CCSP Exam Cram DOMAIN 5 Handout
CCSP Exam Cram DOMAIN 5 Handout
Domain 5
Coverage of every topic in
the official exam syllabus!
1 2 3 4 5 6
One lesson for each exam domain
Cloud Security
Operations
Exam essentials - 5
How to ensure clustered host Access control for local and
and guest OS availability remote system/facility access
Differences in containerization, serverless, Remote access methods (SSH, RDP), jump
resource schedule, dynamic optimization. boxes, bastion hosts, physical access security.
A virtual network that consists of cloud resources, where the VMs for one
company are isolated from the resources of another company.
Separate VPCs can be isolated using public and private networks.
Patch Management
5. Cloud Security Operations
Operate Physical and Logical Infrastructure
5.2 for Cloud Environment
Hardware monitoring
(e.g., disk, central processing unit (CPU), fan speed, temperature)
Management plane
(e.g., scheduling, orchestration, maintenance)
5. Cloud Security Operations
Operate Physical and Logical Infrastructure
5.2 for Cloud Environment
Remote Desktop Protocol (RDP): the native remote access protocol for Windows
operating systems.
Secure Shell (SSH): the native remote access protocol for Linux operating
systems, and common for remote management of network devices.
RDP and SSH both support encryption and MFA
Secure Terminal/Console-Based Access: a system for secure local access.
A KVM (keyboard video mouse) system with access controls
Jumpboxes: a bastion host at the boundary of lower and higher security zones.
CSPs offer services for this: Azure Bastion, AWS Transit Gateway
Virtual Clients: software tools that allow remote connection to a VM for use as if
it is your local machine.
e.g. Virtual Desktop Infrastructure (VDI) for contractors
Solution features
These solutions typically offer:
-Temporary elevation of privilege
-Approval gates
-An audit trail when privilege is activated
-An access review process (to avoid permissions sprawl)
CSSP EXAM CRAM
THE COMPLETE COURSE
Privileged Access
Management (PAM)
All other IP address ranges, except the APIPA 169.254.x.x, are public addresses.
Secure Network Design
where traffic moves laterally between servers within
a data center.
north-south traffic moves outside of the data center.
aka “DMZ”:
VLAN
Many public clouds offer a virtual private cloud (VPC) which is essentially a
sandboxed area within the larger public cloud dedicated to a specific customer.
VPCs take the form of a dedicated VLAN for a specific user organization, which
means other cloud tenants are blocked from accessing resources in the VPC.
To create a secure connection to your VPC, you can connect a VPN using
L2TP/IPsec using a VPN gateway (aka transit gateway).
Network peering is another method for connecting virtual networks in the cloud.
Dynamic Host With proper DHCP logs, a SIEM can leverage this
data to track an IP address to a specific endpoint
Configuration
Protocol Some hypervisors offer a feature to limit which
network cards are eligible to perform DHCP offer
Patch Management
Bastion host A dedicated host for secure admin access
CSPs offer services for this: Azure Bastion, AWS Transit Gateway
Network security controls
Basic familiarity with functionality and stengths of each
-Honeypot
-Vulnerability assessments
5. Cloud Security Operations
Operate Physical and Logical Infrastructure
5.2 for Cloud Environment
Patch Management
Hardening is the configuration of a machine into a secure state
through application of a configuration baseline.
Baselines can be applied to a single VM image, or to a VM template
created that is then used to deploy all VMs.
A hardened VM image may be customer-defined, CPS-defined, or
from a third party, often available through a cloud marketplace.
These guides advise updates being in place, unneeded services are disabled,
and the operating system is hardened to minimize risk of security breach.
BENCHMARKS/SECURE CONFIGURATION GUIDES
Benchmarks describe configuration baselines and
best practices for securely configuring a system.
Operating Systems: Most vendors, such as Microsoft, have guides
that detail the best practices for installing their operating systems.
OS benchmarks are also available from CIS and others
Application Server: Vendors produce guides on how to configure
application servers, such as email servers or database servers, to
make them less vulnerable to attack.
Network Infrastructure Devices: companies like Cisco produce
network devices and offer benchmarks for secure configuration.
DISA STIGs. The U.S. Defense Information Systems Agency (DISA) produces
baseline documents known as Security Technical Implementation Guides (STIGs).
CIS benchmarks. The Center for Internet Security (CIS) publishes baseline guides
for a variety of operating systems, applications, and devices, which incorporate
many security best practices.
Platforms like Microsoft Azure and Amazon Web Services (AWS) have their own
tools, such as Azure Resource Manager (ARM) and AWS Cloud Formation.
These tools make managing Microsoft and AWS cloud resources easier,
supporting Infrastructure-as-Code.
Guest OS availability
Once a VM is created in IaaS, the CSP no longer has direct control over the OS.
Customer can use baselines, backups, and cloud storage features to provide
resiliency of the guest OS.
e.g. vendor supplied OS baseline templates, cloud storage redundancy
(zone or geo-redundancy) features
Backup and recovery
In virtualized cloud infrastructure, this might involve the use of snapshots.
CSPs offer backup features for VMs in the IaaS model
Availability of guest operating system
Guest OS availability in the context of the cloud (IaaS)
Resiliency
Resiliency is achieved by architecting systems to handle failures from the outset
rather than needing to be recovered.
For example, virtualization host clusters with live migration provide resiliency
Resiliency of the physical hypervisor cluster, networks, and
storage are responsibility of the CSP
5. Cloud Security Operations
Operate Physical and Logical Infrastructure
5.2 for Cloud Environment
Hardware monitoring
5.2.10 (e.g., disk, central processing unit (CPU), fan speed, temperature)
Management plane
(e.g., scheduling, orchestration, maintenance)
Hardware monitoring
Physical hardware is necessary to provide all the services
that enable the virtualization that enables cloud computing.
Hardware monitoring should monitor: CPU, RAM, fans, disk
drives, and network components
Environmental: Computing components are not designed for
use in very hot, humid, or wet environments.
HVAC, temperature, and humidity monitoring are important.
Hardware monitoring
(e.g., disk, central processing unit (CPU), fan speed, temperature)
Management plane
(e.g., scheduling, orchestration, maintenance)
CONFIGURE HOST & GUEST BACKUP & RESTORE
Hardware monitoring
(e.g., disk, central processing unit (CPU), fan speed, temperature)
Configuration management
Availability management
Capacity management
OPERATIONAL CONTROLS AND STANDARDS
Change Control
refers to the process of evaluating a change request within an organization
and deciding if it should go ahead.
requests are sent to the Change Advisory Board (CAB) to ensure that it is
beneficial to the company.
requires changes to be requested, approved, tested, and documented.
Change Control
refers to the process of evaluating a change request within an organization
and deciding if it should go ahead.
requests are sent to the Change Advisory Board (CAB) to ensure that it is
beneficial to the company.
For the exam, remember these are associated with BCDR and availability
Information security management
The goal of information security management is to ensure a
consistent organizational approach to managing security risks
ISO/IEC 27001
A global standard for information security management that helps organizations
protect their data from threats.
ISO/IEC 27701
Extends the ISMS guidance in 27001 to manage risks related to privacy, by
implementing and managing a privacy information management system (PIMS)
Containment,
Detection Post-incident
Preparation eradication,
and analysis activity
recovery
1 Preparation
Where incident response plans are written, and
configurations documented.
2 Identification
Determining whether or not an organization has been
breached. Is it really an incident?
4 Eradication
Once affected systems are identified, coordinated
isolation or shutdown, rebuild, and notifications.
5 Recovery
Root cause is addressed and time to return to normal
operations is estimated and executed.
The primary change is the frequency of releases due to the increased speed of
development activities in continuous integration/continuous delivery (CI/CD).
Release scheduling may require coordination with customers and CSP.
Release manager is responsible for a number of checks, including ensuring change
requests and approvals are complete, before approving final release gate.
Changes that impact data exposure may require Security team
Some of the release process is often automated, but manual processes may be
involved, such as updating documentation and writing release notes.
The increased automation and pace of release in Agile and CI/CD typical to
the cloud necessitates automated security testing and policy controls.
deployment management
In more mature organizations, the CD in CI/CD stands for continuous
deployment, which further/fully automates the release process.
Once a developer has written their code and checked it in, automated testing is
triggered, and if all tests pass, code is integrated and deployed automatically
Less manual effort means lower cost, fewer mistakes, faster releases.
Even organizations with continuous deployment may require some deployment
management processes to deal with deployments that cannot be automated
Processes for new software and infrastructure should be documented
Containerization (managed Kubernetes) is common in mature organizations
supporting more frequent deployment in public cloud environments
DevSecOps
Fully automated deployment requires greater coordination with and
integration of information security throughout the development process
Service level management
Service level management focuses on the organization’s requirements
for a service, as defined in a service level agreement (SLA).
SLAs are like a contract focused on measurable outcomes of the service being
provided
Should include clear metrics that define ‘availability’ for a service
SLAs require routine monitoring for enforcement, and this typically relies on metrics
designed to indicate whether the service level is being met
Cloud infrastructure decisions should be made with the SLA in mind
Defining the levels of service is usually up to the cloud service provider (CSP) in
public cloud environments.
Customer should monitor their CSPs compliance with the SLAs promised with
various services, including ensuring credits for SLA failures are received.
availability management
A service may be “up“, that is to say the service is reachable
but not available - meaning it cannot be used.
Availability and uptime are often used synonymously, but there is an important
distinction: Availability means the specific service is up AND usable.
AuthN and AuthZ must work, and requests must be fulfilled
Many of the same concerns that an organization would consider in business
continuity and disaster recovery apply in availability management
BCDR plans aim to quickly restore service availability in adverse events
Other concerns and requirements, such as data residency or the use of encryption,
can complicate availability.
Customer must configure services to meet their requirements
For example, if a service has 100 active users but only 50 licenses available, that
means the service is over capacity and 50 users will be denied service.
Capacity issues can be physical (infrastructure) or logical (e.g. licenses)
Measured service is one of the core elements of cloud computing, so metrics that
illustrate demand for the service are relatively easy to identify
Responsibility for capacity management belongs to CSP at the platform level, but
belongs to customer for deployed apps and services
Customer must choose appropriate service tiers, design app to scale
Evidence management
ISO/IEC 27037:2012
Guide for collecting, identifying, and preserving electronic evidence
ISO/IEC 27041:2015
Guide for incident investigation
ISO/IEC 27042:2015
Guide for digital evidence analysis.
ISO/IEC 27043:2015
Guide for incident investigation principles and processes
GUIDANCE ON FORENSIC DATA COLLECTION
Hiring an outside forensic expert is the best path for most organizations
Free guidance in
with relevant parties such as the CSP, internal legal counsel, and
law enforcement for guidance and requirements.
Do you know where the data is hosted? And laws of countries it’s hosted in?
Many cloud services store copies of data in multiple locations
What rights for forensic data collection are listed in your CSP contract?
If it requires CSP cooperation, what is their response SLA?
Cloud data should be stored and have data sovereignty in region stored.
Many countries have laws requiring businesses to store
data within their borders.
The US introduced the Clarifying Lawful Overseas Use of Data (CLOUD) Act in 2018 due
to the problems that FBI faced in forcing Microsoft to hand over data stored in Ireland.
Aids in evidence collection in investigation of serious crimes
In 2019, the US and the UK signed a data-sharing agreement to give law enforcement
agencies in each country faster access to evidence held by cloud service providers.
Verifying audit and forensic data collection rights with your CSP to ensure you
understand your rights and their legal obligations before you sign contracts is critical.
