Security Plus SY0-701 Domain 1 Handout
Security Plus SY0-701 Domain 1 Handout
Domain 1
Coverage of every topic in
the official exam syllabus!
Managerial
Policies and procedures, administrative controls defined by an
organizations security policy.
Use planning and assessment methods to review the organization’s
ability to reduce and manage risk.
Operational
Help ensure that the day-to-day operations of an organization comply
with their overall security. Primarily implemented and executed by people
instead of systems.
Categories of security controls EXAMPLES
Managerial policies
ASSETS
D O M A I N 1 : CONTROLS
Security Controls
Security measures for countering and
minimizing loss or unavailability of
services or apps due to vulnerabilities
D O M A I N 1 : SECURITY CONTROLS
Security Controls
The terms safeguards and
countermeasures may seem
to be used interchangeably
D O M A I N 1 : SECURITY CONTROLS
Security Controls
safeguards are proactive (reduce
likelihood of occurrence)
countermeasures are reactive
(reduce impact after occurrence)
D O M A I N 1 : SECURITY CONTROLS
Control Types
Deterrent. Deployed to discourage violation of
security policies.
Preventive. Deployed to thwart or stop
unwanted or unauthorized activity from occurring.
Detective. Deployed to discover or detect
unwanted or unauthorized activity.
Compensating. Provides options to other existing
controls to aid in enforcement of security policies.
D O M A I N 1 : SECURITY CONTROLS
Control Types
Corrective. modifies the environment to return
systems to normal after an unwanted or
unauthorized activity has occurred.
Directive. direct, confine, or control the actions of
subjects to force or encourage compliance with
security policies.
CONTROL TYPES EXAMPLES
Preventive
deployed to stop unwanted or unauthorized activity from occurring,
EXAMPLES: fences, locks, biometrics, mantraps, alarm systems, job
rotation, data classification, penetration testing, access control methods
Deterrent
deployed to discourage the violation of security policies. A deterrent
control picks up where prevention leaves off.
Directive
direct, confine, or control the actions of subjects to force or
encourage compliance with security policies..
Compensating
deployed to provide options to other existing controls to aid in the
enforcement and support of a security policy.
EXAMPLES: security policy, personnel supervision, monitoring,
and work task procedures
Control overlap One control, multiple types/functions
Overlapping Functions
Security controls are designed to work together, and their
functions often overlap.
EXAMPLE: a security camera system is both deterrent (deterring unwanted
entry) and detective (recording potential security incidents for later review).
Context Matters
The classification of a control can depend on how it's
implemented and the specific risk it's addressing.
EXAMPLE: an access control list can be primarily preventive if it blocks
unauthorized access or detective if it mainly logs access for later investigation.
Control overlap One control, multiple types/functions
Focus on keywords
Exams often use specific words or phrases to hint at the
control type.
KNOW
BY HEART!
D O M A I N 1 : SECURITY & RISK MANAGEMENT
C onfidentiality
I ntegrity
A vailability
D O M A I N 1 : SECURITY & RISK MANAGEMENT
1
C onfidentiality
2 3
I ntegrity A vailability
D O M A I N 1 : SECURITY & RISK MANAGEMENT
C onfidentiality
Access controls help ensure that only
authorized subjects can access objects
D O M A I N 1 : GENERAL SECURITY CONCEPTS
I ntegrity
Ensures that data or system configurations
are not modified without authorization
D O M A I N 1 : GENERAL SECURITY CONCEPTS
A vailability
Authorized requests for objects must
be granted to subjects within a
reasonable amount of time
Non-repudiation
Non-repudiation is the guarantee that no one can deny a transaction.
Authentication
user/service proves identity with some type of credentials, such as a username
and password.
Authorization
authenticated users are granted access to resources based on the roles and/or
permissions assigned to their identity.
Accounting
methods that track user activity and records these activity in logs.
Tracks user activity and resource access as part of the audit trail
identification and authentication
“
A key point about the MAC model is that every
object and every subject has one or more labels.
These labels are predefined, and the system
determines access based on assigned labels.
ATTRIBUTE-BASED
ACCESS CONTROL
access is restricted based on an attribute
on the account, such as department,
location, or functional designation.
For example, admins may require user accounts have
the Legal department attribute to view contracts
SUBJECTS AND OBJECTS IN ACCESS CONTROL
Control gap
a discrepancy between the security measures an organization
should have in place versus controls actually in place.
