XFug7KtBSUK36ZEStp0L_2024 FRSecure CISSP Mentor Program - Class Nine
XFug7KtBSUK36ZEStp0L_2024 FRSecure CISSP Mentor Program - Class Nine
INTRODUCTION
2024
Class #9 – Domain 3 (part 1)
Ryan Cloutier
AI Visionary and CISO
Synaptech Services
Chief Squirrel of Scarebear Industries
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 1
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 1
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 2
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 3
#MissionBeforeMoney
QUESTIONS.
The most common questions:
Check your email for links
• Discord channels https://discord.gg/FWfjPnAZ
• Use it for more in-depth questions / discussions
• Before you ask a question, check
• If it’s been asked
• The isc2.com website
• Live session links & recording
• Instructor slide deck https://learn.frsecure.com/
• Other Resources
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 4
#MissionBeforeMoney
ISC2 RESOURCES
• CISSP Certification Exam Outline
https://www.isc2.org/Certifications/cissp/Cer
tification-Exam-Outline
• The Ultimate Guide to the CISSP 🡨
https://cloud.connect.isc2.org/cissp-ultimate
-guide
• CISSP Experience Requirements
https://www.isc2.org/Certifications/CISSP/ex
perience-requirements
• ISC2 Certification References
https://www.isc2.org/certifications/Referenc
es
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 5
CISSP® MENTOR PROGRAM – SESSION NINE
GETTING GOING…
Great job last week! We’re through the introduction and Domains 1 & 2
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 6
CISSP® MENTOR PROGRAM – SESSION NINE
GETTING GOING…
Managing Risk!
Studythrough
We’re Tips: Chapters 1, 2, 3, and part way into Chapter
4!• Study in small amounts frequently (20-30 min)
••Check-in.
Pause the video if needed (we’ll be here)
••How many
Flash have
card andread Chapter
practice test1, apps
2 & 3?help
Take naps after heavy topics (aka Security Models)
••Questions?
• Write things down, say them out loud
• Use the Discord Channels
• Exercise or get fresh air in between study sessions
Let’s get going!
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 7
Do not share electronic versions of the book!
https://www.amazon.com/Official-ISC-CISSP-CBK-Reference/dp/1119789990 8
#MissionBeforeMoney
INTRODUCTION
Before we get too deep into this.
How about a dumb dad joke?
Yeah, I know.
That’s dumb.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 9
CISSP® MENTOR PROGRAM – SESSION NINE
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 10
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 11
#MissionBeforeMoney
https://www.isc2.org/-/media/ISC2/Certifications/Ultim
ate-Guides/UltimateGuideCISSP-Web.ashx
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 12
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 14
CISSP® MENTOR PROGRAM – SESSION THREE/FOUR
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 15
#MissionBeforeMoney
Security Engineering Is
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 16
#MissionBeforeMoney
Caution!
Concepts overlap
between domains.
https://www.isc2.org/-/media/ISC2/Certifications/Ultim
ate-Guides/UltimateGuideCISSP-Web.ashx
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 17
#MissionBeforeMoney
https://www.isc2.org/Certifications/cissp/
Certification-Exam-Outline
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 18
#MissionBeforeMoney
https://www.isc2.org/Certifications/cissp/
Certification-Exam-Outline
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 19
#MissionBeforeMoney
Security Architecture
Introduction
• The goal is protecting confidentiality, integrity, and availability of the systems or
business in addition to Privacy and other important principals.
• Conduct a comprehensive risk assessment to gain an accurate idea of the risks
to be addressed.
• Once risks are identified and assessed the security architecture can begin.
• Risk treatments
• Avoid
• Transfer or share (i.e., insurance or contract)
• Mitigate (e.g., through security architecture)
• Accept
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 20
#MissionBeforeMoney
*Reminder the cost of a security control, must be less than the cost of the risk being addressed
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 21
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 22
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 23
#MissionBeforeMoney
• Design / Plan
• Development
• Testing
• Implementation
• Maintenance
• Decommissioning
Lifecycle
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 24
#MissionBeforeMoney
• It is less expensive to incorporate security when the overall functional system design is
developed rather than trying to add it on later (which will often require redesign, if not
reengineering, of already developed components).
