SlideShare a Scribd company logo
1 of 61
CCSD SECURITY
ESSENTIAL CERTIFIED
Data, and Application Security
Web Application Security, Cloud
Asset Management
• Assets include hardware, software, data, physical systems, and documentation.
• ITAM is managing the lifecycle of these assets.
• In secure ITAM:
• Strike balance between cost and need.
• Distinguish between data ownership/data custodianship.
• Implement controls to secure private data.
• Implement asset security to protect against liability.
• Apply classifications to sensitive data.
• Be very clear about regulatory policy requirements.
• In your policy, have a process in place to respond to legal requests for your data.
Hardware
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Asset Management Roles (Slide 1 of 2)
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Role Description
Data Owner • Involved in creation, acquisition, and usage of data.
• Must understand the cost to maintain data, as well as the quality.
• Determines sensitivity of data and associated risks.
• Determines who has access to data.
• Should have input in retention and destruction policies.
• Should be aware of legal or regulatory issues with data.
Data Custodian • Tasked with protecting data.
• Implements access requirements per data owner.
• Applies controls, maintains, monitors, and destroys data when necessary.
• Can be a database administrator, system administrator, or other IT role.
System Owner • Owns the computer that the data resides on.
• May be different than data owner.
• Ex: IT department owns servers; Sales owns data on servers.
Administrator • Manages IT systems.
• Usually works in the IT department.
• Can also be someone else trusted to perform administrative tasks.
Asset Management Roles (Slide 2 of 2)
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Role Description
Business Owner • Owns all or part of the business.
• Won’t usually be involved in the technical aspect of asset management.
• Is interested in the financial value of assets.
End User • Uses IT resources and other assets as part of their job.
• Typically has no administrative privilege.
Auditor • Periodically checks to see if assets are being utilized in accordance with internal
policy or regulatory requirements.
• Might be an employee, but more likely to be external.
• Use labeling to minimize risk of loss or modification.
• Labeling schemes are known as classifications.
• Management must determine:
Classification Principles
Hardware
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Classification Process
6. Implement classification schema
1. Identify asset
2. Determine who is accountable for its integrity
3. Establish ownership of asset
4. Place value on asset
5. Prepare schema for classifying asset
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Classification Policies
• Classification policy includes:
• Users may drive classification types based on how they handle assets.
• Regular reviews determine if appropriate classification is maintained.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Classification Schemes
• Military
• Employed by U.S. government.
• Strictly defined, rigid.
• Commercial
• Employed by non-governmental organizations.
• Developed to support business needs.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Military Classification Schemes
Military Classification Scheme
Level
Risk If Information Is Disclosed to Unauthorized Entities
Top Secret Grave damage to national security.
Secret Serious damage to national security.
Confidential Damage to national security.
Unclassified No damage to national security.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Commercial Classification Schemes
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Commercial Classification
Scheme Level
Description
Corporate Confidential Information that should not be provided to individuals outside of the
enterprise.
Personal and Confidential Information of a personal nature that should be protected.
Private Correspondence of a private nature between two or more people
that should be safeguarded.
Trade Secret Corporate intellectual property that, if released, will present serious
damage to the company's ability to protect patents and processes.
Client Confidential • Client personal information that, if released, may result in the
identity theft of the individual.
• Corporate information or intellectual property
Privacy
• Privacy requirements present legal challenges.
• Should define:
What will be collected
How collected data will
be protected
Copyright © 2019 Logical Operations, Inc. All rights reserved.
How long private
information will be kept
How collected data will be
shared
How private information
will be disposed of
Privacy Laws
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Most governments have privacy laws in place.
• Laws provide citizens with more control over how PII is gathered, used, stored,
disseminated.
• Some laws may reduce privacy protections in interests of national security and public
safety.
• You must assist your organization in complying with these laws.
• Private data is owned by person data is about.
• Makes compliance challenging—organizations handle data.
• Organizations must balance protection requirements against business value of using
data.
• Consider both ethics and legal restrictions when protecting private data.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Private Data Ownership
• Can only collect data if useful and relevant to specific purpose.
If not, do not collect, even if beneficial to the business.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Collection Limitations
• Databases with PII often are high-profile target for major attacks.
• Attackers may sell PII on online black markets.
• Database protection is paramount due to both business value and legal requirements.
Databases
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• A data collector is an entity that collects and determines what will be done with
someone’s private data.
• A data controller is an entity that determines the purposes and means of processing
personal data.
• A data processor is an entity that processes private data on behalf of the controller.
• HR department
• Marketing department
• Call center
• EU GDPR stipulates data must be:
• Fairly and lawfully processed.
• Processed for limited purposes.
• Adequate, relevant, not excessive.
• Accurate.
• Kept no longer than necessary.
• Processed in accordance with data subject's rights.
• Secure.
• Transferred only to countries with adequate protection.
Data Collectors, Controllers, and Processors
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Private data shouldn’t be retained indefinitely.
• Most PII legal requirements stipulate requirements for retention and destruction.
• PII ceases to be private when posted publically—often impossible to rectify, especially
on the Internet.
• Internet of Things adds complications—private data is collected from household items.
Data Longevity
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• The act of storing a business asset.
• Assets that you may retain:
• Data
• Media
• Hardware
• Software
• Personnel
• Consider compliance requirements when retaining assets.
Retention
Hardware
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Retention Policies
• Retention policies need to be
comprehensive, not just for
data.
• Write clear policies and train
users.
• Older systems need special
care for disposal.
Todevelop a retention policy:
Copyright © 2019 Logical Operations, Inc. All rights reserved.
1. Evaluate statutory requirements, litigation
obligations, and business needs.
2. Classify types of records.
3. Determine retention periods and destruction
practices.
4. Draft and justify record retention policies.
5. Train staff.
6. Audit retention and destruction practices.
7. Periodically review policy.
8. Document policy, implementation, training, and
audits.
• Every organization needs an information retention policy.
• Avoid compliance issues and lawsuits regarding retrieving and retaining information.
• Demonstrate that you have a secure storage environment.
• Information storage mechanism should allow for timely data search/retrieval.
• Emails, instant messages, policies, procedures, and audit reports are business
records.
• You may need certain records to protect against litigation or audits.
• Verify the maximum retention time for all assets you handle.
• IT department should not be the sole manager of business records retention.
• Do not expect users to help the company comply with retention requirements.
• In investigations, don’t deviate from normal backup and retention procedures.
• Expect that after data is destroyed someone will still have a copy.
• Expect that archived information may take time to retrieve.
• Find a balance between deleting everything and saving everything.
• Don't rely on attorney for IT retention compliance.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Retention Policy Considerations
Data Retention
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Data is the organization’s most critical non-human asset.
• Different data will require different retention times.
• Ex: Financial records often kept for seven years.
• Other types of data may need to be disposed of quickly, even if only after a few
months.
• Even if data isn’t privacy-related, still consider it in the context of retention.
• Ex: Accounts receivable database must be retained for a specified period.
Media Retention
• Media are where you store your data:
• Tape
• CD/DVD
• Hard disks
• Removable flash drives
• Cloud storage
• Paper printout
• Best practices for taking care of media:
• Protect from sunlight, heat, and other natural processes.
• When media locked in safes, include silica gel packs to prevent
moisture/mildew.
• Stand tapes/floppy disks on edge, not flat.
• Keep magnetic media away from magnetic fields.
• Know the lifecycle of the backup tape you are using.
• Create authorized user list: one team for regular backup/restore; another
for disaster recovery.
• Use an automated system with bar code scanning that tracks media
movement.
• Repeatedly test your backup and restore procedures.
• Have a backup of any cloud data; make sure provider securely destroys it
when requested.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Hardware Retention
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Use hardware as long as possible, as cost can add up.
• Consider hardware’s role in protecting data.
• Maintain hardware so you can retrieve old data.
• Include non-media hardware components in retention plans.
• Create a retention plan that focuses on entire lifecycle.