Has largely replaced trust but verify and its network perimeter strategy.
Supported by defense in depth, that advises a layered approach to security.
Zero Trust Security
addresses the limitations of the legacy
network perimeter-based security model.
treats user identity as the control plane
assumes compromise / breach in verifying
every request. no entity is trusted by default
Adaptive Identity
changes the way that the system asks a user to authenticate based on
context of the request. EXAMPLES: location, device, app, risk
Subject/System
A subject is a user who wishes to access a resource.
A system is a non-human entity, often the device used by the user, to access the
resource.
Policy Administrator
Industry
PKI
Compliance
Control Plane
Threat Data Plane Identity
Intelligence Management
Untrusted Policy Enforcement Trusted
Activity Logs
Point
SIEM System
Subject and Enterprise
Supporting System Resource Supporting
Components Components
A quick tour of
Conditional Access
Protects against
Access control Tailgating (slipping in on someone else's badge)
vestibule Piggybacking (like tailgating, but with bad intent)
Unauthorized entry of any kind
FENCES
Efficacy of fences by height
3-4 feet
deters the casual trespasser Fence is a DETERRENT control
PIDAS is a DETECTIVE control
6-7 feet
too difficult to climb easily
may block vision (providing additional security)
Pressure
designed to detect changes in pressure on a surface or in a specific
area, such as a person walking on a floor or stepping on a mat.
used in access control systems to ensure that only authorized individuals can enter
Microwave
uses microwave technology to detect movement within a specific area.
often used with other types of sensors to reduce false alarms
Ultrasonic
emits high-frequency sound waves and measure the time it takes for the
sound waves to bounce back after hitting an object or surface.
commonly used in parking assistance, robotic navigation, and intrusion detection
Deception and disruption
Change Management
the policy outlining the procedures for processing changes
helps reduce risk associated with changes, including outages or
weakened security from unauthorized changes.
Approval process: ensures that every proposed change is properly reviewed and
cleared by management before it takes place. Ensure alignment across teams
Ownership: clearly defines who is responsible for each change by designating a
primary owner who will be the key decisionmaker and sponsor of the change.
Stakeholder analysis: identifies all the individuals and groups within the
organization and outside the organization that might be affected by the change.
Enables team to contact and coordinate with all relevant stakeholders
Impact analysis: review of potential impacts of a change, including side effects.
Ensures team considers impact to systems and stakeholders
Testing: confirms that the change will work as expected by validating it in a test
environment before production rollout.
Test results should be captured in the change approval request
BUSINESS PROCESSES impacting security operation
Backout plan: provides detailed step-by-step sequence that the team should
follow to roll back if the change goes wrong.
Ensures systems can be quickly restored to an operational state
Maintenance windows: Standing window of time during which changes can be
implemented that minimizes impact to business, often outside of business hours.
For critical services, may be defined in customer contracts
Legacy applications
Dependencies
TECHNICAL IMPLICATIONS
Application restarts
putting controls around risky activities, such as application and
service restarts.
Legacy applications use case for private or hybrid cloud
modifications to legacy apps that may not support some
changes, such as component/service version updates.
Dependencies
tracking dependencies between systems and services to identify
downstream effects of current and future changes.
documentation
The process of documentation current state of
and changes to the operating environment.
You cannot fully secure a system or service for which you do not
have a true picture of current state!
Version control
A formal process used to track the current versions of
software code and system/application configurations.
Key management
management of cryptographic keys in a cryptosystem.
Operational considerations include dealing with the generation, exchange,
storage, use, crypto-shredding (destruction) and replacement of keys.
Design considerations include cryptographic protocol design, key servers,
user procedures, and other relevant protocols.
Online vs. offline CA. Online CA is always running, offline CA is kept offline
except for specific issuance and renewal operations.
Offline is best practice for your root CA.
Stapling. a method used with OCSP, which allows a web server to provide
information on the validity of its own certificate.
Done by the web server essentially downloading the OCSP response from
the certificate vendor in advance and providing it to browsers.
Pinning. a method designed to mitigate the use of fraudulent certificates.
Once a public key or certificate has been seen for a specific host, that key
or certificate is pinned to the host.
Should a different key or certificate be seen for that host, that might
indicate an issue with a fraudulent certificate.
Public key infrastructure (pki) CONCEPTS
Certificate chaining
Refers to the fact that certificates are handled by a chain of trust.
You purchase a digital certificate from a certificate authority (CA), so you
trust that CA’s certificate.
In turn, that CA trusts a root certificate.
Trust model
A model of how different certificate authorities trust each other and how
their clients will trust certificates from other certification authorities.
The four main types of trust models that are used with PKI are
bridge, hierarchical, hybrid, and mesh.
Public key infrastructure (pki)
Key escrow
Addresses the possibility that a cryptographic key may be lost.
The concern is usually with symmetric keys or with the private key in
asymmetric cryptography.
If that occurs, then there is no way to get the key back, and the user cannot
decrypt messages.
Organizations establish key escrows to enable recovery of lost keys.
CERTIFICATE FORMATS
Distinguished encoding rules DER NO Secure remote access (Linux and network)
Privacy enhanced mail PEM YES Secure copy to Linux/Unix
Personal information
PFX YES Supports storage of all certificates in path
exchange
Base64-encoded CER NO Storage of a single certificate.
PKCS#12 standard P12 YES Supports storage of all certificates in path
Cryptographic Message Supports storage of all certificates in path.
P7B NO
Syntax Standard KCS #12 is the successor to Microsoft's "PFX“.
Certificates, certificate
authority & root of trust
Types of certificates
Wildcard Supports multiple FQDNs in the same domain
Can be used for a domain and a subdomain. For example:
In the contoso.com domain, there are two servers called web and mail.
The wildcard certificate is *.contoso.com and, when installed, it would work for the
Fully Qualified Domain Names (FQDNs) for both of these.
A wildcard can be used for multiple servers in the same domain, saving costs.
Machine/computer
A computer or machine certificate is used to identify a computer within a domain.
Email
Allow users to digitally sign their emails to verify their identity through the attestation
of a trusted third party known as a certificate authority (CA).
Allow users to encrypt the entire contents (messages, attachments, etc.)
Third-party
A certificate issued by a widely trusted external provider such as GoDaddy or Digicert.
Preferred for TLS on public-facing services, such as company website.
Types of certificates
Subject alternative name (SAN)
an extension to the X. 509 specification that allows users to specify additional
host names for a single SSL certificate.
Is standard practice for SSL certificates, and it's on its way to replacing the use
of the common name.
You can also insert other information into a SAN certificate, such as an IP address.
Enables support for FQDNs from multiple domains in a single certificate.
Expiration
certificates are valid for a limited period from the date of issuance, as
specified on the certificate.
Current industry guidance on maximum certificate lifetime from widely
trusted issuing authorities (like Digicert) is currently 1 year (398 days).
LEVEL (Scope) of encryption
LOW operates at the individual file level, meaning
File files could have unique encryption keys.
Useful for files containing sensitive info
Encryption
e.g. financial info, PHI, PII
Volume
Represents a logical division of a storage device.
Represents a single accessible storage area.
Can span multiple partitions or disks.
FDE
Full Disk Encryption is built into the Windows
operating system.
Full Disk Encryption Bitlocker is an implementation of FDE.
Bitlocker protects disks, volumes, and partitions
SED
Self-Encrypting Drive
encryption on a SED that’s built into the
hardware of the drive itself.
anything that’s written to that drive is
automatically stored in encrypted form.
Encrypting Records
Many relational databases support row or column
level encryption.
Row-level encrypts an entire record, column-level
encrypts specific fields within the record.
Commonly implemented within the database tier, but
also possible in code of frontend applications
DATA PROTECTION IN RELATIONAL DATABASES
Database Encryption
Transparent data encryption is full database-level
encryption (database files, logs, backups)
Requires no changes in application and comes with
virtually no performance impact
Asymmetric
Distribution of symmetric bulk encryption keys (shared key)
Identity authentication via digital signatures and certificates
Non-repudiation services and key agreement
Key exchange in asymmetric cryptography
Franco sends a message to Maria,
requesting her public key
Block cipher
is a method of encrypting text in which a cryptographic key and
algorithm are applied to a block of data (for example, 64 contiguous
bits) at once as a group rather than to one bit at a time.
Transposition cipher
rearranges order of plaintext letters according to a specific rule.
the message itself is left unchanged, just the order is scrambled.
Examples include Rail Fence and Columnar Transposition
CRYPTOGRAPHIC KEY LENGTH
Asymmetric
RSA (Rivest-Shamir-Adleman), the primary public key
EXAMPLES cryptography algorithm used on the Internet.
