28,99 €
In an era of relentless cyber threats, organizations face daunting challenges in fortifying their defenses against increasingly sophisticated attacks. The Complete Guide to Defense in Depth offers a comprehensive roadmap to navigating the complex landscape, empowering you to master the art of layered security.
This book starts by laying the groundwork, delving into risk navigation, asset classification, and threat identification, helping you establish a robust framework for layered security. It gradually transforms you into an adept strategist, providing insights into the attacker's mindset, revealing vulnerabilities from an adversarial perspective, and guiding the creation of a proactive defense strategy through meticulous mapping of attack vectors. Toward the end, the book addresses the ever-evolving threat landscape, exploring emerging dangers and emphasizing the crucial human factor in security awareness and training. This book also illustrates how Defense in Depth serves as a dynamic, adaptable approach to cybersecurity.
By the end of this book, you’ll have gained a profound understanding of the significance of multi-layered defense strategies, explored frameworks for building robust security programs, and developed the ability to navigate the evolving threat landscape with resilience and agility.
Das E-Book können Sie in Legimi-Apps oder einer beliebigen App lesen, die das folgende Format unterstützen:
Seitenzahl: 502
Veröffentlichungsjahr: 2024
The Complete Guide to Defense in Depth
Learn to identify, mitigate, and prevent cyber threats with a dynamic, layered defense approach
Akash Mukherjee
Copyright © 2024 Packt Publishing
All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.
Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing or its dealers and distributors, will be held liable for any damages caused or alleged to have been caused directly or indirectly by this book.
Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.
Group Product Manager: Dhruv Kataria
Publishing Product Manager: Prachi Sawant
Book Project Manager: Srinidhi Ram
Senior Editor: Sayali Pingale
Technical Editor: Nithik Cheruvakodan
Copy Editor: Safis Editing
Indexer: Pratik Shirodkar
Production Designer: Ponraj Dhandapani
Senior DevRel Marketing Executive: Marylou De Mello
First published: July 2024
Production reference: 1100724
Published by Packt Publishing Ltd.
Grosvenor House 11 St Paul’s SquareBirmingham B3 1RB, UK
ISBN 978-1-83546-826-5
www.packtpub.com
Embarking on the journey of writing this book has been a remarkable experience, filled with challenges and rewards, and I am deeply grateful to all those who have contributed to its realization. I would like to thank my loving wife, Roop, and my golden boy, Champ, for their unwavering support throughout this endeavor. To my amazing parents, your endless sacrifices and boundless love have shaped me into the person I am today. I am forever grateful for your guidance, wisdom, and unconditional support.
– Akash Mukherjee
In some ways, the defenders’ job is getting easier, relative to the threats that we faced in the 2000s and 2010s. In modern enterprises, we have available to us a range of endpoint protection, anomaly detection, data loss prevention systems, secure operating systems, hardened cloud platforms, supply chain analysis, automated defect analysis, and counter-abuse technologies to bring to bear on the attackers that face our systems. Though some of these options may be expensive, they are well understood and available.
In other ways, the threat ecosystem is getting more sophisticated and more bespoke with no clear strategy for our defenders. We now regularly discuss the proliferation of weaponized 0-days, critical infrastructure, and ransomware attacks, the utilization of AI to automate the exploitation of low-hanging vulnerabilities in enterprise systems and people, and increased visibility of nation-state-level attacks in headlines. A book such as this one is exactly what defenders need.
When faced with this evolving ecosystem, how does one take all of the pieces that are available – from best practices and third parties—and integrate them into a holistic layered defense strategy? At the level of an individual security engineer, one must now consider the full range of all vulnerability exploitation that may occur in the system that is being analyzed: zero-trust is the new default. It’s no longer the case that one can assume that nation-states are not interested in the software that you are securing, or more likely, that they may not have infiltrated your third-party dependency graph.
In this book, Akash brings you, dear reader, well-wrought experience from the frontier of defense, from the heart of the most sophisticated cybersecurity teams at the most advanced tech companies –where I was honored to work with him! Against the most advanced attackers, the strategy is made accessible with real-world case studies built on hard engineering problems – not lofty enterprise-laden jargon. For the defender looking to increase their chances of succeeding against advanced detectors, this book offers guideposts and actionable advice.
One is loath to make predictions about the future, but it seems inevitable that the Red Queen hypothesis dynamics as applied to cybersecurity will continue to accelerate in ways in which traditional defense strategies will no longer be able to keep up. Threat actors have at their disposal new tools that can fully automate parts of the attack chain and, in a few years with the proliferation of AI agents, even the entire attack chain. In this environment, every defender needs a guide, such as this book, to help them understand how to build a resilient enterprise or system that plans for, resists, and mitigates proliferating exploitation before the impact of this change is felt.
Jason D. Clinton
Chief Information Security Officer, Anthropic
Akash Mukherjee is a security enthusiast and a leader with experience setting up and executing security strategies at large tech companies. He is currently a security leader at Apple AIML. He was previously a security lead at Google, leading the insider risk program and supply chain security efforts at Google Chrome. During his time at Google, Akash was also a course lead and subject matter expert for the Google Cybersecurity Certificate course. He has been at the forefront of the emerging threat landscape and has led the development of novel security strategies and frameworks. Akash was one of the co-developers of the open-source Supply-chain Levels for Software Artifacts (SLSA) framework.
He is based in the Silicon Valley area in the US, and he holds a bachelor of technology degree from the Indian Institute of Technology, B.H.U., India, and a master’s degree in cyber security from the University of Southern California, USA.
I am immensely grateful to those who have stood by me and offered unwavering support, especially my wife, Roop, and my parents and friends.
I would also like to extend my appreciation to the Packt team for their help in refining the manuscript and improving its quality.
Arun Kumar has extensive experience in cyber security and telecommunications. He is an active member of EC-Council, ISC2, and PMI. He has led cybersecurity teams for drone defense, medical devices, banking, finance, and insurance companies. He started his career in telecommunications engineering, moving to project teams and eventually leading engineering projects. In his spare time, he enjoys volunteering at PMI and ISC2.
Peter Bagley retired from the US Army as an information system analyst after 21 years, and now he’s the CIO of B&B Cyber Solutions LLC and has worked as a senior cyber engineer/ISSM, supporting enterprise security and vulnerability management using NIST Risk Management Framework (RMF), NIST SP 800-53, Cybersecurity Framework (CSF), and Cybersecurity Maturity Model Certification (CMMC) for NIST SP 800-171. He has over 36 years of IT/cyber experience and over 30 years of teaching. Currently, he is a cybersecurity professor for St. Petersburg College and a cyber training consultant in the Tampa Bay area. He holds an MS in information systems from the University of Maryland, and several industry certifications, including CISSP, CMMC-RP, ISO-27001, CEH, and CHFI.
Gursev Singh is an accomplished, results-oriented cybersecurity expert with over 16 years of experience in infrastructure design and enterprise security. He has a proven track record of success in leading and managing client projects in areas such as public cloud security, SIEM data protection, infrastructure security, and cyber threat and vulnerability management. Gursev has worked with several leading organizations, including Deloitte, Esri, VMware, and Quest Software. In his current role at Google, he independently leads and manages client projects within the Cyber Risk Management Services service offering. He is currently pursuing a master of science in cyber security operations and leadership at the University of San Diego.
I would like to extend my heartfelt thanks to my Mom and Dad for always believing in me and giving me the opportunity to pursue bigger things in life. I am also deeply grateful to my loving wife, Kanchan, and my kids, Arsh and Gyanve, for their unwavering support throughout this journey. Your love and encouragement have been my guiding light.
Let’s start with a question. In the face of modern adversaries, can a system be deemed secure if it uses the latest technology at the edge? Fundamentally, there are a couple of issues in this question. First, there are no “perfectly” safe systems, only safer ones. Second, security is not about protecting the perimeters anymore; attackers are looking for gaps in our design from all directions.
Defense in Depth is a security design principle that layers security controls to protect, acknowledges the inevitability of failures, and focuses on resilience to create a formidable barrier against the modern threat landscape. Recent attacks such as the SolarWinds attack taught us that protecting the interfaces of a system is not enough; security needs to be part of every phase of the software development life cycle. If we break down security practices in organizations, they can be broadly categorized as follows:
Application or product security, sometimes platform securityEnterprise, corporate, and infrastructure securitySecurity governance, policy, and complianceThere are plenty of good resources that cover these topics individually. However, successfully designing, building, and maintaining robust security systems is much more complex than a random mix of these pillars. As attackers grow ever more sophisticated, using AI and automated tools, Defense in Depth provides a structured, proactive framework for building resilient systems designed to withstand the onslaught.
As we become more reliant on the digital ecosystem, security by default will become increasingly relevant. To be able to secure software against advanced cyber threats, one needs a holistic understanding of the individual pieces and their interplay. In this book, I aim to provide a comprehensive overview deeply rooted in security-first principles. I will guide you through real-world attacks to help you build a mental map and a framework that can withstand advanced threats.
Defense in Depth is in the spotlight in every critical security role today. The escalating frequency and sophistication of cyberattacks are only going to drive the surge. High-profile breaches have exposed the futility of relying solely on prevention. Defense in Depth acknowledges this, providing a practical framework for resilience. It emphasizes layered protection, continuous monitoring, and strategies to limit the damage caused by successful attacks.
As demands grow, Defense in Depth is going to be a crucial skill for every security professional and it will have faster growth opportunities.
Security is everyone’s responsibility, so we are targeting a wide audience. This book is designed for anyone working in the cybersecurity field, including security analysts, security engineers, security architects, and security managers, who can all benefit from reading this book.
Three main personas who are the primary target audience for this content are as follows:
Security leads: Leaders who design and architect security systems and strategies for organizations.Security developers: Individuals who design, implement, and maintain security controls and work with developers for enforcement. This book will provide a comprehensive guide to help them grow in their career to emerge as security leaders.Business leads: Leaders who drive business outcomes and make directional decisions about an organization’s roadmap. This book will provide real-world case studies to make informed business decisions and encourage them to include security as a core value of the company.Throughout the book, when we say “you,” we mean you, the reader, irrespective of your role or experience. We believe security is a collective journey and everyone plays an equal part in it.
Chapter 1, Navigating Risk, Classifying Assets, and Unveiling Threats, serves as a comprehensive introduction to the fundamental principles of security. By adopting a risk-based approach, the chapter provides you with an in-depth examination of asset classification and the various categories of threat actors, along with their underlying motivations.
Chapter 2, Practical Guide to Defense in Depth, builds upon the risk-based approach to security strategies and lays the foundation for Defense in Depth. It places significant emphasis on various security domains and the diverse range of controls within them. This chapter introduces primary components in a layered security design with a glimpse of real-world applicability.
Chapter 3, Building a Framework for Layered Security, reinforces the core principles of security and deepens the understanding of defense in depth, laying the foundation for crafting resilient security strategies. It emphasizes the critical role of introducing and implementing security policies to govern large-scale changes within organizations.
Chapter 4, Understanding the Attacker Mindset, focuses on types of threat actors and common tactics used by them. It covers the importance of understanding the adversaries to build a strong security strategy.
Chapter 5, Uncovering Weak Points through an Adversarial Lens, delves into the intricacies of adopting an attacker’s perspective to fortify defense systems. Based on the unique threat landscape for every organization, this chapter demonstrates how to craft tailored defense programs by profiling these risks.
Chapter 6, Mapping Attack Vectors and Gaining an Edge, focuses on drawing the line between common threats that organizations face and the attacker mindset to build a formidable security strategy. A lot of attention is paid to practical defense in depth security controls to give you the ability to understand the common attacks and be able to create a layered security posture.
