@vantagesec/socc 0.1.12 → 0.1.14

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (71) hide show
  1. package/.socc/agents/socc.md +256 -0
  2. package/.socc/rules/socc-business-rules.md +328 -0
  3. package/.socc/skills/code-review-excellence/SKILL.md +538 -0
  4. package/.socc/skills/cybersecurity-analyst/QUICK_REFERENCE.md +263 -0
  5. package/.socc/skills/cybersecurity-analyst/README.md +243 -0
  6. package/.socc/skills/cybersecurity-analyst/SKILL.md +1707 -0
  7. package/.socc/skills/cybersecurity-analyst/tests/quiz.md +472 -0
  8. package/.socc/skills/data-visualization/SKILL.md +304 -0
  9. package/.socc/skills/deep-research/SKILL.md +192 -0
  10. package/.socc/skills/excel-analysis/SKILL.md +247 -0
  11. package/.socc/skills/find-skills/SKILL.md +133 -0
  12. package/.socc/skills/humanizer/README.md +120 -0
  13. package/.socc/skills/humanizer/SKILL.md +439 -0
  14. package/.socc/skills/malware-behavior/SKILL.md +54 -0
  15. package/.socc/skills/mitre/SKILL.md +200 -0
  16. package/.socc/skills/observability-logs-search/SKILL.md +237 -0
  17. package/.socc/skills/observability-logs-search/references/log-search-reference.md +76 -0
  18. package/.socc/skills/payload-triage/SKILL.md +53 -0
  19. package/.socc/skills/phishing-analysis/SKILL.md +51 -0
  20. package/.socc/skills/prd/SKILL.md +143 -0
  21. package/.socc/skills/remembering-conversations/MCP-TOOLS.md +137 -0
  22. package/.socc/skills/remembering-conversations/SKILL.md +65 -0
  23. package/.socc/skills/sequential-thinking/README.md +118 -0
  24. package/.socc/skills/sequential-thinking/SKILL.md +93 -0
  25. package/.socc/skills/sequential-thinking/references/advanced.md +122 -0
  26. package/.socc/skills/sequential-thinking/references/examples.md +274 -0
  27. package/.socc/skills/soc-generalist/SKILL.md +53 -0
  28. package/.socc/skills/suspicious-url/SKILL.md +51 -0
  29. package/.socc/skills/systematic-debugging/CREATION-LOG.md +119 -0
  30. package/.socc/skills/systematic-debugging/SKILL.md +296 -0
  31. package/.socc/skills/systematic-debugging/condition-based-waiting-example.ts +158 -0
  32. package/.socc/skills/systematic-debugging/condition-based-waiting.md +115 -0
  33. package/.socc/skills/systematic-debugging/defense-in-depth.md +122 -0
  34. package/.socc/skills/systematic-debugging/find-polluter.sh +63 -0
  35. package/.socc/skills/systematic-debugging/root-cause-tracing.md +169 -0
  36. package/.socc/skills/systematic-debugging/test-academic.md +14 -0
  37. package/.socc/skills/systematic-debugging/test-pressure-1.md +58 -0
  38. package/.socc/skills/systematic-debugging/test-pressure-2.md +68 -0
  39. package/.socc/skills/systematic-debugging/test-pressure-3.md +69 -0
  40. package/.socc/skills/translation-expertise/SKILL.md +284 -0
  41. package/.socc/skills/translation-expertise/chinese-traditional.md +535 -0
  42. package/.socc/skills/translation-expertise/english.md +372 -0
  43. package/.socc/skills/translation-expertise/japanese.md +515 -0
  44. package/.socc/skills/translation-expertise/tools-resources.md +527 -0
  45. package/.socc/skills/translation-expertise/translation-challenges.md +603 -0
  46. package/.socc/skills/web-search/SKILL.md +322 -0
  47. package/README.md +8 -8
  48. package/dist/cli.mjs +10702 -10799
  49. package/package.json +7 -5
  50. package/scripts/bootstrap-socc-soul.mjs +369 -26
  51. package/.claude/agents/socc.md +0 -316
  52. package/socc-canonical/.agents/generated/socc-agent-manifest.json +0 -16
  53. package/socc-canonical/.agents/generated/socc-agent.md +0 -316
  54. package/socc-canonical/.agents/soc-copilot/AGENTS.md +0 -33
  55. package/socc-canonical/.agents/soc-copilot/MEMORY.md +0 -26
  56. package/socc-canonical/.agents/soc-copilot/SKILL.md +0 -55
  57. package/socc-canonical/.agents/soc-copilot/SOUL.md +0 -48
  58. package/socc-canonical/.agents/soc-copilot/TOOLS.md +0 -47
  59. package/socc-canonical/.agents/soc-copilot/USER.md +0 -32
  60. package/socc-canonical/.agents/soc-copilot/identity.md +0 -13
