Gap Assessment
Designing Secure Information Systems
Threat Modeling organization
Secure design principles
Architectural Vulnerabilities
Cyber security models
"We can't have a risk without a threat and threat actor, along with asset and vulnerability"
Who attacks critical infrastructure
Geopolitical situation
What kind of disruption they can create
Which threat groups
Classifying threat actors and groups
Insider risks what we have
Threats
Threat actor
State sponsored actors
Advanced persistent threats
Gain access
Elevate privileges
Maintain access
Exfiltrate data
Undetected /stealth
Vulnerabilities
Physical threats
Software vulnerabilities
System exploitation methods
Keyloggers
Malwares
Spyware
Viruses
Worms
Adware
Browser hijackers
Ransomware
Spyware
Keylogger
Logicbombs
Zerodays
phishing
Elevated privileges
Patches and patch management
Exploits
Exploit kits
Root kits
Boot kits
Botnets
Zombies
DDOS DOS
P2P bonets
Agencies
DOD
FBI
CISA
IT Landscape
On prems
Cloud services - shared responsibility model
Thin client
Thick client
Web apps
owasp
Mobile apps
Assessing and mitigating vulnerabilities
Penetration testing
Single point of failure
Detective controls
Siem
Security and Risk management current policies and requirements
What are our security policies
For example: bring your own device
Which compliance we follow
What/which operations are critical for us ?
What are our current cyber risk ?
Do we have cyber insurance ?
What is our Risk Management strategy ?
How we are conducting Risk assessment ? How we are measuring that ?
What is our current Risk score ?
How we are calculating Risks
Which applications we are using for Risk scores
Bitsight
Security scorecard
Immuniweb
What is our current security score card review ?
Requirement to get cyber insurance ?
Which encryption used at rest ?
How we are achieving separation of duties
How we achieving least privileges
PAM
Data classification policies on O365
Do we have list of software Assets information ?
Data loss prevention
What are our data retention policies
Data security policies
Data in transit
Which encryption used at Transit ?
Which TLS version is used in our org ?
Is still SSL is in use ?
Data at rest
Data in use
Do we have Asset inventory ? Asset classification ?
What are risks associated with them
Threats and vulnerabilities
Do we have cloud assets ? Whats our visibility
Do we have CMDB ?
What is our Vulnerability Management Program strategies ?
What is our Zero day vulnerability remediation policy ?
What is our vulnerability remediation policy ?
How we are testing vulnerabilities ?
How we communicate with patch management tool ?
Which patch management tool we are using
Which vulnerability tool used by us
Tenable
Qualys
MS ATP defender
Sentinel one
Is it on prem or cloud
Which vulnerabilities
30 days old
60 days old
90 days old
Critical ? High ? Medium ?
What is our threat hunting methodology ?
How we handle security events and security incidents?
Do we have on call, emergency bridge ?
Whom we need to involve
Which privacy/security compliances we comes under
GDPR
NIST
CISA
PCI
ISO standards
Defense in depth
Zero Trust
CIS
OWASP Top 10
Service level agreements
Vendor security assessment questionnaire
DDOS protection
Ransomware protection
Incident response plans
Business continuity Management
Preventive security controls
Security Policies
Physical security policies
Do we have security awareness training
On boarding training
Quarterly training
Data encryption
Writing weak passwords
Deterrent Security controls
Firewalls
Encryption
Technical/logical controls
Encyption
TPM on assets
Detective security controls
Log management
SIEM/SOC/SOAR
Honey Pots/deception technology
Corrective security controls
Antivirus/endpoint
IDS/IPS
Business continuity plans
Recovery controls
Backup copies
Sever clustering
Risk Frameworks
Security and risk management
Asset Security
Security Engineering
Communication and Network Security
Identity and Access Management
Security Assessment and Testing
Security Operations
Software Development Security
Threat Modeling
STRIDE
DREAD
MART
Who attacking organization
Which threat actors are targeting us
Which state sponserd attackingus
Which attackers industry
Which APT's
STOP Ransomware
Security Operations
SOC
Red Team
Blue Team
Penetration Testing
Purple Teaming
Disaster Recovery and Business Continuity plan
Asset Security
Classification of assets
Data:
Data retention policies
Emails
Documents
SLA's
Which data to use
Data in rest : encryption methods
Data in motion : https
NIST SP 800-53
FIPS
Network OSI model
TCP/IP Model
WAF
Load Balancers
Vulnerability Scanners
Logging
SIEM
SOC
ToDo:
Know be 4 reporting
MS ZAP phishing email analysis , email address for notification
We need a sandbox form MS or Knowbe4
Need knowbe4 review and setup a meeting
Need to verify EXO-ATP with emails malware/phish explorer
What is KB4 campaign
Reporting/metrics:
How many phishing emails we are receiving to Knowbe4 Phish ER
How many users reported
Which users targeted most
What kind of the payload/malwares are used for phish campaign
Which geo location
ITS Cyber Security Team runs and document the periodical cyber gap assessment findings.
Cyber Hygiene is highest Priority
Organization Assests, Data and User's Information is highest Priority
Impact Analysis Police/DPS
Fire/Training
Dispatch system
Radio systems
Terminals
Account department
IRMS
Critical Assests
Data classification
Data backup review
Cyber Gap Assessment:
Email Security:
Email security Gateway configurations
SPF, DKIM, DMARC
Reviewing quarantined emails
User Access control and activity
Enforce MFA
use least privileges or just-enough privilege
implementing Privileged Access Management (PAM) and Privileged Identity Management (PIM)
Delete unused Accounts
Delete unused email addresses
Strong Password policies
A_ (Administrative account) review
Third party company/service providers access review
Striping local admin privileges
Domain admin permissions review
Domain shares permission review
Backups
Visibility to security team
Do we getting the logs
How access management verified or audited
Backup recovery testing
Endpoint Security
Applications Whitelist
EDR/XDR coverage
Mobile Devices
Workstations
Laptops
Servers
Cloud
Restrict the use of scripting to approved users.
Disabling the Macro execution
Wireless
How Guest and corporate network segregated
Who is running the test and audit
Vulnerability Management
Patch and update all software, OSs (including network devices) to the latest supported versions.
Firewall/IDS/IPS/WAF
Configuration review
What is the scope
Block access to malicious sites
Rouge assets detection
SMB outbound
RDP connections
SSH connections
Network security
network segmentation audit
allow trusted devices on your network.
Domain Controllers Audit:
Domain Controllers (DCs) CIS benchmark
Cloud Assests
Cloud Posture Management
Security Awareness program
Vendor Risk Management (VRM) program
Incident Response Plan and strategy
Disaster Recovery plan
Incident Response Plan
What is asset and network quarantine strategy
Log Management
Recovery strategy
Ransomware Prevention audit:
Bridged Networks using NIC's
Network scanning detection
BYOD
Open RDP
No endpoint
Unpatched assets
No backup strategy and policies
No 2fa
No network segmentation
Perimeter devices that are accessible via the internet - including firewalls, virtualization solutions and virtual private network devices
CVE-2022-22954
CVE-2022-1388
CVE-2021-44228
DDoS or a destructive ICS attack
Financial gains/Ransomware
Designing Secure Information Systems
Threat Modeling organization
Secure design principles
Architectural Vulnerabilities
Cyber security models
"We can't have a risk without a threat and threat actor, along with asset and vulnerability"
Who attacks critical infrastructure
Geopolitical situation
What kind of disruption they can create
Which threat groups
Classifying threat actors and groups
Insider risks what we have
Threats
Threat actor
State sponsored actors
Advanced persistent threats
Gain access
Elevate privileges
Maintain access
Exfiltrate data
Undetected /stealth
Vulnerabilities
Physical threats
Software vulnerabilities
System exploitation methods
Keyloggers
Malwares
Spyware
Viruses
Worms
Adware
Browser hijackers
Ransomware
Spyware
Keylogger
Logicbombs
Zerodays
phishing
Elevated privileges
Patches and patch management
Exploits
Exploit kits
Root kits
Boot kits
Botnets
Zombies
DDOS DOS
P2P bonets
Agencies
DOD
FBI
CISA
IT Landscape
On prems
Cloud services - shared responsibility model
Thin client
Thick client
Web apps
owasp
Mobile apps
Assessing and mitigating vulnerabilities
Penetration testing
Single point of failure
Detective controls
siem
References:
Cybersecurity and Infrastructure Security Agency (CISA): https://www.cisa.gov/stopransomware
Last updated
Was this helpful?