1. Useful site

  2. Fundamentals

    • Models
    • Anatomy of a service failure

      • eg1: EBS nodes are served by 2 networks, primary (high bandwidth) and replication(low handwidth) network
        • Amazon Cloud 12:47 am on April 21st 2011
        • a network change was implemented to upgrade the capacity of the primary, this is a standard operation known as a traffic shift
        • in this inicident, the traffic incorrectly routed to the low-bandwidth network, causing node to lose replica connections
        • solution: roll back, but the damage had been down
        • many nodes were trying to re-mirror, the free space was quickly consumed
        • solution: stop API calls and block all access between the degraded cluster and the control plane
      • eg2: Codespaces.com was a code-hosting and pm services provider, runnint its complete IT infra in Amazon cloud
        • June the 17th, 2014, came under a distributed denial-of-service attack. The intruders had obtained the login credentials to the company’s Amazon EC2 management console
        • the intruders had permanently deleted everything, the recovery has hopeless
        • the incident highlight some of the key risks when using cloud
    • DSI-07, Certification or Self-Assessment

  3. Guidance

    • indentify governance and risk
      • corporate governance is the set processes, technologies, culture and external mandates that effect the way in which an enterprise is directed and controlled
      • governance model adhere to 5 basice principles:
        • auditing supply chains
        • board/management structrue
        • corporate responsibility
        • transparency and disclosure
        • exercising control
      • risk strategies:
        • avoidance
        • reduction
        • transfer
        • acceptance
      • assessment of 3rd pary
        • incident management
        • business continuity
        • DR
    • comply legal and audit requirements
      • data sovereignty
        • cloud user want to know where their data is stored
        • if personal info is involved
      • ensure cloud electronic docs are discoverable
        • especially around the legal implications of who has possession, custody and control of docs
        • SLA
      • check for compliance issues before 签合同?
        • what obligations affect this service
        • who is responsible for compliance?
        • can the cloud provider demonstrate compliance?
        • what controls are required?
    • manage info and data security
      • data dispersion (IDA: info dispersion algorithm)
      • 6 key elements of info governments:
        • info classification
        • info management policies
        • location and jurisdictinal policies
        • authorizations
        • ownership
        • custodianship
    • provide portability and interoperability
    • physical security
      • eg: DC location选址很重要
    • understand DC operations
    • mange incident response
      • NIST SP800-61
    • max apps security
      • secure SDLC
        • physical security
        • incompatibility
        • access to logs
        • fail-over mechanisms
        • compliance
      • maturity models
        • building security in BSIMM2(maturity model version 2)
        • software assurance (SAMM)
        • systems security engineering capability (SSE-CMM)
      • assurance programme
      • verification
      • construction
      • risks
    • test and monitor apps
      • Multi-tenancy test
        • MT testing addresses the threat of one tenant accessing the data of another tenant on the same platform throught web layer vulnerabilities
      • Inter-VM test
        • Vm testing addresses the deficiencies in virtalization security such as improper implementation of vm zoning and segregation isssues leading to vm attachk across multiple infra tenants
      • Monitor
        • Logs
        • performance
        • malicious use
        • compromise
        • policy violations
    • manage encrytion and keys
      • content aware encryption
        • apply the encryption algorithm to Plain Text data to produce an unstructrued glob of ciphertext
      • format perserving encryption
        • apply the encryption algorithm in such a way that the ciphertext refelect the structure of the original Plain Text
      • MD5
      • key management
        • have a cryptographic engine in which each user is registered in keys associated with their identity are used to automatically encrypt and edcrypt data
    • verify indentity in the cloud
    • control cloud access
      • Authorrization Models: rule based, role based
      • SAML alternatives:
        • SWRL
        • XACML
        • XRBAC
        • KaoS
        • OAUTH
    • implement virtualization
      • hypervisor (hardware -> OS)
    • provide security as a service
    • challenge & solution of cloud security (15 questions)
      • non-traditional steps to move data to the cloud?
        • monitor db and file activity in orcer to detect large internal data migrations
        • monitor data moving to the cloud using URL filters or data loss prevention systmes
      • standatds for single sign on?
        • OAth
        • SMAL
      • 5 basic principles of corporate government?
      • 3 teams for DR?
        • emergency response team
        • crisis management team
        • incident response team
      • what activity includes the cohesive app of policies, guidance and controls?
        • corporate governance
      • 2 reasons for data being classified as confidential and encrypted?
        • regulatory compliance
        • corporate secrecy
      • 4 cloud deployment models?
        • pubic
        • private/community
        • hybird
      • process of stripping sensitive personal info called?
        • definition of data anonymizaton
      • is customer or service provider security monitoring more responsive?
        • the customer will be more responseive because they’re monitoring just their own security alerts, whereas a service provider may be monitoring hundreds or thousands of systems
      • 3 key concerns about security as service?
        • compliance
        • multi-tenancy
        • vendor locking
      • what form of DRM is used to protect mass audience electronic books?
        • consumer digital rights management is the right answer
        • enterprise digital rights management
      • 3 approaches can be used to automate the publication of audit findings?
        • cloud audit
        • cloud trust
        • CYBEX X.1500.
      • 6 elements of data security lifecycle?
        • create
        • store
        • use
        • share
        • archive
        • destroy
      • 5 hypervisor architecture concerns?
        • vm guest hardening
        • hypervisor security
        • inter-VM attacks
        • blind spots
        • performance
        • VM sprawl
        • instance on gaps
        • vm encryption
        • data commingling
        • vm data destruction
        • vm image tampering
        • in-motion vm
      • what technique is used to remove hardware level interoperability concerns?
        • virtualizaion
  4. Architecting

    • SABSA (sherwood applied business security architecture)
      • capture business requirements and determin what security is needed to meet those requirements
    • fast tracker
      • a tool used a a 1st step in capturing business requirements of SABSA
      • stardard: ISO 27002 AND NIST SP800-53
      • attribute sets: single tier and triple tier
    • define SABSA attr
      • security is often defined in terms of Confidentiality, Integrity and Availability
      • SABSA defines 85 common attributes
      • 6 categories: focus of the business outcome which is being protected by the attributes
        • user
        • management
        • operatonal
        • risk
        • technical
        • legal
        • business
      • the business attribute profile describes the risks of business failure and what success look like in terms of risk mitigation
    • cloud attr taxonomy
      • map SABSA attrs to the ENISA risks
      • benifit of cloud:
      • taxonomy: