SlideShare a Scribd company logo
Proprietary & Confidential
@GoCyberSec | January, 2020
Chapter 9
Implementing Controls to
Protect Assets
CompTIA Security +
Proprietary & Confidential
@GoCyberSec | January, 2020
Introduction
• Implementing defense in depth
• Comparing physical security controls
• Adding redundancy and fault tolerance
• Protecting data with backups
• Comparing business continuity elements
Proprietary & Confidential
@GoCyberSec | January, 2020
Implementing Defense in Depth
• Layered security
• Control diversity
• Vendor diversity
Proprietary & Confidential
@GoCyberSec | January, 2020
Physical Security Controls
• Perimeter
• Building
• Secure work areas
• Server and network rooms
• Hardware (such as cable locks)
• Airgap
Proprietary & Confidential
@GoCyberSec | January, 2020
Threat Assessment
• Signs
• Door access systems
– Cipher locks
– Proximity cards
– Biometrics
Proprietary & Confidential
@GoCyberSec | January, 2020
Physical Security Controls
• Tailgating and mantraps
• Security guards
Proprietary & Confidential
@GoCyberSec | January, 2020
Physical Security Controls
• Cameras and video surveillance (CCTV)
• Fencing, lighting, and alarms
• Barricades
• Bollards
Proprietary & Confidential
@GoCyberSec | January, 2020
Physical Security Controls
• Hardware locks
• Doors
• Cable locks
• Locked cabinets
• Safes
Proprietary & Confidential
@GoCyberSec | January, 2020
Asset Management
• Tracking valuable asset throughout their life cycle
–Reduce Vulnerabilities
• Architecture and Design weaknesses
• System sprawl and Undocumented assets
Proprietary & Confidential
@GoCyberSec | January, 2020
Environmental Controls
HVAC systems
• Higher-tonnage HVAC systems provide more cooling capacity
–Keeps server rooms at lower operating temperatures
–Results in fewer failures and longer MTBF times
• Temperature control systems
–Help ensure a relatively constant temperature
• Humidity controls
–Reduce the potential for ESD damage
–Reduce damage from condensation
Proprietary & Confidential
@GoCyberSec | January, 2020
Environmental Controls
• Hot and cold aisles
–Regulate the cooling
Proprietary & Confidential
@GoCyberSec | January, 2020
Environmental Controls
• HVAC systems
–Should be integrated with the fire alarm systems
–Have dampers or the ability to be turned off in the event of a fire
• Extinguish fire
–Remove the heat
–Remove the oxygen
–Remove the fuel
–Disrupt chain reaction
Proprietary & Confidential
@GoCyberSec | January, 2020
Shielding
• Shielded cables
–Protects against EMI and RFI
–Prevent someone from capturing network traffic
• EMI shielding
–Prevents outside interference sources from corrupting data
–Prevents data from emanating outside the cable
• Protected distribution of cabling
• Faraday cage
Proprietary & Confidential
@GoCyberSec | January, 2020
Redundancy and Fault Tolerance
• Single point of failure
–Any component whose failure results in the failure of an entire
system
• Remove single points of failure with
–RAID (disk)
–Failover clustering (server)
–UPS and generators (power)
• Single points of failure are often overlooked until a disaster occurs
Proprietary & Confidential
@GoCyberSec | January, 2020
Disk Redundancies
• Inexpensive
• Adds fault tolerance and increases availability
• Hardware RAID more efficient than software RAID
Proprietary & Confidential
@GoCyberSec | January, 2020
Disk Redundancies
• RAID-0 (striping) no redundancy
–Two or more disks
• RAID-1 (Mirroring) uses two disks as a mirror
–Two disks
• RAID-5 can survive failure of one disk
–Three or more disks
• RAID-6 can survive failure of two disks
–Four or more disks
• RAID-10 combines RAID-1 and RAID-0
–Even number of disks
Proprietary & Confidential
@GoCyberSec | January, 2020
Server Redundancy
• Failover clusters for high availability
• Remove a server as a single point of failure
Proprietary & Confidential
@GoCyberSec | January, 2020
Server Redundancy
• Load balancing for high availability
• Round-robin
• Affinity
Proprietary & Confidential
@GoCyberSec | January, 2020
Disk Redundancies
• UPS
–Provides short-term fault tolerance for power
–Can protect against power fluctuations
• Generators provide long-term fault tolerance for power
Proprietary & Confidential
@GoCyberSec | January, 2020
Protecting Data with Backups
• Full backups
–Fastest recovery time
• Differential backup
–Backs up all the data that has changed since the last full or is
different since the last full backup
• Incremental backup
–Backs up all the data that has changed since the previous
backup
Proprietary & Confidential
@GoCyberSec | January, 2020
Protecting Data with Backups
• Snapshot backup
• Testing backups
• Test restores
– Best way to test the integrity of backup data
– Full test restore
• Verifies a backup can be recovered in its entirety
• Partial test restore
– Verifies that individual files can be restored
Proprietary & Confidential
