<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Portfolio on My Portfolio</title>
    <link>https://kazuf3.nicheapplab.com/categories/portfolio/</link>
    <description>Recent content in Portfolio on My Portfolio</description>
    <image>
      <title>My Portfolio</title>
      <url>https://kazuf3.nicheapplab.com/%3Clink%20or%20path%20of%20image%20for%20opengraph,%20twitter-cards%3E</url>
      <link>https://kazuf3.nicheapplab.com/%3Clink%20or%20path%20of%20image%20for%20opengraph,%20twitter-cards%3E</link>
    </image>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Wed, 26 Jul 2023 10:16:50 -0700</lastBuildDate>
    <atom:link href="https://kazuf3.nicheapplab.com/categories/portfolio/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Cyber Security Portfolio Index</title>
      <link>https://kazuf3.nicheapplab.com/posts/cyber-security-portfolio-index/</link>
      <pubDate>Mon, 17 Jul 2023 20:19:48 -0700</pubDate>
      <guid>https://kazuf3.nicheapplab.com/posts/cyber-security-portfolio-index/</guid>
      <description>&lt;h2 id=&#34;google-cybersecurity-professional-course&#34;&gt;Google Cybersecurity Professional Course&lt;/h2&gt;
&lt;dl&gt;
&lt;dt&gt;&lt;a href=&#34;https://kazuf3.nicheapplab.com/posts/security-audit/&#34;&gt;Security Audit&lt;/a&gt;&lt;/dt&gt;
&lt;dd&gt;Conduct a security audit&lt;/dd&gt;
&lt;dt&gt;&lt;a href=&#34;https://kazuf3.nicheapplab.com/posts/incident-report/&#34;&gt;Incident Report&lt;/a&gt;&lt;/dt&gt;
&lt;dd&gt;Use the NIST Cybersecurity Framework to respond to a security incident&lt;/dd&gt;
&lt;dt&gt;&lt;a href=&#34;https://kazuf3.nicheapplab.com/posts/linux-commands/&#34;&gt;Linux Commands&lt;/a&gt;&lt;/dt&gt;
&lt;dd&gt;Use Linux commands to manage file permissions&lt;/dd&gt;
&lt;dt&gt;&lt;a href=&#34;https://kazuf3.nicheapplab.com/posts/sql-queries/&#34;&gt;SQL Queries&lt;/a&gt;&lt;/dt&gt;
&lt;dd&gt;Apply filters to SQL queries&lt;/dd&gt;
&lt;dt&gt;&lt;a href=&#34;https://kazuf3.nicheapplab.com/posts/vulnerability-assessment/&#34;&gt;Vulnerability Assessment&lt;/a&gt;&lt;/dt&gt;
&lt;dd&gt;Conduct a vulnerability assessment based on NIST SP-800-30&lt;/dd&gt;
&lt;dt&gt;&lt;a href=&#34;https://kazuf3.nicheapplab.com/posts/incident-handlers-journal/&#34;&gt;Incident Handler&amp;rsquo;s Journal&lt;/a&gt;&lt;/dt&gt;
&lt;dd&gt;Documenting of incident responses&lt;/dd&gt;
&lt;dt&gt;&lt;a href=&#34;https://kazuf3.nicheapplab.com/posts/algorithm-for-file-update-in-python/&#34;&gt;File handling in Python&lt;/a&gt;&lt;/dt&gt;
&lt;dd&gt;Using Python to maintain a security related file (allow-list_&lt;/dd&gt;
&lt;/dl&gt;
&lt;h2 id=&#34;how-to-articles&#34;&gt;How-to articles&lt;/h2&gt;
&lt;p&gt;Wazuh XDR and SIEM&lt;/p&gt;</description>
    </item>
    <item>
      <title>Algorithm for File Update in Python</title>
      <link>https://kazuf3.nicheapplab.com/posts/algorithm-for-file-update-in-python/</link>
      <pubDate>Wed, 26 Jul 2023 10:16:50 -0700</pubDate>
      <guid>https://kazuf3.nicheapplab.com/posts/algorithm-for-file-update-in-python/</guid>
      <description>&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://kazuf3.nicheapplab.com/posts/cyber-security-portfolio-index/&#34;&gt;Back to index&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;project-description&#34;&gt;Project description&lt;/h2&gt;
&lt;p&gt;This project describes an activity of updating a text file, based on the
necessity of the business.&lt;/p&gt;
&lt;p&gt;It is designed for a process to maintain allow-list-based access control list.
