<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[CyOps - Medium]]></title>
        <description><![CDATA[Cyber Ops - Medium]]></description>
        <link>https://medium.com/cyops?source=rss----46b45048b6c8---4</link>
        <image>
            <url>https://cdn-images-1.medium.com/proxy/1*TGH72Nnw24QL3iV9IOm4VA.png</url>
            <title>CyOps - Medium</title>
            <link>https://medium.com/cyops?source=rss----46b45048b6c8---4</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Sun, 24 May 2026 02:29:30 GMT</lastBuildDate>
        <atom:link href="https://medium.com/feed/cyops" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[NIST Cybersecurity Framework (CSF) 2.0 versus ISO/IEC 27001:2022]]></title>
            <link>https://medium.com/cyops/nist-cybersecurity-framework-csf-2-0-versus-iso-iec-27001-2022-b4c50761f690?source=rss----46b45048b6c8---4</link>
            <guid isPermaLink="false">https://medium.com/p/b4c50761f690</guid>
            <dc:creator><![CDATA[Tanat Tonguthaisri]]></dc:creator>
            <pubDate>Thu, 10 Oct 2024 09:36:29 GMT</pubDate>
            <atom:updated>2024-11-05T06:18:13.852Z</atom:updated>
            <content:encoded><![CDATA[<p><strong>Introduction</strong></p><p>The <strong>NIST Cybersecurity Framework (CSF) 2.0</strong> and <strong>ISO/IEC 27001:2022</strong> are two prominent frameworks that organizations use to manage and mitigate cybersecurity risks. While both aim to enhance an organization’s cybersecurity posture, they differ in structure, focus, and implementation approach. This comparison provides a detailed mapping between the two frameworks, identifies significant gaps, and highlights unique elements that appear only in one of the documents.</p><p><strong>1. High-Level Overview</strong></p><p><strong>Scope and Focus</strong></p><ul><li><strong>NIST CSF 2.0</strong>: Designed to provide a flexible framework for managing cybersecurity risks, applicable to organizations of any size, sector, or maturity level. It emphasizes cybersecurity outcomes and is particularly tailored for critical infrastructure.</li><li><strong>ISO/IEC 27001:2022</strong>: An international standard specifying requirements for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS). It has a broader focus on information security management, encompassing not just cybersecurity but also other aspects of information protection.</li></ul><p><strong>Structure</strong></p><ul><li><strong>NIST CSF 2.0</strong>:</li><li><strong>Core Functions</strong>: Identify, Protect, Detect, Respond, Recover, and the newly added Govern.</li><li><strong>Categories and Subcategories</strong>: Each function is divided into categories and subcategories that outline specific cybersecurity activities and outcomes.</li><li><strong>ISO/IEC 27001:2022</strong>:</li><li><strong>Clauses 4–10</strong>: Requirements for the ISMS, including context, leadership, planning, support, operation, performance evaluation, and improvement.</li><li><strong>Annex A</strong>: Contains 93 controls divided into four themes: Organizational, People, Physical, and Technological controls.</li></ul><p><strong>2. Detailed Mapping of Key Areas</strong></p><p>The following mapping aligns the NIST CSF 2.0 functions with the relevant clauses and controls in ISO/IEC 27001:2022.</p><h3>A. Identify (ID)</h3><p><strong>Objective</strong>: Develop an organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities.</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fdatawrapper.dwcdn.net%2FRx48y%2F1%2F&amp;display_name=Datawrapper&amp;url=https%3A%2F%2Fdatawrapper.dwcdn.net%2FRx48y%2F1%2F&amp;image=https%3A%2F%2Fdatawrapper.dwcdn.net%2FRx48y%2Fplain-s.png%3Fv%3D1&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=dwcdn" width="770" height="576" frameborder="0" scrolling="no"><a href="https://medium.com/media/c44f2bc6a097fe8efacb9dd826001beb/href">https://medium.com/media/c44f2bc6a097fe8efacb9dd826001beb/href</a></iframe><h3>B. Protect (PR)</h3><p><strong>Objective</strong>: Develop and implement appropriate safeguards to ensure delivery of critical services.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/716/1*1H7O_wNhNKnUEGvdo4XV0g@2x.png" /></figure><h3>C. Detect (DE)</h3><p><strong>Objective</strong>: Develop and implement appropriate activities to identify the occurrence of a cybersecurity event.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/713/1*0P_Wrq7KBBujmhjK2ZvTyA@2x.png" /></figure><h3>D. Respond (RS)</h3><p><strong>Objective</strong>: Develop and implement appropriate activities to take action regarding a detected cybersecurity incident.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/715/1*iLeEfHUOtdufNr1McwRwOw@2x.png" /></figure><h3>E. Recover (RC)</h3><p><strong>Objective</strong>: Develop and implement appropriate activities to maintain plans for resilience and restore any capabilities or services impaired due to a cybersecurity incident.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/716/1*whXh-wCyapNG6RK5n2ZcPQ@2x.png" /></figure><h3>F. Govern (GV)</h3><p><strong>Objective</strong>: Ensure that cybersecurity risk management is adequately addressed at the organizational governance level.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/714/1*0FceMkJTr6L49CtgHhdHAQ@2x.png" /></figure><p><strong>3. Significant Gaps and Unique Elements</strong></p><p>While there is substantial overlap between the two frameworks, each contains unique elements that are not directly mapped to the other.</p><h3>Unique Elements in NIST CSF 2.0</h3><ul><li><strong>Supply Chain Risk Management (ID.SC)</strong>: NIST CSF provides specific guidance on managing cybersecurity risks in the supply chain, emphasizing the need to understand and manage risks associated with third-party vendors and service providers. ISO/IEC 27001:2022 addresses supplier relationships but does not provide as detailed guidance on supply chain risks.</li><li><strong>Cybersecurity Culture and Governance (GV)</strong>: The “Govern” function in NIST CSF 2.0 highlights the importance of organizational culture, leadership, and governance in cybersecurity risk management. While ISO 27001 embeds governance principles, it does not have a dedicated function for it.</li><li><strong>Detailed Subcategories and Implementation Tiers</strong>: NIST CSF includes detailed subcategories for each category and introduces implementation tiers to help organizations understand their current cybersecurity posture and set targets for improvement.</li><li><strong>Profiles</strong>: NIST CSF allows organizations to create profiles to align cybersecurity activities with business requirements, risk tolerance, and resources, providing a customized approach.</li></ul><h3>Unique Elements in ISO/IEC 27001:2022</h3><ul><li><strong>Information Security Management System (ISMS) Requirements</strong>: ISO 27001 provides a formal specification for an ISMS, including requirements for documentation, management commitment, internal audits, and continual improvement processes (Clauses 4–10). NIST CSF does not specify requirements for an ISMS.</li><li><strong>Certification</strong>: ISO 27001 is a certifiable standard, enabling organizations to demonstrate compliance through external audits. NIST CSF does not have a certification process.</li><li><strong>Detailed Control Requirements</strong>: Annex A of ISO 27001 lists 93 specific controls organized into four themes, providing comprehensive coverage of information security controls beyond cybersecurity, including physical security, HR security, and legal compliance.