ISC2 CISSP Domain-3 Study Notes
ISC2 CISSP Domain-3 Study Notes
You may find this domain to be more technical than others, and if you have experience woring in a security engineering
role you likely have an advantage. If not, allocate extra time to this domain to ensure you have a good understanding of
the topics
Algorithm: a mathmatical function that is used in the encryption and decryption process; can be simply or very
complex; also defined as a set of instructions by which encryption and decryption is done
ASLR: Address space layout randomization (ASLR) is a memory-protection process for operating systems (OSes)
that guards against buffer-overflow attacks by randomizing the location where system executables are loaded into
memory
Block Mode Encryption: using fixed-length sequences of input plaintext symbols as the unit of encryption
Ciphertext: altered form of a plaintext message so as to be unreadable for anyone expect the intended recipients
(it's a secret)
Collision: occurs when a hash function generates the same output for different inputs
Cryptanalysis: study of techniques for attempting to defeat cryptographic techniques and generally information
security services
Cryptographic Hash function: process or function that transforms an input plaintext into a unique value called a
hash (or hash value); note that they do not use cryptographic algorithms, as hashes are one-way functions where
it's infeasible to determine the plaintext; Message digests are an example of cryptographic hash
Cryptography: study of/application of methods to secure the meaning and content of messages, files etc by
disguise, obscuration, or other transformations
Cryptosystem: complete set of hardware, software, communications elements and procedures that allow parties
to communicate, store or use info protected by cryptographic means; includes algroithm, key, and key
management functions
Cryptovariables(s): parameters associated with a particular cryptogrphic algorithm; e.g. block size, key length and
number of iterations
Decoding: the reverse process from encoding, converting the encoded message back to plaintext format
Encoding: action of changing a message or set of info into another format through the use of code; unlike
encryption, encoded info can still be read by anyone with knowledge of the encoding process
Encryption: process and act of converting the message from plaintext to ciphertext (AKA enciphering)
Frequency analysis: form of cryptanalysis that uses frequency of occurrence of letters, words or symbols in the
plaintext as a way of reducing the search space
Hybrid encryption system: a system that uses both symmetric and asymmetric encryption
Key: the input that controls the operation of the cryptographic algorthm, determining the behavior of the
algorithm and permits the reliable encyrption and decryption of the message
Key pair: matching set of one public and one private key
Key escrow: process by which keys (asymmetric or symmetric) are placed in a trusted storage agent's custody, for
later retrieval
Key recovery: process of reconstructing an encryption key from the cyphertext alone; if there is a workable key
recovery system, it means the algorithm is not secure
Key space: represents the total number of possible values of keys in a cryptographic algorithm or password
Meet-in-the-middle: attack that uses a known plaintext message and both encryption of the plaintext and
decryption of the ciphertext simultaneously in a brute-force manner to identify the encryption key; 2DES is
vulnerable to this attack
Multistate systems: certified to handle data from different security classifications simultaneously
One-time pad: series of randomly generated symmetric encryption keys, each one to be used only once by the
sender and recipient
Out-of-band: transmitting or sharing control information (e.g. encryption keys and crypto variables) by means of
a separate and distinct communications path, channel, or system
Plaintext: message or data in its readable form, not turned into a secret
Cleartext: any information that is unencrypted, although it might be in an encoded form that is not easily human-
readable (such as base64 encoding)
Session key: a symmetric encryption key generated for one-time use; usually requires a key encapsulation
approach to eliminate key management issues
Stream mode encryption: system using a process that treats the input plaintext as a continuous flow of symbols,
encrypting one symbol at a time; usually uses a streaming key, using part of the key as a one-time key for each
symbol's encryption
Symmetric encryption: process that uses the same key (or a simple transformation of it) for both
encryption/decryption
VESDA: very early smoke detection process (air sensing device brand name)
Work factor: amount of effort necessary to break a cryptographic system, measured in elapsed time
Zero-knowledge proof: one person demonstrates to another that they can achieve a reslut that requires sensitive
info without actually disclosing the sensitive info
3.1 Research, implement, and manage engineering processes using secure design principles (OSG-9 Chpts 1,8,9,16)
can be performed as a proactive measure during design and development or as an reactive measure once
a product has been deployed
Threat modeling identifies the potential harm, the probability of occurrence, the priority of
concern, and the means to eradicate or reduce the threat
3.1.2 Least Privilege
o Least privilege: states that subjects are granted only the privileges necessary to perform assigned work
should not result in exposure of systems or data; layers should be used in a series (one after the other),
NOT in parallel
