Introduction & New Concepts
Introduction to Key Concepts
We will cover, at a high level, the following concepts which will be required on the exam:
3.1 - Research, Implement, and Manage Engineering Processes Using Secure Design Principles
Traditional Concepts:
-
Threat Modeling: Systematic approach of identifying, assessing, and mitigating potential vulnerabilities in a system.
-
Least Privilege: Grant users the minimal levels of access or permissions they need to perform their work.
-
Defense in Depth: Multilayered security approach designed to provide redundancy and mitigate the potential impact of a security breach.
-
Secure Defaults: Configuration settings preset by manufacturers to minimize security risks.
-
Fail Securely: Systems should default to a secure state in the event of a failure.
Contemporary Concepts:
-
Keep It Simple: Simplicity in design reduces the potential for security vulnerabilities.
-
Zero Trust: Security model where every request is fully authenticated, authorized, and encrypted before granting access.
-
Privacy by Design: Integrate data privacy protections from the initial design stages of systems or processes.
-
Trust but Verify: Always verify the legitimacy of information, even from trusted sources.
-
Shared Responsibility: Security is not just the responsibility of one party but should be shared among all stakeholders involved.
3.2 - Understand the Fundamental Concepts of Security Models
3.3 - Select Controls Based on System Security Requirements
3.4 - Understand Security Capabilities of Information
For instance, the application of encryption and decryption techniques to protect data (like TPN).
3.5 - Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
Identifying potential security weaknesses in systems and implementing measures to reduce the risk of these vulnerabilities being exploited.
3.6 - Select and Determine Cryptographic Solutions
This involves choosing appropriate cryptographic techniques based on the system's security requirements.
3.7 - Understand Methods of Cryptanalytic Attacks
These attacks are covered extensively in the Attacks and Countermeasures chapter. Some examples include:
Bruce Force | Ciphertext Only | Known Plaintext | Frequency Analysis |
Chosen Ciphertext | Implementation Attacks | Side-Channel Attacks | Fault Injection |
Timing Attacks | Man-in-the-Middle Attacks | Pass the Hash Attacks | Kerberos Exploitation |
3.8 - Apply Security Principles to Site and Facility Design
3.9 - Design Site and Facility Security Controls
Zero Trust Security
-
User Identity as Control Plane: This shifts the focus from merely securing the network perimeter to treating user identity as the core security element.
-
Assumption of Breach: Zero Trust inherently assumes a potential compromise or breach. It operates on the premise that every request, even those from within the organization, could be a threat.
-
Identity Verification: This involves rigorous identity verification protocols to authenticate each user. For instance, multifactor authentication and strict password policies can be used.
-
Device Management: Only devices compliant with the organization's security standards are allowed access to resources. This may involve ensuring devices are updated, have enabled firewalls, and use antivirus software.
-
Application Management: Only secure, organization-approved applications are permitted access to sensitive data. These applications are regularly scanned and updated to eliminate potential vulnerabilities.
-
Data Protection: Data is encrypted both at rest and in transit to ensure its safety, even if an unauthorized entity were to gain access.
Secure Defaults
A server should come with the minimal set of open ports necessary for its operation, and an application should have all its optional features turned off by default.
Fail Securely
Trust but Verify
Privacy by Design
Applying these principles as part of a layered defense strategy (defense in depth) within a Zero Trust framework helps to ensure privacy while maintaining a robust security posture.
1. Proactive not Reactive
This principle encourages a forward-thinking approach to privacy, where potential issues and privacy breaches are anticipated and prevented before they occur, rather than addressed after the fact.
2. Privacy as Default Setting
Systems should automatically protect users' privacy; individuals shouldn't have to take extra steps to secure their private data. By default, personal data should not be collected or shared without the individual's consent.
3. Privacy Embedded into Design
Privacy is not an afterthought or an add-on feature; it's a core component that should be part of the system's design and architecture from the very beginning.
4. Positive-Sum not Zero-Sum
The positive-sum approach means that privacy and other considerations, like security or usability, can all be achieved in tandem without sacrificing one for the other. The zero-sum approach, by contrast, views privacy and other factors as trade-offs, where improving one would degrade the other.
5. End-to-End Security — Full Lifecycle Protection
This principle mandates the protection of data from the moment it's collected until its final disposition. This means securing it during storage, processing, and transmission, as well as when it is deleted or anonymized.
6. Visibility and Transparency
Organizations must be open and transparent about their data practices, including how data is collected, used, and stored. This principle is often implemented through comprehensive privacy policies and clear user communications.
7. Respect for User Privacy
Keep It Simple Stupid (KISS)
Complexity is the worst enemy of security.—Bruce Schneier
- During the launch, Bob asks Alice, the CEO, to demo the system. She spends 15 minutes to log in, only to get blocked: "Suspicious activity detected."
- In the following weeks, employees become so frustrated with the cumbersome system that they start to bypass it.
- They share passwords, keep themselves permanently logged in, and even start using personal email for official communication.
Despite Bob's high-tech approach, security is now weaker than ever due to non-compliance and workarounds.
A good example of the KISS principle in action is the secure operating system, Qubes OS. The team behind Qubes OS chose Xen for its simplicity, despite the fact that Kernel-based Virtual Machine (KVM) has more features. While KVM may offer more functionalities, its complexity could lead to potential security vulnerabilities, reinforcing why simplicity can be paramount in cybersecurity.