  61. package/socc-canonical/.agents/soc-copilot/schemas/analysis_response.json +0 -119
  62. package/socc-canonical/.agents/soc-copilot/skills.md +0 -28
  63. package/socc-canonical/README.md +0 -8
  64. /package/{socc-canonical/.agents/soc-copilot → .socc}/references/evidence-rules.md +0 -0
  65. /package/{socc-canonical/.agents/soc-copilot → .socc}/references/intelligence-source-registry.md +0 -0
  66. /package/{socc-canonical/.agents/soc-copilot → .socc}/references/ioc-extraction.md +0 -0
  67. /package/{socc-canonical/.agents/soc-copilot → .socc}/references/knowledge-ingestion-policy.md +0 -0
  68. /package/{socc-canonical/.agents/soc-copilot → .socc}/references/mitre-guidance.md +0 -0
  69. /package/{socc-canonical/.agents/soc-copilot → .socc}/references/output-contract.md +0 -0
  70. /package/{socc-canonical/.agents/soc-copilot → .socc}/references/security-json-patterns.md +0 -0
  71. /package/{socc-canonical/.agents/soc-copilot → .socc}/references/telemetry-investigation-patterns.md +0 -0
@@ -0,0 +1,1707 @@
1
+ ---
2
+ name: cybersecurity-analyst
3
+ version: 1.0.0
4
+ description: |
5
+ Analyzes events through cybersecurity lens using threat modeling, attack surface analysis, defense-in-depth,
6
+ zero-trust architecture, and risk-based frameworks (CIA triad, STRIDE, MITRE ATT&CK).
7
+ Provides insights on vulnerabilities, attack vectors, defense strategies, incident response, and security posture.
8
+ Use when: Security incidents, vulnerability assessments, threat analysis, security architecture, compliance.
9
+ Evaluates: Confidentiality, integrity, availability, threat actors, attack patterns, controls, residual risk.
10
+ ---
11
+
12
+ # Cybersecurity Analyst Skill
13
+
14
+ ## Purpose
15
+
16
+ Analyze events through the disciplinary lens of cybersecurity, applying rigorous security frameworks (CIA triad, defense-in-depth, zero-trust), threat modeling methodologies (STRIDE, PASTA, VAST), attack surface analysis, and industry standards (NIST, ISO 27001, MITRE ATT&CK) to understand security risks, identify vulnerabilities, assess threat actors and attack vectors, evaluate defensive controls, and recommend risk mitigation strategies.
17
+
18
+ ## When to Use This Skill
19
+
20
+ - **Security Incident Analysis**: Investigate breaches, data leaks, ransomware attacks, insider threats
21
+ - **Vulnerability Assessment**: Identify weaknesses in systems, applications, networks, processes
22
+ - **Threat Modeling**: Analyze potential attack vectors and threat actors for new systems or changes
23
+ - **Security Architecture Review**: Evaluate design decisions for security implications and gaps
24
+ - **Risk Assessment**: Quantify and prioritize security risks using frameworks like CVSS, FAIR
25
+ - **Compliance Analysis**: Assess adherence to security standards (SOC 2, PCI-DSS, HIPAA, GDPR)
26
+ - **Incident Response Planning**: Design detection, containment, eradication, and recovery strategies
27
+ - **Security Posture Evaluation**: Assess overall defensive capabilities and maturity
28
+ - **Code Security Review**: Identify security vulnerabilities in software implementations
29
+
30
+ ## Core Philosophy: Security Thinking
31
+
32
+ Cybersecurity analysis rests on fundamental principles:
33
+
34
+ **Defense in Depth**: No single security control is perfect. Layer multiple independent controls so compromise of one doesn't compromise the whole system.
35
+
36
+ **Assume Breach**: Modern security assumes attackers will penetrate perimeter defenses. Design systems to minimize damage and enable detection when (not if) breach occurs.
37
+
38
+ **Least Privilege**: Grant minimum access necessary for legitimate function. Every excess permission is an opportunity for exploitation.
39
+
40
+ **Zero Trust**: Never trust, always verify. Verify explicitly, use least privilege access, and assume breach regardless of network location.
41
+
42
+ **Security by Design**: Security cannot be bolted on afterward. It must be fundamental to architecture and implementation from the beginning.
