#CompTIA Security+ 501 exam Chapter03 Implementing Security Policies and Procedures
Posted by Superadmin on November 16 2018 13:55:35

Implementing Security Policies and Procedures

 

In this chapter we will look at different frameworks and guides and how to best dispose of data, we will start off look at frameworks and reference architecture and guides.

We will cover the following exam objectives in this chapter:

 

 

Industry standard frameworks and reference architecture

 

Industry standard frameworks are a set of criteria within an industry relating to carrying out operations known as best practices; this is the best way that the operations should be set up and carried out. Best practice produces better results than a standard way of setting up the operations.

These industry standard frameworks are carried out by all members of that industry. In networking, the International Standard Organization (ISO) is responsible for the industry framework within communications and the IT industry. The ISO is a body comprised of international standards bodies that mainly look at communication.

Reference architecture is a document or a set of documents to which a project manager or other interested party can refer to for best practices; this will include documents relating to hardware, software, processes, specifications, and configurations, as well as logical components and interrelationships.

ISO/IEC 17789:2014 specifies the cloud computing reference architecture (CCRA). The reference architecture includes the cloud computing roles, cloud computing activities, and the cloud computing functional components and their relationships.

 

 

OSI reference model

 

ISO developed the Open Systems Interconnection model (OSI model). It is a conceptual model that standardizes the communication functions of a telecommunications or computing system, without regard to its internal structure and technology.

The purpose of the OSI reference model is to provide guidance to vendors and developers so that products they develop can communicate with one another.

The OSI reference model is a seven-layer model, and each layer provides specific services. The CompTIA Security + exam focuses mainly on layers 2, 3, and 7:

Layer

Description

Purpose

Packet structure

Devices

7

Application

The applications are windows sockets, such as HTTP for web browsers or SMTP for email.

 

 

6

Presentation

Formats data into a character format that can be understood. It can also encrypt data.

 

 

5

Session

Responsible for logging in and out.

 

 

4

Transport

TCP—connection orientated; UDP—connectionless

Datagrams

 

3

Network

Responsible for Internet Protocol (IP) addressing and packet delivery

Packets

Layer 3 switch

router

2

Data link

Works with Media Access Control (MAC) addresses. Checks for transmission errors from incoming data and regulates the flow of data

Frames

Switch

VLAN

IPSec

ARP

1

Physical

Transmits data in raw format bits over a physical medium (cables)

Bits

Hub repeater

Exam tip:
Although Security+ is not a networking exam, you must ensure that you are familiar with devices that operate at layers 2, 3, and 7. These will be covered fully in Chapter 5, Understanding Network Components, of this book.

 

 

TCP/IP model

 

The TCP/IP Protocol is the protocol or language used in modern communications; it is the only protocol used by the internet. The TCP/IP model is derived from the OSI reference model, and it is a four-layer model:

Layers

TCP/IP model layers

Corresponding OSI layers

4

Application

Application, presentation, and session

3

Transport

Transport

2

Internet

Network

1

Network

Data link and physical

 

 

Types of frameworks

 

There are different types of frameworks covered in the Security + exam, and these are listed here:

 

 

Benchmarks/secure configuration guides

 

Every company faces the challenge of protecting its servers and computers from an ever-increasing cyber security threat. There are many different types of servers: web servers, email servers, and database servers, and each of these has different configurations and services, so the baselines are different for each type of server. Vendors and manufacturers will provide platform/vendor guides so that their product can be configured as per their own best practices so that they perform as best they can.

Exam tip: Policies are written so that the security administrator knows what to configure, and end users know what part they play in keeping the company secure.

 

 

Policies and user guides

 

The management team will create policies that need to be adhered to by all employees, and these policies are created to help reduce the risk to the business and are mandatory; failure to carry out these policies is called policy violation and may lead to disciplinary action:

If a policy was created so that Data Loss Prevention (DLP) templates were created to prevent Personally Identified Information (PII) or sensitive data being emailed out of the company, hen the Security Administrators would know exactly what to so.

The purpose of policies is to ensure that the security administrator knows what tasks they need to perform and also that end users know what their responsibilities are within each policy. Policies are an administrative control to help reduce risk.

Exam tip:
The auditor is the snitch: they won't ever stop a process, but they always inform the management of non-compliance to company policies. The outcome following an audit will result in either change management or a new policy being written.

Change management requests are sent to a Change Management Board (CMB). The board looks at the change request, what the financial implications are, and how changing one process affects other processes. If the change is really major, then a new policy could be written rather than just change management.

Example: New laptops are being purchased and configured for use within the company. The auditor is reviewing the process and finds that there is no anti-virus software being installed on these laptops; therefore, they report this back to management. Management then looks at the processes that are laid down for configuring new laptops and then uses change management to change the processes so that in future anti-virus software is installed before rolling them out to the rest of the company.

