CIA Triad:
- Confidentiality (C): Resources should be protected from unauthorized access
- Integrity (I): Resources should be protected from unauthorized modification
- Availability (A): Resource should be accessible to authorized parties
IAAA:
- Identification: Action owner identifies themselves
- Authentication: Action owner proves their identity
- Authorization: The action owner is allowed/disallowed to perform an action
- Auditing: The action owner’s actions are logged
Accounting:
The action owner logs are reviewed for violations
Non-repudiation:
The action owner cannot deny his/her actions
Governance(Not us):
- Decided by C – level(CISO, CFO, etc.) executives
- Sets direction for the organization on the basis of prioritization and decision-making
- Monitors performance and compliance
- Decides risk appetite
Management(Us):
- Plans to implement directions on governance
- Minimize risk to the tolerance level
Principle:
There are 2 types of principles:
- Top Down:
- Works on the directions given by upper management.
- Everything is done with the support of upper management
- Good for the security implementation
- Bottom Up:
- Works on the demands and requests given by staff
- Bad for security.
Standards and Frameworks
There are many security frameworks and standards available for security implementation and guidance for any organization. A few examples are
- PCI DSS: Mostly used for financial organizations that hold payment card-related details.
- COBIT
- ITIL
- ISO 27001
- This is given by the International Organisation of Standards(ISO) for Information Security Management Systems (ISMS).
- Follows a risk-based approach.
- Monitors using PDCA cycle.
- Plan
- Do
- Check
- Act
- ISO 27002: Focuses on the implementation of ISO 27001.
- ISO 27005: Risk management
- ISO 27799: Protection of Personal Health Information (PHI)
Protection Methods
- Defense in Depth
- Multiple layers of security
- Includes physical, administrative, and logical controls
- Physical: Guards, fence, CCTV
- Administrative: Policies and Procedures
- Logical: Firewall, IDPS
- Improves CIA
- Encryption: Makes data unreadable to unauthorized subjects
- Data Hiding: Hides data for unauthorized users
Security Governance Principles
Types of Plan:
- Strategic Plan
- 3 to 5 years
- Decide by Governance
- Plans mission, vision, and goals
- Tactical Plan
- 1 year
- Project Management, Hiring, etc.
- Operational Plan
- Few months
- Comprise of methods to achieve the tactical plan
Laws
There are various types of laws:
- Criminal Law
- Violation of criminal law.
- Evidence should be “Beyond a reasonable doubt”
- Punishment may be in the form of fines, jail or both.
- Civil Law
- Contract Disputes between entities
- Administrative Law
- Laws by government agencies
Regulations
- Computer Fraud and Abuse Act 1986 (CFAA)
Due Care
Mostly a plan to be comply with all applicable regulations and also look if there is any failure to comply any regulation
Due Diligence
It is the effort to maintain the due care. It can include VAPT, security reviews and audits, etc.
Intellectual Property
Copyright
It is mostly for the protection of art or software. It prevents copying the original softwares. It is indicated by © symbol.
Trademark
It is usually logos, names, etc. indicated by ™ symbol and indicated by ® symbol if registered.

Patent
It is used to protect inventions. For eg: Medicines
Trade Secrets
These are the organization’s trade secrets which helps in succeeding them. For eg: A special recipe
Import/Export Restrictions
Third Party Security
- Service Level Agreement (SLA): Agreement to provide certain level of service
- Right to penetration test and audit
Vendor, Consultants, Contractors, Outsourcing and Offshoring
They should at least follow organization security methods.
Acquisitions
One organization has acquired another organization
Divestiture
The organization is split up.
Security Documents
- Policy
- Mandatory
- High level – Not specific to technology
- Comprise of regulatory, advisory and informational points
- Standards
- Mandatory
- Specific use of technology
- Guidelines
- Non mandatory
- Usually contains recommendation on how to implement
- Procedures
- Mandatory
- Low level
- Step by step methods to implement
- Baseline
- Mandatory
- Minimum acceptable requirement
User Security
Personnel/user security is basically securing employees. This can be achieved by:
- Awareness
- Training
- Hiring
- Background checks
- Non Disclosure Agreement
- Termination
- Lock the account, never delete.
Access Control
Categories:
- Administrative
- Policies and procedures
- Regulations
- Training
- Technical
- Hardware, software and firmware
- Encryption
- Physical
- Locks, fences, etc.
- Guard, Dogs, etc.
Types:
- Preventive: Least Privilege, IPS, firewall
- Detective: IDS, CCTV
- Corrective: Antivirus, Patching
- Recovery: DR, Backup
- Deterrent: Fence, Guards
- Compensating
Risk Management
Risk = Threat * Vulnerability
Steps:
- Identification
- Asset
- Tangible: Physical Hardware, Anything you can touch
- Intangible: Data, trade secrets, etc.
- Team
- Scoping
- Tools
- Methods
- Risk Appetite
- Asset
- Assessment
- Quantitative
- Qualitative
- Cost Benefit Analysis
- Mitigation/Transfer/Acceptance/Avoidance
- Risk rejection is not acceptable
Total Risk = Threat * Vulnerability*Asset Value
Qualitative Risk Assessment
Risk Matrix

