Thor Teaches Study Guide CISSP Domain 7
Thor Teaches Study Guide CISSP Domain 7
1|Page
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• Even if you have access, if you do not need to know, then you should
not access the data. (Kaiser employees).
• Separation of duties:
• More than one individual in one single task is an internal control
intended to prevent fraud and error.
• We do not allow the same person to enter the purchase order and issue
the check.
• For the exam assume the organization is large enough to use separation
of duties, in smaller organizations where that is not practical,
compensating controls should be in place.
2|Page
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• The more access and privilege an employee have the more we keep an eye on
their activity.
• They are already screened more in depth and consistently, but they also have
access to many business-critical systems, we need to audit their use of that
access.
• With more access comes more responsibility and scrutiny.
• Administrative Security:
• Digital (computer) forensics:
• Focuses on the recovery and investigation of
material found in digital devices, often in relation
to computer crime.
• Closely related to incident response, forensics is
based on gathering and protecting the evidence,
where incidents responses are how we react in an
event breach.
• We preserve the crime scene and the evidence,
we can prove the integrity of it at a later needed
time, often court.
• Administrative Security:
• Digital (computer) forensics:
• The forensic process:
• Identify the potential evidence, acquire the
evidence, analyze the evidence, make a report.
• We need to be more aware of how we gather our
forensic evidence, attackers are covering their
tracks, deleting the evidence and logs.
• This can be through malware that is only in
volatile memory, if power is shut off (to preserve
the crime scene), the malware is gone, and the
evidence is lost.
• Rather than shutting the system down, we can if
considered safe disconnect it from the network
and take bit by bit copies of the memory, drives, running processes and network
connection data.
• Administrative Security:
• Digital forensics:
• The evidence we collect must be accurate, complete, authentic, convincing,
admissible.
• Identification: Identify the evidence, what is left behind,
• Preservation:
3|Page
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• Everything is documented, chain of custody: Who had it when? What
was done? When did they do it?
• Pull the original, put it in write protected machine, we make a hash.
• We only do examinations and analysis on bit level copies; we confirm
they have the same hash as the original before and after examination
• Collection:
• We examine and analyze the data, again document everything.
• We handle the evidence as little as possible.
• Work from most volatile to least volatile, starting with the RAM and
ending with the hard disks.
• Administrative Security:
• Digital forensics:
• We use our incidence response plan:
• This can include getting our HR and Legal departments involved.
• We ensure our evidence is acquired in a legal manner. Remember the US
Constitution 4th amendment.
• The right of the people to be secure in their persons, houses, papers, and
effects, against unreasonable searches and seizures, shall not be
violated.
• Anything subpoenaed, search warranted, turned over voluntarily and in exigent
circumstances (immediate danger of being destroyed), can allow law
enforcement to bypass the 4th amendment.
• Examination: Find the facts and document them, collecting the data.
• Analysis: Look at the data and look for meaning or reason.
• Presentation in court: We present our findings and any other evidence.
• Decision: The court rules on the case.
• Administrative Security:
• Digital forensics:
• Forensic data is normally obtained from binary images of secondary storage and
portable storage devices like hard drives, flash drives, CDs, DVDs, and cell
phones and mp3 players.
• We use a binary or bit stream image copy to ensure we get an exact copy of the
device, and not just a copy of certain sectors.
• Real Evidence: Tangible and Physical objects, in IT Security: Hard Disks, USB
Drives – NOT the data on them.
• Evidence Integrity – It is vital the evidence's integrity cannot be questioned; we
do this with hashes. Any forensics is done on copies and never the originals, we
check hash on both original and copy before and after the forensics.
• Chain of Custody – Chain of custody form, this is done to prove the integrity of
the data. No tampering was done.
• Who handled it?
4|Page
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• When did they handle it?
• What did they do with it?
• Where did they handle it?
• Administrative Security:
• Digital forensics:
• Here are the four basic types of disk-based forensic
data:
• Allocated space:
• The portions of the disk that are
marked as actively containing data.
• Unallocated space:
• The portions of the disk that does
not contain active data.
• This is parts that have never been
allocated and previously allocated
parts that have been marked
unallocated.
• When a file is deleted, the parts of
the disk that held the deleted file
are marked as unallocated and made available for use. (This is
also why deleting a file does nothing, the data is still there until
overwritten).
• Administrative Security:
• Digital forensics:
• Slack space:
• Data is stored in specific size chunks known as clusters
(clusters = sectors or blocks).
• A cluster is the minimum size that can be allocated by a file
system.
• If a particular file, or final portion of a file, does not require the
use of the entire cluster then some extra space will exist within
the cluster.
• This leftover space is known as slack space: it may contain old
data or can be used intentionally by attackers to hide
information.
• Bad blocks/clusters/sectors:
• Hard disks end up with sectors that cannot be read due to some
physical defect.
