71 lines
2.3 KiB
Markdown
71 lines
2.3 KiB
Markdown
# Introduction
|
|
|
|
## Teams involved in security
|
|
|
|
* red: attack team
|
|
* test effectiveness of security by performing attacks
|
|
* blue: defend team
|
|
* defend against attacks by constantly surveiling the network
|
|
* yellow: build team
|
|
* builds applications that can be used by the other teams
|
|
* sharing knowledge
|
|
* orange: builders learn from attackers
|
|
* green: builder learn from defenders
|
|
* purple: defenders learn from attackers
|
|
|
|
![Teams](img/ch01/security-teams.jpg)
|
|
|
|
## Penetration testing
|
|
|
|
### Penetration testers <-> red teams
|
|
|
|
* penetration testing
|
|
* methodical approach
|
|
* limited by Rules of Engagement (restricted scope)
|
|
* 1-2 week engagement
|
|
* generally announced
|
|
* goal is to assess security of network and systems
|
|
* red team
|
|
* flexible approach
|
|
* anything goes (as long as it's legal)
|
|
* 1 week to 6 months engagement
|
|
* no announcement
|
|
* goal is to test general security posture of company
|
|
|
|
### Penetrating testing <-> vulnerability assessments
|
|
|
|
* penetration testing
|
|
* find vulnerabilities, both automated and manually
|
|
* exploit them
|
|
* attempt to gather confidential data
|
|
* intended to go deeper and focus on technical issues
|
|
* vulnerability assessment
|
|
* find vulnerabilities through automated means
|
|
* don't exploit them or gather data
|
|
* broader and often includes explicit policy and procedure review
|
|
|
|
### assumed breach exercise
|
|
|
|
* pentest where attackers are assumed to already be inside
|
|
* malware is dropped inside company boundaries
|
|
* getting caught not the end -> reset and try again
|
|
* **Time To Detect** (TTD): how long it takes to notice breach
|
|
* **Time To Mitigate** (TTM): how long it takes to perform corrective action
|
|
|
|
### Useful resources
|
|
|
|
* [MITRE](https://attack.mitre.org/): knowledge base of attack tactics and
|
|
techniques
|
|
* explanation of **TTP**s (Tactics, Techniques and Procecures)
|
|
* [APT Groups and Operations](https://apt.threattracking.com/): Google doc containing
|
|
list of dangerous groups
|
|
* [Cyber Fundamentals](https://atwork.safeonweb.be/nl/tools-resources/cyberfundamentals-framework)
|
|
* concrete measures on how to protect data and ensure safety in company
|
|
* four assurance levels
|
|
* five core functions
|
|
1. identify
|
|
2. protect
|
|
3. detect
|
|
4. respond
|
|
5. recover
|