• The need for security controls is not just to prevent the user from performing
unauthorized actions, but to prevent components of the system itself from violating
security requirements when acting on the user's requests.
• If security is not intrinsic to the overall design, it is not possible to completely mediate all
the activities that can compromise security.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 25
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 26
#MissionBeforeMoney
https://www.iso.org/standard/64140.html
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 27
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 28
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 29
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 30
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 31
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 32
#MissionBeforeMoney
• An example where encapsulation is used in the real world is the use of the setuid bit. Typically, in Linux or any Unix-based
operating system, a file has ownership based on the person who created it, and an application runs based on the person who
launched it. A special mechanism, setuid, allows for a file or object to be set with different privileges. Setting the setuid bit on a
file will cause it to open with the permission of whatever account you set it to be. The setuid bit controls access, above and
beyond the typical operation. That is an example of encapsulation.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 33
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 34
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 35
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 36
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 37
#MissionBeforeMoney
Security Architecture
Review Question
Device drivers can be considered to use a form of _________________ in which a simpler and
consistent interface is provided that hides the details of a particular device, as well as the
differences between similar devices:
1. Zero Trust
2. Layering
3. Redundancy
4. Encapsulation
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 38
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 39
#MissionBeforeMoney
DAD JOKE
Before we get too deep into this.
How about a dumb dad joke?
HAHAHAHA
Moving on…
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 40
#MissionBeforeMoney
• Tampering Data tampering is an attack on the integrity of data by maliciously manipulating data.
• Repudiation Repudiation is the ability of a party to deny that they are responsible for performing an action.
Repudiation threat occurs when a user claims that they did not perform an action, and there is no evidence to prove otherwise.
• Information disclosure Information disclosure — commonly referred to as a data leak — occurs when
information is improperly shared with an unauthorized party
• Denial of service A denial-of-service (DoS) attack involves a malicious actor rendering a system or service
unavailable by legitimate users.
• Elevation of privilege Elevation of privilege (or privilege escalation) occurs when an unprivileged application user
can upgrade their privileges to those of a privileged user (such as an administrator).
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 41
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 42
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 43
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 44
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 45
#MissionBeforeMoney
• Define technical scope During this stage, the boundaries of the technical environment and the
scope of all technical assets for which threat analysis is needed are defined. In addition to the application
boundaries, you must discover and document all infrastructure, application, and software dependencies.
• Application decomposition During this stage, an evaluation of all assets (i.e., the application
components) needs to be conducted, and the data flows between these assets need to be identified. As part of this
process, all application entry points and trust boundaries should be identified and defined. This stage is intended to
establish a clear understanding of all data sources, the parties that access those data sources, and all use cases
for data access within the application
• Threat analysis This stage is intended to identify and analyze threat information from within the system,
such as SIEM feeds, web application firewall (WAF) logs, etc., as well as externally available threat intelligence that
is related to the system.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 46
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 47
#MissionBeforeMoney
• Attack enumeration During this stage, attacks that could exploit identified vulnerabilities
(from step 5) are modeled and simulated. This helps determine the likelihood and impact of each identified
attack vector.
• Risk and impact analysis During this final stage, your business impact analysis (from
step 1) should be refined based on all the analysis performed in the previous six steps.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 48
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 49
#MissionBeforeMoney
Security Architecture
Review Question
Ashley wants to use a risk-based threat model that supports dynamic threat analysis to
present to company leadership. Which is the best choice?
1. Zero Trust
2. STRIDE
3. PASTA
4. DREAD
The Process for Attack Simulation and Threat Analysis
(PASTA) is a risk-based threat model, developed in 2012,
that supports dynamic threat analysis. The PASTA
methodology integrates business objectives with technical
requirements, making the output more easily understood
by upper management
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 50
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 51
#MissionBeforeMoney
• *Separation of duties can also be viewed as a defense-in-depth control; permission for sensitive operations should not depend
on a single condition.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 52
KNOWING HOW TO FAIL WITHOUT BEING A FAILURE
WHAT DO
SECURITY AND
OLYMPIC
SPORTS HAVE
IN COMMON?
