CISSP-Domain-1-Objectives
CISSP-Domain-1-Objectives
Management
Glass-Steagall Act: passed in 1933 and separated investment and commercial banking activities in response to
involvement in stock market investment
The Gramm-Leach-Bliley Act eliminated the Glass-Steagall Act's restrictions against affiliations between
commercial and investment banks in 1999
Security Control Assessment (SCA): an evaluation process of the different type of controls such as
management, operational and security control within an information system, with the purpose of validation
of the requirement of a control, correct implementation, operationally being followed as intended, and
result is as desired
basically a formal evaluation of a defined set of controls, which may be conducted with the
Security Test and Evaluation (ST&E); NIST Special Publication 800-53A Security and Privacy
Controls for Federal Information Systems and Organizations ensure the security requirements and
enforcement of appropriate security controls
RFC 1087 (https://datatracker.ietf.org/doc/html/rfc1087): activitiy that is unethical and unacceptable:
(a) seeks to gain unauthorized access to the resources of the Internet
(b) disrupts the intended use of the Internet
(c) wastes resources (people, capacity, computer) through such actions
(d) destroys the integrity of computer-based information, and/or
(e) compromises the privacy of users
Confidentiality:
Integrity:
Principle that objects retain their veracity and are intentionally modified only by authorized subjects
Concept of protecting the reliability and correctness of data; guarding against improper info
modification/destruction; includes ensuring non-repudiation and authenticity
Integrity protection prevents unauthorized alterations of data
Preventing authorized subjects from making unauthorized modifications, such as mistakes
Maintaining the internal and external consistency of objects
Availability:
Principle that authorized subjects are granted timely and uninterrupted access to objects
To ensure high availability of services and data, use techniques like failover clustering, site
resiliency, automatic failover, load balancing, redundancy of hardware and software components,
and fault tolerance
Nonrepudiation:
Ensures that the subject of activity or who caused an event cannot deny that the event occurred
Nonrepudiation is made possible through identification, authentication, authorization,
accountability, and auditing
AAA Services:
Security governance: the collection of policies, roles, processes/practices used to make security decisions in an
org; related to supporting, evaluating, defining, and directing the security efforts of an org; it involves making sure
that security strategies align with business goals, and that they are comprehensive and consistent across the
organization
Security governance is the implementation of a security solution and a management method that are
tightly interconnected
There are numerous security frameworks and governance guidelines providing a structured approach to
security governance:
ISO/IEC 27001 (https://www.iso.org/standard/27001): a widely recognized international standard
for information security management systems (ISMS); it provides a risk-based approach, and
emphasizes coontinual improvement of the ISMS
NIST Cybersecurity Framework (CSF) (https://www.nist.gov/cyberframework): built around six core
functions: govern, identify, protect, detect, respond, and recover to provide guidance to industry,
government agencies, and other orgs to manage cybersecurity risks
SP 800-53 (https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final): a comprehensive set or catelog of
security and privacy controls across multiple security domains, covering areas such as risk
management, access control, incident response, and system maintenance
SP 800-100 (https://csrc.nist.gov/pubs/sp/800/100/r1/iprd): Titled Information Security Handbook: a
guide for managers, NIST hasn't released an update since 2006, although they appear to have an
update in progress
COBIT (Control Objectives for Information and Related Technologies): COBIT focuses
enterprise IT, aligning IT and business strategies, and providing a comprehensive framework for
managing risks (see additional below)
CIS Critical Security Controls: the CIS (Center for Internet Security) Critical Security Controls
provides a prioritize set of actions to defend against threats; it focuses on practical steps to reduce
the attack surface, like implementing secure configurations, managing admin privileges, and
monitoring logs
ITIL (Information Technology Infrastructure Library): ITIL is a set of practices for IT service
