mirror of
https://github.com/adulau/foo.be.git
synced 2024-11-24 10:47:07 +00:00
54 lines
2.8 KiB
Markdown
Executable file
54 lines
2.8 KiB
Markdown
Executable file
---
|
|
layout: post
|
|
title: "Cyber Security Exercises and Reality"
|
|
date: 2017-11-30 18:52:21
|
|
categories: infosec
|
|
---
|
|
|
|
# Cybersecurity Exercises and The Reality
|
|
|
|
Alexandre Dulaunoy <a@foo.be>
|
|
|
|
*version 0.1 - 2017-11-30*
|
|
|
|
When you are facing a potential threat, the most difficult aspect is to understand what you are fighting against.
|
|
Evaluating a threat in information security is a complex aspect especially when you have no simple ways
|
|
to scale the threat and know if you have the organisational and technical capabilities to respond to such threat.
|
|
|
|
In the past years, many cyber security exercises appear at local, national or international levels with the aim
|
|
to improve the capabilities at organisational or/and technical levels. There are many different organisations
|
|
involved in such exercise and there are many models depending of their respective focus. After being involved
|
|
in many of those (including designing or/and playing), I compiled my thoughts and especially the shortcomings
|
|
in such approach. The idea behind this series of notes is to improve such exercise or experiment other approaches.
|
|
|
|
# Synthetic information/evidences
|
|
|
|
While participating to some exercises, a lot of the evidences used are synthetic and rarely reflect realities from operational
|
|
security. This gives a perception to the players that the evidences are like this in real cases. But it's usually not the case, the
|
|
collection of the evidences (and its complexity) is often discarded from such game. Any digital forensic investigator knows how
|
|
complex is to gather, collect and acquire evidences. So it's not by playing or participating to such exercise that would help you
|
|
or your organisation to grasp the complexity and improve your team capabilities.
|
|
|
|
- Synthetic information or evidences
|
|
- The aim is often limited to solve one or more challenges
|
|
|
|
# Reducing operational security aspects to simple games
|
|
|
|
A critical issue in my eyes with cyber security exercises is the over simplification of cyber security threats at a level
|
|
which make these understandable for the political or non-operational managerial level. There are some significant
|
|
risks to reduce complexity of the reality. When operational security teams face real and concrete incidents, their
|
|
work can be seen as like solving a challenge. In incident response, it's quite common to face complex topics,
|
|
with different contexts and ultimately being incapable to reach a complete solution of the analysis from partial evidences,
|
|
multi-compromised infrastructures.
|
|
|
|
- Resources and allocation
|
|
- Outcomes and how results are integrated in operational security
|
|
|
|
# Ideas and improvements to make "exercises" useful
|
|
|
|
|Proposal|Description|
|
|
|:----|:-----|
|
|
|Take real cases, evidences and investigations|Avoid at all cost synthetic or fake data when creating exercises. If you take real data, don't mix-up with synthetic data.|
|
|
|
|
# References
|
|
|