https://bleacherreport.com/articles/1943889-ice-skating-fails-t
o-get-you-ready-for-the-olympics
#MissionBeforeMoney
• For systems with sensitive data, security controls should be designed such that
in the absence of specific configuration settings to the contrary, the default is to
not permit the action. Access should be based on permission (e.g., allowed list),
not exclusion (e.g., blocked list)
* This is the principle behind “deny all” default firewall rules and also relates to the concept
of least privileged
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 54
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 55
#MissionBeforeMoney
• “If complexity is the worst enemy of security, then simplicity must be its ally” – Evan
Francen
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 56
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 57
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 58
#MissionBeforeMoney
Security Architecture
Review Question
A subject should only be granted the privileges needed to complete an assigned or
authorized task is an example of what design principle?
1. Zero Trust
2. Least privilege
3. Attack Surface Minimization
4. Failing safe
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 59
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 60
#MissionBeforeMoney
• 3rd parties (partners, cloud providers, or anyone else outside of your organization)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 61
#MissionBeforeMoney
• 3rd parties (partners, cloud providers, or anyone else outside of your organization)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 62
#MissionBeforeMoney
• Use least privilege access - Always assign the minimum rights required for the
specific access requested, on a Just in Time (JIT) basis.
• Assume breach - Instead of trusting devices on your network, assume the worst-case
scenario (i.e., that you've already been breached) and minimize the blast radius to
prevent further damage.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 63
#MissionBeforeMoney
https://www.nist.gov/publications/zero-trust-architecture
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 64
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 65
#MissionBeforeMoney
• Deploy real-time monitoring to help detect and stop attacks and other anomalous
behavior
• Real-time analytics can also help inform access decisions by providing real-time context
for access requests and supporting JIT permissions
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 66
#MissionBeforeMoney
• Deploy real-time monitoring to help detect and stop attacks and other anomalous
behavior
• Real-time analytics can also help inform access decisions by providing real-time context
for access requests and supporting JIT permissions
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 67
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 70
#MissionBeforeMoney
Security Architecture
Review Question
What is the Zero Trust principle requiring the system to authenticate and authorize every
access request based on user identity, location, system health (e.g., patch levels), data
classification, user behavior analytics, and any other available data?
1. Continual verification
2. Least privilege access
3. Attack Surface Minimization
4. Failing safe (assume breach)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 71
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 72
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 73
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 74
#MissionBeforeMoney
https://www.ipc.on.ca/wp-content/uploads/resources/7foundationalprinciples.pdf
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 75
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 76
#MissionBeforeMoney
• Visibility and Transparency — Keep it Open - This is a “trust, but verify” principle (discussed
earlier) that seeks to assure all stakeholders that the system operates securely and maintains data
privacy as intended. (e.g., Privacy policy)
• Respect for User Privacy — Keep it User-Centric - System architects, developers, and
operators must keep the interests of the individual as their utmost priority by providing strong
privacy defaults, appropriate notice, and a user-friendly experience. (e.g., by clicking a button or
ticking a check box) in order to give consent.
https://www.ipc.on.ca/wp-content/uploads/resources/7foundationalprinciples.pdf
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 77
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 78
#MissionBeforeMoney
• In a cloud environment, the CSP takes on much of the operational burden, including a great deal of
security responsibility — but not all of it.
• The specific breakdown of responsibility varies by cloud provider and by cloud service type.
* Your organization is ultimately responsible and accountable for the security of the cloud
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 79
#MissionBeforeMoney
DAD JOKE
Before we get too deep into this.
How about a dumb dad joke?
HAHAHAHA
Moving on…
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 80
#MissionBeforeMoney
• Can be informal, serving to illustrate and simplify the assessment of a system without the rigor of
a proof
• Can help reduce ambiguity and potential misunderstanding as to what, exactly, a security
architecture is trying to accomplish
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 81
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 82
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 83
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 84
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 85
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 86
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 87
#MissionBeforeMoney
Star Property (* property) - No write down, this rule prevents a subject from writing to
an object at a lower security level.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 88
#MissionBeforeMoney
Star Property (* property) - No write down, this rule prevents a subject from writing to
an object at a lower security level.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 89
#MissionBeforeMoney
• Does not deal with covert channels or the possibility of performing permitted operations
in a manner that reveals confidential information through side channels
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 90
#MissionBeforeMoney
• Star Integrity Property (* integrity property) - No write up, this rule prevents the
corruption of more secure information by a less privileged subject.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 91
#MissionBeforeMoney
•Biba
BilbaIntegrity
IntegrityModel
Model
• Simple Integrity Property
• Star Integrity Property (* integrity property)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 92
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 93
#MissionBeforeMoney
Clark-Wilson Model
• Constrained data item (CDI) - This is the key data type in the Clark– Wilson model,
and it refers to data whose integrity must be preserved.
