Cissp Domain 7
Cissp Domain 7
e e
ajobjectives
• The goal of security operations
b h
enabling it to meet its without disruption.
• This includesu
l S and data, providing incident response capabilities,
ensuring confidentiality, integrity, and availability (CIA
triad) ofosystems
and C
B y enforcing compliance with regulations.
S P• By mitigating risks and handling security incidents effectively,
or
securely.
s f
o te
ell N
orn
C
• Security operations are essential for maintaining the security and resilience of an organization’s
systems.
• They integrate security practices with organizational processes and support the business in
achieving its goals without compromising on security.
• Effective security operations help manage risks, respond to incidents, and ensure compliance with
policies and regulations.
ti on
• Seal off access: Prevent unauthorized individuals from entering the area
where the incident or crime took place.
i bu
• Take photographs: Capture detailed images of the sceneis
tr
before
anything is moved or disturbed.
fo rD
• Document evidence: Record the exact location o t of all evidence,
including digital devices, to create a clearN
a , and reliable record of the
scene.
a h
N mobile devices, and storage
tUSBs)
• Avoid touching anything: Computers,
je
media (like hard drives ande must not be physically tampered
b ha
with, as this could alter or destroy vital evidence.
l Suthetechniques
• Employ forensic for imaging or snapshotting data without
Co of Evidence in Investigations:
compromising system's integrity.
B y
Contamination
P
S state. evidence is contaminated, it cannot be restored to its original
CI S • Once
rn
tampering.
C o
• Securing the scene is essential in any investigation to preserve evidence. Investigators must follow
proper procedures like sealing off the area, documenting the scene, and avoiding any interaction
with digital devices.
• Ensuring that evidence is not contaminated allows investigators to maintain the integrity of the
investigation, leading to reliable conclusions and upholding the legal admissibility of evidence.
No
evidence.
a,
2. Collection of Evidence:
•
h
Proper collection methods are used for both physical and digital
evidence.
Na
•
jeet
Policies and standards guide the collection process to preserve
evidence integrity.
bha
3. Examination and Analysis:
•
l Su Evidence is examined through manual and automated processes
Co
to determine its relevance to the investigation.
• The analysis helps to build a case or identify the responsible party.
By 4. Final Reporting:
I SSP •
•
Results of the investigation are compiled into a detailed report.
The report outlines the entire investigation process, findings,
r C recommendations, and actions required.
fo • Reports may vary depending on the audience and level of detail
es required.
ot Chain of Custody:
ell N • Key in maintaining the integrity of evidence, it records who handled the
rn
evidence, when, and where.
• Forensic investigation involves identifying and securing the scene, collecting evidence while
maintaining the chain of custody, and examining and analyzing the data.
• The final report is critical for summarizing findings and may need to be tailored for different
audiences.
on
• Photographs, video/audio recordings, and security footage
related to the investigation.
uti
Evidence Types:
tr i b
1. Real Evidence:
D is
for
• Tangible physical objects, such as hard drives and USBs. They
are physical evidence that can be inspected and used to prove
t
No
or disprove factual issues in trials.
a,
2. Direct Evidence:
•
h
Evidence that speaks for itself, requiring no inference (e.g.,
Na
video footage of the crime happening).
3.
et
Circumstantial Evidence:
je
ha
• Indirect evidence that suggests a fact by implication. It can
b
prove an intermediate fact, such as a witness stating the
l Su
defendant was near the crime scene.
Co
4. Corroborative Evidence:
I SSP 5.
trials.
Hearsay Evidence:
r C
fo • Testimony from witnesses who were not present at the event. It
ll N
• Stipulates that original evidence should be presented in court
C o 7. Secondary Evidence:
• Substitutes for original evidence, such as a printout of log files,
used when the original no longer exists.
t fo
physical tools, or access to needed information.
Locard’s Exchange Principle: N o
Definition: h a,
•
a whenever two objects interact, a
Nthat
• t
This principle posits
e occurs. Something is always taken and
je
transfer of material
somethingais always left behind.
bh
Applicationuin Forensics:
lS
•
• o In every investigation, detectives search for traces left behind
By C (e.g., fingerprints, DNA, fibers) and evidence of what might
CI S
or
vacuuming for fibers, and fingerprint analysis, following this
o te • Example:
ll N
A hacker breaks into a system, leaving behind IP addresses, login
on
• Definition:
•
ti
Live evidence refers to data stored temporarily in a running system,
u
b
such as in RAM, cache, or system buffers.
• Example:
tr i
•
D is
Information in active memory that will be lost if the system is turned
for
off or rebooted. It’s crucial to extract this data during a live forensic
analysis.
t
Forensic Copies:
No
• Definition:
h a,
Na
• Forensic copies are bit-for-bit replicas of digital media (e.g., hard
drives, SSDs). They ensure that the integrity of the original data is
jeet
preserved for forensic analysis.
ha
• Importance:
•
bForensic copies allow investigators to analyze data without altering
Co
investigation.
s f • Tools like FTK (Forensic Toolkit) and EnCase are often used to extract
ll N
Artifacts in Digital Forensics:
rn e • Definition:
o
• Artifacts are traces left behind after a breach or attempted breach.
C These act as clues, often pointing to the actions or path of an
attacker.
• Example:
• Artifacts can include log files, registry changes, malware traces, or
deleted files that show tampering or unauthorized access attempts.
• Digital forensics involves the systematic collection and analysis of digital data, often crucial in legal
investigations.
• Live evidence, forensic copies, and artifacts all play key roles in this process.
• Digital forensics tools and procedures ensure the proper handling of data, maintaining the integrity of
evidence for investigation or court presentation.
for
the keyboard) can change or overwrite crucial evidence.
t
No
• Immediacy:
• The need for immediate action to collect data without disrupting
a,
the system, as powering off the system leads to the loss of live
h
Na
evidence.
et
Specialized Tools for Live Evidence:
je
ha
• Tools and Expertise:
•
b
Extracting live evidence requires expert knowledge and
Co
changing the system state. Tools like Volatility and FTK Imager
can be used to capture RAM content and other live system data.
By • Minimizing Contamination:
ot • Data Loss:
rn
storage such as RAM or CPU registers is lost. This can severely
C o • Example:
hinder an investigation as crucial evidence may be irretrievable.
• Live evidence is volatile and requires careful handling during digital forensic investigations.
