SLE = $2,000 ARO = 12 ALE = $24,000
  11. SLE = $2,000 ARO = 12 ALE = $24,000
  12. SLE = $2,000 ARO = 12 ALE = $24,000
  13. SLE = $2,000 ARO = 12 ALE = $24,000
  14. SLE = $2,000 ARO = 12 ALE = $24,000
  15. SLE = $2,000 ARO = 12 ALE = $24,000
  16. SLE = $2,000 ARO = 12 ALE = $24,000
  17. SLE = $2,000 ARO = 12 ALE = $24,000
  18. SLE = $2,000 ARO = 12 ALE = $24,000
  19. SLE = $2,000 ARO = 12 ALE = $24,000
  20. SLE = $2,000 ARO = 12 ALE = $24,000
  21. SLE = $2,000 ARO = 12 ALE = $24,000
  22. SLE = $2,000 ARO = 12 ALE = $24,000
  23. SLE = $2,000 ARO = 12 ALE = $24,000
  24. SLE = $2,000 ARO = 12 ALE = $24,000
  25. SLE = $2,000 ARO = 12 ALE = $24,000