CISSP Domain 7 Security Operations - Exam Insights - DestCert
CISSP Domain 7 Security Operations - Exam Insights - DestCert
• Sealing off access to the area where a crime may have been committed.
• Taking photographs.
• Documenting the location of evidence.
• Avoid touching computers, mobile devices, thumb drives, hard drives, and so
on—anything that may have been used as part of the crime.
• Real evidence
• Direct evidence
• Circumstantial evidence
• Corroborative evidence
• Hearsay evidence
• Best evidence rule
• Secondary evidence
A simple yet effective method for identifying where to look for evidence is the
notion that something is taken whenever a crime is committed and something is
left behind. This is called Lo c a r d 's exc h a n g e p r i n c i p l e .
Digital/computer forensics
Digital forensics is the scientific examination and analysis of data from storage
media so that the information can be used as part of an investigation to identify
the culprit or the root cause of an incident.
Live evidence
Live evidence is data stored in a running system in places like random access
memory (RAM), cache, and buffers, among others.
If the keyboard is tapped, the mouse is moved, the plug is pulled, or the system
is powered off, the live evidence changes or disappears completely. E x a m i n i n g
a live system changes the state of the evidence.
At the same time, if power to the system is disrupted, the live evidence is gone.
Forensic copies
Another major source of digital evidence on a computer system is the hard drive.
Whenever a forensic investigation of a hard drive is conducted, two identical b i t -
f o r - b i t c o p i e s of the original hard drive should be created first.
A bit-for-bit copy is an exact copy, down to every bit on the original drive, and
specialized tools are required to create them.
• Prosecution/defense
• Judge/jury
• Regulators
• Investors
• Insurers
Artifacts
Forensic artifacts are remnants of a breach or attempted breach of a system or
network and may or may not be relevant to an investigation or response.
Chain of custody
The chain of custody ultimately focuses on having control of the evidence: who
collected and handled what evidence, when, and where.
A helpful way to think about establishing the chain of custody is to tag, bag, and
carry the evidence.
For any evidence to stand the best chance of surviving legal and other scrutiny,
it should exhibit five characteristics, also known as the five rules of evidence, as
shown in the following table:
Investigative techniques
Several investigative techniques can be used when conducting analysis. One is
media analysis, which examines the bits on a hard drive that may no longer have
pointers, but the data is still there.
Security Information and Event Management (SIEM) systems ingest logs from
multiple sources, compile and analyze log entries, and report relevant
information.
SIEM systems are complex and require expertise to install and tune properly.
They require a properly trained team that understands how to read and interpret
what they see, as well as what escalation procedures to follow when a legitimate
alert is raised. SIEM systems represent technology, process, and people, and
each is relevant to overall effectiveness.
With traditional logging, where log files are only captured and maintained on
individual systems, it would take enormous effort to access and analyze all the
captured data and determine if anything out of the ordinary or malicious is taking
place. With a SIEM system, significant intelligence is incorporated into their
functionality, allowing significant amounts of logged events and analysis and
correlation of the same to occur very quickly.
• Aggregation
• Normalization
• Correlation
• Secure storage
• Analysis
• Reporting
• Security appliances
• Network devices
• DLP
• Data activity
• Applications
• Operating systems
• Servers
• IPS/IDS
Threat intelligence
The term threat intelligence is an umbrella term encompassing threat research
and analysis and emerging threat trends. It is an important element of any
organization's digital security strategy that equips security professionals to
proactively anticipate, recognize, and respond to threats.
Actionable threat intelligence can also be gleaned from documents like vendor
trend reports, public sector team reports (like US-CERT), related information
sharing and analysis centers (ISACs), and more.
At its core, UEBA monitors the behavior and patterns of users and entities, logs
and correlates the underlying data, analyzes the data, and triggers alerts when
necessary.
Continuous monitoring
After a SIEM is set up, configured, tuned, and running, it must be routinely
updated and continuously monitored to function most effectively. Effective
continuous monitoring encompasses technology, processes, and people.
• Define
• Establish
• Implement
• Analyze/report
• Respond
• Review/update
7.3 Perform configuration
management (CM)
Asset inventory
Confifig
gu r a t i o n m a n a g e m e n t
Job rotation
When an organization employs job rotation, they're essentially telling employees
that from time to time, another employee will assume their duties, and they'll
assume the duties of somebody else.
S e r v i c e Le v e l A g r e e m e n t s ( S L A s )
They contain terms denoting related time frames against the performance of
specific operations agreed upon within the overall contract.
Protecting media
Media management should consider all types of media as well as short- and
long-term needs and evaluate:
• Confidentiality
• Access speeds
• Portability
• Durability
• Media format
• Data format
• Paper
• Microforms (microfilm and microfiche)
• Magnetic (HD, disks, and tapes)
• Flash memory (SSD and memory cards)
• Optical (CD and DVD)
Associated with media management is the protection of the media itself, which
typically involves policies and procedures, a c c e s s c o n t r o l m e c h a n i s m s , labeling
and marking, storage, transport, sanitization, use, and end-of-life.
The management of hardware and software assets is closely aligned with the
information above. An owner should be assigned to each asset, with each owner
accountable for protecting that asset.
Incident response is the process used to detect and respond to incidents and to
reduce the impact when incidents occur. It attempts to keep a business
operating or to restore operations as quickly as possible in the wake of an
incident.
E v e n t s take place continually, and the vast majority are insignificant; however,
events that lead to some type of adversity can be deemed incidents, which
should trigger an organization's i n c i d e n t response process.