• Create disposal plans for hardware if deprecated/obsolete.
• Scrub hardware of all data before disposal.
• Consider proper disposal procedures for electronic waste.
• Purchased or in-house software has a lifecycle, and requires a retention plan.
• Might need to do more than uninstall.
• Consider other system dependencies; can they function without this software?
• Keep track of software dependencies in retention policies.
• Software may require special scrubbing of data.
• Failing to completely wipe software may leave sensitive data unsecured.
Software Retention
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Personnel Retention
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Knowledge often trapped in departmental “silos”
(intentionally or not).
• Knowledge may not be documented.
• Avoid depending on a single person for critical business
needs and processes.
• Include provisions for transferring operational knowledge
in personnel retention policy.
• Include rotation of duties and multidisciplinary teams to
help break up the “silo” of information.
Data Security Control Selection
When you are selecting controls, consider:
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Agreements between organizations on data formats.
• How data is represented, formatted, defined, structured, transmitted, manipulated, tagged,
used, and managed.
• Support integrity of data and minimize redundancy.
• Set by:
• Standards bodies.
• Specific vendors.
• Help vendors implement consistent security across their products.
• Help identify the potential scope of a security incident.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Data Standards
Data Baselines
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Control Public Private Sensitive Confidential Trade Secret
Read-only Recommended Recommended Recommended Recommended Required
Encryption Optional Required Optional Recommended Required
Data
redundancy
Optional Required Recommended Recommended Required
Media
sanitation/
disposal
Recommended Required Required Required Required
(destruction)
Scoping and Tailoring
• Determines how far reaching your security is.
• Any systems in scope need controls.
• Monitor potential interference when systems interface
with others outside scope.
• Example:
• Database admin backing up data to a third-party external
site.
• Modifying security practices to suit your needs.
• Example:
• Relaxing security requirements for segregated development
environments.
Scoping
Tailoring
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Highlights of SANS.org checklist for implementing data security controls:
• Use approved drive encryption software on mobile devices.
• Assess data to identify what is sensitive enough to require encryption and integrity
controls.
• Review cloud storage providers’ security practices for protecting your data.
• Implement automated tool on network borders to ensure sensitive information does
not leave the network.
• Periodically scan servers to see if any sensitive data exists in clear text.
• Limit the use of USB flash drives to those that use encryption.
• Implement network-based data loss prevention (DLP) mechanisms to:
• Automatically back up critical data.
• Control the movement of data across network.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Data Security Control Implementation
• Data that is stored on media for long-term retention.
• Physical and logical loss of data are risks.
• Data at rest controls:
• Data Recovery Plan
• Strong encryption
• Access control
• Password management tools to store passwords and keys
• Control removable media
• Labeling policies
• Data-safe storage for removable media
• Documentation of location of removable data.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Data at Rest
Data in Use
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Data that is actively being processed.
• Found in RAM, CPU cache, CPU registers.
• Originally not considered a candidate for encryption.
• New types of attacks:
• Cold boot attacks
• Bootkits
• Mactans
• New strategies for protection:
• Full memory encryption
• Storing encryption keys in CPU registers rather than RAM
• Homomorphic encryption
• Secure enclaves
• Difficult to maintain referential integrity between ciphertext and
cleartext.
• Data being transferred from one host to another.
• Exposure of data is a primary risk.
• Exposures differ depending on the transmission media.
• Data in transit controls:
• Protect web traffic with SSL.
• Encrypt sensitive email data with PGP or S/MIME.
• Non-Web-covered data traffic encrypted with application level encryption.
• Encrypted connections between application servers and database servers.
• Tunneling protocols if no application level encryption.
• Encryption for high sensitivity data even in protected subnets.
Data in Transit
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• The process of scrambling data so that only authorized persons can read it.
• The best control to implement, whether on data at rest or in transit.
• Can be done through hardware or software.
• Data at rest will be protected, even if the data is stolen.
• With data in transit, encryption can happen at any point in the network:
• The link itself could be encrypted.
• The link might not be encrypted, but the data itself could be.
• Intermediate network devices such as routers can form encrypted tunnels.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Data Encryption
Data Policies
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Policies provide consistency, improve effectiveness, streamline operations, and
reduce risk.
• Policies must evolve to reflect business changes.
• Management should be the source of policy.
• Policy should be reviewed on a regular basis.
• Address the following in your data policies:
• How it should be classified.
• Where it should be stored.
• Who will need access.
• How you will monitor and audit data access.
• How it should be retained.
• How and when the data will be disposed of.
• The impact of loss, disclosure, or corruption of the data.
Data Handling
Delivery Storage Archiving Disposal
• Secure handling ensures data is securely stored, archived, and disposed of
throughout its lifecycle.
• Keep the following in mind when developing data handling procedures:
• Cost
• Ownership and custodianship
• Privacy
• Liability
• Sensitivity
• Existing law and policy requirements
• Policy and process
• Never assume that only authorized personnel are handling data.
• Never assume that all data handlers have been trained appropriately.
• Keep records of how and when your data is handled.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Mark data with its sensitivity level.
• Enables automated systems to more easily act on the data.
• Informs employees how to handle that data.
• Data owner determines the marking; data custodian applies it.
• Common practices for marking data:
• Including the name and address of the individual, group, or facility responsible for setting
that marking.
• Including the date the marking was applied.
• Using redundant marking on the front cover/title page, back cover, top and bottom.
• Applying marking that cannot be removed or modified.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Marking
• The mechanism used to apply markings to your data.
• Ex: Storing data in an electronic folder; the folder name provides a label.
• Labels should make classification obvious to an observer.
• Follow guidelines when labeling data:
• Asset owner must document the security classification of the asset.
• Asset owner must advise asset custodian and IT security team of security classification of
the asset.
• Hard copies of an asset are clearly labeled according to their security classification.
• For bound hard copies, include sensitivity label on front cover, rear cover, and title page as
appropriate.
• Fax cover sheets include the relevant classification label.
• Any electronic communication must also have the proper classification level.
• Unlabeled data should have highest priority protection until a label can be assigned.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Labels
Data Storage
• Don’t allow hard copies to lie around where any passerby
could take them or read them.
• Don’t allow sensitive information to be stored in cleartext
on a hard drive.
• Make sure backup media is encrypted.
• Send backup copies of data to a secure offsite location.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Data Remanence
• Information left on a storage medium even
after erasure.
• Can be recovered by unauthorized
personnel.
• Users may discard unreadable backup tapes,
not realizing that others can recover them.
• Users assume normal deletion or formatting
completely removes data, when it doesn’t.
• Best practice is to physically destroy media
rather than risk data remanence.
• Cloud storage presents challenges for
remanence.
• Ex: You terminate service with a cloud
provider. How can you assure your data has
truly been scrubbed from their servers?
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Data Destruction (Slide 1 of 2)
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Method Description
Erasing • A simple mechanism for deleting data, using operating system or third-party
tools.
• Also known as formatting.
• Although erasing can be done at the bit level (full format), it is typically
performed at the file table level (quick format).
• It is trivially easy to recover data that has been erased.
• Even if a full format has been performed, magnetic imprints can still be found on
the media and retrieved by data recovery houses.
Overwriting • Sometimes called clearing or electronic shredding.
• Remnant bits on the disk have been replaced by different bits (usually all zeros).
• The tool might skip bad or corrupt sectors, making data recovery possible.
Purging • A more intense form of clearing.
• Meant to assure all data remnants removed and media is clean and ready for
reuse.
• Still not fully trusted to be completely fail safe.
Degaussing • A technique that removes data from magnetic media.
• Hard drives are usually rendered useless after the process.
• Non-magnetic storage like CDs and SSDs are not affected.
Data Destruction (Slide 2 of 2)
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Method Description
Destruction • Physical destruction may ensure that media can't be reassembled or data
retrieved.
• The physical drive is lost in the process.
Encryption • Hides the data from unauthorized users without the key.
• If you destroy the key, the data is effectively destroyed.
• Sometimes used before media is purged or destroyed.
Declassification • Not a data removal technique, but still part of data removal process.
• Media with classified files is retained until data is no longer deemed to be
sensitive.
• Once data is declassified, media can be erased, purged, etc., before reuse.
• Web app might be written without sufficient security.
• Insecure communications between web app and back-end database/file server.
• Insufficient security for web service hosting web app.
• Web system located on insufficiently protected OS or hardware.
• Inadequate authentication requirements for web app, server, or OS.
• Failed logon attempts not properly monitored or controlled.
• XML language vulnerabilities:
• XML parser can manipulate/misinterpret data.
• Risk of injection attacks.
• SAML language vulnerabilities:
• Improper implementation:
• Leaving out identifier of authorization request.
• Leaving out identity of recipient.
• SOAP
• Neutral mechanism for clients to request services via HTTP or other protocols.
• Vulnerable to malicious commands including SQL or XML injection.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Web-Based System Vulnerabilities
Malicious Code Examples
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Name Example Comment
SQL Injection blah' or 1=1-- • Based on an OR statement
• Todefeat, you must sanitize input or use
stored procedures with parameterized SQL
queries
Directory traversal https://www.victim.com/..%c0%af../w
innt/system32/cmd.exe?/c+tftp.exe+-
i+get+exploit.exe
• Uses special Unicode characters or other
mechanisms to bypass controls and allow
browsing of the file system
• Todefeat, use file system permissions
Metacharacters ' " [ ]  ; & ^ . | ? * + { } ( ) • Some special characters have programmatic
meaning
• Todefeat, sanitize client input and use
escape characters to neutralize
programmatic capabilities
Script <script>Some malicious command
here</script>
• Malicious code often takes the form of a
script
• Patch systems and sanitize input to disallow
unauthorized scripts
• Institute a CAPTCHA to help validate that the requester is an actual human, and not a
malicious automated attack.
• Use one-time passwords called nonces for each URL request to prevent spoofing and
replay attacks.
• Address inherent vulnerabilities of XML-based languages during development.
• Build input validation and sanitization into your app.
• Institute an assurance signoff process before putting server or web application into
production.
• Harden the OS.
• Perform extensive vulnerability scans prior to deployment.
• Secure or remove entirely administrative interfaces.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Web-Based System Vulnerability Mitigation (Slide 1 of 2)
• Only permit access from authorized hosts/networks using:
• Certificates.
• Multifactor authentication.
• Never hardcode authentication credentials into the application itself.
• Use account lockout.
• Use extended logging and auditing.
• Use multifactor authentication that requires user interaction such as temporary SMS
codes, geolocation, and scanning QR codes.
• Encrypt all authentication traffic.
• Verify that interface is at least as secure as rest of application.
• Use a web application proxy/firewall and host-based intrusion detection.
• Train end users to practice safe browsing including regularly clearing out temporary
files and cached cookies.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Web-Based System Vulnerability Mitigation (Slide 2 of 2)
Security Test Strategies
Copyright © 2019 Logical Operations, Inc. All rights reserved.
1. Create a security assessment policy.
2. Create a security assessment methodology.
3. Assign testing roles and responsibilities.
4. Determine which systems you will test.
5. Determine how you will approach the testing, addressing:
• Logistical issues.
• Legal regulations.
• Policy considerations.
6. Carry out test, addressing any incidents that arise during/because of the test.
7. Maintain the while handling the data through all phases:
• Collection.
• Storage.
• Transmission.
• Destruction.
8. Analyze data and create a report that will turn technical findings into risk
mitigation actions to improve the organization's security posture.
• Responses by management and users to security-related questions.
• A list of existing or non-existing procedures or documentation.
• Recorded observation of user/management activities.
• Recorded observation of adherence to existing procedures/policies.
Administrative Assessment Test Output
SecurityQuestionnaire
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Current firewall configuration of each system.
• Antivirus patch level of each system.
• List of known or potential vulnerabilities found on each system.
• List of default configurations found on each system.
• List of unused user accounts found on each system.
• List of user privilege levels on each resource or system.
Technical Assessment Test Output
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Vulnerability Assessments
Perform when:
• First deploy new/updated systems.
• New vulnerabilities have been identified.
• A security breach occurs.
• Need to document security state of systems.
Collect Store Organize Analyze Report
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Port scanner
• Protocol analyzer
• Packet analyzer
• Network enumerator
• Intelligence gathering
• Vulnerability scanner
Vulnerability Scanning
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Penetration Test Preparation
Who will commission the test?
Who will conduct the test?
How will the test be conducted?
What are the test’s limitations?
What tools will be used in the test?
Who on the client side will be available in case of accident?
Copyright © 2019 Logical Operations, Inc. All rights reserved.
The Penetration Test Process
Reconnaissance Scanning Exploitation
Maintaining
Access
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Reporting
Penetration Test Approaches
BlackBox
Test
Grey
BoxTest
White
BoxTest
• Black Box
• Most effective at real-world evaluation.
• Most time and effort.
• Need to carefully consider who should know about the test.
• Grey Box
• Complex parameters needed to strike the perfect balance.
• White Box
• More comprehensive evaluation because of broad perspective of organizational systems.
• Might be too simulated – not able to account for attackers’ out of the box thinking.
Full Amount of Reconnaissance None
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Penetration Test Components
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Component Description
Network scanning • Uses a port scanner to identify devices attached to target network and to
enumerate the applications hosted on the devices. This function is known as
fingerprinting.
Social engineering • Attempts to get information from users to gain access to a system.
• Tests for adequate user training.
• Stay mindful of ethical implications of deceiving people.
• Don't want to undermine your employees' trust in you or their coworkers.
War dialing • Uses a modem and software to dial a range of phone numbers to locate
computer systems, PBX devices, and HVAC systems.
War driving • Locates/attempts to penetrate wireless systems from public property, like a
sidewalk.
Vulnerability scanning • Exploits known weaknesses in operating systems and applications identified
through reconnaissance and enumeration.
Blind testing • Occurs when the target organization is not aware of penetration testing
activities.
Targeted testing • Target organization is informed of the test.
• Less disruption to organization due to a more controlled climate.
• Collection of virtual servers available for rent.
• Common services:
• Web, database, and email hosting.
• Storage.
• Online applications (such as Microsoft Office 365).
• Blank servers or unconfigured services that customers can use as they please.
• Telephone systems.
• Directory services.
• Remote monitoring and management.
• Mobile device management.
• Entire network infrastructures.
• Identify-as-a-Service (IDaaS).
• X-as-a-Service (XaaS).
• Malware-as-a-Service (MaaS).
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Cloud Services
Cloud Types (Slide 1 of 2)
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Cloud Type Description
Public • Customer VMs run side by side on the same hardware.
• Access control prevents customers from accessing (and even being aware
of) other customers' resources and VMs.
• Most straightforward and least expensive model.
Private • The organization creates its own "cloud" in its own data center for the
exclusive use of its own employees.
• Cloud experience with maximum security for the organization.
• The cloud runs on the company intranet.
• Departments act as customers.
• They use the company intranet portal to "purchase" services as needed.
Hybrid • A mix of on-premises private cloud services with public, third-party
services.
• The two platforms use orchestration to coordinate services and data
exchange.
• This type of arrangement provides flexibility for the organization, allowing
employees to access more secure or better performing local resources,
while remote users can access services from the Internet.
Cloud Types (Slide 2 of 2)
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Cloud Type Description
Community • A multitenant platform which is available to only a subset of customers.
• Multiple organizations that have the same needs, including security and
regulatory compliance, can share a community cloud.
• It is a good solution for organizations that don't fully trust the security of a
public cloud, but they would rather not go through the complexity of
setting up their own private cloud.
• U.S. federal government agencies often share a community cloud.
• Your security is dependent on security practices of cloud service provider.
• You don't have direct immediate control over systems.
• Your virtual machines are hosted on same computer as other customers'.
• If another customer’s VM escapes sandbox, might attack:
• Your VM.
• Host that both of you are on.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Cloud Services Vulnerabilities
• Do not use someone else's cloud service to host your most critical data.
• Make sure that cloud service provider has excellent SLA that describes:
• Incident response.
• Business continuity plan.
• Disaster recovery procedures.
• Protect connection to provider's cloud with strong encryption/authentication:
• Between systems.
• Between users and systems.
• Plan contingencies for compromised data following cloud provider breach.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Cloud Services Risk Mitigation
END
Copyright © 2019 Logical Operations, Inc. All rights reserved.

More Related Content

What's hot

Security on Cloud Computing
Security on Cloud Computing Security on Cloud Computing
Security on Cloud Computing Reza Pahlava
 
Cloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and FrontiersCloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and FrontiersGokul Alex
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud IBM Security
 
Cloud and Virtualization Security
Cloud and Virtualization SecurityCloud and Virtualization Security
Cloud and Virtualization SecurityRubal Sagwal
 
Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013javagroup2006
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security ChallengesYateesh Yadav
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak
 
7 Ways To Cyberattack And Hack Azure
7 Ways To Cyberattack And Hack Azure7 Ways To Cyberattack And Hack Azure
7 Ways To Cyberattack And Hack AzureAbdul Khan
 
Security and Audit for Big Data
Security and Audit for Big DataSecurity and Audit for Big Data
Security and Audit for Big DataNicolas Morales
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationVenkateswar Reddy Melachervu
 
Guide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azureGuide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azureAbdul Khan
 
Cloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and TechniquesCloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and TechniquesGokul Alex
 
Know Your Attacker - Core Security
Know Your Attacker - Core SecurityKnow Your Attacker - Core Security
Know Your Attacker - Core SecurityCore Security
 

What's hot (20)

Security on Cloud Computing
Security on Cloud Computing Security on Cloud Computing
Security on Cloud Computing
 
CloudSecurity
CloudSecurityCloudSecurity
CloudSecurity
 
Cloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and FrontiersCloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and Frontiers
 
Cloud security
Cloud securityCloud security
Cloud security
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Cloud and Virtualization Security
Cloud and Virtualization SecurityCloud and Virtualization Security
Cloud and Virtualization Security
 
Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013
 
Vormetric - Gherkin Event
Vormetric - Gherkin EventVormetric - Gherkin Event
Vormetric - Gherkin Event
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
 
7 Ways To Cyberattack And Hack Azure
7 Ways To Cyberattack And Hack Azure7 Ways To Cyberattack And Hack Azure
7 Ways To Cyberattack And Hack Azure
 
Security and Audit for Big Data
Security and Audit for Big DataSecurity and Audit for Big Data
Security and Audit for Big Data
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Guide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azureGuide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azure
 
Cloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and TechniquesCloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and Techniques
 
Know Your Attacker - Core Security
Know Your Attacker - Core SecurityKnow Your Attacker - Core Security
Know Your Attacker - Core Security
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 

Similar to CCSD SECURITY ESSENTIAL CERTIFIED Data and Application Security

Embedding GDPR Within Your Information and Library Service
Embedding GDPR Within Your Information and Library ServiceEmbedding GDPR Within Your Information and Library Service
Embedding GDPR Within Your Information and Library ServiceCILIPScotland
 
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.IGN MANTRA
 
chapter7-220725121544-6a1c05a5.pdf
chapter7-220725121544-6a1c05a5.pdfchapter7-220725121544-6a1c05a5.pdf
chapter7-220725121544-6a1c05a5.pdfMahmoudSOLIMAN380726
 
Chapter 7: Data Security Management
Chapter 7: Data Security ManagementChapter 7: Data Security Management
Chapter 7: Data Security ManagementAhmed Alorage
 
7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations7 Habits of Highly Secure Organizations
7 Habits of Highly Secure OrganizationsHelpSystems
 
CERN 5 Things you should know about Data Protection
CERN 5 Things you should know about Data ProtectionCERN 5 Things you should know about Data Protection
CERN 5 Things you should know about Data ProtectionEUDAT
 
gkkwqdqqndqw2121234Security essentials domain 4
gkkwqdqqndqw2121234Security essentials   domain 4gkkwqdqqndqw2121234Security essentials   domain 4
gkkwqdqqndqw2121234Security essentials domain 4Anne Starr
 
Why We Require GDPR?
Why We Require GDPR?Why We Require GDPR?
Why We Require GDPR?Jatin Kochhar
 
Cybertopic_2security
Cybertopic_2securityCybertopic_2security
Cybertopic_2securityAnne Starr
 
FDGL, John Haggis - Making Your Facebook App Legal
FDGL, John Haggis - Making Your Facebook App LegalFDGL, John Haggis - Making Your Facebook App Legal
FDGL, John Haggis - Making Your Facebook App LegalTodd Chaffee
 
Impact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityImpact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityEQS Group
 
GDPR and Remote Access Security: What You Need To Know
GDPR and Remote Access Security: What You Need To KnowGDPR and Remote Access Security: What You Need To Know
GDPR and Remote Access Security: What You Need To KnowBomgar
 
Privacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacyCenter.cloud
 
Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)Peter GEELEN ✔
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issuesJagdeepSingh394
 
Gain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless WorldGain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless WorldQualys
 
093049ov4.pptx
093049ov4.pptx093049ov4.pptx
093049ov4.pptxNguyenNM
 

Similar to CCSD SECURITY ESSENTIAL CERTIFIED Data and Application Security (20)

Secuntialesse
SecuntialesseSecuntialesse
Secuntialesse
 
Embedding GDPR Within Your Information and Library Service
Embedding GDPR Within Your Information and Library ServiceEmbedding GDPR Within Your Information and Library Service
Embedding GDPR Within Your Information and Library Service
 
GDPR 101
GDPR 101GDPR 101
GDPR 101
 
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
 
chapter7-220725121544-6a1c05a5.pdf
chapter7-220725121544-6a1c05a5.pdfchapter7-220725121544-6a1c05a5.pdf
chapter7-220725121544-6a1c05a5.pdf
 
Chapter 7: Data Security Management
Chapter 7: Data Security ManagementChapter 7: Data Security Management
Chapter 7: Data Security Management
 
7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations
 
CERN 5 Things you should know about Data Protection
CERN 5 Things you should know about Data ProtectionCERN 5 Things you should know about Data Protection
CERN 5 Things you should know about Data Protection
 
gkkwqdqqndqw2121234Security essentials domain 4
gkkwqdqqndqw2121234Security essentials   domain 4gkkwqdqqndqw2121234Security essentials   domain 4
gkkwqdqqndqw2121234Security essentials domain 4
 
Why We Require GDPR?
Why We Require GDPR?Why We Require GDPR?
Why We Require GDPR?
 
