Cyber Fundamentals Course 5.0
Cyber Fundamentals Course 5.0
● Data Centers: These are the heartbeats of any modern business, housing critical
servers, storage, and computing resources. The access to data centers must be
rigorously controlled to thwart any unauthorized entry, which could lead to theft,
data loss, or damage.
● Server Rooms: Often found in businesses lacking the infrastructure for a
full-scale data center, server rooms can grow organically and may lack robust
security controls. Their proliferation within different business units adds layers of
complexity to security management.
● Media Storage Facilities: These are critical for disaster recovery and business
continuity, housing backups of vital business information. The remote location of
these facilities often demands even higher security measures than the primary
sites to safeguard sensitive data.
● Evidence Storage Rooms: For organizations involved in digital forensic
investigations, securing the chain of custody for evidence is paramount. Secure
evidence storage rooms prevent tampering and ensure that evidence remains
admissible in court proceedings.
● Wiring Closets: An overlooked aspect, these closets are hubs for an
organization's network infrastructure. Securing these closets is essential to
prevent unauthorized access that could lead to network eavesdropping or
breaches.
Visitor Management
Managing visitor access to secured facilities is a critical component of an organization's
overall security strategy. Effective visitor control procedures not only safeguard
sensitive information and assets but also ensure the safety of employees and guests.
Here's an overview of best practices for managing visitor access:
● Define Allowable Reasons for Visits: Clearly articulate the purposes for which
visitors may be granted access to the facility, ensuring these reasons align with
the organization's security and operational policies.
● Approval Levels: Specify the levels of approval required for different types of
visitors. This might vary based on the visitor's purpose, the areas they need to
access, and the duration of their visit.
● Unescorted Access: Identify if there are scenarios in which visitors may be
allowed unescorted access, and under what conditions. Define who is authorized
to make these decisions.
● Escort Requirements: Determine who is eligible to escort visitors within the
facility. Ensure that these individuals are trained on escort responsibilities and
aware of any areas that are off-limits to visitors.
● Visitor Register: Maintain a detailed log of all visitor access, including the
visitor's name, the time of entry and exit, the purpose of the visit, and who
authorized the visit. This log can be a physical register or an electronic system,
depending on the organization's needs.
● Badge System: Require all visitors to wear identification badges prominently.
These badges should be easily distinguishable from employee badges to quickly
identify visitors.
● Escort Indicators: For visitors who require an escort, ensure their badges clearly
indicate this requirement. This helps employees identify unescorted visitors who
may be in restricted areas.
● Surveillance Cameras: Install cameras in areas where visitors are allowed, using
them as a deterrent against unauthorized activities and as a tool for incident
investigation. Always inform visitors about the presence of surveillance cameras.
● Regular Reviews: Periodically review visitor logs and surveillance footage to
identify any unusual patterns or security breaches. This also helps refine visitor
management policies over time.
● Gatekeeping: Security personnel are often the first line of defense, responsible
for assessing and granting access to visitors based on established protocols.
This role requires a balance between being welcoming to guests and stringent in
security enforcement.
● Visitor Management: They manage visitor access, ensuring all visitors are
logged, provided with appropriate badges, and informed of the facility's security
policies. This includes deciding which visitors can have unescorted access and
who needs to be accompanied at all times.
Technological Integration
● Robot Sentries: The advent of technology has introduced robot sentries into the
physical security domain. These robots can patrol areas, monitor for unusual
activities, and even challenge intruders, supplementing the efforts of human
security personnel.
Operational Flexibility
Communication
● Effective communication skills are vital for security personnel, not only for
interaction with visitors and employees but also for coordination during security
incidents. Clear, concise communication ensures that everyone understands their
roles and responsibilities during an emergency.
1. Account Management: It's crucial to control who has access to what within an
organization. Account management involves several processes aimed at
ensuring that each user has appropriate access based on their role.
2. Job Rotation and Mandatory Vacation: These practices are not only beneficial for
employee development but also serve as security measures. Job rotation
reduces the risk of fraud by not allowing any one person to hold a position
indefinitely where they might exploit their role. Mandatory vacations, where
employees must take consecutive days off without access to corporate systems,
can also help uncover any fraudulent activities they might be hiding.
3. Standard Naming Convention: To simplify user identification and account
management, organizations should use a standard naming convention for user
accounts. A common method combines a user's first initial with their last name.
If duplicates occur, a unique number is appended.
4. Lifecycle of Account and Credentials:
○ Creation: When a new user joins the organization, they are granted access
to systems necessary for their role.
○ Modification: If a user's role changes or they need access to additional
systems, their entitlements are updated accordingly.
○ Re-certification: Regularly reviewing user access to ensure it's still
necessary for their current role helps minimize security risks.
○ Termination: When a user leaves the organization, their access must be
promptly revoked to protect sensitive information.
● Account Management Tasks: These are vital for protecting an organization's data
and systems from unauthorized access or misuse.
● Security Benefits: Practices like job rotation and mandatory vacations are not
just operational policies but are designed with security in mind.
● Access Control: Understanding who has access to what and why is a
fundamental aspect of cybersecurity. Ensuring users only have access to what
they need helps reduce potential vulnerabilities.
● Account Lifecycle: Managing the lifecycle of an account from creation to
termination is crucial to maintain security. It prevents unauthorized access and
ensures that access rights are up to date.
In summary, account and privilege management is about ensuring the right people have
the right access at the right time. This module has introduced you to the basic concepts
and practices that underpin this critical area of cybersecurity. As you continue your
learning journey, keep in mind the importance of diligent account management in
safeguarding an organization's digital assets.
Account Monitoring
Effective account monitoring is crucial in preventing unauthorized access and ensuring
users have the appropriate level of access for their roles.
Understanding Permissions
1. Accurate Permissions: It's vital to ensure users have permissions that match
their job requirements while adhering to the principle of least privilege—giving
them only the access necessary to perform their duties. Incorrect permissions
can lead to security risks or hinder productivity.
2. Privilege Creep: This occurs when users accumulate permissions beyond what
their current role requires, usually after changing positions within the
organization. To combat this, perform regular audits of user accounts to adjust
permissions as necessary.
Regular Account Audits
Conducting regular audits involves reviewing all permissions assigned to user accounts
with their managers to confirm they align with the user's current role. Pay special
attention to users who have recently changed positions.
Summary
Account monitoring is a foundational aspect of cybersecurity, ensuring that only
authorized users have access to sensitive information and systems. Through regular
audits, continuous monitoring, and leveraging technology like geotagging and
geofencing, organizations can significantly enhance their security posture. Remember,
the goal is not just to detect unauthorized access but also to ensure that legitimate
users have the access they need without unnecessary barriers to their work.
The Importance
1. Security: Ensures that only authorized individuals can access sensitive company
resources.
2. Compliance: Meets legal and regulatory requirements regarding data access and
privacy.
3. Efficiency: Streamlines the management of user access, saving time and
resources.
Best Practices
The Process
1. Onboarding (Provisioning):
○ Grant new users access to necessary systems and data based on their
role.
○ Provide authentication credentials and ensure understanding of access
controls and security policies.
2. Offboarding (Deprovisioning):
○ Remove access to all systems and ensure the user's data is handled
according to company policies and regulations.
○ Act quickly to deactivate accounts, particularly in sensitive terminations,
to protect against potential security threats.
Conclusion
Authorization
What is Authorization?
Authorization is the process that kicks in after a user successfully logs into a system
(authentication). It's all about permissions: determining what resources and data a user
can access or modify and what they're prohibited from doing.
1. Mandatory Access Control (MAC): This is the most stringent form, where the
system itself dictates permissions, and users have no say in modifying these
permissions. Suitable for very secure environments but not commonly used due
to its rigidity.
2. Discretionary Access Control (DAC): Here, users have the flexibility to set
permissions on their files and resources. This type is widely used because it
balances security needs with operational flexibility.
3. Role-Based Access Control (RBAC): Instead of managing permissions for each
user individually, permissions are assigned to roles. Users are then assigned to
these roles, simplifying the management of permissions and making the system
easier to administer.
Selecting the right access control system involves balancing security requirements with
the need for operational efficiency. Too lenient, and you risk security; too strict, and you
hinder productivity.
Conclusion
Authorization is a critical aspect of cybersecurity, ensuring that users have the right
access to perform their roles without compromising security. Whether you're dealing
with MAC, DAC, or RBAC, the goal is to implement an authorization system that
supports both security and productivity. Understanding and applying the Principle of
Least Privilege will be your guiding light in achieving a balanced approach.
To create a detailed security blueprint for a fictional SME (Small to Medium Enterprises),
covering both cyber and physical security aspects. This plan will address risk
assessment, physical security measures, cybersecurity policies, and incident response
strategies.
● Identify the size and type of the fictional SME (e.g., a tech startup, a small
manufacturing company).
● List the key assets that need protection, including physical assets (office space,
equipment) and digital assets (data, software).
Step 2: Conduct a Risk Assessment
● Identify potential security threats (both physical and cyber) that the SME might
face.
● Assess the vulnerability of the SME's assets to these threats.
● Determine the potential impact of each threat on the SME's operations.
● Design a layout for the SME's office space that incorporates principles of natural
surveillance, access control, and territorial reinforcement.
● Specify the types of physical barriers, security systems (e.g., alarms, cameras),
and access controls (e.g., keycard systems) that will be used.
● Develop policies for visitor management and employee access.
● Describe how the SME will monitor for security breaches, including the use of
surveillance for physical security and intrusion detection systems for
cybersecurity.
● Outline the incident response plan for different types of security breaches (e.g.,
break-ins, data breaches).
● Develop a communication plan for notifying relevant stakeholders in the event of
a security incident.
Step 6: Education and Training
● Plan regular security awareness training sessions for employees, covering both
cyber and physical security best practices.
● Create a schedule for drills and exercises to test the physical security measures
and incident response plans.
● Establish a schedule for regular reviews and updates to the security plan,
considering emerging threats and evolving technologies.
● Detail maintenance routines for security systems and software to ensure they
remain effective and up-to-date.
Step 8: Documentation
● Compile all the information, policies, plans, and procedures developed in the
previous steps into a comprehensive security blueprint document.
● Include appendices for quick-reference guides, emergency contacts, and a
glossary of terms.
Step 9: Presentation
● Reflect on the process of creating the security blueprint. Identify any challenges
faced and how they were overcome.
● Consider what could be improved in the blueprint and how additional resources
or expertise might enhance the SME's security posture.
Resources
Project 5 Template