</li><li><strong>Plan-Do-Check-Act (PDCA) Model</strong>: ISO 27001 is based on the PDCA cycle, promoting a systematic approach to managing and improving information security processes.</li></ul><h3>Items Appearing Only in One Document</h3><h4>Only in NIST CSF 2.0</h4><ul><li><strong>Implementation Tiers</strong>: Provide context on how an organization views cybersecurity risk and processes.</li><li><strong>Profiles</strong>: Allow for customization of the framework to align with organizational needs.</li><li><strong>Detailed Focus on Cybersecurity Outcomes</strong>: Emphasizes specific cybersecurity outcomes rather than prescribing controls.</li><li><strong>Threat Intelligence Integration (ID.RA)</strong>: Includes subcategories for leveraging threat intelligence, which is not explicitly covered in ISO 27001.</li></ul><h4>Only in ISO/IEC 27001:2022</h4><ul><li><strong>ISMS Documentation Requirements (Clause 7.5)</strong>: Specifies the need for documented information, including policies, procedures, and records.</li><li><strong>Internal Audits (Clause 9.2)</strong>: Requires organizations to conduct internal audits at planned intervals to provide information on the ISMS’s effectiveness.</li><li><strong>Management Review (Clause 9.3)</strong>: Mandates top management to review the organization’s ISMS at planned intervals.</li><li><strong>Compliance Obligations (Annex A: A.18)</strong>: Addresses the need to identify and meet legal, regulatory, and contractual requirements.</li><li><strong>Human Resource Security (Annex A: A.7)</strong>: Includes controls related to background checks, terms and conditions of employment, and information security responsibilities.</li><li><strong>System Acquisition, Development, and Maintenance (Annex A: A.14)</strong>: Provides detailed controls for secure development practices, change management, and technical review of applications.</li></ul><p><strong>4. Conclusion</strong></p><p>While <strong>NIST CSF 2.0</strong> and <strong>ISO/IEC 27001:2022</strong> share common goals in enhancing cybersecurity and information security, they differ in structure, focus, and implementation approaches. NIST CSF offers a flexible, outcome-oriented framework tailored for organizations seeking to understand and improve their cybersecurity posture without the need for formal certification. ISO 27001 provides a comprehensive, certifiable standard for establishing an ISMS, with detailed requirements and controls that extend beyond cybersecurity to encompass all aspects of information security.</p><p><strong>Organizations may benefit from integrating both frameworks</strong>, leveraging the flexibility and detailed cybersecurity focus of NIST CSF alongside the structured, comprehensive ISMS approach of ISO 27001. This integrated approach can provide robust risk management, compliance with international standards, and continual improvement of cybersecurity practices.</p><p><strong>Key Takeaways</strong></p><ul><li><strong>Overlap Exists</strong>: Both frameworks cover essential aspects of cybersecurity risk management, including risk assessment, incident response, and recovery planning.</li><li><strong>Different Emphases</strong>:</li><li>NIST CSF focuses on flexibility, allowing organizations to adapt the framework to their specific needs and risk profiles.</li><li>ISO 27001 emphasizes a formalized approach with detailed requirements and the option for certification.</li><li><strong>Unique Elements</strong>:</li><li>NIST CSF includes unique elements like supply chain risk management and profiles for customization.</li><li>ISO 27001 includes requirements for an ISMS, documentation, internal audits, and management reviews.</li><li><strong>No One-to-One Mapping for Some Items</strong>: Certain elements in each framework do not have direct counterparts in the other, highlighting areas where organizations may need to address gaps if using only one framework.</li></ul><p><strong>สไลด์นำเสนอ: การเปรียบเทียบ NIST CSF 2.0 กับ ISO/IEC 27001:2022</strong></p><h3>สไลด์ที่ 1: ชื่อเรื่อง</h3><p><strong>การเปรียบเทียบและการแมประหว่าง NIST Cybersecurity Framework 2.0 กับ ISO/IEC 27001:2022</strong></p><h3>สไลด์ที่ 2: บทนำ</h3><ul><li><strong>วัตถุประสงค์</strong>: นำเสนอการเปรียบเทียบเชิงลึกระหว่าง <strong>NIST CSF 2.0</strong> และ <strong>ISO/IEC 27001:2022</strong></li><li><strong>เป้าหมาย</strong>:</li><li>ระบุความเหมือนและความแตกต่างระหว่างสองกรอบการทำงาน</li><li>ชี้ให้เห็นถึงช่องว่างและองค์ประกอบที่เป็นเอกลักษณ์ของแต่ละมาตรฐาน</li><li>ให้คำแนะนำสำหรับการนำไปปฏิบัติในองค์กร</li></ul><h3>สไลด์ที่ 3: ภาพรวมระดับสูง</h3><h4>ขอบเขตและจุดเน้น</h4><ul><li><strong>NIST CSF 2.0</strong>:</li><li>กรอบการทำงานที่ยืดหยุ่นสำหรับการจัดการความเสี่ยงไซเบอร์</li><li>เหมาะสำหรับองค์กรทุกขนาดและทุกอุตสาหกรรม</li><li>เน้นที่ผลลัพธ์ด้านความมั่นคงปลอดภัยไซเบอร์</li><li><strong>ISO/IEC 27001:2022</strong>:</li><li>มาตรฐานสากลสำหรับการจัดตั้งและปรับปรุงระบบบริหารจัดการความมั่นคงปลอดภัยสารสนเทศ (ISMS)</li><li>ครอบคลุมการปกป้องข้อมูลในทุกมิติ ไม่เฉพาะไซเบอร์</li></ul><h3>สไลด์ที่ 4: การเปรียบเทียบโครงสร้าง</h3><ul><li><strong>NIST CSF 2.0</strong>:</li><li><strong>Function หลัก</strong>: Identify, Protect, Detect, Respond, Recover, Govern</li><li><strong>Category และ Subcategory</strong>: ระบุกิจกรรมและผลลัพธ์เฉพาะด้านความมั่นคงปลอดภัยไซเบอร์</li><li><strong>ISO/IEC 27001:2022</strong>:</li><li><strong>Clause 4–10</strong>: ข้อกำหนดสำหรับ ISMS</li><li><strong>Annex A</strong>: 93 Control แบ่งเป็น 4 หมวดหมู่ (องค์กร, บุคคล, กายภาพ, เทคโนโลยี)</li></ul><h3>สไลด์ที่ 5: การแมปของ Function และ Control</h3><h4>A. Identify (ID)</h4><ul><li><strong>วัตถุประสงค์</strong>: พัฒนาความเข้าใจองค์กรเพื่อจัดการความเสี่ยงไซเบอร์</li><li><strong>การแมป</strong>:</li><li><strong>ID.AM (Asset Management)</strong> ↔ <strong>Annex A: A.5, A.8</strong></li><li><strong>ID.BE (Business Environment)</strong> ↔ <strong>Clause 4, Clause 5</strong></li><li><strong>ID.GV (Governance)</strong> ↔ <strong>Clause 5, Annex A: A.5</strong></li><li><strong>ID.RA (Risk Assessment)</strong> ↔ <strong>Clause 6.1, Annex A: A.6</strong></li><li><strong>ID.RM (Risk Management Strategy)</strong> ↔ <strong>Clause 6, Clause 8</strong></li><li><strong>ID.SC (Supply Chain Risk Management)</strong> ↔ <strong>Annex A: A.15</strong></li></ul><h3>สไลด์ที่ 6: การแมปของ Function และ Control (ต่อ)</h3><h4>B. Protect (PR)</h4><ul><li><strong>วัตถุประสงค์</strong>: พัฒนาและดำเนินการป้องกันที่เหมาะสม</li><li><strong>การแมป</strong>:</li><li><strong>PR.AC (Access Control)</strong> ↔ <strong>Annex A: A.9</strong></li><li><strong>PR.AT (Awareness and Training)</strong> ↔ <strong>Annex A: A.7</strong></li><li><strong>PR.DS (Data Security)</strong> ↔ <strong>Annex A: A.8, A.18</strong></li><li><strong>PR.IP (Information Protection Processes)</strong> ↔ <strong>Annex A: A.5, Clause 7.5</strong></li><li><strong>PR.MA (Maintenance)</strong> ↔ <strong>Annex A: A.12</strong></li><li><strong>PR.PT (Protective Technology)</strong> ↔ <strong>Annex A: A.13, A.14</strong></li></ul><h3>สไลด์ที่ 7: ช่องว่างและองค์ประกอบที่เป็นเอกลักษณ์</h3><h4>องค์ประกอบเฉพาะของ NIST CSF 2.0</h4><ul><li><strong>การจัดการความเสี่ยงในห่วงโซ่อุปทาน (ID.SC)</strong></li><li><strong>วัฒนธรรมและการกำกับดูแลด้านไซเบอร์ (GV)</strong></li><li><strong>Implementation Tiers และ Profiles</strong></li><li><strong>การบูรณาการ Threat Intelligence (ID.RA)</strong></li></ul><h4>องค์ประกอบเฉพาะของ ISO/IEC 27001:2022</h4><ul><li><strong>ข้อกำหนดสำหรับ ISMS (Clause 4–10)</strong></li><li><strong>การรับรองมาตรฐาน (Certification)</strong></li><li><strong>รายละเอียดของ Control ใน Annex A</strong></li><li><strong>โมเดล PDCA (Plan-Do-Check-Act)</strong></li></ul><h3>สไลด์ที่ 8: สรุปผล</h3><ul><li><strong>ความเหมือน</strong>: ทั้งสองมาตรฐานครอบคลุมการจัดการความเสี่ยงไซเบอร์ในหลายด้าน</li><li><strong>ความแตกต่าง</strong>:</li><li><strong>NIST CSF</strong> เน้นความยืดหยุ่นและการปรับใช้ตามความต้องการองค์กร</li><li><strong>ISO 27001</strong> เน้นการปฏิบัติตามข้อกำหนดที่เป็นทางการและการรับรอง</li><li><strong>คำแนะนำ</strong>: การผสานทั้งสองกรอบการทำงานจะช่วยให้องค์กรมีระบบการจัดการความมั่นคงปลอดภัยที่ครอบคลุมและมีประสิทธิภาพ</li></ul><h3>สไลด์ที่ 9: ข้อเสนอแนะและความห่วงใย</h3><ul><li><strong>เน้นการปฏิบัติจริง</strong>: ควรให้ความสำคัญกับการนำไปใช้จริงในองค์กร มากกว่าการปฏิบัติตามข้อกำหนดทางวิชาการอย่างเคร่งครัด</li><li><strong>ภาระในการดำเนินงาน</strong>: การปฏิบัติตามมาตรฐานหลาย ๆ อย่างอาจเพิ่มภาระเกินความจำเป็น</li><li><strong>บทบาทของคณะอนุกรรมการ</strong>: ควรเข้าใจและสนับสนุนการดำเนินงานด้านไซเบอร์ที่สอดคล้องกับบริบทองค์กร</li><li><strong>การเตรียมความพร้อมของประเทศ</strong>: สนับสนุนความพยายามของ <strong>สกมช.