CISCO Cyberops Associate 1 - Cybersecurity Operations Essentials
CIA triad
graph LR; A[Confidenciality]; B[Integrity]; C[Availability]; A --- B; B --- C; C --- A;
- CIA triad (iron triangle): information focus for attack classification:
- Vertex:
- Confidenciality: keep sensitive data private.
- encryption + public key (crypto).
- Integrity: data has not been modified.
- hashing.
- versioning.
- Availability: servers “are alive”.
- Uninterruptible power supply (UPS).
- Load balancers.
- Confidenciality: keep sensitive data private.
- Edges: balance them, too much on a side reduces another:
- solution:
- Design: be careful to balance the 3 edges.
- Infrastructure: spend on the hardware you really need (constraint triangle: cost, scope, time).
- Implementation: apps must be able to work together.
- solution:
- Beyond CIA: “The forth vertex”: user focused: non-repudiation (authentication + authorization).
- Classification and isolation: who, what, where.
- Vertex:
Security approaches
- Defense in depth:
- Security layers:
- Perimeter: firewall, DMZ, edge firewall.
- Network: wireless security.
- Endpoint: host intrussion prevention system (HIPS).
- Application Web Application Firewall (WAF).
- Data: classification, encryption.
- Security layers:
- Least priviledge principle:
- Users (e.g. admins).
- Applications (e.g. connected apps).
- Systems (e.g. cloud).
- Zero trust model: trust no one, trust nothing. Check logs and analytics.
- Users.
- Devices.
- Networks.
- Workloads.
- Data.
Security, tools and practices
SOC analyst primary duties: detect, analyze and respond.
- Threat discovery e.g. (audit logs).
- Incident validation and categorization (triage).
- Incident analysis.
- Containment and remediation.
Tools (for steps 3 and 4):
- Threat Intelligence (TI): saves time, filter noise, speed up triage:
- Threat Intelligence Platform (TIP): isolate down what it may be.
- SIEM (SEM, or SEIM).
- Correlation.
- Run Book Automation (RBA):
- Automate workloads (humans skip boring and repetitive tasks).
Practices:
- Threat hunting: assume the attackers are already in.
- Malware analysis: know behaviour and purpose.
- Reverse engineering: reproduice what you have seen.
- Sliding Window Anomal Detection (SWAD): limited to specific amount of time, to avoid excess of info to analyze.
Threat actor types
- “Triple Threat”:
- Intent && Ability = Threat
- Threat Actor types:
- By goal:
- Cyberterrorist.
- Government/state sponsored.
- Cybercriminal.
- Hacktivists.
- By attack chance:
- Insider
- Users
- Oportunistic
- By goal:
- Know the threat:
- Person, group or organization?
- Motivations?
- Goals?
- “Enemy” or “bad guy”?
Security concepts
- Vulnerabilities: existing weakness to danger.
- Physical (unlocked door).
- Security policies (sharing passwords).
- Manufacturing defects
- Unsecured code (unsigned).
- Threat: potential danger.
- Threat actors.
- Phishing.
- Ransomware.
- Social engineering*.
- Man In The Middle Attack (now called Path attack).
- Exploits: found weakness to danger.
- Denial of service.
- Default passwords.
- Default configuration.
- Risks: chance of exposure to danger.
- Using password and not MFA.
- All user accounts with admin access.
- Using Telnet for remote session.
Risk management methods
- Positive risks / negative risks.
- Can not ignore it → it will become a vulnerability.
- It is assessed:
- Risk scoring: likelihood vs consequences (assets + CIA triangle).
- Risk mitigation (risks should be monitored):
- Risk avoidance (usually not practical).
- Risk sharing (spreading the load).
- Risk acceptance (worry when it happens).
- Risk transfer (insurance, or pass it to another person or team).
CVSS terminology
Common Vulnerabilities Scoring System:
- Open standard, not vendor locked.
- Priority of response.
- Measure of severity instead of risk.
- Metrics:
- Base metric (always there).
- Temporal metric (changes over time).
- Environmental metric (specific scenario).
- Basic metric helps calculate severity, number assign
- Explotability metrics:
- Attack Vector (AV)*.
- Attack Complexity (AC)*.
- Privileges Required (PR)*.
- User Interaction (UI)*.
- Scope (S)*:
- Impact Metrics.