Data residency and data sovereignty
On premises vs cloud more challenging in the cloud
Disk aka hard drive. Was the storage media itself damaged?
Random-access memory (RAM). Volatile memory used to run
applications.
Swap/Pagefile. used for running applications when RAM is exhausted.
OS (operating system). Was there corruption of data associated with
the OS or the applications?
Device. When the police are taking evidence from laptops, desktops,
and mobile devices, they take a complete system image.
The original image is kept intact, installed on another computer,
hashed, then analyzed to find evidence of any criminal activity.
ACQUISITION Applies to IaaS
Data lineage is the process of tracking flow of data over time, showing
where the data originated, how it has changed, and its ultimate destination.
PRESERVATION
Vendors Regulators
Partners
Incident management
Vulnerability assessments
NETWORK SECURITY
Software based firewalls that you might install on your own hardware.
Provide flexibility to place firewalls anywhere you’d like in your organization.
On servers and workstations, you can run a host-based firewall.
This is based on the interaction of a user that focuses on their identity and the
data that they would normally access on a normal day.
It tracks the devices that the user normally uses and the servers that they
normally visit.
SIEMs can normalize incoming data to ensure that the data from a
variety of sources is presented consistently.
SIEM
Logging, storage, and analysis of data events
SIEM
Log collection and analysis with a SIEM
SIEM has built-in log collector tooling that can collect information from both the
syslog server and multiple other servers. An agent is placed on the device that can
collect log information, parse and restructure data, and pass to SIEM for aggregation.
Ingestion may be with via an agent, syslog, or API
Can correlate and aggregate events so that duplicates are filtered and a better
understanding network events is achieved to help identify potential attacks.
Can capture packets and analyze them to identify threats as soon as they
reach your network, providing immediate alert to security team if desired.
The SIEM system collects a massive amount of data from various sources.
May include network devices, IDM, MDM, CASB, XDR, and more
via API Usage alerts,
IDaaS connector events, etc CASB
XDR IaaS
1
SQL
Network: This log file can identify the IP and MAC addresses of devices that
are attached to your network. Usually sent to a central syslog server
NIDS/NIPS can be important in identifying threats and anomalies from these.
log files from a proxy server can reveal who’s visiting malicious sites.
The collective insight may be useful in stopping DDoS attack
Web: web servers log many types of information about the web requests, so
evidence of potential threats and attacks will be visible here.
information collected about each web session: IP address request, Date and
time, HTTP method, such as GET/POST, Browser used, and HTTP Status code.
400 series HTTP response codes are client-side errors
500 series HTTP response codes are server-side errors
These logs must be fed to a SIEM, IDS/IPS or other system to analysis this data
LOG FILES
These files exist on client and server systems. Sending these to a SIEM can help
establish a central audit trail and visibility into the scope of an attack.
DNS: contains virtually all DNS server-level activity, such as zone transfer, DNS
server errors, DNS caching, and DNSSEC.
DNS query logging often disabled by default due to volume.
Authentication: information about login events, logging success or failure.
multiple sources authenticating log files in a domain environment, including
RADIUS, Active Directory, and cloud providers Azure Active Directory.
LOG FILES VoIP phones are embedded systems that must be secured
Preparation
Detection
Preparation
and analysis
Containment,
Detection
Preparation eradication,
and analysis
recovery
Containment,
Detection
Preparation eradication,
and analysis
recovery
Containment,
Detection
Preparation eradication,
and analysis
recovery
Containment,
Detection
Preparation eradication,
and analysis
recovery
Containment,
Detection
Preparation eradication,
and analysis
recovery
Containment,
Detection Post-incident
Preparation eradication,
and analysis activity
recovery
Containment,
Detection Post-incident
Preparation eradication,
and analysis activity
recovery
Containment,
Detection Post-incident
Preparation eradication,
and analysis activity
recovery
THANKS
F O R W A T C H I N G!