Supply Chain & Threat Modeling
Supply Chain Risks
Supply Chain Evaluation
-
Onsite Assessment: This includes visiting the organization, interviewing people, and observing their operating habits to ensure they meet safety and security standards.
-
Document Exchange and Review: Analyze how an organization manages information exchange and conducts assessments and reviews.
-
Process/Policy Review: Request and review the vendor's security policies, processes, and procedures to ensure they align with your organization's standards.
-
Third-party Audit: Enlist an independent auditor to provide an unbiased review of the vendor's security infrastructure.
Threat Modeling
-
Assets: Uses asset valuation results to identify threats to the most valuable assets.
-
Attackers: Identify potential attackers and threats based on the attackers' goals.
-
Software: Considers potential threats against the software the organization develops.
Risk Management Frameworks (RMF)
NIST 800-37
NIST 800-37: By the National Institute of Standards and Technology, a non-regulatory US agency.
-
Categorize Info Systems: Understand and label systems based on their security needs.
-
Selecting Security Controls: Choose necessary controls to mitigate identified risks.
-
Implement Security Controls: Put the selected controls into action within the systems.
-
Assess Security Controls: Regularly check and validate the effectiveness of the controls.
-
Authorize Security Controls: Ensure the controls adhere to organizational policies.
-
Monitor Security Controls: Continuously oversee and report on the performance of security controls.
Some references include a 7th1st step: "Prepare to execute the RMF". However, this isn't part of the CISSP syllabus.
STRIDE
-
Spoofing: This involves falsifying identity, such as presenting as another user or system.
-
Tampering: This involves data manipulation or unauthorized changes in the system.
-
Repudiation: This is staging an attack in such a way that the attacker can deny their involvement.
-
Information Disclosure: This involves unauthorized access to information.
-
Denial of Service (DoS): This refers to attacks aimed at making a system unavailable or inaccessible.
-
Elevation of Privilege: This involves unauthorized increases in privilege or access within the system.
Spoofing is about false identity, while repudiation is the denial of actions post-attack.
PASTA
-
Definition of Objectives: Establishing clear objectives for threat modeling.
-
Definition of Technical Scope: Identifying the systems, applications, and data to be protected.
-
Application Decomposition & Analysis: Breaking down the application into its components and analyzing each for potential vulnerabilities.
-
Threat Analysis: Identifying potential threats to the system.
-
Weakness & Vulnerability Analysis: Identifying and analyzing the weaknesses and vulnerabilities that can be exploited by the threats.
-
Attack Modeling & Simulation: Modeling potential attack vectors and simulating their impacts.
-
Risk Analysis & Management: Evaluating the risks posed by the identified threats and developing strategies to manage them.
VAST
DREAD
-
Damage Potential: How severe could the damage be if the threat is realized?
-
Reproducibility: How easy is it for attackers to reproduce the exploit?
-
Exploitability: How difficult is it to perform the attack?
-
Affected Users: What percentage of users (internal or external) are likely to be affected by the attack?
-
Discoverability: How difficult is it for an attacker to discover this weakness? A significant weakness 7-8 layers deep with defense in depth may not be as big of a deal
A major weakness 7-8 layers deep with defense might not be as concerning.
TRIKE
COBIT
-
Meeting Stakeholder Needs: Ensuring the organization meets the needs of stakeholders.
-
Covering the Enterprise End-to-End: Considering the full scope of the enterprise.
-
Applying a Single, Integrated Framework: Implementing a centralized, coordinated approach.
-
Enabling a Holistic Approach: Taking into account all aspects of the organization.
-
Separating Governance from Management: Differentiate oversight from daily operations.
COBIT distinguishes between governance (strategy and oversight) and management (daily tasks).