130n@calvinlai.com
  • About Calvin Lai (fkclai)
  • My Work
  • Cyber Security
    • Cyber Security Centre (CSC)
      • Why we need a CSC
      • CSC Team Structure: Roles, Functions, and Tools
        • Key Function & Role
        • Tools & Platforms
        • People
        • Outsource Strategy
      • HRMC Executive Paper
  • Detection and Response
    • Playbook: Threat Prioritization & Automated Response Strategies
      • Scenario: Detecting and Mitigating a Ransomware Attack
      • Scenario: DC Sync Attack Detected and Mitigated
      • Scenario: Pass-the-Hash (PtH) Attack Detected and Contained
      • Scenario: Phishing Campaign with Malware / Credential Theft Detected and Mitigated
  • Application Architecture
    • Comparison of MVC , N-tier and Microservice Architecture
  • Application Security
    • OAuth, SAML, and OpenID Connect: Key Differences and Use Cases
    • Secure Coding Principles
    • HTTP Header Security Principles
    • Mitigating Broken Object Level Authorization (BOLA)
    • Spring Boot Validation
    • Output Encoding in JavaServer Faces (JSF)
    • Session Management Security Issues
    • Common API Security Problems
      • Broken Authentication
      • Excessive Data Exposure
      • Lack of Resources & Rate Limiting
      • Broken Function Level Authorization
      • Unsafe Consumption of APIs
    • JAVA Exception Handling
    • File Upload Validation
    • OAuth 2.0 Security
      • Insecure Storage of Access Tokens
    • Microservice Security
      • Sample Coding Demo
        • Service Implementation
        • Client Interaction
      • Security Solution for Microservices Architecture
    • Modifying and Protecting Java Class Files
      • Modify a Class File Inside a WAR File
      • Direct Bytecode Editing
        • Steps to Directly Edit a Java Class File
          • Update: Java Bytecode Editing Tools
      • Techniques to Protect Java Class Files
        • Runtime Decryption in WebLogic
    • JAVA Program
      • Secure, Concurrent Web Access Using Java and Tor
      • Creating a Maven Java project in Visual Studio Code
  • Exploit/CVE PoC
    • ZeroLogon Exploit
    • Remote Retrieved Chrome saved Encrypted Password
    • Twitter Control an RCE attack
  • Hacking Report (HTB)
    • Hits & Summary
      • Tools & Cheat Sheet
    • Windows Machine
      • Love 10.10.10.239
      • Blackfield 10.10.10.192
      • Remote 10.10.10.180
      • Sauna 10.10.10.175
      • Forest 10.10.10.161
      • Sniper
      • Json
      • Heist
      • Blue
      • Legacy
      • Resolute
      • Cascade
    • Linux Machine
      • Photobomb 10.10.11.182
      • Pandora 10.10.11.136
      • BountyHunter 10.10.11.100
      • CAP 10.10.10.245
      • Spectra 10.10.10.229
      • Ready 10.10.10.220
      • Doctor 10.10.10.209
      • Bucket 10.10.10.212
      • Blunder 10.10.10.191
      • Registry 10.10.10.159
      • Magic
      • Tabby
  • Penetration Testing
    • Web Application PenTest
    • Network/System PenTest
    • Mobile Penetration Test
      • Certificate Pinning
        • Certificate Pinning Bypass (Android)
          • Root a Android Device
          • Setup Proxy Tool - Burp Suite
      • Checklist
  • Threat Intelligence
    • Advanced Persistent Threat (APT) groups
      • North Korean APT Groups
      • Chinese APT Groups
      • Russian APT Groups
      • Other APT
  • Red Team (Windows)
    • 01 Reconnaissance
    • 02 Privileges Escalation
    • 03 Lateral Movement
    • 04 AD Attacks
      • DCSync
    • 05 Bypass-Evasion
    • 06 Kerberos Attack
    • 99 Basic Command
  • Exploitation Guide
    • 01 Reconnaissance
    • 02 Port Enumeration
    • 03 Web Enumeration
    • 04 Windows Enum & Exploit
      • Windows Credential Dumping
        • Credential Dumping: SAM
        • Credential Dumping: DCSync
      • Kerberos Attack
      • RDP
    • 05 File Enumeration
    • 06 Reverse Shell Cheat Sheet
      • Windows Reverse Shell
      • Linux Reverse Shell
    • 07 SQL Injection
    • 08 BruteForce
    • 09 XSS Bypass Checklist
    • 10 Spring Boot
    • 11 WPA
    • 12 Payload list
  • Vuln Hub (Writeup)
    • MrRobot
    • CYBERRY
    • MATRIX 1
    • Node-1
    • DPwwn-1
    • DC7
    • AiWeb-2
    • AiWeb-1
    • BrainPan
  • CTF (Writeup & Tips)
    • CTF Tools & Tips
    • Hacker One
    • CTF Learn
    • P.W.N. University - CTF 2018
    • HITCON
    • Pwnable
      • 01 Start
  • Useful Command/Tools
    • Kali
    • Windows
    • Linux
  • Offensive Security Lab & Exam
    • Lab
    • Tools for an Offensive Certification
      • Strategy for an Offensive Exam Certification
        • CVEs
        • Privilege Escalation
        • Commands
        • Impacket
  • ISO 27001
    • Disclaimer
    • What is ISO 27001
      • Implementation
    • Documentation
    • Common Mistake
    • Q&A
      • Can internal audit to replace the risk assessment
      • Is it sufficient for only the IT department head to support the ISO 27001 program
      • Does the Business Continuity Plan (BCP) and a Disaster Recovery Plan (DRP) are the same?
    • ISO 27001 Controls and Domains
      • 1. Information Security Policies
      • 2. Organization of Information Security
      • 3. Human Resource Security
      • 4. Asset Management
      • 5. Access Control
      • 6. Cryptographic Controls
      • 7. Physical and Environmental Security
      • 8: Operational Security
      • 9. Communications Security
      • 10. System Acquisition, Development, and Maintenance
      • 11. Supplier Relationships
      • 12: Information Security Incident Management
      • 13. Information Security Aspects of Business Continuity Management
      • 14. Compliance
Powered by GitBook
On this page

Was this helpful?

  1. Cyber Security
  2. Cyber Security Centre (CSC)
  3. CSC Team Structure: Roles, Functions, and Tools

Tools & Platforms

1. Endpoint Protection

  • Priority: Critical

  • Function: Protects endpoints from malware, ransomware, and other malicious activities, ensuring devices are secure and monitored for threats.

  • Examples: Symantec Endpoint Protection, McAfee Endpoint Security, EDR, XDR

2. Identity and Access Management (IAM)

  • Priority: Critical

  • Function: Manages and controls access to resources, preventing unauthorized access and ensuring appropriate access levels for employees.

  • Examples: Okta, Microsoft Azure Active Directory

3. SIEM (Security Information and Event Management)

  • Priority: Critical

  • Function: Provides centralized visibility, detects threats, and helps in responding to incidents in real-time by analyzing security event data from across the network.

  • Examples: Splunk Enterprise Security, IBM QRadar

4. Network Security

  • Priority: Critical

  • Function: Defends the network perimeter against external threats and ensures availability and performance. It includes firewall policy management and anti-DDoS protection.

    • Firewall Policy Management: Configures and manages firewall policies to control traffic and protect the network.

      • Examples: Palo Alto Networks Panorama, Cisco Firepower Management Center

    • Anti-DDoS (Distributed Denial of Service): Protects against DDoS attacks to maintain network availability.

      • Examples: Cloudflare, Radware

5. EUBA (Enterprise User Behavioral Analytics)

  • Priority: High

  • Function: Detects and mitigates insider threats and compromised accounts by analyzing deviations from normal user behavior.

  • Examples: Exabeam, Splunk User Behavior Analytics

6. Vulnerability Scanning (Internal and External)

  • Priority: High

  • Function: Identifies and addresses vulnerabilities to prevent exploitation by attackers. Regular scanning helps in maintaining a secure posture by proactively identifying weaknesses.

  • Examples: Nessus, Qualys

7. CASB (Cloud Access Security Broker)

  • Priority: High

  • Function: Provides visibility and control over cloud applications, ensuring compliance and security policies are enforced.

  • Examples: McAfee MVISION Cloud, Palo Alto Networks Prisma Access

8. DLP (Data Loss Prevention)

  • Priority: High

  • Function: Protects sensitive data from being exposed or stolen by monitoring and controlling data transfers across the network, endpoints, and cloud.

  • Examples: Symantec Data Loss Prevention, McAfee DLP

9. Application Security

  • Priority: High

  • Function: Ensures the security of applications through comprehensive testing and monitoring, preventing vulnerabilities and exploits. This includes various types of testing and protection measures.

    • IAST (Interactive Application Security Testing)

      • Examples: Contrast Security, Synopsys

    • DAST (Dynamic Application Security Testing)

      • Examples: OWASP ZAP, Acunetix

    • Component Scan

      • Examples: Black Duck, Sonatype Nexus

    • Pentesting

      • Examples: Metasploit, Kali Linux

    • SAST (Static Application Security Testing)

      • Examples: Fortify, Checkmarx

    • RASP (Runtime Application Self-Protection)

      • Examples: Imperva, Waratek

    • Application Shielding

      • Examples: Arxan, Jscrambler

10. Secret Management

  • Priority: High

  • Function: Securely manages secrets, such as API keys, passwords, and certificates, to protect sensitive information and ensure access control.

  • Examples: Thales CipherTrust Manager, AWS Secrets Manager

11. Internal Certificate Management

  • Priority: High

  • Function: Manages internal certificates to ensure secure communication and authentication within the organization.

  • Examples: Venafi, DigiCert CertCentral

12. SOAR (Security Orchestration, Automation, and Response)

  • Priority: Medium

  • Function: Automates response to security incidents, reducing response time and improving efficiency in dealing with threats.

  • Examples: Splunk Phantom, Palo Alto Networks Cortex XSOAR

13. Threat Intelligence

  • Priority: Medium

  • Function: Provides insights into emerging threats and helps in proactive defense by leveraging threat data from various sources.

  • Examples: Recorded Future, ThreatConnect

14. AD Security Monitoring

  • Priority: Medium

  • Function: Ensures the integrity and security of Active Directory by monitoring changes and activities to detect potential security issues.

  • Examples: Microsoft Defender for Identity, ManageEngine ADAudit Plus

15. Network Traffic Analysis

  • Priority: Medium

  • Function: Monitors and analyzes network traffic to detect anomalies, intrusions, and other security threats.

  • Examples: Darktrace, Cisco Stealthwatch

16. Offensive Security

  • Priority: High

  • Function: Simulates real-world attacks to test the effectiveness of security controls and the preparedness of the defensive teams.

  • Examples: Cobalt Strike, Red Canary

PreviousKey Function & RoleNextPeople

Last updated 28 days ago

Was this helpful?