43
+
44
+ **CIA Triad**: Security protects three properties—Confidentiality (only authorized access), Integrity (only authorized modification), Availability (accessible when needed).
45
+
46
+ **Threat-Informed Defense**: Base defensive priorities on understanding of actual threat actors, their capabilities, motivations, and tactics (threat intelligence).
47
+
48
+ **Risk-Based Approach**: Perfect security is impossible. Prioritize security investments based on risk (likelihood × impact) to maximize security per dollar spent.
49
+
50
+ ---
51
+
52
+ ## Theoretical Foundations (Expandable)
53
+
54
+ ### Foundation 1: CIA Triad (Classic Security Model)
55
+
56
+ **Components**:
57
+
58
+ **Confidentiality**: Information accessible only to authorized entities
59
+
60
+ - Protection mechanisms: Encryption, access controls, authentication
61
+ - Threats: Eavesdropping, data theft, unauthorized disclosure
62
+ - Example violations: Data breach, password theft, insider leak
63
+
64
+ **Integrity**: Information modifiable only by authorized entities in authorized ways
65
+
66
+ - Protection mechanisms: Hashing, digital signatures, access controls, version control
67
+ - Threats: Tampering, unauthorized modification, malware
68
+ - Example violations: Database manipulation, man-in-the-middle attacks, ransomware encryption
69
+
70
+ **Availability**: Information and systems accessible when needed by authorized entities
71
+
72
+ - Protection mechanisms: Redundancy, backups, DDoS mitigation, incident response
73
+ - Threats: Denial of service, ransomware, system destruction
74
+ - Example violations: DDoS attacks, ransomware, infrastructure failures
75
+
76
+ **Extensions**:
77
+
78
+ - **Authenticity**: Verified identity of entities and origin of information
79
+ - **Non-repudiation**: Cannot deny taking action
80
+ - **Accountability**: Actions traceable to entities
81
+
82
+ **Application**: Every security analysis should identify which aspects of CIA triad are at risk and how controls protect each.
83
+
84
+ **Sources**:
85
+
86
+ - [CIA Triad - Wikipedia](https://en.wikipedia.org/wiki/Information_security#Key_concepts)
87
+ - [NIST Cybersecurity Framework](https://www.nist.gov/cyberframework)
88
+
89
+ ### Foundation 2: Defense in Depth (Layered Security)
90
+
91
+ **Principle**: Deploy multiple layers of security controls so compromise of one layer doesn't compromise entire system.
92
+
93
+ **Historical Origin**: Military defensive strategy—multiple concentric perimeter defenses
94
+
95
+ **Security Layers**:
96
+
97
+ 1. **Physical**: Facility access controls, locked server rooms
98
+ 2. **Network**: Firewalls, network segmentation, IDS/IPS
99
+ 3. **Host**: Endpoint protection, host firewalls, patch management
100
+ 4. **Application**: Input validation, secure coding, authentication
101
+ 5. **Data**: Encryption at rest and in transit, DLP, tokenization
102
+ 6. **Human**: Security awareness training, phishing simulation
103
+
104
+ **Key Insight**: Redundancy is not waste—it's resilience. Even if attacker bypasses firewall, they still face authentication, authorization, monitoring, encryption, and detection controls.
105
+
106
+ **Application**: Security architecture should have multiple independent defensive layers protecting critical assets.
107
+
108
+ **Limitation**: Can create complexity and false sense of security if layers are not maintained or are interdependent.
109
+
110
+ **Sources**:
111
+
112
+ - [Defense in Depth - NSA](https://www.nsa.gov/Press-Room/Cybersecurity-Advisories-Guidance/)
113
+ - [Layered Security - CISA](https://www.cisa.gov/topics/cybersecurity-best-practices)
114
+
115
+ ### Foundation 3: Zero Trust Architecture
116
+
117
+ **Core Principle**: "Never trust, always verify" regardless of network location
118
+
119
+ **Contrast with Perimeter Model**: Traditional security assumed internal network is trusted ("castle and moat"). Zero trust assumes no network location is trusted.