Detection examples
Organizations must have tools in place that can help detect and identify
incidents. A combination of automated and manual tools is usually the best and
most effective approach:
• IPS/IDS
• DLP
• Anti-malware
• SIEM
• Administrative review
• Motion sensors
• Cameras
• Guards
• Malware
• Hacker attack
• Insider attack
• Employee error
• System error
• Data corruption
• Workplace injury
.
Response (IR team) After an incident has been identified,
the IR Team should be activated.
Among the first steps taken by the IR
Team will be an to
determine how big of a deal the
incident is, how long the impact might
be experienced, who else might need
to be involved, and so on.
In addition to conducting an impact
assessment, the IR Team will attempt to
minimize—to contain—damage or
Mitigation (containment) impact from the incident. The IR Team's
job at this point is not to fix the
problem; it's simply to try and prevent
further damage.
Reporting occurs throughout the
incident response process. Once an
incident is mitigated, formal reporting
Reporting occurs because numerous
stakeholders often need to understand
what has happened.
Malware
Malware is malicious software that negatively impacts a system. These are the
characteristics of each malware type:
A botnet is
Botnet
.
A zero-day is
. The
vendor of the impacted product is unaware,
Zero-day as are security companies that create anti-
malware software intended to protect
systems.
Anti-malware
Anti-malware software is designed to prevent malware from being triggered.
One of the best anti-malware solutions is effective policy and providing user
training and awareness to staff members, considering that a virus requires
human interaction to trigger it.
Signature-based anti-malware
More technical methods of detecting malware include using s i g n a t u r e - b a s e d
a n t i - m a l w a r e systems. These systems contain what are known as definition files
—files that have signature characteristics of currently known malware—and scan
systems using this information to detect suspicious and compromised files.
Heuristic systems
H e u r i s t i c s y s t e m s do not look for malware based on a particular pattern or
signature. Rather, they look at the underlying code or behavior of a file. They
generally work one of two ways:
1. Static code scanning techniques: the scanner scans code in files, similar to white box
testing
2. Dynamic techniques: the scanner runs executable files in a sandbox to observe their
behavior.
• Empower systems to use data to learn and improve without being explicitly
programmed.
• Make predictions through the use of mathematical models to analyze
patterns.
Pa t c h m a n a g e m e n t
Once the need for an available patch has been identified, a change management
process should be employed as part of the decision to move forward and install
the patch.
Change management
Change management ensures that the costs and benefits of changes are
analyzed and changes are made in a controlled manner to reduce risks.
1. Change request. A change request can come from any part of an organization and
pertain to almost any topic. Organizations typically use some type of change
management software.
2. Assess impact. After a change request is made, however small the request might be, the
impact of the potential change must be assessed.
3. Approval. Based on the requested change and related impact assessment, common
sense plays a big part in the approval process.
4. Build and test. After approval, any change should be developed and tested, ideally in a
test environment.
5. Notifificcation. Prior to implementing any change, key stakeholders should be notified.
6. Implement. After testing and notification of stakeholders, the change should be
implemented.
7. Validation. Once implemented, senior management and stakeholders should again be
notified to validate the change.
8. Version and baseline. Documentation should take place at each step noted. Still, at this
point, it's critical to ensure all documentation is complete and to identify the version and
baseline related to a given change.
Failure modes
Backup strategies are driven by organizational goals and objectives and typically
focus on backup and restore time as well as storage needs.
Archive bit
Archive bit is technical detail—metadata—that indicates the status of a backup
relative to a given backup strategy.
Different backup strategies deal with the archive bit differently. Incremental and
differential backup strategies do not treat the archive bit in the same manner.
Mirror backup
A mirror backup is an exact copy of a data set is created, and no compression is
used.
Of the three types of backups mentioned, mirror is the fastest to backup and
restore, but it requires a tremendous amount of data storage; incremental
backups require the least amount of data storage.
It’s important to have spares of critical components for those systems on hand.
Spare parts strategies include:
Elements like time to recover and money are important components of each.
Something called a c o l d s i t e is relatively inexpensive, but it takes a relatively
long time to bring online.
Internal recovery sites are owned by the organization, while external recovery
sites are owned by a service provider.
Also, multiple processing sites are more than one site where key business
functionality is performed.
R TO stands for recovery time objective, and it refers to how long it takes an
organization to move from the time of disaster to the time of operating at a
defined service level.
The business impact analysis (BIA) is the process that helps an organization
identify its most critical functions, services, assets, systems, and processes. RPO
and RTO are subsequently determined to understand how much data and how
quickly these systems and processes need to be recovered.
7.11 Implement disaster recovery (DR)
processes
The processes described in this topic all help mitigate the effects of a disaster,
preserving as much value as possible.
When dealing with BCP and DRP procedures, there are four key measurements
of time to be aware of:
The shorter the RPO and RTO requirements, the more significant the cost
becomes.
Business Impact Analysis (BIA)
Restoration order
After declaring a disaster, the most critical systems should be brought online at a
recovery site. As time progresses and the primary site is rebuilt and ready to
once again host business operations, the processes and systems that should be
restored first are the least critical, in order to make sure the site is working
properly.
7.12 Test disaster recovery plans
(DRP)
After recovery plans have been created, it’s imperative to test them. DRP testing
is a critical component of plan creation and development.
Affects Affects
backup/
Ty p e Description productio
parallel n systems
systems
The author reviews the DR
Read-through/ plan against the standard
Checklist checklist for missing
components/completeness
Relevant stakeholders walk
through the plan and
Walkthrough provide their input based
on their expertise
Follow a plan based on a
simulated disaster
Simulation scenario. Stop short of
affecting systems or data.