Skip to content

Latest commit

 

History

History
282 lines (253 loc) · 15 KB

README.md

File metadata and controls

282 lines (253 loc) · 15 KB

Class 4: Security and Privacy

Show timeline

Guidances for security and privacy

  • InfoSec/CIA https://en.wikipedia.org/wiki/Information_security
  • NIST SP 800-53 (Security and Privacy Controls for Information Systems and Organizations) Rev.5
    1. AC - Access Control
    2. AT - Awareness and Training
    3. AU - Audit and Accountability
    4. CA - Assessment, Authorization and Monitoring
    5. CM - Configuration Management
    6. CP - Contingency Planning
    7. IA - Identification and Authentication
    8. IR - Incident Response
    9. MA - Maintenance
    10. MP - Media Protection
    11. PE - Physical and Environmental Protection
    12. PL - Planning
    13. PM - Program Management
    14. PS - Personnel Security
    15. PT - Personally Identifiable Information Processing and Transparency
    16. RA - Risk Assessment
    17. SA - System and Services Acquisition
    18. SC - System and Communications Protection
    19. SI - System and Information Integrity
    20. SR - Supply Chain Risk Management
  • NIST SP 800-160 Vol.2 (Developing Cyber-Resilient Systems)
    1. Adaptive Response: Implement agile courses of action to manage risks.
    2. Analytic Monitoring: Monitor and analyze a wide range of properties and behaviors on an ongoing basis and in a coordinated way.
    3. Contextual Awareness: Construct and maintain current representations of the posture of missions or business functions while considering threat events and courses of action.
    4. Coordinated Protection: Ensure that protection mechanisms operate in a coordinated and effective manner.
    5. Deception: Mislead, confuse, hide critical assets from, or expose covertly tainted assets to the adversary.
    6. Diversity: Use heterogeneity to minimize common mode failures, particularly threat events exploiting common vulnerabilities.
    7. Dynamic Positioning: Distribute and dynamically relocate functionality or system resources.
    8. Non-Persistence: Generate and retain resources as needed or for a limited time.
    9. Privilege Restriction: Restrict privileges based on attributes of users and system elements, as well as on environmental factors.
    10. Realignment: Structure systems and resource uses to align with mission or business function needs, reduce current and anticipated risks, and accommodate the evolution of technical, operational, and threat environments.
    11. Redundancy: Provide multiple protected instances of critical resources.
    12. Segmentation: Define and separate system elements based on criticality and trustworthiness.
    13. Substantiated Integrity: Ascertain whether critical system elements have been corrupted.
    14. Unpredictability: Make changes randomly or unpredictably.

Identity and access management

Security protocols and tools

Web security standards

Certificate tools

SAST and other static analysys

DAST, Runtime threat detection and CWP

Secret management

Email security

Directory service

Policy management

Secure coding

Vulnerability databases

Cryptography