📝
Home
Pentesting
  • 📝Home
  • ⚒️PENTESTING
    • Foundational
      • Gaining Access
      • Session Hijacking
      • Buffer Overflows
        • Finding the Offset
        • Spiking
        • Fuzzing
      • Attack Basics
        • Brute Force Attacks
        • Credential Stuffing and Password Spraying
        • Netcat Shell Stabilization
        • Reverse Shells vs Bind Shells
        • Staged vs Non-Staged Payloads
      • Footprinting
    • Reconnaissance
      • Discovering Email Addresses
      • Hunting Subdomains
    • Scanning and Enumeration
      • Banner Grabbing
      • Enumerating HTTP and HTTPS
      • Enumerating SMB
      • Enumerating SSH
      • NetBIOS Enumeration
      • SNMP Enumeration
      • Sniffing
    • Privilege Escalation
      • 🐧Linux Privilege Escalation
      • 🪟Windows Privilege Escalation
        • Initial Enumeration
    • Defense Evasion
      • Hiding Files and Covering Tracks
      • Network Evasion
    • Attacking Services
      • Attacking Kerberos
      • Attacking VPNs
      • Denial of Service
      • Exploiting FTP
      • Exploiting NFS
      • Exploiting SMTP
      • Exploiting Telnet
    • Attacking Active Directory
      • Initial Attack Vectors
        • Gaining Shell Access
        • LLMNR Poisoning
        • SMB Relay
        • Passback Attacks
        • IPv6 Attacks
      • Post-Compromise Enumeration
        • Bloodhound
        • ldapdomaindump
        • PowerView
        • PlumHound
      • Post-Compromise Attacks
        • GPP Attacks
        • Print Nightmare
        • Token Impersonation using Incognito
        • URL File Attack
        • Pass Attacks
        • Kerberoasting
        • LNK File Attacks
        • Mimikatz
      • Post-Domain Compromise Attacks
        • Dumping the NTDS.dit
        • Golden Ticket Attacks
      • Post Exploitation
    • Toolkit
      • Burp Suite
        • Intruder
      • Hping
        • Crafting TCP and UDP Packets
      • Metasploit
        • Meterpreter
        • Shell Handler
        • Gather Information
        • Gaining Root
    • Web Application Hacking
      • Attack Methodology
      • Attacking Web Applications
      • Authentication Bypass
      • Cross-Site Scripting
      • Cross-Site Request Forgery
      • File Inclusion
      • Server-Side Request Forgery
      • Injection
        • Command Injection
        • LDAP Injection
        • SQL Injection
  • 👽MALWARE ANALYSIS
    • Malware Analysis Primer
    • Malware Types
      • Rootkits
      • Viruses
      • WannaCry
    • Analyzing Malicious Windows Programs
    • Static Analysis
      • Basic Static Techniques
      • Advanced Static Analysis
    • Reverse Engineering
      • Crash Course in x86 Disassembly
      • Recognizing Code in Assembly Language
    • Dynamic Analysis
    • Detecting Malware
      • Evasion Techniques
      • Detecting Mimikatz
      • Hunting Malware
      • Hunting Metasploit
      • Hunting Persistence
  • 🏹THREAT HUNTING
    • Foundational
      • ATT&CK Framework
      • CIA Triad
    • APTs
  • 🐍PROGRAMMING & SCRIPTING
    • Foundational
      • Computer Memory
    • C Programming
    • Assembly Language
      • Assembly File Structure
      • Debugging with gdb
    • Bash
    • Python
      • Foundational
        • Booleans and Operators
        • Comprehensions
        • Conditionals
        • Dictionaries
        • Exceptions and Error Handling
        • Functions
        • Lambdas
        • Lists
        • Loops
        • Modules
        • Numbers
        • Reading and Writing Files
        • Sets
        • Sockets
        • String Formatting
        • Tuples
        • User Input
        • Variables
      • Extending Python
        • Virtual Environments
        • Sys Module
        • Requests
        • pwntools
    • Regular Expressions
    • SQL
  • 🕵️DIGITAL FORENSICS
    • Anti-Forensic Techniques
    • 🪟Windows Security Internals
      • Windows Security Internals
        • Kernel
          • Security Reference Monitor (SRM)
          • Object Manager
            • System Calls
            • NTSTATUS Codes
            • Object Handles
            • Query and Set Information System Calls
          • The I/O Manager & The Process and Thread Manager
          • The Memory Manager
          • The Configuration Manager
  • 💼GRC (CISSP Notes)
    • Security Assessment and Testing
    • Security Governance Principles
    • Security Policies Standards and Procedures
    • Preventing and Responding to Incidents
    • Organizational Roles and Responsibilities
    • Organizational Processes
  • 📦Networking
    • Foundational
      • DHCP
      • DNS Basics
      • HTTP Protocol
      • IPSec
      • IPv6 Fundamentals
    • Wireless Technologies
      • 802.11
      • Bluetooth
      • Wireless Authentication
      • Wireless Encryption
Powered by GitBook
On this page
  • Security Policies
  • Security Standards, Baselines, and Guidelines
  • Security Procedures
  1. GRC (CISSP Notes)

Security Policies Standards and Procedures

  • These documents have to exist as a separate entity because they each perform a different specialized function

    • Benefits of separation

      • Not all users need to know the security standards, baselines, guidelines, and procedures for all security classification levels

      • When changes occur, it is easier to update and redistribute only the affected material

Security Policies

  • Security policy

    • Top tier of the formalization

    • document that defines the scope of security needed by the organization and discusses the assets that require protection and the extent to which security solutions should go to provide the necessary protection

    • What it does

      • Defines the main security objectives

      • Outlines the security framework of an organization

      • Identifies the major functional areas of data processing

      • Defines all relevant terminology

    • What it is used for

      • To assign responsibilities

      • To define roles

      • Specify audit requirements

      • Outline enforcement processes

      • Indicate compliance requirements

      • Define acceptable risk levels

  • Types of Security policies

    • Organizational security policy

      • Focuses on issues relevant to every aspect of an organization

    • Issue-specific security policy

      • Focuses on specific network service, department, function, or other aspect that is distinct from the rest of the organization

    • System-specific security policy

      • Individual systems or types of systems

      • Prescribes approved hardware and software

      • Outlines methods for locking down a system

  • Categories of security policies

    • Regulatory policy

      • Required whenever industry or legal standards are applicable

      • Have to be followed and outlines the procedures that should be used to elicit compliance

    • Advisory policy

      • Behaviors and activities that are acceptable and defines consequences of violations

      • Most policies are advisory

    • Informative policy

      • Provide information or knowledge about a specific subject, such as company goals, mission statements, or how the organization interacts with partners and customers

      • Provides support, research or background information

  • Acceptable use policy

    • Designed to assign security roles within the organization

    • Ensure the responsibilities tied to those roles

    • Failure to comply with the policy can result in job action warnings, penalties or termination.

Security Standards, Baselines, and Guidelines

  • Standards

    • Define compulsory requirements for the use of hardware, software, technology, and security controls

    • Tactical documents that define steps or methods to accomplish the goals

  • Baseline

    • Defines a minimum level of security that every system throughout the organization must meet

    • More operationally focused

    • Takes the goals of a security policy and the requirements of the standards and defines them specifically in the baseline as a rule against which to implement and compare IT systems

    • Usually system specific

  • Guidelines

    • Offers recommendations on how standards and baselines are implemented

    • Serves as an operational guide for both security professionals and users

    • State which security mechanisms should be deployed instead of prescribing a specific product or control

    • Outline methodologies and include suggested actions

    • Not obligatory

Security Procedures

  • Procedure / Standard Operating Procedure (SOP)

    • Detailed, step-by-step how-to document that describes exact actions necessary to implement a specific security mechanism, control, or solution

  • Purpose

    • Ensure the integrity of business processes

    • All activities should be in compliance with policies, standards and guidelines

    • Ensure standardization of security across all systems

PreviousSecurity Governance PrinciplesNextPreventing and Responding to Incidents

Last updated 1 year ago

💼