- Confidentiality Impact (C)*.
- Integrity Impact (I)*.
- Availability Impact (A)*.
- Explotability metrics:
- Metrics:
Security deployments
- Security implementations:
- Defense in depth.
- Network security.
- Endpoint security.
- Application security.
- Agent vs Agentless security
- Agent based: software installed on a system.
- Agentless: industry standards, management protocols (poll info).
- Antimalware
- Antivirus: detects known malware.
- Antimalware: detects unknown malware.
- SIEM (Security Information and Event Management): threat intelligence + needs tuning.
- SOAR (Security Orchestrator Automation and Response): correlation from SIEM.
- Log management: logs aggregator, find history.
Access Control models
- Types:
- Descretionary (scaling issues):
- Access is decided by the resource owner for each user.
- Access control point has a list of authorized users.
- Mandatory (non descretionary):
- Top secret, Secret, Classified, Unclassified.
- Not by owner: each resource has a tag, depending on the user permissions, they can see it.
- Role-based:
- Access dependent on your role in your organization.
- Efficient for otganizations and users.
- Users added to (or removed from) multiple groups.
- Attribute-based:
- Access based on user, enviromental, or resource attributes.
- Very granular controls.
- Subtypes:
- Rule based: access set by an administrator who creates the rules (e.g. add time-based elements to access, like working hours).
- AAA:
- Authentication (e.g. Cisco Identity Service Engine): who you are.
- Autorization: what you are allowed to do.
- Accounting: logging.
- Descretionary (scaling issues):
Identify data visibility challenges
- Data visibility challenged:
- what, where, how, why.
- Data visibility challenges on network:
- Lack of realtime security.
- Logs (historical).
- Lack of stuff and tools.
- Lack of information.
- Data visibility challenges on the cloud:
- Assets are short-lived.
- Complexity and scale.
- Difficulty only 2nd to missconfigurations.
- Data visibility challenges on the host:
- Determined adversary.
- Security fails silently.
- Gathering of data.
- Searching of data.
- Data correlation.
Identify data loss from traffic profiles
- Types of data loss on enterprises:
- Unauthorized loss of critical business data.
- “Unintentionally undetectable”.
- Direct data loss.
- Colateral loss.
- Data loss risks:
- Breach of customer data.
- Loss of confidence.
- Maybe not ever knowing it happened or its extent.
- Traffic profile loss:
- Asymmetrical outboind flow: communication traffic is “bigger” in one direction.
- CISCO Firepower Threat Defense system retrieves data for this case.
- Package analysis with Wireshark.
- Asymmetrical outboind flow: communication traffic is “bigger” in one direction.
graph LR; A[fa:fa-computer Computer]; B[fa:fa-computer Computer]; C[fa:fa-computer Wireshark]; D(fa:fa-toggle-on Switch); E[fa:fa-route Router] F[fa:fa-cloud Cloud - FTD] G[fa:fa-laptop Laptop] A --- D; B --- D; C --- D; D --- E; E --- F; F --- G; A --> G; G .-> A;
5-tuple approach to isolate a host
- 5 sets of different values that identifies a TcP/IP connection:
- Source IP address.
- Source port number.
- Destination IP address.
- Destination port number.
- Protocol.
- Valuable to network and cybersecurity:
- Identifies TCP/IP connection.
- Immutable.
- Trackable.
- Key requirements for a secure connection.
Detection Methodologies
- Issues:
- Networks are messy (bad tagging).
- Staff is not fully ready (⏰).
- Visibility (🌊🧊).
- True or False? (false positives).
- Attackers (😈).
- Types:
- Rule-based (🔙, 🔜).
- IPS compares traffic to set of rules, to verify and match.
- e.g. Snort blocks, firewalls, IPS.
- What about traffic that does not match a rule? Permissive approach?
- Behaviour-based (😇, 😈).
- Detection based on what attackers do.
- e.g. unusual download volume, streaming analytics, NGAVs (Next Generation AntiVirus).
- Inconclusive: false positives must be investigated.
- Statistical-based (📈).
- Builds a distributed model for normal behaviour.
- Low probability events flagged.
- Usually added to signature-based detections.
- HIDS (Host-based intrusion detection system), Snort (intrusion detection) and Zeek (network analysis network).
- Rule-based (🔙, 🔜).