management (ITSM) that focuses on aligning IT services with business needs; it includes
elements of security governance, particularly in managing security incidents, changes, and service
continuity, and is often integrated with other frameworks like ISO 27001
The security function: the aspect of operating a business that focuses on the task of evaluating and improving
security over time
To manage security, an org must implement proper and sufficient security governance
The act of performing a risk assessment to drive the security policy is the clearest and most direct
example of management of the security function
Third-party governance: external entity oversight that may be mandated by law, regulation, industry standards,
contractual obligation, or licensing requirement; outside investigator or auditors are often involved
1.3.1 Alignment of security function to business strategy, goals, mission, and objectives
Security Management Planning: ensures proper creation/implementation/enforcment of a security policy,
and alignment with org strategy, goals, mission, and objectives; security management is based on three
types of plans: strategic, tactical, and operational
Strategic Plan: a strategic plan is a long-term plan (useful for 5 years); it defines the org's security
purpose
A strategic plan should include a risk assessment
Tactical Plan: mid-term plan (1 year or less) developed to provide more details on accomplishing the
goals set forth in the strategic plan
Operational Plan: a short-term, highly detailed plan based on strategic or tactical plans
Strategy, goals, missions,and objectives — support each other in a heirarchy
Objectives: are closest to the ground-level and represent small efforts to help you achieve a
mission
Missions: represent a collection of objectives, and one or more missions lead to goals; when you
reach your goals, you are achieving the strategy
A security framework must closely tie to mission and objectives, enabling the business to complete its
objectives and advance the mission while securing the environment based on risk tolerance
1.3.2 Organizational processes (e.g., acquistions, divestitures, governance committees)
Security governance should address every aspect of an org, including organizational processes of
acquisitions, divestitures, and governance
Be aware of the risks in acquisitions (since the state of the IT environment to be integrated is unknown,
due diligence is key) and divestitures (how to split the IT infrastructure and what to do with identities and
credentials)
Understand the value of governance committees (vendor governance, project governance, architecture
governance, etc.)
Executives, managers and appointed individuals meet to review architecture, projects and incidents
(security or otherwise),and provide approvals for new strategies or directions
The goal is a fresh set of eyes, often eyes that are not purely focused on information security
When evaluating a third-party for your security integration, consider the following:
on-site assessment
document exchange and review
process/policy review
third-party audit
1.3.3 Organizational Roles and Responsibilities
Primary security roles are senior manager, security professional, asset owner, custodian, user, and auditor
Senior Manager: has a responsibility for organizational security and to maximize profits and shareholder
value
Security Professional: has the functional responsibility for security, including writing the security policy and
implementing it
Asset Owner: responsible for classifying information for placement or protection within the security
solution
Custodian: responsible for the task of implementing the proscribed protection defined by the security
policy and senior management
Auditor: responsible for reviewing and verifying that the security policy is properly implemented
1.3.4 Security control frameworks
A security control framework: outlines the org's approach to security, including a list of specific security
processes, procedures, and solutions used; it is important in planning the structure of an org's security
solution; many frameworks to choose from, such as:
COBIT Control Objectives for Information and Related Technology ("moderately referenced" on the
exam):
COBIT is a documented set of best IT security practices by ISACA; a "security concept
infrastructure" used to organize the complex security solutions of companies
COBIT is commonly used as an audit framework for orgs
Six key principles:
provide stakeholder value
holistic approach
dynamic governance system
governance distinct from management
tailored to enterprise needs
end-to-end governance system
ISO 27000 series (27000, 27001, 27002, etc.).