In order to restrict access of unauthorized users, businesses are required to
review the list and remove access privileges on a need-to basis. With a given
list of IP addresses, the program will remove them from the allow-list and write
IP addresses back to the text file.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Incident Handler&#39;s Journal</title>
      <link>https://kazuf3.nicheapplab.com/posts/incident-handlers-journal/</link>
      <pubDate>Wed, 26 Jul 2023 09:48:13 -0700</pubDate>
      <guid>https://kazuf3.nicheapplab.com/posts/incident-handlers-journal/</guid>
      <description>&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://kazuf3.nicheapplab.com/posts/cyber-security-portfolio-index/&#34;&gt;Back to index&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#entry-1&#34;&gt;Entry 1&lt;/a&gt;: Analyzing ransomeware incident&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#entry-2&#34;&gt;Entry 2&lt;/a&gt;: Analyzing phishing email&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#entry-3&#34;&gt;Entry 3&lt;/a&gt;: Following up with playbook&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#entry-4&#34;&gt;Entry 4&lt;/a&gt;: Review on incident final report&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#entry-5&#34;&gt;Entry 5&lt;/a&gt;: Using Splunk to analyze malicious logins&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#entry-6&#34;&gt;Entry 6&lt;/a&gt;: Using Chronicle to analyze phishing attempts&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;entry-1&#34;&gt;Entry 1&lt;/h2&gt;
&lt;p&gt;Date: 07/19/2023&lt;/p&gt;
&lt;h3 id=&#34;description&#34;&gt;Description&lt;/h3&gt;
&lt;p&gt;Ransomeware damaged a clinic.&lt;/p&gt;
&lt;p&gt;A small U.S. health care clinic experienced a security incident on Tuesday at
9:00 a.m. which severely disrupted their business operations.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Vulnerability Assessment</title>
      <link>https://kazuf3.nicheapplab.com/posts/vulnerability-assessment/</link>
      <pubDate>Wed, 26 Jul 2023 09:21:06 -0700</pubDate>
      <guid>https://kazuf3.nicheapplab.com/posts/vulnerability-assessment/</guid>
      <description>&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://kazuf3.nicheapplab.com/posts/cyber-security-portfolio-index/&#34;&gt;Back to index&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#nist-sp-800-30-rev1&#34;&gt; NIST SP 800-30 Rev.1 (given) &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://kazuf3.nicheapplab.com/posts/vulnerability-assessment-report/&#34;&gt; Vulnerability Assessment Report &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;nist-sp-800-30-rev1&#34;&gt;NIST SP 800-30 Rev.1&lt;/h2&gt;
&lt;h3 id=&#34;guide-to-assessing-risk&#34;&gt;Guide to assessing risk&lt;/h3&gt;
&lt;p&gt;NIST SP 800-30 is a publication that provides guidance on performing risk
assessments. It outlines strategies for identifying, analyzing, and remediating
risks. Organizations use NIST SP 800-30 to gain insights into the potential
likelihood and severity of risks—helping them make informed decisions about
allocating resources, implementing controls, and prioritizing remediation
efforts.&lt;/p&gt;</description>
    </item>
    <item>
      <title>SQL Queries</title>
      <link>https://kazuf3.nicheapplab.com/posts/sql-queries/</link>
      <pubDate>Tue, 18 Jul 2023 18:05:51 -0700</pubDate>
      <guid>https://kazuf3.nicheapplab.com/posts/sql-queries/</guid>
      <description>&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://kazuf3.nicheapplab.com/posts/cyber-security-portfolio-index/&#34;&gt;Back to index&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#scenario&#34;&gt;Scenario(given)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://kazuf3.nicheapplab.com/posts/apply-filters-to-sql-queries/&#34;&gt;Apply filters to SQL queries&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;scenario&#34;&gt;Scenario&lt;/h2&gt;