• The sectors marked as bad will be ignored by the operating
system since no data could be read in those defective portions.
5|Page
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• Attackers can mark sectors or clusters as being bad in order to
hide data within this portion of the disk.
• Administrative Security:
• Digital forensics:
• Network forensics:
• A sub-branch of digital forensics where we look at the monitoring and
analysis of computer network traffic for the purposes of information
gathering, legal evidence, or intrusion detection.
• Network investigations deal with volatile and dynamic information.
• Network traffic is transmitted and then lost, so network forensics is
often a pro-active investigation.
• Network forensics generally has two uses.
• The first type is monitoring a network for anomalous traffic and
identifying intrusions (IDS/IPS).
• An attacker might be able to erase all log files on a
compromised host, a network-based evidence might be
the only evidence available for forensic analysis.
• The second type relates to law enforcement.
• In this case analysis of captured network traffic can
include tasks such as reassembling transferred files,
searching for keywords and parsing human
communication such as emails or chat sessions.
• Administrative Security:
• Digital forensics:
• Network forensics:
• Systems used to collect network data for forensics use usually come in
two forms:
• Catch-it-as-you-can:
• All packets passing through a certain traffic point are
captured and written to storage with analysis being
done subsequently in batch mode.
• This approach requires large amounts of storage.
• Stop, look and listen:
• Each packet is analyzed in a basic way in memory and
only certain information is saved for future analysis.
• This approach requires a faster processor to keep up
with incoming traffic.
• Administrative Security:
• Digital forensics:
• Forensic software analysis:
6|Page
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• Comparing and/or reverse engineering software.
• Reverse engineering malware is one of the most common examples.
• Investigators often have a binary copy of a malware program and try to
deduce what it does.
• Common tools are disassemblers and debuggers.
• Software forensics can also refer to intellectual property infringement, for the
exam this is not the type we talk about.
• Administrative Security:
• Digital forensics:
• Embedded Device Forensics:
• We have for decades analyzed and investigated standard systems,
traffic and hardware, but embedded devices are a new player.
• They include SSD's, GPS', cell phones, PDA and much more.
• They can contain a lot of information, but how do we safely retrieve it
while keeping the integrity of the data?
• We talked about how the IoT (Internet Of Things) can be a security
concern, but all the devices can also hold a wealth of information.
• Where does the GPS say the car, phone or person was at a
certain time?
• When did the AC turn on? Can we assume someone was home
at that time?
• Forensic examiners may have to be able to access, interpret and analyze
embedded devices in their investigation.
• Administrative Security:
• Digital forensics:
• Electronic discovery (e-discovery)
• The discovery in legal proceedings, litigation, government
investigations, or Freedom of Information Act requests, where the
information is in electronic format.
• Considered different from paper information because of its intangible
form, volume, transience and persistence.
• Usually accompanied by metadata that is not found in paper documents
and that can play an important part as evidence.
• The preservation of metadata from electronic documents creates
special challenges to prevent spoliation.
• In the United States, electronic discovery was the subject of
amendments to the Federal Rules of Civil Procedure (FRCP).
• Can be very costly and take a lot of time with the amounts of data we
store. Proper retention for backups can reduce this as well as what we
back up.
7|Page
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• Administrative Security:
• Incident management:
• Involves the monitoring and detection of security events on our systems, and
how we react in those events.
• It is an administrative function of managing and protecting computer assets,
networks and information systems.
• The primary purpose is to have a well understood and predictable response to
events and computer intrusions.
• We have very clear processes and responses, and our teams are trained in them
and know what to when an event occurs.
• Incidents are very stressful situations, it is important staff knows exactly what to
do, that they have received ongoing training and understand the procedures.
• Incidences and events can generally be categorized in 3 classes:
• Natural: Hurricanes, floods, earthquakes, blizzards, anything that is
caused by nature.
• Human: Done intentionally or unintentionally by humans, these are by
far the most common.
• Environmental: This is not nature, but the environments we work in,
the power grid, the internet connections, hardware failures, software
flaws…
• Administrative Security:
• Incident management:
• Event:
• An observable change in state, this is neither negative nor positive, it is
just something has changed.
• A system powered on, traffic from one segment to another, an
application started.
• Alert:
• Triggers warnings if certain event happens.
• This can be traffic utilization above 75% or memory usage at 90% or
more for more than 2 minutes.
• Incident:
• Multiple adverse events happening on our systems or network, often
caused by people.
• Problem:
• Incidence with an unknown cause, we would follow similar steps to
incidence response.
• More time would be spent on root cause analysis, we need to know
what happened so we can prevent it from happening again, this could
be a total internet outage or server crash.
8|Page
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• Administrative Security:
• Incident management:
• Inconvenience (non-disasters):
• Non-disruptive failures, hard disk failure, 1 server in a cluster is down, ...
