SY0-071-Module 5 Powerpoint Slides
SY0-071-Module 5 Powerpoint Slides
0 Security Program
Management and Oversight
CompTIA Security+ SY0-701
Topics
• Elements of Effective Security Governance
• Elements of the Risk Management Process
• Third-party Risk Assessment and Management
• Effective Security Compliance
• Audits and Assessments
• Security Awareness Practices
•
Elements of •
IT Governance
IT Management
Effective • Guidelines, Policies, Standards, Procedures
Security • External Considerations
•
Governance Monitoring and Revision
• Roles and Responsibilities for Systems and Data
What is IT Governance?
USA
UK
EU
HQ
Japan
India
Guidelines
• Voluntary
• Recommendations
• Based on best practice
• Typically industry-wide
Policies
• Organization-specific requirements
• Enforceable
• Common types include:
• Acceptable use policy (AUP)
• Information security policies
• Business continuity
• Disaster recovery
• Incident response
• Software development lifecycle (SDLC)
• Change management
Standards
• Broadly-accepted specifications
• Designed to maximize interoperability
• Examples:
• Password
• Access control
• Physical security
• Encryption
Procedures
• Organization-specific
• Task-oriented
• Step-by-step
• Usually published as a Standard
Operating Procedure (SOP)
• Examples:
• Change management
• Onboarding/offboarding
• Playbooks/Run books
External Considerations
• IT governance ensures that organizations comply with relevant laws, regulations,
and industry standards pertaining to IT operations
• IT governance includes policies and procedures to address data privacy,
information security, intellectual property rights, and other legal and regulatory
obligations
• In addition to your internal organizational policies, you must also ensure you are
in compliance with external requirements including:
• Industry-specific (health, financial, legal, public utilities)
• Local/regional
• National
• Global
• Work with your legal department to ensure your organization stays in compliance
Monitoring and Revision
Owner • Typically the head of the department that uses the data
• Concerned with risk and appropriate access to data
• Determines who can access data
Controller • Determines the purpose of any personal data and the means of processing it
• May be governed by statutory obligation
Processor • Processes any data that the data controller gives them
• Cannot change the purpose or means by which data is used
Custodian • Manages the actual data
• Implements access control per the owner’s requirements
• Manages databases, servers, backups, and networks
Steward • Concerned with the meaning of data and the correct usage of data
• Doesn’t care who uses the data so long as they use it correctly
Elements of • Risk Management
the Risk • Risk Assessment
Management • Risk Response
•
Process Business Impact Analysis
What is Risk?
Identify
Monitor Assess
Apply
Controls
Before You Start
• Before you can analyze your risk, you need to know what you have to protect
• You will need a full inventory of all your IT assets including:
• Device make and model, configurations, locations, network connections, running
services and installed software
Risk Assessment
• The process of identifying security risks and assessing the threat they pose
• Includes risk identification, risk analysis, and risk response
• Threats must be evaluated in the context of the impact they will have to
system and data confidentiality, integrity, and availability
• The ultimate purpose of IT risk assessment is to mitigate risks
Qualitative Risk Assessment
• Subjective assessment
• Assigns relative probability and impact to a risk
• Can be measured on various scales:
• High, Medium, Low Impact
• 1 - 10
Probability
Qualitative Risk Assessment Example
On a scale of 1 – 5, with 5 being the highest
Phishing 5 4 20
Supply Chain
2 5 10
Compromise
Malicious
1 5 5
Insider
Quantitative Risk Assessment
• Objective assessment
• Assigns a monetary value to risk
• Uses a formula:
SLE x ARO = ALE
• Single Loss Expectancy (SLE) - how much one incident will cost
• SLE = Asset Value (AV) x Exposure Factor (EF)
• AV = How much revenue the asset brings in or the cost to replace it
• EF = What percentage of the AV is lost if there is an incident
• Annual Rate of Occurrence (ARO) - how often the incident is expected to happen
over a year
• If less than one year, can be amortized over several years
• Annual Loss Expectancy (ALE) - how much this risk will cost us annually
• Allows you to more concretely justify priority and remediation expense
• You can determine if a control is more expensive than an asset
Quantitative Risk Assessment Example
1. A hard drive fails every three years - ARO = 0.34
2. The cost to buy a new hard drive is $300
3. It will require 10 hours to restore the OS and software to the new hard disk
4. It will require a further 4 hours to restore the database from the last
backup to the new hard disk
5. Assume the EF = 1(100%)
6. The recovery person earns $10/hour
• SLE: $440
• Hard cost (replace drive) = $300 + Soft cost (labor) = (10 + 4)hours x $10/hr = $140
7. Calculate the SLE $440, ARO 1/3, and ALE 440/3 = ~$146.67
8. What is the closest approximate cost of this replacement and recovery
operation per year?