When you see the terms like levels, multilevel, layers, classifications, zones, realms, compartments,
protection rings etc think about Defense in Depth
3.1.4 Secure defaults
o Secure defaults: when you think about defaults, consider how something operates brand new, just turned
than during normal operation; failing securely could involve reverting to defaults
3.1.6 Separation of duties (SoD)
o Separation of duties (SoD): separation of duties (SoD) and responsibilities ensures that no single person
has total control over a critical function or system; SoD is a process to minimize opportunities for misuse
of data or environment damage
e.g. one person sells tickets, another collects tickets and restricts access to ticket holders in a
movie theater
3.1.7 Keep it simple
o Keep it simple: AKA keep it simple, stupid (KISS), this concept is the encouragement to avoid
where nothing is automatically trusted; instead each request for activity or access is assumed to be from
an unknown and untrusted location until otherwise verified
replaces trust but verify as a security design principle by asserting that all activities by all
users/entities must be subject to control, authentication, authorization, and management at the
most granular level possible
Goal is to have every access request authenticated, authorized, and encrypted prior to access
being granted to an asset or resource
Full functionality, positive-sum: achieve both security and privacy, not just one or the
other
Full lifecycle protection: privacy should be achieved before, during and after a transaction;
part of this is securely disposing of data when it is no longer needed
Visibility, transparency, open: publish the requirements and goals; audit them and publish
the findings
Respect, user-centric: involve end users, providing the right amount of information for
them to make informed decisions about their data
trusting subjects and devices within a company's security perimeter automatically, leaving an org
vulnerable to insider attacks and providing intruders the ability to easily perform lateral movement
3.1.11 Shared responsibility
o Shared responsibility: the security design principle that indicates that organizations do not operate in
isolation
Everyone in an organization has some level of security responsibility
The job of the CISO and security team is to establish & maintain security
The job of regular employees to perform their tasks within the confines of security
When working with third parties, especially with cloud providers, each entity needs to understand
their portion of the shared responsibility of performing work operations and maintaining security;
this is often referenced as the cloud shared responsibility model
3.2 Understand the fundamental concepts of security models (e.g. Biba, Star Model, Bell-LaPadula) (OSG-9 Chpt 8)
Security models:
o Intended to provide an explicit set of rules that a computer can follow to implement the fundamental
o Enable people to access only the data classified for their clearance level
Bell-LaPadula: Model was established in 1973; the goal is to ensure that information is exposed only to those
with the right level of classification
o Focuse is on confidentiality
o Discretionary Security Property: uses an access matrix (need to know in order to access)
o Simple Integrity Property:"No read down" (for example, users with a Top Secret clearance can’t read
o Star (*) Integrity Property: "No write up" (for example, a user with a Secret clearance can’t write data to
o Biba uses a lattice to control access and is a form of mandatory access control (MAC) model
Take-Grant:
o The take-grant model employs a directed graph to dictate how rights can be passed from one subject to
take
grant
create
remove
Clark-Wilson:
o Designed to protect integrity using the access control triplet
o A program interface is used to limit what is done by a subject; if the focus of an intermediary program
between subject and object is to protect integrity, then it is an implementation of the Clark-Wilson model
o Uses security labels to grant access to objects via transformation procedures and a restricted interface
model
o created to permit access controls to change dynamically based on a user's previous activity
Goguen-Meseguer Model:
o An integrity model
Sutherland Model:
o Focuses on preventing interference in support of integrity
Graham-Denning Model
o Focused on the secure creation and deletion of both subjects and objects
Harrison-Ruzzo-Ullman Model:
o Focuses on the assignment of object access rights to subjects as well as the resilience of those assigned
rights
o HRU is an extension of Graham-Denning model
Star Model:
o Not an official model, but name refers to using asterisks (stars) to dictate whether a person at a specific
Be familiar with the Common Criteria (CC) for Information Technology Security Evaluation
The CC provides a standard to evaluate systems, defining various levels of testing and confirmation of systems'
security capabilities
The number of the level indicates what kind of testing and confirmation has been performed
malware app)
o The evaluation process will look at the protection profile (PP), which is a document that outlines the
security needs (customer "I wants"); a vendor might use a specific protection profile for a particular
solution
o The evaluation process will look at the Security Target (ST), specifying the claims of security from the
vendor that are built into a TOE (the ST is usually published to customers and partners and available to
internal staff)
o An organization's PP is compared to various STs from the selected vendor's TOEs, and the closest or best
o The evaluation will attempt to gauge the confidence level of a security feature