• Unconstrained data item (UDI) - This includes all data other than CDIs, typically
system inputs.
• Integrity verification procedures (IVPs) - These procedures check and ensure
that all CDIs are valid.
• Transformation procedures (TPs) - These procedures enforce a system's
integrity policy and maintain the integrity of CDIs.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 94
#MissionBeforeMoney
Brewer-Nash Model
• Simple Integrity Property - No read down, this rule prevents compromising the
integrity of more secure information from a less secure source. In other words, higher
integrity processes could produce untrustworthy results if they read and use data from
lower integrity sources.
• Star Integrity Property (* integrity property) - No write up, this rule prevents the
corruption of more secure information by a less privileged subject.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 95
#MissionBeforeMoney
Brewer-Nash Model
• Individual pieces of information related to a single company or client are called objects,
in keeping with BLP's usage.
• All objects related to the same company (or client) are part of what is called a company
data set.
• All company data sets in the same industry (i.e., that are competitors) are part of what is
called a conflict of interest class.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 96
#MissionBeforeMoney
Brewer-Nash Model
• Individual pieces of information related to a single company or client are called objects,
in keeping with BLP's usage.
• All objects related to the same company (or client) are part of what is called a company
data set.
• All company data sets in the same industry (i.e., that are competitors) are part of what is
called a conflict of interest class.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 97
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 98
#MissionBeforeMoney
Security Architecture
Review Question
This access model uses the concept of a well-formed transaction is that subjects are
constrained to make only those changes that maintain the integrity of the data and uses
well-formed transactions and separations of duties?
1. Bell-LaPadula
2. Biba
3. Clark-Wilson
4. Noninterference
Clark-Wilson
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 99
CISSP® MENTOR PROGRAM – SESSION NINE
QUICK BREAK
Top cybercrime 1. Mr. Robot - https://lnkd.in/efUGXJYY
movies/series 2. Snowden - https://lnkd.in/e5W2Uesc
for a cloudy weekend 3. Who Am I - https://lnkd.in/e8iXtmCw
4. Blackhat - https://lnkd.in/emXbYmJQ
5. Deep Web - https://lnkd.in/e9swJAqH
https://www.linkedin.com/posts/fabian-weber55
_mr-robot-tv-series-20152019-imdb-activity-7053 6. Kill Chain - https://lnkd.in/eheJ-pav
013614428844032-lfuV 7. Cyber Secrets - https://lnkd.in/eNmcamtA
8. The Great hack - https://lnkd.in/eB5VcqET
9. The Fifth estate - https://lnkd.in/enESJNMv
10. Wargames
11. Sneakers
FOOTER 100
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 101
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 102
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 103
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 104
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 105
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 106
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 107
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 108
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 109
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 110
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 111
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 113
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 114
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 116
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 117
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 118
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 119
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 120
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 121
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 122
#MissionBeforeMoney
Security Architecture
Review Question
This security control seeks to mitigate the risks of predictable memory address location.
1. Trusted Platform Modules (TPMs)
2. Address space layout randomization (ASLR)
3. Hardware Security Modules (HSMs)
4. Buffer Overflow Protection (BOP)
HAHAHAHA
🤣🤣🤣
Moving on…
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 125
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 126
#MissionBeforeMoney
Client-Based Systems
• Client-related vulnerabilities can be grouped into two broad categories:
- Client applications
- Operating Systems
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 127
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 128
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 129
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 130
#MissionBeforeMoney
Server-Based Systems
• The server needs to validate the identity of the client and/or the identity of the user of the
client. This can be done using a combination of Identity and Access Management (IAM)
techniques along with a secure communications protocol such as TLS, using client-side
certificates.
• The server also must validate all inputs and not assume that simply because the
commands and data coming from the client are originating from (and have been
validated by) the corresponding client-side software, they are valid and have been
sanitized.
• The client must be considered untrusted, and it must be assumed that the client-end can
insert or modify commands or data before being encrypted and transmitted over the
secure (e.g., TLS) link.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 131
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 132
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 133
#MissionBeforeMoney
DAD JOKE
Laughter for Levity
How about a dumb dad joke? Where’s Pop Corn?
What did Baby Corn say to
Mama Corn?
HAHAHAHA
🤣🤣🤣
Moving on…
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 134
#MissionBeforeMoney
Database Systems
Securing database systems is a special case of the more general
server-based system security discussed in the previous section.
If the database is accessible over a network, then all the security
controls discussed there apply.
What’s a Database?
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 135
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 136
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 137
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 138
#MissionBeforeMoney
• Assign unique admin accounts for each administrator (i.e., do not share
admin accounts between more than one admin)
• Enable logging at a sufficiently detailed level to provide the forensic
information needed to identify the cause of events related to security
incidents (but ensure logging does not include passwords)
• Protect the logs from tampering by database admins, either through
permissions on the database system itself or by transmitting the log data
in real time to a separate secure logging system.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 139
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 140
#MissionBeforeMoney
• Full-disk encryption (FDE) at the lowest level protects all the data on the storage media,
protecting against the physical theft or loss of the drive itself. It provides no protection
from threat actors who have logical access to the system.
Filesystem-level encryption allows the encryption to occur at the filesystem level.
• Transparent data encryption (TDE) protects the data from those who have direct access
to the filesystem (i.e., the “root” user), but do not have permission to access the
database system and the specific database item.
• Cell-level encryption (CLE) encrypts database information at the cell or column level.
With this approach, data remains encrypted when read from the database and is
decrypted only when requested.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 141
#MissionBeforeMoney
• Transparent data encryption (TDE) protects the data from those who have direct access
Does not protect against malicious
to the filesystem (i.e., the “root” user), but dodatabase
not have permission
administrators tosuch
or attacks, access the
database system and the specific database as SQL injection, not intended to be used
item. alone
• Cell-level encryption (CLE) encrypts database information at the cell or column level.
With this approach, data remains encrypted
Key management when
and handling read from the database
the decryption/encryption and is
requests can add
considerable complexity to the application and depending on the types of queries
decrypted only when requested.
(and whether they include CLE-protected data), the performance can be affected,
sometimes drastically.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 142
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 143
#MissionBeforeMoney
Security Architecture
Review Question
Chris has concerns about insider threats, especially from system and application
administrators. Which security control protects the data from those who have direct
access to the filesystem and prevents domain administrators from accessing the database
system and the specific database item.
1. Full-disk encryption (FDE)
2. Trusted computing module (TPM)
3. Zero Trust Network Architecture (ZTNA)
4. Transparent data encryption (TDE)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 144
#MissionBeforeMoney
Cryptographic Systems
“All cryptography can eventually be broken the only question is how much
effort is required.” – Bruce Schneier, https://www.schneier.com/
• A number of avenues that can be followed to compromise a cryptographic
system.
• Algorithm and protocol weaknesses
• Implementation weakness
• Key management vulnerabilities
*There are countries that strictly regulate the use of cryptography, and countries that, while
permitting the unrestricted use of cryptography, regulate the export of cryptographic technology
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 145
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 146
#MissionBeforeMoney
Exampleattack
• The cryptographic protocols
surfacewith
includesweaknesses
not only the algorithm, but the
people, processes, and technology that implement the cryptographic
• Dual Elliptical Curve Deterministic Random
protections, all of which are potentially vulnerable to attack.
Bit Generator (Dual EC DBRG)
• Cryptanalysis becomes more effective over time, owing to advances in
• Wireless Equivalent Privacy (WEP)
computing, mathematical breakthroughs, and other improvements in
cryptanalytic methods.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 147
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 148
#MissionBeforeMoney
The best defense is to use standard cryptographic libraries that have been tested over
time for side-channel information leakage.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 149
#MissionBeforeMoney
• Compare secret strings (e.g., keys, plaintext, unhashed passwords) using constant-time
comparison routines.
