-
Cloud Operating Model
-
Shared Responsibilities - Line Varies
- Account Boundary
- Network Boundary
- Identity and Access Management
- Control Plane and Data Plane
-
Ephemeral Resources
- Serverless Architecture
- Container Workloads
- GuardRails
-
Threat Modeling
- Identify and Tag Assets (Asset Inventory)
- Create Data Flow Diagram
- Identify Entry Points - API Request Path
- Identify Threat Actors
-
Identify Threats
-
Build Security Profile based on Application type & Assess their effectiveness (Identify Missing or Weak Controls)
-
E.g Web App
- Input Validation
- Authentication
- Authorization
- Configuration Management
- Sensitive Data
- Session Management
- Access token management
- Cryptography
- Keys Management
- Secrets Management
- Parameter Manipulation
- Auditing and Logging
- PII Data Handling
- Know Assent Vulnerabilities
-
STRIDE Mapping (Threat - Property Violated)
- Spoofing (Authentication)
- Tampering (Integirty)
- Repudiation (Non-Repudiation)
- Information Disclosures. (Confidentiality)
- Denial Of Service (Availability)
- Elevation of Privilege (Authorisation)
-
Threat Hunting and Threat Detection Framework
- MITRE ATTACK
- Understand what to look and design for
-
Threat Management - 5 Execution Domains
-
Identify
- Inventory of Assets and Vulnerabilities
-
Detect
- Logging Maturity
- Know any Vulnerabilities are been exploited
-
Look for IoC
- Threat Intel
- Deviation from Baseline
- Use-Case specific Anomaly Detection
- MTTD - MTTR
-
Investigate
- Root cause
- lateral movement
-
Response
- Containment
- Isolation
-
Restore
- RTO
- RPO
- Forensics
- Security Controls ≠ Security Execution
-
Security Culture at Scale
-
Tools and Metrics
-
Metrics
- Specific
- Measurable
- Actionable
- Reflects existing behaviour/configuration
-
e.g
- Patch Age
- Intrusion attempts
- Long Live Credentials
- % of Security Incidents resolved by automation
-
Mechanism
- e.g DevSecOps
- Communication to Sr. Leadership
-
Escalations – the right way
- Don't shoot the Messenger
- Ticket Culture
-
Indicent Response
-
Operating Model
- Event Analysis
- Triaging
- Alerts / Incident Ticekt
- Contain
- Respond
- Remediate