Chapter 1: Security Governance Through Principles & Policies (WIP)
Understand the CIA Triad elements of confidentiality, integrity & availability
- Confidentiality is the principle that objects are not disclosed to unauthorised subjects.
- Integrity is the principle that objects retain their veracity and are intentionally modified by only authorised subjects.
- Availability is the principle that authorised subjects are granted timely & uninterrupted access to objects.
- Know why these are important, the mechanisms that support them, the attacks that focus on each, and the effective countermeasures.
Understand the process of authentication
- Authentication is the process of verifying or testing that a claimed identity is valid.
- Authentication requires information from the subject that must exactly correspond to the identity indicated.
Know how authorisation fits into a security plan
- Once a subject is authenticated, its access must be authorised.
- The process of authorisation ensures that the requested activity or object access is possible given the rights & privileges assigned to the authenticated identity.
Understand security governance
- Security governance is the collection of practices related to supporting, defining & directing the security efforts of an organisation.
Be able to explain the auditing process
- Auditing, or monitoring, is the programmatic means by which subjects are held accountable for their actions while authenticated on a system.
- Auditing is also the process by which unauthorised or abnormal activities are detected on a system.
- Auditing is needed to:
- detect malicious actions by subjects
- detect attempted intrusions
- detect system failures
- reconstruct events
- provide evidence for prosecution
- provide problem reports & analysis
Understand the importance of accountability
- An organisation’s security policy can be properly enforced only if accountability is in place: security can be maintained only if subjects are held accountable for their actions.
- Effective accountability relies on the capability to prove a subject’s identity and track their actions.
Be able to explain non-repudiation
- Non-repudiation ensures that the subject of an activity or event cannot deny that the event occurred
- It prevents a subject from claiming not to have sent a message, not to have performed an action, or not to have been the cause of an event.
Understand security management planning
- Security managemetnt is based on three types of plans:
- A strategic plan is a long-term plan that is fairly stable. It defines the organisation’s goals, missions & objectives.
- The tactical plan is a mid-term plan developed to provide more details on accomplishing the goals set forth in the strategic plan.
- Operational plans are short-term, highly-detailed plans based on the strategic & tactical plans.
Know the elements of a formalised security structure
- To create a comprehensive security plan, you need the following items in place:
- Security policy
- Standards
- Baselines
- Guidelines
- Procedures
- Such documentation clearly states security requirements and creates due diligence on the part of the responsible parties.
Understand key security roles
- The primary security roles are:
- security manager
- organisational owner
- upper management
- security professional
- user
- data owner
- data custodian
- auditor
- By creating a security role hierarchy, you limit risk overall.
Know how to implement security awareness training
- Before actual training can take place ,awareness of security as a recognised entity must be created for users.
- Once this is accomplished, training (teaching employees to perform their work tasks and comply with the security policy) can begin.
- All new employees require some level of training so they will be able to comply with all standards, guidelines & procedures mandated by the security policy.
- Education is a more detailed endeavour where students/users learn much more than they actually need to know to perform their work tasks.
- Education is most often associated with users pursuing certification or seeking job promotion.
Know how layering simplifies security
- Layering is the use of multiple controls in series.
- Using a multi-layered solution allows for numerous controls to guard against threats.
Be able to explain the concept of abstraction
- Abstraction is used to collect similar elements into groups, classes or roles that are assigned security controls, restrictions or permissions as a collective.
- It adds efficiency to carrying out a security plan.
Understand data hiding
- Data hiding, as the name suggests, is preventing data from being discovered or accessed by a subject.
- It is often a key element in security controls as well as in programming.
Understand the need for encryption
- Encryption is the art & science of hiding the meaning or intent of a communication from unintended recipients.
- It can take many forms and be applied to every time of electronic communication, including text, audio & video files, as well as programs themselves.
- Encryption is an important element in security controls, especially in regard to the transmission of data between systems.
Know why and how data is classified (TODO)
- Data is classified to simplify the process of assigning security controls to groups of objects rather than individual objects.
- The two common classification schemes are government/military and commercial business/private sector.
- Know the five levels of government classification and the four levels of commercial classification.
- The seven major steps or phases in the implementation of a classification scheme are:
- TODO
- TODO
- TODO
- TODO
- TODO
- TODO
- TODO
Understand the importance of declassification
- Declassification is required once an asset no longer warrants the protection of its currently-assigned classification or sensitivity level.
Know the basics of COBIT (TODO)
- Control Objectives for Information & Related Technologies (COBIT) is a security concept infrastructure used to organise the complex security solutions of compliance.
Know the basics of threat modelling (TODO)
- Threat modelling is the security process where potential threats are identified, categorised & analysed.
- Threat modelling can be performed as a proactive measure during design & development, or as a a reactive measure once a product has been deployed.
- Key concepts include:
- assets
- attackers
- software
- STRIDE
- PASTA
- Trike
- VAST
- diagramming
- reduction/decomposing
- DREAD
Understand the need to apply risk-based management concepts to the supply chain
- Applying risk-based management concepts to the supply chain is a means to ensure a more robust and successful security strategy in organisations of all sizes.
- When purchases and acquisitions are made without security considerations, the risks inherent in those products remain throughout their deployment life span.