@GoCyberSec | January, 2020
Protecting Data with Backups
• Protecting backups
–Label clearly to identify the data
–Use physical security prevent unauthorized access
–Protect it during location transfers
• Copy should be stored in separate location
• Destroy when no longer needed
–Degauss the media, shred or burn the media, or scrub with
software to overwrite data
Proprietary & Confidential
@GoCyberSec | January, 2020
Protecting Data with Backups
• Geographic considerations
–Off-site backups
–Distance
–Location selection
–Legal implications
–Data sovereignty
Proprietary & Confidential
@GoCyberSec | January, 2020
Backup Policies and Plans
• Data to backup
• Off-site backups
• Label media
• Testing
• Retention requirements
• Frequency of backups
• Protect backups
• Disposing of media
Proprietary & Confidential
@GoCyberSec | January, 2020
Business Continuity Elements
• Protect against disasters and outages
–Fires
–Attacks
–Power outages
–Data loss from any cause
–Hardware and software failures
–Natural disasters, such as hurricanes, floods, tornadoes, and
earthquakes
Proprietary & Confidential
@GoCyberSec | January, 2020
Business Continuity Elements
• Business impact analysis (BIA) identifies:
–Systems and components that are essential to the
organization’s success (must continue to operate)
–Maximum downtime limits for these systems and components
–Scenarios that can impact these systems and components
–Potential losses from an incident
–Assets to include in recovery plans
Proprietary & Confidential
@GoCyberSec | January, 2020
Business Impact Analysis
• Impact
• Privacy impact
• Privacy threshold assessment
–Identifies PII
–Typically uses a simple questionnaire
• Privacy impact assessment
–Do if system holds/processes PII
–Identifies risks related to PII, such as data loss
Proprietary & Confidential
@GoCyberSec | January, 2020
Business Impact Analysis
• Recovery Time Objective (RTO)
–Identifies maximum amount of time it should take to restore a
system after an outage
–Derived from maximum allowable outage time identified in the
BIA
• Recovery Point Objective (RPO)
–Refers to the amount of data an organization can afford to lose
Proprietary & Confidential
@GoCyberSec | January, 2020
Risk Metrics
• Mean time between failures (MTBF)
–Provides a measure of a system’s reliability
–Usually represented in hours
–MTBF indicates the device can be repaired
• Mean time to recover or mean time to repair (MTTR)
–The time it takes to restore a failed system
–Often specified in contracts as a target
Proprietary & Confidential
@GoCyberSec | January, 2020
Risk Metrics
• Mean time between failures (MTBF)
–Provides a measure of a system’s reliability
–Usually represented in hours
–MTBF indicates the device can be repaired
• Mean time to recover or mean time to repair (MTTR)
–The time it takes to restore a failed system
–Often specified in contracts as a target
Proprietary & Confidential
@GoCyberSec | January, 2020
Continuity of Operations Sites
• Provides an alternate location for operations after a critical outage
• Most common sites are hot, cold, and warm sites
• Hot site
–Includes personnel, equipment, software, and communications
capabilities of the primary site
–All the data is up to date
–Can take over for a failed site within an hour
–Most effective disaster recovery
solution for an alternate site
–Most expensive to maintain
Proprietary & Confidential
@GoCyberSec | January, 2020
Continuity of Operations Sites
• Cold site
–Has power and connectivity needed for COOP activation, but
little else
–Least expensive and hardest to test
• Warm site
–Compromise between a hot site and a cold site
• Mobile site
–Do not have dedicated locations
–Can provide temporary support during a disaster.
Proprietary & Confidential
@GoCyberSec | January, 2020
Continuity of Operations Sites
• Mirrored site
–Identical to the primary location
–Provide 100 percent availability
• Order of restoration
–Return least critical functions first
Proprietary & Confidential
@GoCyberSec | January, 2020
Disaster Recovery Plan (DRP)
• Part of BCP
• Includes a hierarchical list of critical systems
• Prioritizes services to restore after an outage
• Testing validates a DRP
• Recovered systems tested before returning to operation
–Can include a comparison to baselines
Proprietary & Confidential
@GoCyberSec | January, 2020
BCP and DRP Testing
• Validate BCPs and DRPs through testing
• Tabletop exercises
–Discussion-based only
–Typically performed in a classroom or conference setting
• Functional exercises
–Hands-on exercises
–Test backups, server restoration, and server redundancy
Proprietary & Confidential
@GoCyberSec | January, 2020
Chapter 9 Summary
• Implementing defense in depth
• Comparing physical security controls
• Adding redundancy and fault tolerance
• Protecting data with backups
• Comparing business continuity elements

More Related Content

PPTX
501 ch 5 securing hosts and data
PPTX
501 ch 1 mastering security basics
PPTX
501 ch 4 securing your network
PPTX
501 ch 2 understanding iam
PPT
From The Hidden Internet: Lesson From 12 Months Of Monitoring
PPT
Ending the Tyranny of Expensive Security Tools: A New Hope
PPTX
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
PPT
Cisco Security Technical Alliances
501 ch 5 securing hosts and data
501 ch 1 mastering security basics
501 ch 4 securing your network
501 ch 2 understanding iam
From The Hidden Internet: Lesson From 12 Months Of Monitoring
Ending the Tyranny of Expensive Security Tools: A New Hope
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
Cisco Security Technical Alliances

What's hot (20)

PDF
Cloud Security & Cloud Encryption Explained
PDF
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...
PPTX
CSA Presentation - Software Defined Perimeter
KEY
The Cloud Security Rules
PPTX
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
PDF
SDP Glossary v2.0
PPTX
Cryptzone: What is a Software-Defined Perimeter?
PDF
Cloud Security Engineering - Tools and Techniques
PDF
Cloud security
PDF
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
PPTX
CompTIA Security+ Chapter Four Review
PDF
Securing Healthcare Data on AWS for HIPAA
PPTX
How to Overcome Network Access Control Limitations for Better Network Security
PPTX
AppGate: Achieving Compliance in the Cloud
PPTX
Operational Complexity: The Biggest Security Threat to Your AWS Environment
PPSX
La mia lavatrice collegata a internet? - Valter Minute - Codemotion Milan 2014
PPTX
Cloud security comparisons between aws and azure
PPTX
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
PPTX
Technologies You Need to Safely Use the Cloud
PDF
Track 5 session 1 - st dev con 2016 - need for security for iot
Cloud Security & Cloud Encryption Explained
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...
CSA Presentation - Software Defined Perimeter
The Cloud Security Rules
Reaching PCI Nirvana: Ensure a Successful Audit & Maintain Continuous Compliance
SDP Glossary v2.0
Cryptzone: What is a Software-Defined Perimeter?
Cloud Security Engineering - Tools and Techniques
Cloud security
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
CompTIA Security+ Chapter Four Review
Securing Healthcare Data on AWS for HIPAA
How to Overcome Network Access Control Limitations for Better Network Security
AppGate: Achieving Compliance in the Cloud
Operational Complexity: The Biggest Security Threat to Your AWS Environment
La mia lavatrice collegata a internet? - Valter Minute - Codemotion Milan 2014
Cloud security comparisons between aws and azure
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Technologies You Need to Safely Use the Cloud
Track 5 session 1 - st dev con 2016 - need for security for iot
Ad