Cybertopic_2security
Cybertopic_2securityCybertopic_2security
Cybertopic_2security
 
FDGL, John Haggis - Making Your Facebook App Legal
FDGL, John Haggis - Making Your Facebook App LegalFDGL, John Haggis - Making Your Facebook App Legal
FDGL, John Haggis - Making Your Facebook App Legal
 
What IT Needs to Consider for Legal Hold
What IT Needs to Consider for Legal HoldWhat IT Needs to Consider for Legal Hold
What IT Needs to Consider for Legal Hold
 
Impact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityImpact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A Security
 
GDPR and Remote Access Security: What You Need To Know
GDPR and Remote Access Security: What You Need To KnowGDPR and Remote Access Security: What You Need To Know
GDPR and Remote Access Security: What You Need To Know
 
Privacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User Data
 
Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issues
 
Gain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless WorldGain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless World
 
093049ov4.pptx
093049ov4.pptx093049ov4.pptx
093049ov4.pptx
 

More from Anne Starr

I01letor20so201leutor2020
I01letor20so201leutor2020I01letor20so201leutor2020
I01letor20so201leutor2020Anne Starr
 
Iso27001leadauditor2020
Iso27001leadauditor2020Iso27001leadauditor2020
Iso27001leadauditor2020Anne Starr
 
Dncybersecurity
DncybersecurityDncybersecurity
DncybersecurityAnne Starr
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehAnne Starr
 
2 slides(2ndvariadaystion)
2 slides(2ndvariadaystion)2 slides(2ndvariadaystion)
2 slides(2ndvariadaystion)Anne Starr
 
Awtitioneressentialsdeckscloudprac401-577
Awtitioneressentialsdeckscloudprac401-577Awtitioneressentialsdeckscloudprac401-577
Awtitioneressentialsdeckscloudprac401-577Anne Starr
 
01wslouAsentialsdeck2dpractitioneres-400
01wslouAsentialsdeck2dpractitioneres-40001wslouAsentialsdeck2dpractitioneres-400
01wslouAsentialsdeck2dpractitioneres-400Anne Starr
 
uderessAwscloentialsdeck1-2ion00
uderessAwscloentialsdeck1-2ion00uderessAwscloentialsdeck1-2ion00
uderessAwscloentialsdeck1-2ion00Anne Starr
 
Cloudhnologysstecociat
CloudhnologysstecociatCloudhnologysstecociat
CloudhnologysstecociatAnne Starr
 
Cmbysantocsddsh
CmbysantocsddshCmbysantocsddsh
CmbysantocsddshAnne Starr
 
Cddmbysantcsosh
CddmbysantcsoshCddmbysantcsosh
CddmbysantcsoshAnne Starr
 
Ccbysantsddosh
Ccbysantsddosh  Ccbysantsddosh
Ccbysantsddosh Anne Starr
 
Ccsdbyhday1santodms
Ccsdbyhday1santodmsCcsdbyhday1santodms
Ccsdbyhday1santodmsAnne Starr
 

More from Anne Starr (20)

I01letor20so201leutor2020
I01letor20so201leutor2020I01letor20so201leutor2020
I01letor20so201leutor2020
 
Iso27001leadauditor2020
Iso27001leadauditor2020Iso27001leadauditor2020
Iso27001leadauditor2020
 
Ccsddm5days
Ccsddm5daysCcsddm5days
Ccsddm5days
 
Dayblic
DayblicDayblic
Dayblic
 
Day1cspbeblic
Day1cspbeblicDay1cspbeblic
Day1cspbeblic
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioieh
 
2 slides(2ndvariadaystion)
2 slides(2ndvariadaystion)2 slides(2ndvariadaystion)
2 slides(2ndvariadaystion)
 
Sec4
Sec4Sec4
Sec4
 
Securityic2
Securityic2Securityic2
Securityic2
 
)k
)k)k
)k
 
inte
inteinte
inte
 
Awtitioneressentialsdeckscloudprac401-577
Awtitioneressentialsdeckscloudprac401-577Awtitioneressentialsdeckscloudprac401-577
Awtitioneressentialsdeckscloudprac401-577
 
01wslouAsentialsdeck2dpractitioneres-400
01wslouAsentialsdeck2dpractitioneres-40001wslouAsentialsdeck2dpractitioneres-400
01wslouAsentialsdeck2dpractitioneres-400
 
uderessAwscloentialsdeck1-2ion00
uderessAwscloentialsdeck1-2ion00uderessAwscloentialsdeck1-2ion00
uderessAwscloentialsdeck1-2ion00
 
Cloudhnologysstecociat
CloudhnologysstecociatCloudhnologysstecociat
Cloudhnologysstecociat
 