• Avoid branching or loop counts that depend upon secret data.
• Avoid indexing lookup tables or arrays using secret data Use strong (i.e., “cryptographic
grade”) random number generators.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 150
#MissionBeforeMoney
• Compare secret strings (e.g., keys, plaintext, unhashed passwords) using constant-time
comparison routines.
Read the Case Studies in the
• Avoid branching or loop counts that depend upon secret data.
Book
• Avoid indexing lookup tables or arrays using secret data Use strong (i.e., “cryptographic
grade”) random number generators.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 151
#MissionBeforeMoney
Keys should not be reused and should be rotated (replaced) periodically to ensure that the
amount of data encrypted using a single key is limited.
Symmetric and private keys depend upon confidentiality to be effective. This means great
care must be taken with how the keys are stored to reduce the possibility of their becoming
known to unauthorized entities.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 152
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 153
#MissionBeforeMoney
ICS is part of OT
[Operational Technology]
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 154
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 155
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 157
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 158
#MissionBeforeMoney
• It is essential to limit and screen permitted traffic accessing the ICS network through the
use of carefully configured firewalls and network proxies
• For ICSs that must be remotely accessible, compensating controls such as installing a
web proxy or VPN should be considered to add an additional layer of security on top of
whatever access controls are implemented on the ICS itself.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 159
#MissionBeforeMoney
https://csrc.nist.gov/publications/
detail/sp/800-145/final
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 160
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 161
#MissionBeforeMoney
https://csrc.nist.gov/publications/detail/sp/800-145/final
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 162
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 163
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 164
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 165
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 166
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 167
#MissionBeforeMoney
Distributed Systems
A distributed system involves multiple subsystems, possibly
distributed geographically, and interconnected in some manner,
the attack surface is much larger than that of a single system.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 168
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 169
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 170
#MissionBeforeMoney
Internet of Things
The term Internet of Things (IoT) describes a network of physical
objects that are embedded with technologies (e.g., sensors and
software) that enable them to connect to and exchange data
with other devices over the internet.
Examples include household appliances, medical equipment,
smart home devices, and so on. Estimates are that the number
of such devices in 2020 was somewhere between 20 and 50
billion, and the rapid expansion of 5G networks is expected to
continue to drive IoT growth.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 171
#MissionBeforeMoney
Internet of Things
The term Internet of Things (IoT) describes a network of physical
objects that are embedded with technologies (e.g., sensors and
software) that enable them to connect to and exchange data
with other devices over the internet.
Examples include household appliances, medical equipment,
smart home devices, and so on. Estimates are that the number
of such devices in 2020 was somewhere between 20 and 50
billion, and the rapid expansion of 5G networks is expected to
continue to drive IoT growth.
https://www.weforum.org/agenda/2021/03/
what-is-the-internet-of-things/
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 172
#MissionBeforeMoney
Internet of Things
The importance of IoT security can be demonstrated through the infamous Mirai
distributed denial of service (DDoS) attack.
The Mirai attack (Figure 3.10) involved a worm that searched for vulnerable IoT devices
(typically consumer routers and IP-enabled closed circuit television (CCTV) cameras),
infected them with a copy of the malware, and then waited for instructions from a
command and control (C&C) server as to which target to attack with a DDoS attack.
In late 2016, this botnet took the Krebs on Security blog offline and later attacked the Dyn
DNS service, which in turn seriously impacted many of their customers including GitHub,
Twitter, Reddit, Netflix, and Airbnb.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 173
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 174
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 175
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 176
#MissionBeforeMoney
• To start, you can protect yourself (and others that might be a target of
your compromised devices) through the same two basic security controls
previously mentioned
• Change default credentials as soon as possible, and before you connect the device
to the internet.
• Keep your device updated with the current firmware release, either by enabling
auto-update (if supported by your device) or by periodically checking with the
manufacturer's website for firmware updates.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 177
#MissionBeforeMoney
• Segment your network so that your IoT devices do not have access to other sensitive
devices or servers on your internal networks. If you have to be able to access your
IoT device externally, then at the very least put the device behind a router that does
reverse NAT mapping.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 178
#MissionBeforeMoney
Microservices
• Microservice architecture is a modular software development style that involves
developing a single application as a collection of loosely coupled smaller applications or
services (microservices), each running its own processes.
• Microservices are built to be independently deployable and work together through
lightweight communications protocols.
• Microservice architectures are highly distributed and dynamic and present unique
security concerns that must be considered from the first stages of design and
throughout the entire development lifecycle. Two key principles to consider when
securing microservices are: isolation and defense in depth.
• Monolithic architecture, which involves developing an application as a single, indivisible
unit, typically with a large codebase that lacks modularity.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 179
#MissionBeforeMoney
Microservices
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 180
#MissionBeforeMoney
Microservices
• Isolation is a core principle of microservices, and each microservice must be able to be
deployed, modified, maintained, and destroyed without impacting the other
microservices around it.
• The principle of defense in depth, while important in any architecture, is particularly
critical when dealing with microservices
• Defense in depth is a security strategy that calls for multiple layers of security controls to
be implemented throughout an application or system.
• It is essential in a microservice architecture to independently monitor and protect each
microservice and the communications between each microservice in the overall
environment.
• APIs are the most vulnerable part of microservice architecture
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 181
#MissionBeforeMoney
Containerization
• A container is unit of software that packages up an application and its dependencies so
that the application can be decoupled from its environment and developed, deployed,
and run consistently across multiple environments.
• A container uses the operating system's kernel and only the resources required to
operate the given application.
• Containers were made popular with the development of the open-source Kubernetes
platform. Kubernetes and other container platforms are particularly useful in hybrid cloud
environments, as they allow developers and users to seamlessly move applications from
one cloud to another, or even between cloud and on-prem environments.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 182
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 183
#MissionBeforeMoney
Serverless
• Serverless computing is a cloud computing model that involves the cloud provider
managing servers, and dynamically allocating machine resources, as needed.
• Infrastructure management tasks like provisioning and patching are handled by the cloud
provider
• Serverless computing comes with some notable security benefits. To start, serverless
functions are typically ephemeral (i.e., short lived).
• This short-lived nature creates a moving target that adds a high degree of difficulty for
attackers to compromise
• Serverless functions are commonly much smaller codebases than even the smallest
containers.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 185
#MissionBeforeMoney
Serverless
• Effective serverless security is built on ensuring code integrity, tight access permissions,
and proper monitoring.
• You should maintain least privileged access for serverless functions, as you do other
services — serverless functions should be granted only the access and permissions
necessary to execute their task.
• Runtime protection should be used to detect suspicious events or errors that may lead to
unexpected behavior or compromise.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 186
#MissionBeforeMoney
Embedded Systems
Embedded systems are dedicated information processing components built into larger mechanical
or electrical systems, intended to provide a limited set of functions.
• Domestic appliances (e.g., dishwashers, clothes washers and dryers, refrigerators, and televisions)
• Office equipment (e.g., printers, scanners, and fax machines)
• Networking devices (e.g., routers, switches, and firewalls)
• Cars and other automobiles
• ATMs
• Medical devices (e.g., heart monitors, glucose meters, and IV infusion pumps)
• Mass transit vehicles, stations, and systems
• Building automation and control systems
• Traffic control and monitoring systems
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 187
#MissionBeforeMoney
Embedded Systems
• Assessing the vulnerabilities in an embedded system ought to start with an enumeration
of the attack surfaces available and then examining each.
• This examination can be done in a number of ways, including code inspection, threat
modeling, and white- or black-box penetration testing.
• Generally, these attack surfaces will fall into the following categories:
• User interface (UI, which are buttons or other methods of user input)
• Physical attacks
• Sensor attacks
• Output attacks
• Processor attacks
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 188
#MissionBeforeMoney
Embedded Systems
• UI attacks involve manipulating the controls of the device in a manner that causes the device to
malfunction
• Physical attacks involve the compromise of the embedded system's packaging, either to directly
compromise the device or to gain access to parts of the embedded system in order to expose
other attack surfaces that may be vulnerable.