o Security assurance requirements (SARs): a description of how the TOE is to be evaluated, based on the
o An evaluation assurance level (EAL): a numerical rating used to assess the rigor of an evaluation; the
Authorization to Operate (ATO): official auth to use specific IT systems to perform tasks/accept identified risks
3.4 Understand security capabilities of Information Systems (IS) (e.g. memory protection, Trusted Platform Model (TPM),
encryption/decryption) (OSG-9 Chpt 8)
Security capabilities of information systems include memory protection, virtualization, Trusted Platform Module
(TPM), encryption/decryption, interfaces, and fault tolerance
A computing device is likely running multiple apps and services simultaneously, each occupying a segment of
memory; the goal of memory protection is to prevent one app or service from impacting another
o Process isolation: OS provides separate memory spaces for each processes instructions and data, and
in this type of segmentation, the operating system maps processes to dedicated memory locations
Virtualization: technology used to host one or more operating systems within the memory of a single host, or to
run applications that are not compatible with the host OS; the goal is to protect the hypervisor and ensure that
compromising one VM doesn't affect others on that host
Trusted Platform Module (TPM): a cryptographic chip that is sometimes included with a client computer or
server; a TPM enhances the capabilities of a computer by offering hardware-based cryptographic operations
o TPM is a tamper-resistant integrated circuit built into some motherboards that can perform cryptographic
operations (including key gen) and protect small amoutns of sensitive info, like passwords and
cryptographic keys
o Many security products and encryption solutions require a TPM
o TPM is both a specification for a cryptoprocessor chip on a motherboard and the general name for
o A TPM is an example of a hardware security module (HSM): a cryptoprocessor used to manage and
store digital encryption keys, accelerate crypto operations, support faster digital signatures, and improve
authentication
User interface: a constrained UI can be used in an application to restrict what users can do or see based on their
privileges
o e.g. dimming/graying out capabilities for users without the correct privilege
exposing information to the network; when an interface doesn’t provide such a capability, use IPsec or
another encrypted transport mechanism
o Signing: used for non-repudiation; in a high-security environment, both encrypt and sign all
communications if possible
Fault tolerance: capability used to enhance availability; in the event of an attack (e.g. DoS), or system failure, fault
tolerance helps keep a system up and running
3.5 Assess and mitigate the vulnerabilities of security architectures, designs and solution elements (OSG-9 Chpts 9,16,20)
This objective relates to identifying vulnerabilities and corresponding mitigating contols and solutions; the key is
understanding the types of vulnerabilities commonly present in different environments, and their mitigation options
o Client-based systems: client computers are the most attacked entry point
o Even patched client computers are at risk due to phishing and social engineering vectors
o Mitigation: run a full suite of security software, including anti-virus/malware, anti-spyware, and host-based
firewall
o Data Flow Control: movement of data between processes, between devices, across a network, or over a
communications channel
o Management of data flow seeks to minimize latency/delays, keep traffic confidential (i.e. using
encryption), not overload traffic (i.e. load balancer), and can be provided by network devices/applications
and services
o While attackers may initially target client computers, servers are often the goal
o Mitigation: regular patching, deploying hardened server OS images for builds, and use host-based
firewalls
o Databases often store a company's most sensitive data (e.g. proprietary, CC info, PHI, and PII)
o Inference attack: involves combining several pieces of nonsensitive info to gain access to that which
should be classified at a higher level; inference makes use of the human mind’s deductive capacity rather
than the raw mathematical ability of database platforms
expensive
o Each component has vulnerabilities:
Keys: dictate how encryption is applied through an algorithm; a key should remain secret,
otherwise the security of the encrypted data is at risk
key space: represents all possible permutations of a key
key space best practices:
key length is an important consideration; use as long of a key as possible (your
goal is to outpace projected increase in cryptanalytic capability during the time
the data must be kept safe); longer keys discourage brute-force attacks
a 256-bit key is typically minimum recommendation for symmetric
encryption
2048-bit key typically the minimum for asymmetric
always store secret keys securely, and if you must transmit them over a network,
do so in a manner that protects them from unauthorized disclosure
select the key using an approach that has as much randomness as possible,
taking advantage of the entire key space
always base key length on requirements and sensitivity of the data being handled
Algorithms: choose algorithms (or ciphers) with a large key space and a large random key
value (key value is used by an algorithm for the encryption process)
algorithms themselves are not secret; they have extensive public details about history and
how they function
3.5.5 Industrial Control Systems (ICS)
o Industrial control systems (ICS): a form of computer-management device that controls industrial