NIST CyberSecurity Framework (CSF)
designed for commerical orgs and critical infrastructure, CSF 1.1 consists of five functions:
identify
protect
detect
respond
recovery
note: updated (2024) CSF 2.0 functions:
govern
identify
protect
detect
respond
recover
1.3.5 Due care/due diligence
Due diligence: establishing a plan, policy, and process to protect the interests of the organization; due
diligence is knowing what should be done and planning for it; understanding your security governance
principles (policies and procedures) and the risks to your organization; actions taken by a vendor to
demonstrate or provide due care
Due diligence often involves:
gathering information through discovery, risk assessments and review of existing
documentation
developing a formalized security structure containing a security policy, standards, baselines
guidlines, and procedures
documentation to establish written policies
disseminating the information to the organization
Due care: practicing the individual activities that maintain the due diligence effort; due care is about your
legal responsibility within the law or within org policies to implement your org’s controls, follow security
policies, do the right thing and make reasonable choices
Security documentation is the security policy
After establishing a framework for governance, security awareness training should be implemented,
including all new hires, who complete the security awareness training as they come on board, and existing
employees who should recertify regularly (typically yearly)
Due care is the responsible protection of assets
Due diligence is the ability to prove due care
The EU’s GDPR has strong privacy rules that apply to any org anywhere that stores or processes
the personal data of EU residents; these individuals must be told how their data is collected and
used, and they must be able to opt out
The privacy guidelines of the Organization for Economic Co-operation and Development (OECD)
require orgs to avoid unjustified obstacles to trans-border data flow, set limits to personal data collection,
protect personal data with reasonable security and more
Fourth Amendment to the US Constitution: the right of the people to be secure in their persons, houses,
papers, effects against unreasonable search and seizure
Electronic Communication Privacy Act (ECPA): as amended, protects wire, oral, and electronic
communications while those communications are being made, are in transit, and when they are stored on
computers; makes it a crime to invade electronic privacy of an individual, and it broadened the Federal
Wiretap Act
COPPA makes a series of demands on websites that cater to children or knowingly collect
information from children:
Websites must have a privacy notice that clearly states the types of info they collect and
what it's used for (including whether infor is disclosed to third parties); must also include
contact info for site operators
Parents must be able to review any info collected from children and permanently delete it
from the site's records
Parents must give verifiable consent to the collection of info about children younger than
the age of 13 prior to any such collection
US Patriot Act of 2002: enacted following the September 11 attacks with the stated goal of tightening U.S.
national security, particularly as it related to foreign terrorism
The EU-US Privacy Shield (formerly the EU-US Safe Harbor agreement): controls data flow from the EU
to the United States; the EU has more stringent privacy protections and without the Privacy Shield,
personal data flow from the EU to the United States would not be allowed
The top tier of a formalized hierarchical organization security documentation is the security policy
Policy: docs created by and published by senior management describing organizational strategic goals
A security policy is a document that defines the scope of security needed by the org, discussing assets
that require protection and the extent to which security solutions should go to provide the necessary
protections
It defines the strategic security objectives, vision, and goals and outlines the security framework of the
organization
Acceptable User Policy: the AUP is a commonly produced document that exists as part of the overall security
documentation infrastructure
This policy defines a level of acceptable performance and expectation of behavior and activity; failure to
comply with the policy may result in job action warnings, penalties, or termination
Security Standards, Baselines and Guidelines: once the main security policies are set, the remaining security
docuemntation can be crafted from these policies
Policies: these are high-level documents, usually written by the management team; policies are
mandatory, and a policy might provide requirements, but not the steps for implementation
Standards: specific mandates explicity stating expections of performance/conformance; more descriptive
than policies, standards define compulsary requirements for the homogenous use of hardware, software,
technology, and security controls, uniformly implemented throughout the org
Baseline: defines a minimum level of security that every system throughout the organization must meet;
baselines are usually system specific and refer to industry / government standards
e.g. a baseline for server builds would be a list of configuration areas that should be applied to