• Sensor attacks involve manipulating, or intercepting data from, the sensors the embedded system
uses to detect external conditions that are relevant to its operation.
• Output attacks involve manipulating the actuators controlled by the embedded system to bypass
the controls imposed by the system.
• Processor attacks involve compromising the processor directly, through means that can range
from connecting directly to the processor or memory chips to carefully removing the tops of
integrated circuits and using ion beams to probe the chip to obtain or manipulate information
within the processor. Processor attacks are normally preceded by a physical attack to gain access to the processor.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 189
#MissionBeforeMoney
Embedded Systems
• Embedded systems that support firmware updates may be vulnerable to accepting rogue
or unauthorized firmware.
• As with IoT devices, a problem is that it is difficult, if not impossible, to upgrade the
software in many embedded systems.
• Vulnerabilities that are discovered after the product has shipped may be difficult or
impossible to patch.
• The result may be the need for compensating controls to mitigate the risk from the
unpatched vulnerability or the need to replace the unit entirely.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 190
#MissionBeforeMoney
Security Architecture
Review Question
Pat is developing an application that they want to run on multiple types of operating
systems including in the cloud. What should they use so that the application can be
decoupled from its environment and developed, deployed, and run consistently across
multiple environments?
1. Embedded system
2. Containerization
3. Serverless
4. Microservices
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 192
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 193
#MissionBeforeMoney
Edge-Computing Systems
• Edge computing is a distributed computing model that brings compute and storage
resources closer to the location where it is needed, improving response times and
reducing bandwidth.
• The concept of edge computing dates back to the content delivery networks (CDNs) of
the 1990s and now extends into the world of cloud computing. CDNs are covered in
detail in Chapter 4, “Communication and Network Security.”
• Edge computing allows pseudo-local data processing to minimize data sent over the
internet.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 194
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 195
#MissionBeforeMoney
Virtualized Systems
• Operating systems provide programs with a set of services to enable them to operate
more efficiently (and to be more easily designed and run) than if the program had to run
on the computer directly.
• The operating system provides a level of abstraction that manages the details of files
and directories.
• Virtualization is the act of creating virtual (i.e., not real) compute, storage, and network
resources, virtualization allows you to create software versions of hardware.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 196
#MissionBeforeMoney
Virtualized Systems
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 197
#MissionBeforeMoney
Virtualized Systems
• VMs, for instance, are software instances of actual computers. Likewise,
software-defined networks (SDNs) are software instances of physical networks.
• Virtualization enables multiple operating systems to run on the same computer, each
unaware of and unable (in a properly designed system) to affect the other operating
systems.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 198
#MissionBeforeMoney
Virtualized Systems
• A hypervisor is a computing layer that allows multiple operating systems to run
simultaneously on a single piece of hardware.
• There are two types of hypervisors, commonly referred to as Type 1 and Type 2
hypervisors.
• Virtualized machines running within the host OS are then called guest machines.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 199
#MissionBeforeMoney
Virtualized Systems
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 200
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 201
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 202
#MissionBeforeMoney
Security Architecture
Review Question
I want to run a virtual machine environment on my desktop. What should I use?
1. Type 1 hypervisor
2. Type 2 hypervisor
3. Microservices
4. Serverless cloud
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 203
#MissionBeforeMoney
DAD JOKE
Before we get too deep into this.
How about a dumb dad joke?
HAHAHAHA
Moving on…
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 204
#MissionBeforeMoney
SESSION 4 - FIN
We made it!
Next Session (Wed, 15 May 2024) -
Domain 3, part 2 (Security Architecture & Engineering) - Ryan
• Cryptography
• Physical security
• …
Homework:
• Review Domain Domain 3.
• Take practice tests.
• Review at least two of the references we provided in this class (download for
later use).
• Post at least one question/answer in the Discord Channel.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 205
#MissionBeforeMoney
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 206
#MissionBeforeMoney
CISSP® MENTOR PROGRAM – SESSION ONE
INTRODUCTION
2024
Class #9 – Domain 3 (part 1)
Ryan Cloutier
AI Visionary and CISO
Synaptech Services
Chief Squirrel of Scarebear Industries
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. 1