 

 

Security configuration guides – web servers

 

There are two main web servers used by commercial companies. Microsoft has a web server called the Internet Information Server, and its rival is Apache. Web servers provide web pages for the public to view, and, because they are in the public domain, they are a prime targets for hackers. To help reduce the risk, both Microsoft and Apache provide security guides to help security teams reduce their footprint, making them more secure:

https://msdn.microsoft.com/en-gb/library/zdh19h94.aspx

Web server security guides rely upon the latest updates being in place, services that are not required being turned off, and the operating systems to be hardened, to make them as secure as possible and reduce the risk of attack.

 

 

Network infrastructure device user guides

 

CISCO produce the best high-end network devices, and, because the networking world is ever evolving, CISCO has produced an infrastructure upgrade guide so that companies can use it as a best practice when upgrading their network device. It can be seen at https://www.cisco.com/c/m/en_us/solutions/enterprise-networks/infrastructure-upgrade-guide.html.

 

 

General purpose guides

 

Security is critical for providing a safe working environment, and we now need to look at guidelines for vendor diversity, control diversity, technical controls, administrative controls, and the benefits of user training:

If we purchase the two firewalls from Vendor A, we may also have two firewalls from Vendor B with the same configuration kept in a secure area within your company. Should there be a failure with one of the firewalls or a vulnerability with the Vendor A firewall, then we can then quickly swap those with the firewalls from Vendor B. This ensures that the network remains secure at all times.

 

 

Implementing data security and privacy practices

 

One of the most critical areas in data security is the storing, accessing, and destroying of data when it is no longer required. In this section, we will look at the types, control, and destruction of data.

 

 

Destroying data and sanitizing media 

 

Data is controlled, handled, and stored based on its classification and privacy markings. Once this data has outlived its use, it needs to be destroyed so that it cannot be read by a third party. Data can be stored electronically on a computer's hard drive or kept as a hard copy by being printed. Most companies employ a third-party organization that specializes in data destruction and can provide a destruction certificate. Let's look at the different methods of destruction:

Destruction of hard drives can also be done by shredders that destroy the hard drive into smaller chunks. Take a look at the preceding photo, which shows the results of hard-drive shredding. Some hard-drive shredders can shred hard drives into much smaller chunks.

 

 

Data sensitivity labeling and handling

 

Securing and handling data is a critical part of security, as companies spend so much money completing the Research and Development (R&D) of a product because they don't want their competitors to know about their new product until it goes on the market. It is very important that the data is labeled according to its classification. Military data in the UK army is classified as unclassified, restricted, confidential, secret, and top secret, whereas a civilian company may classify data as confidential, private, public, and proprietary.

The first stage of risk management is classification of the asset, which determines how we handle, access, store, and destroy the data:

 

 

Data retention – legal and compliance

 

Data is retained either for legal reasons or to be compliant with statute law, which could be either the length of time the data should be retained or the national boundaries that data must be stored within. Multinational companies cannot just simply move data between national boundaries, as compliance forbids it:

 

 

Data roles

 

Everyone within a company will access data every day, but the company needs to control access to the data, and this is done by using data roles; we are now going to look at these roles:

 

 

Practical – creating a baseline

 

In this practical, we will download the Microsoft Baseline Security Analyzer (MBSA) tool, and then we will run the tool to see what missing patches and vulnerabilities it may have. The Windows 10 desktop that this demo will be run on has only recently had the latest update (two days ago):

  1. Go to Google and insert the latest MBSA download (the current link is https://www.microsoft.com/en-gb/download/details.aspx?id=75580; at the time of writing, this is MBSA 2.3):

  1. Select the language that you require, and then press Download:

  1. All Windows 10 and Windows 8 desktops use 64 bit; I have selected 64 bit with English as the language. Press Next. Allow popups, and then select Run:

  1. Press Next:

  1. Select I accept the license agreement, and press Next:

  1. In the wizard, you can select the destination folder; select Next in the screen that follows, and select Install. During the installation, the UAC prompt will appear. Select Allow, and then the installation will be complete:

  1. After the installation appears, there will be a shortcut on the desktop, as shown here:

  1. Double-click the desktop icon; select Allow when the UAC prompt appears, and then the MBSA interface will appear:

  1. From here, you can either scan a single computer or multiple computers; please select Scan a computer, and then press Start scan. At this stage, it downloads security update information from Microsoft, and this may take some time:

  1. This then performs a scan, checking security update information from Microsoft.

The outcome of the scan will be similar to this:

The default scan result shows the vulnerabilities in red; blue is informational, and green is for the items that are compliant. Where there are vulnerabilities in red, the MBSA has hyperlinks so that these items can be resolved and so the desktop can be made as secure as possible.

