0% found this document useful (0 votes)
11 views16 pages

SY0 601 Session 2

The document discusses the benefits of virtualization in IT, highlighting increased agility, flexibility, and cost savings. It covers various aspects of information security, including roles, controls, policies, and frameworks such as NIST and ISO standards. Additionally, it emphasizes the importance of collaboration in IT operations and the establishment of security operations centers to protect critical information assets.

Uploaded by

Essam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views16 pages

SY0 601 Session 2

The document discusses the benefits of virtualization in IT, highlighting increased agility, flexibility, and cost savings. It covers various aspects of information security, including roles, controls, policies, and frameworks such as NIST and ISO standards. Additionally, it emphasizes the importance of collaboration in IT operations and the establishment of security operations centers to protect critical information assets.

Uploaded by

Essam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Virtualization can increase IT agility, flexibility and

scalability while creating significant cost savings. Greater


workload mobility, increased performance and availability
of resources, automated operations – they’re all benefits of
virtualization that make IT simpler to manage and less
costly to own and operate.
Software
 Vmware
 Virtualbox

1. Lesson 1: Comparing Security Roles and Security Controls


 Compare and Contrast Information Security Roles
 Compare and Contrast Security Control and Framework Types
Information security (or infosec) refers to the protection of data resources from
unauthorized access, attack, theft, or damage. Data may be vulnerable because of
the way it is stored, the way it is transferred, or the way it is processed. The systems
used to store, transmit, and process data must demonstrate the properties of security
Secure information has three properties, often referred to as the :
 means that certain information should only be known to certain
people.
 means that the data is stored and transferred as intended and that any
modification is authorized.
 means that information is accessible to those authorized to view or
modify it.

Some security models and researchers identify other properties that secure systems
should exhibit. The most important of these is non-repudiation.
means that a subject cannot deny doing something, such as creating, modifying, or
sending a resource. For example, a legal document, such as a will, must usually be
witnessed when it is signed. If there is a dispute about whether the document was
correctly executed, the witness can provide evidence that it was.
IT professionals working in a role with security responsibilities must be competent in

a wide range of disciplines, from network and application design to procurement and

human resources ( ). The following activities might be typical of such a role:

Participate in risk assessments and testing of security systems and make


recommendations.
Specify, source, install, and configure secure devices and software.
Set up and maintain document access control and user privilege profiles.
Monitor audit logs, review user privileges, and document access controls.
Manage security-related incident response and reporting.
Create and test business continuity and disaster recovery plans and procedures.
Participate in security training and education programs.
A is a formalized statement that defines how security will be

implemented within an organization. It describes the means the organization will

take to protect the confidentiality, availability, and integrity of sensitive data and

resources. It often consists of multiple individual policies. The implementation of a

security policy to support the goals of the might be very different for a school

a multinational accountancy firm, or a machine tool manufacturer. However, each of

these organizations, or any other organization (in any sector of the economy, whether

profit-making or non-profit-making) should have the same interest in ensuring that its

employees, equipment, and data are secure against attack or damage.

As part of the process of adopting an effective organizational security posture,

employees must be aware of their responsibilities. The structure of security

responsibilities will depend on the size and hierarchy of an organization, but these

roles are typical.

 Overall internal responsibility for security might be allocated to a dedicated


department, run by a (CSO) or

(CISO). Historically, responsibility for security

might have been allocated to an existing business unit, such as

(ICT) or accounting.
However, the goals of a network manager are not always well-aligned with the
goals of security; network management focuses on availability over confidentiality.
Consequently, security is increasingly thought of as a dedicated function or business
unit with its own management structure.

 Managers may have responsibility for a domain, such as building control, ICT, or
accounting.

 Technical and specialist staff have responsibility for implementing, maintaining,


and monitoring the policy. Security might be made a core competency of systems
and network administrators, or there may be dedicated security administrators. One
such job title is (ISSO).

 Non-technical staff have the responsibility of complying with policy and with any
relevant legislation.

 External responsibility for security (due care or liability) lies mainly with directors
or owners, though again it is important to note that all employees share some
measure of responsibility.
A security operations center (SOC) is a location where security professionals

monitor and protect critical information assets across other business functions, such

as finance, operations, sales/marketing, and so on. Because SOCs can be difficult to

establish, maintain, and finance, they are usually employed by larger corporations, like

a government agency or a healthcare company.


Network operations and use of cloud computing make ever-increasing use of

automation through software code. Traditionally, software code would be the

responsibility of a programming or development team. Separate development and

operations departments or teams can lead to silos, where each team does not work

effectively with the other.

is a cultural shift within an organization to

encourage much more collaboration between developers and system administrators.

By creating a highly orchestrated environment, IT personnel and developers can build,

test, and release software faster and more reliably. Many consider a DevOps approach

to administration as the only way organizations can take full advantage of the potential

benefits offered by cloud service providers


A dedicated (CIRT)

(CSIRT) (CERT) as a single point-of-

contact for the notification of security incidents. This function might be handled by the

SOC or it might be established as an independent business unit.


Information and cybersecurity assurance is usually considered to take place within

an overall process of business risk management. Implementation of cybersecurity

functions is often the responsibility of the IT department. There are many different

ways of thinking about how IT services should be governed to fulfill overall business

needs. Some organizations have developed IT service frameworks to provide best

practice guides to implementing IT and cybersecurity. These frameworks can shape

company policies and provide checklists of procedures, activities, and technologies that

should ideally be in place. Collectively, these procedures, activities, and tools can be

referred to as security controls.

A is something designed to make give a system or data asset the

properties of confidentiality, integrity, availability, and non-repudiation. Controls can be

divided into three broad categories, representing the way the control is implemented:

—the control is implemented as a system (hardware, software, or

firmware). For example, firewalls, anti-virus software, and OS access control models

are technical controls. Technical controls may also be described as logical controls.

