Always Learning

Security-X Security Models

CompTIA SecurityX

Security model

These models only work if the users are vetted.

The Bell La Padula model

Known for Confidentiality Access to read down but not read up and no write-down NOT designed to handle file sharing

The Biba Model

Access to read up but not read down and no write-up Known for Integrity NOT handle internal threats

Clark-Wilson Model

Known for Integrity

Constrained Data Item (CDI) Data type whose integrity we want to preserve. Unconstrained Data Item Data types beyond CDI, such as user and system input Transformation Procedures Programmed operations, such as read, write, and should maintain the integrity of CDI's Integrity Verification Procedures Check and ensure the validity of CDI's


Threat modeling

Threat Intelligence Asset identification Mitigation capabilities Risk Assessment

S.T.R.I.D.E


Incident is responded to by CSIRT (Computer security incident response team)


Defense in Depth

Basically a way to add multiple layers of security to an object


ISO/IEC 19249 (International organization of standards and International electro technical commission) Information technology - security techniques - catalog of architectural and design principles for secure products,systems and applications

Five architectural principles

  1. Domain Separation Components are grouped as a single entity, meaning every application, data or resource will have its own security attributes

  2. Layering System is structured in many abstract levels or layers, like API abstractions - this is related to Defense in Depth*

  3. Encapsulation Hide lower level access and use a high level API

  4. Redundancy Ensures availability and integrity , High availability power supply , has two power supplies in case one goes down

  5. Virtualization Using virtual machines instead of physical devices ensures easy back up and image backups. This also ensures better security through sand boxing applications and Operating systems.

five design principles

  1. Least Privilege Need to know policies, provide the least amount of privileges to a system or entity

  2. Attack Surface monitoring Hardening an application or OS, or turning off un-needed services

  3. Centralized Parameter Validation User input , parameter validation put into a central library or system

  4. Centralized General Security Services Centralize or security services

  5. Preparing for Error and Exception Handling Designing systems to fail safe , meaning if a database gets overloaded, the service should not leak exceptions , error messages


Trust principles

Trust but verify Always verify when we trust an entity and its behavior

Zero trust Treat trust as a vulnerability, never trust always verify, every entity is un-trusted until verified trusted.