• Special tools and expertise are necessary to extract this data while minimizing the risk of
contamination.
• Disrupting the system can result in permanent loss of critical evidence, which makes live evidence
collection both challenging and urgent.
a,
MD5, SHA-1) to ensure data integrity.
Handling the Original Hard Drive:
h
• Preservation:
Na
•
eet
Once the forensic copies are made, the original hard drive
j
ha
should be placed in an evidence bag, sealed, and never touched
b
again unless absolutely necessary. This ensures the chain of
l Su
custody is maintained, preserving the integrity of the evidence.
Co
• Example:
SP
investigators immediately store the original in an evidence bag
and focus on analyzing the forensic copies.
es
ot
• The first forensic copy is archived, similar to the original, and is
never used. The second copy, known as the working copy, is
ell N used for analysis to avoid contaminating the original data. This
rn
working copy allows investigators to perform various tests
C o • Example:
without risking the integrity of the original evidence.
• Forensic copies are exact duplicates of a digital storage device, created to preserve the integrity of
evidence while allowing investigators to perform analysis.
• The original hard drive and the first copy are sealed as evidence, while the second copy, known as
the working copy, is used for forensic examination.
• This process ensures the evidence remains untainted throughout the investigation.
ti on
pressing keys, alters the state of the system and can contaminate the
u
evidence.
• Specialized Tools Required:
tr i b
•
D is
Expert knowledge and forensic tools (e.g., Volatility, FTK Imager) are
essential to extract live evidence without affecting its integrity.
• Example:
t for
No
• In the case of an ongoing cyberattack, capturing data from RAM can
reveal information about active processes, encryption keys, or
a,
malware residing in volatile memory.
h
Na
Forensic Copies and Handling:
et
• Definition:
•
je
Forensic copies are exact, bit-for-bit replicas of digital storage media
ha
(e.g., hard drives). These copies preserve evidence for analysis while
Su
• Handling Procedures:
l
Co
• After creating two bit-for-bit copies, the original hard drive is sealed in
an evidence bag and stored. One of the copies is also sealed, while the
SP
Importance of Bit-for-Bit Copies:
CI S • Definition:
• A bit-for-bit copy means the entire content of the original drive,
es exactly.
ll N
• To verify the integrity of the forensic copies, hashing (e.g., using MD5 or
C o • Example:
• During an investigation, the hard drive from a suspect's laptop is
copied bit-for-bit, and the hash values of the original and copies are
compared to ensure no data alteration.
• Live evidence is volatile and can be easily lost if a system’s state changes. Specialized tools are
required to extract it without contamination.
• Forensic copies, on the other hand, provide exact, bit-for-bit replicas of storage media.
• Creating these copies ensures that the original data remains untouched, allowing detailed analysis
of the duplicate.
• Verifying the integrity of the copies using hash values ensures the copies are accurate and can be
used as valid evidence in legal proceedings.
t
Computer systems, web browsers, mobile devices, hard
•
No
drives, and flash drives all generate artifacts.
• Common Artifacts:
h a,
• a
Nand
IP addresses, file names/types, registry keys, operating
t
echanges.
system information, logged information like account
e
updates andjfile
a
Example of Use:bh
•
u
AnSIP address found in the browser history could help identify
l
Cothe
•
location of an attacker. Similarly, registry keys might show
B y when malware was installed.
I SSP
r C
fo
es
ot
ell N
orn
C
• Mobile device forensic analysis is challenging due to rapid changes in operating systems, lack of
universal tools, and the complexity of suspended applications.
• Investigators require specialized training and tools to handle this complexity. Forensic artifacts are
crucial pieces of evidence in any investigation, acting as clues that can reveal the actions and
identity of an attacker.
• Proper reporting and documentation throughout the investigation process are necessary to ensure
the evidence is clear, accurate, and legally valid for stakeholders.
ti on
documentation and handling minimize the risk of the evidence
being dismissed.
i bu
• Preventing Contamination:
str
•
D i
Evidence must be handled and stored carefully to prevent any
for
form of contamination, tampering, or deterioration, especially
t
when it may need to be presented in court years later.
• Documentation:
No
•
h a,
The chain of custody involves documenting every transfer or
Na
handling of evidence, noting the time, date, and individuals
involved in each step.
jeet
Steps in Establishing and Maintaining the Chain of Custody:
•
bha
Tag the Evidence:
Su
• Evidence should be clearly tagged to document where it was
l collected, by whom, and on what date.
y
• Co
Bag the Evidence:
B • After tagging, the evidence should be stored securely in a sealed
ot
storage location (e.g., an evidence locker) where it will remain
ll N
until it is needed for analysis or court proceedings.
rn e • Example:
• The chain of custody ensures that evidence is collected, documented, and stored in a way that
maintains its integrity for use in legal proceedings.
• Key steps include tagging, bagging, and securely storing the evidence.
• Maintaining a clear chain of custody is critical to ensuring that evidence is admissible in court and
free from contamination.
i bu
Rule 2: Accurate:
str
• Meaning:
D i
for
• The evidence must retain its integrity and not be altered from the time it was
collected. This helps ensure that the data or physical objects are reliable.
t
No
• Example:
• A hard drive image that is shown to have the same hash value as the original
a,
drive, confirming it has not been modified.
h
Na
Rule 3: Complete:
• Meaning:
•
jeet
All relevant parts of the evidence must be presented, including those that
ha
may support or contradict the case. Presenting only part of the evidence can
undermine the investigation.
b
Su
• Example:
•
l Logs from a computer system must be presented in their entirety, not just
Co
selectively chosen entries.
r C non-technical individuals.
fo • Example:
ll N
Rule 5: Admissible:
rn e • Meaning:
o
• Evidence must be permissible in court. Proper handling and maintaining the
C chain of custody can help ensure the evidence is admissible, but it doesn't
guarantee it.
• Example:
• Ensuring that digital evidence, like emails, is collected in a way that follows
legal standards so it can be presented in court.
on
• Searching for both existing and deleted files. Even when files are
erased.
uti
deleted, they often remain on the drive, with only the file pointers being
• Example:
tr i b
• is
A hard drive analysis reveals remnants of deleted files, allowing
D
for
recovery of critical evidence that could provide insight into the
incident.
t
No
Software Analysis:
a,
• Meaning:
h
Na
• This technique involves analyzing software, especially malware, to
understand its functionality, purpose, and origin.