—the control is implemented primarily by people rather than systems.

For example, security guards and training programs are operational controls rather

than technical controls.


—the control gives oversight of the information system. Examples could

include risk identification or a tool allowing the evaluation and selection of other

security controls.
Security controls can also be classified in types according to the goal or function they

perform:

 —the control acts to eliminate or reduce the likelihood that an attack can

succeed. A preventative control operates before an attack can take place. IPS or Access

control lists (ACL) configured on firewalls and file system objects are preventative-

type controls. Anti-malware software also acts as a preventative control, by blocking

processes identified as malicious from executing. Directives and standard operating

procedures (SOPs) can be thought of as administrative versions of preventative

controls.

 —the control may not prevent or deter access, but it will identify and

record any attempted or successful intrusion. A detective control operates during

the progress of an attack. Logs provide one of the best examples of detective-type

controls.or IDS

 —the control acts to eliminate or reduce the impact of an intrusion

event. A corrective control is used after an attack. A good example is a backup

system that can restore data that was damaged during an intrusion. Another

example is a patch management system that acts to eliminate the vulnerability

exploited during the attack.

While most controls can be classed functionally as preventative, detective, or

corrective, a few other types can be used to define other cases:


 —Controls such as alarms, gateways, locks, lighting, security cameras, and
guards that deter and detect access to premises and hardware are often classed
separately.
 —The control may not physically or logically prevent access, but
psychologically discourages an attacker from attempting an intrusion. This could
include signs and warnings of legal penalties against trespass or intrusion.
 —The control serves as a substitute for a principal control, as
recommended by a security standard, and affords the same (or better) level of protection
but uses a different methodology or technology.
NIST, IEEE, IOS

The International Organization for Standardization ( ) has produced a cybersecurity


framework in conjunction with the International Electrotechnical Commission ( )

ISO 27001 is part of an overall 27000 series of information security standards, also known
as 27K
NIST Cybersecurity Framework
A cybersecurity framework ( ) is a list of activities and objectives undertaken to
mitigate risks. The use of a framework allows an organization to make an objective
statement of its current cybersecurity capabilities, identify a target level of capability,
and prioritize investments to achieve that target. This is valuable for giving a structure
to internal risk management procedures and provides an externally verifiable
statement of regulatory compliance. Frameworks are also important because they save
an organization from building its security program in a vacuum, or from building the
program on a foundation that fails to account for important security concepts.
There are many different frameworks, each of which categorize cybersecurity activities
and controls in slightly different ways. These frameworks are non-regulatory in the
sense that they do not attempt to address the specific regulations of a specific industry
but represent "best practice" in IT security governance generally. Most organizations
will have historically chosen a particular framework; some may use multiple
frameworks in conjunction.
Most frameworks are developed for an international audience; others are focused on
a domestic national audience. Most of the frameworks are associated with certification
programs to show that staff and consultants can apply the methodologies successfully.
The National Institute of Standards and Technology ( ) Cybersecurity Framework
( ) is a relatively new addition to the IT governance space and distinct from other
frameworks by focusing exclusively on IT security, rather than IT service provision more
generally (nist.gov/cyberframework). It is developed for a US audience and focuses
somewhat on US government, but its recommendations can be adapted for other
countries and types of organizations.

NIST's Risk Management Framework ( ) pre-dates the CSF. Where the CSF focuses
on practical cybersecurity for businesses, the RMF is more prescriptive and principally
intended for use by federal agencies (csrc.nist.gov/projects/risk-management/rmf-
overview).
As well as its cybersecurity and risk frameworks, NIST is responsible for issuing the
Federal Information Processing Standards ( ) plus advisory guides called Special
Publications (csrc.nist.gov/publications/sp). Many of the standards and technologies
covered in CompTIA Security+ are discussed in these documents.

International Organization for Standardization (ISO) 27K


The International Organization for Standardization ( ) has produced a cybersecurity
framework in conjunction with the International Electrotechnical Commission ( ). The
framework was established in 2005 and revised in 2013. Unlike the NIST framework,
the ISO 27001 Information Security Management standard must be purchased
(iso.org/standard/54534.html). ISO 27001 is part of an overall 27000 series of
information security standards, also known as 27K. Of these, 27002 classifies security
controls, 27017 and 27018 reference cloud security, and 27701 focuses on personal
data and privacy.
ISO 31K
Where ISO 21K is a cybersecurity framework, ISO 31K (iso.org/iso-31000-risk-
management.html) is an overall framework for enterprise risk management ( ).
considers risks and opportunities beyond cybersecurity by including financial,
customer service, competition, and legal liability factors. ISO 31K establishes best
practices for performing risk assessments.

The not-for-profit organization Cloud Security Alliance ( ) produces various


resources to assist cloud service providers ( ) in setting up and delivering secure
cloud platforms. These resources can also be useful for cloud consumers in evaluating
and selecting cloud services.
Security Guidance (cloudsecurityalliance.org/research/guidance)—a best practice
summary analyzing the unique challenges of cloud environments and how on-
premises controls can be adapted to them.
Enterprise reference architecture (ea.cloudsecurityalliance.org)—best practice
methodology and tools for CSPs to use in architecting cloud solutions. The
solutions are divided across a number of domains, such as risk management and
infrastructure, application, and presentation services.
Cloud controls matrix (cloudsecurityalliance.org/research/working-groups/cloud-
controls-matrix)—lists specific controls and assessment guidelines that should be
implemented by CSPs. For cloud consumers, the matrix acts as a starting point
for cloud contracts and agreements as it provides a baseline level of security
competency that the CSP should meet.

You might also like