Cmbysantocsddsh
CmbysantocsddshCmbysantocsddsh
Cmbysantocsddsh
 
Cddmbysantcsosh
CddmbysantcsoshCddmbysantcsosh
Cddmbysantcsosh
 
Ccbysantsddosh
Ccbysantsddosh  Ccbysantsddosh
Ccbysantsddosh
 
Ccsdbyhday1santodms
Ccsdbyhday1santodmsCcsdbyhday1santodms
Ccsdbyhday1santodms
 

Recently uploaded

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 

Recently uploaded (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 

CCSD SECURITY ESSENTIAL CERTIFIED Data and Application Security

  • 1. CCSD SECURITY ESSENTIAL CERTIFIED Data, and Application Security Web Application Security, Cloud
  • 2. Asset Management • Assets include hardware, software, data, physical systems, and documentation. • ITAM is managing the lifecycle of these assets. • In secure ITAM: • Strike balance between cost and need. • Distinguish between data ownership/data custodianship. • Implement controls to secure private data. • Implement asset security to protect against liability. • Apply classifications to sensitive data. • Be very clear about regulatory policy requirements. • In your policy, have a process in place to respond to legal requests for your data. Hardware Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 3. Asset Management Roles (Slide 1 of 2) Copyright © 2019 Logical Operations, Inc. All rights reserved. Role Description Data Owner • Involved in creation, acquisition, and usage of data. • Must understand the cost to maintain data, as well as the quality. • Determines sensitivity of data and associated risks. • Determines who has access to data. • Should have input in retention and destruction policies. • Should be aware of legal or regulatory issues with data. Data Custodian • Tasked with protecting data. • Implements access requirements per data owner. • Applies controls, maintains, monitors, and destroys data when necessary. • Can be a database administrator, system administrator, or other IT role. System Owner • Owns the computer that the data resides on. • May be different than data owner. • Ex: IT department owns servers; Sales owns data on servers. Administrator • Manages IT systems. • Usually works in the IT department. • Can also be someone else trusted to perform administrative tasks.
  • 4. Asset Management Roles (Slide 2 of 2) Copyright © 2019 Logical Operations, Inc. All rights reserved. Role Description Business Owner • Owns all or part of the business. • Won’t usually be involved in the technical aspect of asset management. • Is interested in the financial value of assets. End User • Uses IT resources and other assets as part of their job. • Typically has no administrative privilege. Auditor • Periodically checks to see if assets are being utilized in accordance with internal policy or regulatory requirements. • Might be an employee, but more likely to be external.
  • 5. • Use labeling to minimize risk of loss or modification. • Labeling schemes are known as classifications. • Management must determine: Classification Principles Hardware Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 6. Classification Process 6. Implement classification schema 1. Identify asset 2. Determine who is accountable for its integrity 3. Establish ownership of asset 4. Place value on asset 5. Prepare schema for classifying asset Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 7. Classification Policies • Classification policy includes: • Users may drive classification types based on how they handle assets. • Regular reviews determine if appropriate classification is maintained. Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 8. Classification Schemes • Military • Employed by U.S. government. • Strictly defined, rigid. • Commercial • Employed by non-governmental organizations. • Developed to support business needs. Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 9. Military Classification Schemes Military Classification Scheme Level Risk If Information Is Disclosed to Unauthorized Entities Top Secret Grave damage to national security. Secret Serious damage to national security. Confidential Damage to national security. Unclassified No damage to national security. Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 10. Commercial Classification Schemes Copyright © 2019 Logical Operations, Inc. All rights reserved. Commercial Classification Scheme Level Description Corporate Confidential Information that should not be provided to individuals outside of the enterprise. Personal and Confidential Information of a personal nature that should be protected. Private Correspondence of a private nature between two or more people that should be safeguarded. Trade Secret Corporate intellectual property that, if released, will present serious damage to the company's ability to protect patents and processes. Client Confidential • Client personal information that, if released, may result in the identity theft of the individual. • Corporate information or intellectual property
  • 11. Privacy • Privacy requirements present legal challenges. • Should define: What will be collected How collected data will be protected Copyright © 2019 Logical Operations, Inc. All rights reserved. How long private information will be kept How collected data will be shared How private information will be disposed of
  • 12. Privacy Laws Copyright © 2019 Logical Operations, Inc. All rights reserved. • Most governments have privacy laws in place. • Laws provide citizens with more control over how PII is gathered, used, stored, disseminated. • Some laws may reduce privacy protections in interests of national security and public safety. • You must assist your organization in complying with these laws.
  • 13. • Private data is owned by person data is about. • Makes compliance challenging—organizations handle data. • Organizations must balance protection requirements against business value of using data. • Consider both ethics and legal restrictions when protecting private data. Copyright © 2019 Logical Operations, Inc. All rights reserved. Private Data Ownership
  • 14. • Can only collect data if useful and relevant to specific purpose. If not, do not collect, even if beneficial to the business. Copyright © 2019 Logical Operations, Inc. All rights reserved. Collection Limitations
  • 15. • Databases with PII often are high-profile target for major attacks. • Attackers may sell PII on online black markets. • Database protection is paramount due to both business value and legal requirements. Databases Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 16. • A data collector is an entity that collects and determines what will be done with someone’s private data. • A data controller is an entity that determines the purposes and means of processing personal data. • A data processor is an entity that processes private data on behalf of the controller. • HR department • Marketing department • Call center • EU GDPR stipulates data must be: • Fairly and lawfully processed. • Processed for limited purposes. • Adequate, relevant, not excessive. • Accurate. • Kept no longer than necessary. • Processed in accordance with data subject's rights. • Secure. • Transferred only to countries with adequate protection. Data Collectors, Controllers, and Processors Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 17. • Private data shouldn’t be retained indefinitely. • Most PII legal requirements stipulate requirements for retention and destruction. • PII ceases to be private when posted publically—often impossible to rectify, especially on the Internet. • Internet of Things adds complications—private data is collected from household items. Data Longevity Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 18. • The act of storing a business asset. • Assets that you may retain: • Data • Media • Hardware • Software • Personnel • Consider compliance requirements when retaining assets. Retention Hardware Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 19. Retention Policies • Retention policies need to be comprehensive, not just for data. • Write clear policies and train users. • Older systems need special care for disposal. Todevelop a retention policy: Copyright © 2019 Logical Operations, Inc. All rights reserved. 1. Evaluate statutory requirements, litigation obligations, and business needs. 2. Classify types of records. 3. Determine retention periods and destruction practices. 4. Draft and justify record retention policies. 5. Train staff. 6. Audit retention and destruction practices. 7. Periodically review policy. 8. Document policy, implementation, training, and audits.
  • 20. • Every organization needs an information retention policy. • Avoid compliance issues and lawsuits regarding retrieving and retaining information. • Demonstrate that you have a secure storage environment. • Information storage mechanism should allow for timely data search/retrieval. • Emails, instant messages, policies, procedures, and audit reports are business records. • You may need certain records to protect against litigation or audits. • Verify the maximum retention time for all assets you handle. • IT department should not be the sole manager of business records retention. • Do not expect users to help the company comply with retention requirements. • In investigations, don’t deviate from normal backup and retention procedures. • Expect that after data is destroyed someone will still have a copy. • Expect that archived information may take time to retrieve. • Find a balance between deleting everything and saving everything. • Don't rely on attorney for IT retention compliance. Copyright © 2019 Logical Operations, Inc. All rights reserved. Retention Policy Considerations
  • 21. Data Retention Copyright © 2019 Logical Operations, Inc. All rights reserved. • Data is the organization’s most critical non-human asset. • Different data will require different retention times. • Ex: Financial records often kept for seven years. • Other types of data may need to be disposed of quickly, even if only after a few months. • Even if data isn’t privacy-related, still consider it in the context of retention. • Ex: Accounts receivable database must be retained for a specified period.
  • 22. Media Retention • Media are where you store your data: • Tape • CD/DVD • Hard disks • Removable flash drives • Cloud storage • Paper printout • Best practices for taking care of media: • Protect from sunlight, heat, and other natural processes. • When media locked in safes, include silica gel packs to prevent moisture/mildew. • Stand tapes/floppy disks on edge, not flat. • Keep magnetic media away from magnetic fields. • Know the lifecycle of the backup tape you are using. • Create authorized user list: one team for regular backup/restore; another for disaster recovery. • Use an automated system with bar code scanning that tracks media movement. • Repeatedly test your backup and restore procedures. • Have a backup of any cloud data; make sure provider securely destroys it when requested. Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 23. Hardware Retention Copyright © 2019 Logical Operations, Inc. All rights reserved. • Use hardware as long as possible, as cost can add up. • Consider hardware’s role in protecting data. • Maintain hardware so you can retrieve old data. • Include non-media hardware components in retention plans. • Create a retention plan that focuses on entire lifecycle. • Create disposal plans for hardware if deprecated/obsolete. • Scrub hardware of all data before disposal. • Consider proper disposal procedures for electronic waste.