</strong> ในการยกระดับความมั่นคงปลอดภัยไซเบอร์ของประเทศ ผ่าน <strong>NCRI</strong></li></ul><h3>สไลด์ที่ 10: คำกล่าวปิดท้าย</h3><ul><li><strong>การตัดสินใจที่มีข้อมูล</strong>: ด้วยความเข้าใจในความแตกต่างและจุดแข็งของแต่ละมาตรฐาน องค์กรสามารถตัดสินใจได้อย่างเหมาะสม</li><li><strong>การปรับใช้ที่ยืดหยุ่น</strong>: เลือกกรอบการทำงานที่สอดคล้องกับวัตถุประสงค์ ทรัพยากร และข้อกำหนดขององค์กร</li><li><strong>ความร่วมมือและการสนับสนุน</strong>: คณะอนุกรรมการและผู้เกี่ยวข้องควรร่วมมือกันเพื่อเสริมสร้างความมั่นคงปลอดภัยไซเบอร์</li></ul><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=b4c50761f690" width="1" height="1" alt=""><hr><p><a href="https://medium.com/cyops/nist-cybersecurity-framework-csf-2-0-versus-iso-iec-27001-2022-b4c50761f690">NIST Cybersecurity Framework (CSF) 2.0 versus ISO/IEC 27001:2022</a> was originally published in <a href="https://medium.com/cyops">CyOps</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Web Site Security]]></title>
            <link>https://medium.com/cyops/web-site-security-3fde3b17a32b?source=rss----46b45048b6c8---4</link>
            <guid isPermaLink="false">https://medium.com/p/3fde3b17a32b</guid>
            <dc:creator><![CDATA[Tanat Tonguthaisri]]></dc:creator>
            <pubDate>Mon, 30 Oct 2023 10:08:53 GMT</pubDate>
            <atom:updated>2023-10-30T10:17:39.522Z</atom:updated>
            <content:encoded><![CDATA[<h3>1. Perimeter Security (ความปลอดภัยที่ขอบเขต):</h3><ul><li>Firewalls: การใช้กฎที่แข็งแกร่งบนอุปกรณ์ firewall เพื่อกรองการจราจรที่มีเจตนาทำลาย</li><li>Intrusion Prevention Systems (IPS): ระบบเหล่านี้ตรวจสอบการจราจรเครือข่ายเพื่อตรวจหาและป้องกันช่องโหว่</li><li>Anti-DDoS Measures: การใช้มาตรการเพื่อบรรเทาการโจมตี Distributed Denial of Service อย่างเช่นการใช้เครื่องมือหรือบริการป้องกัน DDoS</li></ul><p>Best Practices for Perimeter Security: ชุดกฎ firewall ควรได้รับการปรับปรุงอย่างสม่ำเสมอเพื่อรวมข้อมูลข่าวกรองข้อบกพร่องล่าสุดและข้อมูลความปลอดภัย. นอกจากนี้ยังควรกำหนดค่า IPS เพื่อตรวจจับและบล็อกเทคนิคโจมตีที่ใช้กันอย่างแพร่หลายต่อเว็บไซต์บริการสาธารณะ</p><h3>2. Network Security (ความปลอดภัยของเครือข่าย):</h3><ul><li>Segmentation: การแบ่งส่วนเครือข่ายเพื่อให้แน่ใจว่าระบบที่ละเอียดอ่อนถูกแยกจากระบบที่มีความละเอียดอ่อนน้อยลง</li><li>Encryption: การใช้การเข้ารหัสสำหรับข้อมูลในการถ่ายโอนเพื่อป้องกันการรับและการเข้าถึงโดยไม่ได้รับอนุญาต</li><li>Virtual Private Network (VPN): การใช้ VPN เพื่อการเข้าถึงระยะไกลที่ปลอดภัย</li></ul><p>Best Practices for Network Security: ควรแบ่งส่วนเครือข่ายเพื่อแยกระบบและข้อมูลที่สำคัญจากระบบและข้อมูลที่มีความละเอียดอ่อนน้อยลง นอกจากนี้ยังควรตรวจสอบการจราจรระหว่างส่วนของเครือข่ายโดย firewall หรืออุปกรณ์ความปลอดภัยอื่น ๆ</p><p>3. ความมั่นคงปลอดภัยโฮสต์:</p><ul><li>เครื่องมือตรวจจับและกําจัดมัลแวร์: ติดตั้งและบํารุงรักษาเครื่องมือป้องกันไวรัสและมัลแวร์</li><li>การจัดการแพทช์: ตรวจสอบให้ระบบมีการแพทช์ตัวเพื่อให้ทันสมัยอยู่เสมอ</li><li>การจัดการการกําหนดค่า: จัดตั้งและบํารุงรักษาค่ากําหนดค่าความมั่นคงปลอดภัยของระบบทั้งหมด</li></ul><p>แนวปฏิบัติที่ดีสําหรับความมั่นคงปลอดภัยโฮสต์: นอกจากการติดตั้งและบํารุงรักษาเครื่องมือตรวจจับและกําจัดมัลแวร์แล้ว การใช้มาตรการควบคุมความมั่นคงปลอดภัยอื่นๆ เช่น application whitelisting และ system hardening ก็มีความสําคัญเพื่อป้องกันมัลแวร์ร้ายแรงบนเซิร์ฟเวอร์เว็บไซต์</p><h3>4. ความมั่นคงปลอดภัยของแอปพลิเคชัน:</h3><ul><li>Web Application Firewall (WAF): ใช้ WAF ที่ขับเคลื่อนด้วย AI เพื่อป้องกันแอปพลิเคชันเว็บจากการโจมตีทั่วไปและการโจมตีที่กำลังเปลี่ยนแปลงอยู่</li><li>การตรวจสอบข้อมูลที่ป้อน: ใช้เทคนิคการตรวจสอบข้อมูลที่ป้อนขั้นสูงเพื่อป้องกัน SQL injection, cross-site scripting, และการโจมตีประเภทอื่นๆ</li><li>การตรวจสอบตัวตนและการอนุญาต: ใช้การตรวจสอบตัวตนแบบ multifactor (MFA) และควบคุมการอนุญาตที่มีประสิทธิภาพเพื่อให้แน่ใจว่ามีเพียงบุคคลที่ได้รับอนุญาตเท่านั้นที่สามารถเข้าถึงข้อมูลบางประเภท</li></ul><h4>ทั้งนี้เป็นวิธีที่ดีที่สุดสำหรับความมั่นคงปลอดภัยของแอปพลิเคชัน:</h4><ul><li>WAF ควรได้รับการอัปเดตอย่างสม่ำเสมอเพื่อรวมกฎสำหรับช่องโหว่ที่ทราบล่าสุดและควรถูกกำหนดค่าเพื่อป้องกันการโจมตี zero-day</li><li>ใช้นโยบายความปลอดภัยของเนื้อหาเพื่อป้องกันการโจมตี cross-site scripting</li><li>กฎการตรวจสอบข้อมูลที่ป้อนควรได้รับการตรวจสอบและอัปเดตอย่างสม่ำเสมอเพื่อให้แน่ใจว่ายังมีประสิทธิภาพต่อประเภทการโจมตีใหม่ๆ</li><li>กลไกการตรวจสอบตัวตนควรรวมมาตรการป้องกันการโจมตีแบบ brute force เช่น CAPTCHA, นโยบายการล็อกบัญชี, และกลไกการล่าช้าที่เพิ่มขึ้นอย่างต่อเนื่อง</li><li>การจัดการเซสชันควรปลอดภัย พร้อมนโยบายการหมดเวลาของเซสชันและการล็อกเอาต์อัตโนมัติเมื่อไม่มีการใช้งาน</li></ul><p>The defense-in-depth approach emphasizes multiple layers of security controls and measures within an information system’s environment. Here is a comprehensive list of security measures and controls to protect a public service website from cyber-attacks and malicious activities: 1. Perimeter Security: — Firewalls: Implementing a strong set of rules on firewall appliances to filter out malicious traffic. — Intrusion Prevention Systems (IPS): These systems monitor network traffic to detect and prevent vulnerability exploits. — Anti-DDoS Measures: Implementing measures to mitigate Distributed Denial of Service attacks, such as using DDoS prevention tools or services. Best Practices for Perimeter Security: The firewall ruleset should be regularly updated to include the latest threat intelligence and vulnerability information. Additionally, the IPS should be configured to detect and block specific attack techniques that are commonly used against public service websites. 2. Network Security: — Segmentation: Segregating the network to ensure that sensitive systems are separated from less sensitive systems. — Encryption: Employing encryption for data in transit to prevent interception and unauthorized access. — Virtual Private Network (VPN): Utilizing VPNs for secure remote access. Best Practices for Network Security: The network should be segmented to isolate critical systems and data from less sensitive systems and data. Additionally, all traffic between network segments should be inspected by a firewall or other security device. 3. Host Security: — Anti-malware Tools: Installing and maintaining anti-malware tools to detect and remove malicious software. — Patch Management: Ensuring that all systems are up-to-date with the latest security patches. — Configuration Management: Establishing and maintaining a secure configuration posture across all assets. Best Practices for Host Security: In addition to installing and maintaining anti-malware tools, it is also important to implement security controls such as application whitelisting and system hardening to prevent malicious software from executing on the website’s servers. 