every server that is built
A Group Policy Object (GPO) in a Windows network is sometimes used to comply with standards;
configuration management solutions can also help you establish baselines and spot configurations
that are not in alignment
Guideline: offers recommendations on how standards and baselines should be implemented & serves as
an operational guide for security professionals and users
Guidelines are flexible, and can be customized for unique systems or conditions; they state which
security mechanism should be deployed instead of prescribing a specific product or control; they
are not complusory; suggested practices and expectations of activity to best accomplish tasks and
goals
Procedure (AKA Standard Operating Procedure or SOP): detailed, step-by-step how-to doc that
describes the exact actions necessary to implement a specific security mechanism, control, or solution
BCP is used to maintain the continuous operation of a business in the event of an emergency, with a goal
to implement a combination of policies, procedures, and processes
BCP has four distinct phases:
project scope and planning
business impact analysis
continuity planning
approval and implementation
Business continuity requires a lot of planning and preparation; actual implementation of business
continuity processes occur quite infrequently
The primary facets of business continuity are:
Resilience: (e.g. within a data center and between sites or data centers)
Recovery: if a service becomes unavailable, you need to recover it as soon as possible
Contingency: a last resort in case resilience and recovery prove ineffective
BCP vs DR:
BCP activities are typically strategically focused at a high level and center themselves on business
processes and operations
DR plans tend to be more tactical and describe technical activities such as recovery sites, backups, and
fault tolerance
The overall goal of BCP is to provide a quick, calm, and efficient response in the event of an emergency and to
enhance a company's ability to quickly recover from a distruptive event
Business impact analysis (BIA): Identify the systems and services that the business relies on and
assess the impacts that a disruption or outage would cause, including the impacts on business processes
like accounts receivable and sales
Step 1: Identification of priorities
Step 2: Risk identification
Step 3: Likelihood assessment
Step 4: Resource prioritization
deciding which systems and services you need to get things running again (think
foundational IT services such as the network and directory, which many other systems rely
on)
and prioritize the order in which critical systems and services are recovered or brought
back online
As part of the BIA, establish:
recovery time objectives (RTO): how long it takes to recover
recovery point objectives (RPO): the maximum tolerable data loss
maximum tolerable downtime (MTD): (AKA maximum allowable downtime or MAD) how
long an org can survive an interruption of critical functions
along with the costs of downtime and recovery
Continuity planning: The first two phases of the BCP process (project scope and planning and the
business impact analysis) focus on determining how the BCP process will work and prioritizing the
business assets that need to be protected against interruption
The next phase of BCP development, continuity planning, focuses on the development and
implementation of a continuity strategy to minimize the impact realized risks might have on
protected assets
There are two primary subtasks/phases involved in continuity planning:
Strategy development: in this phase, the BCP team determines which risks they will
mitigate
Provisions and processes: in this phase, the team designs mechanisms and procedures
that will mitigate identified risks
The goal of this process is to create a continuity of operations plan (COOP), which focuses on
how an org will carry out critical business functions starting shortly after a disruption occurs and
extending up to one month of sustained operations
Approval and implementation:
BCP plan now needs sr. management buy-in (should be endorsed by the org's top exec)
BCP team should create an implementation schedule, and all personnel involed should receive
training on the plan
The top priority of BCP and DRP is people: Always prioritize people's safety; get people out of harm's way, and
then address IT recovery and restoration issues
Malicious actors are routinely targeting users with phishing and spear phishing campaigns, social
engineering, and other types of attacks, and everybody is a target
Once attackers compromise an account, they can use that entry point to move around the network and
elevate their privileges
People can also become a key security asset when they are properly trained and are motivated to protect
not only themselves but the security of the organization as well
Part of planning for security includes having standards in place for job descriptions, job classifications,
work tasks, job responsibilities, prevention of collusion, candidate screening, background checks, security
clearances, employment and nondisclosure agreements
Employment agreement: specifies job duties, expectations, rate of pay, benefits and info about
termination; sometimes, such agreements are for a set period (for example, in a contract or short-term
job).
