2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet653/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   649   650   651   652   653   654   655   656   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Mandatory Vacations 
Many organizations require employees to take
mandatory vacations
in one-week or two-
week increments. This provides a form of peer review and helps detect fraud and collusion. 


704
Chapter 16 

Managing Security Operations
This policy ensures that another employee takes over an individual’s job responsibilities for 
at least a week. If an employee is involved in fraud, the person taking over the responsibili-
ties is likely to discover it. 
Mandatory vacations can act as both a deterrent and a detection mechanism, just as job 
rotation policies can. Even though someone else will take over a person’s responsibilities for 
just a week or two, this is often enough to detect irregularities. 
Financial organizations are at risk of significant losses from fraud by 
employees. They often use job rotation, separation of duties and responsi-
bilities, and mandatory vacation policies to reduce these risks. Combined, 
these policies help prevent incidents and help detect them when they 
occur.
Privileged Account Management 
Privileged account management ensures that personnel do not have more privileges than they 
need and that they do not misuse these privileges. Special privilege operations are activities 
that require special access or elevated rights and permissions to perform many administrative 
and sensitive job tasks. Examples of these tasks include creating new user accounts, adding 
new routes to a router table, altering the confi guration of a fi rewall, and accessing system 
log and audit fi les. Using common security practices, such as the principle of least privilege, 
ensures that only a limited number of people have these special privileges. Monitoring ensures 
that users granted these privileges do not abuse them. 
Accounts granted elevated privileges are often referred to as privileged entities that have 
access to special, higher-order capabilities inaccessible to normal users. If misused, these 
elevated rights and permissions can result in signifi cant harm to the confi dentiality, integ-
rity, or availability of an organization’s assets. Because of this, it’s important to monitor 
privileged entities and their access. 
In most cases, these elevated privileges are restricted to administrators and certain sys-
tem operators. In this context, a system operator is a user who needs additional privileges 
to perform specifi c job functions. Regular users (or regular system operators) only need the 
most basic privileges to perform their jobs. 
The task of monitoring special privileges is used in conjunction with 
other basic principles, such as least privilege and separation of duties 
and responsibilities. In other words, principles such as least privilege and 
separation of duties help prevent security policy violations, and monitoring 
helps to deter and detect any violations that occur despite the use of pre-
ventive controls.
Employees fi lling these privileged roles are usually trusted employees. However, there 
are many reasons why an employee can change from a trusted employee to a disgruntled 
employee or malicious insider. Reasons that can change a trusted employee’s behavior can 
be as simple as a lower-than-expected bonus, a negative performance review, or just a 


Applying Security Operations Concepts 
705
personal grudge against another employee. However, by monitoring usage of special privi-
leges, an organization can deter an employee from misusing the privileges and detect the 
action if a trusted employee does misuse them.
In general, any type of administrator account has elevated privileges and should be 
monitored. It’s also possible to grant a user elevated privileges without giving that user full 
administrative access. With this in mind, it’s also important to monitor user activity when 
the user has certain elevated privileges. The following list includes some examples of privi-
leged operations to monitor.

Accessing audit logs

Changing system time

Configuring interfaces

Managing user accounts

Controlling system reboots

Controlling communication paths

Backing up and restoring the system

Running script/task automation tools

Configuring security mechanism controls

Using operating system control commands

Using database recovery tools and log files
Many automated tools are available that can monitor these activities. When an adminis-
trator or privileged operator performs one of these activities, the tool can log the event and 
send an alert. Additionally, access review audits detect misuse of these privileges.
detecting aPTs
Monitoring the use of elevated privileges can also detect advanced persistent threat 
(APT) activities. As an example, the U.S. Department of Homeland Security (DHS) and the 
Federal Bureau of Investigation (FBI) released a technical alert (TA17-239A) describing
the activities of an APT targeting energy, nuclear, water, aviation, and some critical manu-
facturing sectors, along with some government entities in late 2017.
The alert details how attackers infected a single system with a malicious phishing email 
or by exploiting server vulnerabilities. Once they exploited a single system, they esca-
lated their privileges and began performing many common privileged operations includ-
ing the following: 

Accessing and deleting logs

Creating and manipulating accounts (such as adding new accounts to the 
administrators group)



Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   649   650   651   652   653   654   655   656   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish