LinkedIn - Posts

LinkedIn - Posts

Posted

Post X1

SANS - Guide to security operations
https://sansorg.egnyte.com/dl/TLpDjvybnc

๐Ÿ”’ Guide to Security Operations By SANS Institute ๐Ÿ”’

๐Ÿ“– Contents:

๐Ÿ“Š SOC Functions

๐ŸŽฏ SOC Functions Diagram

๐Ÿ” SOC Core Functions

๐Ÿ›ก๏ธ Collection

๐Ÿ”ฆ Detection

๐Ÿšจ Triage

๐Ÿ”Ž Investigation

๐Ÿ› ๏ธ Incident Response

โš™๏ธ SOC Auxiliary Functions

๐Ÿ› ๏ธ SOC Tools

๐Ÿ› ๏ธ SOC Tools Overview

๐Ÿ”’ SIEM

๐ŸŒ Threat Intelligence Platform

๐Ÿ“‚ Incident Management System

๐Ÿ“Š Collection of Key Data

๐Ÿ”‘ Data Types

๐ŸŒ Flow Records

๐Ÿ’ณ Transaction Data

๐Ÿ“ฆ Full Packet Capture

๐ŸŒ Traffic Collection Opportunities

๐Ÿ’ป Endpoint Monitoring

๐Ÿ“… Event Categories to Record and Collect

๐Ÿข Windows Log Sources

๐Ÿง Linux/Unix Log Sources

โ˜๏ธ Cloud Logging

๐Ÿข IaaS Logging

โ˜๏ธ Cloud Management Plane Logs

๐Ÿ“ฆ PaaS and SaaS Logging

๐Ÿ“ˆ Models & Metrics for Security Operations

๐Ÿ›ก๏ธ Attack Mental Models and Reference Frameworks

๐ŸŽฏ Knowing Yourself and Your Enemy

๐ŸŽฏ Three Levels of Threat Intelligence

๐ŸŽฏ Threat Modeling

๐ŸŽฏ Attack Trees

๐ŸŽฏ F3EAD Cycle

๐ŸŒ€ The OODA Loop

๐ŸŒ€ The OODA Loop and Operations Tempo

๐Ÿ” Threat-Hunting

๐Ÿ“ˆ Metrics

๐Ÿ“Š Metrics Types

๐Ÿ“Š Practical Metrics Considerations

๐Ÿ“ What to Measure

๐Ÿ“š SOC References

๐Ÿ”ง Open-Source Tools

๐ŸŽ™๏ธ Podcasts

๐Ÿ“š Books

๐ŸŽ“ Suggested SANS Courses for the Blue Team

๐Ÿ†“ SANS Free Resources

๐Ÿ“ About the Author

#SecurityOperations #Cybersecurity #SIEM #CyberDefense #Infosec

Post X4

Getting Started with MITRE ATT&CK

๐Ÿ“– Contents:

๐Ÿ” Threat Intelligence
๐Ÿ“Š Detection and Analytics
๐Ÿ•ต๏ธโ€โ™‚๏ธ Adversary Emulation and Red Teaming
๐Ÿ”ง Assessments and Engineering

#cybersecurity #informationsecurity #mitreattack

Post X5

๐Ÿ”’ Microsoft Azure Security Framework - A roadmap for hardening the security of your Azure environment ๐Ÿ›ก๏ธ

๐Ÿ“– Contents:

๐Ÿ“œ Introduction: Securing Azure
๐Ÿ“Š Inventory management
๐Ÿ’ผ Resource isolation
๐Ÿ“‚ Backups and disaster recovery
๐Ÿ” Identity and access management
๐Ÿ“Š Logging and monitoring
๐Ÿ“œ Policies
๐ŸŒ Resource governance
๐Ÿ•ต๏ธโ€ Continuous detection and monitoring
๐Ÿšจ Incident response (IR)

#AzureSecurity #CloudSecurity #MicrosoftAzure #Cybersecurity #DataProtection #InfoSec #Azure #SecurityFramework

Post X7

๐Ÿ” Microsoft 365 Forensics Playbook - Best Practices for Acquisition of Email boxes and Unified Audit Logs For Microsoft 365 (Exchange Online) ๐Ÿ“ฆ๐Ÿ”’

๐Ÿ“– Contents:

๐Ÿ•ต๏ธโ€ eDiscovery Roles
๐Ÿ“‹ Role assignment
๐Ÿ” Create an eDiscovery case
๐Ÿ“ฆ Reserving content in legal hold
๐Ÿ”Ž Carrying out eDiscovery content search
๐Ÿ“ค Export of Mailbox in PST
๐Ÿ“Š Unified Audit Logs

#Microsoft365 #Forensics #Cybersecurity #IT

Post X8

๐Ÿš€ RISK ASSESSMENT PROCESS HANDBOOK ๐Ÿ“š

๐Ÿ“– Contents:

Overview

Risk Assessment Process:

Risk Assessment Process Details:

#Cybersecurity #RiskAssessment #RiskManagement

Post X9

๐Ÿ“˜ Malware Reverse Engineering Handbook ๐Ÿ•ต๏ธโ€

๐Ÿ“– Contents:

๐Ÿ” Why Perform Malware Analysis?
๐Ÿ”ฌ How to Set Up a Lab Environment
๐Ÿ’ป Static Malware Analysis
๐Ÿ” Disassembly (IDA & Ghidra)
๐Ÿ”„ Dynamic Analysis
๐ŸŒ Network Traffic Analysis
๐Ÿ“ฆ Packed Executables/Unpacking
๐Ÿšจ Incident Response Collaboration (MISP & Yara)

#MalwareAnalysis #ReverseEngineering #Cybersecurity #InfoSec #DigitalForensics

Post X10

The Zero Trust Model in Cybersecurity

๐Ÿ“– Contents:

Why zero trust โ€“ and why now? ๐Ÿ“–
Decoding zero trust: giving a meaning to the buzzword ๐Ÿ•ต๏ธโ€โ™‚๏ธ
What is not zero trust? And what is? ๐Ÿค”
Limitations and possibilities of zero trust in an industrial environment ๐Ÿญ
Guiding principles of zero trust โœจ
Best practices and steps for a successful deployment of the zero-trust model ๐Ÿš€
Ensuring buy-in across the organization with tangible impact ๐Ÿ’ผ
Understanding and mapping the โ€œcrown-jewelsโ€ ๐Ÿ’Ž
Introducing adequate control mechanisms ๐Ÿ”’
Implementing the zero trust model ๐Ÿ’ป
Maintaining, monitoring and improving the zero trust model ๐Ÿ“ˆ
Vision for the future: new technologies and zero trust ๐Ÿ”ฎ

#ZeroTrust #Cybersecurity #InfoSec #CyberDefense

Post X11

Risk Assessment and Treatment Process

๐Ÿ“– Contents:

Risk assessment and treatment process

Risk identification

Risk analysis

Risk evaluation

Risk treatment

Roles and responsibilities

Post X12

Tenant Isolation Framework for Cloud Applications by @Wiz

๐Ÿ“– Contents:

Part One โ€“ Modeling Tenant Isolation

Part Two โ€“ Improving Tenant Isolation

#Wiz #InfoSec #Cybersecurity

Post X13

Windows Event Log Analysis

๐Ÿ“– Contents:

Event Log Format๐Ÿ”
Account Management Events๐Ÿ”’
Account Logon and Logon Events๐Ÿ‘ค
Access to Shared Objects๐Ÿ“‚
Scheduled Task Loggingโฐ
Object Access Auditing๐Ÿ”
Audit Policy Changes๐Ÿ”„
Auditing Windows Services๐Ÿ”ง
Wireless LAN Auditing๐Ÿ“ถ
Process Tracking๐Ÿ”„
Additional Program Execution Logging๐Ÿ“
Auditing PowerShell Use๐Ÿ’ป

#LogAnalysis #Cybersecurity #WindowsSecurity #InformationSecurity

Post X15

Warning: Port 514 - Your Network's Vulnerable Backdoor (BONUS INSIDE) ๐Ÿ”’๐Ÿ’ฅ

Last week, my team flagged a critical issue: a client had integrated a SIEM system into the cloud, and it raised some serious concerns. I decided to get to the bottom of it.