Chapter 7, Building a Proactive Layered Defense Strategy, provides an overview of designing defense in depth using proactive, attacker-focused strategies. You will learn how to characterize different security mechanisms into buckets and apply them to appropriate situations.
Chapter 8, Understanding Emerging Threats and Defense in Depth, delves a little deeper into adaptive defense strategies based on evolving threat vectors. A lot of attention is paid to the effectiveness of a defense in depth approach against emerging threats and how to utilize advanced technologies as core components in defense systems.
Chapter 9, The Human Factor – Security Awareness and Training, introduces one of the most important gaps in today’s security world: humans. Building on top of zero trust principles, this chapter puts the focus on security as a chain and intrinsic weakness by design. It discusses the idea of leaving humans out of the loop to increase the robustness of security and also touches on the concept of reliability.
Chapter 10, Defense in Depth – A Living, Breathing Approach to Security, provides an overview of the inevitability of defense in depth in modern security models. Introducing the Secure Software Development Framework, this chapter demonstrates how to build a security program with defense in depth at the center of it. You will learn why defense in depth is the only way to think about building security strategies.
This book targets a wider audience and does not assume any prior knowledge. It builds on top of fundamental security concepts. Having some exposure to security challenges might come in handy for the real-world case studies presented; however, we have added further reading to solidify some of these gaps as you progress through the book.
There are a number of text conventions used throughout this book.
Bold: Indicates a new term, an important word, or words that you see onscreen. For instance, words in menus or dialog boxes appear in bold. Here is an example: By understanding the tactics, techniques, and procedures (TTPs) employed by adversaries, organizations can implement countermeasures and mitigate potential attacks.
Tips or important notes
Appear like this.
Feedback from our readers is always welcome.
General feedback: If you have questions about any aspect of this book, email us at [email protected] and mention the book title in the subject of your message.
Errata: Although we have taken every care to ensure the accuracy of our content, mistakes do happen. If you have found a mistake in this book, we would be grateful if you would report this to us. Please visit www.packtpub.com/support/errata and fill in the form.
Piracy: If you come across any illegal copies of our works in any form on the internet, we would be grateful if you would provide us with the location address or website name. Please contact us at [email protected] with a link to the material.
If you are interested in becoming an author: If there is a topic that you have expertise in and you are interested in either writing or contributing to a book, please visit authors.packtpub.com.
Once you’ve read The Complete Guide to Defense in Depth, we’d love to hear your thoughts! Please click here to go straight to the Amazon review page for this book and share your feedback.
Your review is important to us and the tech community and will help us make sure we’re delivering excellent quality content.
Thanks for purchasing this book!
Do you like to read on the go but are unable to carry your print books everywhere?
Is your eBook purchase not compatible with the device of your choice?
Don’t worry, now with every Packt book you get a DRM-free PDF version of that book at no cost.
Read anywhere, any place, on any device. Search, copy, and paste code from your favorite technical books directly into your application.
The perks don’t stop there, you can get exclusive access to discounts, newsletters, and great free content in your inbox daily
Follow these simple steps to get the benefits:
Scan the QR code or visit the link belowhttps://packt.link/free-ebook/9781835468265
Submit your proof of purchaseThat’s it! We’ll send your free PDF and other benefits to your email directlyIn this part, we focus on building a strong foundation of security, establishing the core theme of the book by introducing a risk-based approach to security. We’ll begin by demystifying the world of cyber risk, helping you identify what assets are most valuable and the threats they face. You’ll learn the fundamentals of Defense in Depth, and how it translates into practical strategies. Finally, we’ll guide you through creating a security framework that combines layers of protection, tailored to your unique needs. Approach this part as learning or refreshing concepts around the building blocks that make up Defense in Depth.
This part has the following chapters:
Chapter 1, Navigating Risk, Classifying Assets, and Unveiling ThreatsChapter 2, Practical Guide to Defense in DepthChapter 3, Building a Framework for Layered Security