Similar to 501 ch 9 implementing controls to protect assets (20)

PPTX
501 ch 9 implementing controls
PPTX
Momentum in Big Data, IoT and Machine Intelligence
PPTX
501 ch 7 protecting against advanced attacks
PPTX
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
PPTX
Cloud Based Business Continuity - Murat Lostar @ ISACA EUROCACS 2013
PPTX
45 Minutes to PCI Compliance in the Cloud
PPTX
1C_-_Treasury_Managemt_in_the_Cloud_.pptx
PPTX
ASIS Presentation_07112013
PPTX
501 ch 2 understanding iam
PPTX
DCNCBC
PPTX
Data Con LA 2022 - Supercharge your Snowflake Data Cloud from a Snowflake Dat...
PPTX
Winning Governance Strategies for the Technology Disruptions of our Time
PDF
Využijte svou Oracle databázi na maximum!
PPTX
04. availability-concepts
PDF
Rapid_Recovery-T75-v2204j.pdf
PPTX
Multi_Cloud_Storage_Presentation.presentation.
PPTX
Third Party Security Testing for Advanced Metering Infrastructure Program
PDF
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
PDF
The Tools and Machinery behind the curtain
PPTX
501 ch 8 risk managment tool
501 ch 9 implementing controls
Momentum in Big Data, IoT and Machine Intelligence
501 ch 7 protecting against advanced attacks
Disaster Recovery & Business Resilience Trends - CloudSmartz | Smarter Transf...
Cloud Based Business Continuity - Murat Lostar @ ISACA EUROCACS 2013
45 Minutes to PCI Compliance in the Cloud
1C_-_Treasury_Managemt_in_the_Cloud_.pptx
ASIS Presentation_07112013
501 ch 2 understanding iam
DCNCBC
Data Con LA 2022 - Supercharge your Snowflake Data Cloud from a Snowflake Dat...
Winning Governance Strategies for the Technology Disruptions of our Time
Využijte svou Oracle databázi na maximum!
04. availability-concepts
Rapid_Recovery-T75-v2204j.pdf
Multi_Cloud_Storage_Presentation.presentation.
Third Party Security Testing for Advanced Metering Infrastructure Program
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
The Tools and Machinery behind the curtain
501 ch 8 risk managment tool
Ad

More from gocybersec (13)

PPTX
501 ch 3 network technologies and tools
PPTX
501 ch 10 understanding cryptography and pki
PPTX
501 ch 6 threats vulnerabilities and common attacks
PPTX
501 ch 3 network technologies tools
PPTX
501 ch 7 advanced attacks
PPTX
501 ch 11 operational security
PPTX
501 ch 8 risk management tools
PPTX
501 ch 6 threats vulnerabilities attacks
PPTX
501 ch 7 advanced attacks
PPTX
501 ch 5 securing hosts and data
PPTX
501 ch 4 securing your network
PPTX
501 ch 3 network technologies tools
PPTX
501 ch-1-mastering-security-basics
501 ch 3 network technologies and tools
501 ch 10 understanding cryptography and pki
501 ch 6 threats vulnerabilities and common attacks
501 ch 3 network technologies tools
501 ch 7 advanced attacks
501 ch 11 operational security
501 ch 8 risk management tools
501 ch 6 threats vulnerabilities attacks
501 ch 7 advanced attacks
501 ch 5 securing hosts and data
501 ch 4 securing your network
501 ch 3 network technologies tools
501 ch-1-mastering-security-basics

Recently uploaded (20)

PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Approach and Philosophy of On baking technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
cuic standard and advanced reporting.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Big Data Technologies - Introduction.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
Mobile App Security Testing_ A Comprehensive Guide.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Group 1 Presentation -Planning and Decision Making .pptx
Spectral efficient network and resource selection model in 5G networks
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
The Rise and Fall of 3GPP – Time for a Sabbatical?
Encapsulation_ Review paper, used for researhc scholars
Approach and Philosophy of On baking technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
MIND Revenue Release Quarter 2 2025 Press Release
cuic standard and advanced reporting.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Encapsulation theory and applications.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Big Data Technologies - Introduction.pptx
Network Security Unit 5.pdf for BCA BBA.