&lt;p&gt;You are a security professional at a large organization. Part of your job is to
investigate security issues to help keep the system secure. You recently
discovered some potential security issues that involve login attempts and
employee machines.&lt;/p&gt;
&lt;p&gt;Your task is to examine the organization’s data in their employees and
log_in_attempts tables. You’ll need to use SQL filters to retrieve records from
different datasets and investigate the potential security issues.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Linux Commands</title>
      <link>https://kazuf3.nicheapplab.com/posts/linux-commands/</link>
      <pubDate>Tue, 18 Jul 2023 18:05:44 -0700</pubDate>
      <guid>https://kazuf3.nicheapplab.com/posts/linux-commands/</guid>
      <description>&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://kazuf3.nicheapplab.com/posts/cyber-security-portfolio-index/&#34;&gt;Back to index&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#scenario&#34;&gt;Scenario(given)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#current-file-permissions&#34;&gt;Current file permissions(given)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://kazuf3.nicheapplab.com/posts/file-permissions-in-linux/&#34;&gt;File permissions in Linux&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;scenario&#34;&gt;Scenario&lt;/h2&gt;
&lt;p&gt;You are a security professional at a large organization. You mainly work with
their research team. Part of your job is to ensure users on this team are
authorized with the appropriate permissions. This helps keep the system secure.&lt;/p&gt;
&lt;p&gt;Your task is to examine existing permissions on the file system. You’ll need to
determine if the permissions match the authorization that should be given. If
they do not match, you’ll need to modify the permissions to authorize the
appropriate users and remove any unauthorized access.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Incident Report</title>
      <link>https://kazuf3.nicheapplab.com/posts/incident-report/</link>
      <pubDate>Tue, 18 Jul 2023 11:00:53 -0700</pubDate>
      <guid>https://kazuf3.nicheapplab.com/posts/incident-report/</guid>
      <description>&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://kazuf3.nicheapplab.com/posts/cyber-security-portfolio-index/&#34;&gt;Back to index&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#project-setup&#34;&gt;Project Setup&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://kazuf3.nicheapplab.com/posts/incident-report-analysis/&#34;&gt;Incident Report Analysis&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;project-setup&#34;&gt;Project Setup&lt;/h2&gt;
&lt;p&gt;Review the scenario below. Then complete the step-by-step instructions.&lt;/p&gt;
&lt;p&gt;You are a cybersecurity analyst working for a multimedia company that offers web design services, graphic design, and social media marketing solutions to small businesses. Your organization recently experienced a DDoS attack, which compromised the internal network for two hours until it was resolved.&lt;/p&gt;
&lt;p&gt;During the attack, your organization’s network services suddenly stopped responding due to an incoming flood of ICMP packets. Normal internal network traffic could not access any network resources. The incident management team responded by blocking incoming ICMP packets, stopping all non-critical network services offline, and restoring critical network services.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Security Audit</title>
      <link>https://kazuf3.nicheapplab.com/posts/security-audit/</link>
      <pubDate>Mon, 17 Jul 2023 20:21:09 -0700</pubDate>
      <guid>https://kazuf3.nicheapplab.com/posts/security-audit/</guid>
