Section - Principles of Security

  • Task 1 - Basic Intro
  • Task 2 - CIA Triad
    • Infosec model created in 1998
    • Confidentiality
      • Protection of org data. Is it public, private, admin only, etc.
    • Integrity
      • Accuracy and consistency. Have things been tampered with? Have only authorized people accessed it?
    • Availability
      • Uptime, is the data accessibile to those who are authorized?
  • Task 3 - Privileges
    • Privileged Identity Management (PIM)
      • Who you are in the company translates into access on a system
    • Privileged Access Management (PAM)
      • Management of what privileges a system access role has
      • Things like security policies, auditing, etc.
      • Things that reduce the potential attack surface.
  • Task 4 - Security Models (Beyond CIA Triad)
    • Bell-La Padula
      • Model used to maintain and achieve confidentiality. It’s very strict and on a need to know basis
        • Works by granting access to pieces of data (called objects)
      • Popular within the government and military
      • Usually used when people/users have already been through a vetting process, and are already considered trustworthy.
      • “Can’t read up, can read down”
        • I.e. can’t climb up the ladder, but is able to climb down
    • Biba
      • Basically the Bell-La Padula model but for the integrity portion of the CIA triad
      • “Can read up, can’t read down”
        • I.e. can climb up the ladder, but can’t climb down
  • Task 5 - Thread Modelling / Incident Response
    • Threat Modelling
      • Reviewing, improving, and testing security protocols
      • Extremely important! It helps identify what threats are likely, what to expect, etc.
        • Generic Process:
          • Identification -> Preparation -> Mitigation -> Reviews -> Repeat
          • Threat Intelligence -> Asset Identification -> Mitigation Capabilities -> Risk Assessement -> Repeat
    • Threat Modelling / Response Frameworks
      • STRIDE - Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege
      • CSIRT - Computer Security Incident Response Team
        • Preparation -> Identification -> Containment -> Eradication -> Recovery -> Notes/Lessons
      • PASTA - Process for Attack Simulation and Threat Analysis