in an electrical power plant or factory; SCADA systems are well suited for distributed environments, such
as those spanning continents
some SCADA systems still rely on legacy or proprietary communications, putting them at risk,
especially as attackers gain knowledge of such systems and their vulnerabilities
SCADA risk mitigations:
isolate networks
limit access physically and logically
3.5.6 Cloud-based systems (e.g., Software as a Service (SaaS), Infrastructure as a Service (IaaS), Platform as a
Service (PaaS))
o Cloud-based systems: on-demand access to computing resources available from almost anywhere
o Cloud's primary challenge: resources are outside the org’s direct control, making it more difficult to
manage risk
o Orgs should formally define requirements to store and process data stored in the cloud
o Focus your efforts on areas that you can control, such as the network entry and exit points (i.e. firewalls
o All sensitive data should be encrypted, both for network communication and data-at-rest
o Use centralized identity access and management system, with multifactor authentication
o Customers shouldn’t use encryption controlled by the vendor, eliminating risks to vendor-based insider
o Capture diagnostic and security data from cloud-based systems and store in your SIEM system
the vendor maintains cloud-based infra, ensuring that customers have access to leased
systems
o Distributed computing environment (DCE): a collection of individual systems that work together to
o Most DCEs have duplicate or concurrent components, are asynchronous, and allow for fail-soft or
in distributed systems, integrity is sometimes a concern because data and software are spread
across various systems, often in different locations
Client/server model network is AKA a distributed system or distributed architecture
security must be addressed everywhere instead of at a single centralized host
processing and storage are distributed on multiple clients and servers, and all must be
secured
o Internet of things (IoT): a class of smart devices that are internet-connected in order to provide
Securing IoT:
deploy a distinct network for IoT equipment, kept separate and isolated (known as three
dumb routers)
keep systems patched
monitor activity
never assume IoT defaults are good enough, evaluate settings and config options, and
make changes to optimize security while supporting business function
disable remote management and enable secure communication only (such as over
HTTPS)
review IoT vendor to understand their history with reported vulnerabilities, response time
to vulnerabilities and their overall approach to security
3.5.9 Microservices
A microservice is simply one element, feature, capability, business logic, or function of a web app
that can be called upon or used by other web apps
Microservices are usually small and focused on a single operation, engineered with few
dependencies, and based on fast, short-term development cycles (similar to Agile)
Securing microservices:
use HTTPS only
encrypt everything possible and use routine scanning
closely aligned with microservices is the concept of shifting left, or addressing security
earlier in the SDLC; also integrating it into the CI/CD pipeline
3.5.10 Containerization
elements in a virtual machine; instead each app is placed into a container that includes only the actual
resources needed to support the enclosed app, and the common or shared OS elements are then part of
the hypervisor
Containerization is able to provide 10 to 100 x more application density per physical server
compared to traditional virtualization
Vendors often have security benchmarks and hardening guidelines to follow to enhance container
security
Securing containers:
container challenges include the lack of isolation compared to a traditional infrastructure
of physical servers and VMs
scan container images to reveal software with vulns
secure your registries: use access controls to limit who can publish images, or even access
the registry
harden container deployment including the OS of the underlying host, using firewalls,
and VPC rules, and use limited access accounts
reduce the attack surface by minimizing the number of components in each container,
and update and scan them frequently
3.5.11 Serverless
o Serverless architecture (AKA function as a service (FaaS)): a cloud computing concept where code is
managed by the customer and the platform (i.e. supporting hardware and software) or servers are
managed by the CSP
Applications developed on serverless architecture are similar to microservices, and each function
is created to operate independently and automonomously
A serverless model, as in other CSP models, is a shared security model,and your org and the CSP
share security responsibility
o Embedded systems: any form of computing component added to an existing mechanical or electrical
system for the purpose of providing automation, remote control, and/or monitoring; usually including a
limited set of specific functions
Embedded systems can be a security risk because they are generally static, with admins having no
way to update or address security vulns (or vendors are slow to patch)
Embedded systems focus on minimizing cost and extraneous features
Embedded systems are often in control of/associated with physical systems, and can have real-
world impact
manipulation at extremely high speeds (e.g. super computers or MPP (Massively Parallel Processing));
often used by large orgs, universities, or gov agencies
An HPC solution is composed of three main elements:
compute resources
network capabilities
storage capacity
HPC systems are often rented, leased or shared, which can limit the effectiveness of firewalls and