      <description>&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://kazuf3.nicheapplab.com/posts/cyber-security-portfolio-index/&#34;&gt;Back to index&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#project-setup&#34;&gt;Project Setup&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://kazuf3.nicheapplab.com/posts/controls-assessment/&#34;&gt;Controls assessment&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://kazuf3.nicheapplab.com/posts/compliance-checklist/&#34;&gt;Compliance checklist&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://kazuf3.nicheapplab.com/posts/stakeholder-memorandum/&#34;&gt;Stakeholder memorandum&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h1 id=&#34;project-setup&#34;&gt;Project Setup&lt;/h1&gt;
&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;
&lt;p&gt;Perform an audit of Botium Toys’ cybersecurity program. The audit
needs to align current business practices with industry standards and best
practices. The audit is meant to provide mitigation recommendations for
vulnerabilities found that are classified as “high risk,” and present an
overall strategy for improving the security posture of the organization. The
audit team needs to document their findings, provide remediation plans and
efforts, and communicate with stakeholders.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Vulnerability Assessment Report</title>
      <link>https://kazuf3.nicheapplab.com/posts/vulnerability-assessment-report/</link>
      <pubDate>Wed, 26 Jul 2023 09:13:34 -0700</pubDate>
      <guid>https://kazuf3.nicheapplab.com/posts/vulnerability-assessment-report/</guid>
      <description>&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://kazuf3.nicheapplab.com/posts/vulnerability-assessment/&#34;&gt;Back to Vulnerbility Assessment&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;system-description&#34;&gt;System Description&lt;/h2&gt;
&lt;p&gt;The server hardware consists of a powerful CPU processor and 128GB of memory. It
runs on the latest version of Linux operating system and hosts a MySQL database
management system. It is configured with a stable network connection using IPv4
addresses and interacts with other servers on the network. Security measures
include SSL/TLS encrypted connections.&lt;/p&gt;
&lt;h2 id=&#34;scope&#34;&gt;Scope&lt;/h2&gt;
&lt;p&gt;The scope of this vulnerability assessment relates to the current access
controls of the system. The assessment will cover a period of three months, from
June 20XX to August 20XX. NIST SP 800-30 Rev. 1 is used to guide the risk
analysis of the information system.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Apply Filters to SQL Queries</title>
      <link>https://kazuf3.nicheapplab.com/posts/apply-filters-to-sql-queries/</link>
      <pubDate>Tue, 18 Jul 2023 18:39:54 -0700</pubDate>
      <guid>https://kazuf3.nicheapplab.com/posts/apply-filters-to-sql-queries/</guid>
      <description>&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://kazuf3.nicheapplab.com/posts/sql-queries/&#34;&gt;Back to SQL Queries&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;project-description&#34;&gt;Project description&lt;/h2&gt;
&lt;p&gt;This project is for investigating security issues to help keep the system
secure. Based on findings that some potential security issues involve login
attempts and employee machines. We use SQL filters to retrieve records from
different datasets and investigate potential security issues.&lt;/p&gt;
&lt;h2 id=&#34;retrieve-after-hours-failed-login-attempts&#34;&gt;Retrieve after hours failed login attempts&lt;/h2&gt;
&lt;p&gt;In order to list all after-hours failed logins, which are suspicious in this
case, we performed a SQL query as follows. Since hour regular hour ends at
18:00:00, we set the condition accordingly.
&lt;img alt=&#34;image1&#34; loading=&#34;lazy&#34; src=&#34;https://kazuf3.nicheapplab.com/posts/apply-filters-to-sql-queries/images/image1.png&#34;&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>File Permissions in Linux</title>
      <link>https://kazuf3.nicheapplab.com/posts/file-permissions-in-linux/</link>
      <pubDate>Tue, 18 Jul 2023 18:10:51 -0700</pubDate>
      <guid>https://kazuf3.nicheapplab.com/posts/file-permissions-in-linux/</guid>
      <description>&lt;h2 id=&#34;project-description&#34;&gt;Project description&lt;/h2&gt;
&lt;p&gt;This project repairs file permissions to its appropriate status.&lt;/p&gt;
&lt;h2 id=&#34;check-file-and-directory-details&#34;&gt;Check file and directory details&lt;/h2&gt;
&lt;p&gt;After performing the command, ls -la in the /home/researcher2/projects/ directory, we found the following status.&lt;/p&gt;
&lt;h2 id=&#34;describe-the-permissions-string&#34;&gt;Describe the permissions string&lt;/h2&gt;
&lt;p&gt;In the &lt;code&gt;/home/researcher2/projects&lt;/code&gt; directory, there are five files with the following names and permissions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;project_k.txt: -rw-rw-rw-&lt;/code&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;User = read, write&lt;/li&gt;
&lt;li&gt;Group = read, write&lt;/li&gt;
&lt;li&gt;Other = read, write&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;project_m.txt: -rw-r-----&lt;/code&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;User = read, write&lt;/li&gt;
&lt;li&gt;Group = read&lt;/li&gt;
&lt;li&gt;Other = none&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;project_r.txt: -rw-rw-r--&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Incident Report Analysis</title>
      <link>https://kazuf3.nicheapplab.com/posts/incident-report-analysis/</link>
      <pubDate>Tue, 18 Jul 2023 10:55:20 -0700</pubDate>
      <guid>https://kazuf3.nicheapplab.com/posts/incident-report-analysis/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://kazuf3.nicheapplab.com/posts/incident-report/&#34;&gt;Back to incident report&lt;/a&gt;&lt;/p&gt;
&lt;h1 id=&#34;incident-report-analysis&#34;&gt;Incident report analysis&lt;/h1&gt;
&lt;h2 id=&#34;instructions&#34;&gt;Instructions&lt;/h2&gt;
&lt;p&gt;As you continue through this course, you may use this template to record your findings after completing an activity or to take notes on what you&amp;rsquo;ve learned about a specific tool or concept. You can also use this chart as a way to practice applying the NIST framework to different situations you encounter.&lt;/p&gt;
&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;
&lt;p&gt;The organization recently experienced a DDoS attack, which compromised the
internal network for two hours until it was resolved.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Stakeholder Memorandum</title>
      <link>https://kazuf3.nicheapplab.com/posts/stakeholder-memorandum/</link>
      <pubDate>Mon, 17 Jul 2023 21:04:23 -0700</pubDate>
      <guid>https://kazuf3.nicheapplab.com/posts/stakeholder-memorandum/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://kazuf3.nicheapplab.com/posts/security-audit/&#34;&gt;Back to Security Audit&lt;/a&gt;&lt;/p&gt;
&lt;h1 id=&#34;stakeholder-memorandum&#34;&gt;Stakeholder memorandum&lt;/h1&gt;
&lt;p&gt;TO: IT Manager, Stakeholders&lt;br&gt;
FROM: Kazuhiro Funakoshi&lt;br&gt;
DATE: 07/13/2023&lt;br&gt;
SUBJECT: Internal IT Audit Findings and Recommendations&lt;/p&gt;
&lt;p&gt;Dear Colleagues,&lt;/p&gt;
&lt;p&gt;Please review the following information regarding the Botium Toys internal audit scope, goals, critical findings, summary and recommendations.&lt;/p&gt;
&lt;h2 id=&#34;scope&#34;&gt;Scope&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;The following systems are in scope: accounting, endpoint detection, firewalls,
intrusion detection system, security information and event management (SIEM)
tool.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Ensure current user permissions, controls, procedures, and protocols in
place align with necessary compliance requirements.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Compliance Checklist</title>
      <link>https://kazuf3.nicheapplab.com/posts/compliance-checklist/</link>
      <pubDate>Mon, 17 Jul 2023 21:00:47 -0700</pubDate>
      <guid>https://kazuf3.nicheapplab.com/posts/compliance-checklist/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://kazuf3.nicheapplab.com/posts/security-audit/&#34;&gt;Back to Security Audit&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;--the-federal-energy-regulatory-commission---north-american-electric-reliability-corporation-ferc-nerc&#34;&gt;[ ] The Federal Energy Regulatory Commission - North American Electric Reliability Corporation (FERC-NERC)&lt;/h2&gt;
&lt;p&gt;The FERC-NERC regulation applies to organizations that work with electricity or
that are involved with the U.S. and North American power grid. Organizations
have an obligation to prepare for, mitigate, and report any potential security
incident that can negatively affect the power grid. Organizations are legally
required to adhere to the Critical Infrastructure Protection Reliability
Standards (CIP) defined by the FERC.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Controls Assessment</title>
      <link>https://kazuf3.nicheapplab.com/posts/controls-assessment/</link>
      <pubDate>Mon, 17 Jul 2023 20:52:21 -0700</pubDate>
      <guid>https://kazuf3.nicheapplab.com/posts/controls-assessment/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://kazuf3.nicheapplab.com/posts/security-audit/&#34;&gt;Back to Security Audit&lt;/a&gt;&lt;/p&gt;
&lt;h1 id=&#34;controls-assessment&#34;&gt;Controls Assessment&lt;/h1&gt;
&lt;h2 id=&#34;current-assets&#34;&gt;Current assets&lt;/h2&gt;
&lt;p&gt;Assets managed by the IT Department include:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;On-premises equipment for in-office business needs&lt;/li&gt;
&lt;li&gt;Employee equipment: end-user devices (desktops/laptops, smartphones), remote workstations, headsets, cables, keyboards, mice, docking stations, surveillance cameras, etc.&lt;/li&gt;
&lt;li&gt;Management of systems, software, and services: accounting, telecommunication, database, security, ecommerce, and inventory management&lt;/li&gt;
&lt;li&gt;Internet access&lt;/li&gt;
&lt;li&gt;Internal network&lt;/li&gt;
&lt;li&gt;Vendor access management&lt;/li&gt;
&lt;li&gt;Data center hosting services&lt;/li&gt;
&lt;li&gt;Data retention and storage&lt;/li&gt;
&lt;li&gt;Badge readers&lt;/li&gt;
&lt;li&gt;Legacy system maintenance: end-of-life systems that require human monitoring&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;administrative-controls&#34;&gt;Administrative Controls&lt;/h2&gt;
&lt;dl&gt;
&lt;dt&gt;Least Priviledge&lt;/dt&gt;
&lt;dd&gt;&lt;strong&gt;Needs to be implemented; High&lt;/strong&gt;&lt;br&gt;
Preventative; reduces risk by making sure vendors and non-authorized staff
only have access to the assets/data they need to do their jobs&lt;/dd&gt;
&lt;dt&gt;Disaster recovery plans&lt;/dt&gt;
&lt;dd&gt;&lt;strong&gt;Needs to be implemented; Medium&lt;/strong&gt;&lt;br&gt;
Corrective; business continuity to ensure systems are able to run in the event
of an incident/there is limited to no loss of productivity downtime/impact to
system components, including: computer room environment (air conditioning,
power supply, etc.); hardware (servers, employee equipment); connectivity
(internal network, wireless); applications (email, electronic data); data and
restoration&lt;/dd&gt;
&lt;dt&gt;Password policies&lt;/dt&gt;
&lt;dd&gt;&lt;strong&gt;Needs to be implemented; Medium&lt;/strong&gt;&lt;br&gt;
Preventative; establish password strength rules to improve security/reduce
likelihood of account compromise through brute force or dictionary attack
techniques&lt;/dd&gt;
&lt;dt&gt;Access control policies&lt;/dt&gt;