4. Application Security: — Web Application Firewall (WAF): Utilizing a WAF to protect the web application from common web application attacks. — Input Validation: Ensuring that input from users is validated to prevent SQL injection, cross-site scripting, and other injection attacks. — Authentication and Authorization: Implementing strong authentication and authorization controls to ensure only authorized individuals can access certain information. Best Practices for Application Security: The WAF should be configured to protect against the latest web application attacks, and the input validation rules should be regularly reviewed to ensure that they are effective. Additionally, authentication and authorization controls should be implemented in a way that prevents common attacks such as password brute-forcing and session hijacking.</p><p>5. Data Security: — Encryption at Rest: Encrypting sensitive data at rest to prevent unauthorized access. — Data Masking: Employing data masking techniques to hide specific data within a structured data environment. — Access Controls: Implementing strict access control policies to ensure that only authorized individuals have access to sensitive data. Best Practices for Data Security: Sensitive data should be encrypted at rest and in transit, and access controls should be implemented to restrict access to sensitive data only to authorized individuals. Additionally, data masking techniques should be used to protect sensitive data from unauthorized disclosure even if it is accessed by authorized individuals.</p><p>6. Monitoring and Incident Response: — Logging and Monitoring: Continuously monitoring and logging system and network activity to detect malicious activity. — Incident Response Plan: Having a well-defined incident response plan in place to address any security incidents promptly. Best Practices for Monitoring and Incident Response: In addition to continuously monitoring and logging system and network activity, it is also important to implement security analytics tools and processes to detect malicious activity in real time. Additionally, the incident response plan should be regularly tested and updated to ensure that it is effective and can be executed efficiently in the event of an attack.</p><p>7. Identity and Access Management (IAM): Privileged Access Management: Implementing solutions to control and monitor privileged access within the environment. — User Awareness Training: Training users on security best practices and how to identify phishing attempts or other malicious activity. Best Practices for Identity and Access Management (IAM): Privileged access management controls should be implemented to restrict access to privileged accounts and monitor their use. Additionally, user awareness training should be provided to educate users on security best practices and how to identify phishing attempts or other malicious activity.</p><p>8. Compliance and Auditing: — Regular Audits: Conducting regular security audits to identify and mitigate potential vulnerabilities. Compliance with Standards: Ensuring compliance with necessary cybersecurity standards and regulations, such as the General Data Protection Regulation (GDPR) or ISO 27001. Best Practices for Compliance and Auditing: Security audits should be conducted on a regular basis to identify and mitigate potential vulnerabilities. Additionally, the organization should ensure that it is compliant with all necessary cybersecurity standards and regulations.</p><p>9. Physical Security: — Data Center Security: Employing physical security measures to protect data centers and other critical infrastructure. — Disaster Recovery and Business Continuity Planning: Developing and testing disaster recovery and business continuity plans to ensure the organization can continue operations in the event of a physical or cyber-incident.</p><p>Best Practices for Physical Security: Data center security measures should be implemented to protect the website’s servers and other critical infrastructure from physical attack. Additionally, disaster recovery and business continuity plans should be developed and tested to ensure that the organization can continue operations in the event of a physical or cyber-incident. 10. Third-party Security: — Vendor Risk Management: Assessing the security posture of third-party vendors to ensure they meet the organization’s security standards. — Third-party Audits: Conducting audits of third-party vendors to ensure compliance with contractual and regulatory requirements.</p><p>Best Practices for Third-party Security: When working with third-party vendors, the organization should assess their security posture and conduct regular audits to ensure that they meet the organization’s security standards. Additionally, the organization should include security requirements in all third-party contracts. Best Practices in general: * **Adversary Simulation:** Conducting regular adversary simulations to identify and mitigate security gaps in the website and its supporting infrastructure. * **Attack Surface Management:** Maintaining a comprehensive inventory of the website’s attack surface and prioritizing remediation efforts for the most critical vulnerabilities. * **Threat Modeling:** Performing threat modeling to identify potential threats and vulnerabilities to the website, and designing security controls to mitigate those risks. * **Zero Trust Security:** Implementing a zero trust security model to ensure that all users and devices are authenticated and authorized before they are granted access to the website. * **Security Information and Event Management (SIEM):** Deploying a SIEM solution to collect and analyze security logs from across the website’s environment to detect malicious activity. * **Incident Response Testing:** Regularly testing the incident response plan to ensure that it is effective and can be executed efficiently in the event of an attack.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=3fde3b17a32b" width="1" height="1" alt=""><hr><p><a href="https://medium.com/cyops/web-site-security-3fde3b17a32b">Web Site Security</a> was originally published in <a href="https://medium.com/cyops">CyOps</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Splunk’s Search Processing Language (SPL) and Swimlane’s SOAR (Security, Orchestration, Automation…]]></title>
            <link>https://medium.com/cyops/splunks-search-processing-language-spl-and-swimlane-s-soar-security-orchestration-automation-5a80dd895160?source=rss----46b45048b6c8---4</link>
            <guid isPermaLink="false">https://medium.com/p/5a80dd895160</guid>
            <dc:creator><![CDATA[Tanat Tonguthaisri]]></dc:creator>
            <pubDate>Thu, 05 Oct 2023 08:06:38 GMT</pubDate>
            <atom:updated>2023-10-05T08:06:38.886Z</atom:updated>