Quantitative Risk
Risk registers can be used to monitor the risk.
Risk Analysis
Single Loss Expectancy(SLE) = Asset Value(AV) * Exposure Factor(EF)
Annual Loss Expectancy(ALE) = Annual Rate of Occurrence (ARO) * Single Loss Expectancy(SLE)
Key Goal Indicators (KGI)
Defines a measure that tells management whether a goal has been achieved.
Key Performance Indicators (KPI)
Define actions that determine how well the processes are performing to reach the goal.
Key Risk Indicators (KRI)
Metrics that determine the risk organization is facing.
Risk response and mitigation
- Mitigation
- Transfer
- Acceptance
- Avoidance
Update risk registers with mitigations to get the risk to an acceptable level.
Business Continuity Planning
Comprise of:
- Continuity of operations plan
- Crisis communication plan
- Critical infrastructure protection plan
- Cyber incident response
- Disaster Recovery Plan
- Information system contingency plan
- Occupant emergency plan
The NIST 800-34 can be followed as the standard.
Explain benefits of BCP
- Cost of disaster
- Regulatory requirements
- Legal consequences
- Loss of customer trust
Business Impact Analysis
Identify critical and non critical assets
Recovery Point Objective (RPO) – Maximum amount of data the organization can tolerate losing.
Maximum Tolerable Downtime (MTD) – Amount of time mission/business process can be disrupted without causing significant harm.
Recovery Time Objective (RTO) – Maximum length of time it should take to restore normal operations following an outage or data loss.
Work Recovery Time (WRT) – Time required to configure a recovered system.
MTD >= RTO + WRT
Mean Time Between Failures (MTBF) – How long will a new/repaired asset will function.
Mean Time To Repair (MTTR) – How long it takes to recover a failed system.
Minimum Operating Requirement (MOR) – Minimum requirement for our critical system to function.
Threat Intelligence
Set of activities that an organization undertakes to educate itself about changes in the cyber security threat landscape, and adapt security controls based upon threat information.
Mostly available on Open Source platforms.
Approaches:
- Focused on Assets – Protect valuable assets
- Focused on Attackers – Protect the things that attackers want to attack
- Focused on Software – Protect the software
Threat Hunting
Approach to seek Indicators of Compromise (IOC) on network.
IOC can be of various types:
- Unused file, processes
- Log entries
- Unapproved actions
STRIDE
- Spoofing – Falsifying information to gain access
- Tampering – Making unauthorized changes
- Repudiation – Denying having done an action
- Information Disclosure – Revelation of controlled information
- Denial-of-Service – Prevents the use of an asset
- Escalation of Privilege – Elevates capability of under privileged account
Supply Chain Risk Management (SCRM)
Vendor should perform security activities as organization follow in their environment.
Phases:
- Vendor Selection – Request for Proposal (RFP)
- Onboarding – Verification of contracts
- Monitoring – Ensure security is followed.
- Offboarding – Data disposal
Agreements
- Non Disclosure Agreement (NDA)
- Service Level Requirements (SLR)
- Service Level Agreements (SLA) – Penalties
- Memorandum of Understanding (MOU)
- Business Partnership Agreement (BPA)
- Statement of Work (SOW)
Audits and Assessments
- Scope
- Internal Auditors – Reports to executives
- External Auditor
- Gap Analysis
Cloud Audits
SOC Reports

Discover more from Information Security Blogs
Subscribe to get the latest posts sent to your email.