• Key Focus:
jeet
ha
• Uncovering how malware operates and identifying clues that could
Su
determine who may be responsible for the malicious software.
l
Co
• Example:
SP
potential attribution.
CI S Network Analysis:
for • Meaning:
• Network analysis examines how a network was accessed, how it was
es traversed, and which systems were compromised during an incident.
ot • Key Focus:
ell N • Logs from systems and network devices are typically examined to track
rn
the movement of attackers through the network and uncover potential
C o • Example:
vulnerabilities.
• Investigative techniques such as media analysis, software analysis, and network analysis are
essential tools in digital forensics.
• Each method focuses on different aspects of the investigation: media analysis recovers deleted
data, software analysis decodes malicious software, and network analysis traces the attacker’s
movements through a compromised network.
• All techniques together help to form a comprehensive understanding of the incident and are critical
to securing evidence.
on
where the crime occurred.
• Example:
uti
•
tr i b
A hacker breaches a company’s systems and steals sensitive customer
data. Law enforcement takes over the investigation to pursue charges of
cybercrime.
D is
for
Civil Investigations:
• Definition:
t
No
• These involve disputes between individuals or organizations, and the
outcome typically results in fines or monetary penalties rather than criminal
a,
sentences.
• Driven by:
h
•
Na
The involved organizations, individuals, or their legal representatives.
• Example:
•
jeet
Two companies are involved in a legal dispute over intellectual property,
bha
and the court assigns financial damages to the losing party.
Su
Regulatory Investigations:
l
• Definition:
Co
• These investigations focus on violations of regulatory requirements
y
governing specific industries.
B • Driven by:
SP
• The relevant regulatory body overseeing the compliance of organizations.
CI S • Example:
• A company is investigated by a financial regulatory body for failing to
s
Administrative Investigations:
ote • Definition:
• These deal with internal violations of an organization’s policies or
ll N
procedures. The focus is on resolving organizational issues without
o
• Driven by:
C • Example:
• The organization itself.
str
indicate suspicious activities or potential threats.
• Reporting and Alerts:
D i
for
• The system generates reports and real-time alerts on
t
important security events, facilitating quick detection and
response to incidents.
No
• Correlation and Centralization:
h a,
Na
• SIEM systems correlate data from different systems to identify
et
potential security incidents that may not be apparent when
je
viewed in isolation.
ha
Benefits of SIEM:
b
Su
• Centralized Monitoring:
l
Co
• Provides a single pane of glass for monitoring security events
across an organization.
By • Real-Time Threat Detection:
ll N
standards and requirements.
• SIEM systems play a critical role in security operations by aggregating and analyzing log data from
multiple sources to detect, monitor, and respond to security threats.
• They enable centralized visibility, enhance incident response capabilities, and support compliance
efforts, making them essential for robust security operations.
on
• SIEM systems alert security analysts when suspicious activity is
ti
detected, allowing them to respond to potential incidents in real-
u
time.
tr i b
•
D is
Example: Analyzing login activity from different users to detect if
they share the same IP address, which could indicate a
for
compromised account.
Human and Process Integration: t
No
•
• Beyond technology, SIEM requires trained personnel to analyze
a,
alerts effectively and escalation procedures to handle incidents
h
Na
appropriately.
et
Key Capabilities of SIEM:
1.
j
Aggregation:
e
•
bha
Brings together logs from multiple sources across an organization
Su
under a unified platform.
2.
l
Normalization:
y Co
• Converts logs from different formats (e.g., time/date formats) into a
B standardized format.
SP
3. Deduplication:
for 4.
redundant data.
Correlation:
es
ot
• Identifies relationships between events that may indicate a security
ll N
issue (e.g., multiple failed login attempts followed by a successful
login).
rn e 5. Secure Storage:
• Operating Systems:
• Logs from Windows, Linux, and other OS.
t i on
Intrusion Prevention and Detection Systems (IPS/IDS):
i b u
r
•
Logs related to intrusion attempts and suspicious traffict patterns.
•
D is
t for
N o
h a,
t Na
je e
b ha
l Su
y Co
B
I SSP
r C
fo
es
ot
ell N
orn
C
• SIEM systems are integral to security operations, allowing organizations to collect, normalize, and
correlate logs from multiple sources to detect security incidents.
• Key functionalities like aggregation, secure storage, and correlation enable faster threat detection,
real-time alerts, and support for compliance requirements.
on
vulnerabilities and threat actors.
• Helps organizations move from reactive to proactive defense,
uti
strengthening their digital security posture.
tr i b
Threat Intelligence Sources:
D is
1. Vendor Trend Reports:
t f or
•
N omethods,
Reports published by security vendors detailing recent and
a ,
significant threats, common attack and known
ah
vulnerabilities.
2. Public Sector Reports (e.g., N
t and detailed guidance for handling and
US-CERT):
ealerts
•
je
Provides critical
mitigatinga
h current threats, particularly for infrastructure and
publicbsectors.
l SuSharing and Analysis Centers (ISACs):
C• o ISACs are sector-specific hubs where organizations can share
3. Information
CI S
for • Includes open-source threat intelligence platforms, government
C o •
external threat data, adding enhanced detection and alerting capabilities.
Allows SIEMs to correlate internal events with known threat data, helping
to identify suspicious activity more accurately.
Na
such as unauthorized data access or privilege misuse.
et
2. Hacked Privileged Accounts:
•
je
Monitors for abnormal actions performed by privileged
bha
accounts, indicating a potential compromise.
3.
Su
Brute-Force Attacks:
l
Co
• Identifies patterns of repeated access attempts and login
By 4.
failures as indicators of brute-force attacks.
General Anomaly Detection:
ll N
providing security teams with alerts before a breach progresses.
on
• Adaptation to Changes: Allows rapid detection and adaptation to
threats.
uti
changes in the environment, such as new vulnerabilities or emerging
S P• Amonitoring
SIEM, once set up and tuned, plays a pivotal role in the continuous
process by:
rn ell •
when suspicious activities are detected.
Supporting Compliance: Enabling continuous
C o monitoring for compliance requirements, including
record-keeping and audit readiness.
jeet
monitoring to focus on actionable alerts.
ha
Importance of Continuous Monitoring for a SIEM System:
•
b
Initial Setup: While the SIEM setup process can take months to
Su
complete due to complexities, the work doesn’t stop once it’s
l
Co
operational. Regular updates and monitoring are essential for
By •
optimal functioning.