501 ch 9 implementing controls to protect assets

  • 1. Proprietary & Confidential @GoCyberSec | January, 2020 Chapter 9 Implementing Controls to Protect Assets CompTIA Security +
  • 2. Proprietary & Confidential @GoCyberSec | January, 2020 Introduction • Implementing defense in depth • Comparing physical security controls • Adding redundancy and fault tolerance • Protecting data with backups • Comparing business continuity elements
  • 3. Proprietary & Confidential @GoCyberSec | January, 2020 Implementing Defense in Depth • Layered security • Control diversity • Vendor diversity
  • 4. Proprietary & Confidential @GoCyberSec | January, 2020 Physical Security Controls • Perimeter • Building • Secure work areas • Server and network rooms • Hardware (such as cable locks) • Airgap
  • 5. Proprietary & Confidential @GoCyberSec | January, 2020 Threat Assessment • Signs • Door access systems – Cipher locks – Proximity cards – Biometrics
  • 6. Proprietary & Confidential @GoCyberSec | January, 2020 Physical Security Controls • Tailgating and mantraps • Security guards
  • 7. Proprietary & Confidential @GoCyberSec | January, 2020 Physical Security Controls • Cameras and video surveillance (CCTV) • Fencing, lighting, and alarms • Barricades • Bollards
  • 8. Proprietary & Confidential @GoCyberSec | January, 2020 Physical Security Controls • Hardware locks • Doors • Cable locks • Locked cabinets • Safes
  • 9. Proprietary & Confidential @GoCyberSec | January, 2020 Asset Management • Tracking valuable asset throughout their life cycle –Reduce Vulnerabilities • Architecture and Design weaknesses • System sprawl and Undocumented assets
  • 10. Proprietary & Confidential @GoCyberSec | January, 2020 Environmental Controls HVAC systems • Higher-tonnage HVAC systems provide more cooling capacity –Keeps server rooms at lower operating temperatures –Results in fewer failures and longer MTBF times • Temperature control systems –Help ensure a relatively constant temperature • Humidity controls –Reduce the potential for ESD damage –Reduce damage from condensation
  • 11. Proprietary & Confidential @GoCyberSec | January, 2020 Environmental Controls • Hot and cold aisles –Regulate the cooling
  • 12. Proprietary & Confidential @GoCyberSec | January, 2020 Environmental Controls • HVAC systems –Should be integrated with the fire alarm systems –Have dampers or the ability to be turned off in the event of a fire • Extinguish fire –Remove the heat –Remove the oxygen –Remove the fuel –Disrupt chain reaction
  • 13. Proprietary & Confidential @GoCyberSec | January, 2020 Shielding • Shielded cables –Protects against EMI and RFI –Prevent someone from capturing network traffic • EMI shielding –Prevents outside interference sources from corrupting data –Prevents data from emanating outside the cable • Protected distribution of cabling • Faraday cage
  • 14. Proprietary & Confidential @GoCyberSec | January, 2020 Redundancy and Fault Tolerance • Single point of failure –Any component whose failure results in the failure of an entire system • Remove single points of failure with –RAID (disk) –Failover clustering (server) –UPS and generators (power) • Single points of failure are often overlooked until a disaster occurs
  • 15. Proprietary & Confidential @GoCyberSec | January, 2020 Disk Redundancies • Inexpensive • Adds fault tolerance and increases availability • Hardware RAID more efficient than software RAID
  • 16. Proprietary & Confidential @GoCyberSec | January, 2020 Disk Redundancies • RAID-0 (striping) no redundancy –Two or more disks • RAID-1 (Mirroring) uses two disks as a mirror –Two disks • RAID-5 can survive failure of one disk –Three or more disks • RAID-6 can survive failure of two disks –Four or more disks • RAID-10 combines RAID-1 and RAID-0 –Even number of disks
  • 17. Proprietary & Confidential @GoCyberSec | January, 2020 Server Redundancy • Failover clusters for high availability • Remove a server as a single point of failure
  • 18. Proprietary & Confidential @GoCyberSec | January, 2020 Server Redundancy • Load balancing for high availability • Round-robin • Affinity
  • 19. Proprietary & Confidential @GoCyberSec | January, 2020 Disk Redundancies • UPS –Provides short-term fault tolerance for power –Can protect against power fluctuations • Generators provide long-term fault tolerance for power
  • 20. Proprietary & Confidential @GoCyberSec | January, 2020 Protecting Data with Backups • Full backups –Fastest recovery time • Differential backup –Backs up all the data that has changed since the last full or is different since the last full backup • Incremental backup –Backs up all the data that has changed since the previous backup
  • 21. Proprietary & Confidential @GoCyberSec | January, 2020 Protecting Data with Backups • Snapshot backup • Testing backups • Test restores – Best way to test the integrity of backup data – Full test restore • Verifies a backup can be recovered in its entirety • Partial test restore – Verifies that individual files can be restored