            <content:encoded><![CDATA[<h3>Splunk’s Search Processing Language (SPL) and Swimlane’s SOAR (Security, Orchestration, Automation, and Response)</h3><p>Splunk’s Search Processing Language (SPL) and Swimlane’s SOAR (Security, Orchestration, Automation, and Response) platform serve somewhat different primary purposes but have areas of overlap in their functionalities, particularly when it comes to data analysis and operational workflows. Below is a comparison between Splunk’s SPL and the features in Swimlane SOAR platform that are most similar to SPL:</p><ol><li>Data Search and Retrieval:</li></ol><ul><li>Splunk SPL: Provides a powerful and flexible search language that enables users to search, investigate, and analyze data stored in Splunk. Users can execute complex searches to retrieve or manipulate data.</li><li>Swimlane: Includes a visual query builder that allows users to search and filter through data. However, it may not be as robust or flexible as Splunk’s SPL in terms of complex querying.</li></ul><p>2. Data Analysis:</p><ul><li>Splunk SPL: Can perform sophisticated data analytics, statistical evaluations, and other advanced analysis to derive insights from data.</li><li>Swimlane: Offers analytics capabilities, but they might be more focused on incident analysis and response rather than broad data analytics.</li></ul><p>3. Operational Workflows:</p><ul><li>Splunk SPL: Primarily focused on data searching and analytics, but operational workflows can be managed through other Splunk features or integrated solutions.</li><li>Swimlane: Emphasizes orchestration and automation of security operations, allowing for the creation and automation of workflows to improve incident response times.</li></ul><p>4. Integration:</p><ul><li>Splunk SPL: SPL is part of the broader Splunk platform which can integrate with a wide range of other systems and applications to collect and analyze data.</li><li>Swimlane: Designed with integration in mind, offering numerous pre-built integrations to work with various security tools and systems, and also provides APIs for custom integrations.</li></ul><p>5. Customization and Extensibility:</p><ul><li>Splunk SPL: Highly customizable through the use of SPL commands and functions, allowing users to tailor data queries and analysis to their specific needs.</li><li>Swimlane: Provides customization options through a drag-and-drop interface and also allows for scripting to extend functionality.</li></ul><p>6. User Interface:</p><ul><li>Splunk SPL: The user interacts with SPL through a text-based interface, writing and executing search commands.</li><li>Swimlane: Provides a more graphical user interface with a drag-and-drop functionality which may be easier for some users, especially those without a scripting or programming background.</li></ul><p>7. Automation and Orchestration:</p><ul><li>Splunk SPL: Not designed specifically for automation and orchestration, though Splunk has other solutions like Splunk Phantom for these purposes.</li><li>Swimlane: Core functionality includes automation and orchestration to streamline and automate routine tasks and complex workflows.</li></ul><p>While Splunk’s SPL excels in searching, retrieving, and analyzing data, Swimlane’s SOAR platform shines in the orchestration, automation, and optimization of security operations workflows. The two platforms could complement each other in a comprehensive security infrastructure, with Splunk handling data analytics and Swimlane managing operational workflows and incident responses.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=5a80dd895160" width="1" height="1" alt=""><hr><p><a href="https://medium.com/cyops/splunks-search-processing-language-spl-and-swimlane-s-soar-security-orchestration-automation-5a80dd895160">Splunk’s Search Processing Language (SPL) and Swimlane’s SOAR (Security, Orchestration, Automation…</a> was originally published in <a href="https://medium.com/cyops">CyOps</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Security Design Document]]></title>
            <link>https://medium.com/cyops/security-design-document-e9427a6d4756?source=rss----46b45048b6c8---4</link>
            <guid isPermaLink="false">https://medium.com/p/e9427a6d4756</guid>
            <dc:creator><![CDATA[Tanat Tonguthaisri]]></dc:creator>
            <pubDate>Mon, 24 Jul 2023 07:11:15 GMT</pubDate>
            <atom:updated>2023-07-24T07:11:15.131Z</atom:updated>
            <content:encoded><![CDATA[<p>Overview: Now that you’re super knowledgeable about security, let’s put your newfound know-how to the test.</p><p>You may find yourself in a tech role someday, where</p><p>you</p><p>need to design and influence a culture of security</p><p>within an organization. This project is your opportunity to practice these important skillsets.</p><p>Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization.</p><p>The security services and tools you describe in the document must be able to meet the needs of the</p><p>organization. Your work will be evaluated according to how well you met the organization’s requirements.</p><p>About the organization: This fictional organization has a small, but growing, employee base, with 50 employees</p><p>in one small office. The company is an online retailer of the world’s finest artisanal, hand-crafted widgets.</p><p>They’ve hired you on as a security consultant to help bring their operations into better shape.</p><p>Organization requirements: As the security consultant, the company needs you to add security measures to</p><p>the following systems:</p><p>- An external website permitting users to browse and purchase widgets</p><p>- An internal intranet website for employees to use</p><p>- Secure remote access for engineering employees</p><p>- Reasonable, basic firewall rules</p><p>- Wireless coverage in the office</p><p>- Reasonably secure configurations for laptops</p><p>Since this is a retail company that will be handling customer payment data, the organization would like to be</p><p>extra cautious about privacy. They don’t want customer information falling into the hands of an attacker due to</p><p>malware infections or lost devices.</p><p>Engineers will require access to internal websites, along with remote, command line access to their workstations.</p><p>Grading: This is a required assignment for the module.</p><p>What you’ll do: You’ll create a security infrastructure design document for a fictional organization. Your plan</p><p>needs to meet the organization’s requirements and the following elements should be incorporated into your</p><p>plan:</p><p>- Authentication system</p><p>- External website security</p><p>- Internal website security</p><p>- Remote access solution</p><p>- Firewall and basic rules recommendations</p><p>- Wireless security</p><p>- VLAN configuration recommendations</p><p>- Laptop security configuration</p><p>- Application policy recommendations</p><p>- Security and privacy policy recommendations</p><p>- Intrusion detection or prevention for systems containing customer data</p><p>Please produce a security infrastructure design document plan must not be longer than 10,000 characters.</p><p>— — — — — — — — — <br>**Security Infrastructure Design Document**</p><p>**1. Authentication System:**<br>Implement a multi-factor authentication (MFA) system for all employees. This will require users to provide at least two forms of identification before gaining access to the systems.</p><p>**2. External Website Security:**<br>Use HTTPS for secure communication, and ensure that the website is regularly updated and patched. Implement a Web Application Firewall (WAF) to protect against common web-based threats like SQL injection and cross-site scripting (XSS).</p><p>**3. Internal Website Security:**<br>The internal intranet should be accessible only via the company’s secure network. Use a VPN for remote access and ensure that all traffic is encrypted.</p><p>**4. Remote Access Solution:**<br>Implement a Virtual Private Network (VPN) for secure remote access. This will allow engineers to access internal resources from outside the company network.</p><p>**5. Firewall and Basic Rules Recommendations:**<br>Implement a stateful firewall that inspects incoming and outgoing traffic. Basic rules include denying all inbound traffic by default, allowing only necessary outbound traffic, and permitting internal traffic.</p><p>**6. Wireless Security:**<br>Use WPA3 for wireless encryption. Change the default SSID and disable SSID broadcasting. Regularly change the wireless password.</p><p>**7. VLAN Configuration Recommendations:**<br>Segment the network using VLANs to isolate different types of traffic. For example, have separate VLANs for the sales department, engineering, and management.</p><p>**8. Laptop Security Configuration:**<br>All laptops should have full disk encryption, automatic locking after a period of inactivity, and up-to-date antivirus software. Regularly patch and update operating systems and applications.</p><p>**9. Application Policy Recommendations:**<br>Implement a policy of least privilege for application access. Regularly review and update access permissions. Ensure all applications are regularly patched and updated.</p><p>**10. Security and Privacy Policy Recommendations:**<br>Create a comprehensive security and privacy policy that includes guidelines for handling customer data, reporting security incidents, and acceptable use of company resources. Regularly train employees on these policies.</p><p>**11. Intrusion Detection or Prevention:**<br>Implement an Intrusion Detection System (IDS) or Intrusion Prevention System (IPS) to monitor network traffic for suspicious activity. Regularly review and update IDS/IPS rules to ensure they are effective against current threats.</p><p>This plan provides a comprehensive approach to security, covering all aspects of the organization’s operations. It prioritizes the protection of customer data and provides secure methods for employees to access the resources they need.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=e9427a6d4756" width="1" height="1" alt=""><hr><p><a href="https://medium.com/cyops/security-design-document-e9427a6d4756">Security Design Document</a> was originally published in <a href="https://medium.com/cyops">CyOps</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[estimate number of transactions in a large scale web application]]></title>
            <link>https://medium.com/cyops/estimate-number-of-transactions-in-a-large-scale-web-application-8565e84687da?source=rss----46b45048b6c8---4</link>
            <guid isPermaLink="false">https://medium.com/p/8565e84687da</guid>
            <dc:creator><![CDATA[Tanat Tonguthaisri]]></dc:creator>
            <pubDate>Tue, 06 Jun 2023 11:39:44 GMT</pubDate>
            <atom:updated>2023-06-06T11:41:15.563Z</atom:updated>
            <content:encoded><![CDATA[<p>Estimating the number of transactions in a large-scale web application involves a combination of factors, including understanding the nature of your application, the expected user base, and the type of transactions that will be performed. Here are some steps you can take:</p><p>1. <strong>Understand Your User Base</strong>: The first step is to understand your user base. How many users do you expect to have? How often will they use your application? At what time of day will they be most active? This information can help you estimate the number of transactions per user.</p><p>2. <strong>Identify Transaction Types</strong>: Next, identify the types of transactions that will be performed in your application. A transaction could be anything from a user logging in, updating a record, or making a purchase. Each of these transactions will have different frequencies.</p><p>3. <strong>Estimate Transaction Frequency</strong>: Once you have identified the types of transactions, estimate how often each transaction will occur. For example, a user might log in once per day, update a record 10 times per day, and make a purchase once per week.</p><p>4. <strong>Calculate Total Transactions</strong>: Multiply the number of users by the frequency of each transaction to estimate the total number of each type of transaction per day. Then add up all the transactions to get a total estimate.</p><p>5. <strong>Consider Peak Times</strong>: Your total estimate gives you an average number of transactions per day, but real-world usage is unlikely to be evenly distributed. Consider when your peak usage times might be and how much higher the transaction volume will be during those times.</p><p>6. <strong>Account for Growth</strong>: If you expect your user base to grow, you should factor that into your estimates. A good way to do this is to estimate the number of transactions for several different user base sizes and see how the total number of transactions scales.</p><p>7. <strong>Use Load Testing</strong>: Once you have an estimate, you can use load testing to simulate the expected number of transactions and see how your application performs. This can help you identify any potential issues before they become problems in a live environment.</p><p>Remember, these are just estimates. The actual number of transactions can vary based on a number of factors. Monitoring your application’s performance and adjusting your estimates as necessary is important.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=8565e84687da" width="1" height="1" alt=""><hr><p><a href="https://medium.com/cyops/estimate-number-of-transactions-in-a-large-scale-web-application-8565e84687da">estimate number of transactions in a large scale web application</a> was originally published in <a href="https://medium.com/cyops">CyOps</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[CISSP ISSEP]]></title>
            <link>https://medium.com/cyops/cissp-issep-fdebc774ea8f?source=rss----46b45048b6c8---4</link>
            <guid isPermaLink="false">https://medium.com/p/fdebc774ea8f</guid>
            <category><![CDATA[isc2-issep-questions]]></category>
            <category><![CDATA[isc2-issep-dumps]]></category>
            <category><![CDATA[isc2-issep-practice-tests]]></category>
            <dc:creator><![CDATA[Tanat Tonguthaisri]]></dc:creator>
            <pubDate>Wed, 21 Jul 2021 02:29:17 GMT</pubDate>
            <atom:updated>2021-07-21T02:37:51.268Z</atom:updated>
            <content:encoded><![CDATA[<p>Information Systems Security Engineering Professional</p><ul><li><a href="https://csrc.nist.gov/publications/detail/fips/199/final">Federal Information Processing Standard (FIPS) 199, Standards for Security Categorization of Federal Information and Information Systems</a></li><li><a href="https://csrc.nist.gov/publications/detail/fips/200/final">Federal Information Processing Standard (FIPS) 200, Minimum Security Requirements for Federal Information and Information Systems</a></li><li><a href="https://csrc.nist.gov/publications/detail/sp/800-30/rev-1/final">NIST Special Publication (SP) 800-30 Rev. 1, Guide for Conducting Risk Assessments</a></li><li><a href="https://csrc.nist.gov/publications/detail/sp/800-39/final">NIST Special Publication (SP) 800-39, Managing Information Security Risk: Organization, Mission, and Information System View</a></li></ul><p><a href="https://ntrl.ntis.gov/NTRL/dashboard/searchResults/titleDetail/ADA606355.xhtml">https://ntrl.ntis.gov/NTRL/dashboard/searchResults/titleDetail/ADA606355.xhtml</a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/914/1*DxjC4TLDM4qYmrwyRAmsDg.png" /></figure><ul><li><a href="https://www.nist.gov/privacy-framework/nist-sp-800-37">NIST SP 800-37</a></li><li><a href="https://csrc.nist.gov/publications/detail/sp/800-160/vol-1/final">NIST Special Publication (SP) 800-160 Vol. 1, Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems</a></li><li><a href="https://csrc.nist.gov/publications/detail/sp/800-88/rev-1/final">NIST Special