Cram: Key Concepts
Introduction to Key Concepts:
We will cover, at a high level, the following concepts which will be required on the exam:
3.1 - Research, Implement, and Manage Engineering Processes Using Secure Design Principles
Traditional Concepts:
-
Threat Modeling: Systematic approach of identifying, assessing, and mitigating potential vulnerabilities in a system.
-
Least Privilege: Grant users the minimal levels of access or permissions they need to perform their work.
-
Defense in Depth: Multilayered security approach designed to provide redundancy and mitigate the potential impact of a security breach.
-
Secure Defaults: Configuration settings preset by manufacturers to minimize security risks.
-
Fail Securely: Systems should default to a secure state in the event of a failure.
Contemporary Concepts:
-
Keep It Simple: Simplicity in design reduces the potential for security vulnerabilities.
-
Zero Trust: Security model where every request is fully authenticated, authorized, and encrypted before granting access.
-
Privacy by Design: Integrate data privacy protections from the initial design stages of systems or processes.
-
Trust but Verify: Always verify the legitimacy of information, even from trusted sources.
-
Shared Responsibility: Security is not just the responsibility of one party but should be shared among all stakeholders involved.
3.2 - Understand the Fundamental Concepts of Security Models
3.3 - Select Controls Based on System Security Requirements
3.4 - Understand Security Capabilities of Information
For instance, the application of encryption and decryption techniques to protect data (like TPN).
3.5 - Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
Identifying potential security weaknesses in systems and implementing measures to reduce the risk of these vulnerabilities being exploited.
3.6 - Select and Determine Cryptographic Solutions
This involves choosing appropriate cryptographic techniques based on the system's security requirements.
3.7 - Understand Methods of Cryptanalytic Attacks
These attacks are covered extensively in the Attacks and Countermeasures chapter. Some examples include:
Bruce Force | Ciphertext Only | Known Plaintext | Frequency Analysis |
Chosen Ciphertext | Implementation Attacks | Side-Channel Attacks | Fault Injection |
Timing Attacks | Man-in-the-Middle Attacks | Pass the Hash Attacks | Kerberos Exploitation |
3.8 - Apply Security Principles to Site and Facility Design
3.9 - Design Site and Facility Security Controls
Zero Trust Security
-
User Identity as Control Plane: This shifts the focus from merely securing the network perimeter to treating user identity as the core security element.
-
Assumption of Breach: Zero Trust inherently assumes a potential compromise or breach. It operates on the premise that every request, even those from within the organization, could be a threat.
-
Identity Verification: This involves rigorous identity verification protocols to authenticate each user. For instance, multifactor authentication and strict password policies can be used.
-
Device Management: Only devices compliant with the organization's security standards are allowed access to resources. This may involve ensuring devices are updated, have enabled firewalls, and use antivirus software.
-
Application Management: Only secure, organization-approved applications are permitted access to sensitive data. These applications are regularly scanned and updated to eliminate potential vulnerabilities.
-
Data Protection: Data is encrypted both at rest and in transit to ensure its safety, even if an unauthorized entity were to gain access.
Secure Defaults
A server should come with the minimal set of open ports necessary for its operation, and an application should have all its optional features turned off by default.
Fail Securely
Trust but Verify
Privacy by Design
Applying these principles as part of a layered defense strategy (defense in depth) within a Zero Trust framework helps to ensure privacy while maintaining a robust security posture.
1. Proactive not Reactive
This principle encourages a forward-thinking approach to privacy, where potential issues and privacy breaches are anticipated and prevented before they occur, rather than addressed after the fact.
2. Privacy as Default Setting
Systems should automatically protect users' privacy; individuals shouldn't have to take extra steps to secure their private data. By default, personal data should not be collected or shared without the individual's consent.
3. Privacy Embedded into Design
Privacy is not an afterthought or an add-on feature; it's a core component that should be part of the system's design and architecture from the very beginning.
4. Positive-Sum not Zero-Sum
The positive-sum approach means that privacy and other considerations, like security or usability, can all be achieved in tandem without sacrificing one for the other. The zero-sum approach, by contrast, views privacy and other factors as trade-offs, where improving one would degrade the other.
5. End-to-End Security — Full Lifecycle Protection
This principle mandates the protection of data from the moment it's collected until its final disposition. This means securing it during storage, processing, and transmission, as well as when it is deleted or anonymized.
6. Visibility and Transparency
Organizations must be open and transparent about their data practices, including how data is collected, used, and stored. This principle is often implemented through comprehensive privacy policies and clear user communications.
7. Respect for User Privacy
Keep It Simple Stupid (KISS)
Complexity is the worst enemy of security.—Bruce Schneier
- During the launch, Bob asks Alice, the CEO, to demo the system. She spends 15 minutes to log in, only to get blocked: "Suspicious activity detected."
- In the following weeks, employees become so frustrated with the cumbersome system that they start to bypass it.
- They share passwords, keep themselves permanently logged in, and even start using personal email for official communication.
Despite Bob's high-tech approach, security is now weaker than ever due to non-compliance and workarounds.
A good example of the KISS principle in action is the secure operating system, Qubes OS. The team behind Qubes OS chose Xen for its simplicity, despite the fact that Kernel-based Virtual Machine (KVM) has more features. While KVM may offer more functionalities, its complexity could lead to potential security vulnerabilities, reinforcing why simplicity can be paramount in cybersecurity.
Best-in-Suite vs Best-in-Breed
The Value of Simplicity
Security as a Service (SECaaS)
Internet of Things (IoT)
Smart Devices
Security Information Event Management (SIEM)
Security Orchestration Automation, & Response (SOAR)
Microservices and Service Orientated Architecture (SOA)
Containerization
APIs (SOAP or REST)
Embedded Systems
Enforce solid, Lightweight and robust measure authentication practices, moving beyond 'implied trust'. Examples: like two-factor authentication, digital signatures, or certificate-based authentication.
High Performance Computing
Distributed computing encompasses a wide range of systems where tasks are spread across multiple machines to enhance performance, provide redundancy, or both.
Beyond the Typical Client-Server
- Distributed Systems' Examples:
-
SETI Project:
- Aim: Combing the cosmos for signs of extraterrestrial life.
- Process: Analyzing vast amounts of data.
- Unique Aspect: Individuals can volunteer their computing resources.
-
Cryptocurrency Blockchains:
- Aim: Securely recording and verifying transactions.
- Process: Decentralized nodes collaborate to validate and chronicle transactions on a communal ledger.
- Unique Aspect: Strengthens security and consensus by jointly processing extensive transactional data.
-
Grid Computing
Grid computing, a subset of distributed computing, harnesses the power of many loosely coupled computers to perform sizable tasks.
-
Characteristics:
- Resource Pooling: Often described as "virtual supercomputing," grid computing pools resources, sometimes from globally scattered computers.
- Voluntary Participation: Projects like SETI@home exemplify this, where unused computing resources are tapped into.
- Heterogeneity: Grids can consist of varied machines, possibly with different operating systems and hardware configurations.
- Middleware Requirement: Essential for managing diverse resources, handling security, and orchestrating tasks.
-
Comparison:
- SETI Project: Fits the grid computing model where global volunteers contribute idle computer time.
- Blockchain: A form of distributed computing due to its decentralized nature but deviates from the traditional grid model. Its focus isn't pooling computational resources for large tasks but ensuring secure transaction data and consensus.
Key concerns with Grid computing includes protecting the grid controller from takeover or influence from bad actors.
Edge Computing
-
Overview: Edge computing moves certain processing tasks closer to the location where they are needed, rather than relying solely on a central cloud-based system.
-
Use Cases:
- Internet-of-Things (IoT) Scenarios: Situations where real-time or near-real-time processing is vital.
- Agriculture: Optimizing irrigation based on sensor data.
- Science/Space: Immediate data processing from space instruments.
- Military: Real-time strategies or drone controls based on immediate data.
- Internet-of-Things (IoT) Scenarios: Situations where real-time or near-real-time processing is vital.
Fog Computing:
-
Definition: An extension of edge computing, fog computing utilizes gateway devices in the field to gather, process, and send data more efficiently.