Employment agreements facilitate termination when needed for an underperforming employee
The more info and detail in an employment agreement, the less risk (risk of a wrongful termination
lawsuit, for example) the company has during a termination proceeding
e.g. a terminated employee might take a copy of their email with them without thinking of it as
stealing, but they are less likely to do so if an employment agreement or another policy document
clearly prohibits it
example employee agreements:
non-compete
codes of conduct such as an acceptable use policy (AUP), which defines what is and isn’t
acceptable acitivty, practice, or use for company equipemnt and resources
nondisclosure agreement (NDA), which is a doc used to protect confidential information
from being disclosed by a current or former employee
Orgs commonly outsource many IT functions, particularly data center hosting, contact-center support, and
application development
Info security policies and procedures must address outsourcing secuity and the use of service providers,
vendors and consultants
e.g. access control, document exchange and review, maintenance, on-site assessment, process
and policy review, and Service Level Agreements (SLAs) are examples of outsourcing security
considerations
Compliance: the act of confirming or adhering to rules, policies, regulations, standards, or requirements
on a personnel level, compliance is related to individual employees following company policies and
procedures
employees need to be trained on company standards as defined in the security policy and remain
in compliance with any contractual obligations (e.g. with PCI DSS)
Compliance is a form of administrative or managerial security control
Compliance enforcement: the application of sanctions or consequences for failing to follow policy,
training, best practices, or regulations
Personally identifiable information (PII) about employees, partners, contractors, customers and others
should be stored in a secure way, accessible only to those who require the information to perform their
jobs
Orgs should maintain a documented privacy policy outlining the type of data covered by the policy and
who the policy applies to
Employees and contractors should be required to read and agree to the privacy policy upon hire and on a
regular basis thereafter (such as annually)
Risk Management: process of identifying factors that could damage or disclose data, evaluating those
factors in light of data value and countermeasure cost, and implementing cost-effective solutions for
mitigating or reducing risk
Threats: any potential occurrence that many cause an undersirable or unwanted outome for a specific
asset; they can be intentional or accidental; loosely think of a threat as a weapon that could cause harm to
a target
Vulnerability: the weakness in an asset, or weakness (or absense) of a safeguard or countermeasure; a
flaw, limitation, error, frailty, or susceptibility to harm
Threats and vulnerabilities are related: a threat is possible when a vulnerability is present
Threats exploit vulnerabilities, which results in exposure
Exposure is risk, and risk is mitigated by safeguards
Safeguards protect assets that are endangered by threats
Threat Agent/Actors: intentionally exploit vulnerabilities
Threat Events: accidential occurrences and intentinoal exploitations of vulnerabilities
Threat Vectors: (AKA attack vector) is the path or means by which an attack or attacker can gain
access to a target in order to cause harm
Exposure: being susceptible to asset loss because of a threat; the potential for harm to occur
Exposure Factor (EF): derived from this concept; an element of quantitative risk analysis that
represents the percentage of loss than org would experience if a specific asset were violated by a
realized risk
Single Loss Expectancy (SLE): an element of quantitative risk analysis that represents the cost
associated with a single realized risk against a specific asset; SLE = asset value (AV) * exposure
factor (EF)
Annualized rate of occurrence (ARO): an element of quantitative risk analysis that represent the
expected frequency with which a specific threat or risk will occur within a single year
Annualized loss expectancy (ALE): an element of quantitative risk analysis that represent the
possible yearly cost of all instances of a specific realized threat against a specific asset; ALE =
SLE * ARO
Safeguard evaluation: ALE for an asset if a safeguard is implemented; ALE before safeguard -
ALE with safeguard - annual cost of safeguard, or (ALE1 - ALE2) - ACS
Risk: the possiblity or likelihood that a threat will exploit a vulnerability to cause harm to an asset
and the severity of damage that could result; the > the potential harm, the > the risk
Risk Assessment: used to identify the risks and set criticality priorities, and then risk response is used to
determine the best defense for each identified risk
Risk is threat with a vulnerability
Risk = threat * vulnerability (or probability of harm multiplied by severity of harm)