Publication (SP) 800-88 Rev. 1, Guidelines for Media Sanitization</a></li><li><a href="https://csrc.nist.gov/publications/detail/sp/800-125/final">NIST Special Publication (SP) 800-125, Guide to Security for Full Virtualization Technologies</a></li><li><a href="https://csrc.nist.gov/News/2020/assessing-iscm-programs-nist-publishes-sp-800-137a">Assessing ISCM Programs: NIST SP 800-137A | CSRC</a></li><li><a href="https://csrc.nist.gov/publications/detail/sp/800-100/final">NIST Special Publication (SP) 800-100, Information Security Handbook: A Guide for Managers</a></li><li><a href="https://csrc.nist.gov/publications/detail/sp/800-18/rev-1/final">NIST Special Publication (SP) 800-18 Rev. 1, Guide for Developing Security Plans for Federal Information Systems</a></li><li><a href="https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final">NIST Special Publication (SP) 800-53 Rev. 5, Security and Privacy Controls for Information Systems and Organizations</a></li></ul><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=fdebc774ea8f" width="1" height="1" alt=""><hr><p><a href="https://medium.com/cyops/cissp-issep-fdebc774ea8f">CISSP ISSEP</a> was originally published in <a href="https://medium.com/cyops">CyOps</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Let’s talk about ABC:]]></title>
            <link>https://medium.com/cyops/zero-trust-22f6d03ae947?source=rss----46b45048b6c8---4</link>
            <guid isPermaLink="false">https://medium.com/p/22f6d03ae947</guid>
            <dc:creator><![CDATA[Tanat Tonguthaisri]]></dc:creator>
            <pubDate>Tue, 13 Jul 2021 10:11:42 GMT</pubDate>
            <atom:updated>2021-07-14T08:49:11.637Z</atom:updated>
            <content:encoded><![CDATA[<h4>Assume nothing, Believe nobody. Check everything.</h4><h3>1. Why has the perimeter defense failed us, even though it has been in use for so long?</h3><p>The ramifications of a massive, months-long hack of some of the most sensitive agencies and databases in U.S. government were unraveled towards the end of 2020. At the center of the breach, believed by some officials to have been perpetrated by Russia, was a little-known Texas-based network management software company called SolarWinds. When hackers infiltrated SolarWinds by attaching malware to a software update, they gained access to dozens of government agencies and thousands of companies. Beyond plunging the publicly traded company’s stock by nearly 40%, the hack called into doubt whether firewalls, a staple of online security, can effectively thwart sophisticated attacks.</p><h4>“It’s a failure of the paradigm that you can have a gate and castle wall and everything on the inside is fine,” says McKinnon.</h4><p>The first assumption we make when it comes to perimeter is that there only needs to be one perimeter for the entire organization. The complexity of modern IT infrastructure makes it really difficult to defend our digital resources using one single perimeter. There has been a concept deperimeterization since the time of Jericho Forum back in 2003, using a mixture of encryption, secure computer protocols, secure computer systems and data-level authentication.</p><p>There were attempts to make perimeters more compact and surrounding individual resources that need protection. This came a concept of microsegmentation where you can isolate workloads and secure them individually. Policies can then be applied to limit network traffic between workloads.</p><h3>2. The ABC concepts behind ZT are lofty and high sounding. Are they realistic?</h3><p>Assume nothing should really be assume breach.</p><p>Believe nobody or trust no one was a really popular catch phrase of a famous Sci-Fi series back in the 90s.</p><p>Check everything or always verify.</p><p>Implementing a ZTA is a journey rather than a wholesale replacement of infrastructure or processes. An organization should seek to incrementally implement zero trust principles, process changes, and technology solutions that protect its highest value data assets. Most enterprises will continue to operate in a hybrid zero-trust along side perimeter-based mode for an indefinite period while continuing to invest in ongoing IT modernization initiatives. It is important to balance security, usability, and cost-effectiveness. Putting security way ahead of usability, there may be unhappy users looking for ways around your system.</p><h3>3. Are the concepts behind ZT really new?</h3><p>Deperimeterization, Microsegmentation, Software-Defined Perimeter,</p><p>ZTX Framework:</p><ul><li><strong>Network</strong>: How does the technology enable network isolation, segmentation, and security?</li><li><strong>Data:</strong> How does it enable data categorization, schemas, isolation, encryption, and control?</li><li><strong>People:</strong> What does the solution do to secure the people using the network and business infrastructure? Does it reduce the threat that users create?</li><li><strong>Workload:</strong> Does it secure cloud networks, apps, and other things used to make businesses operate technically?</li><li><strong>Devices: </strong>Does it always isolate, secure, and control every device (including mobile devices) accessing enterprise resources?</li><li><strong>Visibility and Analytics:</strong> What kinds of useful analytics and data points does it provide?</li><li><strong>Automation and Orchestration:</strong> How does it automate Zero Trust principles? How does it provide more control of disparate systems?</li></ul><p>Google BeyondCorp:</p><ul><li>Access to services must not be determined by the network from which you connect</li><li>Access to services is granted based on contextual factors from the user and their device</li><li>Access to services must be authenticated, authorized, and encrypted</li></ul><p>Continuous Adaptive Risk and Trust Assessment (CARTA):</p><ul><li>100% device visibility and automated control</li><li>Continuous monitoring, assessment and remediation of cyber and operational risk</li><li>Micro-segmentation to contain breaches and limit lateral movement/damage</li><li>Technologies and products from multiple vendors</li><li>New levels of multivendor orchestration and process/response automation</li><li>Discovery, posture assessment and remediation/control of physical and virtual devices as well as cloud infrastructure and workloads</li><li>Effective security management of agentless IoT devices and cyber-physical OT systems</li></ul><h3>4. How does the ZT philosophy change the way we approach security?</h3><p>Defense-in-depth, Visibility, Continuous Diagnostics and Mitigation (CDM)</p><ul><li>What is connected?: What devices, applications, and services are used by the organization? This includes observing and improving the security posture of these artifacts as vulnerabilities and threats are discovered.<br>• Who is using the network?: What users are part of the organization or are external and allowed to access enterprise resources? These include NPEs that may be performing autonomous actions.<br>• What is happening on the network?: An enterprise needs insight into traffic patterns and messages between systems.<br>• How is data protected?: The enterprise needs a set policy on how information is protected at rest, in transit, and in use.</li></ul><h3>5. Do we have to throw away what we know so far &amp; start anew?</h3><p>Security has always been a team sport. You need nuts, bolts and gears in place, functioning together and performing the best in their roles in order to improve the overall security posture of your enterprise. You may need to replace dated equipment with next gen solutions.