Ongoing Adjustments: To maintain effectiveness, the SIEM must
on
threats.
2. Incident Response:
uti
•
tr i
Automates and streamlines the response process for
b
of security events.
D is
incidents, ensuring quick detection, response, and resolution
et
• SOAR tools are designed to integrate with other security technologies,
je
providing a unified approach to security management.
•
bha
Automation: SOAR uses automated workflows and responses based
Su
on established policies, which enable quicker and more consistent
l
incident handling.
y
•
Co
Machine Learning: Employs machine learning to assist with threat
B detection and to improve SOC efficiency, helping security teams
SP
continuously enhance their response tactics.
ell N resilience.
rn
• Consistent Threat Management: Automated workflows ensure
• SOAR combines compatible technologies to streamline threat management, incident response, and
operational automation.
• By consolidating data from diverse sources, automating workflows, and leveraging machine learning,
SOAR enhances SOC capabilities, improves incident response times, and enables more efficient and
consistent security operations.
on
software, applying security patches, and ensuring it meets baseline
standards.
uti
2. Baselining:
tr i b
s
• Definition: Baselining is creating a standard configuration for systems and
i
applications, defining the security and performance parameters each asset
D
for
must meet.
t
• Example: Establishing a baseline for a server OS that includes approved
No
software, specific configurations, and security settings. Baselines act as
reference points for compliance and change management.
3. Automation:
h a,
Na
• Definition: Automation within CM involves using tools and scripts to apply
et
configurations, manage updates, and track changes consistently and with
minimal human intervention.
je
ha
• Example: Automated patch management tools update systems as per the
baseline requirements, reducing the chances of human error and ensuring
b
Su
consistency.
l
CM Lifecycle and Processes:
Co
• Establish Baselines: Identify and set configurations and standards for systems and
By •
assets.
Provision Assets: Deploy systems and apply baseline configurations.
I SSP •
•
Monitor Changes: Continuously monitor systems to detect deviations from the baseline.
Update and Maintain: Apply updates and make necessary configuration adjustments to
fo • Audit and Document: Regularly audit systems against the baseline and maintain
ll N
• Improved Security: Consistent configurations reduce vulnerabilities and make it easier
rn e •
to detect unauthorized changes.
Operational Efficiency: Automation and standard baselines streamline the deployment,
C o •
maintenance, and troubleshooting of systems.
Compliance: Maintains alignment with industry regulations and organizational policies,
ensuring all systems meet required security and operational standards.
• Reduced Downtime: Standardized configurations help prevent compatibility issues and
configuration drift that could cause system failures.
a,
default credentials and applying strict access control
h
configurations aligned with the organization’s baseline.
Asset Inventory Database: Na
•
eet
The database should be updated each time an asset is added or
j
ha
removed to ensure the inventory remains current.
b
Su
• Importance: A current asset inventory helps track asset ownership,
l
status, and condition, facilitating timely patching, scanning, and
y Co
configuration compliance.
SP
database should reflect its version, deployment date, and
• An asset inventory is essential for tracking organizational assets and reducing vulnerabilities by
maintaining control over all hardware and software.
• Secure provisioning during asset deployment, coupled with an up-to-date inventory database,
supports asset management, providing visibility, accountability, and regular maintenance
throughout the asset life cycle.
Na
only what is required for operational purposes.
et
• Example: Disabling unused ports and services on network
je
devices as part of the deployment process.
ha
Automation in Provisioning:
b
•
l Su
Automated provisioning tools support consistency in configurations,
Co
especially in larger environments, reducing human error and saving
time.
By • Benefits: Automation ensures uniformity in device settings across
ll N
asset under management.
C o 3.
measures.
Document configuration: Record settings for reference, audits,
and troubleshooting.
4. Verify configuration: Use tools like credentialed vulnerability
scans to confirm compliance with configurations.
a,
rights or access within systems.
•
h
Objective: Ensures sensitive accounts are monitored and accessed
Na
securely, reducing the risk of misuse.
•
jeet
Example: Administrative accounts with access to core servers
ha
are only accessible to authorized personnel with multi-factor
bauthentication.
Su
Job Rotation:
l
Co
• Definition: Regularly rotating employees through different roles to
SP
• Objective: Reduces fraud by preventing employees from having
prolonged control over sensitive areas, encouraging cross-training.
• Foundational security operations concepts enforce secure, structured, and monitored access within
organizations.
• Principles like need to know, least privilege, and separation of duties prevent unauthorized data
access and misuse.
• PAM focuses on protecting privileged accounts, while job rotation helps deter fraud.
• SLAs formalize expectations between parties, enhancing accountability and service standards.
on
should be logged and monitored in detail.
•
ti
Example: An IT admin has a regular user account for daily tasks and a
u
Need to Know vs. Least Privilege:
tr b
separate privileged account used strictly for system maintenance.
i
•
D is
Need to Know: Restricts a user’s knowledge or access to only the data
for
necessary for their role.
•
t
Example: An HR employee can access employee records but cannot
No
view financial data.
a,
• Least Privilege: Limits a user’s actions and privileges to those required for their
specific duties.
h
•
Na
Example: A network technician can view network configurations but
Job Rotation:
jeet
cannot make system-wide changes.
•
bha
Definition: Periodically rotating employees through different roles to prevent
Su
prolonged control over sensitive functions.
•
l
Benefits:
y Co
• Fraud Deterrence: Reduces opportunity for fraudulent behavior.
SP
• Cross-Training: Prepares employees to cover multiple roles,
CI S •
preventing single points of failure.
Example: Employees in finance rotate through different audit
ot
• Definition: Legal contracts between a customer and vendor detailing
ll N
performance standards, response times, and other agreed-upon operational
specifics.
rn e • Key Elements:
C o •
•
Response Times: Define time frames for specific incident responses.
Performance Standards: Set benchmarks for acceptable service
quality and availability.
• Example: A cloud service provider agrees in an SLA to address critical
incidents within one hour.
• Foundational security concepts—PAM, need to know, least privilege, job rotation, and SLAs—
enhance security within an organization.
• PAM restricts and monitors high-access accounts to prevent misuse.
• Need to know and least privilege principles ensure access and actions are limited to job -specific
requirements, reducing exposure risk.