&lt;dd&gt;&lt;strong&gt;Needs to be implemented; High&lt;/strong&gt;&lt;br&gt;
Preventative; increase confidentiality and integrity of data&lt;/dd&gt;
&lt;dt&gt;Account management policies&lt;/dt&gt;
&lt;dd&gt;&lt;strong&gt;Needs to be implemented; High&lt;/strong&gt;&lt;br&gt;
Preventative; reduce attack surface and limit overall impact from disgruntled/former employees&lt;/dd&gt;
&lt;dt&gt;Separation of duties&lt;/dt&gt;
&lt;dd&gt;&lt;strong&gt;Needs to be implemented; High&lt;/strong&gt;&lt;br&gt;
Preventative; ensure no one has so much access that they can abuse the system for personal gain&lt;/dd&gt;
&lt;/dl&gt;
&lt;h2 id=&#34;technical-controls&#34;&gt;Technical Controls&lt;/h2&gt;
&lt;dl&gt;
&lt;dt&gt;Firewall&lt;/dt&gt;
&lt;dd&gt;Preventative; firewalls are already in place to filter unwanted/malicious traffic from entering internal network&lt;/dd&gt;
&lt;dt&gt;Intrusion Detection System (IDS)&lt;/dt&gt;
&lt;dd&gt;Detective; allows IT team to identify possible intrusions (e.g., anomalous traffic) quickly&lt;/dd&gt;
&lt;dt&gt;Encryption&lt;/dt&gt;
&lt;dd&gt;&lt;strong&gt;Needs to be implemented; Medium&lt;/strong&gt;&lt;br&gt;
Deterrent; makes confidential information/data more secure (e.g., website payment transactions)&lt;/dd&gt;
&lt;dt&gt;Backups&lt;/dt&gt;
&lt;dd&gt;&lt;strong&gt;Needs to be implemented; Medium&lt;/strong&gt;&lt;br&gt;
Corrective; supports ongoing productivity in the case of an event; aligns to the disaster recovery plan&lt;/dd&gt;
&lt;dt&gt;Password management system&lt;/dt&gt;
&lt;dd&gt;&lt;strong&gt;Needs to be implemented; Medium&lt;/strong&gt;&lt;br&gt;
Corrective; password recovery, reset, lock out notifications&lt;/dd&gt;
&lt;dt&gt;Antivirus (AV) software&lt;/dt&gt;
&lt;dd&gt;&lt;strong&gt;Needs to be implemented; High&lt;/strong&gt;&lt;br&gt;
Corrective; detect and quarantine known threats&lt;/dd&gt;
&lt;dt&gt;Manual monitoring, maintenance, and intervention&lt;/dt&gt;
&lt;dd&gt;&lt;strong&gt;Needs to be implemented; Medium&lt;/strong&gt;&lt;br&gt;
Preventative/corrective; required for legacy systems to identify and mitigate potential threats, risks, and vulnerabilities&lt;/dd&gt;
&lt;/dl&gt;
&lt;h2 id=&#34;physical-controls&#34;&gt;Physical Controls&lt;/h2&gt;
&lt;dl&gt;
&lt;dt&gt;Time-controlled safe&lt;/dt&gt;
&lt;dd&gt;&lt;strong&gt;Needs to be implemented; Low&lt;/strong&gt;&lt;br&gt;
Deterrent; reduce attack surface/impact of physical threats&lt;/dd&gt;
&lt;dt&gt;Adequate lighting&lt;/dt&gt;
&lt;dd&gt;&lt;strong&gt;Needs to be implemented; Low&lt;/strong&gt;&lt;br&gt;
Deterrent; limit “hiding” places to deter threats&lt;/dd&gt;
&lt;dt&gt;Closed-circuit television (CCTV) surveillance&lt;/dt&gt;
&lt;dd&gt;&lt;strong&gt;Needs to be implemented; High&lt;/strong&gt;&lt;br&gt;
Preventative/detective; can reduce risk of certain events; can be used after event for investigation&lt;/dd&gt;
&lt;dt&gt;Locking cabinets (for network gear)&lt;/dt&gt;
&lt;dd&gt;&lt;strong&gt;Needs to be implemented; High&lt;/strong&gt;&lt;br&gt;
Preventative; increase integrity by preventing unauthorized personnel/individuals from physically accessing/modifying network infrastructure gear&lt;/dd&gt;
&lt;dt&gt;Signage indicating alarm service provider&lt;/dt&gt;
&lt;dd&gt;&lt;strong&gt;Needs to be implemented; Low&lt;/strong&gt;&lt;br&gt;
Deterrent; makes the likelihood of a successful attack seem low&lt;/dd&gt;
&lt;dt&gt;Locks&lt;/dt&gt;
&lt;dd&gt;&lt;strong&gt;Needs to be implemented; Low&lt;/strong&gt;&lt;br&gt;
Preventative; physical and digital assets are more secure&lt;/dd&gt;
&lt;dt&gt;Fire detection and prevention (fire alarm, sprinkler system, etc.)&lt;/dt&gt;
&lt;dd&gt;&lt;strong&gt;Needs to be implemented; High&lt;/strong&gt;&lt;br&gt;
Detective/Preventative; detect fire in the toy store’s physical location to prevent damage to inventory, servers, etc.&lt;/dd&gt;
&lt;/dl&gt;</description>
    </item>
  </channel>
</rss>
