Lecture 05
Lecture 05
Security Policies
• Technology by itself cannot solve all network security problems. There are
some issues that technology cannot stop.
• Examples include the following:
• Antivirus software won’t prevent a user from manually opening an attachment and
releasing a virus.
• A technologically secured network is still very vulnerable if former employees
(perhaps some unhappy with the company) still have working passwords or if
passwords are simply put on sticky notes on computer monitors.
• A server is not secure if it is in a room that nearly everyone in the company has
access to.
• A network is not secure if end users are vulnerable to social engineering.
Security Policies
• Policies are used to guide you in how to implement and manage security, including
security technology.
• A security policy is a document that defines how an organization will deal with some
aspect of security.
• There can be policies regarding end-user behavior, IT response to incidents, or
specific issues and incidents.
• Security policies can also be created to deal with regulatory requirements. These
types of policies direct members of the organization as to how to comply with
certain regulations.
• Policies can also be simply advisory, suggesting to employees how they should
handle certain items but not requiring compliance.
• For example, a policy might advise users that emailing from a smart phone using a Wi-Fi
hotspot can be unsecure but not forbid it.
• Top Secret - The top secret label is “applied to information, the unauthorized disclosure
of which reasonably could be expected to cause exceptionally grave damage to the
national security that the original classification authority is able to identify or describe.”
• Secret - The secret label is “applied to information, the unauthorized disclosure of which
reasonably could be expected to cause serious damage to the national security that the
original classification authority is able to identify or describe.”
• Confidential - The confidential label is “applied to information, the unauthorized
disclosure of which reasonably could be expected to cause damage to the national
security that the original classification authority is able to identify or describe.”
• Unclassified - Unclassified refers to any data that doesn’t meet one of the descriptions for
top secret, secret, or confidential data.
Defining Data Classifications
• Some nongovernmental
organizations use labels such as
Class 3, Class 2, Class 1, and
Class 0.
• Other organizations use more
meaningful labels such as
confidential (or proprietary),
private, sensitive, and public.
Defining Data Classifications
• Some nongovernmental
organizations use labels such as
Class 3, Class 2, Class 1, and
Class 0.
• Other organizations use more
meaningful labels such as
confidential (or proprietary),
private, sensitive, and public.
Understanding Data States
• Data at Rest - Data at rest (sometimes called data on storage) is any data
stored on media such as system hard drives, solid-state drives (SSDs),
external USB drives, storage area networks (SANs), and backup tapes. •
Strong symmetric encryption protects data at rest.
• Data in Use - Data in use (also known as data being processed) refers to data
in memory or temporary storage buffers while an application is using it.
• Data loss prevention (DLP) systems attempt to detect and block data
exfiltration attempts.
• These systems have the capability of scanning unencrypted data looking for
keywords and data patterns.
• Network-Based DLP - A network-based DLP scans all outgoing data looking for
specific data.
• Administrators place it on the edge of the network to scan all data leaving the
organization.
• If a user sends out a file containing restricted data, the DLP system will detect it and
prevent it from leaving the organization.
• Endpoint-Based DLP An endpoint-based DLP can scan files stored on a system as
well as files sent to external devices, such as printers.
• For example, an organization’s endpoint-based DLP can prevent users from copying
sensitive data to USB flash drives or sending sensitive data to a printer.
• Controlling access to assets is one of the central themes of security, and you’ll find
that many different security controls work together to provide access control.
• In addition to personnel, assets can be information, systems, devices, facilities, or
applications:
• Information - An organization’s information includes all of its data.
• Systems - An organization’s systems include any IT systems that provide one or more services. •
Devices - Devices refer to any computing system, including routers, switches, servers, desktop
computers, portable laptop computers, tablets, smartphones, and external devices such as
printers.
• Facilities - An organization’s facilities include any physical location that it owns or rents. •
Applications - Applications frequently provide access to an organization’s data.
Managing Identification
and Authentication
Managing Identification
and Authentication
• Access control addresses more than just controlling which users can access
which files or services.
• Access is the transfer of information from an object to a subject, which
makes it important to understand the definition of both subject and object.
• Subject - A subject is an active entity that accesses a passive object to receive
information from, or data about, an object.
• Subjects can be users, programs, processes, services, computers, or anything else that can
access a resource
• Object - An object is a passive entity that provides information to active subjects. •
Examples of objects are files, databases, computers, programs, processes, services,
printers, and storage media.
Security Procedures
• Humans are often considered the weakest element in any security solution.
• No matter what physical or logical controls are deployed, humans can
discover ways to avoid them, circumvent or subvert them, or disable them.
• Thus, it is important to take into account the humanity of your users when
designing and deploying security solutions for your environment.
• To understand and apply security governance, you must address the
weakest link in your security chain—namely, people.
Onboarding: Employment Agreements and
Policies
Employee Oversight
• Offboarding is the removal of an employee’s identity from the IAM system once that person has left
the organization.
• Offboarding can also be an element used when an employee transfers into a new job position at
the same organization, especially when they are shifting between departments, facilities, or
geographic locations.
• When a full offboarding is going to occur, this can include disabling and/or deleting the user
account, revoking certificates, canceling access codes, and terminating other specifically granted
privileges.
• It is common to disable accounts of prior employees in order to retain the identity for auditing
purposes for a few months. After the allotted time, if no incidents are discovered in regard to the
ex-employee’s account, then it can be deleted from the IAM completely.
• If the account is deleted prematurely, any logged events that are of a security concern no longer
point to an actual account and thus can make tracking down further evidence of violations more
complicated.
Change Management
Development Policies
• Secure programming:
• All code, especially code written by outside parties (contractors, consultants, and so on) must
be checked for backdoors/Trojan horses.
• All buffers must have error handling that prevents buffer overruns.
• All communication (such as using TCP sockets to send messages) must adhere to your
organization’s secure communications guidelines.
• Any code that opens any port or performs any sort of communication needs to be thoroughly
documented, and the IT security unit must be apprised of the code, what it will do, and how it
will be used.
• All input should be filtered for items that might facilitate an attack, such as an SQL injection
attack.
• Every vendor should supply you with a signed document verifying that there are no security
flaws in its code.