invalidate air gap solutions
o Edge computing: philosophy of network design where data and compute resources are located as close
as possible, at or near the network edge, to optimize bandwidth use while minimizing latency
Securing edge computing:
this technology creates additional network edges that result in increased levels of
complexity
visibility, control, and correlation requires a Zero Trust access-based approach to address
security on the LAN edge, WAN edge and cloud edge, as well as network management
edge-based computing devices,especially IoT devices, are often produced with limited
security forethought
devices on your network, no matter where they reside, need to be configured, managed,
and patched using a consistent policy and enforcement strategy
use intelligence from side-channel signals that can pick up hardware trojans and
malicious firmware
in many scenarios, you are an edge customer, and likely will need to rely on a vendor for
some of the security and vulnerability remediation
o Virtualized systems: used to host one or more OSs within the memory of a single host computer, or to
in virtualized environments, you need to protect both the VMs and the physical
infrastructure/hypervisor
hypervisor admin accounts/credentials and service accounts are targets because they
often provide access to VMs and their data; these accounts should be protected
virtual hosts should be hardened; to protect the host, avoid using it for anything other
than hosting virtualized elements
virtualized systems should be security tested via vuln assessment and penetration testing
VM escape: occurs when software within a guest OS is able to breach the isolation
protection provided by the hypervisor
VM escape minimizaton:
keep highly sensitive systems and data on separate physical machines
keep all hypervisor software current with vendor-released patches
monitor attack, exposure and abuse indexes for new threats to virtual machines
(which might be better protected); often, virtualization administrators have access
to all virtuals
every 2 years), and have appropriate governance controls in place to ensure that algorithms, protocols,
and key lengths selected are sufficient to preserve the integrity of the cryptosystems for as long as
necessary -- to keep secret information safe
o Specify the cryptographic algorithms (such as AES, 3DES, and RSA) acceptable for use in an organization
o Identify the acceptable key lengths for use with each algorithm based on the sensitivity of the info
transmitted
o Enumerate the secure transaction protocols (e.g. TLS) that may be used
o As computing power goes up, the strength of cryptographic algorithms goes down; keep in mind the
o TLS uses an ephemeral symmetric session key between server and client, exchanged using asymmetric
o Beyond brute force, consider things like the discovery of a bug or an issue with an algorithm or system
o NIST defines the following terms that are commonly used to describe algorithms and key lengths:
deprecated (algorithm and key length is OK to use, but brings some risk)
restricted (use of the algorithm and/or key length is deprecated and should be avoided)
legacy (the algorithm and/or key length is outdated and should be avoided when possible)
disallowed (algorithm and/or key length is no longer allowed for the indicated use)
symmetric encryption uses a shared secret key available to all users of the cryptosystem
symmetric encryption is faster than asymmetric encryption because smaller keys can be used for
the same level of protection
downside is that users or systems must find a way to securely share the key and hope the key is
used only for the specified communication
primarily employed to perform bulk encryption and provides only for the security service of
confidentiality
decryption key is computationally not possible to determine given the encryption key itself
Asymmetric (AKA public key, since one key of a pair is available to anybody) algorithms provide
convenient key exchange mechanisms and are scalable to very large numbers of users
(addressing the two most significant challenges for users of symmetric cryptosystems)
Asymmetric cryptosystems avoid the challenge of sharing the same secret key between users, by
using pairs of public and private keys to allow secure communication without the overhead of
complex key distribution
Public key: one part of the matching key pair, which can be shared or published
Besides the public key, there is a private key that should remain private and protected
Private key secrecy and integrity of an asymmetric encryption process are entirely dependent
upon protecting the value of the private key
While asymmetric encryption is slower, it is best suited for sharing between two or more parties
ElGamal
asymmetric and symmetric cryptography along with hashing and digital certificates (giving us hybrid
cryptography)
A PKI issues certificates to computing devices and users, enabling them to apply cryptography
(e.g., to send encrypted email messages, encrypt websites or use IPsec to encrypt data
communications)
Many vendors provide PKI services; you can run a PKI privately and solely for your own org, you
can acquire certificates from a trusted third-party provider, or you can do both (which is common)
A PKI is made up of
certification authorities (CAs): servers that provide one or more PKI functions, such as
providing policies or issuing certificates
certificates: issued to other certification authorities or to devices and users
policies and procedures: such as how the PKI is secured, and
templates: a predefined configuration for specific uses, such as a web server template
There are other components and concepts you should know for the exam:
A PKI can have multiple tiers:
single tier means you have one or more servers that perform all the functions of a
PKI
two tiers means there is an offline root CA (a server that issues certificates to the
issuing CAs but remains offline most of the time) in one tier, and issuing CAs (the
servers that issue certificates to computing devices and users) in the other tier
three tier means you can have CAs that are responsible only for issuing policies
(and they represent the second tier in a three-tier hierarchy)
in such a scenario, the policy CAs should also remain offline and be
brought online only as needed
Generally, the more tiers, the more security (but proper configuration is critical)
the more tiers you have, the more complex and costly the PKI is to build and
maintain
A PKI should have a certificate policy and a certificate practice statement (CSP)
certificate policy: documents how your org handles items like requestor identities,
the uses of certificates and storage of private keys
CSP: documents the security configuration of your PKI and is usually available to
the public
storage of private keys and info about issued certificates (can be stored in a
database or a directory)
Key management can be difficult with symmetric encryption but is much simpler with asymmetric
encryption
Key distribution and maintenance should be automated (and hidden from the user)
Key escrow: process or entity that can recover lost or corrupted cryptographic keys
multiparty key recovery: when two or more entities are required to reconstruct
or recover a key
m of n control: you designate a group of (n) people as recovery agents, but only
need subset (m) of them for key recovery
split custody: enables two or more people to share access to a key (e.g. for
example, two people each hold half the password to the key)
Key rotation: rotate keys (retire old keys, implement new) to reduce the risks of a
compromised key having access
Key states:
suspension: temporary hold
revocation: permanently revoked
expiration
destruction
ensures that the message was not modified while in transit between two parties
Digital signatures rely on a combination of two major concepts — public key cryptography, and
hashing functions
Digitally signed messages assure the recipient that the message truly came from the claimed
sender, enforcing nonrepudiation
Digitally signed messages assure the recipient that the message was not altered while in transit;
protecting against both malicious modification (third party altering message meaning), and
unintentional modification (faults in the communication process)
Digital signature process does not provide confidentiality in and of itself (only ensures integrity,
authentication, and nonrepudiation)
o FIPS 186-4 specifies three techniques for the generation and verification of digital signatures that can be
used for the protection of data: the Rivest-Shamir-Adleman Algorithm (RSA), the Digital Signature
Algorithm (DSA), and the Elliptic Curve Digital Signature Algorithm (ECDSA)
deny
o Non-repudiation of origin: sender cannot deny having sent a particular message
o Non-repudiation of delivery: receiver cannot say they have received a different message (other than what
o If a digital signature was verified with the public key of the sender, then we know that it was created using
o Private key should only be known to the sender, so the verification proves to the recipient that the
o The recipient (or anyone else) can demonstrate that process to a third party providing nonrepudiation
unique output value derived from the content of the message called a message digest
hash function implements encryption with a specified algorithm, but without a key
used to ensure message sent by the originator is the same one received by recipient
the hash function is one-way, meaning it is extremely difficult to determine the input given the
hash function output
the hash function should be collision-resistant, meaning it is extremely hard to find two messages
that produce the same hash value output
hashes are used for storing passwords, with email, and for file download integrity verification
o Hashing and integrity: if the hash generated by sender, and separately by the receiver match, then we
have integrity
they involve using massive amounts of processing power to methodically guess the key used to
secure cryptographic communications
3.7.2 Ciphertext only
o Ciphertext only: an attack where you only have the encrypted ciphertext message at your disposal (not
the plaintext)
if you have enough ciphertext samples, the idea is that you can decrypt the target ciphertext
based on the samples
one technique proves helpful against simple ciphers is frequency analysis (counting the number
of times each letter appears in the ciphertext)
plaintext message used to generate the ciphertext (the copy); this knowledge greatly assists the attacker
in breaking weaker codes
3.7.4 Frequency analysis
o Frequency analysis: an attack where the characteristics of a language are used to defeat substitution
ciphers
for example in English, the letter "E" is the most common, so the most common letter in an
encrypted cyphertext could be a substitution for "E"
other examples might include letters that appear twice in sequence, as well as the most common
words used in a language
their plaintexts; i.e. the attacker has the ability to decrypt chosen portions of the ciphertext message, and
use the decrypted portion to discover the key
o Differential cryptanalysis: a type of chosen plaintext attack, and a general form of cryptanalysis
applicable primarily to block ciphers, but also to stream ciphers and cryptographic hash functions; in the