 

 

Review questions

 

  1. What is an industry standard framework?

  2. What is the OSI reference model, and how many layers does it have?

  3. What is the TCP/IP protocol, and where is it used?

  4. Which layer of the OSI reference model does a switch operate?

  5. Which layer of the OSI reference model does a router operate?

  6. What is a regulatory framework, and is it legally enforceable?

  7. What type of frameworks are ITIL and Cobol 5, and are they legally enforceable?

  8. What three policies are used in a BYOD environment, and what purpose does each of them serve?

  9. What would happen if I were in an internet café at an airport and did not connect to the company network using a VPN and the data was intercepted?

  10. The FBI were investigating John Smith; therefore, the IT team placed his account on Legal Hold. John Smith decided to leave the company on February 12, and the IT team decided to delete his account on April 12, as nobody from the FBI had requested any evidence. On April 13, the FBI contacted the company asking for evidence. What policy could have ensured that the evidence was available for the FBI?

  11. What is the purpose of auditing, what power does the auditor have, and what is the likely outcome after the audit?

  12. What is the purpose of change management?

  13. Why do vendors produce security guides?

  14. What is the purpose of vendor diversity?

  15. What is the purpose of control diversity?

  16. What type of control are penetration test or vulnerability scans?

  1. How do companies normally dispose of classified printed material?

  2. What is best way of disposing of a hard drive?

  3. What is the purpose of pulping, and when would it normally be carried out?

  4. What is the purpose of degaussing, and when will it be carried out?

  5. What is cluster tip wiping?

  6. If the company held information marked Public and Private, why would we then introduce classifications such as confidential and proprietary?

  7. Who is responsible for the securing and backing up of data?

  8. Who is responsible for allowing access to the data?

  9. What is the purpose of a privacy officer?

 

 

Answers and explanations

 

  1. Industry standard frameworks are a set of criteria within an industry, relating to carrying out operations known as best practices. This is the best way that the operations should be set up and carried.

  2. The Open Systems Interconnection model (OSI model) is a conceptual model that standardizes the communication functions of a telecommunications or computing system without regard to its internal structure and technology. It has seven layers—application, presentation, session, transport, network, data link, and physical; these are layers seven, down to layer one.

  3. The TCP/IP protocol is the only protocol used in the internet, and most networks use it; each computer has an IP address to identify it.

  4. A switch operates at layer 2: the data link layer. There is a multilayer switch that works at layer 3, but the exam focuses on a switch and VLAN operating at layer 2. A switch is an internal device.

  5. A router whose function is to join networks together works at layer 3: the network layer. A router operates as an external device.

  6. A regulatory framework is based on statute law and governmental regulations; is it legally enforceable?

  7. ITIL and Cobol 5 are Non-Regulatory. These are not enforceable by law and are optional, but they provide a framework for companies to follow as a best practice for IT service management.

  8. The three types of policies needed for a BYOD environment are on-boarding, off-boarding, and Acceptable User Policy (AUP). The on-boarding policy states what needs to be done before a device can be allowed access to the network, the AUP states how the device should be used and restricts access to games and social media. When the exam mentions a BYOD environment, think of on-boarding and AUPs. The off-boarding policies state how to decommission a device from your network.

  9. Not using a VPN to connect to your network would be a policy violation against the remote access policy and would lead to disciplinary action being taken against the perpetrator.

  1. A data retention policy stating that data should be kept for six months following a person leaving the company, or the data retention policy could state never delete data that has been placed on Legal Hold. Both of these would ensure that the FBI got its data.

  2. The role of the auditor is to ensure that the company's policies and processes are being carried out, following an audit—either change management or the creation of a new policy are the likely outcomes.

  3. Change management regulates changes within a company so that they are controlled and risk is managed effectively. This stop employees doing their own thing.

  4. Vendors produce security guides so that their products can be set up by their best practices, making them as secure as possible.

  5. Vendor diversity provides reliability and resiliency by having more than one solution in place; should one solution fail, then the company is still up and running. Business continuity is covered later in this book.

  6. Should one control fail, then another is in place; an example of this is if an attacker gets over the perimeter fence, then a guard with a guard dog would stop them going any further.

  7. Penetration test or vulnerability scans are administrative controls; the vulnerability scan is less intrusive.

  8. Classified printed document are normally put in burn bags that are collected by a third-party agency, who then incinerates them and provides the company with a destruction certificate.

  9. The best way to destroy a hard drive would be to shred it. Pulverizing is an alternative, but it is not as effective.

  10. Pulping can turn shredded paper into a sludge by using water or sulfuric acid. Try and read it now!

  11. Degaussing is where a magnetic field is applied to a hard drive, or a tape drive, to remove the data.

  12. Cluster tip wiping is removing the last remnants of data stored in the last data cluster.

  13. By having four classifications rather than two classifications, it can lead to better classifications of the data.

  14. The custodian is responsible for securing and backing up data.

  15. The security administrator is responsible for granting access to the data. Remember: this is not the owner.

  16. The privacy officer is concerned with who is accessing the data and how is it shared; for example: are only doctors able to see a patient's medical history?