Domain 7: Security Operations
IT Asset Management (ITAM)
Configuration Management Database (CMDB)
Privileged Users in IT
Includes:
Supervisor Responsibilities:
Zero-Day Vulnerability
Incident Response Terminology
CIRT (Cyber Incident Response Team)
Basic Incident Response Phases
(ISC)² Incident Response Phases
SANS Incident Response Phases
Logging an Incident
Threat Intelligence
Knowledge about current and emerging threats to help prevent or
mitigate cyberattacks.
Sources:
UEBA (User and Entity Behavior Analytics)
Analyzing network activity to detect anomalous behavior.
Targets:
SOAR (Security Orchestration, Automation, and Response)
Term coined by Gartner to describe tools that automate repetitive
security tasks.
Benefits:
Software-Defined Security
Security model managed through policy-driven software.
Features:
SIEM (Security Information and Event Management)
Splunk, SolarWinds, Datadog
Function:
SIEM Tuning
Reduce false positives without increasing false negatives.
Benefit:
Minimizes analyst fatigue and
improves alert quality
Audit Log Reduction Tools
Dr. Edmond Locard
Pioneer in forensic science
Locard’s Principle of Exchange:
Suspect Narrowing Strategy
Mnemonic: M.O.M.
Hearsay
Evidence based on what the witness was told, not what they personally
know.
Note:
Not normally admissible in court.
Chain-of-Custody
Chronological documentation of evidence handling.
Must Track:
Interviewing
Discover what happened.
Method:
Interrogation
Obtain testimony or confession to be used as evidence in trial.
Expert Witness
Educates the jury on specialized topics.
Use:
Can be presented as evidence.
Evidence Admissibility Rules
Mnemonic: S.T.R.I.C.
Evidence Lifecycle
Capturing Digital Evidence
Start from volatile forms, then move to persistent forms.
Order of Volatility (OOV)
Hard Drive Analysis Process
Slack Space
Disk areas with lingering data from deleted files.
Forensics Tip:
Inspect slack space for hidden
data fragments.
Common Types of Evidence
Types of Evidence (Legal Definitions)
Types of Digital Forensics
1. Media Analysis:
2. Software Analysis:
3. Network Analysis:
Legal Terms in Digital Forensics
Categories of Computer Crime
Trusted Path
A secure communication path that ensures:
Types of IDPS (Detection/Prevention)
Network-Based IDPS:
Host-Based IDPS:
Alternate Names for Host-Based IDPS:
Why Use Both Network & Host-Based IDPS?
IDPS Scanning Technologies
Signature-Based (Pattern Matching / Knowledge-Based):
Behavior-Based (Anomaly-Based / Profile-Based):
IDPS Detection Outcomes
True Postive - correctly identifies an intrusion
True Negative - correctly identifies no intrusion
False Positive - mistakenly flags legitimate traffic as intrusion
False Negative - fails to detect an actual intrusion
IDS Placement Scenarios
IDS Placement – Internet-Side of Firewall
Advantages:
IDS Placement – LAN-Side of Firewall
Advantages:
Honeypot / Honey-net
Fake targets designed to lure attackers
Benefits:
Padded Cell
Sandboxed honeypot environment
Function:
Attacker is redirected here by IDS
Backup Strategy
Recover data in case of deletion, corruption, or alteration
3-2-1 Rule:
Backup Types
Onsite Backup:
Offsite Backup:
Cloud Backup (Electronic Vaulting):
Backup Types & Schedule
Example Schedule:
Archive Bit
A flag attached to each file that is turned on when the file is edited.
Used by:
Incremental and differential backups to determine which files to
back up.
Backup Restoration Rules
To restore a system:
Summary:
Latest full + last night’s + all incrementals in-between
Media Management Tips
Tape Rotation Schemes
Purpose:
Avoid overwriting important backups and maintain historical copies
File Sensitivity & CIA
Disk Check
Checking the starting and ending sectors of each partition
Tool Example:
chkdsk (Microsoft command-line utility)
RAID 0
Type: Striping
Disks: 2–32
Purpose: Performance
Fault Tolerance: ❌ Not fault-tolerant
RAID 1
Type: Mirroring
Disks: Exactly 2
Purpose: Fault tolerance
Performance: ❌ Not for performance
RAID 5
Type: Striping with Distributed Parity
Disks: Minimum 3
Purpose: Performance + Fault tolerance
Fault Tolerance: Can lose any 1 disk
RAID 6
Type: Striping with Distributed Parity
Disks: Minimum 4
Purpose: Performance + Fault tolerance
Fault Tolerance: Can lose any 2 disks
RAID 10 (1+0)
Type: Mirrored RAID 0 or Striped RAID 1
Purpose: Combines performance and fault tolerance
NAS (Network Attached Storage)
Function: Local data storage and retrieval over LAN
Protocols: SMB/CIFS
Access: Direct user access
SAN (Storage Area Network)
Function: Centralized storage for servers
Protocols: iSCSI, Fibre Channel, FCoE
Access: No direct user access; servers retrieve data
VSAN (Virtual SAN)
Function: Logical separation of a physical SAN
Analogy: Like VLANs for networks
DLP (Data Loss Prevention)
Prevent sensitive data from leaving the organization
Types:
NAS vs SAN Overview
NAS (Network Attached Storage):
SAN (Storage Area Network):
Disaster Recovery Locations
Mirrored Site
Hot Site
Warm Site
Cold Site
Reciprocal Agreement
Dual Sites
Other Sites to Plan For:
Resource Capacity Agreement
Miscellaneous Planning Tips
Call-Tree / Call-List
Disaster Recovery vs. Restoration
Restoration Steps
Checklist / Desk-Check
Table-Top Review
Structured Walk-Through
Simulation Test
Parallel Test
Full-Interruption Test
DRP Testing Frequency
DRP Miscellaneous
Version Control for DRP
Failure Modes
Fail Open
Fail Closed
Fail Secure
Fail Soft
Fail Safe
Fail Over