• Emergency (Crisis):
• Urgent, event with the potential for loss of life or property.
• Disaster:
• Our entire facility is unusable for 24 hours or longer.
• If we are geographically diverse and redundant, we can mitigate this a
lot.
• Yes, a snowstorm can be a disaster.
• Catastrophe:
• Our facility is destroyed.
• Administrative Security:
• Incident management:
• The current exam lists a 7-step lifecycle but does
not include the first step in most incident
handling methodologies preparation.
1. Preparation.
2. Detection (Identification).
3. Response (Containment).
4. Mitigation (Eradication).
5. Reporting.
6. Recovery.
7. Remediation.
8. Lessons Learned (Post-incident Activity,
Postmortem, or Reporting).
• Administrative Security:
• Incident management:
• Preparation:
• This is all the steps we take to prepare for incidences.
• We write the policies, procedures, we train our staff, we procure the
detection soft/hardware, we give our incidence response team the tools
they need to respond to an incident.
• The more we train our team, the better they will handle the response,
the faster we recover, the better we preserve the crime scene (if there
is one), the less impactful an incident will be.
• Detection
• Events are analyzed to determine if they might be a security incident.
9|Page
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• If we do not have strong detective capabilities in and around our
systems, we will most likely not realize we have a problem until long
after it has happened.
• The earlier we detect the events, the earlier we can respond, IDS's can
help us detect, where IPS's can help us detect and prevent further
compromise.
• Administrative Security:
• Incident management:
• Detection
• The IDS's and IPS's can help us detect and prevent on a single network
segment, we also need something that can corollate all the information
from the entire network.
• Response
• The response phase is when the incident response team begins
interacting with affected systems and attempts to keep further damage
from occurring as a result of the incident.
• This can be taking a system off the network, isolating traffic, powering
off the system, or however our plan dictates to isolate the system to
minimize both the scope and severity of the incident.
• Knowing how to respond, when to follow the policies and procedures to
the letter and when not to, is why we have senior staff handle the
responses.
• We make bit level copies of the systems, as close as possible to the time
of incidence to ensure they are a true representation of the incident.
• Administrative Security:
• Incident management:
• Response:
• IT Security is there to help the business, it may not be the choice of
senior management to disrupt business to contain or analyze, it is
ultimately a decision that is made by them.
• We stop it from spreading, but that is it, we contain the event.
• Mitigation:
• We understand the cause of the incident so that the system can be
reliably cleaned and restored to operational status later in the recovery
phase.
• Organizations often remove the most obvious sign of intrusion on a
system or systems but miss backdoors and other malware installed in
the attack.
• The obvious sign is often left to be found, where the actual payload is
hidden. if that is detected or assumed, we often just rebuild the system
10 | P a g e
https://thorteaches.com/
CISSP Domain 7 Lecture notes
from scratch and restore application files from a known good backup,
but not system files.
• Administrative Security:
• Incident management:
• Mitigation (continued):
• To ensure the backup is good, we need to do root cause analysis, we
need a timeline for the intrusion, when did it start?
• If it is from a known vulnerability, we patch. If it's a newly discovered
vulnerability, we mitigate it before exposing the newly built system to
the outside again.
• If anything, else can be learned about the attack, we can add that to our
posture.
• Once eradication is complete, we start the recovery phase.
• Reporting:
• We report throughout the process beginning with the detection, and we
start reporting immediately when we detect malicious activity.
• The reporting has 2 focus areas: technical and non-technical.
• Administrative Security:
• Incident management:
• Reporting (continued):
• The incident handling teams report the technical details of the incident
as they start the incident handling process, but they also notify
management of serious incidents.
• The procedures and policies will outline when which level of
management needs to be informed and involved, it is commonly
forgotten until later and can be an RPE (Resume Producing Event).
• Management will also involve other departments if needed, this could
be legal, PR or whomever has been identified in the policies or
procedures.
• Recovery:
• We carefully restore the system or systems to operational status.
• When the system is ready for reinsertion is determined by the business
unit responsible for the system.
• We closely monitor the rebuilt or cleaned system carefully, it is possible
the attackers left backdoors, or we did not remove all the infected
sectors.
• Administrative Security:
• Incident management:
• Recovery:
11 | P a g e
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• Often the system(s) are reinserted off peak hours to minimize the effect
of the system(s) still being infected, or they can be introduced in a
controlled sandbox environment to see if the infection persists.
• Remediation:
• The remediation happens during the mitigation phase, where
vulnerabilities on the impacted system or systems are mitigated.
• Remediation continues after mitigation and becomes broader; this can
be patching all systems with the same vulnerability or change how the
organization authenticates.
• Administrative Security:
• Incident management:
• Lessons Learned:
• This phase is often overlooked, we removed the problem, we have
implemented new controls and safeguards.
• We can learn a lot from lessons learned, not just about the specific
incidence, but how well we handle them, what worked, what didn't.
• How can we as an organization grow and become better next time, we
have another incidence? While we may have fixed this one vulnerability
there are potentially 100's of new ones we know nothing about yet.
• At the end of lessons learned we produce a report to senior
management, with our findings, we can only make suggestions, they are
ultimately in charge (and liable).
• Often after major incidents organizations shift to a top-down approach
and will listen more to IT Security.
• The outcome and changes of the Lessons Learned will then feed into
our preparation.
• Administrative Security:
• Incident management:
• Root-cause analysis:
• We attempt to determine the underlying weakness or vulnerability that
allowed the incident to happen.
• If we do not do the root-cause analysis, we will most likely face the
same problem again.
• We need to fix the vulnerability on the system(s) that were affected, but
also on any system in the organization that has that particular
vulnerability or set of vulnerabilities.
• We could have a weak password policy and weak encryption that could
be the root cause of a system compromise, we then would implement
countermeasures to remove the vulnerability.
• If we do nothing and just fix the problem, the root of the issue still
persists, that is what we need to fix.
12 | P a g e
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• Preventive and Detective Controls:
• IDS’s and IPS’s.
• We use both IDS’s (Intrusion Detection Systems) and IPS’s (Intrusion Prevention
Systems) on our network to capture and alert or block traffic seen as malicious.
• They can be categorized into 2 types and with 2 different approaches toward
identifying malicious traffic.
• Network based, placed on a network segment (a switch port in
promiscuous mode).
• Host based, on a client, normally a server or workstation.
• Signature (Pattern) matching, similar to antivirus, it matches traffic
against a long list of known malicious traffic patterns.
• Heuristic (Behavioral) based, uses a normal traffic pattern baseline to
monitor for abnormal traffic.
• Just like firewalls, routers, servers, switches and everything else in our
environment they just see part of the larger picture, for full picture views and
data correlation we use a SIEM (Security Information and Event Management)
system.
13 | P a g e
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• Host based, on a client, normally a server or workstation.
• We only look at a single system.
• Who is using the system, the resource usage, traffic? ...
• It can be application specific; it doesn’t have to be the entire system we
monitor.
• If we do choose to do traffic analysis it will impact the host by slowing it down.
• Certain attacks can turn off HIDS/HIPS
• Can look at the actual data (it is decrypted at the end device), NIDS/NIPS can't
look at encrypted packets.
14 | P a g e
https://thorteaches.com/
CISSP Domain 7 Lecture notes
spoofed and bounced by a server then it makes it very difficult for IDS to
detect the origin of the attack.
• Pattern change evasion: The attacker changes the data used slightly,
which may avoid detection.
• We rarely talk about the “true” states since things are happening like
they are supposed to, we are interested in when it doesn’t, and we
prevent authorized traffic or allow malicious traffic.
15 | P a g e
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• Building the trusted application whitelist takes a good deal of time, but is far
superior to blacklisting, there are 10,000’s of application and we can never keep
up with them.
• Removable Media Controls:
• Good security policies would also have us lock down USB ports, CD drives,
memory card ports and anything else where you can load malicious code onto
our systems from external devices.
• For servers we may rarely have to enable USB ports for firmware or other
updates, we would enable the ports while we use them and lock them right
away after, it is safer to be done centrally via group policies or similar.
16 | P a g e
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• Preventive and Detective Controls:
• Configuration Management:
• When we receive or build new systems, they often are completely open, before
we introduce them to our environment, we harden
them.
• We develop a long list of ports to close, services to
disable, accounts to delete, missing patches and many
other things.
• Often it is easier to have OS images that are
completely hardened and use the image for the new
system, we then update the image when new
vulnerabilities are found or patches need to be applied, often though we use a
standard image and just apply the missing patches.
• We do this for any device on our network, servers, workstations, phones,
routers, switches...
• Asset Management:
• Patch Management:
• In order to keep our network, secure we need to apply patches on a regular
basis.
• Whenever a vulnerability is discovered the software producer should release a
patch to fix it.
• Microsoft for instance have “Patch Tuesday” (2nd Tuesday of the month).
• They release all their patches for that month.
• If critical vulnerabilities are discovered, they push those patches outside
of Patch Tuesday.
• Most organizations give the patches a few weeks to be reviewed and
then implement them in their environment.
• We normally remember the OS patches, but can often forget about network
equipment updates, array updates, IoT updates and so on, if they are not
17 | P a g e
https://thorteaches.com/
CISSP Domain 7 Lecture notes
patched, we are not fully using defense in depth and we can expose ourselves to
risk.
• Asset Management:
• Patch Management:
• I have seen places where full rack disk arrays were not encrypted and had not
been patched since installation over 10 years prior, the reasoning was poorly
designed data storage and updating would take the disks offline for up to an
hour, which for the organization was unacceptable.
• We use software to push our patches to all appropriate systems, this is easier,
we ensure all systems gets patched and they all get the same parts of the patch,
we may exclude some parts that have an adverse effect on our network.
• Common tools could be SCCM or WSUS, they do not only push patches, but any
software we want to distribute to our organization.
• We do the pushes after hours to not impact the availability during working
hours, normally done Friday or Saturday night somewhere between 01:00 am
and 04:00 am.
• Most places avoid midnight as a lot of backups and jobs run at that time and
end no later than 04:00 am or 05:00 am to ensure systems are online by the
start of business the following day.
• Asset Management:
• Change Management:
• Our formalized process on how we handle changes to our environments.
• If done right we will have full documentation, understanding and we
communicate changes to appropriate parties.
• The change review board should be comprised of both IT and other operational
units from the organization, we may consider impacts on IT, but we are there to
serve the organization, they need to understand how it will impact them and
raise concerns if they have any.
• A change is proposed to the change board, they research in order to understand
the full impact of the change.
• The person or group submitting the change should clearly explain the reasons
for the change, the pros and cons of implementing and not implementing, any
changes to systems and processes they know about and in general aide and
support the board with as much information as needed.
• The board can have senior leadership on it, or they can have a predefined range
of changes they can approve and anything above that threshold they would
make recommendations, but changes require senior leadership approval.
• Asset Management:
• Change Management:
18 | P a g e
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• There are many different models and process flows for change management,
some are dependent on organization structure, maturity, field of business and
many other factors.
• A generalized flow would look like this:
• Identifying the change.
• Propose the change.
• Assessing risks, impacts and benefits of implementing and not
implementing.
• Provisional change approval, if testing is what we expect this is
the final approval.
• Testing the change, if what we expected we proceed, if not we
go back.
• Scheduling the change.
• Change notification for impacted parties.
• Implementing the change.
• Post implementation reporting of the actual change impact.
• Asset Management:
• Change Management:
• We closely monitor and audit changes,
remember changes can hold residual risk
which we would then have to mitigate.
• Everything in the change control process
should be documented and kept, often
auditors want to see that we have
implemented proper change controls, and
that we actually follow the paper process
we have presented them with.
• Asset Management:
• 0-day vulnerabilities:
• Vulnerabilities not generally known or discovered, the first time an attack is
seen is considered day 0, hence the name.
• From when a vulnerability is discovered it is now only a short timespan before
patches or signatures are released on major software.
• With millions of lines of code in a lot of software and the 1% errors we talked
about there will always be new attack surfaces and vulnerabilities to discover.
The only real defense against the 0-day exploits is defense in depth and when
discovered immediate patching as soon as it is available, and we have tested it
in our test environments. Most signatures in IDS/IPS and antivirus auto update
as soon as new signatures are available.
• 0-day vulnerability: The vulnerability that has not been widely discovered and
published.
19 | P a g e
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• 0-day exploit: Code that uses the 0-day vulnerability.
• Asset Management:
• 0-day vulnerabilities:
• The Stuxnet worm that targeted Iran's nuclear centrifuges used 4 unique 0-day
exploits (previously unheard of).
• It was developed over 5+ years and estimated to have cost 100's of millions of
dollars.
• Stuxnet has three modules:
• A worm that executes all routines related to the main payload of the
attack;
• A link file that automatically executes the propagated copies of the
worm.
• A rootkit responsible for hiding all malicious files and processes,
preventing detection of Stuxnet.
• It is introduced to the target environment by an infected USB flash drive.
• The worm then propagates across the network, scanning for Siemens Step7
software on computers controlling a PLC, if both are not present, Stuxnet
becomes dormant inside the computer, it will still replicate the worm.
• If both are present, Stuxnet introduces the infected rootkit onto the PLC and
Step7 software, modifying the codes and giving unexpected commands to the
PLC while returning a loop of normal operations system values feedback to the
users.
• Continuity of Operations:
• Fault tolerance:
• To ensure our internal SLA's and provide as high availability as possible we use
as high degree of redundancy and resiliency as makes sense to that particular
system and data set.
• Backups:
• One of the first things that comes to mind when talking about fault
tolerance is backups of our data, while it is very important it is often like
log reviews an afterthought and treated with "Set it and forget it"
mentality.
• For backups we use Full, Incremental, Differential and Copy backups,
and how we use them is determined on what we need from our
backups.
• How much data we can stand to lose and how fast we want the backup
and restore process to be.
• In our backup solution we make backup policies of what to back up,
what to exclude, how long to keep the data of the Full, Incremental and
Differential backups.
20 | P a g e
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• All these values are assigned dependent on what we back up, and
normal organizations would have different backup policies and apply
those to the appropriate data.
• Continuity of Operations:
• Backups:
• This could be Full 3, 6, 12, 36, 84 months and infinity, the retention is
often mandated by our policies and the regulations in our field of
business.
• It is preferable to run backups outside of business hours, but if the
backup solution is a little older it can be required to run around the
clock, in that case we put the smaller and less important backups in the
daytime and the important larger ones after hours.
• We often want to exclude parts of the system we are backing up, this
could be the OS, the trashcan, certain program folders, ... we just
backup what is important and rarely everything.
• If a system is compromised and the issue is a rootkit, the rootkit would
persist on the backup if we did a full mirror restore, by eliminating some
of the system data we not only backup a lot less data, we also may
avoid the infection we are trying to remedy.
• For very important data we may do hourly incremental or use another
form of data loss prevention (covered later in this chapter).
• Continuity of Operations:
• Backups:
• Full backup:
• This backs everything up, the entire
database (most often), or the system.
• A full backup clears all archive bits.
• Dependent on the size of the data we
may do infrequent full backups, with
large datasets it can take many hours
for a full backup.
• Continuity of Operations:
• Backups:
• Incremental backups:
• Backs up everything that has changed since the last backup.
• Clears the archive bits.
21 | P a g e
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• Incrementals are often fast to
do, they only backup what has
changed since the last
incremental or full.
• The downside to them is if we
do a monthly full backup and
daily incrementals, we have to
get a full restore and could have
to use up to 30 tapes, this would
take a lot longer than with 1 Full
and 1 Differential.
• Continuity of Operations:
• Backups:
• Differential backup:
• Backs up everything since the last
Full backup.
• Does not clear the archive bit.
• Faster to restore since we just
need 2 tapes for a full restore, the
full and the differential.
• Backups take longer than the
incrementals, we are backing
everything since the last full.
• Never use both incremental and
differential on the same data, it is fine on the same backup
solution, different data has different needs.
• Continuity of Operations:
• Backups:
• Copy backup:
• This is a full backup with one important difference, it does not
clear the archive bit.
• Often used before we do system updates, patches and similar
upgrades.
• We do not want to mess up the backup cycle, but we want to be
able to revert to a previous good copy if something goes wrong.
• Archive bit:
• For Windows the NTFS has an archive bit on file, it is a flag that
indicates if the file was changed since the last Full or
Incremental backup.
22 | P a g e
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• Continuity of Operations:
• On our systems we build in fault tolerance to give them as high as possible uptime, we
do this with redundant hardware and systems, one of the practices we use is RAID.
• RAID (Redundant Array of Independent/Inexpensive Disks):
• Comes in 2 basic forms, disk mirroring and disk striping.
• Disk mirroring:
• Writing the same data across multiple hard disks, this is
slower, the RAID controller has to write all data twice.
• Uses at least 2 times as many disks for the same data
storage, needs at least 2 disks.
• Disk striping:
• Writing the data simultaneously across multiple disks
providing higher write speed.
• Uses at least 2 disks, and in itself does not provide
redundancy.
• We use parity with striping for the redundancy, often
by XOR, if we use parity for redundancy, we need at
least 3 disks.
• Continuity of Operations:
• RAID (Redundant Array of Independent/Inexpensive Disks):
• There are many different types of RAID, for the exam I would
know the above terms and how RAID 0, 1 and 5 works.
• RAID 0:
• Striping with no mirroring or parity, no fault tolerance, only
provides faster read write speed, requires at least 2 disks
• RAID 1:
• Mirror set, 2 disks with identical data, and write function is written
to both disks simultaneously.
• Continuity of Operations:
• RAID (Redundant Array of Independent/Inexpensive Disks):
• RAID 5:
• Block level striping with distributed parity, requires at least 3 disks.
• Combined speed with redundancy.
• RAID will help with data loss when we have a single disk failure if
we use a fault tolerant RAID type, if more than one disk fails before
the first is replaced and rebuilt, we would need to restore from our
tapes.
• Most servers have the same disks with the same manufacturer
date, they will hit their MTBF (Mean time between failures) around the same time.
23 | P a g e
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• Larger data centers often have SLA’s with the hard disk/server vendor, which also
includes MTTR (Mean time to repair).
• This could be within 4 or 8 hours the vendor has to be onsite with a replacement disk.
• Continuity of Operations:
• System redundancy:
• On top of the RAID and the backups we also try to provide system redundancy
as well as redundant parts on the systems.
• The most common system failures are from pieces
with moving parts, this could be disks, fans or PSU
(power supplies).
• Most servers have redundant power supplies, extra
fans, redundant NIC's.
• The NIC and PSU serve a dual purpose, both for
internal redundancy and external. If a UPS fails, the
server is still operational with just the 1 PSU getting power.
• Redundant disk controllers are also reasonably common, we design and buy the
system to match the redundancy we need for that application.
• Continuity of Operations:
• System redundancy:
• Often, we have spare hardware on hand in the event of a failure, this could
include hard disks, PSU's, fans, memory, NICs.
• Many systems are built for some hardware to be hot-swappable, most
commonly HDD's, PSU's and fans.
• If the application or system is important, we often also have multiple systems in
a cluster.
• Multiple servers often with a virtual IP, seen as a single server to users.
• Clustering is designed for fault tolerance, often combined with load balancing,
but not innately.
• Clustering can be active/active, this is load balancing, with 2 servers both
servers would actively process traffic.
• Active/passive: There is a designated primary active server and a secondary
passive server, they are connected, and the passive sends a keep-alive or
heartbeat every 1-3 seconds, are you alive, are you alive ...
• AS long as the active server responds the passive does nothing, if the active
does not respond for (normally) 3 keep-alives the passive assumes the primary
is dead and assumes the primary role.
• In well-designed environments the servers are geographically dispersed.
• Continuity of Operations:
• System redundancy:
24 | P a g e
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• We can also use other complementary backup strategies to give ourselves more
real time resilience, and faster recovery.
• Database shadowing:
• Exact real time copy of the database or files to another location.
• It can be another disk in the same server, but best practice dictates
another geographical location, often on a different media.
• Electronic vaulting (e-vaulting):
• Using a remote backup service, backups are sent off-site electronically
at a certain interval or when files change.
• Remote journaling:
• Sends transaction log files to a remote location, not the files
themselves. The transactions can be rebuilt from the logs if we lose the
original files.
25 | P a g e
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• This is the process of creating the short-term plans, policies, procedures and
tools to enable the recovery or continuation of vital IT systems in a disaster.
• It focuses on the IT systems supporting critical business functions, and how we
get those back up after a disaster.
• DRP is a subset of our BCP.
• We look at what we would do if we get hit with a DDOS attack (can be in the
DRP or in our Cyber Incident Response Plan), a server gets compromised, we
experience a power outage, ...
• Often the how and system specific, where the BCP is more what and non-system
specific.
26 | P a g e
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• They often have a minor impact, but if we have issues where they are deemed
very common or potentially damaging, we can build in controls to mitigate
them.
• We could put a double check in place for the mistype, an alarm on the unlocked
door that sounds after being open for 10 seconds, or very clear procedures and
controls for the transport of backup tapes.
27 | P a g e
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• Common, we often see the attacks happening 9-5 in that time zone, this
is a day job.
• Approximate 120 countries have been developing ways to use the
internet as a weapon to target financial markets, government computer
systems and utilities.
• Famous attacks: US elections (Russia), Sony websites (N. Korea), Stuxnet
(US/Israel), US Office of Personnel Management (China)…
28 | P a g e
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• How diminished of a workforce can we have to continue to function?
29 | P a g e
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• We act on our assessment using the plan.
• At this point all key stakeholders should be involved, we have a clearer
picture of the disaster and take the appropriate steps to recover. This
could be DR site, system rebuilds, traffic redirects, …
30 | P a g e
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• BCP/DRPs are often built using the waterfall project management methodology, we will
cover it in the next domain.
31 | P a g e
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• Remember companies that had a major loss of data, 43% never reopen
and 29% close within two years.
• Other frameworks may use other terms for MTD, but for the exam know
and use MTD.
• MAD (Maximum Allowable Downtime), MTO (Maximum Tolerable
Outage), MAO (Maximum Acceptable
• Outage), MTPoD (Maximum Tolerable Period of Disruption).
• RTO (Recovery Time Objective): The amount of time to restore the system
(hardware).
• The recovery time objective must ensure that the MTD for each system,
function or activity is not exceeded.
• WRT (Work Recovery Time): (software)
• How much time is required to configure a recovered system?
• Recovery Strategies:
• In our recovery process we have to consider the many factors that can impact us, we
need look at our options if our suppliers, contractors or the infrastructure are impacted
as well.
• We may be able to get our data center up and running in 12 hours, but if we have no
outside connectivity that may not matter.
• Supply chain:
• If an earthquake hits, do our local suppliers’ function, can we get supplies from
farther away, is the infrastructure intact?
• Infrastructure: How long can we be without water, sewage, power, etc.?
• We can use generators for power, but how long do we have fuel for?
• In prolonged power outages, we have pre-determined critical systems we leave
up and everything else is shut down to preserve power (fuel) and lessen HVAC
requirements.
32 | P a g e
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• Recovery Strategies:
• From our MTD we can determine our approach to how we handle disasters and the
safeguards we put in place to mitigate or recover from them.
• Redundant site:
• Complete identical site to our production, receives a real time copy of our data.
• Power, HVAC, Raised floors, generators, …
• If our main site is down the redundant site will automatically have all traffic fail
over to the redundant site.
• The redundant site should be geographically distant and have staff at it.
• By far the most expensive recovery option, end users will never notice the fail
over.
• Hot site:
• Similar to the redundant site, but only houses critical applications and systems,
often on lower spec’d systems.
• Still often a smaller but a full data center, with redundant UPS’s, HVAC’s, ISP’s,
generators, …
• We may have to manually fail traffic over, but a full switch can take an hour or
less.
• Near or real-time copies of data.
• Recovery Strategies:
• Warm site:
• Similar to the hot site, but not with real or near-real time data, often restored
with backups.
• A smaller but full data center, with redundant UPS’s, HVAC’s, ISP’s, generators,
…
• We manually fail traffic over, a full switch and restore can take 4-24 hrs.+.
• Cold site:
• A smaller but full data center, with redundant UPSs’, HVAC’s, ISP’s, generators,
…
• No hardware or backups are at the cold site, they require systems to be
acquired, configured and applications loaded and configured.
• This is by far the cheapest, but also longest recovery option, can be weeks+.
• Reciprocal Agreement site:
• Your organization has a contract with another organization that they will give
you space in their data center in a disaster event and vise-versa.
• This can be promised space or some racks with hardware completely segmented
off the network there.
33 | P a g e
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• Recovery Strategies:
• Mobile site:
• Basically, a data center on wheels, often a container or trailer that can be
moved wherever by a truck.
• Has HVAC, fire
suppression, physical
security, (generator),
etc., everything you
need in a full data
center.
• Some are independent with generator and satellite internet; others need power
and internet hookups.
• Subscription/cloud site:
• We pay someone else to have a minimal or full replica of our production
environment up and running within a certain number of hours (SLA).
• They have fully built systems with our applications and receive backups of our
data, if we are completely down, we
contact them and they spin the systems up and apply the latest backups.
• How fast and how much is determined by our plans and how much we want to
pay for this type of insurance.
34 | P a g e
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• Lists the steps we need to take to restore normal business operations
after recovering from a disruptive event.
• This could be switching operations from an alternate site back to a
(repaired) primary site.
• Continuity of Support Plan:
• Focuses narrowly on support of specific IT systems and applications.
• Also called the IT Contingency Plan, emphasizing IT over general
business support.
• CMP (The Crisis Management Plan):
• Gives us effective coordination among the management of the
organization in the event of an emergency or disruptive event.
• Details what steps management must take to ensure that life and safety
of personnel and property are immediately protected in case of a
disaster.
35 | P a g e
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• Should be done with 2-way confirmation, managers/directors should
confirm to their C-level executive that they did get a hold of the
identified staff.
• Automated call trees are often a better idea than manual ones,
notifying people of the disaster is one of those things that tends to get
forgotten.
• They are hosted at a remote location, often on SaaS, and key personnel
that are allowed to declare a disaster can activate them.
36 | P a g e
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• We should have a high degree of skilled employee redundancy, just like we have
on our critical hardware.
• It is natural for key employees to move on, find a new job, retire or win the
lottery.
• If we do not prepare for it, we can cripple our organization.
• Can be mitigated with training and job rotation.
37 | P a g e
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• Testing the plans:
• Testing:
• To ensure the plan is accurate, complete and effective, happens before we
implement the plan.
• Drills (exercises):
• Walkthroughs of the plan, main focus is to train staff, and improve employee
response (think fire drills).
• Auditing:
• A 3rd party ensures that the plan is being followed, understood and the
measures in the plan are effective.
38 | P a g e
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• When we update the plans, older copies are retrieved and destroyed, and
current versions are distributed.
• After a disruption:
• We only use our BCP/DRP's when our other countermeasures have failed.
• This makes the plans even more important. (Remember 2/3 of business with major data
loss close).
• When we make and maintain the plans there are some common pitfalls we want to
avoid:
• Lack of senior leadership support.
• Lack of involvement from the business units.
• Lack of critical staff prioritization.
• Too narrow scope.
• Inadequate telecommunications and supply chain management.
• Lack of testing
• Lack of training and awareness
• Not keeping the BCP/DRP plans up to date, or no proper versioning controls.
• BCP/DRP frameworks:
• When building or updating our BCP/DRP plans, we can get a lot of guidance from these
frameworks, and just like the other standards and frameworks we use we often tailor
and tweak them to fit the needs of our organization.
• NIST 800-34:
• Provides instructions, recommendations, and considerations for federal
information system contingency planning. Contingency planning refers to
interim measures to recover information system services after a disruption.
39 | P a g e
https://thorteaches.com/
CISSP Domain 7 Lecture notes
• ISO 22301:
• Societal security, Business continuity management systems, specifies a
management system to manage an organization's business continuity plans,
supported by ISO 27031.
• ISO/IEC-27031:
• Societal security, Business continuity management systems – Guidance, which
provides more pragmatic advice concerning business continuity management
• BCI (Business Continuity Institute):
• 6 step process of "Good Practice Guidelines (GPG)” the independent body of
knowledge for Business Continuity.
40 | P a g e
https://thorteaches.com/