  • 24. • Purchased or in-house software has a lifecycle, and requires a retention plan. • Might need to do more than uninstall. • Consider other system dependencies; can they function without this software? • Keep track of software dependencies in retention policies. • Software may require special scrubbing of data. • Failing to completely wipe software may leave sensitive data unsecured. Software Retention Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 25. Personnel Retention Copyright © 2019 Logical Operations, Inc. All rights reserved. • Knowledge often trapped in departmental “silos” (intentionally or not). • Knowledge may not be documented. • Avoid depending on a single person for critical business needs and processes. • Include provisions for transferring operational knowledge in personnel retention policy. • Include rotation of duties and multidisciplinary teams to help break up the “silo” of information.
  • 26. Data Security Control Selection When you are selecting controls, consider: Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 27. • Agreements between organizations on data formats. • How data is represented, formatted, defined, structured, transmitted, manipulated, tagged, used, and managed. • Support integrity of data and minimize redundancy. • Set by: • Standards bodies. • Specific vendors. • Help vendors implement consistent security across their products. • Help identify the potential scope of a security incident. Copyright © 2019 Logical Operations, Inc. All rights reserved. Data Standards
  • 28. Data Baselines Copyright © 2019 Logical Operations, Inc. All rights reserved. Control Public Private Sensitive Confidential Trade Secret Read-only Recommended Recommended Recommended Recommended Required Encryption Optional Required Optional Recommended Required Data redundancy Optional Required Recommended Recommended Required Media sanitation/ disposal Recommended Required Required Required Required (destruction)
  • 29. Scoping and Tailoring • Determines how far reaching your security is. • Any systems in scope need controls. • Monitor potential interference when systems interface with others outside scope. • Example: • Database admin backing up data to a third-party external site. • Modifying security practices to suit your needs. • Example: • Relaxing security requirements for segregated development environments. Scoping Tailoring Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 30. • Highlights of SANS.org checklist for implementing data security controls: • Use approved drive encryption software on mobile devices. • Assess data to identify what is sensitive enough to require encryption and integrity controls. • Review cloud storage providers’ security practices for protecting your data. • Implement automated tool on network borders to ensure sensitive information does not leave the network. • Periodically scan servers to see if any sensitive data exists in clear text. • Limit the use of USB flash drives to those that use encryption. • Implement network-based data loss prevention (DLP) mechanisms to: • Automatically back up critical data. • Control the movement of data across network. Copyright © 2019 Logical Operations, Inc. All rights reserved. Data Security Control Implementation
  • 31. • Data that is stored on media for long-term retention. • Physical and logical loss of data are risks. • Data at rest controls: • Data Recovery Plan • Strong encryption • Access control • Password management tools to store passwords and keys • Control removable media • Labeling policies • Data-safe storage for removable media • Documentation of location of removable data. Copyright © 2019 Logical Operations, Inc. All rights reserved. Data at Rest
  • 32. Data in Use Copyright © 2019 Logical Operations, Inc. All rights reserved. • Data that is actively being processed. • Found in RAM, CPU cache, CPU registers. • Originally not considered a candidate for encryption. • New types of attacks: • Cold boot attacks • Bootkits • Mactans • New strategies for protection: • Full memory encryption • Storing encryption keys in CPU registers rather than RAM • Homomorphic encryption • Secure enclaves • Difficult to maintain referential integrity between ciphertext and cleartext.
  • 33. • Data being transferred from one host to another. • Exposure of data is a primary risk. • Exposures differ depending on the transmission media. • Data in transit controls: • Protect web traffic with SSL. • Encrypt sensitive email data with PGP or S/MIME. • Non-Web-covered data traffic encrypted with application level encryption. • Encrypted connections between application servers and database servers. • Tunneling protocols if no application level encryption. • Encryption for high sensitivity data even in protected subnets. Data in Transit Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 34. • The process of scrambling data so that only authorized persons can read it. • The best control to implement, whether on data at rest or in transit. • Can be done through hardware or software. • Data at rest will be protected, even if the data is stolen. • With data in transit, encryption can happen at any point in the network: • The link itself could be encrypted. • The link might not be encrypted, but the data itself could be. • Intermediate network devices such as routers can form encrypted tunnels. Copyright © 2019 Logical Operations, Inc. All rights reserved. Data Encryption
  • 35. Data Policies Copyright © 2019 Logical Operations, Inc. All rights reserved. • Policies provide consistency, improve effectiveness, streamline operations, and reduce risk. • Policies must evolve to reflect business changes. • Management should be the source of policy. • Policy should be reviewed on a regular basis. • Address the following in your data policies: • How it should be classified. • Where it should be stored. • Who will need access. • How you will monitor and audit data access. • How it should be retained. • How and when the data will be disposed of. • The impact of loss, disclosure, or corruption of the data.
  • 36. Data Handling Delivery Storage Archiving Disposal • Secure handling ensures data is securely stored, archived, and disposed of throughout its lifecycle. • Keep the following in mind when developing data handling procedures: • Cost • Ownership and custodianship • Privacy • Liability • Sensitivity • Existing law and policy requirements • Policy and process • Never assume that only authorized personnel are handling data. • Never assume that all data handlers have been trained appropriately. • Keep records of how and when your data is handled. Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 37. • Mark data with its sensitivity level. • Enables automated systems to more easily act on the data. • Informs employees how to handle that data. • Data owner determines the marking; data custodian applies it. • Common practices for marking data: • Including the name and address of the individual, group, or facility responsible for setting that marking. • Including the date the marking was applied. • Using redundant marking on the front cover/title page, back cover, top and bottom. • Applying marking that cannot be removed or modified. Copyright © 2019 Logical Operations, Inc. All rights reserved. Marking
  • 38. • The mechanism used to apply markings to your data. • Ex: Storing data in an electronic folder; the folder name provides a label. • Labels should make classification obvious to an observer. • Follow guidelines when labeling data: • Asset owner must document the security classification of the asset. • Asset owner must advise asset custodian and IT security team of security classification of the asset. • Hard copies of an asset are clearly labeled according to their security classification. • For bound hard copies, include sensitivity label on front cover, rear cover, and title page as appropriate. • Fax cover sheets include the relevant classification label. • Any electronic communication must also have the proper classification level. • Unlabeled data should have highest priority protection until a label can be assigned. Copyright © 2019 Logical Operations, Inc. All rights reserved. Labels
  • 39. Data Storage • Don’t allow hard copies to lie around where any passerby could take them or read them. • Don’t allow sensitive information to be stored in cleartext on a hard drive. • Make sure backup media is encrypted. • Send backup copies of data to a secure offsite location. Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 40. Data Remanence • Information left on a storage medium even after erasure. • Can be recovered by unauthorized personnel. • Users may discard unreadable backup tapes, not realizing that others can recover them. • Users assume normal deletion or formatting completely removes data, when it doesn’t. • Best practice is to physically destroy media rather than risk data remanence. • Cloud storage presents challenges for remanence. • Ex: You terminate service with a cloud provider. How can you assure your data has truly been scrubbed from their servers? Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 41. Data Destruction (Slide 1 of 2) Copyright © 2019 Logical Operations, Inc. All rights reserved. Method Description Erasing • A simple mechanism for deleting data, using operating system or third-party tools. • Also known as formatting. • Although erasing can be done at the bit level (full format), it is typically performed at the file table level (quick format). • It is trivially easy to recover data that has been erased. • Even if a full format has been performed, magnetic imprints can still be found on the media and retrieved by data recovery houses. Overwriting • Sometimes called clearing or electronic shredding. • Remnant bits on the disk have been replaced by different bits (usually all zeros). • The tool might skip bad or corrupt sectors, making data recovery possible. Purging • A more intense form of clearing. • Meant to assure all data remnants removed and media is clean and ready for reuse. • Still not fully trusted to be completely fail safe. Degaussing • A technique that removes data from magnetic media. • Hard drives are usually rendered useless after the process. • Non-magnetic storage like CDs and SSDs are not affected.
  • 42. Data Destruction (Slide 2 of 2) Copyright © 2019 Logical Operations, Inc. All rights reserved. Method Description Destruction • Physical destruction may ensure that media can't be reassembled or data retrieved. • The physical drive is lost in the process. Encryption • Hides the data from unauthorized users without the key. • If you destroy the key, the data is effectively destroyed. • Sometimes used before media is purged or destroyed. Declassification • Not a data removal technique, but still part of data removal process. • Media with classified files is retained until data is no longer deemed to be sensitive. • Once data is declassified, media can be erased, purged, etc., before reuse.
  • 43. • Web app might be written without sufficient security. • Insecure communications between web app and back-end database/file server. • Insufficient security for web service hosting web app. • Web system located on insufficiently protected OS or hardware. • Inadequate authentication requirements for web app, server, or OS. • Failed logon attempts not properly monitored or controlled. • XML language vulnerabilities: • XML parser can manipulate/misinterpret data. • Risk of injection attacks. • SAML language vulnerabilities: • Improper implementation: • Leaving out identifier of authorization request. • Leaving out identity of recipient. • SOAP • Neutral mechanism for clients to request services via HTTP or other protocols. • Vulnerable to malicious commands including SQL or XML injection. Copyright © 2019 Logical Operations, Inc. All rights reserved. Web-Based System Vulnerabilities
  • 44. Malicious Code Examples Copyright © 2019 Logical Operations, Inc. All rights reserved. Name Example Comment SQL Injection blah' or 1=1-- • Based on an OR statement • Todefeat, you must sanitize input or use stored procedures with parameterized SQL queries Directory traversal https://www.victim.com/..%c0%af../w innt/system32/cmd.exe?/c+tftp.exe+- i+get+exploit.exe • Uses special Unicode characters or other mechanisms to bypass controls and allow browsing of the file system • Todefeat, use file system permissions Metacharacters ' " [ ] ; & ^ . | ? * + { } ( ) • Some special characters have programmatic meaning • Todefeat, sanitize client input and use escape characters to neutralize programmatic capabilities Script <script>Some malicious command here</script> • Malicious code often takes the form of a script • Patch systems and sanitize input to disallow unauthorized scripts
  • 45. • Institute a CAPTCHA to help validate that the requester is an actual human, and not a malicious automated attack. • Use one-time passwords called nonces for each URL request to prevent spoofing and replay attacks. • Address inherent vulnerabilities of XML-based languages during development. • Build input validation and sanitization into your app. • Institute an assurance signoff process before putting server or web application into production. • Harden the OS. • Perform extensive vulnerability scans prior to deployment. • Secure or remove entirely administrative interfaces. Copyright © 2019 Logical Operations, Inc. All rights reserved. Web-Based System Vulnerability Mitigation (Slide 1 of 2)
  • 46. • Only permit access from authorized hosts/networks using: • Certificates. • Multifactor authentication. • Never hardcode authentication credentials into the application itself. • Use account lockout. • Use extended logging and auditing. • Use multifactor authentication that requires user interaction such as temporary SMS codes, geolocation, and scanning QR codes. • Encrypt all authentication traffic. • Verify that interface is at least as secure as rest of application. • Use a web application proxy/firewall and host-based intrusion detection. • Train end users to practice safe browsing including regularly clearing out temporary files and cached cookies. Copyright © 2019 Logical Operations, Inc. All rights reserved. Web-Based System Vulnerability Mitigation (Slide 2 of 2)
  • 47. Security Test Strategies Copyright © 2019 Logical Operations, Inc. All rights reserved. 1. Create a security assessment policy. 2. Create a security assessment methodology. 3. Assign testing roles and responsibilities. 4. Determine which systems you will test. 5. Determine how you will approach the testing, addressing: • Logistical issues. • Legal regulations. • Policy considerations. 6. Carry out test, addressing any incidents that arise during/because of the test. 7. Maintain the while handling the data through all phases: • Collection. • Storage. • Transmission. • Destruction. 8. Analyze data and create a report that will turn technical findings into risk mitigation actions to improve the organization's security posture.
  • 48. • Responses by management and users to security-related questions. • A list of existing or non-existing procedures or documentation. • Recorded observation of user/management activities. • Recorded observation of adherence to existing procedures/policies. Administrative Assessment Test Output SecurityQuestionnaire Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 49. • Current firewall configuration of each system. • Antivirus patch level of each system. • List of known or potential vulnerabilities found on each system. • List of default configurations found on each system. • List of unused user accounts found on each system. • List of user privilege levels on each resource or system. Technical Assessment Test Output Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 50. Vulnerability Assessments Perform when: • First deploy new/updated systems. • New vulnerabilities have been identified. • A security breach occurs. • Need to document security state of systems. Collect Store Organize Analyze Report Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 51. • Port scanner • Protocol analyzer • Packet analyzer • Network enumerator • Intelligence gathering • Vulnerability scanner Vulnerability Scanning Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 52. Penetration Test Preparation Who will commission the test? Who will conduct the test? How will the test be conducted? What are the test’s limitations? What tools will be used in the test? Who on the client side will be available in case of accident? Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 53. The Penetration Test Process Reconnaissance Scanning Exploitation Maintaining Access Copyright © 2019 Logical Operations, Inc. All rights reserved. Reporting
  • 54. Penetration Test Approaches BlackBox Test Grey BoxTest White BoxTest • Black Box • Most effective at real-world evaluation. • Most time and effort. • Need to carefully consider who should know about the test. • Grey Box • Complex parameters needed to strike the perfect balance. • White Box • More comprehensive evaluation because of broad perspective of organizational systems. • Might be too simulated – not able to account for attackers’ out of the box thinking. Full Amount of Reconnaissance None Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 55. Penetration Test Components Copyright © 2019 Logical Operations, Inc. All rights reserved. Component Description Network scanning • Uses a port scanner to identify devices attached to target network and to enumerate the applications hosted on the devices. This function is known as fingerprinting. Social engineering • Attempts to get information from users to gain access to a system. • Tests for adequate user training. • Stay mindful of ethical implications of deceiving people. • Don't want to undermine your employees' trust in you or their coworkers. War dialing • Uses a modem and software to dial a range of phone numbers to locate computer systems, PBX devices, and HVAC systems. War driving • Locates/attempts to penetrate wireless systems from public property, like a sidewalk. Vulnerability scanning • Exploits known weaknesses in operating systems and applications identified through reconnaissance and enumeration. Blind testing • Occurs when the target organization is not aware of penetration testing activities. Targeted testing • Target organization is informed of the test. • Less disruption to organization due to a more controlled climate.
  • 56. • Collection of virtual servers available for rent. • Common services: • Web, database, and email hosting. • Storage. • Online applications (such as Microsoft Office 365). • Blank servers or unconfigured services that customers can use as they please. • Telephone systems. • Directory services. • Remote monitoring and management. • Mobile device management. • Entire network infrastructures. • Identify-as-a-Service (IDaaS). • X-as-a-Service (XaaS). • Malware-as-a-Service (MaaS). Copyright © 2019 Logical Operations, Inc. All rights reserved. Cloud Services
  • 57. Cloud Types (Slide 1 of 2) Copyright © 2019 Logical Operations, Inc. All rights reserved. Cloud Type Description Public • Customer VMs run side by side on the same hardware. • Access control prevents customers from accessing (and even being aware of) other customers' resources and VMs. • Most straightforward and least expensive model. Private • The organization creates its own "cloud" in its own data center for the exclusive use of its own employees. • Cloud experience with maximum security for the organization. • The cloud runs on the company intranet. • Departments act as customers. • They use the company intranet portal to "purchase" services as needed. Hybrid • A mix of on-premises private cloud services with public, third-party services. • The two platforms use orchestration to coordinate services and data exchange. • This type of arrangement provides flexibility for the organization, allowing employees to access more secure or better performing local resources, while remote users can access services from the Internet.
  • 58. Cloud Types (Slide 2 of 2) Copyright © 2019 Logical Operations, Inc. All rights reserved. Cloud Type Description Community • A multitenant platform which is available to only a subset of customers. • Multiple organizations that have the same needs, including security and regulatory compliance, can share a community cloud. • It is a good solution for organizations that don't fully trust the security of a public cloud, but they would rather not go through the complexity of setting up their own private cloud. • U.S. federal government agencies often share a community cloud.
  • 59. • Your security is dependent on security practices of cloud service provider. • You don't have direct immediate control over systems. • Your virtual machines are hosted on same computer as other customers'. • If another customer’s VM escapes sandbox, might attack: • Your VM. • Host that both of you are on. Copyright © 2019 Logical Operations, Inc. All rights reserved. Cloud Services Vulnerabilities
  • 60. • Do not use someone else's cloud service to host your most critical data. • Make sure that cloud service provider has excellent SLA that describes: • Incident response. • Business continuity plan. • Disaster recovery procedures. • Protect connection to provider's cloud with strong encryption/authentication: • Between systems. • Between users and systems. • Plan contingencies for compromised data following cloud provider breach. Copyright © 2019 Logical Operations, Inc. All rights reserved. Cloud Services Risk Mitigation
  • 61. END Copyright © 2019 Logical Operations, Inc. All rights reserved.