CCSP思维导图
2023-07-24 15:25:21 1 举报
AI智能生成
当前最新
作者其他创作
大纲/内容
D1 云概念、架构和设计<br>Cloud Concepts, Architecture and Design<br>
1.1 了解云计算概念<br>Understand cloud computing concepts<br>
云计算定义<br>Cloud computing definitions<br>
NIST SP 800-145
Cloud computing is a model for enabling universal,<br>convenient, <font color="#e74f4c">on-demand network</font> access<br>to a shared pool of configurable computing resources<br>that can be <font color="#e74f4c">rapidly provisioned and released</font> with<br>minimal management effort or service provider<br>interaction.<br>
云计算角色和职责<br>Cloud computing roles and responsibilities<br>
云服务客户<br>cloud service customer<br>
The business or individual <font color="#e74f4c">consuming cloud<br>services</font><br>
Often using cloud to complement/<br>augment existing on-premises compute. 补充/增加
云服务供应商 CSP<br>cloud service provider<br>
<font color="#e74f4c">Company that provides cloud-based platform</font><br>infrastructure, and applications to other<br>organizations as a service.
云服务合作伙伴<br>cloud service partner<br>
Help organizations to obtain and deploy cloud<br>services.<br>
May provide consulting services, software to<br>run in the cloud, or both.
云服务代理<br>cloud service broker<br>
an entity that <font color="#e74f4c">manages</font> the use, performance and<br>delivery of cloud services<br>
negotiates relationships between cloud providers<br>(CSPs) and cloud consumers.
Serves as an intermediary (advisor,<br>negotiator) between customer and CSP
Functions of a Cloud Broker
Service Intermediation<br><font color="#e74f4c">enhances a given service</font> by improving specific capabilities<br>and providing value-added services to cloud consumers.
Service Aggregation<br><font color="#e74f4c">combines and integrates</font> multiple services into one or more<br>new services.
Service Arbitrage<br>means a broker has the flexibility to <font color="#e74f4c">choose services</font> from<br>multiple agencies.
监管机构<br>regulator<br>
CSA<br>Cloud Service Auditor
Third party that can conduct an <font color="#e74f4c">independent<br>assessment</font> of cloud services,information<br>system operations,performance,and security<br>of the cloud implementation.
Cloud administrator
Implementation, monitoring, and maintenance of the cloud.
Cloud application architect
Adapting, <font color="#e74f4c">porting</font>, and deploying application.
Cloud architect
Designs and develops solutions.
Cloud operator
Responsible for daily operational tasks.
Cloud data architect
Manages data storage and data flow within, to and from the cloud.
Cloud service manager
Responsible for business agreement, pricing for the cloud customer.
Cloud storage administrator
Manages storage volume/repository assignment and configuration.
cloud service business manager
Oversees business and billing administration.
Cloud service operations manager
Prepares systems operations and support for the cloud, administers services.
安全托管服务提供商 MSSP<br>managed security service provider
<font color="#e74f4c">maintains the security environment</font> for<br>companies<br>
may manage firewalls, IDPS, and SIEM<br>systems, and other security services and<br>infrastructure.<br>
may provide an outsourced <font color="#e74f4c">security<br>operations center (SoC)</font> and incident<br>response
云计算关键特性<br>Key cloud computing characteristics<br>
按需自助服务<br>on-demand self-service<br>
Customers can scale their compute and storage needs with little or<br><font color="#e74f4c">no intervention or prior communication</font> from the provider.
Technologists can access cloud resources almost immediately<br>when they need to do their jobs, providing agility in service delivery.
广泛的网络访问<br>broad network access<br>
Services are <font color="#e74f4c">consistently accessible</font> over the network regardless of<br>the users physical location
多租户<br>multi-tenancy<br>
Which means <font color="#e74f4c">many different customers share use</font> of the same<br>computing resources.
Physical servers that support our workloads might be the same<br>physical servers supporting other customers' workloads.
The underlying cloud infrastructure (compute, storage<br>networking is shared.
Oversubscription<br>
Cloud providers will oversubscribe their total capacity,<br>meaning they'll sell more capacity than they have.
Why?Because in the big picture customers won't be<br>collectively using all of that capacity simultaneously.
快速弹性和可伸缩性<br>rapid elasticity and scalability<br>
Allows the customer to grow or shrink the IT footprint as necessary to<br>meet needs without excess capacity.
Elasticity
The ability of a system to <font color="#e74f4c">automatically grow and shrink</font><br>based on app demand.
Scalability
The ability of a system to handle growth of users or work.<br>Ability to <font color="#e74f4c">grow as demand increases</font>.
资源池化<br>resource pooling<br>
Enables cloud provider to apportion resources as needed across<br>multiple customers so resources <font color="#e74f4c">are not underutilized or overtaxed</font>.
Enables cloud provider to make capital investments that greatly<br>exceed what any single customer could provide on their own.
Allows the cloud provider to meet various demands from<br>customers <font color="#e74f4c">while remaining financially viable</font>.
DISADVANTAGE
Can result in some degree of<br>location dependence beyond customer control.
However, major CSPs (AWS,Azure,GCP) often provide<br>options enabling customers to choose location.
可度量服务 aka metered service<br>measured service<br>
means that almost everything you do in the cloud is metered<br>(measured and tracked) for management and billing purposes.
common metrics
<ul><li>number of minutes of virtual server compute time</li><li>Amount of disk space you consume</li><li>Number of function calls you make</li><li>Amount of network egress and ingress</li></ul>
构建块技术<br>Building block technologies<br>
compute<br>
Infrastructure-as-a-Service (laas)is the basis<br>for compute capacity in the cloud.<br>
CSP provides the server, storage, and networking<br>hardware and its virtualization.<br>
Customer installs middleware and applications.<br>
<font color="#e74f4c">Customer only pays for what they use</font>. Charges<br>stop when instance is stopped or deleted.
网络<br>networking<br>
Cloud networking is all virtualized to allow<br>customers to design and customize to their needs.<br>
Enables customers to segment networks and<br><font color="#e74f4c">restrict access</font> however they would like.<br>
Physical network components are virtualized into<br>a software-defined network (SDN)
SDN
A network architecture approach that enables the network to be<br>intelligently and centrally controlled,or 'programmed,'using software
3个平面
Management plane: the business <font color="#e74f4c">applications that manage the<br>underlying control plane</font> are exposed with <b>northbound interfaces</b>
Control plane:Control of network functionality and programmabilityis<br>made directly to devices at this layer.
Data plane:The network switches and routers located at this plane are<br>associated with the underlying network infrastructure.
Northbound interface<br>
ensures only trusted,authorized applications access critical<br>network resources.
OpenFlow protocol interfaces with devices through southbound interfaces.
存储<br>storage<br>
三种存储类型
<font color="#e74f4c">Ephemeral</font> is relevant for laas instances and<br>exists only as long as the instance (VM)is up
<font color="#e74f4c">Raw</font> storage maps a logical unit number (LUN)<br>on a storage area network(SAN) to a VM.
<font color="#e74f4c">Long-term</font> storage offered by some CSPs is<br>tailored to the needs of data archiving.
This may include features like search,<br>immutability,and data lifecycle management.
Long term storage typically use either Volume or<br>object storage infrastructure.
<b style=""><font color="#000000">Databases</font></b>, usually multitenant relational (SQL) databases as a service.
<b style=""><font color="#000000">Big data</font></b> as a service,nonrelational (NoSQL) data such document, graph, column, or key-value
存储一致性<br>Storage Consistency<br>
<font color="#000000"><b>Strict consistency</b></font>
ensures that all copies of the data have been duplicated among all<br>relevant copies before finalizing the transaction to increase availability.
<b style=""><font color="#000000">Eventual consistency</font></b>
consistency of data is relaxed, which reduces the number of replicas<br>that must be accessed during read and write operations before the<br>transaction is finalized.
Data changes are 'eventually' transferred to all datacopies via <br>asynchronous propagation over the network<br>
<b>Content/file storage</b>: File-based content stored within the application
<b>Content delivery network (CDN)</b> where content is stored in object storage, then replicated to<br>multiple geographically distributed nodes to improve internet consumption speed.
<b>Information storage and management</b>: Data entered into the system via the web interface<br>and stored within the Saas application.
Often utilizes databases,which in turn are<br>installed on object or volume storage.
数据库<br>databases<br>
Multiple options available and multiple flavors of<br>relational (SQL) and non-relational (NoSQL)
<font color="#e74f4c">Managed database services (Paas)</font> options shift<br>infrastructure maintenance to the CSP.
laas (VM) hosted databases are an option where<br>Paas is not possible or practical.
编排<br>orchestration<br>
Cloud orchestration creates <font color="#e74f4c">automated<br>workflows </font>for managing cloud environments.
Builds on the foundation of <font color="#e74f4c">Infrastructure as<br>Code (lac)</font>, reducing manual admin tasks.
May be a script, function, runbook, or developed<br>in an external workflow engine.
虚拟化<br>virtualization
Type1 "Bare metal"
<ul><li>Reduced attack surface (compared to a Type 2 hypervisor)</li><li>This makes it more secure if implemented properly</li><li>Commonly used for QA, load testing, and production scenarios</li><li>Typically, more expensive than a Type 2 hypervisor</li></ul>
Type2 "Hosted"
<ul><li>Increased attack surface (due to the host operating system)</li><li>This makes it less secure vs Type 1, even if implemented properly</li><li>Commonly used for individual development and lab scenarios</li><li>Typically, less expensive than a Type I hypervisor</li></ul>
虚拟资产<br>virtual assets<br>
<ul><li>virtual machines (VM)</li><li>virtual desktop infrastructure (VDI)</li><li>software-defined networks (SDN)</li><li>virtual storage area networks (SAN)</li></ul>
<font color="#e74f4c">Hypervisors</font> are the primary component that manages virtual<br>assets, but also provide attackers with an additional target.<br>Both hypervisors and VMs need to be patched<br>
Security issues with cloud-based assets
Storing data in the cloud <font color="#e74f4c">increases the risk</font>, so steps may<br>be necessary to protect the data, depending on its value.
When leasing cloud-based services, you should know<br>who is responsible for maintenance and security.
The <b>cloud service provider (CSP)</b> provides the least<br>amount of maintenance and security in the laas model.
1.2 描述云计算参考架构<br>Describe cloud reference architecture<br>
云计算活动<br>Cloud computing activities<br>
ISO 17789 Cloud Reference Architecture
customer
<ul><li>Use cloud services</li><li>Perform service trials</li><li>Monitor services</li><li>Administer service security</li><li>Provide billing and usage reports</li><li>Handle problem reports</li><li>Administer tenancies</li><li>Perform business administration</li><li>Select and purchase service</li><li>Request audit reports</li></ul>
cloud service provider
<ul><li>Prepare systems and provide cloud services</li><li>Monitor and administer services</li><li>Manage assets and inventories</li><li>Provide audit data</li><li>Manage customer relationships</li><li>Handle customer requests</li><li>Perform peering with other cloud service providers</li><li>Ensure compliance</li><li>Provide network connectivity</li></ul>
cloud service partner
<ul><li>Design,create,and maintain service components</li><li>Test services</li><li>Perform audits</li><li>Set up legal agreements</li><li>Acquire and assess customers</li><li>Assess the marketplace</li></ul>
云服务能力<br>Cloud service capabilities<br>
应用能力类型<br>application capability types<br>
Overall reduction in costs, application and software licensing, reduced support costs,<br>backend systems and capabilities.
CSP allows the customer to focus on their business use cases.
平台能力类型<br>platform capability types<br>
Language and framework support, support for multiple environments, allowing choice<br>and <font color="#e74f4c">reducing "lock-in"</font>, improving ability to auto-scale.
基础设施能力类型 <br>infrastructure capability types<br>
Scale, converged network and shared capacity pool, self-service and on-demand<br>capacity, high reliability and resilience.
This is a capital expense (CAPEX) on-premises, but an operational<br>expense (OPEX) in the cloud.
云服务类别<br>Cloud service categories<br>
基础设施即服务 (IaaS)<br>Infrastructure as a Service (IaaS)<br>
CSP provides building blocks, like networking, storage and compute
CSP manages staff, HW, and datacenter
主要好处
<ul><li>Usage is metered</li><li>Eases scale(scale-up,out,and down)</li><li>Reduced energy and cooling costs</li></ul>
平台即服务 (PaaS)<br>Platform as a Service (PaaS)<br>
Customer is responsible for deployment and management of apps
CSP manages provisioning, configuration,hardware,and OS
key benefits
<ul><li>Core infrastructure updated by provider</li><li>Global collaboration for app development</li><li>Running multiple languages seamlessly</li></ul>
软件即服务 (SaaS)<br>Software as a Service (SaaS)<br>
Customer just configures features.
Customer has some responsibility in<br>access management and'data recovery
CSP is responsible for management,<br>operation, and service availability.
Key Benefits
<ul><li><span style="font-size: inherit;">Limited administration responsibility</span></li><li><span style="font-size: inherit;">Limited skills required</span></li><li><span style="font-size: inherit;">Service always up-to-date</span></li><li><span style="font-size: inherit;">Global access</span></li></ul>
共享责任模型
Serverless Architecture<br>EXample:<br>Function-as-service<br>
a cloud computing execution model where<br>the cloud provider dynamically manages<br>the allocation and provisioning of servers.
Serverless
hosted as pay-as-you-go model based on use.
Resources are stateless,servers ephemeral<br>and often capable of being triggered
Services<br>Integration
Provisioning of multiple business services is<br>combined with different IT services to<br>provide a single business solution.
云部署模型<br>Cloud deployment models<br>
公共云<br>public<br>
Everything runs on your cloud provider's hardware.
Advantages include scalability, agility, PAYG, no maintenance, and low skills
现收现付制(Pay As You Go)
私有云<br>private
A cloud environment in your own datacenter
A cloud environment dedicated to a single customer
Advantages include legacy support,control,and compliance
Enables greater control of upgrade cycles in legacy apps and some compliance scenarios
混合云<br>hybrid<br>
Combines public and private clouds,allowing you to run your apps in the right location
Advantages include flexibility in legacy,compliance,and scalability scenarios
Enables the organization to control the pace of public cloud adoption
社区云<br>community<br>
Similar to private clouds in that they are not open the general public
But they are shared by several related organizations in a common community
多云<br>multi-cloud<br>
Combines resources from two or more public cloud providers
Allows orgs to take advantage of service and price differences, but at the cost of added complexity
云共享考虑因素<br>Cloud shared considerations<br>
互操作性<br>interoperability<br>
Ability of one cloud service to interact with other cloud services by<br>exchanging information according to a prescribed method and obtain<br>predictable results.
3rd parties, other CSPs
Most CSPs have a cloud marketplace with certified apps and services
5个特征
Policy
Ability of two or more systems to interoperate while<br>complying with governmental laws,regulations,and<br>organizational mandates
Behavioral
Where the results of the use of the exchanged<br>information matches the expected outcome
Transport
The commonality of the communication between<br>cloud consumer and provider and other providers<br>(e.q.HTTP/S,and various message qucuing standards)<br>
Syntactic
Two or more systems to understand the other<br>systems'structure of exchanged information through<br>encoding syntaxes (e.q,JSON and XML)
Semantic data
Ability of systems exchanging information to<br>understand the meaning of the data model within the context<br>(c.g,virtual machines,containers,storage, and networking concepts)
可移植性<br>portability<br>
Ability to move applications and associated data between cloud<br>providers(CSPs),between legacy and cloud environments,or<br>between public and private cloud environments. <—— Hybrid cloud
<font color="#e74f4c">Cloud data portability</font> is the ability to easily move data from one <br>cloud service to another without the need to re-enter the data.<br>
3个特征
1. Syntactic<br>Transferring data from a source system to a target system<br>using formats that can be decoded bn the target system<br>with features like XML or Open Virtualization Format (OVF)<br>
2. Semantic<br>Transferring data from a source system to a target system<br>so that the data model is understood within the context of<br>the subject area by the target
3. Policy<br>Transferring data from a source system to a target system<br>so that governmental laws,regulations,and organizational<br>mandates are followed
<font color="#e74f4c">cloud applieation portability</font> is the ability to migrate an application from one <br>CSP to another or between a customer's environment and a cloud service.<br>Portability prevents 'vendor lock-in'<br>
可逆性<br>reversibility<br>
Process for cloud service customers to retrieve their data and<br>application artifacts AND
for the CSP to delete all cloud service customer data and contractually<br>specified cloud service derived data after an agreed period.
Customer access to data also appears in requlations (e.g.GDPR)
可用性<br>availability<br>
Systems and resource availability defines the success or failure of a cloud-based service.<br>
Check service-level SLAs and how multi-service SLAs are calculated.
安全性<br>security
<ul><li><span style="font-size: inherit;">Protection of customer data</span></li></ul><span style="font-size: inherit;">(access control,encryption)</span><br><ul><li><span style="font-size: inherit;">Protection of cloud applications</span></li><li><span style="font-size: inherit;">Protection of cloud infrastructure</span></li></ul>
隐私<br>privacy<br>
Data privacy in cloud computing allows collecting,storing transferring and sharing <br>the data over the cloud network <font color="#e74f4c">without putting the privacy of personal data at risk</font>.<br>
Prominent sources of privacy concerns<br>
Many times,customer does not have knowledge about how their <br>personal information is stored and processed in the cloud.<br>
Privacy vs Confidentiality
Data breaches have brought data privacy to the forefront as a <br>crucial factor in cloud computing.<br>
弹性<br>resiliency<br>
ability of a cloud services data center and its associated components,<br>including servers,storage,and so on, <font color="#e74f4c">to</font> <font color="#e74f4c">continue operating in the<br>event of a disruption</font>.
Look for a cloud provider with global presence, regional<br>redundancy and zone redundancy within region.
Azure<br>Geography<br>
A discrete market,typically containing<br>two or more regions,that preserves data<br>residency and compliance boundaries
Azure <br>Regions<br>
A set of datacenters deployed within a<br>latency-defined perimeter and connected<br>through a dedicated regional low-latency<br>network.
Region Pairs
A relationship between 2 Azure Regions<br>within the same geographic region for<br>disaster recovery purposes.
Availability Zones
Unique physical locations within<br>a region with independent<br>power,network,and cooling
Comprised of one or more datacenters
Tolerant to datacenter failures<br>via redundancy and isolation
性能<br>performance<br>
Ability of a service to remain responsive to requests to that service with<br>an acceptable level of response latency or processing time.
Public cloud delivers the <font color="#e74f4c">perception of unlimited scale</font> for than for less<br>than the cost a customer would incur in their own datacenter.
治理<br>governance<br>
Enforcement of security policies and regulatory requirements,often<br>through policy controls and regular audits.
CSPs often have <font color="#e74f4c">policy automation</font> in which restrictions can be defined<br>and automatically enforced throughout the service lifecycle.
维护和版本控制<br>maintenance and versioning<br>
服务等级和服务等级协议 (SLA)<br>service levels and service-level agreements (SLA)<br>
Stipulate <font color="#e74f4c">performance expectations</font> such as<br>maximum downtimes and often include penalties if<br>the vendor doesn't meet expectations.
可审计性<br>auditability<br>
Ability to provide clear documentation of the actions in a data<br>event. (e.g, data breach,unauthorized access)
Auditability is only possible with proper logging<br>providing accountability and traceability
Related activities
Accountability. Ability to <font color="#e74f4c">determine who caused the event</font>.This is<br>known sometimes called "identity attribution". (Requires non-repudiation)
Traceability. Ability to <font color="#e74f4c">track down all events</font> related to the<br>investigated event.
监管<br>regulatory<br>
外包<br>outsourcing<br>
Obtaining goods or a services,such as cloud services<br><font color="#e74f4c">from an external supplier</font>.
Introduces considerations including reversibility,<br>interoperability,and vendor lock-in.
相关技术的影响<br>Impact of related technologies<br>
数据科学<br>data science<br>
The study of data to extract meaningful insights for business
Combines principles and practices from multiple fields<br>(mathematics,artificial intelligence,computer engineering)<br>to <font color="#e74f4c">analyze large amounts of data</font>.
Helps data scientists to ask and answer questions about past,current,<br>and future events through evaluation of data.
Cybersecurity Data Science (CSDS)
The practice of applying data scienceto prevent,detect,and<br>remediate cybersecurity threats.
Data is collected from selected cyber security sources and then<br>analyzed to provide timely,data-driven patterns at scale.
机器学习<br>machine learning<br>
A subset of Al, computer algorithms that<br><font color="#e74f4c">improve automatically</font> through experience<br>and the use of data.
人工智能 (AI)<br>artificial intelligence (AI)
Focuses on accomplishing "smart"tasks<br>combining machine learning and deep<br>learning to emulate human intelligence
深度学习<br>Deep Learning<br>
a subfield of machine learning concerned with<br>algorithms inspired by the structure and function<br>of the brain called artificial neural networks.
区块链<br>blockchain<br>
Blockchain was originally the technology that<br>powered Bitcoin but has broader uses.
A distributed,public ledger that can be used to store financial,<br>medical, or other transactions. Anyone is free to join and participate
Does not use intermediaries such as banks and financial institutions.
Data is "chained together"with a block of data holding both the<br>hash for that block and the hash of the preceding block.
To create a new block on the chain,the computer that wishes to add<br>the block solves a cryptographic puzzle and sends the solution to<br>the other computers participating in that blockchain.
物联网 (IoT)<br>Internet of Things (IoT)<br>
A class of devices <font color="#e74f4c">connected to the internet</font> in<br>order to provide automation, remote control, or<br>Al processing in a home or business setting
Default settings
Every device that you put on your network to manage has a <font color="#e74f4c">default username</font> and a<br><font color="#e74f4c">default password</font>.
Often,the defaults are open and available for anybody to use.(wi-fi and loT)
Botnets and offensive security tools will find,and exploit devices with weak default<br>settings still in place.
Simply change defaults to shut down this attack vector!
Wareables
You might be wearing an loT device,such as a fitness tracker or smartwatch.
Facility automation.
In a large facility,loT devices able to manage the heating and AC,lights,and<br>motion/fire/water detection.
Enable facility managers to be able to configure automation and monitoring of<br>device function.
Sensors
Vehicles have very specialized sensors embedded,assisting with vehicle function
容器<br>containers<br>
A lightweight,granular,and portable way to package<br>applications for multiple platforms.
Reduces overhead of server virtualization by enabling<br>containerized apps to run on a shared OS kernel.
Share many concerns of server virtualization: <font color="#e74f4c">isolation</font><br>at host,process,network,and storage levels
量子计算<br>quantum computing<br>
A rapidly-emerging technology that harnesses the laws of quantum<br>mechanics to solve problems <font color="#e74f4c">too complex for classical computers</font>.
Replaces the binary one and zero bits of digital computing with<br>multidimensional quantum bits known as qubits.
No widespread use cases as of 2023,so little impact outside the<br>world of scientific research and testing.
A quantum computer could render all modern cryptography<br>completely ineffective and require the redesign of new,stronger<br>quantum encryption algorithms.
Quantum cryptography
the practice of harnessing the principles of quantum mechanics to improve security<br>and to detect whether a third party is eavesdropping on communications.
Leverages fundamental laws of physics such as the observer effect,which states that it<br>is impossible to identify the location of a particle without changing that particle.
Quantum Key Distribution
is the most common example of quantum cryptography.
by transferring data <font color="#e74f4c">using photons of light</font> instead of bits,a confidential key transferred<br>between two parties cannot be copied or intercepted secretly.
Post-Quantum Cryptography
Post-quantum cryptography refers to cryptographic algorithms (usually public-key<br>algorithms)that are thought to be secure against an attack by a quantum computer.
Post-quantum cryptography focuses on preparing for the era of quantum computing<br>by updating existing mathematical-based algorithms and standards.
The development of <font color="#e74f4c">new kinds of cryptographicapproaches</font> that can be implemented using<br>today's conventional computers.<br>..but will be impervious (resistant)to attacks from tomorrow's quantum computers.
Post-quantum algorithms arc somctimes called quantum-resistant"cryptographic algorithms
边缘计算<br>edge computing<br>
Some compute operations require processing<br>activities to occur locally,far from the cloud.
Common in various <font color="#e74f4c">Internet-of-things</font> scenarios,<br>like agricultural,science/space,military.
All the processing of data storage is closer to the<br>sensors rather than in the cloud data center.
With large network-connected device counts in varied locations,<br>data encryption,spoofing protection,and authentication are key
雾计算<br>fog computing
<font color="#e74f4c">Complements cloud computing</font> by processing<br>data from loT devices.
Often places gateway devices in the field to collect<br>and correlate data centrally at the edge.
Generally, brings cloud computing nearer to the<br>sensor to <font color="#e74f4c">process data closer to the device.</font>
Important to <b>speed processing time</b> and <b>reduce dependence</b> on<br>cloud/Internet connectivity mission critical situations (healthcare)
机密计算<br>confidential computing<br>
PROBLEM:Sensitive data must be encrypted in memory<br>before an app can process it,leaving the data vulnerable
Confidential computing solves for this by <font color="#e74f4c">isolating sensitive<br>data</font> in a protected CPU enclave during processing.
This CPU enclave is called a <font color="#e74f4c">trusted execution environment<br>(TEE)</font>, secured with embedded encryption keys.
Embedded attestation mechanisms ensure that the keys<br>are accessible only to authorized application code
DevSecOps
A portmanteau development,security,and<br>operations.
Integratessecurity as a shared responsibility<br>throughout the entire IT lifecycle.
Builds a security foundation into Devops initiatives.
Often includes automating some of the security<br>gates in the Devops process.
IaC<br>Infrastructure as Code<br>
is themanagement of cloud infrastructure<br>(networks,VMs,load balancers,and connection<br>topology) <font color="#e74f4c">described in code</font>
just as the same source code generates the same<br>binary,code in the lac model results in the same<br>environment every time it is applied.
laC is a key Devops practice and is used in<br>conjunction with Continuous Integration and<br>continuous Delivery (CI/CD). "the CI/CD pipeline"
1.3 了解与云计算相关的安全概念<br>Understand security concepts relevant to cloud computing<br>
密码学和密钥管理<br>Cryptography and key management<br>
TPM
A <font color="#e74f4c">chip</font> that resides on the motherboard of the device.
Multi-purpose, like storage and management of<br>keys used for full disk encryption (FDE) solutions.
Provides the operating system with access to keys,<br>but prevents drive removal and data access
HSM
a physical computing device that safeguards and<br>manages digital keys,performs encryption and<br>decryption functions for digital signatures,strong<br>authentication and other cryptographic functions.
Like a TPM,but are often removable or external devices
KEY MANAGEMENT STRATEGY<br>FOR ENCRYPTION KEY LIFECYCLE<br>
Generation
Encryption keys should be generated within a trusted,<br>secure cryptographic module
FIPS 140-2 validated modules provide<br>tamper resistance and key integrity
Distribution
Encryption keys should be <font color="#e74f4c">distributed securely</font> to prevent<br>theft/compromise during transit
BEST PRACTICE:<br>Encrypt keys with a separate encryption<br>key while distributing to other parties
Storage
Encryption keys must be <font color="#e74f4c">protected at rest</font> and should<br>never be stored in plaintext
This Includes keys in volatilc and persistent memory
Use
Clients (users trusted devices) will use keys for resource access<br>as access controls allow.
Acceptable use policy sets guardrails for data usage
Revocation
A process for revoking access at separation,policy breach,<br>device or key compromise.
EXAMPLE:<br>In PKI,you would revoke the certificate on the issuing Certificate Authority (CA)
Destruction
<b>Key destruction</b> is the removal of an encryption key from its<br>operational location.
<b>Key deletion</b> goes further and removes any info that could be<br>used to reconstruct that key.
EXAMPLE: (MS Intune,AirWatch)<br>MDM systems remove certificates from a device during device wipe or retirement.
Level of Protection
Encryption keys must be <font color="#e74f4c">secured at the same level</font> of control or higher<br>as the data they protect.
Sensitivity of the data dictates this level of protection,as defined in the<br>organization's data security policies.
Key Recovery<br>
Circumstances where you need to recover a key for a particular user, <font color="#e74f4c">without<br>that user's cooperation</font>,such as in termination or key loss.
Key Escrow<br>
Copies of keys held by a trusted third party in a secure environment,which can<br>aid in many of the other areas of key management.
Key Management System (KMS)
CSPs offer a cloud service for centralized secure storage and<br>access for <font color="#e74f4c">application secrets</font> called a vault.
A secret is anything that you want to control access to,such as <b>APl<br>keys</b>, <b>passwords,certificates,tokens</b>,or <b>cryptographic keys</b>.
Service will typically offer <b>programmatic access</b> via APl to support<br>DevOps and continuous integration/continuous deployment(CI/CD)
<font color="#e74f4c">Access control</font> at vault instance-level and to secrets stored within
Secrets and keys can generally be protected either by<br>software or by FIPS 140-2 Level 2 validated HSMs.
身份和访问控制<br>Identity and access control<br>
用户访问<br>user access<br>
Authentication and access management<br><ul><li>Focused on the manner in which users can access required resources</li></ul>
特权访问<br>privilege access<br>
<b>Privileged user management</b><br><ul><li>Managing privileged access accounts</li><li>Enforce Least Privilege and <font color="#e74f4c">Need to know</font></li><li>Separation of duties can provide effective risk mitigation</li></ul>
<b>PRIVILEGED ACCESS MANAGEMENT</b><br><ul><li>a solution that helps protect the privileged accounts within a tenant,preventing attacks</li><li>Native to some cloud identity providers today, and may include a just-in-time elevation Feature</li></ul>
服务访问<br>service access<br>
Centralized directory Services<br><ul><li>Active Directory and LDAP</li><li>Kerberos and NTLM authentication</li></ul>
Provisioning and Deprovisioning<br>
<ul><li>Standardize,streamline,and develop an efficient <font color="#e74f4c">account creation</font> process</li><li><b>Timely deprovisioning</b> eliminates access sprawl</li></ul>
MFA<br>Multi-factor Authentication<br>
<ul><li>Something you know(pin or password)</li><li>Something you have(trusted device)</li><li>Something you are(biometric)</li></ul>
PREVENTS:<br><ul><li>Phishing</li><li>Credential stuffing</li><li>Spear phishing</li><li>Brute force and reverse brute force attacks</li><li>Keyloggers</li><li>Man-in-the-middle (MITM)attacks</li></ul>
LIMITING ACCESS & DAMAGE
Need-to-know and the principle of least privilege are two<br>standard IT security principles implemented in secure networks.
They limit access to data and systems so that users and other<br>subjects have access only to what they require.
They help prevent security incidents<br>They help limit the scope of incidents when they occur.
PREVENTING FRAUD AND COLLUSION
Collusion is an agreement among multiple persons to<br>perform some unauthorized or illegal actions.
<b>Separation of duties</b><br>a basic security principle that ensures that no single person<br>can control all the elements of a critical function or system.
<b>Job rotation</b><br>employees are rotated into different jobs,or tasks are<br>assigned to different employees.
ACCOUNT TYPES
Service Account <br>aka "Service Principal"<br>
when software is installed on a computer or server,it may require<br>privileged access to run.
a lower-level administrative account,and the service account fits<br>the bill.
a service account is a type of administrator account used to run an<br>application. example:account to run an anti-virus application.
shared Account
When a group of people <font color="#e74f4c">performs the same duties</font>,such as<br>members of customer service,they can use a shared account.
when user-level monitoring,auditing,or non-repudiationare<br>required,you must eliminate the use of shared accounts.
数据和媒介清理<br>Data and media sanitization<br>
覆盖<br>overwriting<br>
加密擦除<br>cryptographic erase<br>
Less secure data destruction<br><br>Media is reusable with any of these methods<br>Data may be recoverable with forensic tools<br>
Erasing
performing a delete operation against a file,files,or media.<br>
Clearing (overwriting)
preparing media for reuse and ensuring data cannot be recovered using traditional<br>recovery tools.<br>
May use random data or zeros,one or multiple passes
Purging
a more intense form of clearing that prepares<br>media for reuse in less secure environments.
More secure data destruction
Crypto-shredding 'cryptographic erasure'
<ol><li>Data is encrypted with a strong encryption engine.</li><li>The keys used to encrypt the data are then encrypted using a different encryption engine.</li><li>Then,keys from the second round of encryption are destroyed.</li></ol>
PRO:Data cannot be recovered from any remnants.<br>CON:High CPU and performance overhead
Destroying Media Data
Degaussing
creates a strong magnetic field that erases<br>data on some media and destroy electronics.
Shredding
You can shred a metal hard drive into powder.
Pulverizing
Use a hammer and smash drive into pieces,or<br>drill through all the platters.
网络安全<br>Network security<br>
网络安全组<br>network security groups<br>
Network security groups provide an<br>additional layer of security for cloud resources
Act as a <font color="#e74f4c">virtual firewall</font> for virtual networks and resource<br>instances.(e.g.VMs,databases,subnets)
Carriesa list of security rules(IP and port ranges)that<br>allow or deny network traffic to resource instances.
Provides a virtual firewall for a collection of cloud<br>resources with the same security posture
Segmentation
Restricting services that are permitted to access or be accessible<br>from other zones using rules to control inbound/outbound traffic.
Rules are enforced by the IP address ranges of each subnet.
Within a virtual network,segmentation can be used to achieve<br>isolation.Port filtering through a network security group
APl inspection and integration
Representational State Transfer (REST)is the modern approach to<br>writing web service APIs.
Enables multi-language support,can handle multiple types of<br>calls,return different data formats.
APIs published by an organizations should include <font color="#e74f4c">encryption,<br>authentication,rate limiting,throttling,and quotas</font>.
流量检查<br>traffic inspection<br>
Packet capture in the cloud generally requires tools<br>designed for this purpose in the environment.
Traffic is often sent direct to resources and promiscuous<br>mode on a VM NIC not possible or effective.
地理围栏<br>geofencing<br>
Uses the Global Positioning System (GPS)or RFID to define<br>geographical boundaries.
Once the device is taken past the defined boundaries,the<br>security team will be alerted.
EXAMPLES:<br>Restrict access to systems and services based on where<br>the access attempt is being generated from.<br>Prevent devices from being removed from the company's<br>premises.
零信任网络<br>zero trust network<br>
Addresses the limitations of the legacy network perimeter-based security model.
Treats user identity as the control plane
Assumes compromise breach in verifying every request.
ZERO TRUST PRINCIPLES<br>
<b>Verify explicitly.</b> Always authenticate and authorize based on all available data points,<br>including user identity,location,device health,service or workload,data classification,<br>and anomalies.
<b>Use least privilege access</b>. Limit user access with just-in-time and just-enough-access<br>(JIT and JEA),risk-based adaptive policies,and data protection<br>
<b>Assume breach.</b> Segment access to minimize scope of impact.Verify end-to-end<br>encryption,use analytics to get visibility,drive threat detection,and improve defenses.
ZERO TRUST NETWORK ARCHITECTURE
-Network Security Group (NSG)<br>-Network Firewalls<br>-Inbound and outbound traffic filtering<br>-Inbound and outbound traffic inspection<br>-Centralized security policy management and enforcement
虚拟化安全<br>Virtualization security<br>
hypervisor 安全<br>hypervisor security<br>
容器安全<br>container security<br>
Container hosts are cloud-based virtual machines<br>(VM).This is where the containers run
Most CSPs offer <b>hosted Kubernetes service</b>,<br>handles critical tasks like health monitoring and<br>maintenance for you.Platform-as-a-Service
You pay only for the agent nodes within your clusters,<br>not for the management cluster.
Major CSPs also offer a monitoring solution that will<br>identify at least some potential security concerns
临时计算<br>ephemeral computing<br>
the practice of creating a virtual computing environment <font color="#e74f4c">as a need arises</font>.
environment is destroyed once needs are met,and resources are no longer needed
无服务器技术<br>serverless technology<br>
<font color="#e74f4c">Use API gateways as security buffers</font> (to avoid DDoS attacks)
Configure secure authentication(Oauth, SAML,OpenID Connect,MFA)
Separate dev and prod environments, implement least privilege
常见威胁<br>Common threats<br>
Data Breach<br>The result of a cyberattack<br>
<font color="#e74f4c">When sensitive data is stolen</font>,including personally identifiable<br>information (Pll)and protected health information(PHI).
Often due to poor application or database security design or<br>configuration,whereby data is exposed without proper authorization.
Preventable by following secure development practices and<br>adhering to recommendations in the secure data lifecycle
Data Loss<br>Sometimes called 'data leaks'<br>
When sensitive data is unknowingly <font color="#e74f4c">exposed to the public</font>
Often through a system or service misconfiguration or oversharing.
Malicious Insiders
<font color="#e74f4c">Disgruntled employees</font> can wreak havoc on a system.
Internal acts of disruption include<b> theft</b> and <b>sabotage</b>.
Traffic Hijacking
When attacks are designed to steal or<br>wedge themselves into the middle of a<br>conversation in order to gain control.
Abuse of cloud services
Consumers sometimes misuse their cloud services for<br>illegal or immoral activities.
Insufficient due diligence
Process/effort to collect and analyze information<br>before <font color="#e74f4c">making a decision</font> or conducting a transaction.
Failure to perform due diligence can result in a<br>due care violation.
DUE DILIGENCE VS DUE CARE
Due Diligence
Process/effort to collect and analyze<br>information before making a decision or<br>conducting a transaction.
Due care
Doing what a reasonable person would do in<br>a given situation.It is sometimes called the<br>"<font color="#e74f4c">prudent person rule</font>".
Together,these will reduce senior management's<br>culpability &(downstream) liability when a loss occurs.
Shared Technology Vulnerabilities
The underlying infrastructure of the public cloud was not originally<br>designed for the types of multitenancy in the public cloud
Modern virtualization software bridges most of the gaps
<ul><li>Cloud infrastructure can still be vulnerable to insider threats</li><li>Unintentional misconfigurations are also a concern</li><li>To a lesser degree,disruptive attacks of scale (DoS,DDos) and "noisy neighbors"</li></ul>
安全卫生<br>Security hygiene<br>
打补丁<br>patching<br>
基线<br>baselining<br>
Configuration Management
ensures that systems are configured similarly,<font color="#e74f4c">configurations are known and documented</font>.
<b>Baselining</b> ensures that systems are deployed with a common baseline<br>or starting point,and imaging is a common baselining method.
Change Management
helps reduce outages or weakened security from unauthorized changes to the baseline configuration.
<b>Versioning</b> uses a labeling or numbering system to track changes in<br>updated versions of baseline (image,application,system,etc).
Patch Management<br>aka 'update Management'<br>
The process of identifying, acquiring, installing, and verifying patches for products and systems.
It is a function <b>included in change management</b>.
<b>Patches</b> <font color="#e74f4c">correct security and functionality problems</font> in software and firmware.
An <b>applicability assessment</b> is performed to determine<br>whether a particular patch or update applies to a system.
1.4 了解安全云计算的设计原则<br>Understand design principles of secure cloud computing<br>
云安全数据生命周期<br>Cloud secure data lifecycle<br>
Create
Can be created by users<br>a user creates a file
Can be created by systems<br>a system logs access
Store
To ensure it's handled properly, it's important to ensure data is <font color="#e74f4c">classified</font> as soon as possible.
Ideally,data is encrypted at rest
Use
Data should be protected by adequate <font color="#e74f4c">security controls </font>based on its classification.
Share
refers to anytime data is in use or <font color="#e74f4c">in transit</font> over a network
Archive
archival is sometimes needed to comply with <font color="#e74f4c">laws or regulations </font>requiring the retention of data.
Destory
When data is no longer needed, it should be destroyed in such a way that it is <font color="#e74f4c">not readable nor recoverable</font>
DATA STATES
PROTECTING DATA AT REST
Storage Service Encryption
CSP storage providers usually protect data at rest by automatically encrypting before<br>persisting it to managed disks,object,file,or queue storage.
Full Disk Encryption
helps you encrypt Windows and Linux laas VMs disks using <font color="#e74f4c">BitLocker</font> (Windows)and<br><font color="#e74f4c">dm-crypt</font> feature of Linux to encrypt OS and data disks.
Transparent data encryption (TDE)
Helps <font color="#e74f4c">protect SQL Database and data warehouses</font> against threat of malicious activity<br>with real-time encryption and decryption of database,backups,and transaction log<br>files at rest without requiring app changes.
Some database platforms also provide row-level encryption<br>column-level encryption,or data masking
重要的数据角色
Data Owner
Holds the legal rights and complete control over a single piece of data.
Usually a member of <font color="#e74f4c">senior management</font>.Can delegate some<br>day-to-day duties.CANNOT delegate total responsibility!
Data custodian
Responsible for safe custody,transport,and storage of data,and<br>implementation of business rules,technical controls.(CIA,audit trails,etc)
Usually someone in the <font color="#e74f4c">IT department</font>.Does not decide what<br>controls are needed,but does implement controls for data owner
GDPR中的数据角色
Data Processor
A natural or legal person,public authority,<br>agency,or other body,which processes personal data solely<br>on behalf of the data controller.
Data Controller
The person or entity that controls processing of the data.
其他角色
Data Subject
Refers to any individual <font color="#e74f4c">person who can be identified</font>,directly or<br>indirectly,via an identifier
Identifiers may include name,an ID number,location data,or via<br>factors specific to the person's physical,physiological,genetic,<br>mental,economic,cultural or social identity.
Data Steward
Ensure the data's context and meaning are understood,and <font color="#e74f4c">business<br>rules</font> governing the data's usage.
Use that knowledge to ensure the data they are responsible for is<br>used as intended.
基于云的业务连续性 (BC) 和灾难恢复 (DR) 计划<br>Cloud-based business continuity (BC) and disaster recovery (DR) plan<br>
BCP (Business Continuity Plan)<br>
the overall organizational plan for <b>"how-to" continue business</b>.
DRP(Disaster Recovery Plan)<br>
the plan for recovering from a disaster impacting IT<br>and <b>returning the IT infrastructure to operation</b>.
BCP vs DRP
<b>BCP</b> focuses on the <font color="#e74f4c">whole business</font><br><b>DRP</b> focuses more on the <font color="#e74f4c">technical aspects of recovery</font>
BCP will cover communications and process more broadly<br>BCP is an umbrella policy and DRP is part of it
云中灾难恢复
<b>Region Pairs</b> addresses <font color="#e74f4c">site-level failure</font><br>Region pairs are 300+miles apart,selected by CSP
<b>Availability Zones</b> address <font color="#e74f4c">datacenter failures</font> within a cloud region<br>A CSP region (e.q.East Us)includes multiple datacenters
<b>Availability sets</b> address <font color="#e74f4c">rack-level failures</font> within a regional datacenter<br>Consists of two or morc 'fault domains' for power,network,etc.
业务影响分析 (BIA)<br>Business impact analysis (BIA)<br>
成本效益分析<br>cost-benefit analysis<br>
A cost-benefit analysis lists the <font color="#e74f4c">benefits</font> of the decision alongside their corresponding costs.
CBA can be <font color="#e74f4c">strictly quantitative</font>: adding the financial benefits and subtracting the associated costs to<br>determine whether a decision will be profitable.
投资回报率 (ROI)<br>return on investment (ROI)<br>
功能安全要求<br>Functional security requirements<br>
Functional vs Non-Functional security requirements
Functional security requirements
Define a system or its component and <font color="#e74f4c">specifies what it must do</font>.<br>Captured in use cases,defined at a <b>component level</b>.
EXAMPLE:application forms must protect against injection attacks.
Non-functional security requirements
Specify the system's quality, <font color="#e74f4c">characteristics,or attributes</font>.<br>Apply to the whole system (<b>system level</b>)
EXAMPLE:security certifications are non-functional.
可移植性<br>portability<br>
互操作性<br>interoperability<br>
供应商锁定<br>vendor lock-in<br>
不同云类别的安全注意事项和责任<br>Security considerations and responsibilities for different cloud categories<br>
基础设施即服务 (IaaS)<br>Infrastructure as a Service (IaaS)<br>
<ul><li>VM attacks</li><li>Virtual network</li><li>Hypervisor attacks</li><li>VM-based rootkits</li><li>Virtual switch attacks</li><li>Colocation</li><li>DoS attack</li></ul>
共享责任模型
平台即服务 (PaaS)<br>Platform as a Service (PaaS)<br>
<ul><li>System and Resource Isolation</li><li>User-Level Permissions</li><li>Access Management</li><li>Protection Against</li><li>Malware,Backdoors, and Trojans</li></ul>
软件即服务 (SaaS)<br>Software as a Service (SaaS)<br>
<ul><li>Data Segregation</li><li>Data Access and Policies</li><li>Web Application Security</li></ul>
Attacks
VIRTUALIZATION-FOCUSED ATTACKS
VM Escape
where an attacker gains access to a VM,then attacks either the host<br>machine that holds all VMs,the hypervisor,or any of the other VMs.
Protection: ensure patches and hypervisor and VMs are always up to date,guest<br>privileges are low.Server-level redundancy and HIPS/HIDS protection also effective.
VM Sprawl
When <font color="#e74f4c">unmanaged VMs</font> have been deployed on your network.Because IT doesn't know<br>it is there,it may not be patched and protected,and thus more vulnerable to attack
Avoidance: enforcement of security policies for adding VMs to the<br>network,as well as periodic scanning to identify new virtualization hosts.
APPLICATION ATTACKS
Rootkit (escalation of privilege)
freely available on the internet and exploit known vulnerabilities in various<br>operating systems enabling attackers to elevate privilege.
keep security patches up-to-date, anti-malware software, EDR/XDR
Back Door
undocumented command sequences that allow individuals with knowledge<br>of the back door to bypass normal access restrictions.<br>often used in <b>development and debugging</b>.
countermeasures:<br>Firewalls,anti-malware,network monitoring,code review
NETWORK ATTACKS
Denial of-Service
is a <font color="#e74f4c">resource consumption attack</font> intended to prevent legitimate activity<br>on a victimized system.
Distributed Denial of-Service
a Dos attack utilizing multiple compromised computer systems as<br>sources of attack traffic.
COUNTERMEASURES
firewalls,routers,intrusion detection (IDS),SIEM,<br>disable broadcast packets entering/leaving,disable echo replies,patching
TYPES OF DDOS ATTACKS
Network<br>
volume-based attacks targeting<font color="#e74f4c"> flaws in network protocols</font>,often using botnets,<br>using techniques such as UDP,ICMP flooding,or SYN flooding (TCP-based).
Application<br>
exploit weaknesses in the <font color="#e74f4c">application layer (Layer 7) </font>by opening connections and<br>initiating process and transaction requests that consume finite resources like disk<br>space and available memory.
Operational Technology (OT)
Targets the weaknesses of <font color="#e74f4c">software and hardware devices</font> that control systems in<br>factories,power plants,and other industries,such as loT devices.
Often target weaknesses using the network and application techniques described<br>above.
COUNTERMEASURES
IDS,IPS,rate-limiting,firewall ingress/egress filters
云设计模式<br>Cloud design patterns<br>
SANS 安全原则<br>SANS security principles<br>
架构完善的框架<br>Well-Architected Framework<br>
云安全联盟 (CSA) 企业架构<br>Cloud Security Alliance (CSA) Enterprise Architecture<br>
ARCHITECTURE
Cloud Service Providers
<ul><li>AWS Well-Architected Framework</li><li>Azure Well-Architected Framework</li><li>Google Cloud Architecture Framework</li></ul>
Industry Groups
<ul><li>Enterprise Architecture Reference Guide (Cloud Security Alliance)</li><li>Cloud Computing Reference Architecture (NIST)</li></ul>
Focus on architecture more than security
SECURITY
Cloud Service Providers
<ul><li>Microsoft Cybersecurity Reference Architecture</li><li>AWS Security Reference Architecture</li><li>Google Cloud Security Foundations Guide</li></ul>
Industry Groups
<ul><li>Enterprise Cloud Security Architecture (SANS)</li><li>Security Technical Reference Architecture (CISA)</li><li>Cloud Computing Security Reference Architecture (NIST)</li></ul>
DevOps 安全<br>DevOps security<br>
Devops relies heavily on deployment automation for<br>Continuous integration/continuous delivery (Cl/CD)
Technical
<ul><li>Automated software scanning</li><li>Automated vulnerability scanning</li><li>Web application firewall</li><li>Software dependency management</li><li>Access and activity logging</li><li>Application performance management</li></ul>
Administrative
<ul><li>Developer application security training</li><li>Documented policies and procedures</li><li>Code review,approval gates</li></ul>
1.5 评估云服务供应商<br>Evaluate cloud service providers<br>
根据标准进行验证<br>Verification against criteria<br>
国际标准组织/国际电子技术委员会 (ISO/IEC) 27017<br>International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 27017<br>
Provides guidelines for <b>information security controls</b> applicable to the<br>provision and use of cloud services
Provides cloud-based guidance on several ISO/IEC 27002 controls,along<br>with seven cloud controls that address:
<ol><li><span style="font-size: inherit;"><font color="#e74f4c">Who is responsible for what</font> between the cloud service provider and the cloud customer</span></li><li><span style="font-size: inherit;">The removal/return of assets when a contract is terminated</span></li><li><span style="font-size: inherit;">Protection and separation of the customer's virtual environment</span></li><li><span style="font-size: inherit;">Virtual machine configuration</span></li><li><span style="font-size: inherit;"><font color="#e74f4c">Administrative operations and procedures</font> associated with the cloud environment</span></li><li><span style="font-size: inherit;">Customer monitoring of activity within the cloud</span></li><li><span style="font-size: inherit;">Virtual and cloud network environment alignment</span></li></ol>
支付卡行业数据安全标准 (PCI DSS)<br>Payment Card Industry Data Security Standard (PCI DSS)<br>
a widely accepted set of policies and procedures intended to<br>optimize the security of credit,debit and cash card transactions
created jointly in 2004 by four major credit-card companies:Visa,<br>MasterCard,Discover and American Express
BASED ON 6 MAJOR OBJECTIVES
<ul><li>a <font color="#e74f4c">secure network</font> must be maintained in which transactions can be conducted</li><li>cardholder information must be protected wherever it is stored</li><li><font color="#e74f4c">systems should be protected</font> against the activities of malicious hackers</li><li>cardholder data should be protected physically as well as electronically</li><li>networks must be constantly <font color="#e74f4c">monitored and regularly tested</font></li><li>a formal information security policy must be defined,maintained,and followed</li></ul>
系统/子系统产品认证<br>System/subsystem product certifications<br>
通用标准 (CC) (ISO/IEC15408)<br>Common Criteria (CC)<br>
Enable an <font color="#e74f4c">objective evaluation to validate</font> that a particular<br>product or system satisfies a defined set of security requirements
Ensures customers that security products they purchase have<br>been thoroughly tested by <font color="#e74f4c">independent third-party testers </font>and meets customer requirements.
The certification of the product only certifies product capabilities.
Designed to provide assurances for security claims by vendors
If misconfigured or mismanaged,software is no more<br>secure than anything else the customer might use.
联邦信息处理标准 (FIPS) 140-2<br>Federal Information Processing Standard (FIPS) 140-2<br>
Established to aid in the protection of digitally stored <font color="#e74f4c">unclassified,<br>yet sensitive,information</font>
Developed by NIST,for use in computer systems by non-military<br>American government agencies and government contractors
FIPS Security Levels
Level 1: Lowest level of security.<br>Level 2: Specifies the security requirements for cryptographic modules that protect sensitive information.<br>Level 3: Requires physical protections to ensure a high degree of confidence that any attempts to tamper are evident and detectable
D2 云数据安全<br>Cloud Data Security<br>
2.1 描述云数据概念<br>Describe cloud data concepts<br>
云数据生命周期阶段<br>Cloud data life cycle phases<br>
Create
Store
Use
Share
Archive
Destroy
数据分散<br>Data dispersion<br>
A core principle of business continuity says that important<br>data should always be stored in more than one location
<font color="#e74f4c">Data dispersion is easier in the cloud</font> because the CSP owns<br>the underlying complexity that delivers site-level resiliency.
Cloud storage for laas includes different levels of storage<br>redundancy,including:
<b>Local</b> -replicas within a single datacenter
<b>Zone</b> -replicas to multiple datacenters within a region
<b>Global</b> region level resiliency (replicas to backup region
数据流<br>Data flows<br>
A <b>data flow diagram (DFD)</b> is useful to gain visibility and<br>ensure that adequate security controls are implemented
BENEFITS
Decreased development time and faster deployment of new<br>system features. and with reduced security risk!
Visibility into data movement,critical for regulatory compliance,<br>where data security is often mandated in law.
Some compliance frameworks <font color="#e74f4c">require DFDs</font> to capture specific<br>information,such as the geographic location of data flows or<br>ownership of systems where data is flowing.
BOTTOM LINE:Creating the DFD can be both a risk assessment<br>activity and a crucial compliance activity.
2.2 设计和实现云数据存储架构<br>Design and implement cloud data storage architectures<br>
存储类型<br>Storage types<br>
长期<br>long-term<br>
临时<br>ephemeral<br>
原始存储<br>raw storage<br>
IAAS
<ul><li><b>Raw Storage</b>.Physical media,allows a VM access a storage LUN</li><li><b>Volume storage</b>.Attached as laaS Instance (EC)</li><li><b>object storage</b>.S3 storage bucket,Azure storage</li></ul>
PAAS
<ul><li><b>Structured</b>.Relational databases (RDBMS)</li><li><b>Unstructured</b>.Big data</li></ul>
SAAS
<ul><li><b>Information Storage and Mgmt</b>.Data entered via the web interface</li><li><b>Content/File Storage</b>.File-based content</li><li><b>Ephemeral Storage</b>.It used for any temporary data such as cache,buffers,session data,swap volume,etc.</li><li><b>Content Delivery Network (CDN)</b>.Geo-distributed content for (better UX)</li></ul>
对存储类型的威胁<br>Threats to storage types<br>
Universal threats from the perspective of the CIA Triad
Unauthorized Access
User accessing data storage without proper<br>authorization presents security concerns
Customer must implement <font color="#e74f4c">proper access control</font><br>CSP must provide <font color="#e74f4c">adequate logical separation</font>
Unauthorized Provisioning
Primarily a cost and operational concern
Ease of use can lead to unofficial use,<br>unapproved deployment,and unexpected costs
Shadow IT a common issue
Loss of Connectivity
Loss of connectivity for any reason,whether<br>network connectivity,access controls,<br>authentication services,etc.
OTHER THREATS
Jurisdictional issues<br>
<font color="#e74f4c">Data transfer between countries</font> can run afoul of<br>legal requirements.
Privacy legislation bars data transfer to countries<br>without adequate privacy protections
Denial of service<br>
In the event a network connection is severed<br>between the user and the CSP.<br><font color="#e74f4c">CSPs are better prepared to defend</font> against DDoS attacks.<br>
Data corruption/destruction
Human error in data entry,malicious insiders,<br>hardware and software failures,natural disasters<br>rendering data or storage media unusable.
Defenses:least privilege,RBAC,offsite data backups
Theft or media loss<br>
In the cloud, CSPs retain responsibility for<br>preventing the loss of physical media through<br><font color="#e74f4c">appropriate physical security controls</font>
Malware and ransomware<br>
Ransomware not only encrypts data stored on<br>local drives but also seeks common cloud<br>storage locations like Saas apps.
COUNTERMEASURES
<ul><li>Back up your computer</li><li>Store backups separately</li><li>File auto-versioning</li></ul>
PREVENTION
<ul><li><span style="font-size: inherit;">Update and patch computers</span></li><li><span style="font-size: inherit;">Use caution with web links</span></li><li><span style="font-size: inherit;">Use caution with email attachments</span></li><li><span style="font-size: inherit;">Verify email senders</span></li><li><span style="font-size: inherit;">Preventative software programs</span></li><li><span style="font-size: inherit;">User awareness training</span></li></ul>
Improper disposal
Ensuring that hardware that has reached the<br>end of its life is properly disposed of in such a<br>way that data cannot be recovered.
CSP responsible for hardware disposal
Regulatory Compliance
Certain cloud service offerings may not meet<br>all the organization's compliance requirements,<br>which leads to <b>two security concerns</b>:
First are the consequences of noncompliance<br>like <font color="#e74f4c">fines</font> or <font color="#e74f4c">suspension of business operations</font>.
Second is the reason for the compliance<br>requirements-<font color="#e74f4c">data protection<br></font>Requirements may include use of specific<br>encryption standards,handling and retention<br>
2.3 设计和应用数据安全技术和策略<br>Design and apply data security technologies and strategies<br>
加密和密钥管理<br>Encryption and key management<br>
Symmetric
Relies on the use of <b>a single shared secret<br>key</b>.<font color="#e74f4c">Lacks support for scalability</font>,easy key<br>distribution,and nonrepudiation
Asymmetric
<b>Public-private key pairs</b> for communication<br>between parties.Supports scalability,easy<br>key distribution,and nonrepudiation
Trust model
A model of <font color="#e74f4c">how different certification authorities trust each other</font> and how<br>their clients will trust certificates from other certification authorities.
The four main types of trust models that are used with public key<br>infrastructure(PKI)are bridge,hierarchical,hybrid,and mesh.
Key escrow
Addresses the possibility that a cryptographic key may be lost.
The concern is usually with symmetric keys or with the private key in<br>asymmetric cryptography.
If that occurs,then there is no way to get the key back,and the user<br>cannot decrypt messages.
Organizations establish key escrows to enable recovery of lost keys.
ENCRYPTION KEY LIFECYCLE
Generation
Encryption keys should be generated within a trusted, secure cryptographic module
Should use strong, random keys using cryptographically sound inputs like random numbers
FIPS 140-2 validated modules provide tamper resistance and key integrity
Distribution
Encryption keys should be <font color="#e74f4c">distributed securely</font> to prevent theft/compromise during transit
Plan for securely transferring symmetric keys and distributing keys to the key escrow agent
BEST PRACTICE:<br>Encrypt keys with a separate encryption key while distributing to other parties
Storage
Encryption keys must be <font color="#e74f4c">protected at rest</font> and should never be stored in plaintext<br>This Includes keys in volatile and persistent memory<br>
Storing keys in a secure manner, whether encrypted in a key vault or on a physical device
Also consider handling in the process of storing copies for retrieval if a key<br>is ever lost (known as key escrow)
Use
Using keys securely,primarily focused on access controls and accountability
Revocation
A process for <font color="#e74f4c">revoking access</font> at separation,policy breach, device or key compromise.
EXAMPLE:<br>In PKI,you would revoke the certificate on the issuing Certification Authority (CA)
A process for archiving keys no longer needed for routine use, in case needed for existing data.
Destruction
<b>Key destruction</b> is the removal of an encryption key from its operational location.
<b>Key deletion</b> goes further and removes any info that could be used to reconstruct that key.
EXAMPLE:(MS Intune,AirWatch)<br>MDM systems remove certificates from a device during device wipe or retirement.
KEY MANAGEMENT IN THE CLOUD
CSP-managed or self-managed
Key storage
Many CSPs offer FIPS compliant virtualized HSMs to securely<br>generate,store,and control access to cryptographic keys.
Organizations that use <font color="#e74f4c">multiple cloud providers</font> or need to retain<br>physical control over key management may need to implement a<br><font color="#e74f4c">bring-your-own-key (BYOK)strategy</font>.
OTHER CLOUD ENCRYPTION SCENARIOS
Storage-level encryption
Providesencryption of data as it is written to storage,utilizing<br>keys that are controlled by the CSP.
Volume-level encryption
Provides encryption of data written to volumes connected to specific<br>VM instances,utilizing keys controlled by the customer.
Examples:Bitlocker (Windows),DM-Crypt (Linux)
Object-level encryption
Encryption of objects as they are written to storage,in which case the<br>CSP likely controls the keys and could potentially access the data.
File-level encryption
Implemented in client apps,such as word processing apps like Microsoft<br>Word or collaboration apps like SharePoint
Will vary by app and CSP platform
Application-level encryption
Implemented in an application typically using object storage
Data entered by user typically encrypted before storage
Database-level encryption
<font color="#e74f4c">Transparent data encryption</font> (database files,logs,backups),<br>column-level or row-level encryption,or <font color="#e74f4c">data masking</font>
Will vary by RDBMS platform (MSSQL, MySQL, PostgresQL)
散列<br>Hashing<br>
A <font color="#e74f4c">one-way function</font> that scrambles plain text to produce a unique message<br>digest.
Conversion of a string of characters into a shorter fixed-length value
VS Encryption<br>
Encryption is a two-way function;what is encrypted can be decrypted with<br>the proper key.
HASH FUNCTION REOUIREMENTS
<ol><li><span style="font-size: inherit;">They must allow input of </span><font color="#e74f4c" style="font-size: inherit;">any length</font><span style="font-size: inherit;">.</span></li><li>Provide <font color="#e74f4c">fixed-length</font> output.</li><li>Make it relatively easy to compute the hash function for <font color="#e74f4c">any input</font>.</li><li>Provide <font color="#e74f4c">one-way </font>functionality.</li><li>Must be <font color="#e74f4c">collision free</font>.</li></ol>
数据混淆<br>Data obfuscation<br>
屏蔽<br>masking<br>
when only partial data is left in a data field.<br>for example,a credit card may be shown as<br>************1234
Commonly implemented within the database tier,but<br>also possible in code of frontend applications
匿名化<br>anonymization<br>
Anonymization.The process of removing all relevant data<br>so that it is impossible to identify original subject or person.
If done effectively,then <font color="#e74f4c">GDPR is no longer relevant</font> for the<br>anonymized data.
Good only if you don't need the data
Anonymization is sometimes called <font color="#e74f4c">de-identification</font>
伪名化<br>Pseudonymization<br>
de-identification procedure using<br>pseudonyms (aliases)to represent other data.
Can result in <font color="#e74f4c">less stringent requirements</font> than would<br>otherwise apply under the GDPR.
use if you <font color="#e74f4c">need data</font> and want to reduce exposure
令牌化<br>Tokenization<br>
where meaningful <font color="#e74f4c">data is replaced with a token</font> that is generated randomly,and the<br>original data is held in a vault.
Stateless,stronger than encryption,keys not local
Tokenization goes further than pseudonymization,replacing your pseudonym with an unrecognizable token
伪名化<br>Pseudonymization<br>
<font color="#e74f4c">de-identification</font> procedure in which personally identifiable information (Pll)fields<br>within a data record are replaced by one or more artificial identifiers,or pseudonyms.
Reversal requires access to another data source
数据丢失防护(DLP)<br>Data loss prevention (DLP)<br>
a system designed to <font color="#e74f4c">identify,inventory and control the use of data</font> that an organization deems sensitive.
spans several categories of controls including detective,preventative,and corrective.
Policies can be typically applied to email,SharePoint,<br>cloud storage,removeable devices,and databases
is a way to protect sensitive information and prevent its inadvertent disclosure.
can identify,monitor,and automatically protect sensitive information in documents
monitors for and alerts on for potential breaches,policy violations like oversharing
Protection travels with the document,file,or other data,preventing local override of DLP protections
密钥、机密和证书管理<br>Keys, secrets and certificates management<br>
Keys
are most often used for encryption operations and can be used to <font color="#e74f4c">uniquely identify a user or system</font>.
Keys should be stored in a tool that implements encryption and requires a strong passphrase or MFA to access.<br>In the cloud,a key vault<br>
Secrets
often a <font color="#e74f4c">secondary authentication mechanism</font> used to verify that a communication has not been hijacked or intercepted.
Certificates
are used to <font color="#e74f4c">verify the identity</font> of a communication party and also be used for <font color="#e74f4c">asymmetric encryption</font> by providing a trusted public key.
often used to encrypt a shared session key or other symmetric key for secure transmission.
KEY MANAGEMENT IN THE CLOUD
Key Management Services (KMS)
CSPs offer a cloud service for centralized secure storage and access for <font color="#e74f4c">application secrets</font> called a vault.
A secret is anything that you want to control access to,such as APl keys,passwords,certificates,tokens,or cryptographic keys.
Service will typically offer programmatic access via APl to support DevOps and continuous integration/continuous deployment(CI/CD)
Access control at vault instance-level and to secrets stored within.
Secrets and keys can generally be protected either by software or by FIPS 140-2 Level 2 validated HSMs.
Digital Signatures
Digital signatures are similar in concept to handwritten signatures on printed documents that identify individuals,but they provide more security benefits.
is an encrypted hash of a message,encrypted with the sender's private key
in a signed email scenario,it provides three key benefits:
Authentication
This positively identifies the sender of the email.
Ownership of a digital signature secret key is bound to a specific user
Non-repudiation
The sender cannot later deny sending the message.
This is sometimes required with online transactions
Integrity
provides assurances that the message has not been modified or corrupted.
Recipients know that the message was not altered in transit
PUBLIC KEY INFRASTRUCTURE (PKI)
Key management
management of cryptographic keys in a cryptosystem.
<font color="#e74f4c">Operational considerations</font> include dealing with the generation,exchange,<br>storage,use,crypto-shredding (destruction)and replacement of keys.
<font color="#e74f4c">Design considerations</font> include cryptographic protocol design,key servers,<br>user procedures,and other relevant protocols.
Certificate authority (CA)
Certification Authorities create digital certificates and own the policies
PKI hierarchy can include a single CA that serves as root and issuing,but<br>this is not recommended.
In a single-layer PKI hierarchy,if the server is breached no certificate,including the root,can be trusted
TYPES OF CERTIFICATES
User<br>
Used to <font color="#e74f4c">represent a user's digital identity</font><br>
In most cases,a user certificate is mapped back to a user account.
Root
A trust anchor in a PKI environment is the root certificate from which the <font color="#e74f4c">whole chain of trust is derived</font>.<br>this is the root CA.<br>
Domain validation
A Domain-Validated (DV)certificate is an X.509 certificate that proves the ownership of a domain name.
Extended validation
Extended validation certificates <font color="#e74f4c">provide a higher level of trust </font>in identifying the entity that is using the certificate.
Commonly used in the financial services sector.
chain of trust
Subordinate CA
<font color="#e74f4c">Regularly issue certificates</font>,making it difficult for them to stay offline as often as root CAs.
Do have the ability to revoke certificates,making it easier to recover from any security breach that does happen
If the issuing CA is breached,its certificate can be revoked and a new one issued.
A single compromised CA does not result in compromise of the root.
Certificate revocation list(CRL)
Contains information about any certificates that have been revoked by a<br>subordinate CA due to compromises to the certificate or PKI hierarchy.
<font color="#e74f4c">CAs are required to publish CRLs</font>,but it's up to certificate consumers if they<br>check these lists and how they respond if a certificate has been revoked.
CERTIFICATE REVOCATION
Revoking (invalidating) a certificate before expiration
Certificate is effectively cancelled,and certificate serial number added to the <font color="#e74f4c">certificate revocation list(CRL)</font>.
BUT,parties checking the certificate to verify identity or authenticity must check with issuing authority on validity
Two potential options for tracking revocation:ask for the <font color="#e74f4c">CRL</font> or if available,<font color="#e74f4c">OCSP</font> endpoint/service.
If the other client/server does not check the CRL or OCSP for certificate validity,they may accept an invalid certificate as valid!
Online Certificate Status Protocol (OCSP)
Offers a <font color="#e74f4c">faster way to check a certificate's status</font> compared to downloading a CRL.
With OCSP,the consumer of a certificate can submit a request to the OCSP endpoint to obtain the status of a specific certificate.
Certificate signing request(CSR)
Records identifying information for a person or device that owns a private key as well as information on the corresponding public key.
It is the message that's sent to the CA in order to get a digital certificate created.
CN(common name)
the Fully Qualified Domain Name (FQDN)of the entity (e.g.web server)
2.4 实现数据发现<br>Implement data discovery<br>
结构化数据<br>Structured data<br>
Datacontained in rows and columns such as an Excel spreadsheet or relational database.
Often includes a <font color="#e74f4c">description of its format</font> known as a <font color="#e74f4c">data model</font> or <font color="#e74f4c">schema</font>,which is an abstract view of the data's format in a system.
Data structured as elements,rows,or tuples is given context through the schema.
Discovery methods include:
<b>Metadata</b>,or <font color="#e74f4c">data that describes data</font>,is a critical part of discovery in structured data.
<b>Semantics</b>,or the <font color="#e74f4c">meaning of data</font>,is described in the schema or data model and explains relationships expressed in data.
非结构化数据<br>Unstructured data<br>
Data that <font color="#e74f4c">cannot be contained in a row-column database</font> and does not have an associated data model.
Discovery occurs through <font color="#e74f4c">content analysis</font>,which attempts parse all data in a storage location and identify sensitive information.
Content analysis(discovery)methods include:
<b>Pattern matching</b>,which <font color="#e74f4c">compares data to known formats</font> like credit card numbers.<br>DLP tools often have pre-defined 'sensitive data types'<br>
<b>Lexical analysis</b> attempts to find data meaning and context to discover sensitive info that may not conform to a specific pattern.
<b>Hashing</b> attempts to identify known data <font color="#e74f4c">by calculating a hash</font> of files and comparing it to a known set of sensitive file hashes.<br>Only good for data that does not change frequently!<br>
半结构化数据<br>Semi-structured data<br>
A combination of structured and unstructured data.
Typically,<font color="#e74f4c">content is unstructured</font>,but may contain metadata to help organize the data.
Fluid,but organizable by properties or metadata
This mix of data types will require a combination of discovery methods and tooling capable of<br>discovery in these comingled data types
数据位置<br>Data location<br>
The location of data will impact both its discoverability and the choice of tools used to perform discovery.
Tools must be able to access data to perform the scanning and analysis needed in the discovery process.
Not all cloud solutions may offer a local agent for on-premises.
Network-based DLP may not analyze all traffic between on-premises endpoints and cloud
An optimal DLP approach will discover data in <b>on-premises</b> and <b>in cloud</b> repositories,as well as <b>in transit</b>!
Tools must be able to scan unstructured data within structured datasources,such as relational databases.<br>EXAMPLE: Problem description inside a helpdesk ticket stored in a SQL database<br>
Both unstructured and structured in same repository will <font color="#e74f4c">increase tool cost and complexity</font> and may present classification challenges
Metadata-Based Discovery
A <font color="#e74f4c">list of traits and characteristics</font> about specific data elements or sets.
Often automatically created at the same time as the data
Label-Based Discovery
Based on examining labels created by the data owners during the Create phase.<br>or in bulk with a scanning tool<br>
Can be used with databases (structured data)but is more commonly used with file data.
2.5 计划和实现数据分类<br>Plan and implement data classification<br>
数据分类策略<br>Data classification policies<br>
COMMON SENSITIVE DATA TYPES
Personally Identifiable Information (PIl)
any information that can identify an individual (name,SSN,birthdate/place,biometric records,etc)
Protected Health Information (PHI)
health-related information that <font color="#e74f4c">can be related to a specific person</font>
Regulated by HIPAA/HITRUST
Cardholder Data
allowable storage of information related to credit and debit cards and transactions.
Defined and regulated by PCI DSS
DATA POLICIES
Data classification
<font color="#e74f4c">Labeling/tagging</font> of data based on type,like personally identifiable info (PIl),protected health info(PHI),etc.
Data retention
Ensures that legal and compliance issues are addressed.
Regulatory compliance
For legal and compliance reasons,you may need to keep certain data for different periods of time.
EXAMPLES:<br>Some financial data needs to be retained for 7 years<br>Some medical data may need to be retained up to 20-30 years.
DATA CLASSIFICATION
A process for <font color="#e74f4c">categorization of data</font> and defining the<br>appropriate controls.Categories include:
<ul><li>Data type (format,structure)</li><li>Jurisdiction and other legal constraints</li><li>Ownership,Context</li><li>Contractual or business constraints</li><li>Trust levels and source of origin</li><li>Value,sensitivity,and criticality</li><li>Retention and preservation</li></ul>
数据映射<br>Data mapping<br>
Informs organization of the locations where data is present within applications and storage.
Brings understanding that <font color="#e74f4c">enables</font> implementation of security controls and classification polices.<br>usually precedes classification and labeling<br>
数据标记<br>Data labeling<br>
Labeling requirements that <font color="#e74f4c">apply consistent markings</font> to sensitive data should accompany classification.
Often applied through classification policies, providing a target for data protection.
Often applied in bulk using classification tools
CLOUD SECURE DATA LIFECYCLE<br>The Cloud Security Alliance model<br>
Create
Store
Use
Share
Archive
Destroy
2.6 设计和实现信息权限管理 (IRM)<br>Design and implement Information Rights Management (IRM)<br>
IRM
IRM programs enforce data rights,provisioning access,and <font color="#e74f4c">implementing access control models</font>
Often implemented to <font color="#e74f4c">control access</font> to data designed to be shared but not freely distributed.
Can be used to <font color="#e74f4c">block specific actions</font>,like print, copy/paste,download,and sharing
Provide <font color="#e74f4c">file expiration</font> so that documents can no longer be viewed after a specified time
Always includes a cloud service,but may include a local agent
Many popular Saas file sharing platforms implement these concepts as sharing options,<br>which allow the document owner to specify which users can view,edit,download,share
目标<br>Objectives<br>
数据权限<br>data rights<br>
访问<br>provisioning<br>
访问模型<br>access models<br>
Persistence
access control/ability to enforce restrictions <font color="#e74f4c">must follow the data</font>.
Protection must Follow the document or data wherever it travels
Dynamic policy control
IRM solution must provide a way to update the restrictionseven after a document has been shared.
Expiration
IRM tools can enforce time-limited access to data as a form of access control.
Ability to expire/revoke access,require user check-in
Continuous audit trail
IRM solution must ensure that protected documents <font color="#e74f4c">generate an audit trail</font> when users interact with protected documents.
Required For accountability,non-repudiation
Interoperability
IRM solutions must offer support for users across these different system types.
Support for different Os,device types,and apps is important
适当的工具<br>Appropriate tools<br>
颁发和撤销证书<br>issuing and revocation of certificates<br>
IRM tools comprise a variety of components necessary to provide policy enforcement and other attributes of the enforcement capability.
<b>Centralized service</b> for <font color="#e74f4c">identity proofing and certificate issuance </font>store of revoked certificates,and for unauthorized identify information access.
<b>Secrets storage</b>: IRM solutions require local storage for <font color="#e74f4c">encryption keys,tokens or digital certificates</font> used to validate users and access authorizations.
Local storage requires protection primarily for data integrity to <font color="#e74f4c">prevent tampering</font> with the material used to enforce IRM
<font color="#e74f4c">Must prevent local modification</font> of access controls and credentials.<br>Otherwise,a user might modify the permissions granted to extend their access beyond what the data owner originally specified
2.7 规划和实施数据保留、删除和归档策略<br>Plan and implement data retention, deletion and archiving policies<br>
数据保留策略<br>Data retention policies<br>
Retention is driven by security policies and regulatory requirements
Audits or lawsuit may require production of some data
EXAMPLE: Sarbanes Oxley requires tax returns are kept for 7 years,and payroll and bank statements are forever!
数据删除程序和机制<br>Data deletion procedures and mechanisms<br>
crypto-shredding <br>'cryptographic erasure'<br>
1、Data is encrypted with a strong encryption engine.
2 The keys used to encrypt the data are then encrypted using a different encryption engine.
3 Then,keys from the second round of encryption are destroyed.
PRO: Data cannot be recovered from any remnants<br>CON: High CPU and performance overhead
数据归档程序和机制<br>Data archiving procedures and mechanisms<br>
Refers to placing data in long-term storage for a variety of purposes
The optimal approach in the cloud differs in several respects from the on-premises cquivalent
Key elements of data archiving in the cloud
<ul><li><span style="font-size: inherit;">Data Encryption</span></li><li><span style="font-size: inherit;">Data Monitoring</span></li><li><span style="font-size: inherit;">eDiscovery and Retrieval</span></li><li><span style="font-size: inherit;">Backup and DR Options</span></li><li><span style="font-size: inherit;">Data Format</span></li><li><span style="font-size: inherit;">Media Type</span></li></ul>
Data Encryption
Encryption policy should consider which media is used,and data search and restoration needs,and regulatory obligations.
Access controls and encryption are important to protect data integrity (by preventing unauthorized access)
Data Monitoring
Data stored in the cloud tends to be replicated as part of storage resiliency or BC/DR.
To maintain <font color="#e74f4c">data governance</font>,it is required that all data access and movements be <font color="#e74f4c">tracked and logged</font>.
Monitoring to ensure all security controls are being applied properly throughout the data lifecycle.
Accountability,traceability,auditability should be maintained
eDiscovery and Retrieval
Archive data may be <font color="#e74f4c">subject to retrieval</font> according to certain parameters such as dates,subjects,and authors.
The archiving platform should provide the ability to perform eDiscovery on the data to determine which data should be retrieved.
Backup and DR Options<br>
All requirements for data backup and restore should be specified and clearly documented
Business continuity and disaster recovery (BCDR)plans are updated and aligned with whatever procedures are implemented
Both resiliency to disaster (ensuring archive data availability) and knowledge/control of data replication arc important
Data Format and Media Type
This is an important consideration because it may be kept for an extended period.
Format needs to be<font color="#e74f4c"> secure,accessible,and affordable</font>
Media type should support the other data archiving requirements,but physical media concerns fall to the CSP
依法保留<br>Legal hold<br>
Protecting any documents that can be used in <font color="#e74f4c">evidence</font> in legal proceedings from being altered or destroyed
Data protection suites in cloud platforms often have a feature to ensure <font color="#e74f4c">immutability</font>
In data protection software,generally implements <font color="#e74f4c">permanent retention</font> until a human authorizes release
2.8 设计和实施数据事件的可审计性、可追溯性和责任性<br>Design and implement auditability, traceability and accountability of data events<br>
事件源的定义和事件属性的要求<br>Definition of event sources and requirement of event attributes<br>
身份<br>identity<br>
互联网协议 (IP) 地址<br>Internet Protocol (IP) address<br>
地理位置<br>geolocation<br>
数据事件的日志记录、存储和分析<br>Logging, storage and analysis of data events<br>
Logs are worthless if you do nothing with the log data.They are made valuable only by <b>review</b>.
That is,they are valuable only if the organization makes use of them toidentify activity that is unauthorized or compromising.
<font color="#e74f4c">SIEM(Security Information Event Monitoring)</font>tools can help to<br>solve some of these problems by offering these key features:
<ul><li>Log centralization and aggregation</li><li>Data integrity</li><li>Normalization</li><li>Automated or continuous monitoring</li><li>Alerting</li><li>Investigative monitoring</li></ul>
Log centralization and aggregation
Rather than leaving log data scattered around the environment on various hosts,the SIEM platform can gather logs from a variety of sources,including:
operating systems,applications,network appliances,user devices,providing a single location to support investigations.
Data integrity
The SIEM should be on a separate host with its own access control, preventing any single user from tampering.
Normalization
SIEMs can normalize incoming data to ensure that the data from a variety of sources is presented consistently.
Automated or continuous monitoring
Sometimes referred to as correlation,SIEMs use algorithms to evaluate data and <font color="#e74f4c">identify potential attacks</font> or compromises.
Alerting
SIEMs can automatically generate alerts such as emails or tickets when action is required based on analysis of incoming log data
Investigative monitoring
When manual investigation is required,the SIEM should provide support capabilities such as querying log files,generating reports.
Broad SIEM visibility across the environment means better context in log searches,security investigations
监管链和不可抵赖性<br>Chain of custody and non-repudiation<br>
CHAIN OF CUSTODY
Tracks the movement of evidence through its collection,safeguarding,and analysis lifecycle
Functions and importance
Provides <font color="#e74f4c">evidence integrity</font> through convincing proof evidence was not tampered with in a way that damages its reliability.
Documents key elements of evidence movement and handling,including:
<ul><li>Each person who handled the evidence</li><li>Date and time of movement/transfer</li><li>Purpose evidence movement/transfer</li></ul>
What if evidence is left unattended or handled by unauthorized parties?
Then,criminal defendants can claim the data was altered in a way that incriminates<br>them,and thus the evidence is no longer reliable.
Foundational principle of evidence handling in legal proccedings!
NON-REPUDIATION
Non-repudiation is <b>the guarantee that no one can deny a transaction</b>.
Methods to provide non-repudiation
Systems enforce nonrepudiation through the <font color="#e74f4c">inclusion of sufficient<br>evidence in log files</font>,including unique user identification and timestamps.
<b>Digital signatures</b> prove that a digital message or document was not<br>modified-intentionally or unintentionally-from the time it was signed.
Based on asymmetric cryptography (a public/private key pair)
It's the digital equivalent of d handwritten signature or stamped seal.
Multiple accounts make non-repudiation more difficult<br><font color="#e74f4c">Shared accounts</font> make non-repudiation virtually impossible!
Accountability
is maintained for individual subjects using <font color="#e74f4c">auditing.</font>
logs record user activities and users can be held accountable for their logged actions.
directly <font color="#e74f4c">promotes good user behavior</font> and compliance with the organization's security policy.
Security audits and reviews
help ensure that management programs are effective and being followed.
commonly associated with account management practices to <font color="#e74f4c">prevent violations</font> with least privilege or need-to-know principles.
can also be performed to <font color="#e74f4c">oversee</font> many programs and processes
<ul><li>patch management</li><li>vulnerability management</li><li>change management</li><li>configuration management</li></ul>
EVENT SOURCES EVENT ATTRIBUTES
OWASP provides a comprehensive set of definitions and guidelines for identifying,labeling,and collecting data events
Ensures events are <font color="#e74f4c">useful and pertinent</font> to applications and security,whether in a cloud or traditional data center
Definition of Event Sources
laas Event sources
Within an laas environment,the cloud customer has the <font color="#e74f4c">most access and visibility</font> into system and infrastructure logs of any cloud service model.
Because the cloud customer has nearly full control over their compute environment,including system and network capabilities, <font color="#e74f4c">virtually all logs <br>and data events</font> should be exposed and available for capture.<br>
Paas Event Sources
A Paas environment does not offer or expose the same level of customer access to infrastructure and system logs as laas
However,the same level of detail of logs and events is available at the application level.
Saas Event Sources
Because in a Saas environment the cloud service provider is responsible for theentire infrastructure and application,the<br>amount of log data available to the cloud customer is less.
Customer responsibility is limited to access control,shared responsibility for <font color="#e74f4c">data recovery</font>,and <font color="#e74f4c">feature </font>configuration
The WHO,WHAT,WHERE,and WHEN of logging from OWASP
Sufficient user ID attribution should be accessible,or it may be impossible to determine who performed a specific action at a specific time.<br>This is called <font color="#e74f4c">identity attribution</font>.<br>
WHO
Source address
User identity
WHAT
Type of event
Severity of event
Security-relevant event flag<br>(if log contains non-security events)<br>
Description
WHERE
Application identifier (name,version,etc.)
Application address
Service
Geolocation
Window/for/page (URL and HTTP method)
Code location (script or module name)
WHEN
Log date and time (international format)
Event date and time
Interaction identifier
D3 云平台和基础架构安全<br>Cloud Platform and Infrastructure Security<br>
3.1 理解云基础架构和平台组件<br>Comprehend cloud infrastructure and platform components<br>
物理环境<br>Physical environment<br>
There are infrastructure components that are common to all cloud service delivery models
Most components are all physically located with the CSP, but many are accessible via the network
The CSP takes on customer datacenter facilities,infrastructure management responsibilities
In the shared responsibility model,some elements of operation are shared by the CSP and the customer.
PHYSICAL ENVIRONMENT CONSIDERATIONS
For <font color="#e74f4c">physical security</font>,standard measures such as locks,security personnel,lights,fences,visitor check-in procedures.
<font color="#e74f4c">Logical access controls</font> Identity and access management (IAM),single sign-on (SSO)provider,multifactor authentication (MFA)and logging.
Controls for <font color="#e74f4c">data confidentiality and integrity</font> like any cloud customer, but with much broader controls.
EXAMPLE
Ensuring that communication lines are not physically compromised by locating telecommunications equipment<br>inside a controlled area of the CSP's building or campus.
网络与通信<br>Network and communications<br>
IaaS
Customer is responsible for configuring the VMs, virtual network,and guest Os security as if the<br>systems were on-premises
CSP responsible for physical host,physical storage,and physical network
PaaS
CSP is responsiblefor the physical components, the internal network,and the tools provided.
Cheaper for customer,but less control
SaaS
Thecustomer remains responsible for <font color="#e74f4c">configuring access</font> to the cloud service for their users,as well<br>as shared responsibility for <font color="#e74f4c">data recovery</font>
CSP owns physical infrastructure,as well as network and communication
计算<br>Compute<br>
Reservation
a minimum resource that is guaranteed to a customer
Limits
maximum utilization of compute resource by a customer (e.g.VM)
limits are allowed to change dynamically based on current conditions and consumption
Shares
a weighting given to a particular VM used to calculate percentage-based access to pooled resources when there is contention.
In cases of shortage host scoring determines who gets capacity
虚拟化<br>Virtualization<br>
The security of the hypervisor is always the responsibility of the CSP.
The virtual network and virtual machine may be the responsibility of either the CSP or the customer.
Risks associated with virtualization
<ul><li>Flawed hypervisor can facilitate inter-VM attacks</li><li>Network traffic between VMs is not necessarily visible</li><li>Resource availability for VMs can be impacted</li><li>VMs and their disk images are simply files,can be portable and movable</li></ul>
Security recommendations for the hypervisor
<ul><li>Install all updates to the hypervisor as they are released by the vendor.</li><li>Restrict administrative access to the management interfaces of the hypervisor.</li><li>Capabilities to monitor the security of activity occurring between guest operating systems(VMs).</li></ul>
Security recommendations for the guest OS
<ul><li>Install all updates to the guest OS promptly.</li><li>Back up the virtual drives used by the guest os on a regular basis</li></ul>
Customer responsibility,though CSP may provide tools
VIRTUALIZATION NETWORK SECURITY
The virtual network between the hypervisor and the VM is also a potential attack surface.
Responsibility for security in this layer is <font color="#e74f4c">often shared</font> between the CSP and the customer.
These components include virtual network,virtual switches,virtual firewalls,virtual IP addresses,etc.
VIRTUALIZATION-FOCUSED ATTACKS
VM Escape
Where an <font color="#e74f4c">attacker gains access</font> to a VM,then attacks either the host machine that holds all VMs,the hypervisor,or any of the other VMs.
or malicious user <font color="#e74f4c">breaks the isolation between VMs</font> running on a hypervisor by gaining access outside their VM.
<b>Protection</b>:<br>
<ul><li>Ensure patches on hypervisor and VMs are always up to date.</li><li>Ensure guest privileges are low,server-level redundancy and HIPS/HIDS protection.</li></ul>
存储<br>Storage<br>
CSP Responsibilities
<b>physical protection</b> of data centers and the storage infrastructure they contain.
<b>security patches and maintenance</b> of underlying data storage technologies and other data services they provide
CUSTOMER Responsibilities<br>
<b>properly configuring</b> and using the storage tools.<br>
<b>logical security and privacy</b> of data they store in the CSP's environment.
assessing the adequacy of these controls and properly configuring and using the controls available.
ensuring adequate protection for the data at rest and in motion based on the capabilities offered by the CSP.
Configuring secure access,whether private or public.
In the cloud,the customer loses control of the physical medium where data is stored but <font color="#e74f4c">retains responsibility</font> for data security and privacy.
CUSTOMER CHALLENGES
<font color="#e74f4c">Inability to securely wipe physical storage</font> and possibility of another tenant being allocated the same previously allocated storage space
Customer retains responsibility for secure deletion
<b>Compensating controls</b> for the lack of physical control<br>of the storage medium include:
only storing data in an encrypted format<br>
retaining control of the keys needed to decrypt the data
Togcther,these permit crypto-shredding when data is no longer needed,rendering any recoverable fragments useless.
管理平面<br>Management plane<br>
<font color="#e74f4c">Provides the tools</font> (web interface and APIs)necessary to configure,monitor,and control your cloud environment.
Provides virtual management options equivalent to the physical administration options a legacy data center would provide.
e.g. powering VMs on/off,provisioning VM resources,migrating a VM
You interact with the management plane through toolsincluding the CSP's cloud portal,PowerShell or other command Tine,or client SDKs
Control Plane and Data Plane
<b>Control plane</b> is what you are calling when you create top-level cloud resources<br>with ARM Bicep(Azure),CloudFormation (AWS)or Terraform (Infrastructure-as-Code)
<b>Data plane</b> performs operations on resources created through the control plane
Key interfaces of the management plane
<b>Cloud Portal</b>
the main web interface for the CSP platform.
Azure portal,AWS Management console,Google Cloud console
Scheduling
the ability to stop/start a resource at a scheduled time
Instance Scheduler or Lambda (AWs),Azure Automation or Functions
Orchestration
automating processes to manage resources,services,and workloads,and Infrastructure-as-Code (lac)deployments.
CloudFormation (AWs),Azure DevOps,Cloud Build (GCP)
Maintenance
update,upgrade,security patching,etc.
Secure the management plane interfaces with multi-factor auth (MFA),role-based access control(RBAC),and role management.
3.2 设计安全的数据中心<br>Design a secure data center<br>
逻辑设计<br>Logical design<br>
In the now legacy co-location (colo)scenario,customers were separated at the <font color="#e74f4c">server rack or cage-level</font>.
In logical data center design in the cloud,customers utilize software and services provided by the CSP.
The logical design of the cloud infrastructure should:
<ul><li>create tenant partitioning or isolation</li><li>limit and secure remote access</li><li>monitor the cloud infrastructure</li><li>allow for the patching and updating of systems</li></ul>
租户分区<br>tenant partitioning<br>
Logical isolation in CSP multitenancy makes cloud computing more affordable but create some security and privacy concerns.
If isolation between tenants is breached,customer data is at risk
In the public cloud,tenant partitioning is largely logical.
Customers are sharing capacity across the CSP datacenter, including physical components.
<b>CSP and tenant share responsibility</b> for implementing and enforcing controls that address the unique multitenant risks of the public cloud.
访问控制<br>access control<br>
A single point of access makes access control simpler and facilitates<br>monitoring,but any single point can become a failure point as well.
<b>Hybrid identity </b>(single login for on-premises and cloud)<br>can simplify identity and access management (IAM)
One method of access control is to <font color="#e74f4c">federate a customer's existing IAM system</font> with their CSP tenant
Another method to facilitate IAM between cloud and on-premises<br>resources is <font color="#e74f4c">identity as a service (IDaas)</font>
Local and Remote Access controls
<b>Remote Desktop Protocol(RDP)</b>:the native remote access protocol for Windows operating systems.
<b>Secure Shell (SSH)</b>:the native remote access protocol for Linux operating<br>systems,and common for remote management of network devices.<br>
<b>Secure Terminal/Console-Based Access</b>:a system for secure local access.<br>A KVM (keyboard video mouse)system with access controls
<b>Jumpboxes</b>:a bastion host at the boundary of lower and higher security zones.<br>CSPs offer services For this:Azure Bastion,AWS Transit Gateway
<b>Virtual clients</b>:software tools that allow remote connection to a VM for use as if it is your local machine.<br>e.q Virtual Desktop Infrastructure (VDI)for contractors
物理设计<br>Physical design<br>
位置<br>location<br>
One of the first considerations in datacenter design is location
<ul><li>Availability of affordable,stable, resilient electricity</li><li>Natural disaster exposure (flood, hurricane,tornado,etc.)</li><li>Availability of high-speed, redundant Internet connectivity</li><li>Availability of other utilities</li></ul>
<ul><li>Physical site security (vehicular approaches,visibility)</li><li>Location relative to existing customer datacenters (BCDR)</li><li>Geographic location relative to customers</li></ul>
购买或建造<br>buy or build<br>
Building your own datacenter from scratch and buying an existing facility each have their advantages and disadvantages
Build
<ul><li>Requires significant investment to build a robust data center</li><li>Offers the most control over datacenter design</li><li>Requires knowledge and skill to match quality of BUY option</li></ul>
Buy
<ul><li>Generally,lower cost of entry (especially in shared scenario)</li><li>Less flexibility in service design (limited to what provider offers)</li><li>Shared datacenters come with additional security challenges</li></ul>
PHYSICAL SECURITY
Know the challenges of physical security,which belong to the CSP
<ul><li>A strong fence line of sufficient height and construction</li><li>Lighting of facility perimeter and entrances</li><li>Video monitoring and alerting</li><li>Electronic monitoring for tampering</li></ul>
<ul><li>Visitor access procedures with controlled entry points</li><li>Interior access controls(badges,key codes,secured doors)</li><li>Fire detection and prevention systems</li><li>Protection of sensitive assets,systems,wiring closets,etc.</li></ul>
DATACENTER TIER STANDARD
<b>Uptime simply</b> measures the amount of time a system is running
<b>Availability</b> encompasses availability of the infrastructure,applications,and services<br>Generally expressed as a number of 9's, such as five nines or 99.999%availability<br>
The <b>Uptime Institute</b> publishes specifications for physical and environmental redundancy,<br>expressed as tiers,that organizations can implement to achieve high availability (HA).
TIER I:Basic Site Infrastructure
involves no redundancy and the <font color="#e74f4c">most amount of downtime</font> in the event of unplanned maintenance or an interruption.
must have an <font color="#e74f4c">uninterruptible power supply</font> that can handle brief power outages,as well as sags and spikes
must also have dedicated cooling equipment that can run on 24/7,and a generator to handle extended power outages
expected to provides 99.671%availability
TIER II:Redundant Site Infrastructure
provides partial redundancy,meaning an unplanned interruption will not necessarily cause an outage
adds redundant components for important <font color="#e74f4c">cooling and power</font> systems
facilities must also have the ability to <font color="#e74f4c">store additional fuel</font> to support the generator
expected to provide 99.741% availability
TIER IIl:Concurrently Maintainable Site<br>Infrastructure
adds even more redundant components
has a major advantage in that it <font color="#e74f4c">never needs to be shut down</font> for maintenance
enough redundant components that any component can be taken offline for maintenance and data center continues to run
expected to provides 99.982%availability
TIER IV:Fault-Tolerant Site Infrastructure
can withstand either <font color="#e74f4c">planned or unplanned activity</font> without affecting availability
this is achieved by eliminating <font color="#e74f4c">all single points of failure</font>
and requires fully redundant infrastructure, including dual commercial power feeds, dual backup generators
expected to provide 99.995%availability
环境设计<br>Environmental design<br>
供暖<br>Heating<br>
通风与空调 (HVAC)<br>Heating, Ventilation, and Air Conditioning (HVAC)<br>
An HVAC failure can <font color="#e74f4c">reduce availability</font> of computing resources,just like a power failure.
Customer reviews of the CSP should include the adequacy and redundancy of HVAC systems.
A number of documents can help assess HVAC concerns, such as a <font color="#e74f4c">SOC-2 Type ll report</font>.
Because of the confidential info in a SOC 2 Type ll,some CSPs will require a nondisclosure agreement (NDA) prior to sharing.
A routine review of the most current SOC 2 report is a critical part of a cloud customer's due diligence in CSP evaluation.
多供应商通路连接<br>multi-vendor pathway connectivity<br>
Connectivity to data center locations from more than one internet service provider (ISP) is multi-vendor pathway connectivity
Using multiple vendors is a proactive way for CSPs to <font color="#e74f4c">mitigate the risk of losing network connectivity</font>.
Best practice for CSPs or data centers is dual-entry,dual-provider for high availability:<br>Two providers,entering the building From separate locations<br>
Cloud customers should consider multiple paths for communicating with their cloud vendor.
设计弹性<br>Design resilient<br>
Resilient desigins are engineered to respond positively to changes or disturbances,such as natural disasters or man-made disturbances
A few examples of resilient design:
<ul><li>HA firewalls,active-passive or active-active</li><li>Multi-vendor pathway connectivity</li><li>Web server farm (behind redundant load balancers)</li><li>Database cluster (Windows Linux cluster feature)</li></ul>
Service-level resiliency requires identifying single points of failure throughout the servicc chain
3.3 分析与云基础架构和平台相关的风险<br>Analyze risks associated with cloud infrastructure and platforms<br>
风险评估<br>Risk assessment<br>
The <b>risk management process</b> is fundamental to information security,since the entire practice involves <b>mitigating and managing risks</b> to data and information systems.
识别<br>identification<br>
Identifying risks is the first step in managing them and begins with identification of the organization's valuable assets
once assets are identified: Security practitioners and risk managers can then begin to<br>identify potential causes of disruption to the assets
RISK FRAMEWORKS
Several exist that provide processes and procedures for designing and implementing a risk management framework.
<b>ISO/IEC 31000:2018</b>, Risk Management Guidelines
<b>NIST SP 800-37</b>, Guide for Applying the Risk Management Framework to Federal Information Systems
分析<br>analysis<br>
Analysis seeks to answer two questions:
What will the impact be if that goes wrong?<br>Single loss cxpectancy (SLE) - $
How likely is it to happen?<br>Annualized Rate of Occurrence (ARO) - decimal
Annualized Loss Expectaney(ALE)
The possible yearly cost of all instances of a specific realized threat against a specific asset.
FORMULA ALE =SLE x ARO
Exposure factor (EF) - %
SLE = Asset value (AV) x EF
Analysis of CSP Risks
Analysis of a CSP or cloud solution and the associated risks involves many departments and focus areas:
<ul><li>Business units</li><li>Vendor management</li><li>Privacy</li><li>Information security</li></ul>
CSP operations should also be considered,but most major CSPs are audited for ISO/IEC 27001,27017,27018
ISO/IEC 27001<br>
<font color="#e74f4c">a framework for policies and procedures</font> that include legal,physical,and technical<br>controls involved in an organization's information risk management processes.
ISO/IEC 27017<br>
<font color="#e74f4c">security standard developed for cloud service</font> providers and users to make a<br>safer cloud-based environment and reduce the risk of security problems.
ISO/IEC 27018
the first international standard about the <font color="#e74f4c">privacy in cloud computing services</font>
Authentication Risk
Customer-managed or CSP-managed?
Data Security
How a vendor encrypts data at rest,strength of the cryptography, and access controls that prevent unauthorized access by cloud<br>service personnel or other tenants.
Supply Chain Risk Management (SCRM)
Evaluation of vendor security policies and processes.
Most CSPs <font color="#e74f4c">do not allow direct auditing of their operations</font>,due to<br>the number of customers they support.
Instead,they provide standardized reports and assurance<br>material regarding their security practices,such as
<ul><li>SOC 2 report</li><li>ISO 27001 certification</li><li>Specialized reports for regulated data</li></ul>
HIPPA,FedRAMP<br>ISO/IEC 27017,27018
common cloud Risks
One risk that has been discussed is the organization <font color="#e74f4c">losing ownership</font> and full control over system hardware assets.
Careful selection of CSPs and the development of SLAs and other contractual agreements are critical to limiting risk
Organizations can <font color="#e74f4c">balance cost savings with risk </font>by building a system on top of laaS or Paas,rather than utilizing a Saas solution.<br>laas means more control,more responsibilities,and risks<br>
Geographic dispersion of the CSP data centers
If the cloud service is properly architected,a disruption at one datacenter should not cause a complete outage.
Customers must verify the resilience and continuity controls in place at the CSP
Downtime
Resilience for network disruptions can be built in multiple ways, such as multivendor connectivity,zones and regions.
Compliance
Privacy data in some jurisdictions cannot be transferred to other countries,so data dispersion is inappropriate.
General technology risk
Cloud systems are not immune to standard security issues like cyberattacks.
CSP defenses should be documented and tested,and customers aware of their configuration responsibilities
RISK TYPES
External
Different <font color="#e74f4c">threat actors</font>,ranging from competitors and script kiddies to criminal syndicates and state actors.
Capabilities depend on tools,experience,and funding.
Other external environmental threats,such as fire and floods,and man-made threats,such as the accidental deletion of data or users.
Internal
A <font color="#e74f4c">malicious insider</font>,a threat actor who may be a dissatisfied employee someone overlooked for a promotion).
Another internal threat is <font color="#e74f4c">human error</font>,which is when data is accidentally deleted.
云漏洞、威胁和攻击<br>Cloud vulnerabilities, threats and attacks<br>
Organizations could be at risk if the CSP's <font color="#e74f4c">public-facing infrastructure</font> comes under attack
Cloud-Specific Risks<br>The CSA Egregious 11<br>
data breaches
Unintentional loss/oversharing is a 'data leak'
Loss of sensitive data (Pll,PHI,intellectual property) <font color="#e74f4c">due to security breach</font>.
Misconfiguration and inadequate change control
Software can offer the most secure configuration options,but if it is not properly set up,then the resulting system will have security issues.
Remediate risk through change and confiquration management
Lack of cloud security,architecture,and strategy
As organizations migrate to the cloud,some overlook security,or fail to consider their <font color="#e74f4c">obligations in the shared responsibility model</font>.
Insufficient identity,credential access,and key management
The public cloud offers benefits over legacy on-premises environments but can also bring additional complexities.
Well-architected identity and access management (IAM),encryption, secret and key management are different than on-prem and essential
Account hijacking
Credential theft,abuse,and/or elevation to carry out an attack.
Phishing is the most common approach
Insider threat
Disgruntled employees,employee mistakes,and unintentional over-sharing.
Job rotation,privileged access management,auditing,security training
Insecure interfaces and APls
Customers failing to secure access to systems gated by APls,web consoles,etc.
Controls include MFA,RBAC,and Key-based APl access
Weak control plane
Weaknesses in the elements of a cloud system that enable cloud environment configuration and management (web console,CLl,and APIs)
Most CSPs offer reference architectures to ensure customers secure and isolate their dev/test/prod environments and data
Metastructure and applistructure failures
Vulnerabilities in the operational capabilities that CSPs make available,like APls for accessing various cloud services.
If the CSP has inadequately secured these interfaces,any resulting solutions built on top of those services will inherit these weaknesses.
<b>Metastructure</b>.The protocols and mechanisms that provide the interface between the cloud layers,enabling management and configuration.
<b>Applistructure</b>.Applications deployed in the cloud and the underlying application services used to build them.
e.g.Paas Features like message queues,functions,and message services
Limited cloud usage visibility
Refers to when organizations experience a significant reduction in visibility over their information technology stack.
This is because in some models,the CSP own the stack!
Abuse and nefarious use of cloud services
While the low cost and high scale of compute in the cloud is an advantage to enterprises,it is an opportunity for attackers to execute disruptive attacks at scale
Makes executing DDos and phishing attacks easier,so CSPs must implement mitigating security controls for these risks
风险缓解策略<br>Risk mitigation strategies<br>
<font color="#e74f4c">Selecting a qualified CSP</font> is an essential first step.
The next step is designing and architecting with security in mind.
Security should be considered at every step starting with design!
The next risk mitigation tool is encryption,and data should be encrypted at rest and in-transit.
Storage and database encryption at rest,TLS and VPN in-transit
Finally,<font color="#e74f4c">ongoing monitoring and management</font> to maintain posture
Major CSPs provide the ability to manage and monitor confiquration security,and to monitor changes to cloud services,and track usage
3.4 计划和实现安全控制<br>Plan and implementation of security controls<br>
物理和环境保护<br>Physical and environmental protection<br>
内部部署<br>on-premises<br>
The primary consideration is the <b>site location</b>,as it will have an impact on both physical and environmental protections.
Cloud data centers share requirements with traditional<br>colocation providers or individual data centers,including:
<ul><li>ability to <b>restrict physical access</b> at multiple points</li><li>ensuring a clean and stable <b>power supply</b></li><li>adequate <b>utilities</b> like water and sewer</li><li>the availability of an adequate <b>workforce</b></li></ul>
These are customer responsibilities in on-premises (private)cloud,and CSP responsibility in the public cloud
SITE SELECTION FACILITY DESIGN
Visibility,composition of the surrounding area,area accessibility,and the <font color="#e74f4c">effects of natural disasters</font>.
Customers should focus on selecting CSP datacenter locations to meet <font color="#e74f4c">disaster recovery</font> and <font color="#e74f4c">data residency</font>
系统、存储和通信保护<br>System, storage and communication protection<br>
System and Communication Protection
Encrypt and protect data:
<ul><li>at rest</li><li>in transit</li><li>in use</li></ul>
Protect systems and services:
<ul><li>Dos/DDos</li><li>Boundary (ingress and egress)</li><li>Key Management</li></ul>
Security practices
<ul><li>Automation of configuration</li><li>Responsibilities for protecting cloud systems and services</li><li>Monitoring and maintenance</li></ul>
Properly securing information systems can be a difficult task due to the sheer number of elements that make up a system.
<font color="#e74f4c">Breaking systems down into components</font> and then applying security controls can make the overall task more manageable.
One source for controls is <b>NIST Special Publication 800-53,"Security and Privacy Controls for Information Systems and Organizations"</b>,which contains a family of controls specific to systems and communications
<span style="font-size: inherit;">Policy and Procedures</span><br>
Establish requirements for system protection,and define the purpose,scope,roles,and responsibilities needed to achieve it.
Separation of System and User Functionality<br>
A basic security principle that ensures that <font color="#e74f4c">no single person can control all the elements</font> of a critical function or system.
Separating user and admin functions can also prevent users from altering processes or misconfiguring systems.
Security Function Isolation<br>
Separating security-specific functionsfrom other roles is another example of separation of duties.
Denial-of-Service Protection<br>
A <font color="#e74f4c">disruptive attack at scale</font> that is more difficult for smaller organizations to combat effectively.
Most CSPs offer DoS/DDoS mitigation as a service,and there are also dedicated providers like Akamai and Cloudflare.
e.q Azure DDos,AWs Shield,Google Cloud Armor
Boundary Protection<br>
Deals with both ingress and egress protections,including:<br><ul><li>Preventing malicious traffic from entering the network</li><li>Preventing malicious traffic from leaving your network</li><li>Protecting against data loss (exfiltration)</li><li>Configuring rules/policies in routers,gateways,or firewalls</li></ul>
Cryptographic Key Establishment and Management
Cryptoaraphy provides a number of security functions including confidentiality,integrity,and nonrepudiation.
<b>Eneryption tools</b> like TLS or a VPN can be used to provide confidentiality.
<b>Hashing</b> can be implemented to detect unintentional data modifications.
Additional security measures like <b>digital signatures</b> or hash-based message authentication code(HMAC)can be used to detect intentional tampering.
HMAC can simultaneously verify both data integrity and message authenticity
云环境中的识别、认证和授权<br>Identification, authentication and authorization in cloud environments<br>
<b>Authentication (AuthN)</b> is the process of proving that you are who you say you are.
<b>Authorization (AuthZ)</b> is the act of granting an authenticated party permission to do something
<b>Permissions</b>,<b>rights</b>,and <b>privileges</b> are granted to users based on their proven identity.
If user has assigned rights to a resource,they are granted <b>authorization</b>.
ACCOUNTABILITY
<b>Accountability </b>is typically enforced with adequate logging and monitoring of system activity
Cloud challenges in enforcing accountability
<ul><li>Saas apps used as users travel make identifying anomalous / malicious behavior more difficult</li><li>Bad password practices(reuse across services)</li><li>Use of personal devices in BYOD scenarios</li></ul>
Modern IDaas tools provide solutions for these challenges
MFA FACTORS AND ATTRIBUTES
<ul><li>Something you know(pin or password)</li><li>Something you have(trusted device)</li><li>Something you are(biometric)</li></ul>
Multifactor Authentication
includes two or more authentication factors
more secure than using a single authentication factor
passwords are the weakest form of authentication
password policies help increase their security by enforcing complexity and history requirements
Smartcards include microprocessors and cryptographic certificates
Oath tokens create one-time passwords (OTP)
Biometric methods identify users based on individual characteristics such as fingerprints and facial recognition
AUTHENTICATION METHODS
Authentication applications
is a <font color="#e74f4c">software-based authenticator</font> that implements two-step verification services using<br>the Time-based One-time Password Algorithm and HMAC-based One-time Password<br>algorithm,for authenticating users of software applications.
Push notifications
where the server is pushing down the authentication information to your mobile device.
uses the mobile device app to be able to receive the pushed message and display the authentication information.
FEDERATED SERVICES
<b>Federation</b> is a collection of domains that have <b>established trust</b>.
The level of trust may vary,but typically includes authentication and almost always includes authorization.
Often includes a number of organizations that have <b>established trust</b> for <b>shared access</b> to a set of resources.
Example<br>You can federate your on-premises environment with Azure Active Directory (Azure AD) and use this federation for authentication and authorization.
This sign-in method ensures that all user authentication occurs on-premises.
Allows administrators to implement more rigorous levels of access control
审计机制<br>Audit mechanisms<br>
日志收集<br>log collection<br>
Cloud services will offer different controls over what information is logged..
but at a <font color="#e74f4c">minimum level of security-relevant events</font>, such as use of or changes to privileged accounts
A <b>log aggregator</b> can ingest logs from all on-premises and cloud resources for review.
关联<br>correlation<br>
Refers to the ability to discover relationships between two or more events across logs.
This capability is commonly associated with a SIEM, which correlates events in logs from many sources
数据包捕获<br>packet capture<br>
Packet capture tools are also called <b>protocol analyzers</b>
The cloud environment may not provide any facility for capturing packets,particularly in Saas scenarios
<b>Wireshark</b>:a free,open-source protocol analyzer,with CLI and GUl versions,available for Windows and Linux.
Some CSPs support Wireshark,others have specialized services to perform packet capture on virtual networks.
e.q.Network Watcher (Azure),AWs supports Wircshark
Some CSP protocol analyzers can save the data that they collect to a <font color="#e74f4c">Wireshark-compatible packet capture file (PCAP)</font>.
3.5 计划业务连续性 (BC) 和灾难恢复 (DR)<br>Plan business continuity (BC) and disaster recovery (DR)<br>
BCP vs DRP
<b>BCP</b> focuses on the <font color="#e74f4c">whole business</font>
<b>DRP</b> focuses more on the <font color="#e74f4c">technical aspects</font> of recovery
BCP will cover communications and process more broadly
BCP is an umbrella policy and DRP is part of it
GOALS OF DRP AND BCP
Minimizing the effects of a disaster by:<br><ul><li><font color="#e74f4c">Improving responsiveness</font> by the employees in different situations.</li><li>Easing confusion by providing <font color="#e74f4c">written procedures</font> and participation in drills</li><li>Helping make logical decisions during a crisis</li></ul>
BCP DEFINITIONS
BRP(Business Resumption Plan)<br>
the plan to move from the disaster recovery site back to your business environment or back to normal operations.
MTBF(Mean Time Between Failures)
a time determination for how long a piece of IT infrastructure will continue to work before it fails.
MTTR(Mean Time to Repair)
a time determination for how long it will take to get a piece of hardware/software repaired and back on-line.
MTD(Max tolerable downtime)<br>
The amount of time we can <font color="#e74f4c">be without the asset</font> that is unavailable <font color="#e74f4c">BEFORE we must declare a disaster</font> and initiate our disaster recovery plan.
业务连续性 (BC) / 灾难恢复 (DR) 策略<br>Business continuity (BC) / disaster recovery (DR) strategy<br>
BCP(Business Continuity Plan)<br>Business-focused<br>
The overall organizational plan for"how-to"continue business after an event has occurred.
<font color="#e74f4c">A proactive risk mitigation strategy</font> that contains likely scenarios that could affect the organization and guidance on how the organization should respond
Sometimes called a continuity of operations plan (<b>COOP</b>)
DRP(Disaster Recovery Plan)<br>Tech-focuscd<br>
the plan for recovering from an IT disaster and having the IT infrastructure back in operation.
BUSINESS IMPACT ANALYSIS
The <b>business impact assessment (BIA)</b>is used to determine which processes are critical and which are not.
Measures the impact of specific systems and processes.
Any that are <font color="#e74f4c">deemed critical</font> to the organization's functioning must be prioritized in an emergency situation.
A BIA typically contains a <b>cost-benefit analysis (CBA)</b> and a calculation of the <b>return on investment(ROI)</b>.
BCP/DRP FROM A CSP PERSPECTIVE
A cloud data center that is affected by a natural disaster will likely activate multiple BCPs and DRPs.
CSP will activate both plans to deal with the interruption to their service
One key element of the BCP is communicating incident status to relevant parties.
BCP/DRP FROM A CUSTOMER PERSPECTIVE
The customer is responsible for determining how to recover in the case of a disaster in the cloud.
Customer may choose to implement backups,or utilize multiple availability zones,load balancers,or other techniques.
CSPs can further protect customers by <font color="#e74f4c">not allowing two availability zones within a single physical datacenter</font> within a cloud region.
COMMUNICATION PLAN
The plan that details how <font color="#e74f4c">relevant stakeholders</font> will be informed inevent of an incident. (like a security breach)
Would include plan to <font color="#e74f4c">maintain confidentiality</font> such as encryption to ensure that the event does not become public knowledge.
<font color="#e74f4c">Contact list</font> should be maintained that includes stakeholders from the government,police,customers,suppliers,and internal staff.
<font color="#e74f4c">Compliance regulations</font>, like GDPR,include notification requirements,relevant parties and timelines
Confidentiality amongst internal stakeholders is desirable so external stakeholders can be informed in accordance with the plan.
STAKEHOLDER MANAGEMENT
When we have an incident,there are multiple groups of relevant stakeholders that we need to inform and manage,and may include:<br><ul><li>Internal stakeholders</li><li>Cyber insurance provider</li><li>Business partners</li><li>Customers</li><li>Law enforcement</li></ul>
A stakeholder is a party with an interest in an enterprise; corporate stakeholders include investors,employees,customers, and suppliers.
业务需求<br>Business requirements<br>
恢复时间目标 (RTO)<br>Recovery Time Objective (RTO)<br>
is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in continuity.
恢复点目标 (RPO)<br>Recovery Point Objective (RPO)<br>
is the age of data that must be recovered from backup storage for normal operations to resume if a system or network goes down
恢复服务级别<br>recovery service level<br>
measures the compute resources needed to <font color="#e74f4c">keep production environments running</font> during a disaster.
is <font color="#e74f4c">a percentage measure (0-100%)</font>of how much computing power you will need during a disaster
based upon <font color="#e74f4c">a percentage of computing used by production environments</font> versus others,such as development,test,and QA
EXAMPLE:<br>a 10-web server environment that uses 8 for dev,test, and QA,only 2 would need to be migrated for production.<br>
计划的创建、实施和测试<br>Creation, implementation and testing of plan<br>
Design
Based on priorities from the business impact analysis(BIA)
Implement the Plan
Implement the plan to protect critical business functions
ldentifying <b>key personnel</b> is crucial implementation step
Test the Plan
Testing ensures both the BCP/DRP function as expected
AND that people know their roles and responsibilities
Testing both BCP and DRP plans is essential
Report and Revise
BCP/DRP should be revised as necessary based on test results
BCP/DRP plans evolve and need refinement over time
DISASTER RECOVERY TESTS
Tabletop testing
Members of the disaster recovery team gather in a large conference room and role-play a disaster scenario.
Usually,the exact scenario is <font color="#e74f4c">known only to the test moderator</font> who presents the details to the team at the meeting.
The team members refer to the document and discuss the appropriate responses to that particular type of disaster.
Role play only, minimal impact on productivity
Dry run
In this test,some of the response measures are tested (on non-critical functions).
Full test
Involves actuallyshutting down operations at the primary site and shifting them to the recovery site.
When the entire organization takes part in an unscheduled, unannounced practice scenario,of <font color="#e74f4c">full BC/DR activities</font>.
IMPLEMENTATION
Customers can take advantage of the cloud's high availability features like:<br><ul><li>multiple availability zones</li><li>automatic failover to backup region(s)</li><li>direct connection to a CSP</li></ul>
The cost of building resiliency should be less than the cost of business interruption
The cost of high availability in the cloud is generally less than a company trying to achieve high availability on their own
D4 云应用安全<br>Cloud Application Security<br>
4.1 倡导应用程序安全性的培训和意识<br>Advocate training and awareness for application security<br>
云开发基础<br>Cloud development basics<br>
Security by design
Declares security should be present throughout <font color="#e74f4c">every step of the process</font>.
Various models exist to help,like the Building Security In Maturity Model (BSIMM).
Pairs well with DevSecOps
Shared security responsibility
The idea is that <font color="#e74f4c">security is the responsibility of everyone</font> from the most junior member of the team to senior management.
Describes the primary principle of DevSecOps
Security as a business objective
<font color="#e74f4c">Risk mitigation</font> through security controls should be a key business objective,similar to customer satisfaction or revenue.
Requires org-wide security awareness and commitment
常见陷阱<br>Common pitfalls<br>
Performance
Cloud software development often relies on <font color="#e74f4c">loosely coupled services</font>.
Makes designing for and meeting performance goals more complex, as multiple components may interact in unexpected ways
Verify through end-to-end load and stress testing
Scalability
One of the key features of the cloud is the ability to scale allowing applications and services to <font color="#e74f4c">grow and shrink as demand fluctuates</font>.
Requires developers to think about how to <font color="#e74f4c">retain state across instances</font> and handle faults with individual servers
Scale out is better than scale up in the cloud
Interoperability
is theability to work across platforms,services,or systemsand can be very important,especially multi-vendor and multi-cloud scenarios.
Interoperability across platforms increases service provider choice and can reduce costs
Portability
Designing software that can <font color="#e74f4c">move between on premises and cloud</font> environments or between cloud providers makes it <b>portable</b>
Portability in a hybrid scenario requires avoiding use of certain environment and provider-specific APIs and tools.
The additional effort can make it harder to leverage some cloud advantages,and may require compromises
API Security
Application programming interfaces (APIs),are relied on throughout cloud application design,development,and operation.
Designing APIs to <font color="#e74f4c">work well</font> with cloud architectures while <font color="#e74f4c">remaining secure</font> are both common challenges for developers and architects.
API security considerations
<ul><li>Access control</li><li>Data encryption</li><li>Throttling</li><li>Rate limiting</li></ul>
常见云漏洞<br>Common cloud vulnerabilities<br>
开放web应用安全项目 (OWASP) 10 大风险<br>Open Web Application Security Project (OWASP) Top-10<br>
SANS 前 25 个最危险的软件错误<br>SANS Top-25<br>
VULNERABILITIES
Common cloud vulnerabilities to avoid with SSDLC include
<ul><li>Data breaches</li><li>Data integrity</li><li>Insecure application programming interfaces (APIs)</li><li>Denial-of-Service</li></ul>
ORGANIZATIONS
There are several that provide information on security threats,
<ul><li>Cloud Security Alliance(CSA)</li><li>SANS Institute</li><li>Open Web Application Security Project (OWASP)</li></ul>
4.2 描述安全软件开发生命周期 (SDLC) 流程<br>Describe the Secure Software Development Life Cycle (SDLC) process<br>
业务需求<br>Business requirements<br>
Mature software development shops utilize an SDLC because it saves money and supports repeatable,quality software development.
SSDLC is fully successful only if the <font color="#e74f4c">integration of security into an organization's existing SDLC</font> is required for all development efforts.
<b>Business requirements</b> capture what the organization needs its information systems to do.
<b>Funetional reguirements</b> detail what the solution must do. such as supporting up as max concurrent user requirements which in turn support business requirements,like all workers being able to access a system to perform their assigned duties.
In addition to these functional requirements,the organization must also consider <b>security</b>,<b>privacy,</b>and <b>compliance </b>objectives
SECURE SOFTWARE DEVELOPMENT LIFECYCLE (SDLC)
Planning
Considers potential development work,focusing on determining need,feasibility,and cost.
Requirements Definition
Once an effort has been deemed feasible,user and business functionality requirements are captured.
Involves user,customer and stakeholder input to determine desired functionality,current system or app<br>functionality,and desired improvements.
Design
Design functionality,architecture,integration points and techniques,data flows,and business processes.
Solution is designed based on requirements gathered
Coding
Wherc the actual coding (work)happens
Testing
Maintenance
阶段和方法<br>Phases and methodologies<br>
CCSP 4 个 阶段
设计<br>design<br>
编码<br>code<br>
测试<br>test
Testing to ensure software is functional,scalable,and secure
维护<br>maintain
Ongoing maintenance updates,patching and checks to ensure software remains functional and secure
SOFTWARE DEVEPLOMENT MODELS
Aglie
places an emphasis on the needs of the customer and quickly developing new functionality that<br>meets those needs in an <font color="#e74f4c">iterative fashion</font>.
Allows quick response to changing requirements,rapid iteration
Waterfall
describes a <font color="#e74f4c">sequential</font> development process that results in the development of a finished product.
Requires clear requirements,stable environment,low change
瀑布式与敏捷<br>waterfall vs. agile<br>
WATERFALL MODEL
7-stage process that allows return to previous stage for corrections
<ul><li>SYSTEM REQUIREMENTS</li><li>SOFTWARE REQUIREMENTS</li><li>PRELIMINARY DESIGN</li><li>DETAILED DESIGN</li><li>CODE AND DEBUG</li><li>TESTING</li><li>OPS & MAINTENANCE</li></ul>
AGILE MODEL
model for software developmentbased on the following four principles
<ul><li><b>Individuals and interactions</b> over processes and tools</li><li><b>Working software</b> over comprehensive documentation</li><li><b>Customer collaboration</b> over contract negotiation</li><li><b>Responding to change</b> over following a plan</li></ul>
Leverages an iterative (repeating)process called a <font color="#e74f4c">sprint</font>
4.3 应用安全软件开发生命周期 (SDLC)<br>Apply the Secure Software Development Life Cycle (SDLC)<br>
云特定风险<br>Cloud-specific risks<br>
The Cloud Security Alliance details the top cloud-specific security threats in their list titled "The CSA Egregious 11"
<ol><li>Data Breaches</li><li>Misconfiguration and inadequate change control</li><li>Lack of cloud security architecture and strategy</li><li>Insufficient identity,credential access and key management</li><li>Account hijacking</li><li>Insider threat</li><li>Insecure interfaces and APls</li><li>Weak control plane</li><li>"Metastructure"and "applistructure"failures</li><li>Limited cloud usage visibility</li><li>Abuse and nefarious use of cloud services</li></ol>
SDCL <br>Devsecops, CI/CD
Secrets management,data masking
CI/CD,infrastructure-as-code,release management
Developers can leverage identity-as-a-service (IDaas)rather than building their own for stronger authentication & authorization controls
Using existing identity providers /IDaas for your app reduces risk
Separation of duties,checks and balances in the release management process,such as approval gates
Implement access controls,such as RBAC and access keys
Continuous Integration Continuous Deployment (CI/CD)
威胁建模<br>Threat modeling<br>
Allows security practitioners to identify potential threats and security vulnerabilities
is often used as an input to risk management
Can be <b>proactive</b> or <b>reactive</b>,but in either case,goal is to <font color="#e74f4c">eliminate or reduce threats</font>
3 approaches to threat modeling
<b>Focused on Assets</b>.Uses <font color="#e74f4c">asset valuation</font> results to identify threats to the valuable assets.
<b>Focused on Attackers</b>.Identify potential attackers and identify threats based on the <font color="#e74f4c">attacker's goals</font>
<b>Focused on Software</b> Considers <font color="#e74f4c">potential threats</font> against the software the org develops.
欺骗、篡改、抵赖、信息泄露、拒绝服务和特权提升 (STRIDE)<br>Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege (STRIDE)<br>developed by Microsoft<br>
<ul><li>Spoofing</li><li>Tampering</li><li>Repudiation</li><li>Information disclosure</li><li>Denial of service</li><li>Elevation of privilege</li></ul>
灾难、可重现性、可利用性、受影响用户与可发现性 (DREAD)<br>Damage, Reproducibility, Exploitability, Affected Users, and Discoverability (DREAD)<br><font color="#e74f4c">based on answer to 5 questions</font><br>
<ul><li>Damage potential</li><li>Reproducibility</li><li>Exploitability</li><li>Affected users</li><li>Discoverability</li></ul>
架构、威胁、攻击面和缓解措施(ATASM)<br>Architecture, Threats, Attack Surfaces, and Mitigations (ATASM)<br><font color="#e74f4c">A series of process steps For performing threat modeling</font><br>
<font color="#e74f4c">A</font>rchitecture<br>analysis of the system's architecture<br><font color="#e74f4c">T</font>hreats<br>list all possible threats,threat actors,<br>and their goals<br><font color="#e74f4c">A</font>ttack <font color="#e74f4c">S</font>urfaces<br>identify components exposed to attack<br><font color="#e74f4c">M</font>itigations<br>analyze existing mitigations in place
攻击模拟和威胁分析过程 (PASTA)<br>Process for Attack Simulation and Threat Analysis (PASTA)<br><font color="#e74f4c">focuses on developing countermeasures based on asset value</font><br>
<ul><li>Stage l:Definition of Objectives</li><li>Stage Il:Definition of Technical Scope</li><li>Stage Ill:App Decomposition Analysis</li><li>Stage IV:Threat Analysis</li><li>Stage V:Weakness Vulnerability Analysis</li><li>Stage VI:Attack Modeling Simulation</li><li>Stage VIl:Risk Analysis Management</li></ul>
避免开发过程中的常见漏洞<br>Avoid common vulnerabilities during development<br>
Like all risk mitigations,a layered approach combining multiple types of controls is a best practice,including:
Training and awareness
<font color="#e74f4c">Training for developers</font> is critical,because they make decisions about how to design and implement system components.
Awareness of common flaws like injection attacks prevent coding mistakes
Documented process
Secure SDLC should be well documented and communicated to all team members designing,developing,and operating systems.
Similar to security policies,must be understood and followed by developers
Test-driven development
Focusing on <font color="#e74f4c">meeting acceptance criteria</font> can be one way of simplifying the task of ensuring that security requirements are met
Having <font color="#e74f4c">well-defined test cases</font> for security requirements can help avoid vulnerabilities such as OWASP Top 10 application security risks.
安全编码<br>Secure coding<br>
The practice of designing systems and software to avoid security risks
Essentially a <font color="#e74f4c">proactive risk mitigation</font> practice
Standards and organizations exist that work to mature these practices
开放web应用安全项目 (OWASP) 应用安全检验标准 (ASVS)<br>Open Web Application Security Project (OWASP) Application Security Verification Standard (ASVS)<br>
The oWASP Top 10 is an awareness document that represents a broad consensus about the most critical security risks to web applications.
<ol><li>Broken Access Control</li><li>Cryptographic Failures</li><li>Injection</li><li>Insecure Design</li><li>Security Misconfiguration</li><li>Vulnerable and Outdated Components</li><li>Identification and Authentication Failures</li><li>Software and Data Integrity Failures</li><li>Security Logging and Monitoring Failures</li><li>Server-Side Request Forgery</li></ol>
CLOUD-NATIVE APPLICATION SECURITY TOP 10
<ol><li>Insecure cloud,container or orchestration configuration</li><li>Injection flaws(app layer, cloud events,cloud services)</li><li>Improper authentication authorization</li><li>CI/CD pipeline software supply chain flaws</li><li>Insecure secrets storage</li><li>Over-permissive or insecure network policies</li><li>Using components with known vulnerabilities</li><li>Improper assets management</li><li>Inadequate 'compute'resource quota limits</li><li>Ineffective logging monitoring (e.g.runtime activity)</li></ol>
CWE/SANS:TOP 25 Most Dangerous Software Errors
<ol><li>Out-of-bounds Write <font color="#e74f4c">buffer overflow</font></li><li>Improper Neutralization of Input During Web Page Generation ('<font color="#e74f4c">Cross-site Scripting</font>)</li><li>Improper Neutralization of Special Elements used in an SQL Command ('<font color="#e74f4c">SQL Injection</font>')</li><li>Improper Input Validation <font color="#e74f4c">Prevents injection</font></li><li>Out-of-bounds Read <font color="#e74f4c">buffer overflow</font></li><li>Improper Neutralization of Special Elements used in an OS Command ('<font color="#e74f4c">OS Command Injection</font>')</li><li>Use After Free <font color="#e74f4c">buffer overflow</font></li><li>Improper Limitation of a Pathname to a Restricted Directory ('<font color="#e74f4c">Path Traversal</font>')</li><li>Cross-Site Request Forgery(CSRF)</li><li>Unrestricted Upload of File with Dangerous Type</li><li>NULL Pointer Dereference</li><li>Deserialization of Untrusted Data <font color="#e74f4c">Input validation Fixes 11,12,13</font></li><li>Integer Overflow or Wraparound</li><li>Improper Authentication</li><li>Use of Hard-coded Credentials</li><li>Missing Authorization</li><li>Improper Neutralization of Special Elements used in a Command ('<font color="#e74f4c">Command Injection</font>)</li><li>Missing Authentication for Critical Function<br></li><li>Improper Restriction of Operations within the Bounds of a Memory Buffer <font color="#e74f4c">buffer overflow</font></li><li>Incorrect Default Permissions</li><li>Server-Side Request Forgery (SSRF) <font color="#e74f4c">On OWASP List</font></li><li>Concurrent Execution using Shared Resource with Improper Synchronization ('<font color="#e74f4c">Race Condition</font>)</li><li>Uncontrolled Resource Consumption <font color="#e74f4c">Dos</font></li><li>Improper Restriction of XML External Entity Reference</li><li>Improper Control of Generation of Code ('<font color="#e74f4c">Code Injection</font>)</li></ol>
ATTACK TYPES and CONCEPTSATTACK TYPES and CONCEPTS
<ol><li>Injection attacks</li><li>Buffer overflow attacks</li><li>Directory path traversal</li><li>Denial of Service (Dos)/Distributed DoS (DDoS)</li><li>Race condition</li><li>Authentication (AuthN)and Authorization (AuthZ)</li></ol>
INJECTIONS (INJECTION ATTACKS]<br>Improper input handling<br>
used to compromise web front-end and backend databases
<b>SQL injection attacks </b>Use unexpected input to a web application to gain unauthorized access to an underlying database.<br>
<b>Countermeasures</b>: Input validation,use prepared statements,and limit account privileges.
BUFFER OVERFLOWS
exists when a developer <font color="#e74f4c">does not validate user input </font>to ensure that it is of an appropriate size (allows Input that is too large can "overflow"memory buffer).
DIRECTORY TRAVERSAL
If an attacker is able to gain access to restricted directories through HTTP,it is known as a <font color="#e74f4c">directory traversal attack</font>.
One of the simplest ways to perform directory traversal is by using a <font color="#e74f4c">command injection attack</font> that carries out the action.
Most vulnerability scanners will check for weaknesses with directory traversal/command injection and inform you of their presence.
To secure your system,you should run a scanner and keep the web server software patched.
RESOURCE CONSUMPTION
Denial of-Service
is a resource consumption attack intended to prevent legitimate activity on a victimized system.
Distributed Denial of-Service
a DoS attack utilizing multiple compromised computer systems as sources of attack traffic.
<b>COUNTERMEASURES</b>:firewalls,routers,intrusion prevention (IDPS),SIEM, disable broadcast packets entering/leaving,disable echo replies,<br>patching<br>
RACE CONDITIONS
A condition where the system's behavior is dependent on the <font color="#e74f4c">sequence or timing</font> of other uncontrollable events.
Time-of-Check-to-Time-of-Use(TOCTOU)
a timing vulnerability that occurs when a program checks access permissions too far in advance of a resource request.
Problem occurs when the state of the resource changes between the time of the check and the time it is actually used
file locking,transactions in file system or OS Kernel
It becomes a bug when one or more of the possible behaviors is undesirable.
卓越代码软件保障论坛 (SAFECode)<br>Software Assurance Forum for Excellence in Code (SAFECode)<br>
First published "Fundamental Practices for Secure Software Development"
Informed by existing models,including OWASP,CVE,CWE and the Microsoft SDL
Designed to help software industry adopt and use these best practices effectively
Includes guidance on software design,secure coding practices,testing,validation,third-party risks,and handling vulnerabilities
Code Repositories
This is where source code and related artifacts (such as libraries)are stored
Do not commit <font color="#e74f4c">sensitive information</font>
Protect access to your code repositories
Sign your work
Keep your development tools (IDE)up-to-date
软件配置管理和版本控制<br>Software configuration management and versioning<br>
Configuration Management
ensures that systems are configured similarly, <font color="#e74f4c">configurations are known and documented</font>.
<b>Baselining</b> ensures that systems are deployed with a common baseline or starting point,and imaging is a common baselining method.
Change Management
helps reduce outages or weakened security from unauthorized changes.
<b>Versioning</b> uses a labeling or numbering system to track changes in updated versions of software.
Approaches vary,but often include a major version,minor version,and patch version strategy (23.05.02)
SCM<br>Software Configuration Management
<b>Baselining </b>is an important component of configuration management.
a baseline is a <font color="#e74f4c"><b>snapshot </b></font>of a system or application at a given point in time
should also create <font color="#e74f4c">artifacts</font> that may be used to help understand system configuration
system and component-level <font color="#e74f4c">versioning</font>
software bill of materials (SBOM)
An emerging strategy and standard in tracking software versions is software bill of materials (SBOM)
The SBOM <font color="#e74f4c">lists all of the components</font> in an application or service,including open source or proprietary code libraries.
4.4 应用云软件保障和验证<br>Apply cloud software assurance and validation<br>
ENVIRONMENT
Secure environments for development,testing,and staging before moving the application into production are necessary.
Environments map to phases of application development,debugging,testing,and release.
Development
Where the application is initially coded,often through multiple iterations (versions).
Testing
where developers <font color="#e74f4c">integrate all of their work</font> into a single application.
<font color="#e74f4c">Regression testing</font> to ensure functionality is as expected.
Staging
where we ensure quality assurance before we roll it out to production.
QA happens here
Production
where the application goes live,and end-users have the support of the IT team.
功能和非功能测试<br>Functional and non-functional testing<br>
Functional testing
determines if software <font color="#e74f4c">meets functionality requirements</font> defined earlier in the SSDLC
takes multiple forms,including:
<font color="#e74f4c">integration</font> testing that validates whether components work together,
<font color="#e74f4c">regression</font> testing that validates whether bugs were reintroduced between versions
<font color="#e74f4c">user acceptance</font> testing,which test how users interact with and operate the software
Focuses on specific features and functionality
Non-functional testing
focuses on the <font color="#e74f4c">quality </font>of the software
looks at software qualities like stability and performance
methods include load,stress, recovery,and volume tests
Examines the way the system operates <font color="#e74f4c">as a whole</font>,not the specific functions
FUNCTIONAL SECURITY REQUIREMENTS
Functional security requirements
Define a system or its component and <font color="#e74f4c">specifies what it must do</font>.
Captured in use cases,defined at a component level.
EXAMPLE:application forms must protect against injection attacks
Non-functional security requirements
Specify the system's <font color="#e74f4c">quality,characteristics,or attributes</font>.
Apply to the whole system (system level)
EXAMPLE:security certifications arc non-functional.
安全测试方法<br>Security testing methodologies<br>
黑盒<br>blackbox<br>
conducted <font color="#e74f4c">as an external attacker</font> would access the code,systems,or environment,
tester has no knowledge of any of these elements at the outset of a test.
<font color="#e74f4c">'zero knowledge testing</font>
白盒<br>whitebox<br>
conducted with <font color="#e74f4c">full access to and knowledge</font> of systems,code,and environment
Static application testing is one example
<font color="#e74f4c">"Full knowledge testing</font>
静态<br>static<br>
StaticApplication Security Testing
analysis of computer software performed without actually executing programs
<font color="#e74f4c">tester has access</font> to the underlying framework,design,and implementation
<font color="#e74f4c">tests "inside out" requires source code</font>
动态<br>dynamic<br>
a program which communicates with a web application (<font color="#e74f4c">executes the application</font>)
tester has no knowledge of the technologies or frameworks that the application is built on
<font color="#e74f4c">tests "outside in" no source code required</font>
软件组成分析(SCA)<br>Software Composition Analysis (SCA)<br>
is used to <font color="#e74f4c">track the components</font> of a software package or application
is of special concern for apps built with open-source software components
because open-source components often involve <font color="#e74f4c">reusable code libraries</font>
Automated,combines application security and patch management
SCA tools identify flaws/vulnerabilities in these included components,ensures latest versions are in use,etc.
交互式应用程序安全测试 (IAST)<br>interactive application security testing (IAST)<br>
analyzes code for vulnerabilities while it's being used
focuses on real time reporting to optimize testing and analysis process
Often built into CI/CD automated release testing
Unlike static and dynamic testing,IAST analyzes the <font color="#e74f4c">internal functions of the application</font> while it is running
质量保证 (QA)<br>Quality assurance (QA)<br>
QA is responsible for ensuring that the code delivered to the customer through the cloud environment is quality code,defect-free,and secure.
<b>PROCESS</b>:is frequently a combination of <font color="#e74f4c">automated and manual</font> validation testing techniques.<br>Typically involves reviews,testing,reporting,and other activities to complete the QA process.<br>
<b>GOAL</b>:is to ensure software meets standards or requirements.
<b>ROLE</b>:The role of QA is significantly expanded in a Devops or DevSecOps team,where QA is <font color="#e74f4c">embedded throughout the development process</font>
<b>TESTS</b>:QA should be involved in many testing activities,such as load, performance and stress testing,as well as vulnerability management.
滥用案例测试<br>Abuse case testing<br>
A way to use a feature that was <font color="#e74f4c">not expected by the implementer</font>,allowing an attacker to influence the feature or outcome of use of the<br>feature based on the attacker action (or input)
Describes unintended and malicious use scenarios of the application,describing how an attacker could do this.
Abuse case Test
Focuses on using features in ways that <font color="#e74f4c">weren't intended by the developer</font>.
May exploit weaknesses or coding flaws from perspective of multiple personas:malicious user,abusive user,and unknowing user
Can help orgs to consider security features and controls needed for an application
Testing generally focuses on documented abuse cases
4.5 使用经过验证的安全软件<br>Use verified secure software<br>
保护应用编程接口 (API)<br>Securing application programming interfaces (API)<br>
APIs (SOAP or REST) is a set of exposed interfaces that allow programmatic interaction between services. no user/human involved
<b>SOAP</b> is a standard communication protocol system that <font color="#e74f4c">uses XML</font> technologies
<b>REST</b> is an architectural model that <font color="#e74f4c">uses HTTPS</font> for web communications to offer API endpoints
Security features from CSP include API gateway, authentication,IP filtering,throttling,quotas,data validation
Also ensure that storage,distribution,and transmission of access keys is performed in a secure fashion.
供应链管理<br>Supply-chain management<br>
Today,most services are delivered through a chain of multiple entities
A secure supply chain includes <font color="#e74f4c">vendors</font> who are secure,reliable,trustworthy,reputable
供应商评估<br>vendor assessment<br>
Supply Chain Evaluation
Traditional vendor evaluation options may include
<ul><li><b>On-Site Assessment</b>.Visit organization,interview personnel,and observe their operating habits.</li><li><b>Document Exchange and Review</b>.Investigate dataset and doc exchange,review processes.</li><li><b style="font-size: inherit;">Process/Policy Review</b><span style="font-size: inherit;">.Request copies of their security policies,processes,or procedures.</span></li><li><b style="font-size: inherit;">Third-party Audit</b><span style="font-size: inherit;">.Having an independent auditor provide</span><span style="font-size: inherit;">an unbiased review of an entity's security infrastructure.</span></li></ul>
Vendor evaluation in the cloud
Companies with hundreds or thousands of customers (like AWS,Azure,GCP) <font color="#e74f4c">cannot support direct vendor assessment</font>.
Instead,review audit and certification reports from the CSP
<b>Third-party Audit</b>.Review an independent auditor's unbiased review of an entity's security infrastructure.
Review <font color="#e74f4c">SOC-2 Type ll report</font>,and <font color="#e74f4c">ISO/IEC 27001,27017,27018</font> <font color="#e74f4c">reports</font> to verify efficacy of the CSPs physical and logical<br>controls for securing facilities,infrastructure,and data.
第三方软件管理<br>Third-party software management<br>
许可<br>licensing<br>
A third party may have limited access to your systems but will often have <font color="#e74f4c">direct access</font> to some portion of your data.
Typical issues addressed in software vendor assessment include:
<ul><li>Where in the cloud is the software running?Is this on a well-known CSP,or does the provider use their own cloud service?</li><li>Is the data encrypted at rest and in transit,and what encryption technology is used?</li><li>How is access management handled?</li><li>What event logging can you receive?</li><li>What auditing options exist?</li></ul>
OSS vs PROPRIETARY
open Source
One in which the vendor makes the license freely available and allows access to the source code though it might ask for an optional donation.
There is no vendor support with open source,so you might pay a third party to support in a production environment.
Proprietary
Are more expensive but tend to provide more/better protectionand more functionality and support (at a cost).
Many vendors in this space,including Cisco,Checkpoint,Pal Alto, Barracuda. but 'no source code access'
经过验证的开源软件<br>Validated open-source software<br>
All software,including open-source software (OSS), must be validated in a business environment.
Some argue that open-source software is more secure because the source code is available to review.
Adequate validation testing is required and may be achieved through:
<ul><li>Sandbox testing</li><li>Vulnerability scans</li><li>Third-party verifications</li></ul>
While more visibility into a problem can result in better security outcomes,the<font color="#e74f4c"> transparency of OSS is NOT a guarantee of security</font>.
4.6 了解云应用架构的细节<br>Comprehend the specifics of cloud application architecture<br>
补充安全组件<br>Supplemental security components<br>
web应用防火墙 (WAF)<br>web application firewall (WAF)<br>
protects web applications by filtering and monitoring <font color="#e74f4c">HTTP traffic</font> between a web application and the Internet.
typically protects web applications from <font color="#e74f4c">common attacks</font> like XSS,CSRF,and SQL injection.
数据库活动监控 (DAM)<br>Database Activity Monitoring (DAM)<br>
combines network data and database audit info in real time to analyze database activity for<br><font color="#e74f4c">unwanted,anomalous,or unexpected behavior.</font>
monitors application activity,privileged access, and detects attacks through behavioral analysis
可扩展标记语言 (XML) 防火墙<br>Extensible Markup Language (XML) firewalls<br>
used to protect services that rely on XML based interfaces including some web apps
provides request validation and filtering,rate limiting,and traffic flow management
Usually implemented as a proxy
应用编程接口 (API) 网关<br>application programming interface (API) gateway<br>
monitors traffic to your application services, exposed as API endpoints
provides <font color="#e74f4c">authentication and key validation</font> services that control APl access
Firewall Considerations in a cloud Environment
One reason that we need a good firewall is to filter incoming traffic to protect our cloud-hosted infrastructure and applications from hackers or malware.
Cost
Cost is one of the reasons for WAF popularity.It meets a common need,is easy to configure,and is less expensive than more function-rich NGFW and SWG options.
Need for Segmentation
Network segmentation should be supported with appropriate traffic filtering/restriction with the firewall type that is most appropriate for the use case.
The firewall can filter traffic between virtual networks and the Internet.
Open Systems Interconnection (OSI)Layers
A network firewall works on Layer 3,stateful packet inspection at layers 3/4.
Many cloud firewalls,like Web Application Firewalls work at Layer 7 of the OSI
密码学<br>Cryptography<br>
PROTECTING DATA AT REST
Storage Service Encryption
CSP storage providers usually protect data at rest by automatically encrypting before persisting it to managed disks,Blob Storage,file,or queue storage.
Full Disk Encryption
子主题
Transparent data encryption(TDE)
Helps protect <font color="#e74f4c">SQL Database and data warehouses</font> against threat of malicious activity with real-time encryption and decryption of database,backups,and transaction log files at rest without requiring app changes.
PROTECTING DATA IN MOTION
Data in motion is most often encrypted using TLS(HTTPS)
Hybrid (site-to-site)and cross-cloud connectivity is often encrypted by VPN
沙盒<br>Sandboxing<br>
Places the systems or code into an isolated,secured environment where testing can be performed.
C<font color="#e74f4c">loud sandboxing architectures</font> often create independent,ephemeral environments for testing.
Enables patch and test and ensures a system is secure before putting it into a production environment.
Also facilitates investigating dangerous malware.
Sandboxes provide an environment for evaluating the security of code without impacting other systems.
应用程序虚拟化和编排<br>Application virtualization and orchestration<br>
微服务<br>microservices<br>
容器<br>containers<br>
A lightweight,granular,and portable way to package applications for multiple platforms.
Reduces overhead of server virtualization by enabling containerized apps to run on a shared OS kernel.
Can be used in some cases to isolate existing applications developed to run in a VM with a dedicated operating system.
Core components in a container platform (Docker,Kubernetes):
<ul><li>Orchestration/scheduling controller</li><li>Network,storage</li><li>Container host</li><li>Container images</li><li>Container registry</li></ul>
The isolation is logical,isolating processes,compute,storage,network,secrets,and management plane
CONTAINER ORCHESTRATION
Kubernetes a <b>container orchestration platform</b> for scheduling and automating the deployment,management,and scaling of containerized applications.
Managed Kubernetes
<b>Container hosts</b> are cloud-based virtual machines (VM).This is where the containers run
Most CSPs offer <b>hosted Kubernetes service</b>. handles critical tasks like health monitoring and maintenance for you.Platform-as-a-Service
You pay only for the agent nodes within your clusters, not for the management cluster.
Major CSPs also offer a monitoring solution that will identify at least some potential security concerns
CLOUD ORCHESTRATION
<b>cloud orchestration</b> allows a customer to manage their cloud resources centrally in an efficient and cost-effective manner.
This is especially important in a <b>multi-cloud</b> environment.
Management of the complexity of corporate cloud needs will only increase as more computing workloads move to the cloud.
Allows the <font color="#e74f4c">automation of workflows,management of accounts</font> in addition to the deployment of cloud and containerized applications.
Implements automation in a way that <font color="#e74f4c">manages cost and enforces corporate policy</font> in and across clouds.
Major CSPs offer orchestration tools that work on their platform and third partics offer multi-cloud orchestration solutions
4.7 设计适当的身份和访问管理 (IAM) 解决方案<br>Design appropriate identity and access management (IAM) solutions<br>
联合身份<br>Federated identity<br>
Federation is a collection of domains that have <b>established trust</b>.
The level of trust may vary,but typically includes <font color="#e74f4c">authentication </font>and almost always includes <font color="#e74f4c">authorization</font>.
Often includes a number of organizations that have <font color="#e74f4c">established trust for shared access</font> to a set of resources.
Example<br>
You can federate your on-premises environment with Azure AD and use this federation for authentication and authorization.
This sign-in method ensures that all user authentication occurs on-premises.
Allows administrators to implement more rigorous levels of access control.
Certificate authentication,key fob,card token
身份提供商 (IdP)<br>Identity providers (IdP)<br>
Creates,maintains,and manages identity information while providing authentication services to applications.
For example,Azure Active Directory is the identity provider for Office 365
Other IDaas options include OKTA and DUO
Social identity providers that support OAuth,like Google,Facebook,and Apple are common in federation scenarios
单点登录 (SSO)<br>Single sign-on (SSO)<br>
Single sign-on means a user doesn't have to sign into every application they use.
The user logs in once and that credential is used for multiple apps.
Single sign-on based authentication systems are often called "<b>modern authentication</b>".
This is a common user experience issue in enterprise desktop scenarios
多因子验证 (MFA)<br>Multi-factor authentication (MFA)<br>
<ul><li>Something you know(pin or password)</li><li>Something you have(trusted device)</li><li>Something you are (biometric)</li></ul>
PREVENTS
<ul><li>Phishing</li><li>Spear phishing</li><li>Keyloggers</li><li>Credential stuffing</li><li>Brute force and reverse brute force attacks</li><li>Man-in-the-middle (MITM)attacks</li></ul>
云访问安全代理 (CASB)<br>Cloud access security broker (CASB)<br>
Enforces the company's data security policies <font color="#e74f4c">between on-premises and the cloud</font>.
Can detect (and optionally,prevent)data access with unauthorized apps and data storage in unauthorized locations.
Combines the ability to control use of services with <font color="#e74f4c">data loss prevention</font> and <font color="#e74f4c">threat management</font> features
密钥/凭据管理<br>Secrets management<br>
CSPs offer a cloud service for centralized secure storage and access for application secrets
A secret is anything that you want to control access to,such as APl keys,passwords,certificates,tokens,or cryptographic keys.
Service will typically offer programmatic access via APl to support DevOps and continuous integration/continuous deployment(CI/CD)
<font color="#e74f4c">Access control</font> at vault instance-level and to secrets stored within
Your Cl/CD pipelines should leverage centralized storage of secrets rather than hard-coded values or storage on disk
D5 云安全运营<br>Cloud Security Operations<br>
5.1 为云环境构建和实现物理和逻辑基础架构<br>Build and implement physical and logical infrastructure for cloud environment<br>
硬件特定的安全配置要求<br>Hardware specific security configuration requirements<br>
硬件安全模块 (HSM) <br>hardware security module (HSM) <br>
a <font color="#e74f4c">physical computing device</font> that safeguards and <font color="#e74f4c">manages digital keys</font>,performs encryption and<br>decryption functions for digital signatures,strong authentication and other cryptographic functions.
Key Escrow uses an HSM to store and manage private Keys
Cloud Service Providers all offer a cloud-based HSM solution for customer-managed key scenarios
EXAMPLES: Dedicated HSM (Azure), CloudHSM (AWs),Google KMS (GCP)
可信赖平台模块 (TPM)<br>Trusted Platform Module (TPM)<br>
A chip that resides on the motherboard of the device.
Multi-purpose,like storage and management of keys used for <font color="#e74f4c">full disk encryption (FDE)</font> solutions.
Provides the operating system with access to keys, but prevents drive removal and data access
Virtual TPMs are part of the hypervisor and Provided to VMs running on a virtualization platform.
Unlike an HSM,it is generally a physical component of the system hardware and cannot be added or removed at a later date
Hardware Root of Trust
When certificates are used in FDE,they use a hardware root of trust for key storage.
It verifies that the keys match before the secure boot process takes place
TPM is often used as the basis for a hardware root of trust
SDN
a network architecture approach that enables the network to be intelligently and centrally controlled,or 'programmed,'using software
and has capacity to <font color="#e74f4c">reprogram the data plane</font> at any time
use cases include <b>SD-LAN</b> and <b>SD-WAN</b>
separating the control plane from the data plane opens up a number of security challenges
SDN vulnerabilities can include man-in-the-middle attack (MITM)and a service denial (Dos). secure with TLS
CLOUD SECURITY CONTROLS-NETWORK
Segmentation of virtual networks,both public and private subnets,are important elements of cloud network security.
Virtual Private Cloud (VPC)
A virtual network that consists of cloud resources,where the VMs for one company are isolated from the resources of another company.
Separate VPCs can be isolated using public and private networks.
Public and Private Subnets
The environment needs to be segmented public subnets that can access the Internet directly (through a firewall)and protected private networks.
Virtual networks can be connected to other networks with a VPN gateway or network peering.
For VDI/client scenarios,a <font color="#e74f4c">NAT gateway</font> for Internet access makes sense.
管理工具的安装和配置<br>Installation and configuration of management tools<br>
Management tooling considerations on cloud infrastructure:
<b>Redundancy</b>:Any critically important tool can be a single point of failure (SPOF),so adequate planning for redundancy should be performed.
<b>Scheduled downtime and maintenance</b>:Downtime may not be acceptable,so these tools may be patched or taken offline for maintenance on a rotating schedule with migration of live VMs to prevent loss of service.
<b>Isolated network and robust access controls</b>:Access to virtualization management tools should be tightly controlled,with adequate enforcement. e.g.Need-to-know,least privilege,encryption,and VPN access
<b>Configuration management and change management</b>:Tools and the infrastructure that supports them should be placed under configuration<br>management to ensure that they stay in <font color="#e74f4c">a known,hardened state</font>.
<b>Logging and monitoring</b>:Audit trail is important,but logging activities can create additional overhead,which may not be appropriate for all systems.
虚拟硬件特定的安全配置要求<br>Virtual hardware specific security configuration requirements<br>
网络<br>network
存储<br>storage
内存<br>memory
中央处理器 (CPU)<br>central processing unit (CPU)<br>
Hypervisor 类型 1 和 2<br>Hypervisor type 1 and 2<br>
a VM shares physical hardware with potentially hundreds of other VMs
The biggest issue related to virtual hardware security is enforcement For the hypervisor,strict segregation between the guest operating<br>systems running on a single host
There are two main forms of control you should be aware of:
<b>Configuration</b>:Ensure that the hypervisor has been configured correctly to provide the minimum necessary functionality<br>Disallowing inter-VM network communications if not required and encrypting VM snapshots<br>
<b>Patching</b>:The customer should patch VMs(laas)while CSP patches the hypervisor.<br>In Paas,the CSP owns VM Patching<br>
Particular concerns for virtual network security controls include:
<b>Virtual Private cloud (VPC)</b>:gives the customer a greater level of control,including managing private non-routable IP<br>addresses and control over inter-VM communication.
Enables granular network segmentation in a <font color="#e74f4c">ZTNA(Zero-Trust Network Access,零信任网络接入)</font>
<b>Security Groups</b>:a security group is similar to an access control list (ACL)for network access.
They have distinctrules for inbound and outbound traffic.
安装客户操作系统 (OS) 虚拟化工具集<br>Installation of guest operating system (OS) virtualization toolsets<br>
Virtualization toolsets installed on the VM
Toolsets exist that can <font color="#e74f4c">provide extended functionality</font> for various guest operating systems (Linux,Windows,etc.).
For example,Hyper-V integration services enhance VM performance and provide several useful features.<br>e.g.Guest file copy,time sync,guest shutdown
5.2 运行和维护云环境的物理和逻辑基础架构 <br>Operate and maintain physical and logical infrastructure for cloud environment<br>
本地和远程访问的访问控制<br>Local and Remote Access controls<br>
Local and Remote Access Methods
远程桌面协议 (RDP)<br>Remote Desktop Protocol (RDP)<br>
the native remote access protocol for Windows operating systems.
安全外壳 (SSH)<br>Secure Shell (SSH)<br>
the native remote access protocol for Linux operating systems,and common for remote management of network devices.
RDP and SSH both support encryption and MFA
安全终端访问<br>secure terminal access<br>
a system for secure local access.
基于控制台的访问机制<br>console-based access mechanisms<br>
a system for secure local access.
A KVM (keyboard video mouse)system with access controls
跳板机<br>jumpboxes<br>
a bastion host at the boundary of lower and higher security zones.
CSPs offer services For this:Azure Bastion,AWs Transit Gateway
虚拟客户端<br>virtual client<br>
software tools that allow remote connection to a VM for use as if it is your local machine.
e.g.Virtual Desktop Infrastructure (VDI)for contractors
Access to any of these can be gated with a <font color="#e74f4c">privileged access management PAM)</font>solution on the IAM platform used by the CSP
VIRTUAL PRIVATE NETWORK (VPN)
<font color="#e74f4c">Extends a private network across a public network</font>,enabling users and devices to send and receive data across shared or public networks as if<br>their computing devices were directly connected to the private network.
Split tunnel vs full tunnel
Full tunnel means <font color="#e74f4c">using VPN for all traffic</font>,both to the Internet and corporate network.
Split tunnel uses VPN for <font color="#e74f4c">traffic destined for the corporate network only</font>,and Internet traffic direct through its normal route.
Remote access vs site-to-site
In site-to-site,IPSec site-to-site VPN uses an always on mode where both packet header and payload are encrypted. <font color="#e74f4c">IPSec tunnel mode</font>
In a remote access scenario a connection is initiated from a users PC or laptop for a connection of shorter duration. <font color="#e74f4c">IPSec transport mode</font>
Local and Remote Access controls
<b>Session Encryption</b>:Data transmitted in <font color="#e74f4c">remote access sessions must be encrypted</font> using strong protocols such as TLS 1.3 and session keys.
<b>Strong Authentication</b>:May be combined with cryptographic controls such as a shared secret key for SSH and/or MFA<br>Strong MFA factors,device state,and other conditions of access<br>
<b>Enhanced logging and reviews</b>:All <font color="#e74f4c">admin accounts</font> should be subject to additional logging and reviewof activity,and frequent access reviews.<br>Privileged access solutions in IDaas often include access reviews<br>
<b>Use of identity and access management tool</b>:Many CSPs offer Identity-as-a-Service (IDaas)that enables strong authentication and access controls schemes
<b>Single sign-On (sso)</b>:IDaas solutions enable users to log into other services using their company accounts.Many IDaaS solutions function as an SSO provider.
<b>Separate privileged and nonprivileged accounts</b>:A general best practice for administrative users is the use of a <font color="#e74f4c">dedicated admin account</font> for <br>sensitive functions and a standard account for day-to-day use.<br>
Increasingly,IDaas solutions offer a Privileged Identity Management (PIM) or Privileged Access Management(PAM)for <font color="#e74f4c">just-in-time privilege</font> <br>elevation.<br>
Solution features
<ul><li>Temporary elevation of privilege</li><li>Approval gates</li><li>An audit trail when privilege is activated</li><li>An access review process(to avoid permissions sprawl)</li></ul>
安全网络配置<br>Secure network configuration<br>
Zero Trust Security
no entity is trusted by default!
Addresses the limitations of the legacy network perimeter-based security model.
Treats user identity as the control plane
Assumes compromise/breach in verifying every request.
ZERO TRUST NETWORK ARCHITECTURE
<ul><li>Network Security Group (NSG)</li><li>Network Firewalls</li><li>Inbound and outbound traffic filtering</li><li>Inbound and outbound traffic inspection</li><li>Centralized security policy management and enforcement</li></ul>
NETWORK SECURITY
<b>Network security groups</b> provide an additional layer of security for cloud resources
Act as a virtual firewall for virtual networks and resource instances.(e.g.VMs,databases,subnets)
Carries <font color="#e74f4c">a list of security rules </font>(IP and port ranges) that allow or deny network traffic to resource instances.
Provides a virtual firewall for a <font color="#e74f4c">collection of cloud resources</font> with the same security posture.
Segmentation
Restricting services that are permitted to access or be accessible from other zones using rules to control inbound/outbound traffic.
Rules are enforced by the IP address ranges of each subnet.
Within a virtual network,segmentation can be used to achieve isolation.Port Filtering through a network security group
Private Subnets
Our VPC contains private subnets.Each of these subnets has its own CIDR IP address range and <font color="#e74f4c">cannot connect directly to the internet</font>.
They could be configured go through the <font color="#e74f4c">NAT gateway</font> if outbound internet connectivity is desired.
Client VMs and database servers will often be hosted in a private subnet.
SECURE NETWORK DESIGN
East-West Traffic
where traffic <font color="#e74f4c">moves laterally</font> between servers within a data center.
north-south traffic moves outside of the data center.
VLAN<br>Virtual Local Area Network
a collection of devices that communicate with one another as if they made up a single physical LAN.
Creates a distinct broadcast domain
Screened Subnet<br>aka 'DMZ"
a subnet is placed between two routers or firewalls.
bastion host(s)are located within that subnet.
虚拟局域网 (VLAN)<br>virtual local area networks (VLAN)<br>
Many public clouds offer a virtual private cloud (VPC) which is <font color="#e74f4c">essentially a sandboxed area</font> <font color="#e74f4c">within the larger public cloud</font> dedicated to a specific customer.
VPCs take the form of a dedicated VLAN for a specific user organization,which means other cloud tenants are blocked from accessing resources<br> in the VPC.<br>
VPC Connectivity
To create a secure connection to your VPC,you can <font color="#e74f4c">connect a VPN</font> using L2TP/IPsec using a VPN gateway (aka transit gateway).
<font color="#e74f4c">Network peering</font> is another method for connecting virtual networks in the cloud.
Peering is the more common option between cloud networks<br>Site-to-site VPN common for on-premises to cloud connectivity
传输层安全 (TLS)<br>Transport Layer Security (TLS)<br>
Data in motion is most often encrypted using TLS or HTTPS<br>This is typically how a session is encrypted before a user enters the credit card details.
TLs uscs an x509 certificate with a public/private key pair
动态主机配置协议 (DHCP)<br>Dynamic Host Configuration Protocol (DHCP)<br>
The IP address associated with a system event can be used when identifying a user or system
With proper DHCP logs,a<font color="#e74f4c"> SIEM can leverage this data to track</font> an IP address to a specific endpoint
Some hypervisors offer a feature to limit which network cards are eligible to perform DHCP offer<br>This prevents roque DHCP servers from issuing IPs to clients and servers<br>
域名系统安全扩展 (DNSSEC)<br>Domain Name System Security Extensions (DNSSEC)<br>
A set of specifications primarily aimed at reinforcing the integrity of DNS
Achieves this by providing for <font color="#e74f4c">cryptographic authentication</font> of DNS data using <font color="#e74f4c">digital signatures</font>
Provides proof of origin and makes cache poisoning and spoofing attacks more difficult
虚拟专用网络 (VPN)<br>virtual private network (VPN)<br>
Chain of Custody
Non-repudiation
Non-repudiation is the guarantee that no one can deny a transaction.
<b>Digital Signatures</b> prove that a digital message or document was not modified-intentionally or unintentionally-from the time it was signed.<br>based on asymmetric cryptography (a public/private key pair) the digital equivalent of a handwritten signature or stamped seal.
<b>message authentication code(MAC)</b>.the two parties that are communicating can verify non-repudiation <font color="#e74f4c">using a session key<br></font>Electronic financial transfers (EFTs)Frequently use MACs to preserve data integrity.<br>
<b>Hash-based message authentication code (HMAC)</b>is a special type of MAC with a cryptographic hash function AND a secret cryptographic key<br>HTTPS,SFTP,FTPS,and other transfer protocols use HMAC<br>
Cryptographic Key Establishment and Management
Cryptoaraphy provides a number of security functions including confidentiality,integrity,and nonrepudiation.
<b>Eneryption tools</b> like TLS or a VPN can be used to provide confidentiality.
<b>Hashing </b>can be implemented to detect unintentional data modifications. integrity
Additional security measures like <b>digital signatures</b> or hash-based message authentication code (HMAC)can be used to<br>detect <font color="#e74f4c">intentional tampering</font>.
HMAC can simultaneously verify both data integrity and message authenticity
网络安全控制<br>Network security controls<br>
防火墙<br>firewalls<br>
<ul><li>Stateless and stateful</li><li>Application,host,and virtual</li><li>Web application (WAF)</li><li>Next generation(NGFW)</li></ul>
入侵检测系统 (IDS)<br>intrusion detection systems (IDS)<br>
入侵防御系统 (IPS)<br>intrusion prevention systems (IPS)<br>
<ul><li>Host-based (HIDS and HIPS)</li><li>Network (NIDS and NIPS)</li><li>Hardware vs Software</li></ul>
蜜罐<br>honeypots<br>
漏洞评估<br>vulnerability assessments<br>
网络安全组<br>network security groups<br>
堡垒主机<br>bastion host<br>
A host used to allow administrators to access a private network from a lower security zone
Will have a network interface in both the lower and higher security zones
Will be secured at the <font color="#e74f4c">same level as the higher security zone</font> it's connected to.
A dedicated host for secure admin access
'Jumpbox'or jump server'two common names for bastion hosts
通过应用基线、监控和修复来强化操作系统 (OS)<br>Operating system (OS) hardening through <br>the application of baselines, monitoring and <br>remediation<br>
Windows
Linux
VMware
OS Hardening
Hardening is the configuration of a machine into a secure state through application of a <font color="#e74f4c">configuration baseline</font>.
Baselines can be applied to a single <font color="#e74f4c">VM image</font>,or to a <font color="#e74f4c">VM template</font> created that is then used to deploy all VMs.
A hardened VM image may be customer-defined,CPS-defined,or from a <font color="#e74f4c">third party</font>,often available through a cloud marketplace.
The Center for Internet Security (CIS)offers hardened VM images in CSP marketplaces
BASELINES,BENCHMARKS,AND CONTROLS
control
a high-level description of a feature or activity that needs to be addressed and is not specific<br>to a technology or implementation.
Benchmark
<font color="#e74f4c">contains security recommendations</font> for a specific technology,such as an laas VM.
Baseline
is the implementation of the benchmark on the individual service.
control ls expressed as Benchmark and implemented through a Baseline
BENCHMARKS/SECURE CONFIGURATION GUIDES
Benchmarks describe configuration baselines and best practices for securely configuring a system.
<b>Platform-/Vendor-Specific Guides</b>:released with new products so that they can be set up as securely as possible, making them less vulnerable <br>to attack.<br>
<b>Web Servers</b>:the two main web servers used by commercial companies are Microsoft's<b> Internet Information Server(IIS)</b>,and the Linux-based <br><b>Apache</b>. Because they are public-facing,they are prime targets for hackers.To help reduce the risk,both Microsoft and Apache provide security guides to help security teams <font color="#e74f4c">reduce the attack surface</font>,making them more secure.<br>
These guides advise updates being in place,unneeded services are disabled,and the operating system is hardened to minimize risk of security breach.
<b>Operating System</b>s:Most vendors,such as Microsoft,have guides that detail the best practices for installing their operating systems.
补丁管理<br>Patch management<br>aka "update management"<br>
ensures that systems are <font color="#e74f4c">kept up-to-date</font> with current patches.
process will <font color="#e74f4c">evaluate,test,approve,and deploy</font> patches.
<font color="#e74f4c">system audits</font> verify the deployment of approved patches to system
patch both native OS and 3rd party apps apply out-of-band updates promptly.
Cloud service providers(CSP)generally provide a patch management feature tailored to their laas offering.
基础设施即代码 (IaC) 策略<br>Infrastructure as Code (IaC) strategy<br>
is the management of infrastructure(networks,VMs,load balancers,and connection topology) <font color="#e74f4c">described in code</font>
just as the same source code generates the same binary, code in the lac model results in the same environment <font color="#e74f4c">every time it is applied</font>.
laC is a key Devops practice and is used in conjunction with continuous integration and continuous delivery (<font color="#e74f4c">CI/CD</font>).
lac is very common (the standard)in the cloud
cloud-Native controls
Platforms like Microsoft Azure and Amazon Web Services (AWS)have their own tools,such as Azure Resource Manager(ARM)and AWS Cloud Formation.
These tools make managing Microsoft and AWS cloud resources easier, supporting Infrastructure-as-Code.
Separate tools,for separate platforms,platform-specific
Third-Party Solutions
Third-party tools adds more <font color="#e74f4c">flexibility,functionality,and multi-platform support.</font>
子主题
For example,some organizations move to <font color="#e74f4c">Terraform</font> for infrastructure-as-Code because it supports the major CSPs using a single language.
two distinct characteristics of IaC
Declarative
lac must know the current state;it must know whether the infrastructure already exists to know whether to create it or not.
Impcrative deployment methodologies are unawarc of current state
ldempotent
Deployment of an laC template can be applied multiple times without changing the results.
If the lac template says,“deploy 4 VMs" and 3 exist, 1 more is deployed
集群主机的可用性<br>Availability of clustered hosts<br>
Cluster advantages include high availability via redundancy,optimized performance via distributed workloads,and the ability to scale resources
Cluster management agent
Often part of hypervisor or load balancer software, is responsible for mediating access to shared resources in a cluster.
<b style=""><font color="#000000">Reservations</font></b> are guarantees for a certain <font color="#e74f4c">minimum level of resources</font> available to a specified virtual machine.
A <b>limit</b> is a maximum allocation.
A <b>share</b> is a weighting given to a particular VM
Share value is used to <font color="#e74f4c">calculate percentage-based access</font> pooled resources when there is contention.
分布式资源调度<br>distributed resource scheduling<br>
<b>Distributed Resource Scheduling (DRS)</b> is the coordination element in a cluster of VMware ESXi hosts
DRS mediates access to the physical resources.
动态优化<br>dynamic optimization<br>
<b>Dynamic Optimization</b> is <font color="#e74f4c">Microsoft's DRS equivalent</font> delivered through their cluster management software.
存储集群<br>storage clusters<br>
<b>Storage clusters</b> pool storage,providing reliability,increased performance,or possibly additional capacity.
维护模式<br>maintenance mode<br>
高可用性(HA)<br>high availability (HA)<br>
客户操作系统 (OS) 的可用性<br>Availability of guest operating system (OS)<br>
Guest OS availability
Once a VM is created in laas,the CSP no longer has direct control over the OS.
Customer can use <font color="#e74f4c">baselines,backups,and cloud storage features</font> to provide resiliency of the guest OS.
e.g.vendor supplied OS baseline templates,cloud storage redundancy(zone or geo-redundancy)Features
Backup and recovery
In virtualized cloud infrastructure,this might involve the use of <font color="#e74f4c">snapshots</font>.
Resiliency
Resiliency is achieved by architecting systems to handle failures from the outset rather than needing to be recovered.
For example,virtualization host clusters with live migration provide resiliency
性能和容量监控<br>Performance and capacity monitoring<br>
CSP should implement monitoring to ensure that they are able to meet <font color="#e74f4c">customer demands and promised capacity</font>.
Consumer should monitor to ensure CSP is meeting their obligations
Most monitoring tasks will be in support of the availability objective.
Alerts should be generated based on established thresholds and appropriate response plans initiated.
<b>"CORE 4"</b>:Monitoring should include utilization,performance,and availability of 1)CPU,2)memory,3)storage and 4)network.
网络<br>network
计算<br>compute
存储<br>storage
响应时间<br>response time<br>
硬件监控<br>Hardware monitoring<br>
<b>Physical hardware</b> is necessary to provide all the services that enable the virtualization that enables cloud computing.
<b>Hardware monitoring</b> should monitor:CPU,RAM,fans,disk drives,and network components
<b>Environmental</b>:Computing components are not designed for use in very hot,humid,or wet environments.
HVAC,temperature,and humidity monitoring are important
磁盘<br>disk
中央处理器 (CPU)<br>central processing unit (CPU)<br>
风扇速度<br>fan speed<br>
温度<br>temperature
主机和客户操作系统 (OS) 备份和恢复功能的配置<br>Configuration of host and guest operating system <br>(OS) backup and restore functions<br>
Responsibility by category
<b>Saas</b>.<font color="#e74f4c">CSP retains full control over backup and restore</font> and will often have SLA restore commitments.
Customer typically has shared responsibility for their data
<b>Paas</b>.<font color="#e74f4c">Shared responsibility</font>:CSP owns infrastructure backups,consumer owns backups of their data.
<b>laas</b>.Consumer owns backup/recovery of VMs.
Consumer backups may include full backups,snapshots,or definition files used for infrastructure as code deployments
considerations
<b>Sensitive data</b> may be stored in backups.
Access controls and need-to-know principles to limit exposure
<b>Physical separation</b>:backups should be stored on different hardware or availability zones.
Zone redundant or geo-redundant cloud storage
<b>Integrity</b> of all backups should be <font color="#e74f4c">verified routinely </font>to ensure that they are usable.
管理平面<br>Management plane<br>
Provides virtual management options analogous to physical admin options of a legacy datacenter
e.g. powering VMs on and off,provisioning virtual infrastructure for VMs like RAM and storage
调度<br>scheduling
编排<br>orchestration
Orchestration is the <font color="#e74f4c">automated configuration and management</font> of resources in bulk
Patch management and VM reboots are commonly orchestrated tasks
The <b>management console</b> is the web-based consumer interface for managing resources
CSP must ensure management portal calls to the management plane only allow customer access to their own resources.
维护<br>maintenance
5.3 实施运营控制和标准(例如,信息技术基础架构库 (ITIL)、国际标准组织/国际电子技术委员会 <br>(ISO/IEC) 20000-1)<br>Implement operational controls and standards (e.g., Information Technology Infrastructure <br>Library (ITIL), International Organization for Standardization/International Electrotechnical <br>Commission (ISO/IEC) 20000-1)<br>
变更管理<br>Change management<br>
refers to the <font color="#e74f4c">process of evaluating a change request</font> within an organization and deciding if it should go ahead.
requests are sent to the <font color="#e74f4c">Change Advisory Board (CAB) </font>to ensure that it is beneficial to the company.
requires changes to be <font color="#e74f4c">requested</font>,<font color="#e74f4c">approved,tested,and documented</font>.
change management/change control
Change Management policy that details how changes will be processed in an organization
Guidance on the process
Change Control process of evaluating a change request to decide if it should be implemented
The process in action
Automating change management
In an environment that leverages <font color="#e74f4c">Cl/CD and infrastructure-as-code</font>,change reviews may be partially automated when new code is ready for <br>deployment.<br>
This reduces operational overhead and human error,reduces security risk,and enables more frequent releases while maintaining a strong <br>security posture.<br>
Helps reduce outages or weakened security from unauthorized changes.
<b>Versioning</b> uses a labeling or numbering system to track changes in updated versions of software.
配置管理<br>Configuration management<br>
Ensures that systems are configured similarly,configurations are <font color="#e74f4c">known and documented</font>.
<b>Baselining</b> ensures that systems are deployed with a common baseline or starting point,and imaging is a common baselining method.
Baseline is composed of individual settings called <font color="#e74f4c">configuration items (CI)</font>
连续性管理<br>Continuity management<br>
Continuity is concerned with the <font color="#e74f4c">availability</font> aspect of the CIA triad
There are a variety of standards related to continuity management.
NIST Risk Management Framework and ISO 27000<br>
Both deal with <font color="#e74f4c">business continuity and disaster recovery (BCDR) </font>terms that fall under the larger category of <font color="#e74f4c">continuity management</font>.
Health Insurance Portability and Accountability Act (HIPAA)<br>
<font color="#e74f4c">Healthcare data</font> in the United States is governed by this standard.
<b>Mandates</b> adequate data backups,disaster recovery planning,and emergency access to healthcare data in the event of a system interruption.
ISO 22301:2019 Security and resilience-BC management systems
This specifies the requirements needed for an organization to <font color="#e74f4c">plan,implement and operate,and continually improve</font> the continuity capability.
信息安全管理<br>Information security management<br>
The goal of information security management is to ensure a consistent organizational approach to <font color="#e74f4c">managing security risks</font>
It is the approach an organization takes to <font color="#e74f4c">preserving </font>confidentiality, integrity,and availability (<font color="#e74f4c">the CIA triad</font>)for systems and data.
Standards that provide guidance for implementing and managing security controls in a cloud environment include:
ISO/IEC 27001
A global standard for information security management that helps organizations protect their data from threats.
ISO/IEC 27017 <font color="#e74f4c">D1.5</font>
Asecurity <font color="#e74f4c">standard developed for cloud service providers </font>and users to make a safer cloud-based environment and reduce the risk of security <br>problems.<br>
ISO/IEC27018 <font color="#e74f4c">D6.2</font>
The first international standard about the privacy in cloud computing services
Is a"Code of practice for protection of <font color="#e74f4c">personally identifiable information(Pll) </font>in public clouds acting as Pll processors".
ISO/IEC 27701
Extends the ISMS guidance in 27001 to manage risks related to privacy,by implementing and managing a <font color="#e74f4c">privacy information management <br>system (PIMS)</font><br>
NIST RMF & CSF
<b>RMF</b>'s audience is the entire <font color="#e74f4c">federal government</font> and <b>CSF</b> is aimed at <font color="#e74f4c">private (commercial) business</font>, though both address cybersecurity risk <br>management.<br>
NIST SP 800-53
Provides a <font color="#e74f4c">catalog of security and privacy controls</font> for all U.S.federal information systems except those related to national security.
AICPA SOC 2
Service Organization Controls (SOC 2) framework has seen wide adoption among CSPs as well as the <font color="#e74f4c">use of a third party to perform audits</font>.
This also provides increased assurance for business partners and customers <font color="#e74f4c">who cannot audit the CSP directly</font>
连续的服务改进管理<br>Continual service improvement management<br>
One critical element of continual service improvement includes areas of <font color="#e74f4c">monitoring and measurement</font>
These often take the form of security metrics.
Metrics need to be <font color="#e74f4c">tailored to the audience</font> they will be presented to,which often means "executive friendly".
Business leaders will be less interested in technical topics.
The metrics should be used to <font color="#e74f4c">aggregate </font>information and present it in an easily <font color="#e74f4c">understood,actionable format</font>.
事故管理<br>Incident management<br>
<b>Events </b>are <font color="#e74f4c">any observable item</font>,including routine actions such as a user successfully logging into a system.
<b>Incidents</b>,by contrast,are events that are <font color="#e74f4c">unplanned and have an adverse impact</font> on the organization
Not all incidents will require the security tcam but exam focus is security
All incidents should be <font color="#e74f4c">investigated</font> and <font color="#e74f4c">remediated to restore</font> the organization's normal operations and to <font color="#e74f4c">minimize adverse impact</font>
A popular security incident management methodology is the <font color="#e74f4c">NIST SP 800-61 rev2</font> "<font color="#e74f4c">Computer Security Incident Handling Guide</font>'
6 phases of incident response
Preparation
Where incident response plans are written,and configurations documented.
Identification
Determining whether or not an organization has been breached. Is it really an incident?
Containment
Limiting damage (scope) of the incident.
Eradication
Once affected systems are identified,coordinated isolation or shutdown,rebuild,and notifications.
Recovery
Root cause is addressed and time to return to normal operations is estimated and executed.
Lessons Learned
Helps prevent recurrence,improve IR process.
问题管理<br>Problem management<br>
In the ITIL framework,problems are the causes of incidents or adverse events that impact the CIA triad.
Problems are,in essence,the <font color="#e74f4c">root cause</font> of incidents
problem management utilizes <font color="#e74f4c">root-cause analysis</font> to identify the underlying problem(s)that lead to an incident.
It also aims to minimize the likelihood of future recurrence
An <font color="#e74f4c">unsolved problem</font> will be documented and tracked in a known issues or known errors database.
发布管理<br>Release management<br>
Today,traditional release management practices have largely been replaced with release practices in Agile development methodologies
The primary change is the <font color="#e74f4c">frequency of releases</font> due to the increased speed of development activities in continuous integration/continuous <br>delivery(CI/CD).<br>
Release scheduling may require coordination with customers and CSP.
Release manager is responsible for a number of checks including ensuring change requests and approvals are complete,before approving final <br>release gate.<br>
Changes that impact data exposure may require Security team
Some of the <font color="#e74f4c">release process is often automated</font>,but manual processes may be involved,such as updating documentation and writing release <br>notes.<br>
The increased automation and pace of release in Agile and CI/CDtypical to the cloud necessitates <font color="#e74f4c">automated security testing and policy controls</font>.
部署管理<br>Deployment management<br>
In more mature organizations,the CD in Cl/CD stands for <font color="#e74f4c">continuous deployment</font>,which further/fully automates the release process.
Once a developer has written their code and checked it in,automated testing is triggered,and if all tests pass,code is integrated and <font color="#e74f4c">deployed <br>automatically</font><br>
Less manual effort means lower cost,fewer mistakes,Faster releases.
Even organizations with continuous deployment may require some deployment management processes to deal with deployments that cannot <br>be automated<br>
Processes for new software and infrastructure should be documented
Containerization(managed Kubernetes)is common in mature organizations supporting more frequent deployment in public cloud environments
Fully automated deployment requires greater <font color="#e74f4c">coordination with and integration of information security</font> throughout the development process
服务等级管理<br>Service level management<br>
Service level management focuses on the organization's requirements for a service,as defined in a <font color="#e74f4c">service level agreement (SLA)</font>.
SLAs are like a contract focused on <font color="#e74f4c">measurable outcomes</font> of the service being provided
Should include clear metrics that define 'availability'for a service
SLAs require routine monitoring for enforcement,and this typically relies on metrics designed to indicate whether the service level is being met
Cloud infrastructure decisions should be made with the SLA in mind
<font color="#e74f4c">Defining the levels of service</font> is usually up to the cloud service provider(CSP) in public cloud environments.
<font color="#e74f4c">Customer should monitor their CSPs compliance</font> with the SLAs promised with various services,including ensuring credits for SLA failures are <br>received.<br>
可用性管理<br>Availability management<br>
A service may be "up",that is to say the service is reachable but not available meaning it cannot be used.
Availability and uptime are often used synonymously,but there is an important distinction:Availability means the specific service is <font color="#e74f4c">up AND <br>usable</font>.<br>
<font color="#e74f4c">AuthN and AuthZ must work,and requests must be fulfilled</font>
Many of the same concerns that an organization would consider in business continuity and disaster recovery apply in availability management
<font color="#e74f4c">BCDR plans aim to quickly restore service availability in adverse events</font>
Other concerns and requirements,such as data residency or the use of encryption, can complicate availability.
<font color="#e74f4c">Customer must configure services to meet their requirements</font>
Cloud consumers have a role to play in availability management as well; how much depends on the cloud service category (laas,Paas,or Saas)
容量管理<br>Capacity management<br>
One of the core concerns of availability is the amount of service capacity available compared with the amount being subscribed to.
For example,if a service has 100 active users but only 50 licenses available,that means the service is over capacity and 50 users will be denied <br>service.<br>
<font color="#e74f4c">Capacity issucs can be physical (infrastructure)or logical (c.g,licenses)</font>
Measured service is one of the core elements of cloud computing,so metrics that illustrate demand for the service are relatively easy to identify
Responsibility for capacity management belongs to <font color="#e74f4c">CSP at the platform level</font>,but belongs to customer for deployed apps and services
<font color="#e74f4c">Customer must choose appropriate service tiers,design app to scale</font>
The cloud provides the "<font color="#e74f4c">perception of unlimited capacity</font>",but in reality,is oversubscribed by design,and CSP must monitor how much is too much.
ISO/IEC 20000-1
Specifies requirements for "establishing, implementing,maintaining and continually improving a service management system(SMS)'"
Supports management of the service lifccycle,including planning,design,transition,delivery and service improvement
5.4 支持数字取证<br>Support digital forensics<br>
eDiscovery
or "electronic discovery",is the identification,collection,preservation,analysis,and review of electronic information.
Usually associated with collection of electronic informdtion for <font color="#e74f4c">legal purposes</font> or <font color="#e74f4c">security breach</font>
FORENSIC INVESTIGATION STANDARDS
ISO/IEC 27037:2012
Guide for collecting,identifying,and preserving electronic evidence
ISO/IEC 27041:2015
Guide for incident <font color="#e74f4c">investigation</font>
ISO/IEC 27042:2015
Guide for digital <font color="#e74f4c">evidence analysis</font>.
ISO/IEC 27043:2015
Guide for incident <font color="#e74f4c">investigation principles and processes</font>
ISO/IEC 27050
A four-part standard within the ISO/IEC 27000 family of information security standards
Offers a framework,governance,and <font color="#e74f4c">best practices</font> for forensics,eDiscovery,and evidence management
CSA Security Guidance
Free guidance in Domain 3:Legal Issues:<font color="#e74f4c">Contracts and Electronic Discovery</font>
Offers guidance on legal concerns related to security, privacy,and contractual obligations
取证数据收集方法<br>Forensic data collection methodologies<br>
Evidence collection Process
Logs are essential
All activities should be logged including time,person performing the activity,tools used,system or data inspected,and results.
Document everything
including physical or logical system states,apps running,and any physical configurations of hardware as appropriate.
Consider volatility
Volatile data(data not on a durable storage)requires special handling and priority. <font color="#e74f4c">Collect data from volatile sources first</font>
Evidence collection Best Practices
Utilize original physical media
utilize original physical media whenever possible, as copies may have <font color="#e74f4c">unintended loss of integrity</font>.
Verify data integrity
at multiple steps by <font color="#e74f4c">using hashing</font>,especially when performing operations such as copying files.
Follow documented procedures
dedicated evidence custodian,logging all activities, leave systems powered on to preserve volatile data.
Establish and maintain communications
with <font color="#e74f4c">relevant parties</font> such as the CSP,internal legal counsel,and law enforcement for guidance and requirements.
Communication with relevant parties and communication plans covered in section 5.5
证据管理<br>Evidence management<br>
Legal Hold
protecting any documents that can be used in evidence from being altered or destroyed.
sometimes called <font color="#e74f4c">litigation hold</font>
chain of Custody
<font color="#e74f4c">tracks the movement of evidence</font> through its collection,safeguarding,and analysis lifecycle
<font color="#e74f4c">documents each person who handled the evidence</font>,the date/time it was collected or transferred,and the purpose for the transfer.
Confirms appropriate collection,storage,and handling
SCOPE of evidence
describes what is relevant when collecting data
in a multitenant cloud environment, this may be particularly important
collection from shared resources <font color="#e74f4c">may expose other customers data</font>
Scope of data collection is more challenging in the cloud
ON PREMISES VS CLOUD
The cloud comes with <font color="#e74f4c">additional challenges</font> when it comes to forensic investigation
Data location:
Do you know where the data is hosted?And laws of countries it's hosted in?
Many cloud services store copies of data in multiple locations
Rights and responsibilities:
What rights for forensic data collection are listed in your CSP contract?<br>If it requires CSP cooperation,what is their response SLA?
Tools:
Are your forensic tools suitable for a multi-tenant environment?<br>What is your organizations liability if you unintentionally capture another customer's data on a shared resource?
e.g remnants of a previous customer's data on physical storage
<font color="#e74f4c">Laws and regulations</font> impact a consumer's ability to perform forensic data collection in the cloud
Regulatory and Jurisdiction
Cloud data should be stored and have <font color="#e74f4c">data sovereignty</font> in region stored.
<font color="#e74f4c">Many countrics have laws requiring businesses to store data within their borders.</font>
The US introduced the <font color="#e74f4c">Clarifying Lawful Overseas Use of Data (CLOUD)Act</font> in 2018 due<br>to the problems that FBI faced in forcing Microsoft to hand over data stored in Ireland.
Aids in evidence collection in investigation of serious crimes
In 2019,the US and the UK signed a data-sharing agreement to give law enforcement<br>agencies in each country faster access to evidence held by cloud service providers.
<font color="#e74f4c">Verifying audit and forensic data collection rights with your CSP</font> to ensure you understand your rights and their legal obligations before you sign contracts is critical.
cloud considerations (cont)
Forensic investigators should know their legal rights<font color="#e74f4c"> in every jurisdiction</font> (region or country)where the organization hosts data in the cloud.
Some countries will not allow eDiscovery From outside their borders
chain of custody
In traditional forensic procedures,it is "easy"to maintain an accurate history of time,location,and handling.
In the cloud,<font color="#e74f4c">physical location is somewhat obscure</font>.However,investigators can acquire a VM image from any workstation connected to the internet.
Time stamps and offsets can be more challenging due to location.
Maintaining a proper chain of custody is more challenging in the cloud
Breach notification laws
Varies by country and regulations.For example,GDPR requires notificationWithin 72 hours.<br><font color="#e74f4c">Applies to all with EU customers,even if it's a 3rd party breach!</font><br>
EVIDENCE UTILITY
Evidence should possess these five attributes to be useful.
Authentic:
The information should be <font color="#e74f4c">genuine</font> and clearly correlated to the incident or crime.
Accurate:
The <font color="#e74f4c">truthfulness and integrity</font> of the evidence should not be questionable.
Complete:
All evidence should be <font color="#e74f4c">presented in its entirety</font> even if it might negatively impact the case being made.
It is illegal in most jurisdictions to hide evidence that disproves a case.
Convincing:
The evidence should be <font color="#e74f4c">understandable and clearly</font> support an assertion being made.
e.g,chain of events presented from audit logs should be clear
Admissible:
Evidence must meet the rules of the body judging it,such as a court.
<font color="#e74f4c">Hearsay</font> (indirect knowledge of an action)or evidence that has been <font color="#e74f4c">tampered</font> with may be thrown out by a court
EVIDENCE ADMISSIBILITY
Requirements for evidence to be admissible in a court of law:
Evidence must be <font color="#e74f4c">relevant </font>to a fact at issue in the case. Makes a fact more or less probable
The fact must be <font color="#e74f4c">material</font> to the case.
The evidence must be <font color="#e74f4c">competent (reliable)</font>.
Must be obtained by <font color="#e74f4c">legal means</font>
To prevail in court,evidence must be <font color="#e74f4c">sufficient</font>,which means "convincing without question,leaving no doubt'
收集、获取和保存数字证据<br>Collect, acquire, and preserve digital evidence<br>
ACQUISITION OF EVIDENCE
You must begin to collect evidence and as much information about the incident as possible.
Evidence can be used in a subsequent legal action or in finding attacker identity.
Evidence can also assist you in determining the <font color="#e74f4c">extent of damage</font>.
DATA COLLECTION CHALLENGES IN THE CLOUD
Control
Using a cloud service <font color="#e74f4c">involves loss of some control</font>,and different service models offer varying levels of access.
Multitenancy and shared resources
Evidence collected while investigating a security incident may <font color="#e74f4c">unintentionally include data from another customer</font>.
Most likely if CSP or delegate were performing Forensic recovery from shared physical resource,such as a storage array.
Data volatility and dispersion
Cloud environments support high availability techniques for data,like <font color="#e74f4c">data sharding</font>.
Sharding <font color="#e74f4c">breaks data into smaller pieces</font>,storing multiple copies of each piece across different data centers.
ORDER OF VOLATILITY
If it disappears in <font color="#e74f4c">system reboot</font>,<font color="#e74f4c">power loss</font>,<font color="#e74f4c">passage of time</font>,it is <font color="#e74f4c">volatile</font>
Volatility,in approximate order:
<ol><li>CPU,cache,and register contents</li><li>Routing tables,ARP cache,process tables,kernel statistics</li><li>Live network connections and data flows</li><li>Memory (RAM)</li><li>Temporary file system and swap/pagefile</li><li>Data on hard disk</li><li>Remotely logged data</li><li>Data stored on archival media and backups</li></ol>
FOR THE EXAM:Remember that volatile (perishable) information should be collected first.
EVIDENCE COLLECTION AND HANDLING
four general phases:
Collection
<font color="#e74f4c">Proper evidence handling</font> and decision making should be a part of the <font color="#e74f4c">incident response procedures and training</font><br>for team members performing response activities.
Examination
Analysis
Reporting
EVIDENCE PRESERVATION
Collect originals,work from copies!
Protections for evidence storage include:
<ul><li>locked cabinets or safes</li><li>dedicated/isolated storage facilities</li><li>environment maintenance(temp,humidity)</li><li>access restrictions and document/track activity</li><li>blocking interference (shield from wireless) Faraday cage</li></ul>
ACQUISITION
Areas and considerations in evidence acquisition
<b>Disk</b> aka hard drive.Was the storage media itself damaged?
<b>Random-access memory (RAM)</b>.Volatile memory used to run applications.
<b>Swap/Pagefile</b>.used for running applications when RAM is exhausted.
<b>OS (operating system).</b>Was there corruption of data associated with the OS or the applications?
<b>Device</b>.When the police are taking evidence from laptops,desktops,and mobile devices,they <font color="#e74f4c">take a complete system image</font>.
The <font color="#e74f4c">original image is kept intact</font>,installed on another computer, <font color="#e74f4c">hashed</font>,then analyzed to find evidence of any criminal activity.
<b>Firmware</b>.embedded code,could be reversed engineered by an attacker,so original source code must be compared to code in use.
a coding expert to compare both lots of source code in a technique called <font color="#e74f4c">regression testing</font>. <font color="#e74f4c">rootkits and backdoors</font> are concerns
<b>Snapshot</b>.if the evidence is from a <font color="#e74f4c">virtual machine</font>,a snapshot of the virtual machine can be exported for investigation.
<b>Cache. </b>special high-speed storage that can be either a reserved section of main memory or an independent high-speed storage device.
memory cache AND disk cache,both are volatile
<b>Network</b>.OS includes command-line tools (like netstat)that provide information that could disappear if you reboot the computer.
Like RAM,<font color="#e74f4c">connections are volatile</font> and lost on reboot
<b>Artifacts</b>.any piece of evidence,including <font color="#e74f4c">log files,registry hives</font>,DNA, fingerprints,or fibers of clothing normally invisible to the naked eye.
INTEGRITY
Hashes
When either the forensic copy or the system image is being analyzed,the data and applications are <b>hashed at collection</b>.
It can be used as a <b>checksum</b> to ensure integrity later.
File can be <font color="#e74f4c">hashed before and after collection</font> to ensure match on the original hash value to <font color="#e74f4c">prove data integrity</font>.
Provenance
Data provenance effectively provides a <font color="#e74f4c">historical record</font> of data and its <font color="#e74f4c">origin and forensic activities performed on it</font>.
Similar to<font color="#e74f4c"> data lineage</font>,but also includes the inputs,entities, systems and processes that influenced the data.
<b>Data lineage</b> is the process of tracking flow of data over time,showing where the data originated,how it has changed,and its ultimate destination.
PRESERVATION
Data needs to be preserved in its <font color="#e74f4c">original state</font> so that it can be produced as evidence in court.
original data must remain <font color="#e74f4c">unaltered and pristine</font>
"forensic copy"of evidence
an image or <font color="#e74f4c">exact,sector by sector</font>,copy of a hard disk or other storage device, taken using specialized software,preserving an exact <br>copy of the original disk.<br>
<font color="#e74f4c">Deleted files,slack space,system files and executables</font> (and documents renamed to mimic system files and executables)are all part of <br>a forensic image.<br>
Putting a copy of the most vital evidence in a <font color="#e74f4c">WORM drive</font> will prevent any tampering with the evidence (you cannot delete data <br>from a WORM drive.)<br>
You could also write-protect/put a legal hold on some types of <font color="#e74f4c">cloud storage</font>.
5.5 管理与相关方的沟通<br>Manage communication with relevant parties<br>
Both company <font color="#e74f4c">security policics (transparency)</font> AND <font color="#e74f4c">regulatory compliance (law)</font>shape communication
Communication Plan
The plan that details how relevant stakeholders will be informed in event of an incident. (like a security breach)
<font color="#e74f4c">Would include plan to maintain confidentiality</font> such as encryption to ensure that the event does not become public knowledge.
<font color="#e74f4c">Contact list </font>should be maintained that includes stakeholders from the government,police,customers,suppliers,and internal staff.
Compliance requlations,like GDPR,include notification requirements,relevant parties,and timelines
<font color="#e74f4c" style="">Confidentiality amongst internal stakeholders</font> is desirable so external stakeholders can be informed in accordance with the plan.
Stakeholder Management
A stakeholder is a party with an interest in an enterprise; corporate stakeholders include investors,employees,customers,<br>and suppliers.
<font color="#e74f4c">Regulated industries</font>,such as banking and healthcare will have requirements driven by the regulations governing their industries.
供应商<br>Vendors<br>
Vendors:The first step in establishing communication with vendors is an <font color="#e74f4c">inventory of critical third parties</font> on which the organization depends.
This inventory will drive vendor risk management activities in two ways:
1)Some vendors may be critical to the company's <font color="#e74f4c">ongoing function</font>,like the CSP
2)Others may provide critical inputs to a company's <font color="#e74f4c">revenue generation</font>
Vendor communications may be governed by <font color="#e74f4c">contract and SLA</font>
客户<br>Customers<br>
Customers:As cloud consumers,most company's will be the recipients of communications from their chosen CSPs.
Consumers should define (or at least monitor) <font color="#e74f4c">communication SLA</font>
合作伙伴<br>Partners<br>
Partners:Often have a level of access to a company's systems similar to that of the company's own employees but are not under company <br>control.<br>
Communication neede will evolve through partner <font color="#e74f4c">onboarding</font>, <font color="#e74f4c">maintenance</font>,and <font color="#e74f4c">offboarding</font>
监管机构<br>Regulators<br>
Regulators:Most regulators have developed <font color="#e74f4c">cloud-specific guidance</font> for compliant use of cloud services.
GDPR,HIPAA,and PCI DSS have communication requirements
其他利益相关者<br>Other stakeholders<br>
other Stakeholders:The company may need to communicate with the public, investors,and the company's <font color="#e74f4c">cyber insurance</font> company in a crisis.
Procedures for<font color="#e74f4c"> order and timing</font> of contact should be created
Some cyber insurance providers require that they are the <font color="#e74f4c">first point of contact</font> in the event of a security incident
Who is responsible<br>for communication?
if customer data is impacted,the company is always responsible timely communication
This is true regardless of the cloud service model in use,even if the CSP is at Fault
SHARED RESPONSIBILITY FOR SECURITY
5.6 管理安全运营<br>Manage security operations<br>
安全运营中心 (SOC)<br>Security operations center (SOC)<br>
A support unit designed to centralize a variety of security tasks and personnel at the tactical (mid-term)and operational (day-to-day) levels.
Both the CSP and consumer should have a SOC function
Key functions of the SOC include:
<ul><li>Threat Prevention</li><li>Threat Detection</li><li>Incident Management</li><li>Continuous Monitoring Reporting</li><li>Alert Prioritization</li><li>Compliance Management</li></ul>
安全控制的智能监控<br>Intelligent monitoring of security controls<br>
MONITORING
a <b>form of auditing</b> that focuses on active review of the log file data.
used to <b>hold subjects accountable</b> for their actions also used to monitor <font color="#e74f4c">system performance</font>.
tools such as IDSs or SIEMs automate monitoring and provide <font color="#e74f4c">real-time analysis</font> of events.
MONITORING SECURITY CONTROLS
Monitoring security controls used to be an activity closely related to formal audits that occur relatively infrequently,often annually or less.
A newer concept is known as continuous monitoring,is described in the <font color="#e74f4c">NIST SP 800-37:Risk Management Framework (RMF)</font>
The RMF specifies the creation of a continuous monitoring strategy for <font color="#e74f4c">getting near real-time risk information</font>.
Network firewalls,web app firewalls (WAF),and IDS/IPS provide a critical source of information for<font color="#e74f4c"> NOC or SOC teams</font>.
These devices should be continuously monitored to ensure they are Functional
Monitoring for functionality should include monitoring <font color="#e74f4c">log generation</font>,centralized log <font color="#e74f4c">aggregation</font>,and <font color="#e74f4c">analysis</font>.
HARDWARE Vs SOFTWARE
Hardware
A piece of purpose-built network hardware.
May offer more configurable support for LAN and WAN connections.
Often has superior throughput versus software because it is hardware designed for the speeds and connections common to an enterprise <br>network.<br>
In the cloud,it's virtual - a <font color="#e74f4c">network virtual appliance (NVA)</font>
Software
Software based firewalls that you mightinstall on your own hardware
Provide flexibility to place firewalls anywhere you'd like in your organization.
On servers and workstations,you can run a <font color="#e74f4c">host-based</font> firewall.
Host-based (software)are <font color="#e74f4c">more vulnerable</font> to being disabled by attackers
APPLICATION vs HOST-BASED vs VIRTUAL
Application
Typically caters specifically to application communications.<br>
Often that is HTTPS or Web traffic.
An example is called a <font color="#e74f4c">web application firewall (WAF)</font>
Host-based
Anapplication <font color="#e74f4c">installed on a host OS </font>such as Windows or Linux,both client and server operating systems.
Virtual
In the cloud,firewalls are implemented as <font color="#e74f4c">virtual network appliances(VNA)</font>.
Available from both the CSP directly and third-party partners (commercial firewall vendors)
防火墙<br>firewalls<br>
FIREWALL AND STATE
stateless
Watch network traffic and restrict or <font color="#e74f4c">block packets</font> based on source and destination addresses or other <font color="#e74f4c">static values</font>.
Not 'aware' of traffic patterns or data flows.
Typically,faster and perform better under <font color="#e74f4c">heavier traffic</font> loads.
Stateful
Can watch <font color="#e74f4c">traffic streams from end to end</font>.
Are aware of communication paths and can implement various IP security functions such as tunnels and encryption.
Better at<font color="#e74f4c"> identifying unauthorized and forged</font> communications.
MODERN FIREWALLS
WAF
Protect web applications by <font color="#e74f4c">filtering and monitoring HTTPS traffic</font> between a web application and the Internet.
Typically protects web applications from common attacks like XSS,CSRF,and SQL injection.
Some come pre-confiqured with OWASP rulesets
NGFW
a <font color="#e74f4c">deep-packet inspection</font> firewall that moves beyond port/protocol inspection and blocking.
adds application-level inspection,intrusion prevention,and <font color="#e74f4c">brings intelligence from outside the firewall</font>.
入侵检测系统 (IDS)<br>intrusion detection systems (IDS)<br>
generally responds <font color="#e74f4c">passively </font>by logging and sending notifications
入侵防御系统 (IPS)<br>intrusion prevention systems (IPS)<br>
is <font color="#e74f4c">placed in line </font>with the traffic and includes the <font color="#e74f4c">ability to block malicious traffic</font> before it reaches the target
FLAVORS OF INTRUSION DETECTION SYSTEMS
HIPS<br>
can monitor activity on a <font color="#e74f4c">single system</font> only.
A drawback is that attackers can discover and disable them
NIPS
can monitor activity on a network,and a NIPS<font color="#e74f4c"> isn't as visible </font>to attackers.
蜜罐<br>honeypots<br>
a system that often has <b>pseudo flaws</b> and <b>fake data</b> to <font color="#e74f4c">lure intruders</font>
long as attackers are in the honeypot, they are not in the live network.
A group of honeypots is called a <font color="#e74f4c">honeynet</font>
Lure bad people into doing bad things.Lets you watch them.
Only <font color="#e74f4c">ENTICE,not ENTRAP</font>. You are not allowed to let them download items with "Enticement".
For example,allowing download of a fake payroll file would be <font color="#e74f4c">entrapment</font>.
Goal is to <b>distract </b>from real assets and <b>isolate </b>in a padded cell until you can track them down.
网络安全组<br>network security groups<br>
人工智能 (AI)<br>artificial intelligence (AI)<br>
Monitoring tools,like a SIEM,use Al and ML to automate investigation and response
Artificial Intelligence
Focuses on accomplishing "smart"tasks combining machine learning and deep learning to emulate human intelligence
Machine Learning
A subset of Al,computer algorithms that<font color="#e74f4c"> improve automatically</font> through experience and the use of data.
Deep Learning
a subfield of machine learning concerned with algorithms inspired by the structure and function of the brain called <font color="#e74f4c">artificial neural networks</font>.
日志捕获和分析<br>Log capture and analysis<br>
安全信息和事件管理 (SIEM)<br>security information and event management (SIEM)<br>
User Entity Behavior Analysis (UEBA)
This is <font color="#e74f4c">based on the interaction of a user</font> that focuses on their identity and the data that they would <font color="#e74f4c">normally access on a normal day</font>
It tracks the devices that the user normally uses and the servers that they normally visit.
Sentiment Analysis
Artificial intelligence and machine learning to identify attacks.
Cybersecurity sentiment analysis can monitor articles on social media,look at the text and analyze the sentiment behind the articles.
Over time,can identify a users' attitudes to different aspects of cybersecurity.
Tooling that allows an organization to define incident analysis and response procedures in a digital workflow format.
Integrates your security processes and tooling in a central location (SOC).
Response automation,using machine learning and artificial intelligence
These make it <font color="#e74f4c">faster than humans</font> in <b>identifying</b> and <b>responding </b>to true incidents.
Reduces MTTD and accelerates response
Uses <b>playbooks </b>that define an incident and the action taken.Capabilities vary by situation & vendor
Over time,should produce faster alerting and response for the SOC team.
SIEM AND SOAR
SIEM
system that collects data from many other sources within the network.
provides <b>real-time</b> <font color="#e74f4c">monitoring,analysis correlation & notification</font> of potential attacks.
SOAR
centralized <font color="#e74f4c">alert and response automation</font> with threat-specific playbooks.
response may be fully automated or single-click.
日志管理<br>log management<br>
Logs are worthless if you do nothing with the log data.They are made valuable only by <font color="#e74f4c">review</font>.
That is,they are valuable only if the organization makes use of them to<font color="#e74f4c"> identify activity that is unauthorized or compromising.</font>
SIEM(Security Information Event Monitoring)tools can help to solve some of these problems by offering these key features:
<ul><li>Log centralization and aggregation</li><li>Data integrity</li><li>Normalization</li><li>Automated or continuous monitoring</li><li>Alerting</li><li>Investigative monitoring</li></ul>
SIEM features
Log centralization and aggregation
Rather than leaving log data scattered around the environment on various hosts,the SIEM platform can gather logs from a variety of<br>sources,including:
operating systems,applications,network appliances,user devices, providing a single location to support investigations.
Data integrity
The SIEM should be on a <font color="#e74f4c">separate host with its own access control</font>, preventing any single user from tampering.
Normalization
SIEMs can normalize incoming data to ensure that the data from a variety of sources is <font color="#e74f4c">presented consistently</font>.
Automated or continuous monitoring
Sometimes referred to as correlation,SIEMs use algorithms to evaluate data and <font color="#e74f4c">identify potential attacks</font> or compromises.
Alerting
SIEMs can <font color="#e74f4c">automatically generate alerts</font> such as emails or tickets when action is required based on analysis of incoming log data
Investigative monitoring
When manual investigation is required,the SIEM should provide support capabilities such as<font color="#e74f4c"> querying log files,generating reports</font>.
LOG COLLECTION AND ANALYSIS WITH A SIEM
Log Collectors
SIEM has <font color="#e74f4c">built-in log collector</font> tooling that can collect information from both the syslog server and multiple other servers.An agent is placed <br>on the device that can collect log information,parse and restructure data,and pass to SIEM for aggregation.<br>
Ingestion may be with via an agent,syslog,or API
Log Aggregation
Can <font color="#e74f4c">correlate and aggregate events </font>so that duplicates are filtered and a better understanding network events is achieved to help identify <br>potential attacks.<br>
Packet Capture
Can capture packets and analyze them to identify threats as soon as they reach your network,providing immediate alert to security team if <br>desired.<br>
Data Inputs
The SIEM system collects a massive amount of data from various sources.
May include network devices, <font color="#e74f4c">IDM</font>, <font color="#e74f4c">MDM</font>, <font color="#e74f4c">CASB</font>, <font color="#e74f4c">XDR, </font>and more
LOG FILES
common log files include security logs,system logs,application logs,firewall logs,proxy logs.
should <font color="#e74f4c">be protected</font> by centrally storing them and using permissions to restrict access.
archived logs should be set to read-only to <font color="#e74f4c">prevent modifications</font>.
<b>Log files play a core role in providing evidence for investigations.You'll want to be familiar with the many different types of log files a <br>typical SIEM might ingest.</b><br>
<b>Network</b>:This log file can identify the IP and MAC addresses of devices that are attached to your network.Usually sent to a central syslog server
NIDS/NIPS can be important in identifying threats and anomalies from these.
log files from a proxy server can reveal who's visiting malicious sites
The collective insight may be useful in stopping DDos attack
<b>Web</b>:web servers log many types of information about the web requests,so evidence of potential threats and attacks will be visible here.
information collected about <font color="#e74f4c">each web session</font>:IP address request,Date and time,HTTP method,such as GET/POST,Browser used,and HTTP Status code.
400 series HTTP response codes are <font color="#e74f4c">client-side errors</font>
500 series HTTP response codes are <font color="#e74f4c">server-side errors</font>
<font color="#e74f4c">These logs must be fed to a SIEM IDS/IPS or other system to analysis this data</font>
<b>These files exist on client and server systems.Sending these to a SlEM can help establish a central audit trail and visibility into the scope <br>of an attack.</b><br>
<b>System</b>:contains information about hardware changes,updates to devices, and time synchronization,group policy application,etc.
<b>Application</b>:contains information about software applications,when launched,success or failure,and warnings about potential problems or errors.
<b>Security</b>:contains information about a successful login,as well as unauthorized attempts to access the system and resources.
can identify attackers trying to log in to your computer systems.
captures information on file access and can determine who has downloaded certain data.
<b>DNS</b>:contains virtually all DNS server-level activity,such as zone transfer,DNS server errors,DNS caching,and DNSSEC.
DNS query logging often disabled by default due to volume.
<b>Authentication</b>:information about login events,logging success or failure.<br>multiple sources authenticating log files in a domain environment,including RADIUS,Active Directory,and cloud providers Azure Active Directory.
<b>Log files related to voice applications can be valuable in identifying anomalous activity,unauthorized users,and even potential attacks</b>
<b>VolP and Call Managers</b>:These systems provide information on the calls being made and the devices that they originate from.
may also capture <font color="#e74f4c">call quality</font> by logging the Mean Optical Score (MOS),jitter, and loss of signal. <font color="#e74f4c">Significant loss in quality may indicate attack</font>
each call is logged (inbound and outbound calls),the person making the call,and the person receiving the call. <font color="#e74f4c">Including long-distance calls</font>
<b>Session Initiation Protocol (SIP)Traffic</b>:<b>SIP</b> is used for internet-based calls and the log files generally show:
the 100 events,known as the INVITE,the initiation of a connection,that relates to ringing.
the 200 OK is followed by an acknowledgement
<font color="#e74f4c">Large number of calls not connecting may indicate attack</font>
SYSLOG/SIEM
Event Reporting (Review Reports)
A SIEM typically includes dashboard and collects reports that can be reviewed regularly to ensure that the policies<br>have been enforced and that the environment is compliant
Also highlight whether the SIEM system is effective and working properly.Are incidents raised true positives?
<font color="#e74f4c">False positives</font> may arise because the wrong input filters are being used or the wrong hosts monitored.
SIEM dashboards will typically provide a views into status of log ingestion and security concerns identified through correlation.
事故管理<br>Incident management<br>
INCIDENT RESPONSE LIFECYCLE
The incident response lifecycle in the CBK is from <b>NIST SP 800-61 rev2</b>,the "Computer Security Incident Handling Guide"
Preparation
Refers to the organization's preparation necessary to <font color="#e74f4c">ensure they can respond</font> to a security incident,including<br>tools,processes,competencies,and readiness.
These details should be documented in a <font color="#e74f4c">security incident response plan</font> that is regularly reviewed and updated.
<font color="#e74f4c">Plan review multiple times per year in a walkthrough,aka 'tabletop exercise</font>
Detection<br>and analysis
The activity to <b>detect </b>a security incident in a production environment and to <b>analyze </b>all events to confirm <br>the authenticity of the security incident.<br>
Containment,<br>eradication,<br>recovery
In <b>containment</b>,the required and appropriate actions taken to contain the security incident<br>based on the analysis done in the previous phase.
<font color="#e74f4c">Limits the damage (scope)of the incident</font>
<b>Eradication</b> is the process of <font color="#e74f4c">eliminating the root cause</font> of the security incident with a high degree of confidence.
During the incident,our focus is on protecting and restoring <font color="#e74f4c">business-critical processes</font>
<b>Recovery</b> should happen after the <font color="#e74f4c">adversary has been evicted</font> from the environment and known <font color="#e74f4c">vulnerabilities have been remediated</font>.
<b>Recovery</b> <font color="#e74f4c">returns the environment</font> to its normal, fully functional,<font color="#e74f4c">original state</font> prior to the incident.
Post-incident<br>activity
The <b>post-mortem analysis</b> is performed after the recovery of a security incident.
Actions performed during the process are reviewed to determine if any changes need to be made in<br>the preparation or detection and analysis phases.
The <b>lessons learned</b> drive <b>continuous improvement </b>ensuring effective and efficient incident response.
漏洞评估<br>Vulnerability assessments<br>
RIGHT TO AUDIT IN THE CLOUD
Use of vulnerability scanners and pen testers may be limited by your CSP's terms of service.
CSPs typically have penctration testing and scanning "rulcs of engagement"
VULNERABILITY MANAGEMENT
Vulnerability Management
includes routine vulnerability scans and periodic vulnerability assessments.
Vulnerability scanners
can detect known security vulnerabilities and weaknesses,absence of patches or weak passwords.
Vulnerability Assessments
extend beyond just technical scans and can include reviews and audits to detect vulnerabilities
VULNERABILITY SCANS
A vulnerability scan assesses possible security vulnerabilities in computers,networks,and equipment that can be exploited.
Credentialed Scan:
A credentialed scan is a much more powerful version of the vulnerability scanner.It has higher privileges than a non-credentialed scan.
Spot vulnerabilities that require privilege,like non-expiring PWs
Non-Credentialed Scan:
A non-credentialed scan has lower privileges than a credentialed scan.It will identify vulnerabilities that <font color="#e74f4c">an attacker would easily find</font>.
Scans can find missing patches,some protocol vulnerabilitics
Non-Intrusive Scans:
These are passive and <font color="#e74f4c">merely report</font> vulnerabilities.They do not cause damage to your system.
Intrusive Scans:
Can cause damage as they <font color="#e74f4c">try to exploit</font> the vulnerability and should <font color="#e74f4c">be used in a sandbox</font> and not on your live production system.
Configuration Review:
<font color="#e74f4c">Configuration compliance scanners</font> and desired state configuration in PowerShell ensure that <font color="#e74f4c">no deviations</font> are made to the security configuration of a system.
The combination of techniques can reveal which vulnerabilities are most easily exploitable in a live environment.
Network Scans:
These scans look at computers and devices <font color="#e74f4c">on your network</font> and help identify weaknesses in their security.
Application Scans:
Before applications are released,coding experts perform <font color="#e74f4c">regression testing</font> that will check code for deficiencies.
Web Application Scans:<br>
Crawl through a website as if they are a search engine looking for vulnerabilities.
Perform an <font color="#e74f4c">automated check</font> for site/app vulnerabilities,such as cross-site scripting and SQL injection.
There are many sophisticated web application scanners available,due in part due to mass adoption of cloud computing.
Common Vulnerabilities and Exposures (CVE)and<br>Common Vulnerability Scoring System (CVSS)
CVSS
CVSS is the <font color="#e74f4c">overall score assigned to a vulnerability</font>. It indicates severity and is used by many vulnerability scanning tools.
CVE
CVE is simply <font color="#e74f4c">a list of all publicly disclosed vulnerabilities</font> that includes the CVE ID,a description,dates,and comments.
The CVSS score is not reported in the CVE listing you must use the <b style=""><font color="#000000">National Vulnerability Database (NVD)</font></b>to find assigned CVSS scores.
The CVE list Feeds into the NVD
The National Vulnerability Database (NVD)is a database, maintained by NIST,that is synchronized with the MITRE CVE list.
VULNERABILITY SCAN OUTPUT
A vulnerability scanner can <font color="#e74f4c">identify and report various vulnerabilities</font> before they are exploited,such as:
<ul><li>software flaws</li><li>missing patches</li><li>open ports</li><li>services that should not be running</li><li>weak passwords</li></ul>
will help companies avoid known attacks such as SQL injection,buffer overflows,denial of service,and other type of malicious attacks.
A <b>credentialed vulnerability scan</b> is the most effective as it provides more information than any other vulnerability scan.
VULNERABILITY SCANS
<b>False Positive</b>:where the scan believes that there is a vulnerability but when physically checked,it is not there.
<b>False Negative</b>:When there is a vulnerability,but the scanner does not detect it.
<b>True Positive</b>:This is where the results of the system scan agree with the manual inspection.
<b>Log Reviews</b>:Following a vulnerability scan,it is important to review the log files/reports that list any potential vulnerabilities.
D6 法律、风险和合规<br>Legal, Risk and Compliance<br>
6.1 明确云环境中的法律要求和独特风险<br>Articulate legal requirements and unique risks within the cloud environment<br>
国际法律冲突<br>Conflicting international legislation<br>
It is important to be aware of the various laws and regulations that govern cloud computing.
<font color="#e74f4c">Laws can introduce risks to a business</font>,such as fines,penalties, or even a loss of the ability to do business in a certain place.
It is important to identify such risks and make recommendations to<font color="#e74f4c"> mitigate them just like any other risk</font>.
EXAMPLE<br>Conflict with GDPR and CLOUD Act
GDPR forbids the transfer of data to countries that lack adequate privacy protections
<font color="#e74f4c">The Clarifying Lawful Overseas Use of Data (CLOUD)Act </font>requires CSPs to hand over data to aid in investigation of<br>serious crimes,<font color="#e74f4c">even if stored in another country</font>.
As with many aspects of security,legal compliance requires <font color="#e74f4c">collaboration</font>.
<font color="#e74f4c">Legal counsel</font> should be part of the evaluation of any cloud-specific risks,legal requests,and the company's response to these.
Export and Privacy
<b>Computer Export Controls</b>.US companies can't export to Cuba,Iran,North Korea,Sudan,and Syria.
<b>Encryption Export Controls</b>.Dept of Commerce details limitations on export of encryption products outside the US.
<b>Privacy (US).</b>The basis for privacy rights is in the <font color="#e74f4c">Fourth Amendment</font> to the U.S.Constitution.
<b>Privacy (EU)</b>.General Data Protection Regulation (<font color="#e74f4c">GDPR</font>) is not a US law,but very likely to be mentioned!
Copyright and intellectual property law
particularly the jurisdictions that companies need to deal with (local versus international)to <font color="#e74f4c">protect and enforce their IP protections</font>.
Safeguards and security controls required for privacy compliance
particularly details of data residency or the ability to move data between<br>countries,as well as varying requirements of due care in different jurisdictions
<b>Data breaches</b> and their aftermath,particularly <font color="#e74f4c">breach notification</font>
International import/export laws
particularly <font color="#e74f4c">technologies that may be sensitive or illegal</font> under various international agreements
LAWS,REGULATIONS,STANDARDS,FRAMEWORKS
<b>Laws</b> are the legal rules.That are created by <font color="#e74f4c">government entities</font>,such as legislatures/congress.
<b>Regulations</b> are the rules that are created by <font color="#e74f4c">governmental agencies.</font>
Laws and regulations <font color="#e74f4c">must be followed</font> or can result in civil or criminal penalties for the organization.
<b>Standards</b> dictate a reasonable level of performance.
They can be created by an organization for its own purposes (<font color="#e74f4c">internal</font>) or come from industry bodies or trade groups (<font color="#e74f4c">external</font>).
<b>Frameworks</b> are <font color="#e74f4c">a set of guidelines</font> helping organizations improve their security posture.
TYPES OF LAW
<b>Criminal law </b>contains prohibitions against acts such as murder, assault,robbery,and arson.
<b>civil law</b> Examples include <font color="#e74f4c">contract disputes</font>,real estate transactions, employment matters,and estate/probate procedures.
Vendor contracts fall into this category.
<b>Administrative law</b> policies,procedures,and regulations that govern the daily operations of government and government agencies
Regulations likc HIPAA fall into this catcgory
<b>The U.S.Constitution</b> is the highest possible source of law in the United States,and no laws from other sources may conflict with the provisions <br>in the Constitution<br>
SEVEN ARTICLES OF THE<br>US CONSTITUTION
<ul><li>Article I establishes the <font color="#e74f4c">legislative branch</font>.</li><li>Article Il establishes the <font color="#e74f4c">executive branch</font>.</li><li>Article Ill establishes the <font color="#e74f4c">judicial branch</font>.</li><li>Article IV defines the relationship between the federal government and state governments</li><li>Article V creates a process for <font color="#e74f4c">amending the Constitution itself</font>.</li><li>Article VI contains the supremacy clause,establishing that the Constitution is the <font color="#e74f4c">supreme law of the land</font>.</li><li>Article VIl sets forth the process for the initial <font color="#e74f4c">establishment of the federal government</font>.</li></ul>
<b>Case law</b>.<font color="#e74f4c">Interpretations made by courts</font> over time establish a body of law that <font color="#e74f4c">other courts may refer to</font> when making their own decisions.
In many cases,the case law decisions made by courts are binding on both that court and any subordinate courts.
<b>Common law</b> is <font color="#e74f4c">a set of judicial precedents passed down</font> as case law through many generations.
And stand as examples <font color="#e74f4c">cited in future court cases</font>.
<b>Contract law </b>Violations of a contract generally do not involve law enforcement agencies,so they are treated as private disputes between<br>parties and handled in civil court.
A violation is known as a "breach of contract"and courts may take action to <font color="#e74f4c">enforce the terms of a contract</font>.
LEGAL LIABILITY
Liable means "responsible or answerable in law;legally obligated".
Comes in two forms:
<b>Criminal liability</b> occurs when a person violates a criminal law.
<b>civil liability</b> occurs when one person claims that another person has<font color="#e74f4c"> failed to carry out a legal duty</font> that they were responsible for.
Civil cases are brought to court by one party,called the <font color="#e74f4c">claimant</font>,who is accusing another party of a violation,called the <font color="#e74f4c">respondent</font>.
Claimant may be an individual,a corporation,or the government.
TORTS AND NEGLIGENCE
<b>Torts </b>are another form of civil violation that do not involve a contract but instead,involve harm to one party caused by the actions of another party.
<b>Negligence</b> is a commonly occurring tort that occurs when one party causes harm to another party by their action or lack of action.
There must be a <font color="#e74f4c">duty of care</font>.The person accused of negligence must have an established responsibility to the accuser.
There must be a <font color="#e74f4c">breach of that duty of care</font>.The accused person must have either taken action or failed to take an action that violated the duty of care.
There must be <font color="#e74f4c">damages</font> involved.The accuser must have suffered some type of harm,be it financial,physical,emotional,or reputational.
There must be c<font color="#e74f4c">ausation</font>.A reasonable person must be able to conclude that the injury caused to the accuser must be a result of the breach of duty by the accused.
云计算特有的法律风险评估<br>Evaluation of legal risks specific to cloud computing<br>
Differing legal requirements
For example,State and provincial laws in the United States,Canada have different requirements for data breach notifications,such as timeframes.
Different legal systems and frameworks in different countries
In some countries,clear written <font color="#e74f4c">legislation </font>exists.In others,others <font color="#e74f4c">legal precedent</font> is more important
<b>Precedent </b>refers to the judgments in past cases and is subject to change over time with less advance notice than updates to legislation.
Conflicting laws
The EU's <b>GDPR</b> and the U.S.<b>Clarifying Lawful Overseas Use of Data (CLOUD) Act</b> <font color="#e74f4c">directly conflict</font> on the topic of data transfer.
The <b>bottom line on</b> legal risks specific to cloud computing
Responsibility for compliance with laws and regulations
Researching and planning response in case of conflicting laws
Ensuring necessary audit and incident response data is logged and retained
Any additionall <font color="#e74f4c">due diligence and due care</font>
法律框架和准则<br>Legal framework and guidelines<br>
Organisation for Economic Co-operation and Development (OECD)
An international organization <font color="#e74f4c">comprised of 38 member states</font> from around the world, <font color="#e74f4c">publishes guidelines on data privacy</font>.
Its principles are <font color="#e74f4c">aligned with European privacy</font>, law including consent, transparcncy, accuracy, sccurity, and accountability
Asia-Pacific Economic Cooperation Privacy Framework (APEC)
Comprised of <font color="#e74f4c">21 member economies in the Pacific Rim</font>.
Incorporates many standard privacy practices into their guidance,such as preventing harm,notice,consent,security,and accountability.
<font color="#e74f4c">Promotes the smooth cross-border Flow of information between APEC member nations.</font>
General Data Protection Regulation (GDPR)
European Union's GDPR is perhaps the most far-reaching and comprehensive set of laws ever written to protect data privacy.
Mandates <font color="#e74f4c">privacy for individuals</font>,defines <font color="#e74f4c">companies'duties to protect personal data</font>,and prescribes punishments for companies violating these laws.
Includes <font color="#e74f4c">mandatory notification timelines</font> in the event of data breach.
GDPR formally defines many data roles related to privacy and security (subject,controller,processor).
Additional legal frameworks standards
<b>Health Insurance Portability and Accountability Act (HIPAA)</b><br>1996 U.S.law regulates the privacy and control of <font color="#e74f4c">health information data</font>.
<b>Payment Card Industry Data Security Standard (PCI DSS)</b><br>An industry standard for companies that accept,process,or receive <font color="#e74f4c">payment card transactions</font>.
<b>Privacy Shield</b><br>Exists to solve the lack of an US-equivalent to GDPR,which impacts rights and obligations around <font color="#e74f4c">data transfer</font>.
<b>Sarbanes-Oxley Act(Sox)</b><br>Law was enacted in 2002 and sets requirements for U.S.public companies to protect <font color="#e74f4c">financial data</font> when stored and used.
LAWS AND REGULATIONS
As a cloud security practitioner,you should know the difference between statutory,regulatory,and contractual requirements
Statutory requirements
are required by law. <font color="#e74f4c">HIPAA,GDPR,FERPA</font>
Regulatory requirements
may also be required by law but <font color="#e74f4c">refer to rules issued by a regulatory body</font> that is appointed by a <font color="#e74f4c">government entity</font>. <font color="#e74f4c">FISMA,FedRAMP</font>
Contractual requirements
are required by a legal contract between private parties.
These agreements often specify a set <font color="#e74f4c">security controls</font> or a <font color="#e74f4c">compliance framework</font> that must be implemented by a vendor <font color="#e74f4c">e.g.SOC,GAPP,CSA CCM</font>
eDiscovery
An organization investigating an incident <font color="#e74f4c">may lack the ability to compel the CSP</font> to turn over vital information needed to investigate.
The information may be housed in a country where<font color="#e74f4c"> jurisdictional issues</font> make the data more difficult to access.
Maintaining a chain of custody is more difficult since there are more entities involved in the process.
Three important considerations include 1) vendor selection, 2) architecture, 3) due care obligations
<b>Vendor selection considerations</b><br>When considering a cloud vendor,eDiscovery should be considered as asecurity requirement during the selection and contract negotiation phases.
<b>Architecture considerations</b><br>Data <font color="#e74f4c">residency and system architecture</font> are other important considerations for eDiscovery in the cloud and can be handled proactively.
<b>Due care considerations </b>Ensuring the org is prepared For DFIR<br>Cloud security practitioners must inform their organizations of any risks and required due care and due diligence related to cloud computing
E-DISCOVERY FRAMEWORKS
CSPs may not preserve essential data for the required period of time to support historical investigations.
They may not even log all the data relevant to support an investigation.
This shifts the burden of recording and preserving Potential evidence onto the consumer
Consumers must <font color="#e74f4c">identify and implement their own data collection</font>.
NIST<br>NISTIR 8006
NISTIR 8006,"Cloud Computing Forensic Science challenges
NISTIR = NIST Interagency or Internal Reports
Addresses common issues and solutions needed to address DFIR in cloud environments.
DFIR = <font color="#e74f4c">D</font>igital <font color="#e74f4c">F</font>orensics and <font color="#e74f4c">I</font>ncident <font color="#e74f4c">R</font>esponse
国际标准组织/国际电子技术委员会 (ISO/IEC) 27050<br>International Organization for Standardization/International <br>Electrotechnical Commission (ISO/IEC) 27050<br>
A four-part standard within the ISO/IEC 27000 family of information security standards
Offers a framework,governance,and <font color="#e74f4c">best practices</font> for <font color="#e74f4c">forensics,eDiscovery,and evidence management</font>
云安全联盟 (CSA) 指引<br>Cloud Security Alliance (CSA) Guidance<br>
Free guidance in <font color="#e74f4c">Domain 3:Legal Issues:Contraets and Electronic Discovery</font>
Offers guidance on <font color="#e74f4c">legal concerns</font> related to security, privacy,and contractual obligations
取证要求<br>Forensics requirements<br>
FORENSICS REOUIREMENTS
In the cloud,it's difficult or <font color="#e74f4c">impossible to perform physical search and seizure</font> of cloud resources such as storage or hard drives.
Iso/IEC and CSA provide guidance on best practices for collecting digital evidence and conducting forensics investigations in the cloud.
Forensic Investigation Standards
ISO/IEC 27037:2012<br>
Guide for collecting,identifying,and preserving electronic evidence
ISO/IEC 27041:2015
Guide for incident investigation
ISO/IEC 27042:2015
Guide for digital evidence analysis.
ISO/IEC 27043:2015
Guide for incident investigation principles and processes
6.2 了解隐私问题<br>Understand privacy issues<br>
合同规定的和受监管的私人数据之间的区别<br>Difference between contractual and regulated private data<br>
受保护的健康信息 (PHI)<br>protected health information (PHI)<br>
Any information that can <font color="#e74f4c">identify an individual</font> (name SSN,birthdate/place,biometric records,etc)
Defined by NIST SP 800-122
个人可识别信息 (PII)<br>personally identifiable information (PII)<br>
Health-related information that can be r<font color="#e74f4c">elated to a specific person</font>
Must be protected by strong controls and access audited
Requlated by HIPAA HITRUST
Payment Data.
Allowable storage of information related to credit and debit cards and transactions.
Defined and requlated by PCI DSS and is CONTRACTUAL
A Security team must understand.
<ul><li>what types of data an organization is processing</li><li>where it is being processed</li><li>any associated requirements,such as contractual obligations</li></ul>
In any cloud computing environment,the <b>legal responsibility</b> for data privacy and protection <font color="#e74f4c">rests with the cloud consumer</font>.
The <b>data controller is always responsible</b> for ensuring that the requirements for protection and compliance are met.<br>even if that data is processed in a CSP's cloud service.<br>
<font color="#e74f4c">Responsibility cannot be transferred but risk can be mitigated</font>
Components of a contract may include how data is processed,security<br>controls,deletion of data,physical location,audit,and use of subcontractors.
与私人数据相关的国家特定立法<br>Country-specific legislation related to private data<br>
受保护的健康信息 (PHI)<br>protected health information (PHI)<br>
个人可识别信息 (PII)<br>personally identifiable information (PII)<br>
Australian Privacy Act
<font color="#e74f4c">organizations may process data</font> belonging to Australian citizens <font color="#e74f4c">offshore</font>.
transferring entity (the data owner)must ensure that the receiver of the data holds and processes it in accordance with<br>the principles of Australian privacy law.
Data owner (controller)is responsible for data privacy
commonly <font color="#e74f4c">achieved through contracts</font> that require recipients to maintain or exceed the data owner's privacy standards
The <font color="#e74f4c">entity transferring the data</font> out of Australia <font color="#e74f4c">remains responsible</font> for any data breaches by or on behalf of the recipient entities
Canada Privacy Law
Personal Information Protection and Electronic Documents Act(PIPEDA)
a national-level law that <font color="#e74f4c">restricts how commercial businesses</font> may collect,use,and disclose personal information.
PIPEDA <font color="#e74f4c">covers information about an individual</font> that is identifiable to that specific individual.
DNA,age,medical cducation cmployment,identifying numbers, religion,race/ethnic origin,Financial information
includes a<font color="#e74f4c"> data breach notification</font> requirement.
PIPEDA may also be <font color="#e74f4c">superseded by province-specific laws</font> that are deemed substantially similar to PIPEDA.
GDPR<br>GENERAL DATA<br>PROTECTION REGULATION
Includes the following on data subject privacy rights:
<ul><li>The right to be informed</li><li>The right of access</li><li>The right to rectification</li><li>The right to erasure (the right to be forgotten)</li><li>The right to restrict processing</li><li>The right to data portability</li><li>The right to object</li><li>Rights in relation to automated decision making and profiling</li></ul>
Other private data types in GDPR:race or ethnic origin,political affiliations<br>or opinions,religious or philosophical beliefs,and sexual orientation.
Deals with the <font color="#e74f4c">handling of data</font> while maintaining <font color="#e74f4c">privacy and rights of an individual</font>.
It is international as it was created by the EU, which has 27 different countries as members.
GDPR applies to ANY company with customers in the EU
Includes a <font color="#e74f4c">72-hour notification deadline</font> in the case of data breach
National,Territory,and State Laws
<b>Gramm-Leach-Bliley Act (GLBA)of 1999</b><br>focuses on services of <font color="#e74f4c">banks, lenders, and insurance </font>severely limits services they can provide and the<br>information they can share with each other<br>
This act consists of three main sections:
<b>The Financial Privacy Rule</b>,which regulates the collection and disclosure of private financial information<br><b>The Safeguards Rule</b>,which stipulates that financial institutions must implement security programs to protect such information<br><b>The Pretexting provisions</b>,which prohibit the practice of pretexting (accessing private information using false pretenses)
<b>Privacy Shield</b><br>an international agreement between the United States (U.S.) and the European Union.<br>allows the transfer of personal data from the European Economic Area (EEA)to the U.S.by U.S.-based companies.<br>
Orgs commit to seven principles of the agreement:
<ul><li>Notice</li><li>Choice</li><li>Security</li><li>Access</li><li>Accountability for onward transfer</li><li>Data integrity and purpose limitation</li><li>Recourse,enforcement,and liability</li></ul>
<b>The Stored Communication Act (SCA)of 1986<br></b>created privacy protection for electronic communications like email or other digital communications stored on the Internet.<br><font color="#e74f4c">extends the Fourth Amendment</font> of the U.S.Constitution to the electronic realm<br>
The Fourth Amendment:
Details the people's "right to be secure in their persons,houses,<br>papers,and effects,against unreasonable searches and seizures"
It outlines that private data is protected from unauthorized<br>access or interception (by <font color="#e74f4c">private partics or the government</font>).
<b>Health Insurance Portability and Accountability Act(HIPAA)of 1996<br></b>privacy and security regulations requiring strict security measures for hospitals,physicians,insurance companies<br>HIPAA-covered entities are those organizations that collect or generate protected <font color="#e74f4c">health information (PHI)<br></font>under HIPAA there are separate <font color="#e74f4c">rules for privacy,security,and breach notification</font>,and flow of these rules down to third parties<br>
Under HIPAA,PHI may be stored by cloud service providers<br>provided that the data is <font color="#e74f4c">adcquately protccted</font>
<b>Clarifying Lawful Overseas Use of Data (CLOUD)Act<br></b>a<font color="#e74f4c">ids in evidence collection</font> in investigation of serious crimes<br>created in 2018 due to the problems that FBI faced in forcing Microsoft to hand over data stored in Ireland<br>requires U.s.-based companies to respond to legal requests for data <font color="#e74f4c">no matter where the data is physically located</font>.<br>
数据隐私的司法管辖区差异<br>Jurisdictional differences in data privacy<br>
Different laws and regulations may apply depending on the <b>location</b> of
<ul><li>data subject</li><li>data collector</li><li>cloud service provider</li><li>subcontractors processing data</li><li>company headquarters of the entities involved</li></ul>
Legal concerns can:
<ul><li>prevent the utilization of a cloud services provider</li><li>add to costs and time to market</li><li>drive changes to technical architectures required to deliver services</li></ul>
Never replace compliance with convenience when evaluating services,as this increases risks
Many privacy laws <font color="#e74f4c">impose fines or other action for noncompliance</font>.
标准隐私要求<br>Standard privacy requirements<br>
国际标准组织/国际电子技术委员会 (ISO/IEC) 27018<br>International Organization for Standardization/International <br>Electrotechnical Commission (ISO/IEC) 27018<br>
ISO 27018 was published in July 2014 as a component of the ISO 27001 standard.
Adherence to these privacy requirements <font color="#e74f4c">enables customer trust in the CSP</font>.
Major CSPs such as Microsoft,Google,and Amazon all <font color="#e74f4c">maintain ISO 27000 compliance</font>
Can provide a HIGH level of assurance.
<b>Consent</b>:Personal data obtained by a CSP may not be used for marketing purposes <font color="#e74f4c">unless expressly permitted by the subject</font>.
A customer should be permitted to use a service without requiring this consent.
<b>Control</b>:Customers shall have explicit <font color="#e74f4c">control of their own data</font> and how that data is used by the CSP.
<b>Transparency</b>:<font color="#e74f4c">CSPs must inform customers</font> of where their data resides AND any subcontractors that may process personal data.
<b>Communication</b>:Auditing should be in place,and any <font color="#e74f4c">incidents</font> should be <font color="#e74f4c">communicated to customers</font>.
<b>Audit</b>:Companies(CSP,in this case)must subject themselves to an <font color="#e74f4c">independent audit </font>on an annual basis.
普遍接受的隐私原则 (GAPP)<br>Generally Accepted Privacy Principles (GAPP)<br>
Generally Accepted Privacy Principles (GAPP)is a framework of privacy principles
<font color="#e74f4c">Created by AICPA</font>
GAPP are widely incorporated into the <font color="#e74f4c">SOC 2</font> framework as an optional criterion
Organizations that pursue a SOC 2 audit can include these privacy controls if appropriate
Similar to ISO 27018,which is an optional extension of the controls defined in ISO 27002
An audit of these controls <font color="#e74f4c">results in a report</font> that can be shared with customers or potential customers,who can use it toassess a service provider's ability to protect sensitive data.
Categories of the 10 main privacy principles
<b>Management</b><br>The organization defines,documents,communicates,and assigns <font color="#e74f4c">accountability for its privacy policies and procedures</font>.
<b>Notice</b><br>The organization provides notice of its privacy policies and procedures<br>The organization identifies the purposes for which personal information is collected,used,and retained.
<b>Choice and consent</b><br>The organization <font color="#e74f4c">describes the choices</font> available to the individual,and<font color="#e74f4c"> secures implicit or explicit consent <br></font>regarding the collection,use,and disclosure of the personal data.<br>
<b>Collection</b><br>Personal information is <font color="#e74f4c">collected only for the purposes identified</font> in the notice provided to the individual.
<b>Use,retention,and disposal</b> WHy org can retain WHEN to dispose<br>The personal information is limited to the purposes identified in the notice the individual consented to.
<b>Access</b><br>The organization <font color="#e74f4c">provides individuals with access</font> to their personal information for review or update.
<b>Disclosure to third parties</b><br>Personal information is disclosed to third parties only for the<font color="#e74f4c"> identified purposes </font>and with <font color="#e74f4c">implicit or explicit consent of the individual</font>.
<b>Security for privacy</b><br>Personal information is protected against both physical and logical unauthorized access.
<b>Quality</b><br>The organization maintains accurate,complete,and relevant personal information that is necessary for the purposes identified.
<b>Monitoring and enforcement</b><br>The organization <font color="#e74f4c">monitors compliance</font> with its privacy policies and procedures.It also has<br>procedures in place to address privacy-related <font color="#e74f4c">complaints and disputes</font>
一般数据保护条例 (GDPR)<br>General Data Protection Regulation (GDPR)<br>
隐私影响评估 (PIA)<br>Privacy Impact Assessments (PIA)<br>
A privacy impact assessment(PIA)is designed to identify the privacy data being collected,processed,or stored by a system,and assess<font color="#e74f4c"> <br>the effects of a data breach</font><br>
When is a PIA necessary?
Several privacy laws <font color="#e74f4c">explicitly require PIAs</font> as a planning tool for identifying and implementing required privacy controls,<br>including <font color="#e74f4c">GDPR and HIPAA</font>.<br>
Conducting a PIA typically <font color="#e74f4c">begins when a system or process is being evaluated</font>
However,evolving privacy regulation often necessitates assessment of existing systems.
To conduct a PIA,you must define <font color="#e74f4c">assessment scope</font>, <font color="#e74f4c">data collection methods</font>,and plan for <font color="#e74f4c">data retention</font>
The <b>International Association of Privacy Professionals (IAPP)</b>has published guides and resources related to privacy efforts,including PIA.
6.3 了解云环境的审计流程、方法和必要的调整<br>Understand audit process, methodologies, <br>and required adaptations for a cloud environment<br>
What is Auditing?
a methodical examination of an environment to <font color="#e74f4c">ensure compliance</font> with regulations and to detect abnormalities,<br>unauthorized occurrences,or outright crimes.
serves as a primary type of <font color="#e74f4c">detective control</font>.
frequency is based on risk.
<font color="#e74f4c" style="">degree of risk</font> also affects how often an audit is performed.
Secure IT environments <font color="#e74f4c">rely heavily on auditing</font> and many regulations require it.
AUDITING & DUE CARE
Security audits and effectiveness reviews are <font color="#e74f4c">key elements in displaying due care</font>.without them,<br>senior management will likely be held accountable and liable for any asset losses that occur.
Act with common sense,prudent management,responsible action
Security audits and reviews
help ensure that management programs are <font color="#e74f4c">effective and being followed</font>.
commonly associated with account management practices to <font color="#e74f4c">prevent violations </font>with least privilege or need-to-know principles.
can also be performed to <font color="#e74f4c">oversee </font>many programs and processes
<ul><li>patch management</li><li>vulnerability management</li><li>change management</li><li>configuration management</li></ul>
CONTROLLING ACCESS TO AUDIT REPORTS
Audit reports often contain <font color="#e74f4c">sensitive information</font>
Often include purpose and scope of the audit,and results discovered or revealed
Can include sensitive information such as problems, standards,causes,and recommendations.
Only people with <font color="#e74f4c">sufficient privilege</font> should have access
FOR EXAMPLE:<br>senior security administrators = full detail<br>senior management = high-level summary
内部和外部审计控制<br>Internal and external audit controls<br>
Internal Auditor
Acts as a "trusted advisor"to the organization on risk educating stakeholders,assessing compliance
<font color="#e74f4c">Compliance may mean company policies or regulatory</font>
Internal Audit
Can provide more continuous monitoring of control effectiveness and policy compliance
Enables the org to <font color="#e74f4c">catch and fix any issues</font> beforc they show up on a formal audit report
Some legal and requlatory frameworks require the usc of an <font color="#e74f4c">indcpendent </font>auditor,others demand a <font color="#e74f4c">third-party</font> auditor
An internal auditor is an <font color="#e74f4c">independent entity</font> who can provide facts <font color="#e74f4c">without fear of reprisal</font>
审计要求的影响<br>Impact of audit requirements<br>
The requirement to conduct audits can have a large procedural and financial impact on a company.
Regulated industries
Some entities operate in heavily regulated industries subject to numerous auditing<br>requirements,such as<font color="#e74f4c"> banks or critical infrastructure providers</font>.
With <font color="#e74f4c">multi-national companies</font>,audit complexity may be higher due to conflicting requirements
Sample size and relevance
In large environments,<font color="#e74f4c">representative samples</font> of some infrastructure (e.g.20 of 100<br>servers)may be checked but must be <font color="#e74f4c">representative of the multi-region estate</font>.
<font color="#e74f4c">Multi-region data dispersion</font> in the cloud and dynamic VM failure in hypervisors can complicate the audit process
确定虚拟化和云的保障挑战<br>Identify assurance challenges of virtualization and cloud<br>
The cloud is made possible by <b>virtualization</b> technologies,that enable dynamic environments needed for a global provider platform.
Depending on the cloud architecture employed,a cloud security professional must perform <font color="#e74f4c">multiple layers of auditing</font>.
To be effective,the auditor must understand the <font color="#e74f4c">virtualization architecture</font> of the cloud provider
Audits of controls over the hypervisor will usually be the purview of the CSP
VMs deployed on top of that hardware are usually under owned by the customer
审计报告的类型<br>Types of audit reports<br>
关于认证业务标准的声明 (SSAE)<br>Statement on Standards for Attestation Engagements (SSAE)<br>
<b>SSAE 18</b> is a set of standards defined by the <font color="#e74f4c">AICPA </font>(American Institute of CPAs)
Designed to <font color="#e74f4c">enhance</font> the quality and usefulness of System and Organization Control (SOC)reports.
Includes <font color="#e74f4c">audit standards</font> and suggested <font color="#e74f4c">report formats</font> to guide and assist auditors
<b>SOC 1</b><br>deals mainly with <font color="#e74f4c">financial controls</font> and are used primarily by CPAs auditing financial statements
<b>Soc 2 Type 1</b><br>report that assesses the design of security processes at <font color="#e74f4c">a specific point in time</font>
<b>SOC 2 Type 2</b><br>(often written as "Type ll")assesses how effective those controls are over time by observing operations for at least six months<br>Often require an <font color="#e74f4c">NDA</font> due to <font color="#e74f4c">sensitive contents</font>
<b>Soc 3</b><br>contain only the auditor's general opinions and non-sensitive data,is publicly shareable
SSAE is US-based,but SOC2 has become a <font color="#e74f4c">de Facto global standard</font>
国际鉴证业务准则 (ISAE)<br>International Standard on Assurance Engagements (ISAE)<br>
The <b>International Auditing and Assurance Standards Board</b> issues the ISAE
This board and it's ISAE standards are similar to the AICPA and it's SSAE standards
The<font color="#e74f4c"> ISAE 3402</font> standard is roughly equivalent to the <font color="#e74f4c">SOC 2 reports</font> in the SSAE
CSA<br>Cloud Security Alliance
The <font color="#e74f4c">Security Trust Assurance and Risk (STAR) </font>certification program comes from CSA
Can be used by cloud service providers,cloud customers,or auditors and consultants
Designed to <font color="#e74f4c">demonstrate compliance</font> to a desired level of assurance
STAR consists of <font color="#e74f4c">two levels of certification </font>which provide increasing levels of assurance
<b>Level 1:Self-assessment</b><br>is a complimentary offering that documents the security controls provided by the CSP
<b>Level 2:Third-party audit</b><br>requires the CSP to engage an independent auditor to evaluate the CSP's controls against<br>the CSA standard
Stronger,as it's a third-party audit conducted by a trained,qualificd auditor
服务组织控制 (SOC)<br>Service Organization Control (SOC)<br>
审计范围声明的限制<br>Restrictions of audit scope statements<br>
<font color="#e74f4c">Audit scope statements</font> provide the reader with details on <font color="#e74f4c">what was included in</font> the audit and what was not
An audit scope statement generally includes:
<ul><li>Statement of purpose and objectives</li><li>Scope of audit and explicit exclusions</li><li>Type of audit</li><li>Security assessment requirements</li><li>Assessment criteria and rating scales</li><li>Criteria for acceptance</li><li>Expected deliverables</li><li>Classification(secret,top secret,public,etc.)</li></ul>
Setting parameters for an audit is known as audit seope restrietions
Determining the scope of an audit is usually a<font color="#e74f4c"> joint activity</font> performed by the organization being audited and their auditor.
Why limit the scope of an audit?
<font color="#e74f4c">Audits are expensive</font> endeavors that can engage highly trained (and highly paid)content experts.
Auditing of systems can <font color="#e74f4c">affect system performance</font> and,in some cases,require the downtime of production systems.
A new system not yet in production,without all the planned controls in place is <font color="#e74f4c">not ready to audit</font>.
<font color="#e74f4c">Cost of implementing controls</font> and auditing some systems is too high relative to the revenue the service generates.
关于认证业务标准的声明 (SSAE)<br>Statement on Standards for Attestation Engagements (SSAE)<br>
国际鉴证业务准则 (ISAE)<br>International Standard on Assurance Engagements (ISAE)<br>
差距分析<br>Gap analysis<br>
A gap analysis identifies where an organization does <font color="#e74f4c">not meet requirements</font> and provides important information to help remediate gaps
The main purpose is to compare the organization's current practices against a specified framework and identify the gaps between the two.
May be performed by either internal or external parties
Choice of which usually driven by the <font color="#e74f4c">cost and need for objectivity</font>
When is a gap analysis useful?
As a precursor to a formal audit process,so the organization can close gaps before a third-party (external)audit
When assessing the impact of changes to regulatory or compliance frameworks,which introduce new or modified requirements.
'ISO 27002'and 'NIST CSF'are frameworks commonly used For gap analysis
控制分析<br>control analysis<br>
基线<br>baselines<br>
审计计划<br>Audit planning<br>
The audit process can generally be broken down into four phases,starting with <b>audit planning</b>.
Audit planning activities include:
<b>Document and define audit program objectives.</b><br>collaborative internal planning of audit scope and objectives.<br><b>Gap analysis or readiness assessment.</b>assessing the<br>organization's ability to successfully undergo a full audit.<br><b>Define audit objectives and deliverables</b>.it is important to<br>identify the expected outputs from the audit.<br><b>Identifying auditors and qualifications</b>.compliance and<br>audit frameworks usually specify the type of auditor required.
Audit Phases
<b>Audit fieldwork</b>: involves the actual work the auditors<br>perform to gather,test,and evaluate the organization.<br><b>Audit reporting</b>:report writing begins as auditors conduct<br>their fieldwork,capturing notes and any findings.<br><b>Audit follow-up</b>: various activities may be conducted after<br>the audit,including addressing any identified weaknesses
内部信息安全管理系统<br>Internal information security management system<br>
An <b>information security management system(ISMS)</b> is a systematic approach to information security
An ISMS focuses <font color="#e74f4c">processes,technology,and people</font> designed to help protect and manage an organization's information.
ISO 27001 addresses need and approaches to implementing an ISMS
ISMS Functions
<ul><li>Quantify risk</li><li>Develop and execute risk mitigation strategies</li><li>Provide formal reporting on status of mitigation efforts</li></ul>
ISMS Benefits
<ul><li>Improve data security</li><li>Increased organizational resilience to cyberattacks</li><li>Central info security mgmt</li><li>Formal risk management</li></ul>
内部信息安全控制系统<br>Internal information security controls system<br>
a system of <b>information security controls</b> provides guidance for mitigating the risks identified as part of ISMS risk management processes.
There are several control frameworks to choose from.
<b>Scoping</b> controls refers to reviewing controls in the framework to<font color="#e74f4c"> identify which controls apply</font> to the organization and which do not.
<b>Tailoring</b> is a process of <font color="#e74f4c">matching applicable controls</font> with the organization's <font color="#e74f4c">specific circumstances</font> to which they apply.
Organizations implementing an ISO 27001 ISMS will find the ISO 27002 controls very easy to use,since they are designed to fit together.
Other control frameworks include:
<ul><li>NIST SP 800-53</li><li>NIST Cybersecurity Framework(CSF)</li><li>Secure Controls Framework</li><li>CSA Cloud Controls Matrix(CCM)</li></ul>
策略<br>Policies<br>
Policies are a key part of any data security strategy and facilitate a number of capabilities for an organization:
Provide users and organizations with a way to <font color="#e74f4c">understand and enforce requirements</font> in a systematic way.
Make employees and management <font color="#e74f4c">aware of their roles and responsibilities</font>.
<font color="#e74f4c">Standardize secure practices</font> throughout the organization.
组织<br>organizational<br>
Companies use policies to outline rules and guidelines,usually complemented by documentation such as <font color="#e74f4c">procedures</font>,<font color="#e74f4c">job aids</font>
Organizations typically define policies related to proper use of company resources,like expense reimbursements and travel
Policies are a <font color="#e74f4c">proactive risk mitigation tool</font> designed to reduce the likelihood of risks,such as:
<ul><li>Financial losses</li><li>Data loss or leakage</li><li>Reputational damage</li><li>Statutory and regulatory compliance issues</li><li>Abuse or misuse of computing systems and resources</li></ul>
Employees should generally <font color="#e74f4c">sign policies to acknowledge acceptance</font>
功能<br>functional<br>
A set of standardized definitions for employees that describe <font color="#e74f4c">how they are to make use of systems or data</font>.
Typically <font color="#e74f4c">guide specific activities</font> crucial to the organization,such as appropriate handling of data, vulnerability management,and so on.
Functional policies generally <font color="#e74f4c">codify requirements</font> identificd in the ISMS and <font color="#e74f4c">align to your chosen control framework</font>
Examples of funetional policies
<ul><li><b>Acceptable use</b>:What is and is not acceptable to do on company hardware and networks.</li><li><b>Email use</b>:What is and is not acceptable to do on company email accounts.</li><li><b>Passwords and access managemen</b>t:Password complexity, expiration,reuse,requirements for MFA,and requirements for use of access management tools such as a password manager.</li><li><b>Incident response</b>:How incidents are handled,and requirements for defining an incident response plan.</li><li><b>Data classification</b>:Identifies types of data and how each should be handled.</li><li><b>Network services</b>:How issues such as remote access and network security are handled.</li><li><b>Vulnerability scanning</b>:Routines and limitations on internal scanning and penetration testing.</li><li><b>Patch management</b>:How equipment is patched and on what schedule.</li></ul>
云计算<br>cloud computing
Ease of deploying cloud resources without governance results in "<font color="#e74f4c">shadow IT</font>"-resources deployed without IT approval!
This can create <font color="#e74f4c">security risks</font>,like data loss or leakage through unauthorized use of cloud storage services.
Also creates <font color="#e74f4c">financial risks</font>,as spending is more difficult to measure and control.
Cloud services should be included in organization policies, and requirements for use clearly documented.
A <font color="#e74f4c">CASB</font> can help identify and stop shadow IT!
Policies should define requirements users must adhere to and specify which cloud services are approved for various uses.
相关利益相关者的识别和参与<br>Identification and involvement of relevant stakeholders<br>
One key challenge in the audit process is the inclusion of any <font color="#e74f4c">relevant stakeholders</font>
Organization's <font color="#e74f4c">management</font> who will likely be paying for the audit <font color="#e74f4c">Security practitioners</font> responsible for <font color="#e74f4c">facilitating the audit</font>
<font color="#e74f4c">Employees</font> who will be called upon to <font color="#e74f4c">provide evidence</font> to auditors in the form of documentation, artifacts, or sitting for interviews.
Cloud computing environments can include more stakeholders than on-premises and even multiple CSPs
受到严格监管行业的特殊合规要求<br>Specialized compliance requirements for <br>highly-regulated industries<br>
北美电力可靠性公司/关键基础设施保护 (NERC / CIP)<br>North American Electric Reliability Corporation / <br>Critical Infrastructure Protection (NERC / CIP)<br>
North American Electric Reliability Corporation Critical Infrastructure Protection regulates organizations <font color="#e74f4c">involved in power generation and distribution</font>.
健康保险便捷与责任法案 (HIPAA)<br>Health Insurance Portability and Accountability Act (HIPAA)<br>
经济与临床医疗保健信息科技 (HITECH) 法案<br>Health Information Technology for <br>Economic and Clinical Health (HITECH) Act<br>
Both <font color="#e74f4c">deal with PHI</font> and implement specific requirements for security and privacy protections,as well as breach notification requirements.
支付卡行业 (PCI)<br>Payment Card Industry (PCI)<br>
Specifies protections for <font color="#e74f4c">payment card transaction data</font>.
分布式信息技术 (IT) 模型的影响<br>Impact of distributed information technology (IT) model<br>
Cloud computing enables distributed IT service delivery,with systems that can <font color="#e74f4c">automatically replicate data globally</font>
One impact of this distributed model is the <font color="#e74f4c">additional geographic locations auditors must consider</font> when performing an audit.
A common technique in cloud audits is <font color="#e74f4c">sampling</font>,which is the act of <font color="#e74f4c">picking a subset of the system's physical infrastructure</font><br>to inspect.
Sampling 20 servers of 100 servers across many regional datacenters can<font color="#e74f4c"> save time & expense</font> and <font color="#e74f4c">maintain accuracy</font>
不同的地理位置<br>diverse geographical locations<br>
跨越法律管辖区<br>crossing over legal jurisdictions<br>
6.4 了解云对企业风险管理的影响<br>Understand implications of cloud to enterprise risk management<br>
评估提供商风险管理计划<br>Assess providers risk management programs<br>
控制<br>controls
Reviewing provider controls
Prior to establishing a relationship with a cloud provider,a cloud customer needs to analyze the risks associated with adopting that provider's services
Rather than performing a direct audit,the customer must rely on their <font color="#e74f4c">supply chain risk management(SCRM)</font>processes.
Primary areas of focus in SCRM include evaluating:
<ul><li>whether a supplier has a risk management program in place,and if so</li><li>whether the risks identified by that program are being adequately mitigated.</li></ul>
Unlike traditional risk management activities,<b>SCRM</b> in a CSP scenario often requires customers to take an indirect approach -reviewing audit <br>reports.<br>
Major CSPs all make available SOC 2,ISO 27001,FedRAMP,or CSA STAR audit reports in lieu of direct audit.
When reviewing an audit report,there are several key elements of the report to focus on,such as scoping information or description<br>of the audit target.
Some compliance frameworks allow audits to be very narrowly scoped,such as Soc 2.
方法<br>methodologies
There are resources that can help organizations build out or enhance their SCRM program:
<b>NIST</b> has a resource library that includes working groups,publications, and other resources
<b>ISO 27000:2022</b> specifies a security management system for security and resilience,with a particular focus on supply chain management.
策略<br>policies
风险概况<br>risk profile
Risk profile <font color="#e74f4c">describes the risk present</font> in the organization <font color="#e74f4c">based on all the identified risks</font> and any associated mitigations in place.
风险偏好<br>risk appetite<br>
Risk appetite describes the amount of risk an organization is willing to <font color="#e74f4c">accept without mitigating</font>.
Regulated industries will be more apt to <b>mitigation</b>,<b>transference</b>, and <b>avoidance</b>.
Smaller orgs and startups will be more apt to simply <b>accept </b>risks to <font color="#e74f4c">avoid cost of treatment</font>.
数据所有者/控制者与数据保管者/处理者之间的区别<br>Difference between data owner/controller vs. data custodian/processor<br>
Data Processor
Anyone who processes personal data on behalf of the data controller.<font color="#e74f4c">The CusTODIAN</font>
Is responsible for the safe and private custody, transport,and storage
Data Controller
The person or entity that controls processing of the data.<font color="#e74f4c"> The OWNER</font>
Owns the data and risks associated with any data breaches
Data Protection officer (DPO)
ensures the organization <font color="#e74f4c">complies with data regulations</font>.
<font color="#e74f4c">under GDPR,the DPO is a mandatory appointment</font>
Data Subject
is the individual or entity that is the subject of the personal data.
Data Owner
Data CONTROLLER in GDPR
Usually a member of <font color="#e74f4c">senior management</font>.<br>CAN delegate some day-to-day duties.<br>CANNOT delegate total responsibility.
Data Custodian
Data PROCESSOR in GDPR
Usually someone in the <font color="#e74f4c">IT department</font><br>DOES implement controls for data owner<br>DOES NOT decide what controls are needed
监管透明度要求<br>Regulatory transparency requirements<br>
违规通知<br>breach notification<br>
Most recent privacy laws include mandatory breach notification.
There are some variations among the laws,mainly around issues of timing of the notification and who must be notified
Regulations that require breach notification include,but are not limited to, GDPR,HIPAA (as amended by the HITECH Act),GLBA,and PIPEDA.
Incident response plans and procedures should include relevant information about the<br>time period for reporting,as well as the required contacts in the event of a data breach.
<font color="#e74f4c">WHO should be notified and HOW QUICKLY</font>
Sarbanes-Oxley (SOX)
If a company is publicly traded in the United States,they are subject to transparency requirements
Under the Sarbanes-Oxley Act (SOX)of 2002.Specifically,as data owners, these companies should consider the following:
<b>Section 802</b>:It is a crime to destroy,change,or hide documents to prevent their use in official legal processes.
<b>Section 804</b>:Companies must keep audit-related records for a minimum of five years.
SOX compliance is often an issue with both<font color="#e74f4c"> data breaches and ransomware incidents</font> at publicly traded companies.
The loss of data related to compliance due to external actors does not protect a company from legal obligations.
一般数据保护条例 (GDPR)<br>General Data Protection Regulation (GDPR)<br>
For companies doing business in the European Union or with citizens of the<br>EU,transparency requirements under the GDPR are laid out in Article 12.
States that a data controller "<font color="#e74f4c">must be able to demonstrate that personal data are processed in a manner transparent to the data subject</font>."
The obligations for transparency begin at the data collection stage and apply "throughout the <font color="#e74f4c">lifecycle of processing</font>."
Stipulates that communication to data subjects must be<br><font color="#e74f4c">'concise,transparent,intelligible and easily accessible,and use clear and plain language</font>."
Meeting the requirement for transparency also requires processes for <font color="#e74f4c">providing data subjects with access to their data</font>.
风险处理<br>Risk treatment<br>
规避<br>avoid
Where the organization changes business practices to <font color="#e74f4c">completely eliminate</font> the potential that a risk will materialize.
Can negatively <font color="#e74f4c">impact business opportunities</font>
减轻<br>mitigate
The process of <font color="#e74f4c">applying security controls</font> to reduce the probability and/or magnitude of a risk.
转移<br>transfer
Shifts some of the impact of a risk from the organization experiencing the risk to another entity.
e.g <font color="#e74f4c">cyber insurance</font>
共享<br>share
接受<br>acceptance
Deliberately choosing to take no other risk management strategy and to simply continue operations as normal in the face of the risk.
use when cost of mitigation > cost of impact
<font color="#e74f4c">Risk Appetite.Sometimes called "risk tolerance"</font>] is the amount of risk that a company is <font color="#e74f4c">willing to accept</font>.
Security Controls
<b>safeguards</b> are <font color="#e74f4c">proactive </font>(reduce likelihood of occurrence)
<b>countermeasures</b> are <font color="#e74f4c">reactive </font>(reduce impact after occurrence
不同的风险框架<br>Different risk frameworks<br>
ISO 31000:2018 guidance standard
ISO 31000 contains several standards related to building and <font color="#e74f4c">running a risk management program</font>.
<b>ISO 31000:2018,"Risk management-Guidelines,"</b><br>provides the foundation of an organization's risk management function.
<b>IEC 31010:2019,"Risk management-Risk assessment techniques"</b><br>provides guidance on conducting a risk assessment.
<b>ISO GUIDE 73:2009,"Risk management -Vocabulary"</b><br>provides a standard set of terminology used through the other documents and is useful for defining elements of the risk management program.
ENISA's cloud computing risk assessment
ENISA produces useful resources related to cloud-specific risks that organizations <br>should be aware of and plan for when designing cloud computing systems.<br>
This guide <font color="#e74f4c">identifies various categories of risks and recommendations </font>for organizations to consider when evaluating cloud computing.
These include research recommendations to advance the field of cloud computing,legal risks,and security risks.
NIST 800-37,"Risk Management Framework"
NIST Special Publication 800-37 is the NIST <font color="#e74f4c">Risk Management Framework</font>
NIST Special Publication 800-146"Cloud Computing Synopsis and Recommendations"provides definitions of various cloud computing terms
NIST 800-146,"Cloud Computing Synopsis and Recommendation,
Although <font color="#e74f4c">not a dedicated risk management standard</font>,the various risks and<br>benefits associated with different deployment and service models are discussed.
风险管理指标<br>Metrics for risk management<br>
<b>Patching levels</b>:How many devices are fully patched and up-to-date?<br><font color="#e74f4c">Unpatched devices often contain exploitable vulnerabilities.</font>
<b>Time to deploy patches</b>:How may devices receive required patches in the defined timeframes?<br>A useful <font color="#e74f4c">measure of how effective a patch management program</font> is at reducing the risk of known vulnerabilities.
<b>Intrusion attempts</b>:How many times have unknown actors tried to breach cloud systems?<br><font color="#e74f4c">Increased intrusion attempts can be an indicator of increased risk likelihood</font>.
<b>Mean time to detect(MTTD),mean time to contain (MTTC), and mean time to resolve (MTTR):</b><br>How long does it take for security teams to become aware of a potential security incident,contain the damage,and resolve the incident?<br><font color="#e74f4c">Inadequate tools or resources for reactive risk mitigation can increase the impact of risks occurring</font>
Cybersecurity metrics provide vital information for decision makers in the organization.
Cybersecurity metrics within expected parameters indicate <font color="#e74f4c">the risk mitigations are effective</font>.
Metrics that deviate from expected parameters are <font color="#e74f4c">no longer effective and should be reviewed</font>
风险环境评估<br>Assessment of risk environment<br>
服务<br>service
供应商<br>vendor
Designing a supply chain risk management (SCRM)program to assess CSP or vendor risks is a <font color="#e74f4c">due diligence practice</font>.
Actually performing the assessment is an example of <font color="#e74f4c">due care</font>.
Remember,the customer organization is responsible.<br>Any organization that uses cloud services without adequately mitigating the risks <font color="#e74f4c">is likely to be found negligent in a breach</font>
基础架构<br>infrastructure
业务<br>business
common Criteria(ISO/IEC 15408-1)
Enables an <font color="#e74f4c">objective evaluation to validate</font> that a particular product or system satisfies a defined set of security requirements
Assures customers that security products they purchase have been thoroughly tested by <font color="#e74f4c">independent third-party testers</font>
The certification of the product only certifies product capabilities.
<font color="#e74f4c">Designed to provide assurances for security claims by vendors</font>
Evaluation <font color="#e74f4c">is done through testing laboratories</font> where the product or platform is evaluated against a standard set of criteria.
The result is an <font color="#e74f4c">Evaluation Assuranee Level (EAL)</font>,which defines how robust the security capabilities are in the evaluated product
Most CSPs do not have common criteria evaluations over their entire environments,but many cloud-based products do
If misconfigured or mismanaged,software is no more secure than anything else the customer might use.
CSA STAR <font color="#e74f4c">S</font>ecurity,<font color="#e74f4c">T</font>rust,<font color="#e74f4c">A</font>ssurance,and <font color="#e74f4c">R</font>isk
When evaluating the risks in a specific CSP or other cloud service,the CSA STAR can be a useful,lightweight method for ascertaining risks.
Contains evaluations of cloud services against the CSA's <font color="#e74f4c">cloud controls matrix(CCM)</font>
Organizations can opt for self-assessed or third-party-assessed cloud services.This will affect the level of assurance (low or high)
子主题
ENISA has published a standard for<font color="#e74f4c"> certifying the cybersecurity</font> practices present in cloud environments
The framework,known as <b>EUCS</b>,defines a set of evaluation criteria for various cloud service and deployment models.
The goal is producing security evaluation results that allow comparison of the security posture across different cloud providers.
6.5 了解外包和云合同设计<br>Understand outsourcing and cloud contract design<br>
THIRD-PARTY RISK MANAGEMENT
NDA
A contract with vendors and suppliers not to disclose the company's confidential information
A 'mutual NDA'binds both partics in the agreement
业务要求<br>Business requirements<br>
服务等级协议(SLA)<br>service-level agreement (SLA)<br>
Stipulate <font color="#e74f4c">performance expectations</font> such as maximum downtimes and often include<font color="#e74f4c"> penalties</font> if the vendor doesn't meet expectations.
Generally used with external vendors (like CSP)and is legally binding
Often includes financial penalties for non-performance and may allow customer to t<font color="#e74f4c">erminate a contract</font>
SLAs should be written to ensure that the organization's <font color="#e74f4c">service level requirements (SLRs)are met.</font>
SLAs are best suited for defining recurring,discrete, <font color="#e74f4c">measurable items</font> the parties agree upon.
Common elements documented in SLAs include:
<ul><li>Uptime guarantees</li><li>SLA violation penalties</li><li>SLA violation penalty exclusions and limitations</li><li>Suspension of service clauses</li><li>Provider liability</li><li>Data protection and management</li><li>Disaster recovery and recovery point objectives</li><li>Security and privacy notifications and timeframes</li></ul>
主服务协议(MSA)<br>master service agreement (MSA)<br>
In legal terms,a cloud customer and a CSP enter into a master service agreement (MSA)
This is defined as any contract that two or more parties enter into as a service agreement
MSA should address compliance and process <font color="#e74f4c">requirements the customer is passing along to CSP</font>
Legal counsel is most often responsible for contracts, but security should be involved to share requirements
MSA should include <font color="#e74f4c">breach notification</font> -CSP duty to inform the customer of a breach within a specific time period after detection.
工作陈述(SOW)<br>statement of work (SOW)<br>
Legal document usually created after an MSA has been executed and governs a specific unit of work.
MSA may document services and prices,a SOW covers requirements,expectations,and deliverables for a project.
<font color="#e74f4c">MSA Focus is 'overall,ongoing",SOW is "limited & specific"</font>
THIRD-PARTY RISKS
Supply chain
Supply chain security has become a significant concern for organizations. Includes,suppliers,manufacturers,distributors,and <font color="#e74f4c">customers</font>.
A breach at any link in the supply chain can result in business impact.
Vendor management
Many orgs are reducing the number of vendors they work with and requiring stricter onboarding procedures.
Vendors may be required to submit to an external audit and agree to strict<br>communication and reporting requirements in event of potential breach.
<font color="#e74f4c">Risk of 'island hopping attack"</font>
System integration
System integration partners working on systems often have privileged remote or<br>physical access,necessitating security measures and process controls.
<font color="#e74f4c">Potential for Increased risk of insider attack</font>
供应商管理<br>Vendor management<br>
The practices ofSCRM and vendor management overlap significantly
However,in many cases vendor management will include more activities related to <font color="#e74f4c">operational risks</font>.
Cloud computing involves outsourcing ongoing organizational processes and infrastructure to a service provider
Therefore,the cloud requires more continuous management activities to monitor and manage the vendor relationship
供应商评估<br>vendor assessments<br>
Security practitioners should participate in the<font color="#e74f4c"> initial selection process for a CSP</font>,<br>which involves <font color="#e74f4c">assessing security risks </font>present in CSP and related services.
For many customers,this process will entail <font color="#e74f4c">reviewing security reports</font> like a SOC<br>2 on an annual basis after the CSP has undergone their yearly audit.
供应商锁定风险<br>vendor lock-in risks<br>
This assessment will require knowledge of not only the CSP's offerings but the<br>architecture and strategy the customer organization intends to use.
Using <font color="#e74f4c">any unique CSP offerings</font>,such as artificial intelligence/machine learning<br>(Al/ML)platforms,can result in a service that is <font color="#e74f4c">dependent on that specific CSP</font>.
供应商生存能力<br>vendor viability<br>
This is often a process that is not conducted by the security team as it deals with <font color="#e74f4c">operational risk.</font>
Assessing the viability of vendors may involve reviews of public information like:
<ul><li>financial statements</li><li>the CSP's performance history and reputation</li><li>or even formal reports like a SOC 1</li></ul>
托管<br>escrow<br>
Escrow is a legal term used when <font color="#e74f4c">a trusted third party holds something on<br>behalf of two or more other parties</font>,such as source code or encryption keys.
ESCROW SCENARIO:
A software development company may wish to protect the intellectual property of their source code.
However,if they go out of business,their customers are left with an unmaintainable system.
In this scenario,an escrow provider could hold a copy of the source code and<br>release it to customers in the event the provider is no longer in business.
合同管理<br>Contract management<br>
Organizations must employ adequate governance structures to <b>monitor contract terms and performance</b> and be aware of<br><b>outages</b> and <b>any violations of stated agreements</b>.
Contract Clauses
A contract clause is a specific article of related information that specifies the agreement between the contracting parties.
<font color="#e74f4c">Some common contract clauses</font> that should be considered for any CSP or other data service provider include the following:
<ul><li>Right to audit</li><li>Metrics</li><li>Definitions</li><li>Termination</li><li>Litigation</li><li>Assurance</li><li>Compliance</li><li>Access to cloud/data</li></ul>
审计权<br>right to audit<br>
The customer can request the <font color="#e74f4c">right to audit the service provider</font> to ensure compliance with the security requirements agreed in the contract.
Contracts often written to allow the CSP's standard audits (e.g.,SOC 2,ISO 27001 certification)to be used <font color="#e74f4c">in place of a customer-performed audit</font>.
指标<br>metrics<br>
If there are specific indicators that the service provider must provide to the customer,they can be documented in a contract.
Tell you "how compliance with the agreement will be measured"
定义<br>definitions<br>
A contract is a legal agreement between multiple parties.
It is essential that all parties share a common understanding of the terms and expectations.
Defining key terms like sccurity,privacy,and key practices like breach notifications can <font color="#e74f4c">avoid misunderstandings.</font>
终止<br>termination<br>
Termination refers to ending the contractual agreement.
This clause will typically define conditions under which either party may terminate the contract
May also specify <font color="#e74f4c">consequences </font>if the contract is terminated carly.
诉讼<br>litigation<br>
This is an area where legal counsel must be consulted.
Agreeing to terms for litigation can severely restrict the organization's ability to <font color="#e74f4c">pursue damages</font> if something goes wrong.
保证<br>assurance<br>
Defining assurance requirements sets expectations for both the provider and customer.
Many contracts specify that a provider must <font color="#e74f4c">furnish a SOC 2</font> or equivalent to the customer on an annual basis
合规<br>compliance<br>
Any customer compliance requirements that flow to the provider must be documented and agreed upon in the contract.
Data controllers that use cloud providers as data processors must ensure that adequate security safeguards are available for that data
访问云/数据<br>access to cloud/data<br>
Clauses dealing with customer access can be used to <font color="#e74f4c">avoid risks associated with vendor lock-in</font>.
网络风险保险<br>cyber risk insurance<br>
cyber risk insurance is designed to help an organization <font color="#e74f4c">reduce the financial impact</font> of risk by transferring it to an insurance carrier.
In the event of a security incident,the insurance carrier can help offset associated<br>costs,such as digital forensics and investigation,data recovery,system restoration.
It may even cover legal or regulatory fines associated with the incident.
Cyber insurance carriers are in the business of risk management and are unlikely to<br>offer coverage to an organization lacking controls to mitigate risk.
Cyber insurance requires organizations to pay a premium for the insurance plan.<br>Most plans have a <font color="#e74f4c">limit of coverage</font> that <font color="#e74f4c">caps how much the insurance carrier pays</font>.
There may also be <font color="#e74f4c">sub-limits</font>,which cap the amount that will be paid for <font color="#e74f4c">specific types of incidents</font> such as ransomware or phishing.
An insurance broker can be a useful resource when investigating insurance options for your organization's circumstances,including
<ul><li>the amount of coverage needed</li><li>different types of coverage such as business interruption or cyber extortion</li><li>security controls that the insurance carrier requires,such as MFA</li></ul>
Cyber risk insurance usually covers costs associated with the following:
<span style="font-size: inherit;">Investigation</span><br>
Costs associated with the forensic investigation to determine the extent of an incident.
This oftcn includes costs for third-party investigators.
Direct business losses<br>
<font color="#e74f4c">Direct monetary losses</font> associated with downtime or data recovery,overtime<br>for employees,and,oftentimes,reputational damages to the organization.
Recovery costs<br>
These may include costs associated with replacing hardware or provisioning<br>temporary cloud environments<font color="#e74f4c"> during contingency operations</font>.
They may also include services like forensic data recovery or negotiations with attackers to assist in recovery.
Legal notifications<br>
Costs are associated with required <font color="#e74f4c">privacy and breach notifications</font> required by relevant laws.
Lawsuits<br>
Policies can be written to <font color="#e74f4c">cover losses and payouts</font> due to class action or other lawsuits against a company after a cyber incident.
Extortion<br>
The insurance to <font color="#e74f4c">pay out ransomware demands</font> is growing in popularity.
This may include direct payments to ensure data privacy or accessibility by the company.
Food and related expenses
Incidents often require employees to work extended hours or travel to contingency sites.
Costs associated with the incident response,including catering and lodging,may be covered,even though they are not usually thought<br>of as IT costs!
供应链管理<br>Supply-chain management<br>
Managing risk in the supply chain focuses on both <font color="#e74f4c">operational risks</font>,to ensure that suppliers are capable of<br>providing the needed services,and security risks
The supply chain should always be considered in any <font color="#e74f4c">business continuity or disaster recovery </font>planning.
Proactive measures including contract language and assurance processes can be used to <font color="#e74f4c">quantify the risks</font> associated with using suppliers like CSPs...as well as the effectiveness of these suppliers'risk management programs.
ISO/IEC 27036-1:2021 Cybersecurity -Supplier relationships
The ISO 27000 family of standards includes a specific ISO standard dedicated to supply chain cybersecurity risk management.
ISO 27036:2021 provides a set of practices and guidance for <font color="#e74f4c">managing cybersecurity risks in supplier relationships</font>.
This standard is particularly useful for organizations that use ISO 27001 for building an ISMS or ISO 31000 for risk management
ISO/IEC 27036 comprises four parts,including:
Part 1:Overview and concepts<br>Part 2:Requirements<br>Part 3:Guidelines for information and communication technology supply chain security<br>Part 4:Guidelines for security of cloud services
国际标准组织/国际电子技术委员会 (ISO/IEC) 27036<br>International Organization for Standardization/International <br>Electrotechnical Commission (ISO/IEC) 27036<br>
<b>Part 1:Overview and concepts</b>,"which provides an overview and foundation for a<br>supply chain management capability.<br><b>Part 2:Requirements</b>,"which provides a set of best practices and techniques for<br>designing and implementing the supply chain management function.<br><b>Part 3:Guidelines for information and communication technology supply chain<br>security</b>,"which is of particular concern for security practitioners,as it lays out<br>practices and techniques specific to managing security risks in the supply chain.<br><b>Part 4:Guidelines for security of cloud services</b>,"which is the most relevant to<br>cloud security practitioners.This standard deals with practices and requirements<br>for managing supply chain security risk specific to cloud computing and CSP
Additional resources focusing on supply chain worth review include:
<b>NISTIR 8276</b>,"Key Practices in Cyber Supply Chain Risk Management:<br>Observations from Industry";<br><b>NIST SP 800-161</b>,"Cybersecurity Supply Chain Risk Management Practices<br>for Systems and Organizations";<br><b>ENISA publication"Supply Chain Integrity</b>:An overview of the ICT supply<br>chain risks and challenges,and vision for the way forward.",published in 2015
0 条评论
下一页
为你推荐
查看更多