-
How It Works: Rather than sending all data directly to the cloud, fog computing aggregates and processes data at the edge first, then sends only the most relevant or processed data to the central system.
-
Purpose: By collecting and correlating data centrally at the edge, fog computing minimizes latency and enhances efficiency, especially when bandwidth is a concern.
Security in Edge and Fog Computing:
-
Challenges: With numerous network-connected devices dispersed in various locations, ensuring security becomes paramount.
-
Key Solutions:
- Data Encryption: Protecting data in transit and at rest.
- Spoofing Protection: Ensuring data integrity and verifying the sources.
- Authentication: Confirming the legitimacy of devices and users accessing the network.
CASB (Cloud Access Security Broker)
Definition: A CASB is a security solution that sits between an organization's on-premises infrastructure and cloud provider's infrastructure. It acts as a gatekeeper, allowing organizations to extend their security policies to cloud applications.
Purpose:
-
Visibility: CASBs provide insights into unauthorized cloud usage or "Shadow IT", where users might utilize applications not sanctioned by the organization.
-
Compliance: They ensure that cloud services are used in compliance with industry regulations and organizational policies.
-
Data Security: CASBs protect sensitive data in the cloud through various means like encryption, tokenization, and access controls.
-
Threat Protection: They defend against cloud-based threats by recognizing and counteracting malicious activity.
Shadow IT:
-
Issue: Departments or individual users sometimes adopt cloud applications that are not officially approved by the IT department. This is usually done with good intentions, like trying to be more productive or efficient. However, this poses a risk as the IT department has no visibility or control over these apps, potentially exposing the organization to security vulnerabilities.
-
Solution: CASB solutions detect such unsanctioned applications, giving the IT department visibility and control to either integrate those apps into the official workflow (after ensuring they're secure) or block them.
Example: Imagine an employee uses a free cloud storage solution to store official documents for easier access. While their intent is to work efficiently, this can bypass official security protocols. With CASB, the IT department can detect this usage. They can then decide to either block access to that cloud storage or consider integrating it as an official tool after vetting its security.
Post-Quantum Cryptography (PQC)
PQC refers to cryptographic algorithms designed to be secure against the potential future threats posed by quantum computers. Traditional cryptographic algorithms are susceptible to quantum attacks, making PQC vital for future-proofing data security.
Symmetric Cryptography:
- Susceptibility: Fairly resilient, but not immune.
- Quantum Threat: Grover's algorithm can reduce the effective key length by half. For instance, a 256-bit key against a quantum computer is equivalent in strength to a 128-bit key against classical computers.
A 256-bit key provides 2^128 times the strength of a 128-bit key. Double the key length isn't doubling the strength
Asymmetric Cryptography:
- Susceptibility: Highly vulnerable.
- Quantum Threat: Shor's algorithm can compromise public-key algorithms like RSA and those based on the discrete logarithm problem (including Elliptic Curve Cryptography).
- Scaling Issue: Simply doubling key length only multiplies security by a factor of eight. This isn't a long-term solution.
Lattice-based Cryptography:
- Resilience: Promising as a quantum-resistant cryptographic method.
- Foundation: Based on the shortest vector problem and the closest vector problem.
- Significance: Lattice-based schemes are predominant in research regarding post-quantum cryptography, offering hope for secure communication in a quantum world.
- Lattice Definition: In mathematics and cryptography, a lattice is a regular grid or array of points in multidimensional space.
- For visualization: Try searching "mathematical lattice 3D" on Google Images for illustrative examples.
Key Takeaway for CISSP Exam:
When considering quantum-resistant cryptography, think "lattice-based."
CASB: Cloud Access Security Broker
CASB stands for Cloud Access Security Broker. Think of it as a security guard for your cloud services. It's a tool that can be set up either right at your location (on-premises) or in the cloud itself. While there are many types of CASBs out there, their main job is to combat "shadow IT" - those sneaky, unauthorized uses of technology within an organization.
Example: Imagine an employee using an unapproved cloud storage service to store company data. A CASB could detect this activity and either block access to that service or alert the IT department about the violation.