Chapter -5 Security Operations
Last updated
Last updated
Data Security
Create: This is the initiation stage where data is generated or collected. It could be user-generated content, transaction records, sensor data, or any form of data that is being recorded or created for a specific purpose.
Store: After data is created, it needs to be stored securely in a system, database, or file storage for future access. The storage method will depend on factors like the type of data, security requirements, and access needs.
Share: In this phase, data is distributed or shared with authorized users, systems, or other stakeholders. This could involve sending data between departments, sharing with third parties, or making it accessible to users or applications.
Use: Data is accessed and processed to derive insights, make decisions, or perform tasks. This is where the data serves its purpose, whether itâs used in a report, decision-making, or operational processes.
Modify: Over time, data may need to be updated, edited, or enriched to ensure it remains relevant and accurate. This could involve correcting errors, adding new information, or refining data to meet changing needs.
Archive: When data is no longer actively used but must be retained for compliance, historical analysis, or other reasons, it is archived. Archived data is typically stored in a less accessible form but still preserved for future reference.
Destroy: Finally, when data is no longer needed, and retaining it poses a risk or is no longer required, it is securely destroyed. This ensures that sensitive or unnecessary data is permanently eliminated from systems to prevent unauthorized access or misuse.
Each step of this process is crucial for ensuring data is managed efficiently, securely, and in compliance with applicable regulations.
Compromise of data with this sensitivity label could possibly put the organizationâs future existence at risk. Compromise could lead to substantial loss of life, injury or property damage, and the litigation and claims that would follow.
Symmetric Encryption: A type of encryption where the same key is used for both the encryption of data (turning it into ciphertext) and the decryption of that data (converting it back to its original form). Both the sender and the receiver must have the same secret key, which must be kept confidential. Examples include AES and DES.
Asymmetric Encryption: A type of encryption that uses a pair of keys: one public key for encrypting data and one private key for decrypting it. The public key can be shared openly, while the private key remains secret and is only known to the recipient. The keys are mathematically related but cannot be derived from one another. Examples include RSA and ECC.
Five functions of a cryptographic hash:
Useful: It is easy to compute the hash value for any given message.
Nonreversible: It is computationally infeasible to reverse the hash process or otherwise derive the original plaintext of a message from its hash value (unlike an encryption process, for which there must be a corresponding decryption process).
Content integrity assurance: It is computationally infeasible to modify a message such that re-applying the hash function will produce the original hash value.
Unique: It is computationally infeasible to find two or more different, sensible messages that hash to the same value.
Deterministic: The same input will always generate the same hash, when using the same hashing algorithm.
Ingress refers to incoming network traffic, and ingress monitoring tools help track and secure data entering a network. Here's how the listed tools fit into ingress monitoring:
Firewalls: Monitor and control incoming network traffic based on predetermined security rules. They log any suspicious or unauthorized access attempts.
Gateways: Serve as entry points between different networks, often providing an additional layer of filtering or monitoring of incoming data. They can log and control access to specific services or applications.
Remote Authentication Servers: These servers authenticate users trying to access a network remotely. They log authentication attempts, including successful and failed login attempts, and are used to monitor potential unauthorized access.
IDS/IPS Tools (Intrusion Detection/Prevention Systems):
IDS detects potential malicious activity on the network by analyzing incoming traffic for known attack patterns and logging those events.
IPS not only detects but also actively blocks or prevents suspicious activity.
SIEM Solutions (Security Information and Event Management): SIEM tools aggregate, correlate, and analyze logs from various network devices (firewalls, IDS/IPS, servers, etc.) to identify security incidents, vulnerabilities, or policy violations.
Anti-malware Solutions: These tools monitor incoming data for known malware signatures, logging detected threats, and providing information about the type of threat and actions taken.
Egress refers to outgoing network traffic. Egress monitoring tools help track and control what data leaves the network. Here's how the listed data types relate to egress monitoring:
Email (Content and Attachments): Monitoring outbound email communications, including both the content and any attached files, to ensure that sensitive or unauthorized information isn't being sent outside the organization.
Copy to Portable Media: Tracking the movement of data to portable storage devices (e.g., USB drives or external hard drives). This is important for ensuring that sensitive data is not removed from the network without proper authorization.
File Transfer Protocol (FTP): Monitoring FTP sessions for the transfer of files from within the network to external locations. This includes logging which files are transferred and who initiated the transfer.
Posting to Web Pages/Websites: Monitoring when users post data (such as documents or personal information) to external websites or web pages, ensuring that no confidential or unauthorized information is shared online.
Both ingress and egress monitoring are crucial for maintaining network security and ensuring compliance with data protection policies.
Configuration management involves managing and maintaining the consistency of a systemâs performance, functionality, and design throughout its lifecycle. The listed procedures are key steps in this process:
Identification: This involves identifying and documenting all the components of the system, including hardware, software, and their configurations. This step ensures that all assets are recognized and tracked.
Baseline: A baseline is a reference point in the system's configuration. It defines the standard or approved version of system components and configurations. Baselines are established for the system's state at specific points in time, allowing comparison with future changes.
Change Control: This is the process of managing changes to the system configuration. It ensures that any proposed changes are properly reviewed, approved, and documented to avoid introducing risks or instability into the system.
Verification & Audit: After changes are made, it is important to verify that the system remains consistent with the defined baselines and meets the required standards. Audits are conducted to ensure compliance with configuration management policies and procedures.
Inventory: This refers to maintaining a comprehensive list of all system components, both hardware and software. The inventory is the foundation of configuration management, ensuring that every item is accounted for and properly tracked.
Data handling refers to the process of collecting, storing, managing, processing, and securing data throughout its lifecycle. It involves various activities, such as data creation, storage, sharing, modification, archiving, and destruction, with an emphasis on ensuring data security, privacy, and compliance with applicable regulations.
âĸ Classify âĸ Categorize âĸ Label âĸ Store âĸ Encrypt âĸ Backup âĸ Destroy
BYOD refers to a policy or practice where employees are allowed to bring and use their personal device such as smartphones, laptops, tablets, or desktops on their employer's network to access company resources, applications, or data.
BYOD policies are intended to provide flexibility, increase productivity, and reduce costs, as employees use devices they are already familiar with. However, it also introduces potential security risks, such as data breaches or unauthorized access, which need to be managed through strict security protocols like encryption, mobile device management (MDM), and access control measures.
Possible devices on the bring your own device (BYOD) policy: âĸ Cell phone âĸ Tablet âĸ Laptop âĸ Smartwatch âĸ Bluetooth devices
Privacy policies are formal statements that outline how an organization collects, uses, stores, and protects personal data. They are intended to inform individuals about their privacy rights and ensure the organization complies with relevant legal and regulatory requirements. Privacy standards are frameworks and guidelines designed to help organizations manage and protect personal data effectively. These standards provide specific rules for protecting the privacy of individuals and ensuring that organizations handle data responsibly and securely.
Change management is a structured approach to managing changes within an organization. It ensures that changes are made in a controlled and systematic manner to minimize disruptions, reduce risks, and ensure the desired outcome. The change management policy typically consists of three major activities:
Deciding to Change:
This involves identifying the need for change, evaluating the potential impact, and obtaining the necessary approvals to proceed. It includes assessing risks, defining objectives, and determining whether the change aligns with organizational goals.
Making the Change:
This step involves implementing the change according to a planned and approved process. It may include developing the change, testing it, and deploying it in a controlled manner to minimize disruptions to the business operations.
Confirming that the Change Has Been Correctly Accomplished:
After the change is implemented, this phase involves verifying that the change has been successfully completed and that it meets the defined objectives. It includes testing, monitoring, and auditing to ensure the desired results are achieved and that the change has not caused any unintended issues.
By following this structured approach, organizations can ensure that changes are managed efficiently, risks are minimized, and the integrity of systems or processes is maintained.
An Acceptable Use Policy (AUP) in cybersecurity is a set of rules and guidelines that define how an organization's IT resources, such as networks, systems, and data, should be used by employees, contractors, or other users. It ensures security, compliance, and responsible usage while mitigating risks such as cyber threats, data breaches, and unauthorized access.
Authorized Use: Specifies who is allowed to access the organization's IT resources and for what purposes.
Prohibited Activities: Lists actions that are not permitted, such as accessing unauthorized data, downloading malicious software, or using the network for illegal activities.
Data Protection: Outlines how users should handle sensitive or confidential data, including encryption, sharing restrictions, and reporting breaches.
Device and Network Security: Defines acceptable usage of company-owned and personal devices, password policies, and VPN or remote access rules.
Email & Internet Usage: Specifies guidelines for using corporate email, web browsing restrictions, and social media policies.
Monitoring & Privacy: States that the organization may monitor user activities on its network for security and compliance purposes.
Consequences of Violations: Details disciplinary actions for policy breaches, such as warnings, account suspension, or termination.
A well-defined AUP helps protect an organization's IT infrastructure, ensures regulatory compliance (e.g., ISO 27001, GDPR, HIPAA), and minimizes cybersecurity risks.