• Job rotation minimizes fraud potential and encourages skill development.
• SLAs provide structured agreements, establishing expectations for service quality and response.
Na
compatibility and data preservation.
et
Key Media Management Considerations:
•
je
Factors to Consider: Confidentiality, access speeds, portability,
ha
durability, media format, and data format.
b
Su
• Example - Confidentiality: Encryption algorithms should be
l evaluated for long-term use; strong cryptography today may be
ll N
• Inventory Management: Complete asset inventory is essential to track
• Media management is crucial for protecting and retaining data over time.
• With diverse storage media and durability requirements, managing assets effectively requires regular
inventory, careful consideration of MTBF, and data migration to maintain accessibility and security.
• Asset management practices are essential, covering hardware/software lifecycle, secure
configurations, and regulatory compliance, to minimize risks and optimize asset value.
a,
3. Response:
•
h
Confirm the incident, assemble the incident response team, and
Na
activate response protocols.
•
4. Mitigation:
jeet
Take initial steps to contain the incident and prevent further damage.
•
bha
Implement containment actions (e.g., isolating affected systems,
Su
blocking malicious IPs).
l
• Stop the incident from spreading and limit its impact on other systems.
Co
5. Reporting:
r C 6. Recovery:
es replacements.
ll N
7. Remediation:
rn e •
•
Identify and eliminate the root cause to prevent recurrence.
Update security controls, policies, or procedures as needed.
C o 8. Lessons Learned:
• Conduct a post-incident review to analyze the incident and response
effectiveness.
• Document improvements to refine future incident response and
resilience.
• The incident response process involves preparing for potential incidents, detecting threats, and
responding quickly to contain and mitigate impact.
• Post-incident, a thorough analysis and lessons learned help strengthen future response capabilities
and improve organizational resilience.
fo data.
ell N access.
rn
• Employee Error: Unintentional mistakes that compromise security.
• An event is a routine occurrence with no immediate threat, while an incident is an adverse event
requiring a structured response.
• Distinguishing between the two ensures resources are used efficiently, with incident response
reserved for cases that demand urgent security action and containment.
on
Response (IR Team):
• Objective: Activate the Incident Response team after detection.
u ti
•
tr b
Actions: Conduct an impact assessment to gauge the scale,iimpact,
and required resources or departments.
is
Mitigation (Containment):
fo rD
Objective: Limit the impact of the incident. t
•
N o
•
,
Actions: Focus on containing the issue to prevent further damage
aisolating
h
without necessarily resolving it (e.g., affected systems).
Reporting:
t Na
•
j
Objective: Communicate
ee incident status to stakeholders.
a updates during containment and designate a
Actions: Providehongoing
•
spokespersonu bto ensure message consistency.
S
ol to Normal):
Recovery (Return
C
•
B yObjective: Restore normal operations.
S P• Actions: Clean up, repair affected areas, and ensure systems return to
CIS
functional status.
or
Remediation (Prevention):
ll N
• Actions: Implement system improvements and fixes to mitigate similar
incidents in the future.
• The Incident Response Process involves structured steps starting with preparation, detecting
incidents, responding, containing the impact, and then moving to recovery and preventative
measures.
• Effective incident response relies on organized communication, clear roles, and continuous
improvement based on lessons learned to strengthen the organization’s security posture.
on
without user action.
•
t
Example: A worm infecting one device in a network, spreading to
u i
others autonomously.
Logic Bomb:
tr i b
•
D is
Characteristics: Executes malicious actions based on a specific
for
trigger condition in the code.
•
t
Example: Deletes files if a certain date or condition is met.
Trojan Horse:
No
•
h a,
Characteristics: Appears harmless but contains hidden malicious
Na
code.
• Example: An application disguised as a utility but steals data once
installed.
jeet
ha
Polymorphic Malware:
•
b
Characteristics: Changes its code or appearance to evade detection.
•
l Su
Example: Malware that alters its binary pattern to bypass antivirus
Co
scans.
By Ransomware:
• Characteristics: Encrypts files or systems and demands ransom for
I SSP •
the decryption key.
Example: Locks users out of critical systems until a ransom payment
r C is made.
fo Rootkit:
es
ot
• Characteristics: Conceals malicious tools or processes, often giving
ll N
attackers hidden access.
• Example: A rootkit that embeds itself in a system kernel, hiding its
rn e activities.
C o Zero-Day:
• Characteristics: Newly discovered malware without known detection
signatures.
• Example: Malware exploiting an undisclosed vulnerability, making it
undetectable by current security measures.
• Malware encompasses a range of harmful software types, each with unique behaviors and impacts.
• Understanding specific types, like viruses, worms, and ransomware, helps in identifying preventive
and remedial actions.
• Emerging malware like polymorphic and zero-day variants require adaptive and proactive security
measures to counter evolving threats effectively.
on
• Botnet • Found in documents like Excel, uses simple code that can automate malicious
• Boot Sector Infector actions.
Multipartite:
uti
b
•
• Hoaxes/Pranks •
tr i
Spreads through multiple vectors (e.g., Stuxnet spreading via USB then targeting
•
•
Logic Bomb
Stealth
systems).
D is
for
• Polymorphic:
• Ransomware • Changes form (file name, size, structure) each time it replicates to avoid
detection.
t
No
• Rootkit
• Trojan Horse:
a,
• Data Diddler • Disguised as legitimate software but contains hidden malicious code.
• Zero-Day
h
Na
• Botnet:
• Network of infected devices under an attacker's control, often used in DDoS
•
j et
attacks or spamming.
e
Boot Sector Infector:
•
bha
Installs in the boot sector of a hard drive, making it hard to detect and remove.
Su
• Hoaxes/Pranks:
•
l Not actual software, typically social engineering attempts causing harm or
Co
amusement.
By • Logic Bomb:
• Code that activates when certain conditions are met (e.g., deletion of files if a
SP
user is no longer employed).
CI S • Stealth Malware:
• Actively hides its presence, disabling security measures on the infected system.
for • Ransomware:
ot
data exfiltration.
ll N
• Rootkit:
Collection of tools to hide malware presence, typically provides ongoing control
e
•
rn
to attacker.
C o • Data Diddler:
• Makes subtle changes to data over time, often used in financial fraud (e.g.,
salami attacks).
• Zero-Day:
• Newly discovered, no existing detection signatures; dangerous due to lack of
awareness.
• Malware encompasses a variety of types, each with specific characteristics and potential impacts on
system security.
• Understanding the distinctions among viruses, worms, Trojans, ransomware, rootkits, and zero-day
attacks allows for better detection, prevention, and response strategies, supporting comprehensive
defense in an evolving threat landscape.
on
• Continuous monitoring and log analysis across the
organization’s infrastructure.
uti
• Auditing Services:
tr i b
is
rD
• Regular or ad-hoc audits to ensure compliance with
t fo
regulatory standards and internal policies.
• Penetration Testing: o
Nvulnerabilities through
•
a ,
External testers attempt to find
simulated attacks, oftenhperformed annually or biannually.
t Na
•
je e and response to evolving malware
Antivirus and Malware Management:
• a through continuously updated protection.
Managed detection
hoften
b
threats,
u
l SServices:
•
C o Specialized in analyzing incidents post-breach, recovering
Forensic
B y •
data, and assessing the impact of an attack.
P
S Importance of Third-Party Security Services:
I S
C • Cost-Effectiveness: Reduces the need for in-house infrastructure
for
es and specialized staff for every security task.
ot
ll N
• Expertise: Access to specialized skills and the latest technology
• Third-party provided security services allow organizations to enhance their security posture by
leveraging external expertise and infrastructure.
• Services like SIEM, penetration testing, and forensic analysis offer flexibility, scalability, and access
to advanced skills, supporting robust security without extensive internal resource allocation.
• This approach is integral in cloud environments where specialized, ongoing security support is often
required.
B yC
to guide behavior and protocol.
CIS
Objective: Educate users on recognizing suspicious files,
or
avoiding risky websites, and following safe email practices.
ell N
orn
C
• Anti-malware software is essential in safeguarding systems from malicious software, utilizing both
signature-based and heuristic detection to identify and neutralize threats.
• While technology is critical, robust policies and regular user training are equally important in
creating an effective defense against malware outbreaks.
• Heuristic detection offers a broader protection spectrum, while user awareness minimizes human-
initiated infections, making anti-malware efforts more comprehensive and resilient.
et
2. Two Methods:
je
1. Static scanning: examines code structure.
Su
environment.
l
Co
3. Pros: Can detect new, unknown malware.
ot
Change Detection (File Integrity Monitoring):
ll N
• Common in Linux systems; checks for modifications in key system files.
• Effective malware prevention combines user training, policies, and multiple technical detection
approaches.
• Signature-based and heuristic-based methods target known and unknown threats, respectively,
while activity monitoring and change detection add layers of defense.
• Regular updates to both detection tools and user training are critical to maintaining protection
against evolving threats.
y
•
Co
Network Risk Scoring: Assigns risk scores to network activities,
B helping prioritize security responses based on detected risk levels.
SP
• Automation of Security Tasks: Automates repetitive security tasks,
ot
attempts.
ll N
• Evasive Malware: Detects malware that uses advanced
• ML and AI-based tools offer enhanced security capabilities through predictive modeling and
automation.
• In security, they support threat detection, risk scoring, and cybercrime response by learning from
past data, analyzing patterns, and enabling quicker response to threats.
• This application of ML/AI transforms security processes, enhancing both system protection and
efficiency in managing complex security challenges.
a,
critical operations.
h
Na
• Threat Intelligence: Important to stay updated on new vulnerabilities,
et
often sourced from internal intelligence, vendor updates, and news feeds.
je
Determining Patch Levels:
ha
• Agent-Based Monitoring:
b
Su
• Agent installed on host: Checks software versions against a
l
Co
master database and initiates updates if needed.
By
• Agentless Monitoring:
• External monitoring tool connects to each device and assesses
r C • Passive Detection:
es
ot
patch levels from network traffic.
N
ell
Method Description
rn
Software on each host, auto-
Agent
C o updates
on
• Process: Uses tools like Windows Server Update Services
(WSUS) for consistent updates.
uti
tr i b
D is
t for
Deployment
N o
Description
, ideal for critical systems
aDirect,
h
Na
Manual
ha
Automated
updates
b
l Su
y Co
B
I SSP
r C
fo
es
ot
ell N
orn
C
str
3. Approval:
•
D i
Multiple Stages: Based on the importance of the change.
•
t for
Key Personnel: System owner, stakeholders, and possibly a Change
No
Advisory Board (CAB) for major changes.
• Flexible Levels: Less review for minor changes; high review for costly or
high-impact changes.
h a,
Na
4. Build and Test:
et
• Testing Environment: Conduct development and testing in a controlled
e
test environment.
j
ha
• Types of Testing: Includes regression and validation testing to ensure
b
functionality and stability.
Su
5. Notification:
l
Co
• Prior to Implementation: Inform key stakeholders of the impending
change to allow for input or readiness.
By
6. Implement:
SP
• Execution: Apply the tested and approved change in the live
CI S 7. Validation:
environment.
ll N
• Documentation: Critical to keep detailed records at each step.
on
Inform key stakeholders before
Notification
implementation
fo for version
Validation
with management and stakeholders
t
otracking
N
Complete documentation
Documentation
a,
and baseline
h
Na
jeet
bha
l Su
y Co
B
I SSP
r C
fo
es
ot
ell N
orn
C
on
• Description: Allows systems to remain operational, often at
reduced capacity, despite component or system failure.
u ti
Usage Example: In network switches or firewalls, abfail-open
•
tr i
is
mode allows traffic to continue flowing in case of a failure.
•
o r D less secure.
Goal: Ensures availability over security, minimizing
downtime but potentially leaving the fsystem
o t
, N or restricts access in
2. Fail-Secure (Fail-Closed):
Description: Shuts downasystems
•
response to a failure,a h
t Ndoor with a fail-closed
prioritizing security over availability.
• Usage Example:
jeeof a power failure.
A lock will remain
ell N • Goal: Protects human life and safety above all else.
orn
C
• Failure Modes are critical components of recovery strategies in environments where system
resilience, security, and human safety need to be preserved during failures.
• Understanding the appropriate failure mode for each system—fail-soft, fail-secure, or fail-safe—
ensures that systems are designed to handle failures effectively based on the organization’s
priorities, whether that’s maintaining operational continuity, securing assets, or safeguarding
people.
on
• Benefit: Efficient storage, faster backups.