I talked to the client, hoping to understand how they had done the integration and what precautions they had taken. Unfortunately, they couldn't provide clear answers, so I took matters into my own hands.

Here's what I found:

  1. Uncontrolled Alerts: The client's SIEM system had no alert controls, and there were no defined rules in place.

  2. Unencrypted Data Transfer: Some integrations were transmitting data over port 514 without encryption.

3.Open Port 514 to the Internet: The most glaring issue was that port 514, used for the SYSLOG service of the SIEM system, was wide open to the Internet.

When I confronted the client with these findings, they seemed baffled by the significance of an open port 514 to the SYSLOG server on the Internet.

I had to spell it out for them: an open port 514 accessible from the Internet exposes you to significant security risks, including:

  1. Denial of Service (DoS) Attacks: Malicious actors could flood the server with an overwhelming volume of logs, potentially crippling the SIEM system.

  2. False Logs: Unauthorized access to the SYSLOG server could lead to the injection of false or misleading log data, causing confusion or even misdirected responses.

  3. Financial Impact: If data transmission is billable, excessive traffic from untrusted sources could lead to substantial financial losses.

In response to these critical findings, we promptly convened a meeting with the client and their service provider, successfully mitigating these vulnerabilities. Mission accomplished

๐Ÿ‘‰ Bonus >> Try It Now

nc -u IP_ADDRESS 514

Have you encountered similarly flawed service implementations? How did you handle them? Share your experiences and strategies for maintaining system security in the comments ๐Ÿ‘‡.

To Post

Post XX6

๐Ÿš€ Jump-start Your SOC Analyst Career - A Roadmap to Cybersecurity Success By Tyler Wall & Jarrett Rodrick

๐Ÿ“– Contents:

๐Ÿ”’ The Demand for Cybersecurity and SOC Analysts
๐ŸŽฏ Areas of Expertise in Cybersecurity
๐Ÿ” Job Hunting
๐Ÿ› ๏ธ Prerequisite Skills
๐Ÿ‘จโ€๐Ÿ’ผ The SOC Analyst
โ˜๏ธ SOC in the Clouds
๐Ÿค– SOC Automation
๐Ÿ“š Real SOC Analyst Stories

#Cybersecurity #SOCAnalyst #CareerDevelopment #InfoSec #CyberCareer #SecuritySkills #CloudSecurity

To write

Post X2

How to write Notes at meeting - LinkedIn Carusel
https://www.youtube.com/watch?v=yxHPScN_ct4

Post X3

make a carouse from this
https://www.linkedin.com/feed/update/urn:li:activity:6898730632017784832/?updateEntityUrn=urn%3Ali%3Afs_updateV2%3A(urn%3Ali%3Aactivity%3A6898730632017784832%2CFEED_DETAIL%2CEMPTY%2CDEFAULT%2Cfalse)&originTrackingId=otXB9JP1R76Zv%2Fcf5QStAA%3D%3D
CYBERSECURITY POSTURE SELF ASSESSMENT

Post X14

Write about creating a security map - https://www.linkedin.com/posts/shimi-cohen-62a4222b_security-blueprint-activity-7012329996908163072-uPeM?utm_source=share&utm_medium=member_desktop

https://www.linkedin.com/posts/neria-basha_your-soc-is-useless-heres-why-1-noise-activity-7096576392657539072-VHu1/?utm_source=share&utm_medium=member_desktop

https://www.linkedin.com/posts/neria-basha_soc-cybersecurity-threatdetection-activity-7099268896506966016-OTnq/?utm_source=share&utm_medium=member_desktop

https://www.linkedin.com/posts/neria-basha_6-tips-for-outsourcing-to-a-soc-provider-activity-7102168022886289408-sy-1/?utm_source=share&utm_medium=member_desktop

https://www.linkedin.com/posts/neria-basha_you-must-read-this-before-implementing-siem-activity-7108060569005436931-ZCQZ/?utm_source=share&utm_medium=member_desktop