</p><h3>6. What concrete actions should I take to embrace ZT in my organization?</h3><p>High availability is security.</p><p>Part of the security of the Cloud Application Platform is high availability. A highly available application absorbs fluctuations in availability, load, and temporary failures in the dependent services and hardware.</p><ol><li>VMs: ensure capacity and high availability even in case of partial VM outage occurring due to maintenance tasks.</li><li>PaaS services: ensure high availability of all the PaaS services, e.g. a primary and a replica, automatic failover</li><li>Database: design to connect to secondary instance in case of failure in primary instance</li><li>Environments: Provide a detailed sizing document for IaaS and PaaS components in production environment. Ensure DR and Test are adequate.</li><li>Storage: encryption and redundancy. Backup data across regions for business continuity for virtual machine disks, blob/bucket storage, storage for logs and storage for backup data.</li></ol><p>ATP on the same platform, old VPN to ZTNA</p><p>Deep packet inspection</p><p>Users expect high performance with low latency, because if it is slow, unhappy users will look for ways around your system.</p><p>engineered for high performance and located in the places that your users are.</p><p>Many vendors are adapting or virtualizing their software and calling it a cloud-based solution. If it isn’t designed properly, you may end up with multiple administrative consoles, complex policies that are hard to manage, and time-wasting tools for conducting investigations.</p><p>Choose a solution that has a single management console, single client, and a single policy engine to streamline operations and effectiveness for network and security teams.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=22f6d03ae947" width="1" height="1" alt=""><hr><p><a href="https://medium.com/cyops/zero-trust-22f6d03ae947">Let’s talk about ABC:</a> was originally published in <a href="https://medium.com/cyops">CyOps</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[CISM, PMP, CAMS, CAP]]></title>
            <link>https://medium.com/cyops/cism-pmp-cams-cap-3f558b225cd7?source=rss----46b45048b6c8---4</link>
            <guid isPermaLink="false">https://medium.com/p/3f558b225cd7</guid>
            <category><![CDATA[certification]]></category>
            <dc:creator><![CDATA[Tanat Tonguthaisri]]></dc:creator>
            <pubDate>Fri, 06 Mar 2020 08:53:10 GMT</pubDate>
            <atom:updated>2020-03-06T08:53:10.378Z</atom:updated>
            <content:encoded><![CDATA[<p>CISM, PMP, CAMS, CAP</p><ul><li><a href="https://www.isaca.org/credentialing/cism">CISM Certification | Certified Information Security Manager | ISACA</a></li><li><a href="https://www.pmi.org/certifications/types/project-management-pmp">PMP Certification | Project Management Institute</a></li><li><a href="https://www.acams.org/earn-the-aml-certification-gold-standard/">CAMS Certification Steps | ACAMS</a></li><li><a href="https://www.certifiedanalytics.org/for_professionals.php">Certified Analytics Professional (CAP®) -- For Professionals</a></li></ul><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=3f558b225cd7" width="1" height="1" alt=""><hr><p><a href="https://medium.com/cyops/cism-pmp-cams-cap-3f558b225cd7">CISM, PMP, CAMS, CAP</a> was originally published in <a href="https://medium.com/cyops">CyOps</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Splunk Core Certified Consultant]]></title>
            <link>https://medium.com/cyops/splunk-core-certified-consultant-bf1b78d815ea?source=rss----46b45048b6c8---4</link>
            <guid isPermaLink="false">https://medium.com/p/bf1b78d815ea</guid>
            <category><![CDATA[certification]]></category>
            <category><![CDATA[splunk]]></category>
            <dc:creator><![CDATA[Tanat Tonguthaisri]]></dc:creator>
            <pubDate>Fri, 06 Mar 2020 08:47:46 GMT</pubDate>
            <atom:updated>2020-03-06T08:47:29.796Z</atom:updated>
            <content:encoded><![CDATA[<p>Splunk Core Certified Consultant</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/600/1*0Eb84eH73Fp1QzF7ZY62LQ.png" /><figcaption>Splunk Core Certified Consultant</figcaption></figure><p><a href="https://www.splunk.com/en_us/training/certification-track/splunk-core-certified-consultant.html">splunk-core-certified-consultant</a></p><p>Splunk Fundamentals 1<br>4 hours</p><p>Splunk Core Certified User<br>$125</p><p>Splunk Fundamentals 2<br>2 days<br>$2,000</p><p>Splunk Core Certified Power User<br>$125</p><p>Splunk Enterprise System Administration<br>2 days<br>$1,000</p><p>Splunk Enterprise Data Administration<br>3 days<br>$1,500</p><p>Splunk Enterprise Certified Admin<br>$125</p><p>Architecting Splunk Enterprise<br>2 days<br>$1,500</p><p>Troubleshooting Splunk Enterprise<br>2 days<br>$1,000</p><p>Splunk Enterprise Cluster Administration<br>3 days<br>$1,500</p><p>Splunk Enterprise Practical Lab<br>24 hours<br>$1,000</p><p>Splunk Enterprise Certified Architect<br>$125</p><p>Splunk Fundamentals 3<br>2 days<br>$2,000</p><p>Creating Dashboards with Splunk<br>2 days<br>$1,000</p><p>Advanced Searching and Reporting with Splunk<br>1 day<br>$500</p><p>Cost of 21-day trainings: $13,000<br>Cost of 4 exams: $500</p><p>Total in Thai Baht: ฿425,000</p><p><a href="https://www.youracclaim.com/org/splunk/badge/splunk-core-certified-consultant">https://www.youracclaim.com/org/splunk/badge/splunk-core-certified-consultant</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=bf1b78d815ea" width="1" height="1" alt=""><hr><p><a href="https://medium.com/cyops/splunk-core-certified-consultant-bf1b78d815ea">Splunk Core Certified Consultant</a> was originally published in <a href="https://medium.com/cyops">CyOps</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Virtual Labs]]></title>
            <link>https://medium.com/cyops/virtual-labs-76478e688933?source=rss----46b45048b6c8---4</link>
            <guid isPermaLink="false">https://medium.com/p/76478e688933</guid>
            <category><![CDATA[hacking]]></category>
            <dc:creator><![CDATA[Tanat Tonguthaisri]]></dc:creator>
            <pubDate>Fri, 06 Dec 2019 08:47:33 GMT</pubDate>
            <atom:updated>2019-12-06T08:48:12.822Z</atom:updated>
            <content:encoded><![CDATA[<p>VM for practice</p><ul><li><a href="https://www.pentesteracademy.com/">Pentester Academy: Learn Pentesting Online</a></li><li><a href="https://www.virtualhackinglabs.com/">Virtual Hacking Labs | IT Security Training Labs &amp; Courses</a></li><li><a href="https://pentesterlab.com/">Advanced Web Hacking and Security Code Review Training | PentesterLab</a></li><li><a href="https://practice-labs.com/">The IT competency hub</a></li></ul><iframe src="https://cdn.embedly.com/widgets/media.html?type=text%2Fhtml&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;schema=reddit&amp;url=https%3A//www.reddit.com/r/oscp/comments/c4eujv/thoughts_on_pentester_academy/&amp;image=" width="600" height="400" frameborder="0" scrolling="no"><a href="https://medium.com/media/db6d6074be6fcb399001c7a730603d4c/href">https://medium.com/media/db6d6074be6fcb399001c7a730603d4c/href</a></iframe><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=76478e688933" width="1" height="1" alt=""><hr><p><a href="https://medium.com/cyops/virtual-labs-76478e688933">Virtual Labs</a> was originally published in <a href="https://medium.com/cyops">CyOps</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
    </channel>
</rss>