Defensive Security

Overview

Defensive security, known as the blue team, is used to prepare and proactively protect an organisation’s IT infrastructure. It is concerned with two main tasks:

  • Preventing intrusions from occurring
  • Detecting intrusions when they occur and responding properly

Some of the tasks that are involved in defensive security include:

  1. Cyber Security Awareness
    Training users about cyber security attacks, such as phishing and social engineering.
  2. Documenting & Managing Assets
    We must know the systems within the organisation to adequately protect them.
  3. Preventative Security
    Firewalls and Intrusion Prevention Systems are the first line of defence. These devices control what traffic is allowed to enter and leave the network and prevents malicious traffic from entering the network.
  4. Logging & Monitoring
    Comprehensive logging of the network and system activity is essential in detecting a threat or unauthorised activity.
  5. Frameworks, Policies & Procedures
    Creating robust security policies helps ensure that the organisation’s devices are used appropriately.

Exploring the SOC

Security Operations Centre (SOC)

A Security Operations Centre (SOC) is a team of cyber security professionals that monitors the network and its systems to detect malicious cyber security events. Some of the main areas of interest for a SOC are:

  1. Trends & Vulnerability Awareness
    Keeping up to date with the latest trends and vulnerabilities in the industry is an essential skill to help understand the risks an organisation faces.
  2. Policy Violations
    A security policy is a set of rules that outline how an organisation’s assets are to be used and protected. The SOC team monitors for adherence to these policies.
  3. Unauthorised & Illegal Activity
    The SOC team establishes a baseline of acceptable behaviour and activity. Any deviation from this baseline is investigated. Illegal activity exposes the organisation to higher risk.
  4. Intrusion & Breach Detection
    No matter how well protected an organisation is, there is always a risk of a breach. The SOC team is responsible for detecting and responding to these breaches.

Digital Forensics

Digital forensics is the application of traditional forensic science processes to digital devices. Digital forensics is used to preserve and analyse digital evidence to aide in the investigation of incidents, such as a breach. This may involve looking at information from:

  1. File System
    Analysing a low-level copy of a system’s storage reveals much information, such as installed programs, created, partially overwritten and deleted files.
  2. System Memory
    If an attacker runs a malicious program within the memory without saving it to the disk, the memory can be analysed to uncover details about how the program operates.
  3. System Logs
    Log files provide plenty of information about what happened on a system. Even if the attacker tries to clear their traces, some traces will remain.
  4. Network Logs
    Logs of the network traffic that have traversed a network would help answer more questions about whether an attack is occurring and what it entails.

Incident Response

Incident Response is how organisations manage security events such as breaches, data leaks and cyber attacks. An incident response process is a defined set of stages to minimise damage, contain the threat and recover fast. The process will look like so:

Incident Response Let’s explore these in a bit further detail:

  1. Preparation
    Creating the necessary resources and frameworks to handle an incident. This includes creating incident response teams, infrastructure to support in the incident response process, as well anything to help prevent the incidents, such as providing phishing awareness training.
  2. Detection & Analysis
    Using tooling and processes to detect incidents and assess their scope (reach) and severity. Logs can be analysed for suspicious events.
  3. Containment, Eradication, and Recovery
    Limiting the impact of the incident, such as preventing a virus from spreading and eliminate the cause and restore affected systems.
  4. Post-Incident Activity
    Review the incident overall, how it was handled and could’ve been prevented. What were the learning points throughout the process? Do we need to provide further cyber awareness training?