  • 22. Proprietary & Confidential @GoCyberSec | January, 2020 Protecting Data with Backups • Protecting backups –Label clearly to identify the data –Use physical security prevent unauthorized access –Protect it during location transfers • Copy should be stored in separate location • Destroy when no longer needed –Degauss the media, shred or burn the media, or scrub with software to overwrite data
  • 23. Proprietary & Confidential @GoCyberSec | January, 2020 Protecting Data with Backups • Geographic considerations –Off-site backups –Distance –Location selection –Legal implications –Data sovereignty
  • 24. Proprietary & Confidential @GoCyberSec | January, 2020 Backup Policies and Plans • Data to backup • Off-site backups • Label media • Testing • Retention requirements • Frequency of backups • Protect backups • Disposing of media
  • 25. Proprietary & Confidential @GoCyberSec | January, 2020 Business Continuity Elements • Protect against disasters and outages –Fires –Attacks –Power outages –Data loss from any cause –Hardware and software failures –Natural disasters, such as hurricanes, floods, tornadoes, and earthquakes
  • 26. Proprietary & Confidential @GoCyberSec | January, 2020 Business Continuity Elements • Business impact analysis (BIA) identifies: –Systems and components that are essential to the organization’s success (must continue to operate) –Maximum downtime limits for these systems and components –Scenarios that can impact these systems and components –Potential losses from an incident –Assets to include in recovery plans
  • 27. Proprietary & Confidential @GoCyberSec | January, 2020 Business Impact Analysis • Impact • Privacy impact • Privacy threshold assessment –Identifies PII –Typically uses a simple questionnaire • Privacy impact assessment –Do if system holds/processes PII –Identifies risks related to PII, such as data loss
  • 28. Proprietary & Confidential @GoCyberSec | January, 2020 Business Impact Analysis • Recovery Time Objective (RTO) –Identifies maximum amount of time it should take to restore a system after an outage –Derived from maximum allowable outage time identified in the BIA • Recovery Point Objective (RPO) –Refers to the amount of data an organization can afford to lose
  • 29. Proprietary & Confidential @GoCyberSec | January, 2020 Risk Metrics • Mean time between failures (MTBF) –Provides a measure of a system’s reliability –Usually represented in hours –MTBF indicates the device can be repaired • Mean time to recover or mean time to repair (MTTR) –The time it takes to restore a failed system –Often specified in contracts as a target
  • 30. Proprietary & Confidential @GoCyberSec | January, 2020 Risk Metrics • Mean time between failures (MTBF) –Provides a measure of a system’s reliability –Usually represented in hours –MTBF indicates the device can be repaired • Mean time to recover or mean time to repair (MTTR) –The time it takes to restore a failed system –Often specified in contracts as a target
  • 31. Proprietary & Confidential @GoCyberSec | January, 2020 Continuity of Operations Sites • Provides an alternate location for operations after a critical outage • Most common sites are hot, cold, and warm sites • Hot site –Includes personnel, equipment, software, and communications capabilities of the primary site –All the data is up to date –Can take over for a failed site within an hour –Most effective disaster recovery solution for an alternate site –Most expensive to maintain
  • 32. Proprietary & Confidential @GoCyberSec | January, 2020 Continuity of Operations Sites • Cold site –Has power and connectivity needed for COOP activation, but little else –Least expensive and hardest to test • Warm site –Compromise between a hot site and a cold site • Mobile site –Do not have dedicated locations –Can provide temporary support during a disaster.
  • 33. Proprietary & Confidential @GoCyberSec | January, 2020 Continuity of Operations Sites • Mirrored site –Identical to the primary location –Provide 100 percent availability • Order of restoration –Return least critical functions first
  • 34. Proprietary & Confidential @GoCyberSec | January, 2020 Disaster Recovery Plan (DRP) • Part of BCP • Includes a hierarchical list of critical systems • Prioritizes services to restore after an outage • Testing validates a DRP • Recovered systems tested before returning to operation –Can include a comparison to baselines
  • 35. Proprietary & Confidential @GoCyberSec | January, 2020 BCP and DRP Testing • Validate BCPs and DRPs through testing • Tabletop exercises –Discussion-based only –Typically performed in a classroom or conference setting • Functional exercises –Hands-on exercises –Test backups, server restoration, and server redundancy
  • 36. Proprietary & Confidential @GoCyberSec | January, 2020 Chapter 9 Summary • Implementing defense in depth • Comparing physical security controls • Adding redundancy and fault tolerance • Protecting data with backups • Comparing business continuity elements

Editor's Notes

  • #7: Malicious code that attached itself to a host application -host application must be executed to run - Find other host application to infect by replication - payloads delete files, random reboots - join computer botnet
  • #11: SLE = $2,000 ARO = 12 ALE = $24,000
  • #12: SLE = $2,000 ARO = 12 ALE = $24,000
  • #13: SLE = $2,000 ARO = 12 ALE = $24,000
  • #14: EMI – Electromagnetic interference RFI – Radio Frequency Interference Interferes with normal signal transmission
  • #16: SLE = $2,000 ARO = 12 ALE = $24,000
  • #17: SLE = $2,000 ARO = 12 ALE = $24,000
  • #18: RAID-0 – files are spread across multiple disk - Better read and write performance RAID -1 – Data written to on disk is written to the other disk parity
  • #20: SLE = $2,000 ARO = 12 ALE = $24,000
  • #21: SLE = $2,000 ARO = 12 ALE = $24,000
  • #22: SLE = $2,000 ARO = 12 ALE = $24,000
  • #23: SLE = $2,000 ARO = 12 ALE = $24,000
  • #24: SLE = $2,000 ARO = 12 ALE = $24,000
  • #25: SLE = $2,000 ARO = 12 ALE = $24,000
  • #26: SLE = $2,000 ARO = 12 ALE = $24,000
  • #27: SLE = $2,000 ARO = 12 ALE = $24,000
  • #28: SLE = $2,000 ARO = 12 ALE = $24,000
  • #29: SLE = $2,000 ARO = 12 ALE = $24,000
  • #30: SLE = $2,000 ARO = 12 ALE = $24,000
  • #31: SLE = $2,000 ARO = 12 ALE = $24,000
  • #32: SLE = $2,000 ARO = 12 ALE = $24,000
  • #33: SLE = $2,000 ARO = 12 ALE = $24,000
  • #34: SLE = $2,000 ARO = 12 ALE = $24,000
  • #35: SLE = $2,000 ARO = 12 ALE = $24,000
  • #36: SLE = $2,000 ARO = 12 ALE = $24,000