Time
2 hours 41 minutes
Difficulty
Beginner
CEU/CPE
3

Video Transcription

00:00
Hi and welcome back to cybersecurity Architecture Fundamentals
00:05
Episode 11 Cybersecurity process is Part one
00:11
in this session will cover the type of processes in cyber security,
00:16
and I'll go over the 1st 2 which is the incident response process and the audit and reporting process. These two are extremely important. Operational aspect off cyber security
00:31
one off. The biggest mistake I've seen in people starting out in security architecture
00:38
is that the solution was done without taking into consideration
00:44
the process. Or the operation expects off a system
00:49
to have a good sustainable system. You must be consciously aware off the various processes required to keep it running.
00:58
In this cost, I will cover three of thes main processes
01:03
the incident response process, which is important because incidents do happen
01:08
and they have to be managed,
01:11
audit and reporting. It's also an extremely important part for the stakeholders
01:19
and off course risk management. Many people see cyber security. It's just in a speck off a larger risk management program.
01:30
Let's begin by talking about incident response.
01:34
As you can see from the slide.
01:36
There are many incident response frameworks out there from this to us certain I Sokka and even I s O
01:46
there is no right and wrong way to handle an incident.
01:49
It all depends on the maturity of the organization
01:53
and the scope off incident response. For example,
01:57
in a lot of commercial enterprises, the incident just needs to be closed and move on.
02:05
But in many public sector organization, it needs to follow true Tuatara investigation forensics refers engineering attribution and so on.
02:15
The key is to pick one that sits the organizational objective and the skills off the people in the organization.
02:25
The amount of incident response out sauce to an external vendor also plays a part in deciding which off the frameworks to adopt.
02:36
If you're working in an established company, I'm sure that's a process out there. And the key is to go find the right person to understand what is the process to follow.
02:46
I talked to a security operations folks to get a better picture.
02:51
If you are toss to develop and new framework,
02:54
it doesn't pay to reinvent the wheel in this case, pick one off the established frameworks and adopted to the best of your ability.
03:05
You might ask why it met us. Well, incidents do happen
03:09
and it needs to be managed. So that's the security architect off a system. The system must be designed to support the organization's ability to respond to security incidents
03:23
some off. These include the ability to get the locks they need to the investigation to get an image or memory dump, or even access to the system physically, if they need to retrieve an image off the DIS.
03:38
As the security architect, do not forget to get the requirements not only from the functional team but also from the security operational team.
03:51
Some off the questions to ask yourself when architect ing a security solution
03:58
foots off
03:59
Can incident responder, rebuild the steps up to the incident.
04:03
Are there sufficient lots for him to understand the lead up to the incident?
04:10
Two. Are you able to provide all the necessary evidence for investigation?
04:15
These includes this image is memory snapshots, locks off all the connected device
04:23
and maybe even the endpoint locks off the user Render breach occurred.
04:30
Thirdly, please consider how, with the forensics image be taken,
04:35
would it be a disc copy with a right blocker?
04:41
Would it be a snapshot from a V. M? This is not a straight for it as it seems. Asked the wall move towards things like Serverless technology and Serverless architecture.
04:50
It's gonna be a little bit more complicated as we move towards more civilised systems.
04:58
And, fourthly,
04:59
even if the locks are collected,
05:01
is it easily passed?
05:03
Are the locks generated and stand at six locks? What are the passing technologies use to put them into a sim for your operation? Folks
05:15
do keep all this in mind when designing a system for incident response capability
05:23
from a technology angle. There are some decisions to be made,
05:28
for example, in the virtualized technology to use V M a image if he used the clout to use AWS native image and so on.
05:36
How does your incident response team get these images?
05:43
Two. Where are the locks? Start in a central cysts lock depository. Our local locked directory. Please do take note with security off the lot location and who can access or temper with the locks.
05:57
Decisions on lot retention is also an important one, as this equates to costs. How long that's the incident Response team need to go back in time to build the case.
06:09
Are your system time synchronize without proper times organizations, lock or relation could be an issue.
06:15
Do all the systems you design used the same time server, for example? These are important considerations.
06:24
And where are the encryption and decryption points in your system? If the traffic is enter, when encrypted,
06:30
is their ability to do any forensics or reverse engineering, or even if this copy off the image would be useful to the forensics team?
06:39
These are all things you need to think about
06:42
moving on,
06:44
auditing and reporting.
06:46
Every company has some audit and compliance team.
06:48
Make sure their input is also there. When you are protecting a solution, they play an important part
06:56
for the stakeholders.
07:05
If you're in a highly regulated industry like banking or pharmaceutical, what other regulatory requirements for your system to supply reports?
07:16
Are there any other internal audit requirements to support your internal audit? Our compliance team?
07:24
And is it easy for the system to pull at heart reports for security events? Or do you have to do in a bench? Mort,
07:32
these are things to consider
07:35
S With incident responds,
07:38
you have to consider the lock retention period for audit or even regular tree requirements. Some financial sectors require a seven year retention off logs, for example,
07:49
and some companies require a year retention of our events. Do make sure it complies to the organization. Needs
07:59
ability to pipe to a dashboard
08:01
would dictate the protocol All the AP eyes you need to open
08:07
and
08:09
incident reporting. Is it true a system to have a centralized sock?
08:13
Please take note off all these when designing system reporting
08:20
Key in this session recovered types of security processes,
08:24
namely covering incident response
08:28
and audit requirements. These are two very important operational process that you need to keep in mind when designing any system.
08:37
I would encourage you to talk to your internal teams in your organization to find out more about the requirements and how you can support them.
08:48
Here are two good resource is to learn more.
08:52
Firstly, there is the nous computer security incident handling guy,
08:56
although it's a bit dated from 2012
09:00
all the things inside us, the relevant today.
09:03
The 2nd 1 is an audit in psych paper by a few auditors from various companies coming together to talk about how which you audit cybersecurity today. It's a good read to find out more about the space.
09:18
That's it for this session.
09:20
In the next session, I'll go into the next area, which is risk management, another very important topic for a cyber security architect
09:31
to know.
09:31
Looking forward to seeing you in the next lecture. Thank you.

Up Next

Fundamentals of Cybersecurity Architecture

This cyber security architecture class aims to give an appreciation of the various aspects of consideration that goes into a proper security architecture.

Instructed By

Instructor Profile Image
Ian Loe
Sr. Vice President at NTUC Enterprise Co-operative Limited
Instructor