Slightly more than $146
Quantitative Risk Assessment Example
1. A hard drive fails every three years - ARO = 0.34
2. The cost to buy a new hard drive is $300
3. It will require 10 hours to restore the OS and software to the new hard disk
4. It will require a further 4 hours to restore the database from the last
backup to the new hard disk
5. Assume the EF = 1(100%)
6. The recovery person earns $10/hour
• SLE: $440
• Hard cost (replace drive) = $300 + Soft cost (labor) = (10 + 4)hours x $10/hr = $140
7. Calculate the SLE $440, ARO 1/3, and ALE 440/3 = ~$146.67
8. What is the closest approximate cost of this replacement and recovery
operation per year?
Slightly more than $146
“The Line” and Residual Risk
• All risks “above the line” are worth mitigating
• Worth the time, effort and cost
• All risks “below the line” are not worth mitigating
• Too costly, too unlikely to materialize
• These risks are called “residual risk”
• You can cover them all with a good backup/disaster recovery strategy or insurance
or insurance
Risk Response
How will you manage your risk?
• Avoid
• Stop doing the risky thing
• Get rid of the risky asset
• Mitigate
• Reduce the impact in case something happens
• Transfer
• Make someone else responsible
• Buy insurance
• Accept
• Realize the risk could happen
• but do nothing about it
• Reject
• Deny that the risk even exists
• (very bad strategy)
Risk Response Example
• Note: In this case, they tried to transfer the risk but couldn’t
• They don’t reject the risk - they realize it could happen - they’re just not
going to do anything about it - if they get caught, they’re ok with paying
the fine
Strategies for Re-assessing Risk
• You want to reduce the cost of your annual cyber insurance policy by
removing the coverage for ransomware attacks.
• Which of the following analysis elements are you most likely to use in
making this decision?
• SLE
• ARO
• ALE
Question #2
• You want to reduce the cost of your annual cyber insurance policy by
removing the coverage for ransomware attacks.
• Which of the following analysis elements are you most likely to use in
making this decision?
• SLE
• ARO
• ALE
Question #3
• What information do you need before you can start performing risk
analysis?
• A full inventory of all your IT assets
Question #5
• What will contain:
• Ranked and ordered information on the likelihood and potential impact of
disasters that may affect business processes and systems
• A list of residual risks that need to be managed after mitigating controls have
been implemented
• Risk register
Question #6
• What is the formula to calculate the total loss expected per year due
to a threat targeting an asset?
• SLE x ARO
Question #7
Supply chain analysis How secure and reliable is the supply chain behind your vendors?
Questionnaires
• AKA vendor risk management questionnaire, third-party risk
assessment questionnaire, or vendor risk assessment questionnaire
• Designed to help your organization identify potential weaknesses
among your third-party vendors and partners that could result in a
data breach, data leak or other type of cyber attack.
• Can include sections such as:
• Information security and privacy
• Physical and data center security
• Web application security
• Infrastructure security
Third-party Penetration Testing
• AKA external penetration testing
• A cybersecurity practice in which an
external firm or individual accesses the
security system of the company
• The objective is to identify weaknesses
and vulnerabilities
• The pentester will provide repeatable
methods, evidence of compromise, and
recommendations for remediation
• In addition to Rules of Engagement, the
pentest team should sign an NDA to
help protect your sensitive and
proprietary information
Supply Chain Analysis
• Supply chain analysis is the process of evaluating the security and risk posture of
the suppliers and partners in a business network
• You must understanding roles and responsibilities of managing risk when doing
business with fourth parties
• Evaluate the riskiest or most critical fourth/Nth parties and focus efforts there
• Understand how the organization’s third, fourth and Nth parties conduct ongoing
monitoring of their third parties
• Develop an automated, data-driven approach that enables assessment of fourth/Nth
parties in a more real-time manner
• Data transparency that reflects supplier risk is key to keeping your supply chain
moving as the threat of disruption grows
• Proactive, ongoing monitoring and risk due diligence can inform your source-to-
pay decisions to enable greater agility and resilience
Supply Chain Example
Supply Chain Analysis Steps
1. Identify all fourth parties
• Maintain a central fourth-party inventory
• Determine the significance of each fourth party
2. Establish a trusted relationship with the OEM and authorized resellers
3. Request documentation and certification of the hardware from the OEM or authorized
resellers
4. Inspect the software/hardware components for any signs of tampering, such as
mismatched labels, serial numbers, or components
5. Test the components for functionality, performance, and security
6. Implement a tracking system to monitor the components throughout their lifecycle
7. Reporting any suspicious or counterfeit components to the OEM and law enforcement
agencies
8. Maintain a backup plan and exit strategy
Counterfeit Hardware
• Counterfeit hardware is hardware that is built or modified without the
authorization of the original equipment manufacturer (OEM)
• It can pose serious risks to network quality, performance, safety, and
reliability
• Counterfeit hardware can also contain malicious components that can
compromise the security of the network and the data that flows through it
• To address the risks associated with procuring counterfeit hardware, a
company should conduct a thorough analysis of the supply chain
• the network of entities involved in the production, distribution, and delivery of the
hardware
• By analyzing the supply chain, the company can:
• verify the origin, authenticity, and integrity of the hardware
• identify any potential sources of counterfeit or tampered-with products
Agreement Types
Type Description
Service-level Agreement (SLA) • A document that outlines a commitment between a service provider
and a client
• Includes details of the service, the standards the provider must adhere
to, and the metrics to measure the performance
Memorandum of Agreement • A legal document describing a business partnership between two
(MOA) parties that have agreed to cooperate to meet an agreed objective or
complete a project
• Lays out the agreed terms and outlines the steps to reach the desired
goal of the agreement
• Typically used when money is involved
Memorandum of Understanding Describes each party's point of view about a project before entering into it
(MOU)
Non-disclosure Agreement (NDA) • A legally binding contract that establishes a confidential relationship
• Parties that sign agree that they will not disclose confidential
information to others
Agreement Types (cont’d)
Type Description
Master Service Agreement (MSA) • A contract that lays out a framework of general terms and conditions
between two parties in an ongoing, working relationship
• Can save time for ongoing related projects or tasks
• The parties only need to negotiate the terms once, at the beginning
of the business relationship
Work Order (WO) / • Defines the current project
Statement of Work (SOW) • Includes specifications like pricing, deadlines, and expected output
• If there's an MSA, the SOW will be short—often one page—making it
much easier for the parties to agree upon.
Business Partners Agreement (BPA) • A legal document that dictates how a small for-profit business will
operate under two or more people
• Establishes rules for the business operations, ownership stakes,
financials, responsibilities, and decision-making strategies of each
partner
Service-Level Agreement (SLA)
• Internal
• Private
• Pull together data to make decisions within the organization
• External
• Offer information that specifically relates to what the clients, sponsors, or
partners need to know
• This data is more focused on their specific needs, such as client goals, ad
budget spending, and success rates
• Don’t waste anyone’s time by offering information they are not interested in
Consequences of Noncompliance
• Fines
• Monetary penalties
• Sanctions
• Penalties that may include fines, restrictions, orders to compensate customers, freezing or
seizing of assets, etc.
• Reputational damage
• Loss or harm that results from a negative shift in stakeholder or public perceptions of an
organization
• Can affect financial capital, social capital, market share, or shareholder value
• Loss of license
• The organization can lose its license to operate in a certain industry, region, or service type
• Contractual impacts
• Your contract could specify financial or other penalties for non-compliance
Privacy Terminology
Term Description
Data Subject An “identified or identifiable natural person”—a living individual with privacy
rights that must be fulfilled
Data Controller Collects the data, and controls the procedures and purpose of data usage
Example: a company with a website that collects customer data
Data Processor • Processes any data that the data controller gives them
• Does not own the data that they process nor do they control it
• Is not able to change the purpose and the means in which the data is used
• Example: Google Analytics processes data for various organizations
Data ownership Any personal information a data controller might collect remains the property
of the subject (person it is about)
Privacy Terminology (cont’d)
Term Description
Data inventory and retention • A comprehensive catalog of all the data in an enterprise system
• Data retention guidelines are a key feature of data privacy laws
Right to be forgotten • The right to have private information about a person be removed from
Internet searches and other directories under some circumstances
• Recently updated as “right to erasure”
Annual Privacy Notice • A clear and conspicuous notice to customers that accurately reflects your
privacy policies and practices
• Must be provided at least once in any period of 12 consecutive
months during the continuation of the customer relationship
PII/PHI Data Roles
Role Description
Data Subject • Individual whose personal data is collected, processed, or stored by an
organization
• Has certain rights and expectations regarding how their data is handled, such
as the right to access, correct, delete, or restrict their data
Data Owner • Works for (or is) the organization that collected the data
• Has the authority and responsibility to determine how data that has been
collected is classified, protected, and used
Data Processor • Individual or entity that performs operations on data on behalf of the data
owner, such as collecting, modifying, storing, or transmitting the data
Data Custodian • Individuals or entity that implements the security controls and procedures
specified by the data owner to protect data while in transit and at rest
• Examples: Database administrator, sysadmin
Privacy Implications
Term Description
Legal Failure to follow applicable data privacy laws may lead to fines, lawsuits, and even
prohibiting a site's use in certain jurisdictions
Local/regional • Local, state, and regional jurisdictions may implement their own privacy requirements
• The risk is overlapping, confusing, or even contradictory requirements for businesses
that operate in multiple locations
National • Each country has its own data privacy laws. Examples:
• US HIPAA, Fair Credit Reporting, GLBA, Family Education Rights and Privacy Act
• Switzerland – enshrines privacy into its constitution
• Japan – Act on the Protection of Personal Information
• South Africa - The Protection of Personal Information Act
Global • Legal frameworks that regulate the collection, management, and protection of
personal data and privacy rights of individual
• They vary across countries and regions, but some common principles include: stronger
consent requirements, data breach notification, and the appointment of data
protection officers
• Example: EU General Data Protection Regulation (GDPR)
Question
• You plan to use drones for your facility’s perimeter and boundary
monitoring.
• What legal concern does this raise?
• Privacy
• Attestation
Audits and • Internal Audit
Assessments • External Audit
• Penetration Testing
Attestation
• Performed by you
• Might be under the direction of an audit committee
• A self-assessment to ensure compliance
External Audit
• Live systems
• Open ports
• Network paths
• OS and service versions
• Firewall rules
• Possible ways of bypassing the firewall
Question
• A penetration tester begins an engagement by performing port
and service scans against the client environment
• according to the rules of engagement.
• Which reconnaissance type is the tester performing?
• Active
Question #2
• A company hired a consultant to perform an offensive security
assessment covering penetration testing and social engineering
• Which of the following teams will conduct this assessment
activity?
• Red
• Blue
• Purple
• White
Question #2
• A company hired a consultant to perform an offensive security
assessment covering penetration testing and social engineering
• Which of the following teams will conduct this assessment
activity?
• Red
• Blue
• Purple
• White
Question #3
• You want a third-party vendor to do a penetration test that targets
a specific device
• You have provided basic information about the device
• What type of pentest is this?
• Fully known environment – white box
• Partially known environment – grey box
• Unknown environment – black box
Question #3
• You want a third-party vendor to do a penetration test that targets
a specific device
• You have provided basic information about the device
• What type of pentest is this?
• Fully known environment – white box
• Partially known environment – grey box
• Unknown environment – black box
Question #4
• Target audience
• Certain audience types will have specific training topic needs
• Consider having a baseline set of topics that apply to all staff
• Then have additional training for specific roles and responsibilities
Note: target audience provides a refinement/additional topics for specific job roles; it is
an add-on to base security training requirements that all staff should complete
• Training modality
• Determine which courses can/should be:
• Self-paced
• Virtual
• Face-to-face / in-person
• Hybrid
• Note: modality is less critical than the actual subject, but still very useful for
convenience, compliance, and overall program effectiveness
Security Training Topics
• Organizational and regulatory policy
• Where to find/how to use handbooks for reference
• Situational awareness
• Insider threat
• Anomalous behavior recognition
• Risky, unexpected, unintentional
• Monitoring and reporting
• Initial instance
• Recurring issues
• Password management
• Removable media and cables
• Social engineering
• Awareness, recognition, and response
• Operational security
• Hybrid/remote work environments
Phishing Recognition and Response Example
• Users are receiving phishing emails that bypass the current email-
filtering technology
• With no controls to evaluate the safety of included links, users are
being tricked into clicking on malicious URLs
• What can you do to immediately address this problem?
• Give users updated awareness training