120
+
121
+ **Key Tenets** (NIST SP 800-207):
122
+
123
+ 1. **Verify explicitly**: Always authenticate and authorize based on all available data points
124
+ 2. **Least privilege access**: Limit user access with Just-In-Time and Just-Enough-Access
125
+ 3. **Assume breach**: Minimize blast radius and segment access; verify end-to-end encryption
126
+
127
+ **Components**:
128
+
129
+ - **Identity-centric security**: Identity becomes new perimeter
130
+ - **Micro-segmentation**: Network divided into small zones with separate controls
131
+ - **Continuous verification**: Authentication and authorization are continuous, not one-time
132
+ - **Data-centric**: Protect data itself, not just perimeter around it
133
+
134
+ **Drivers**:
135
+
136
+ - Cloud adoption (no clear perimeter)
137
+ - Remote work (users outside traditional perimeter)
138
+ - Sophisticated attacks (perimeter breaches common)
139
+
140
+ **Application**: Modern security architectures should be designed with zero trust principles, especially for cloud and hybrid environments.
141
+
142
+ **Sources**:
143
+
144
+ - [NIST SP 800-207: Zero Trust Architecture](https://csrc.nist.gov/publications/detail/sp/800-207/final)
145
+ - [Zero Trust - Microsoft Security](https://www.microsoft.com/en-us/security/business/zero-trust)
146
+
147
+ ### Foundation 4: Threat Modeling
148
+
149
+ **Definition**: Structured approach to identify and prioritize potential threats to a system
150
+
151
+ **Purpose**: Proactively identify security issues during design phase when fixes are cheapest
152
+
153
+ **Benefits**:
154
+
155
+ - Find vulnerabilities before implementation
156
+ - Prioritize security work
157
+ - Communicate risks to stakeholders
158
+ - Guide security testing
159
+
160
+ **Common Methodologies**:
161
+
162
+ **STRIDE** (Microsoft):
163
+
164
+ - **S**poofing identity
165
+ - **T**ampering with data
166
+ - **R**epudiation
167
+ - **I**nformation disclosure
168
+ - **D**enial of service
169
+ - **E**levation of privilege
170
+
171
+ **PASTA** (Process for Attack Simulation and Threat Analysis):
172
+
173
+ - Seven-stage risk-centric methodology
174
+ - Aligns business objectives with technical requirements
175
+
176
+ **VAST** (Visual, Agile, and Simple Threat modeling):
177
+
178
+ - Scalable for agile development
179
+ - Two types: application threat models and operational threat models
180
+
181
+ **Application**: Use threat modeling for new features, architecture changes, or security reviews.
182
+
183
+ **Sources**:
184
+
185
+ - [Threat Modeling - OWASP](https://owasp.org/www-community/Threat_Modeling)
186
+ - [STRIDE Threat Model - Microsoft](https://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-threats)
187
+
188
+ ### Foundation 5: MITRE ATT&CK Framework
189
+
190
+ **Description**: Knowledge base of adversary tactics and techniques based on real-world observations
191
+
192
+ **Purpose**: Understand how attackers operate to inform defense, detection, and threat hunting
193
+
194
+ **Structure**:
195
+
196
+ - **Tactics**: High-level goals (e.g., Initial Access, Execution, Persistence, Privilege Escalation)
197
+ - **Techniques**: Ways to achieve tactics (e.g., Phishing, Exploiting Public Applications)
198
+ - **Sub-techniques**: Specific implementations
199
+ - **Procedures**: Specific attacker behaviors
200
+
201
+ **14 Tactics** (Enterprise Matrix):
202
+
203
+ 1. Reconnaissance
204
+ 2. Resource Development
205
+ 3. Initial Access
206
+ 4. Execution
207
+ 5. Persistence
208
+ 6. Privilege Escalation
209
+ 7. Defense Evasion
210
+ 8. Credential Access
211
+ 9. Discovery
212
+ 10. Lateral Movement
213
+ 11. Collection
214
+ 12. Command and Control
215
+ 13. Exfiltration
216
+ 14. Impact
217
+
218
+ **Application**:
219
+
220
+ - Map defensive controls to ATT&CK techniques
221
+ - Identify detection gaps
222
+ - Threat intelligence sharing
223
+ - Red team/purple team exercises
224
+
225
+ **Value**: Common language for describing attacker behavior; basis for threat-informed defense
226
+
227
+ **Sources**:
228
+
229
+ - [MITRE ATT&CK](https://attack.mitre.org/)
230
+ - [ATT&CK Navigator](https://mitre-attack.github.io/attack-navigator/)