broadest sense, it is the study of how differences in information input can affect the resultant difference at
the output; advanced methods such as differential cryptanalysis are types of chosen plaintext attacks
as an example, an attacker may try to get the receiver to decrypt modified ciphertext, looking for
that modification to cause a predictable change to the plaintext
3.7.6 Implementation attacks
o Implementation attack: attempts to exploit weaknesses in the implementation of a cryptography system
focuses on exploiting the software code, not just errors or flaws but the methodology employed
to program the encryption system
in this type of attack, attackers look for weaknesses in the implementation, such as a software bug
or outdated firmware
3.7.7 Side-channel
o Side-channel: these attacks seek to use the way computer systems generate characteristic footprints of
side-channel characteristics information are often combined together to try to break down the
cryptography
3.7.8 Side-channel
o Fault-Injection: the attacker attempts to compromise the integrity of a cryptographic device by causing
how long cryptographic operations take to complete, gaining information about the cryptographic
process that may be used to undermine its security
3.7.10 Man-in-the-middle (MITM)
o Man-in-the-middle (MITM) (AKA on-path): in this attack a malicious individual sits between two
communicating parties and intercepts all communications (including the setup of the cryptographic
session)
attacker responds to the originator's initialization requests and sets up a secure session with the
originator
attacker then establishes a second secure session with the intended recipient using a different key
and posing as the originator
attacker can then "sit in the middle" of the communication and read all traffic as it passes
between the two parties
password characters) and then simply passes it through for authentication and potentially lateral access to
other networked systems
the threat actor doesn’t need to decrypt the hash to obtain a plain text password
PtH attacks exploit the authentication protocol, as the passwords hash remains static for every
session until the password is rotated
attackers commonly obtain hashes by scraping a system’s active memory and other techniques
the key)
o Pass the Ticket: in this attack, attackers attempt to harvest tickets held in the lsass.exe process
o Silver Ticket: a silver ticket uses the captured NTLM hash of a service account to create a ticket-granting
service (TGS) ticket (the silver ticket grants the attacker all the privileges granted to the service account)
o Golden Ticket: if an attacker obtains the hash of the Kerberos service account (KRBTGT), they can create
tickets at will within Active Directory (this provides so much power it is referred to as having a golden
ticket)
o Kerberos Brute-Force: attackers use the Python script kerbrute.py on Linux, and Rubeus on Windows
o ASREPRoast: ASREPRoast identifies users that don’t have Kerberos preauthentication enabled
using many of the same techniques as other types of malware, ransomware gens an encryption
key, and encrypts critical files
this encryption renders the data inaccessible to the authorized user or anyone else other than the
malware author
2020 study, 56% of orgs suffered a ransomeware attack, 27% of orgs who reported an attack
chose to pay, on average ~$1.1m
3.8 Apply security principles to site and facility design (OSG-9 Chpt 10)
Secure facility plan: outlines the security needs of your organization and emphasizes methods or mechanisms to
employ to provide security, developed through risk assessment and critical path analysis
o critical path analysis (CPA): a systematic effort to identify relationships between mission-critical
applications, processes, and operations and all the necessary supporting components
o During CPA, evaluate potential technology convergence: the tendency for various technologies,
solutions, utilities, and systems to evolve and merge over time, which can result in a single point of failure
o Site selection should take into account cost, location, and size (but security should always take
precedence), that the building can withstand local extreme weather events, vulnerable entry points, and
exterior objects that could conceal break-ins
Facility Design:
o The top priority of security should always be the protection of the life and safety of personnel
o In the US, follow the guidelines and requirements from Occupational Safety and Health Administration
"secure architecture" - an archiectural approach to building and space design that emphasizes passive
features to reduce the likelihood of criminal activity
core principle of CPTED is that the design of the physical environment can be
managed/manipulated, and crafted with intention in order to create behavioral effects or changes
in people present in those areas that result in reduction of crime as well as a reduction of the fear
of crime
CPTED stresses three main principles:
natural access control: the subtle guidance of those entering and leaving a building
make the entrance point obvious
create internal security zones
areas of the same access level should be open, but restricted/closed areas should
seem more difficult to access
natural surveillance: any means to make criminals feel uneasy through increased
opportunities to be observed
walkways/stairways are open, open areas around entrances
areas should be well lit
natural territorial reinforcement: attempt to make the area feel like an inclusive, caring
community
o Overall goal is to deter unauthorized people from gaining access to a location (or a secure portion),
prevent unauthorized personnel from hiding inside or around the location, and prevent unauthorized