It supports key sizes of 1024, 2048, and 4096 bits.
NIST recommends minimum key length of 2048
CRYPTOGRAPHIC KEY LENGTH
Symmetric
Advanced Encryption Standard (AES) is the go-to
EXAMPLES algorithm for the US Federal gov’t.
It supports key sizes of 128, 192, and 256 bits.
256-bit key is recommended for quantum resistance
CRYPTOGRAPHIC KEY LENGTH
A certification authority (CA) can validate a certificates static key with a certificate
revocation list (CRL) or using the Online Certificate Status Protocol (OCSP).
CRYPTOGRAPHIC KEY LENGTH
Ephemeral Keys
Ephemeral keys have very short lifetimes and are re-created for each
session.
An ephemeral key pair includes a private ephemeral key and a public
ephemeral key.
Systems use these key pairs for a single session and then discard them.
Some versions of Diffie-Hellman use ephemeral keys.
1.4 TOOLS
Trusted device.
Hardware Security
Module (HSM)
a physical computing device that safeguards and
manages digital keys, performs encryption and
decryption functions for digital signatures, strong
authentication and other cryptographic functions.
Like a TPM, but are often removable or external devices
1.4 TOOLS
Data minimization
only necessary data required to fulfill the
specific purpose should be collected
Data masking
when only partial data is left in a data field.
for example, a credit card may be shown as
**** **** **** 1234
Commonly implemented within the database tier, but
also possible in code of frontend applications
hashing vs encryption
How is hashing different from encryption?
Encryption
Encryption is a two-way function; what is encrypted can be decrypted with
the proper key.
Hash functions
Verification of digital signatures
Generation of pseudo-random numbers
Integrity services (data integrity and authenticity)
HASH FUNCTION REQUIREMENTS
Good hash functions have five requirements:
1. They must allow input of any length.
2. Provide fixed-length output.
3. Make it relatively easy to compute the hash
function for any input.
4. Provide one-way functionality.
5. Must be collision free.
differences between algorithm types
Feature / Algorithm HASH SYMMETRIC ASYMMETRIC
NUMBER OF KEYS 0 1 2+
RECOMMENDED KEY 128 bits (more for some
256 bits 2048 bits
LENGTH (NIST) sensitive data types)
COMMON EXAMPLE SHA AES RSA
Digital Signatures
Digital signatures are similar in concept to handwritten signatures on printed
documents that identify individuals, but they provide more security benefits.
is an encrypted hash of a message, encrypted with the sender’s private key.
in a signed email scenario, it provides three key benefits:
Authentication. This positively identifies the sender of the email.
ownership of a digital signature secret key is bound to a specific user
Non-repudiation. The sender cannot later deny sending the message.
This is sometimes required with online transactions
Integrity. provides assurances that the message has not been modified or
corrupted.
Recipients know that the message was not altered in transit
Limitations
Common scenarios for specific cryptographic choices.
Speed. Application and hardware must be able to keep pace with the selected
encryption.
Size. If encrypting 16 bytes of data with a block cipher, the encrypted information
is also 16 bytes. This overhead must be considered in resource planning
Need enough memory, storage, and network to support the result
Weak keys. Larger keys are generally stronger and thus more difficult to break.
Find balance between security, compatibility, and capacity
Time. encryption and hashing take time. Larger amounts of data and asymmetric
encryption take more time than small data and symmetric encryption.
Selections need to match time constraints in transactions
Longevity. consider how long encryption algorithms selected can be used.
Older algorithms will generally be retired sooner
1 . 4 : CRYPTOGRAPHIC CONCEPTS
Limitations
Common scenarios for specific cryptographic choices.
Predictability. cryptography relies on randomization. Random number generation
that can’t be easily predicted is crucial for any type of cryptography.
Reuse. using the same key is commonly seen in a number of encryption
mechanisms. If an attacker gains access to the key, they can decrypt data
encrypted with it.
some IoT devices may not allow a key change
Entropy. a measure of the randomness or diversity of a data-generating function.
Data with full entropy is completely random with no meaningful patterns.
Resource vs security constraints. the more secure the encryption used and higher
the key length, the more processing power and memory the server will need.
requires balance between algorithms and hardware selections
INSIDE CLOUD
THANKS
F O R W A T C H I N G!