Addressing either the threat or threat agent or vulnerability directly results in a reduction of risk (known as
threat mitigation)
All IT systems have risk; all orgs have risk; there is no way to elminiate 100% of all risks
Instead upper management must decide which risks are acceptable, and which are not; there are
two primary risk-assessment methodologies:
Quantitative Risk Analysis: assigns real dollar figures to the loss of an asset and is
based on mathematical calculations
Qualitative Risk Analysis: assigns subjective and intangible values to the loss of an asset
and takes into account perspectives, feelings, intuition, preferences, ideas, and gut
reactions; qualitative risk analys is based more on scenarios than calculations, and threats
are ranked to evaluate risks, costs, and effects
Most orgs employ a hybrid of both risk assessment methodologies
The goal of risk assessment is to identify risks (based on asset-threat parings) and rank them in
order of criticality
Administrative: the policies and procedures defined by an org's security policy and other regulations or
requirements
Physical: security mechanisms focused on providing protection to the facility and real world objects
Preventive: a preventive or preventative control is deployed to thwart or stop unwanted or unauthorized
activity from occurring
Deterrent: a deterrent control is deployed to discourage security policy violations; deterrent and
preventative controls are similar, but deterrent controls often depend on individuals being convinced not to
take an unwanted action
Detective: a detective control is deployed to discover or detect unwanted or unauthorized activity;
detective controls operate after the fact
Compensating: a compensating control is deployed to provide various options to other existing controls,
to aid in enforcement and support of security policies
they can be any controls used in addition to, or in place of, another control
they can be a means to improve the effectiveness of a primary control or as the alternative or
failover option in the event of a primary control failure
Corrective: a corrective control modifies the environment to return systems to normal after an unwanted
or unauthorized activity as occurred; it attempts to correct any problems resulting from a security incident
Recovery: An extension of corrective controls but have more advanced or complex abilities; a recovery
control attempts to repair or restore resources, functions, and capabilities after a security policy violation
recovery controls typically address more significant damaging events compared to corrective
controls, especially when security violations may have occurred
Directive: A directive control is deployed to direct, confine, or control the actions of subjects to force or
encourage compliance with security policies
Periodically assess security and privacy controls: what’s working, what isn’t
As part of this assessment, the existing documents should be thoroughly reviewed, and some of
the controls tested randomly
A report is typically produced to show the outcomes and enable the org to remediate deficiencies
Often, security and privacy control assessment are performed and/or validated by different teams,
with the privacy team handling the privacy aspects
1.10.8 Reporting
Risk Reporting is a key task to perform at the conclusion of risk analysis (i.e. production and presentation
of a summarizing report)
A Risk Register or Risk Log is a document that inventories all identified risks to an org or system or within
an individual project
A risk register is used to record and track the activities of risk management, including:
identifying risks
evaluating the severity of, and prioritizing those risks
prescribing responses to reduce or eliminate the risks
track the progress of risk mitigation
Risk analysis is performed to provide upper management with the details necessary to decide which risks
should be mitigated, which should be transferred, which should be deterred, which should be avoided, and
which should be accepted; to fully evaluate risks and subsequently take proper precautions, the following
must be analyzed:
assets
asset valuation
threats
vulnerabilities
exposure
risk
realized risk
safeguards
countermeasures
attacks
breaches
Risk Maturity Model (RMM): assesses the key indicators and activities of a mature, sustainable, and
repeatable risk management process, typically relating the assessment of risk maturity against a five-level
model such as:
Ad hoc: a chaotic starting point from which all orgs initiate risk management
Preliminary: loose attempts are made to follow risk management processes, but each department
may perform risk assessment uniquely
Defined: a common or standardized risk framework is adopted organization-wide
Integrated: risk management operations are integrated into business processes, metrics are used
to gather effectiveness data, and risk is considered an element in business strategy decisions
Optimized: risk management focuses on achieving objectives rather than just reacting to external
threats; increased strategic planning is geared toward business success rather than just avoiding
incidents; and lessons learned are re-integrated into the risk management process
A risk framework is a guide or recipe for how risk is to be accessed, resolved, and monitored
NIST established the Risk Management Framework (RMF) and the Cybersecurity Framework (CSF):
the CSF is a set of guidelines for mitigating organizational cybersecurity risks, based on existing
standards, guidelines, and practices
The RMF is intended as a risk management process to identify and respond to threats, and is defined in
three core, interrelated Special Publications:
SP 800-37 Rev 2, Risk Management Framework for Information Systems and Organizations
SP 800-39, Managing Information Security Risk
SP 800-30 Rev 1, Guide for Conducting Risk Assessments
The RMF has 7 steps, and six cyclical phases:
Prepare to execute the RMF from an organization and system-level perspective by
establishing a context and priorities for managing security and privacy risk
Categorize the system and the information processed, stored, and transmitted by the
system based on an analysis of the impact of loss
Select an initial set of controls for the system and tailor the controls as needed to reduce
risk to an acceptable level based on an assessment of risk
Implement the controls and describe how the controls are employed within the system and
its environment of operation
Assess the controls to determine if the controls are implemented correctly, operating as
intended, and producing the desired outcomes with respect to satisfying the security and
privacy requirements
Authorize the system or common controls based on a determination that the risk to
organizational operations and assets, individuals, and other organizations, and the nation
is acceptable
Monitor the system and associated controls on an on-going basis to include assessing
control effectiveness, documenting changes to the system and environment of operation,
conducting risk assessments and impact analysis, and reporting the security and privacy
posture of the system
See my overview article, The NIST Risk Management Framework
(https://blog.balancedsec.com/p/the-nist-risk-management-framework)
There are other risk frameworks, such as the ISO/IEC 31000, ISO/IEC 31004, COSO, Risk IT, OCTAVE,
FAIR, and TARA; be familiar with frameworks and their goals
1.11 Understand and apply threat
modeling concepts and methodologies
(OSG-9 Chpt 1)
Threat Modeling: security process where potential threats are identified, categorized, and analyzed; can be
performed as a proactive measure during design and development (aka defensive approach) or as an reactive
measure once a product has been deployed (aka adversarial approach)
Threat modeling identifies the potential harm, the probability of occurrence, the priority of concern, and the
means to eradicate or reduce the threat
Microsoft uses the Security Development Lifecycle (SDL) with the motto: "Secure by design, secure by default,
secure in deployment and communication"
It has two objectives:
Reduce the number of security-related design and coding defects
Reduce the severity of any remaining defects
A defensive approach to threat modeling takes place during the early stages of development; the method is
based on predicting threats and designing in specific defenses during the coding and crafting process
Security solutions are more cost effective in this phase than later; this concept should be considered a
proactive approach to threat management
Microsoft developed the STRIDE threat model:
Spoofing: an attack with the goal of gaining access to a target system through the use of falsified identity
Tampering: any action resulting in unauthorized changes or manipulation of data, whether in transit or in
storage
Repudiation: the ability of a user or attacker to deny having performed an action or activity by maintaining
plausible deniability
Information Disclosure: the revelation or distribution of private, confidential, or controlled information to
external or unauthorized entities
Denial of Service (DoS): an attack that attempts to prevent authorized use of a resource; this can be done
through flaw exploitation, connection overloading, or traffic flooding
Elevation of privilege: an attack where a limited user account is transformed into an account with greater
privileges, powers, and access
STRIDE is threat categorization model; threat categorization is an important part of app threat modeling
Process for Attack Simulation and Threat Analysis (PASTA): a seven-stage threat modeling methodology:
Stage I: Definition of the Objectives (DO) for the Analysis of Risk
Stage II: Definition of the Technical Scope (DTS)
Stage III: Application Decomposition and Analysis (ADA)
Stage IV: Threat Analysis (TA)
Stage V: Weakness and Vulnerability Analysis (WVA)
Stage VI: Attack Modeling and Simulation (AMS)
Stage VII: Risk Analysis and Management (RAM)
Each stage of PASTA has a specific list of objectives to achieve and deliverables to produce in order to complete
the stage