231
+
232
+ ---
233
+
234
+ ## Core Analytical Frameworks (Expandable)
235
+
236
+ ### Framework 1: Attack Surface Analysis
237
+
238
+ **Definition**: Identification and assessment of all points where unauthorized user could enter or extract data from system
239
+
240
+ **Components**:
241
+
242
+ **Attack Surface Elements**:
243
+
244
+ - **Network attack surface**: Exposed ports, services, protocols
245
+ - **Software attack surface**: Applications, APIs, web interfaces
246
+ - **Human attack surface**: Users, administrators, social engineering targets
247
+ - **Physical attack surface**: Facility access, hardware access
248
+
249
+ **Attack Vectors**: Methods attackers use to exploit attack surface
250
+
251
+ - Network-based: Port scanning, protocol exploits, man-in-the-middle
252
+ - Web-based: SQL injection, XSS, CSRF, authentication bypass
253
+ - Email-based: Phishing, malicious attachments, credential harvesting
254
+ - Physical: Theft, unauthorized access, evil maid attacks
255
+ - Social engineering: Pretexting, baiting, tailgating
256
+
257
+ **Analysis Process**:
258
+
259
+ 1. **Enumerate**: List all entry points and assets
260
+ 2. **Classify**: Categorize by type and criticality
261
+ 3. **Assess**: Evaluate exploitability and impact
262
+ 4. **Prioritize**: Rank by risk
263
+ 5. **Reduce**: Minimize unnecessary exposure
264
+
265
+ **Metrics**:
266
+
267
+ - Number of exposed services
268
+ - Number of internet-facing applications
269
+ - Number of privileged accounts
270
+ - Lines of code exposed to untrusted input
271
+
272
+ **Application**: Reducing attack surface is fundamental defensive strategy. Eliminate unnecessary exposure.
273
+
274
+ **Sources**:
275
+
276
+ - [Attack Surface Analysis - OWASP](https://owasp.org/www-community/Attack_Surface_Analysis_Cheat_Sheet)
277
+ - [Reducing Attack Surface - Microsoft](https://learn.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules)
278
+
279
+ ### Framework 2: Risk Assessment Frameworks
280
+
281
+ **Purpose**: Quantify and prioritize security risks to guide resource allocation
282
+
283
+ **Common Frameworks**:
284
+
285
+ **CVSS** (Common Vulnerability Scoring System):
286
+
287
+ - Standard for assessing vulnerability severity
288
+ - Score 0-10 based on exploitability, impact, scope
289
+ - Base score (intrinsic characteristics) + temporal + environmental scores
290
+ - Widely used but criticized for not capturing actual risk in specific contexts
291
+
292
+ **FAIR** (Factor Analysis of Information Risk):
293
+
294
+ - Quantitative risk framework
295
+ - Risk = Loss Event Frequency × Loss Magnitude
296
+ - Enables cost-benefit analysis of security investments
297
+ - More complex but provides dollar-denominated risk figures
298
+
299
+ **NIST Risk Management Framework** (RMF):
300
+
301
+ - Seven steps: Prepare, Categorize, Select, Implement, Assess, Authorize, Monitor
302
+ - Links security controls to risk management
303
+ - Used by U.S. federal agencies
304
+
305
+ **Qualitative vs. Quantitative**:
306
+
307
+ - **Qualitative**: High/Medium/Low risk ratings (simpler, faster, subjective)
308
+ - **Quantitative**: Numerical risk values (complex, objective, requires data)
309
+
310
+ **Application**: Risk assessment informs prioritization. Not all vulnerabilities are equally important—focus on highest risks.
311
+
312
+ **Sources**:
313
+
314
+ - [CVSS](https://www.first.org/cvss/)
315
+ - [FAIR Institute](https://www.fairinstitute.org/)
316
+ - [NIST RMF](https://csrc.nist.gov/projects/risk-management)
317
+
318
+ ### Framework 3: Security Control Frameworks
319
+
320
+ **Purpose**: Structured set of security controls to achieve security objectives
321
+
322
+ **Major Frameworks**:
323
+
324
+ **NIST Cybersecurity Framework**:
325
+
326
+ - Five core functions: Identify, Protect, Detect, Respond, Recover
327
+ - Not prescriptive—flexible for different organizations
328
+ - Widely adopted across industries and internationally
329
+
330
+ **NIST SP 800-53** (Security and Privacy Controls):
331
+
332
+ - Comprehensive catalog of security controls for federal systems
333
+ - 20 control families (Access Control, Incident Response, etc.)
334
+ - Detailed implementation guidance
335
+
336
+ **CIS Controls** (Center for Internet Security):
337
+
338
+ - 18 prioritized security controls
339
+ - Implementation groups (IG1, IG2, IG3) based on organizational maturity
340
+ - Actionable and measurable
341
+
342
+ **ISO/IEC 27001**:
343
+
344
+ - International standard for information security management systems
345
+ - 14 control domains, 114 controls
346
+ - Certification available
347
+
348
+ **Application**: Use frameworks to:
349
+
350
+ - Ensure comprehensive coverage
351
+ - Benchmark security posture
352
+ - Communicate with stakeholders
353
+ - Meet compliance requirements
354
+
355
+ **Sources**:
356
+
357
+ - [NIST Cybersecurity Framework](https://www.nist.gov/cyberframework)
358
+ - [CIS Controls](https://www.cisecurity.org/controls)
359
+ - [ISO 27001](https://www.iso.org/isoiec-27001-information-security.html)
360
+
361
+ ### Framework 4: Incident Response Lifecycle
362
+
363
+ **Definition**: Structured approach to handling security incidents
364
+
365
+ **Standard Model** (NIST SP 800-61):
366
+
367
+ **Phase 1: Preparation**
368
+
369
+ - Establish IR capability, tools, playbooks
370
+ - Training and exercises
371
+ - Communication plans
372
+
373
+ **Phase 2: Detection and Analysis**
374
+
375
+ - Monitoring and alerting
376
+ - Incident classification and prioritization
377
+ - Initial investigation
378
+ - Scope determination
379
+
380
+ **Phase 3: Containment, Eradication, and Recovery**
381
+
382
+ - **Containment**: Stop spread (short-term and long-term)
383
+ - **Eradication**: Remove threat from environment
384
+ - **Recovery**: Restore systems to normal operation
385
+
386
+ **Phase 4: Post-Incident Activity**
387
+
388
+ - Lessons learned
389
+ - Evidence preservation
390
+ - Incident report
391
+ - Process improvement
392
+
393
+ **Key Concepts**:
394
+
395
+ - **Playbooks**: Predefined procedures for common incident types
396
+ - **Indicators of Compromise** (IoCs): Artifacts indicating malicious activity
397
+ - **Chain of custody**: Evidence handling procedures
398
+ - **Communication**: Internal and external stakeholders, legal, PR
399
+
400
+ **Metrics**:
401
+
402
+ - Mean Time to Detect (MTTD)
403
+ - Mean Time to Respond (MTTR)
404
+ - Mean Time to Contain (MTTC)
405
+
406
+ **Application**: Effective incident response minimizes damage, reduces recovery time, and captures learning.
407
+
408
+ **Sources**:
409
+
410
+ - [NIST SP 800-61: Computer Security Incident Handling Guide](https://csrc.nist.gov/publications/detail/sp/800-61/rev-2/final)
411
+ - [SANS Incident Response](https://www.sans.org/incident-response/)
412
+
413
+ ### Framework 5: Secure Development Lifecycle (SDL)
414
+
415
+ **Purpose**: Integrate security into software development process
416
+
417
+ **Microsoft SDL Phases**:
418
+
419
+ 1. **Training**: Security training for developers
420
+ 2. **Requirements**: Define security requirements and privacy requirements
421
+ 3. **Design**: Threat modeling, attack surface reduction, defense in depth
422
+ 4. **Implementation**: Secure coding standards, code analysis tools
423
+ 5. **Verification**: Security testing (SAST, DAST, penetration testing)
424
+ 6. **Release**: Final security review, incident response plan
425
+ 7. **Response**: Execute incident response plan if vulnerability discovered
426
+
427
+ **Key Practices**:
428
+
429
+ - **Static Analysis (SAST)**: Analyze source code for vulnerabilities
430
+ - **Dynamic Analysis (DAST)**: Test running application
431
+ - **Dependency Scanning**: Check third-party libraries for known vulnerabilities
432
+ - **Penetration Testing**: Simulate real attacks
433
+ - **Security Champions**: Embed security expertise in development teams
434
+
435
+ **OWASP SAMM** (Software Assurance Maturity Model):
436
+
437
+ - Maturity model for secure software development
438
+ - Five business functions: Governance, Design, Implementation, Verification, Operations
439
+ - Three maturity levels for each function
440
+
441
+ **Application**: Security must be integrated throughout development lifecycle, not just at the end.
442
+
443
+ **Sources**:
444
+
445
+ - [Microsoft SDL](https://www.microsoft.com/en-us/securityengineering/sdl)
446
+ - [OWASP SAMM](https://owaspsamm.org/)
447
+
448
+ ---
449
+
450
+ ## Methodological Approaches (Expandable)
451
+
452
+ ### Method 1: Threat Intelligence Analysis
453
+
454
+ **Purpose**: Understand adversaries, their capabilities, tactics, and targets to inform defense
455
+
456
+ **Types of Threat Intelligence**:
457
+
458
+ **Strategic**: High-level trends for executives
459
+
460
+ - APT group activity and motivations
461
+ - Geopolitical cyber threats
462
+ - Industry-specific threat landscape
463
+
464
+ **Operational**: Campaign-level information for security operations
465
+
466
+ - Current attack campaigns
467
+ - Threat actor TTPs
468
+ - Malware families
469
+
470
+ **Tactical**: Technical indicators for immediate defense
471
+
472
+ - IP addresses, domains, file hashes
473
+ - YARA rules, Snort signatures
474
+ - CVEs being exploited
475
+
476
+ **Analytical Process**:
477
+
478
+ 1. **Collection**: Gather data from internal sources, threat feeds, OSINT, dark web
479
+ 2. **Processing**: Normalize, correlate, deduplicate
480
+ 3. **Analysis**: Contextualize, attribute, assess intent and capability
481
+ 4. **Dissemination**: Share with relevant teams in actionable format
482
+ 5. **Feedback**: Assess effectiveness and refine
483
+
484
+ **Frameworks**:
485
+
486
+ - **Diamond Model**: Adversary, Capability, Infrastructure, Victim
487
+ - **Kill Chain**: Reconnaissance → Weaponization → Delivery → Exploitation → Installation → C2 → Actions on Objectives
488
+ - **MITRE ATT&CK**: Map observed techniques to ATT&CK matrix
489
+
490
+ **Application**: Threat intelligence enables proactive, threat-informed defense rather than generic security measures.
491
+
492
+ **Sources**:
493
+
494
+ - [CISA Threat Intelligence](https://www.cisa.gov/topics/cyber-threats-and-advisories)
495
+ - [Threat Intelligence - SANS](https://www.sans.org/cyber-security-courses/cyber-threat-intelligence/)
496
+
497
+ ### Method 2: Penetration Testing
498
+
499
+ **Definition**: Authorized simulated attack to evaluate security of systems
500
+
501
+ **Types**:
502
+
503
+ **Black Box**: No prior knowledge (simulates external attacker)
504
+
505
+ **Gray Box**: Partial knowledge (simulates insider or compromised user)
506
+
507
+ **White Box**: Full knowledge (comprehensive security assessment)
508
+
509
+ **Phases** (Penetration Testing Execution Standard):
510
+
511
+ 1. **Pre-engagement**: Scope, rules of engagement, legal agreements
512
+ 2. **Intelligence gathering**: OSINT, network scanning, service enumeration
513
+ 3. **Threat modeling**: Identify potential attack vectors
514
+ 4. **Vulnerability analysis**: Identify exploitable weaknesses
515
+ 5. **Exploitation**: Attempt to exploit vulnerabilities
516
+ 6. **Post-exploitation**: Assess impact, lateral movement, privilege escalation
517
+ 7. **Reporting**: Document findings, demonstrate impact, provide remediation guidance
518
+
519
+ **Specialized Types**:
520
+
521
+ - **Web application penetration testing**: Focus on OWASP Top 10
522
+ - **Network penetration testing**: Internal and external network
523
+ - **Social engineering**: Phishing, vishing, physical intrusion
524
+ - **Wireless penetration testing**: WiFi security assessment
525
+
526
+ **Red Team vs. Penetration Testing**:
527
+
528
+ - **Penetration testing**: Find as many vulnerabilities as possible
529
+ - **Red teaming**: Goal-oriented (e.g., access specific data), simulates APT, tests detection and response
530
+
531
+ **Application**: Regular penetration testing validates effectiveness of controls and identifies gaps before attackers do.
532
+
533
+ **Sources**:
534
+
535
+ - [Penetration Testing Execution Standard](http://www.pentest-standard.org/)
536
+ - [OWASP Testing Guide](https://owasp.org/www-project-web-security-testing-guide/)
537
+
538
+ ### Method 3: Security Architecture Review
539
+
540
+ **Purpose**: Evaluate system design for security properties and identify architectural vulnerabilities
541
+
542
+ **Review Dimensions**:
543
+
544
+ **Structural Analysis**:
545
+
546
+ - Trust boundaries and data flows
547
+ - Authentication and authorization architecture
548
+ - Network segmentation and isolation
549
+ - Data classification and protection
550
+
551
+ **Threat Modeling**:
552
+
553
+ - Apply STRIDE or other methodology
554
+ - Identify attack trees
555
+ - Assess mitigations for identified threats
556
+
557
+ **Control Assessment**:
558
+
559
+ - Map controls to CIA triad
560
+ - Evaluate defense-in-depth layers
561
+ - Identify single points of failure
562
+
563
+ **Compliance Review**:
564
+
565
+ - Check against security frameworks (NIST, CIS, ISO)
566
+ - Regulatory requirements (PCI-DSS, HIPAA, SOC 2)
567
+
568
+ **Technology Assessment**:
569
+
570
+ - Cryptographic implementation
571
+ - Secure protocols
572
+ - Patch management approach
573
+ - Secret management
574
+
575
+ **Analysis Questions**:
576
+
577
+ - What are trust boundaries?
