Skip to content

thinktt/Notes

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

39 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Core Principles
  Confidentiality
  Integrity 
  Availability

General Secruity Principles
  Authentication
  Authorization
  Auditing
  Sessions
  Exceptions
  Configuration


Design Security Concepts
  Least Priviledge - Only give what is needed for the task
  Spearation of Duties - No one should be able to do everything
  Defense in Depth - No single point of compromise
  Fail Secure - On failure, Confidentiality, Availability, and Integrity remains
  Economy of Mechanism - Complexity in design increases chance of security failure
  Complete Mediation - Every access request should be checked for authority to do access
  Open Design - No security by obscurity, security open for review
  Least Common Mechanism - shared mechanims between users or processes must be minimized
  Phycological Acceptability - If it doesn't make sense to the user they will try to find a way around it
  Levraging Existing Components - Use existing functionality to limit attack surface
  Weakest Link - security is only as good as the the weakest link in software
  Single Point of Failure - do not have a single source of weakness that in complete compromise

Privacy
  Don't collect sensitive info unless reqired
  Only keep what you must store, don't keep it longer than you have to
  Reference local privacy laws
Data Anonymization - Make it not personalized
Disposal Stage - make sure you destroy it when you don't need it anymore
Data Dispostion
  Regulation - How organization handles PII, PHI, PFI, or Disposal of data
  Disposal - Destroy the, only valid if info is non-sensitve, make data useless
  Purging - rendering media unrecoverable 
  Destroying - make data damaged to point of nearly impossible to revoer
    Disintigration, Pulverazation, Melting 

Governance, Risk and Compliance
  Regulation
    Sarbanes-Oxley Act(SOX)
      Design of internal controls for Financial and IT systems
      Put in place after Enron
    Basel II 
      Internation Standard for Bankging Regulation out Europe
      Proceeded by Basel III
    Gramm-Leach-Bliley Act(GLBA)
      Provisions to protect personal financial inormation by fananical instituions
      About how you must protect personal financial information
      International Regulation 
    Health Insurance Protability and Accountability Act HIPPA
      Privacy of health data, standard of trafsfer of this data
      Like GLBA for Health Data
      US only Regulation 
    Data Protection Act 
      Deals with protection of personally indentifable data
      Requires consent for collection of pesonal identifalbe data
      Region specific 
    Computer Misuse Act
      Early act defines kacing, unaothorized access and modification as an offense
  Standards
    Internal Standards (Best Practices or Guildines)
     Coding Standards, can include libraries
    External Standards
      Insdustry standards and goverment standards 
       PCI (Payment Card Industry Data Security Standard)
        Certain elements of credit card can not be stored
    NIST - US standards 
    ISO
      Common Criteria, way to evaluate security 
  
Risk Managment  
  Identify the risk profile of an application
  Software Development Life Cycle
    Plan, Dev, Prod, consider risk at each stage
  Vulnerabliity, Asset, Threat
  Attack, Likelyhood and Impact
  Buisness vs Technical Risk 
  Ways to manage Risk
    Mitigate - impliment a control to manage the risk 
    Tranfer - tranfer the risk to a 3rd party (use their credit card payment service)
    Avoid - remove the risk, don't use the risky thing, take down the app ect 
    Accept - to accept risk buisness owner MUST sign off on it and understand it

Methodologies
  Spiral every phase has a risk assesment at each phase
    not prevalent
  Iterative - break it up into small prototypes
    Every part is done as if it's own project
  Waterfall - predefined sequential phases
    tratitional, requirmentts design, development, testing, deployment
  Agile - most poplular
    Test driven development 
    based on iteration 
    Full loop every interation
  Security Methodologies
    Socratic - question answer 
    STRIDE
      Spoofing, Tampering, Repudiation, Information Discolsure, Denial of service, Elevation of Privilage
    DREAD 
      Discoverability, Reproducibility, Exploitability, Affected Users, Damage Potential
    Flaw Hypothesi Method - Uses Pen Testing in phases
      1 Hypthesize flaws in the system for documentation
      2 Confirm flaws through pen-testing
      3 Generalize confirmed flaws to uncover security issues
      4 Add counter measures to new versions of sftware
      Only known threats can be identified
    Six Sigma - focusses on removing defects
      defects are deviation from the requirements
    Capability Maturity Model Intigration 
      A rating scale that can be used to measer maturity of software 
      1 Processa are adhoc, reative and unpredicatble
      2 Repeatable project managment schedue and cost
      3 Established processses, proactive and improve continuously
      4 Processes are measured for improvement uing metrics
      5 Continous process improvement and optimizaiton 
    OSSTMM Open Security Testing Methodlogoy Manual
      A methodology for preforming security test
      Focusses on data and mesurements
      5 test channels
        Security Awareness
        Social Engineering
        Networks
        Wireless and mobile devices
        Physical access
        Security processes
        Building security
    OCTAVE  Operationally Critical Threat, Asset, and Vulnerbilty Evaluation
      Risk based security assesment methology
      3 Stages
        1 Build asset based threat profile
        2 Identify vulnerabilities
        3 Develop security strategy and plans





  

About

A place to keep my references / study notes

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published