• Limitation: Slower restoration due to multiple backup sets.
u t i
2. Differential Backup:
tr i b
Benefit: Faster restoration than incremental, as onlyis
• Backs up changes since the last full backup.
rD
• two sets (full +
•
differential) are needed.
Limitation: Larger storage requirement over
t f otime.
o
,N
3. Full Backup:
•
a
Benefit: Easiest and fastesthfor full restoration.
Backs up all data regardless of changes.
je
ana
4. Mirror Backup:
Creates h
•
b exact copy of data with no compression.
u Highaccess
•
l S
Benefit: Direct to data copy; near-instantaneous restoration.
Backup C
•
o Limitation: storage space requirement.
By Rotations:
S P• Purpose: Establish a schedule for tape use, retention, and rotation to ensure
reliable and organized data recovery.
ell
for data retention.
• Backup Storage Strategies ensure that data is securely stored and recoverable, balancing storage
needs, backup and restore times, and data integrity checks.
• Incremental and differential backups are efficient methods, while full and mirror backups provide
complete data snapshots.
• Backup rotations ensure data freshness and organization, and CRC checksums verify data integrity
across all backup types, enhancing reliability and security.
for
• Pros: High availability, scalable, low-cost for storage and
recovery.
t
•
No
Cons: Dependent on internet connection; potential privacy and
security concerns.
h a,
Na
Additional Backup Storage Strategies:
et
• Electronic Vaulting:
•
je
Automated tape management system (e.g., tape jukebox)
ha
controlled by robotic arms.
b
Su
• Purpose: Efficiently manage multiple tapes; suited for large data
l storage needs.
y Co
• Benefit: Streamlines backup process with automated scheduling.
SP
• Definition: Techniques for managing backup tapes to optimize
• Backup storage strategies vary by location and function. Onsite storage allows easy access but is
vulnerable to local incidents.
• Offsite storage provides a geographic safety net, ideal for disaster recovery, while cloud storage
offers scalable, high-availability solutions but depends on network access.
• Electronic vaulting automates tape management, and tape rotation strategies (like GFS and FIFO)
help maintain organized, secure, and accessible backup systems, ensuring backup reliability and
recovery efficiency.
on
• Function: Data is split across multiple drives, allowing for faster
read and write speeds.
uti
•
tr i b
Disadvantage: No redundancy—if one disk fails, all data is lost.
•
is
Use Case: Ideal for non-critical systems where speed is
D
for
prioritized.
2. RAID 1 (Mirroring):
t
• No
Function: Data is duplicated across multiple disks, providing
redundancy.
h a,
Na
• Advantage: Offers high data availability—if one disk fails, data
et
remains accessible.
•
je
Use Case: Suitable for systems where data reliability is crucial.
ha
RAID 5 (ParitybProtection):
3.
u Uses parity to store data redundantly across three or
SFunction:
•
l
y C• o more drives.
PB
Advantage: Balances speed and redundancy, with cost-effective
storage.
ll N
(redundancy) by striping and mirroring data across at least four
rn e drives.
• RAID (Redundant Array of Independent Disks) provides enhanced speed or redundancy by using
multiple disks together in a system.
• Key RAID types include RAID 0 (striping for speed), RAID 1 (mirroring for reliability), RAID 5 (parity for
balance of performance and cost), and RAID 10 (combining mirroring and striping for high speed and
availability).
• RAID setups support various business needs, from improving data access speed to ensuring high
availability and data recovery.
on
incoming requests.
• Redundancy:
uti
•
tr i b
Consists of a primary system actively handling all work, with
secondary systems in standby.
D is
•
t for
If the primary system fails, a secondary system takes over
No
seamlessly.
a,
• No performance drop if primary fails, as the secondary
h
system is configured identically to the primary.
Na
et
Primary By-product:
je
ha
• Both clustering and redundancy aim for High Availability (HA) to
b
minimize downtime from planned/unplanned outages or component
failures.
l Su
y Co
B
I SSP
r C
fo
es
ot
ell N
orn
C
• Clustering and Redundancy are recovery strategies that enhance high availability (HA).
• Clustering distributes workload among multiple active systems, reducing performance
proportionally if one fails.
• Redundancy, by contrast, designates a primary system for handling tasks, with secondary systems
on standby, resulting in no performance loss if the primary fails.
• Both approaches are fundamental in ensuring continuous operations, with clustering focusing on
shared workload and redundancy on seamless backup.
on
• Lacks computer hardware, data, and people.
• Cost: Moderate ($$)
uti
•
r i b
Recovery Time: Days, as basic setup is in place, but systems
t
need to be added.
D is
for
• Hot Site:
•
t
Fully equipped with servers, network equipment; lacks only
data and personnel.
No
• Cost: High ($$$)
h a,
Na
• Recovery Time: Hours, as most infrastructure is already in
et
place.
• Mobile Site:
je
•
bha
A hot site on wheels, often in a shipping container; flexible for
Su
relocation.
l Cost: High ($$$)
Co
•
• Recovery Time: Days to hours, depending on transportation
By time to the needed location.
orn
C
• Geographic Disparity ensures that recovery sites remain unaffected by local disruptions at the
primary site.
• Internal vs. external recovery sites balance control with convenience, and options like reciprocal
agreements, resource capacity agreements, and multiple processing sites offer additional
recovery support.
• Metrics like RPO and RTO help define acceptable data loss and recovery time, guiding strategic
decisions around recovery and continuity plans.
aje
Disaster Recovery Plan (DRP):
h
S ubof essential IT systems and infrastructure.
• Focus: Recovery
• BCM is a comprehensive framework for maintaining BCP and DRP plans to handle disruptions.
• BCP focuses on sustaining critical business processes, while DRP is dedicated to recovering vital
technology and infrastructure needed to resume business operations.
• Together, they ensure organizational resilience against unforeseen disruptions.
et
recovery in case of an incident.
je
ha
6. Ensure Testing, Training, and Exercises
b
1. Testing: Validates the efficacy of recovery steps.
l Su
2. Training: Prepares personnel for plan activation.
y Co
3. Exercises: Identifies gaps in the plan to enhance
B preparedness.
I SSP7. Maintenance
r C • Keep the plan current by regularly updating it to align with
fo system and organizational changes.
s
ote External Dependencies:
ell N • Consider critical suppliers, like fuel delivery services for generators,
• The BCP/DRP process emphasizes continuity and rapid recovery from disruptions. BCP keeps
operations functioning, while DRP focuses on returning systems to normal.
• Key steps include policy creation, impact analysis, controls, contingency strategies, and rigorous
testing.
• Additionally, addressing external dependencies ensures that resources essential to recovery are
accessible during a disaster.
on
• MTD (Maximum Tolerable 2. Shorter RTOs lead to faster system recovery but increase costs.
Downtime): Total acceptable 3.
ti
Cost Implications: The shorter the RTO, the higher the investment in
u
downtime for business resources and technology to ensure rapid recovery.
tr i b
continuity. 3. Work Recovery Time (WRT):
is
r Dissues.
1. Time required to confirm system/data functionality post-restoration.
2.
fo
Ensures that operations can fully resume without
t for thorough testing.
3.
o
Component of MTD, highlighting the need
4. Maximum Tolerable Downtime (MTD):
,N
Total time a business processacan
1.
a h be down before severe impact.
tN
2. Formula: MTD = RTO + WRT
3.
e
Key metric in deciding disaster declaration timing.
h aje
Example Scenario (Bank Disaster):
•
u b RPO would accept a day’s data loss with daily backups.
Bank with a 24-hour
S
l loss tolerance (e.g., few seconds), continuous replication and
streamo
• For minimal
• BMTDy Crepresents the ultimate threshold before significant operational loss and
backups are necessary.
S PRelationships
reputational damage.
CIS
for • Timeline: BAU -> Disaster -> RPO -> RTO -> WRT -> MTD
tes • Each component illustrates steps from initial data loss to full business continuity
o
restoration.
ell N
orn
C
• RPO, RTO, WRT, and MTD are essential metrics in continuity planning, each defining
recovery objectives and potential downtime impact. RPO and RTO have direct cost
implications—the lower these objectives, the higher the cost of maintaining them. MTD
(comprising RTO + WRT) serves as a critical threshold for decision-making in disaster
recovery, ensuring the business can continue to operate with minimal interruption.
u ti
resource allocation for the recovery of the most critical functions.
Process Steps
r i b
t Criticality:
is
rD
1. Determine Mission/Business Processes and Recovery
• Identify key business processes.
fo
t estimate tolerable
• Determine impacts of disruptiono and
downtime (using RPO, RTO,,WRT, N MTD metrics).
h a
2. a
Identify Resource Requirements:
•
e t N to restore critical business
Assess what is needed
h aje ensures
operations (e.g., staff, data, equipment, facilities).
•
u b dependencies.realistic recovery efforts by
This evaluation
l S
identifying
3. o
C Recovery Priorities for System Resources:
Identify
y
B • Link system resources to essential processes and establish
S P dependency-based priorities.
CI S • Set recovery order based on business impact and
for dependency structure.
• The Business Impact Analysis (BIA) is a structured process to identify critical business functions and
assess the potential impacts of disruptions.
• It defines essential recovery times (RPO, RTO, WRT, and MTD) and prioritizes resources and
processes for efficient recovery.
• This proactive planning enables an organization to protect vital assets and maintain operations
during and after a disaster.
on
• Communication: Internal and • Decision made by CEO or Business Continuity Board/Committee.
external, involving all relevant
ti
• Clear criteria are necessary to differentiate between incidents and disasters.
u
stakeholders. Incident Assessment Prior to Declaration:
tr i b
• Training & Awareness: Essential
for effective disaster response. the MTD.
D s
• The incident response team evaluates severity and the likelihood of meeting
i
for
• If MTD is at risk, the Disaster Recovery Plan (DRP) is activated.
t
No
Personnel Involved:
• The Disaster Response Team includes members from:
• Executive Management
h a,
Na
• Legal
•
• IT
jeet
Human Resources
•
bha
Public Relations
•
l Su Security
Co
• Team members should be trained in response protocols and participate in
regular DR tests.
By Training and Awareness:
I SSP • Regular training, at least annually, is crucial for ensuring effective disaster
recovery.
r C • Prepares the team for quick and accurate response to real disaster situations.
fo Lessons Learned:
es
ot
• Post-disaster analysis to evaluate what worked, what needs improvement,
and plan adjustments.
• The Disaster Response Process activates the Disaster Recovery Plan (DRP) when an incident
threatens to exceed MTD.
• Declaring a disaster involves an assessment of impact, engaging a trained response team, and
executing a well-communicated response.
• Training and reviewing lessons learned improve future resilience, while effective internal and external
communication ensures coordinated management during a crisis.
B yC
• After initial testing and adjustments, critical systems are restored,
SP
ensuring smooth operation and reliability at the main site.
CI S
for
tes
o
ell N
orn
C
• Restoration order in disaster recovery is guided by the BIA, which prioritizes critical systems.
• Dependency charts clarify restoration order by mapping component dependencies.
• At a DR site, critical systems are restored first, while at the primary site, least critical systems are
restored first to test stability, followed by critical systems to ensure a seamless transition back to
normal operations.
h
• Impact: Paper-based;ajeno effect on systems.
Parallel Test:Su
b
C olVerifies plan effectiveness on backup systems without
B y
• Purpose:
impacting production.
rn
production.
• BCP and DRP testing is essential to validate recovery plans. Tests progress from low-impact (Read-
through, Walkthrough) to high-impact (Parallel, Full-interruption).
• Full-interruption tests are the most conclusive but require management approval due to the impact
on production.
• Each test type ensures preparedness across different disaster scenarios and validates various
aspects of the DRP, contributing to the overall resilience of the organization.
i bu
3. Survival of Business:
st r
D ofi
operations. fo r
• Objective: Maintain business continuity and avoid cessation
o t
N functions to sustain
• Focus on preserving the essential business
,
ha
business viability post-disaster.
Additional Considerations: Na
• Personnel Safety andje et Concerns: Extend beyond the
a and managing situations under duress.
Security
hsafety
b
workplace to travel
uOrganizations should provide security, medical, and
l S
• Travel Safety:
C
or
employee safety.
s f
o te
ell N
orn
C
• The primary goals of Business Continuity Management are to ensure people's safety, minimize
damage, and ensure business survival.
• Safety of personnel is the highest priority in BCM, followed by actions that protect physical and
business assets.
• Addressing security concerns, including during travel or duress situations, is essential for a
comprehensive BCM approach.