from committing crime
o There are several smaller activities tied to site and facility design, such as upkeep and maintenance: if
property is run down or appears to be in disrepair, it gives attackers the impression that they can act with
impunity on the property
3.9 Design site and facility security controls (OSG-9 Chpt 10)
Note that alghough the topics in this section cover mostly interior spaces, physical security is applicable to both
interior and exterior of a facility
3.9.1 Wiring closets/intermediate distribution facilities
o Wiring closets/intermediate distribution facilities (IDF): A wiring closet or IDF is typically the smallest
access to the wiring closest/IDF should be restricted to authorized personnel responsible for
managing the IT hardware
use door access control (i.e. electronic badge system or electronic combination lock)
from a layout perspective, wiring closets should be accessible only in private areas of the building
interiors; people must pass through a visitor center and a controlled doorway prior to be able to
enter a wiring closet
closets are enclosed, restricted, and protected rooms where mission critical servers and networks are
housed
a server room is a bigger version of a wiring closet, much smaller than a data center
a server room typically houses network equipment, backup infrastructure and servers (more
archaic versions include telephony equipment)
server rooms should be designed to support optimal operation of IT infrastructure and to block
unauthorirzed human access or intervention
server rooms should be located at the core of the building (avoid ground floor, top floor, or in the
basement)
server room should block unauthorized access, and entries and exits should be logged
datacenters are usually more protected than server rooms, and can include guards and mantraps
server room
depending on requirements a cabinet or safe could suffice
new blank media, and media that is reused (e.g. thumb drives, flash memory cards, portable hard
drives) should be protected against theft and data remnant recovery
other recommendations:
employ a media librarian or custodian
use check-in/check-out process for media tracking
note: a safe is a movable secured container that's not integrated into a building's construction; a
vault is a permanent safe integrated into construction
other records of digital events; the evidence storage exists to preserve chain of custody
a key part of incident response is to gather evidence to perform root cause analysis
an evidence storage room should be protected like a server room or media storage facility
an evidence storage room can contain physical evidence (such as a smartphone) or digital
evidence (such as a database)
protection should be similar to a server room, but video surveillance is typically limited to entry
and exit points
double conversion: functions by taking power from the wall outlet, storing it in a battery, pulling
power out of the battery and feeding that power to the device/devices
line-interactive: has a surge protector, battery charger/inverter and voltage regulator positioned
between the grid power source and the equipment (battery is not in line under normal
conditions)
o Datacenter:
within a given structure (e.g. temperature, humidity, dust, smoke), using things like chemical, biological,
radiological, and microbiological detectors
o Halon starves a fire of oxygen by disrupting the chemical reaction of combustion, but degrades into toxic
o If water-based sprinklers are used for fire suppression, damage to electronic equipment is likely; automate
o Other environmental issues include earthquakes, power outages, tornados and wind
o Secondary facilities should be located far enough away from the primary to ensure they won't be
system!
o In addition to protecting people, fire detection and suppression is designed to keep asset damage caused
o Fire triangle: three triangle corners represent fuel, heat, and oxygen; the center of the triangle represents
halon substitutes and other nonflammable gases interfere with the chemistry of combustion
and/or suppress the oxygen supply
o Fire stages:
Stage 1: incipient stage: at this stage, there is only air ionization and no smoke
Stage 2: smoke stage: smoke is visible from the point of ignition
Stage 3: flame stage: this is when a flame can be seen with the naked eye
Stage 4: heat stage: at stage 4, there is an intense heat buildup and everything in the area burns
Class C: electrical
Class D: metal
wet pipe system: (AKA closed head system): is always filled with water; water discharges
immediately when suppression is triggered
dry pipe system: contains compressed inert gas
preaction system: a variation of the dry pipe system that uses a two-stage detection and release
mechanism
deluge system: uses larger pipes and delivers larger volume of water
o Note: Most sprinkler heads feature a glass bulb filled with a glycerin-based liquid; this liquid expands
when it comes in contact with air heated to between 135 and 165 degrees; when the liquid expands, it
shatters its glass confines and the sprinkler head activates
o As part of the design, mandate redundant power systems to accommodate testing, upgrades and other
maintenance
o Additionally, test failover to a redundant power system and ensure it is fully functional
o The International Electrical Testing Association (NETA) has developed standards around testing power
systems
this is a system that collects power into a battery but can switch over to pulling power from the
battery when the power grid fails
generally, this type of system was implemented to supply power to an entire building rather than
just one or a few devices