This article is adapted from personal study notes and is not really written for others, hopefully it can still be useful somehow.
Core Definitions
-
DRP (Disaster Recovery Plan)
A documented strategy for restoring systems and data after a disruptive event. -
Port Scans
A form of active reconnaissance used to identify open services on a host. -
ARO (Annualized Rate of Occurrence)
The expected frequency of a risk event per year.
Authentication & Access Concepts
-
Password Spraying
If a username changes but the password stays the same, this indicates password spraying rather than brute force. -
Non-Repudiation
Ensures actions or messages can be reliably attributed to an individual. -
Federation vs SSO
Using existing credentials from a third-party site is federation, not single sign-on (SSO).
Zero Trust & Network Architecture
-
Zero Trust (Data Plane Focus)
The most relevant element to evaluate is the subject role, which determines access decisions. -
Bastion Host
The most secure method for providing administrative access while minimizing exposed traffic.
A bastion host is a hardened server placed in a perimeter network (DMZ) to withstand attacks. -
Segmentation
Used to isolate:-
Legacy IoT devices
-
Customer data stored separately from the corporate network
-
sequenceDiagram User->>PolicyEngine: Access request PolicyEngine->>IdentityProvider: Verify identity PolicyEngine->>Device: Check posture PolicyEngine->>Resource: Allow / Deny access
Monitoring, Detection & Response
-
SIEM Investigation on Employee Laptop
Use endpoint logs to gather executable and process-level details. -
Intrusion Prevention System (IPS)
Best for detecting and blocking known, signature-based attacks in real time. -
File Integrity Monitoring (FIM)
Detects and tracks unauthorized changes to files and system configurations. -
Automation
The most reliable way to consistently verify daily security configuration changes. -
Data Loss Prevention (DLP)
Helps detect accidental exposure of sensitive data such as emailed PII.
Risk Management & Governance
-
Risk Register
Documents risks, responsible parties, and thresholds. -
Cyber Insurance
Represents a risk transfer strategy. -
Change Management Procedure
Must be followed when:-
Creating firewall rules
-
Applying high-priority patches to production systems
-
-
Internal PCI DSS Failure
Results in audit findings (external assessments may lead to fines).
Business Continuity & Disaster Recovery
-
Warm Sites
Best when cost-benefit is a priority and RTO/RPO are around two days.-
Infrastructure partially ready
-
Faster than cold sites, cheaper than hot sites
-
-
Off-Site Replication
Recommended for earthquake-prone regions to reduce data-loss risk.
Encryption & Endpoint Security
-
Full Disk Encryption (FDE) Planning Priorities
-
Key escrow – ensures data recovery if keys are lost
-
TPM presence – protects encryption keys using hardware security
-
Cloud & Infrastructure
-
Serverless Framework
A low-cost, cloud-based application hosting solution. -
Infrastructure as Code (IaC)
Enables consistent, repeatable deployment of cloud resources. -
Compensating Control
Example: a host-based firewall on a legacy Linux system restricting access to specific internal IPs.
Secure Remote Access
-
Jump Server Exposure
Recommendation: place the jump server inside the firewall and require VPN access. -
Secure Consultant Access
Most appropriate solution: IPSec -
Scaling VPN Issues
Deploy SASE to reduce VPN and internet circuit load while maintaining encryption and visibility.
Compliance & Vendor Risk
-
Supply Chain Risk
Opening firewall ports for a SaaS-supported system introduces vendor risk. -
Classified Storage Arrays
Organizations should request vendor certification. -
Air-Gapped Networks
The most common data-loss path is removable media.
Email & Identity Controls
- DMARC
Provides email origination authorization and domain protection.
Development & Insider Threat Prevention
- Best Insider Threat Control in Development
Peer review and approval before code changes are merged.
Agreements & Documentation
-
SOW (Statement of Work)
Defines project scope, cost, and timeline. -
MOA (Memorandum of Agreement)
A document between parties agreeing to cooperate on a shared objective or project.
graph TD Internet --> Firewall Firewall --> BastionHost BastionHost --> InternalNetwork InternalNetwork --> Database