Visual, Agile, and Simple Threat (VAST): a threat modeling concept that integrates threat and risk management
into an Agile programming environment on a scalable basis
Part of the job of the security team is to identify threats, using different methods:
Focus on attackers: this is a useful method in specific situations;
e.g. suppose that a developer’s employment is terminated, and that post-offboarding and review of
developer’s computer, a determination is made that the person was disgruntled and angry
understanding this situation as a possible threat, allows mitigation steps to be taken
Focus on assets: an org’s most valuable assets are likely to be targeted by attackers
Focus on software: orgs that develop applications in house, and can be viewed as part of the threat
landscape; the goal isn’t to identify every possible attack, but to focus on the big picture, identifying risks
and attack vectors
Understanding threats to the org allow the documentation of potential attack vectors; diagramming can be used to
list various technologies under threat
Reduction analysis: with a purpose of gaining a greater understanding of the logic of a product and interactions
with external elements includes breaking down a system into five core elements: trust boundaries, data flow
paths, input points, privileged operations, and security control details; AKA decomposing the application, system,
or environment
DREAD: Microsoft developed the DREAD threat modeling approach to detect and prioritize threats so that
serious threats can be mitigated first
D: Damage potential
R: Reproducibility
E: Exploitability
A: Affected users
D: Discoverability
Before actual training takes place, user security awareness needs to take place; from there, training, or
teaching employees to perform their work tasks and to comply with the security policy can begin
All new employees require some level of training so that they will be able to comply with all
standards, guidelines, and procedures mandated by the security policy
Education is a more detailed endeavor in which students/users learn much more than they actually
need to know to perform their work tasks
Education is most often associated with users pursuing certification or seeking job promotion
Employees need to understand what to be aware of (e.g. types of threats, such as phishing and free USB
sticks), how to perform their jobs securely (e.g. encrypt sensitive data, physically protect valuable assets)
and how security plays a role in the big picture (company reputation, profits,and losses)
Training should be mandatory and provided both to new employees and yearly (at a minimum) for
ongoing training
Routine tests of operational security should be performed (such as phishing test campaigns,
tailgating at company doors and social engineering tests)
Social engineering: a form of attack that exploits human nature and behavior; the common social
engineering principles are authority, intimidation, consensus, scarcity, familiarity, trust, and
urgency;
social engineering attacks include phishing, spear phishing, business email compromise
(BEC), whaling, smishing, vishing, spam, shoulder surfing, invoice scams, hoaxes,
impersonation, masquerading, tailgating, piggybacking, dumpster diving, identity fraud,
typo squatting, and influence campaigns
while many orgs don’t perform social engineering campaigns (testing employees using
benign social engineering attempts) as part of security awareness, it is likely to gain
traction
outside of campaigns, presenting social engineering scenarios and information is a
common way to educate
Phishing: phishing campaigns are popular, and many orgs use third-party services to routinely test
their employees with fake phishing emails
such campaigns produce valuable data, such as the percentage of employees who open
the phishing email, the percentage who open attachments or click links, and the
percentage who report the fake phishing email as malicious
Security champions: the term "champion" has been gaining ground; orgs often use it to designate
a person on a team who is a subject matter expert in a particular area or responsible for a specific
area
e.g. somebody on the team could be a monitoring champion — they have deep knowledge
around monitoring and evangelize the benefits of monitoring to the team or other teams
a security champion is a person responsible for evangelizing security, helping bring
security to areas that require attention, and helping the team enhance their skills
Gamification: legacy training and education are typically based on reading and then answering
multiple-choice questions to prove knowledge; gamification aims to make training and education
more fun and engaging by packing educational material into a game
gamification has enabled organizations to get more out of the typical employee training
Time and money must be allocated for evaluating the company’s security awareness and training; the
company should track key metrics, such as the percentage of employees who click on a fake phishing
campaign email links