578
+ - Where does sensitive data flow?
579
+ - How is authentication/authorization enforced?
580
+ - What happens if component X is compromised?
581
+ - Are security assumptions documented and validated?
582
+
583
+ **Outputs**:
584
+
585
+ - Architecture diagrams with security annotations
586
+ - Threat model
587
+ - Risk assessment
588
+ - Remediation recommendations
589
+
590
+ **Application**: Architecture review during design phase prevents expensive security issues in production.
591
+
592
+ ### Method 4: Vulnerability Assessment and Management
593
+
594
+ **Purpose**: Systematically identify, classify, prioritize, and remediate security weaknesses
595
+
596
+ **Process**:
597
+
598
+ **Phase 1: Discovery**
599
+
600
+ - Asset inventory (what do we have?)
601
+ - Vulnerability scanning (automated tools)
602
+ - Manual security testing
603
+ - Code review (static analysis)
604
+
605
+ **Phase 2: Assessment**
606
+
607
+ - Classify vulnerabilities by type and severity
608
+ - Assess exploitability (is there exploit code? Is it being exploited?)
609
+ - Determine impact (what data/systems at risk?)
610
+ - Calculate risk score (CVSS, contextual factors)
611
+
612
+ **Phase 3: Prioritization**
613
+
614
+ - Rank by risk (likelihood × impact)
615
+ - Consider threat intelligence (is it being exploited in wild?)
616
+ - Business criticality of affected assets
617
+ - Remediation complexity
618
+
619
+ **Phase 4: Remediation**
620
+
621
+ - Patching (ideal)
622
+ - Configuration changes
623
+ - Compensating controls (if patching impossible)
624
+ - Accept risk (document and approve)
625
+
626
+ **Phase 5: Verification**
627
+
628
+ - Rescan to confirm remediation
629
+ - Update vulnerability database
630
+ - Track metrics (time to remediate, vulnerability density)
631
+
632
+ **Challenges**:
633
+
634
+ - Alert fatigue (too many findings)
635
+ - False positives
636
+ - Patching disruption
637
+ - Legacy systems
638
+
639
+ **Best Practices**:
640
+
641
+ - Risk-based prioritization (not just CVSS)
642
+ - SLA-based remediation (Critical: 7 days, High: 30 days, etc.)
643
+ - Automate where possible
644
+ - Track trends and metrics
645
+
646
+ **Application**: Continuous vulnerability management is essential hygiene. Can't fix what you don't know about.
647
+
648
+ **Sources**:
649
+
650
+ - [NIST SP 800-40: Patch and Vulnerability Management](https://csrc.nist.gov/publications/detail/sp/800-40/rev-4/final)
651
+
652
+ ### Method 5: Security Monitoring and Detection Engineering
653
+
654
+ **Purpose**: Design and operate capabilities to detect malicious activity
655
+
656
+ **Components**:
657
+
658
+ **Data Sources**:
659
+
660
+ - Network traffic (NetFlow, full packet capture)
661
+ - Endpoint logs (process creation, file access, registry changes)
662
+ - Authentication logs (logins, privilege escalation)
663
+ - Application logs (errors, transactions)
664
+ - Cloud APIs and audit logs
665
+
666
+ **Detection Mechanisms**:
667
+
668
+ **Signature-based**: Known malicious patterns (antivirus, IDS signatures)
669
+
670
+ - Pros: Low false positives, fast
671
+ - Cons: Only detects known threats
672
+
673
+ **Anomaly-based**: Deviations from baseline behavior
674
+
675
+ - Pros: Can detect novel attacks
676
+ - Cons: High false positives, requires tuning
677
+
678
+ **Heuristic-based**: Rules based on attacker behavior patterns
679
+
680
+ - Pros: Detects variations of known attacks
681
+ - Cons: Requires security expertise to create rules
682
+
683
+ **Threat intelligence-based**: Match against known IoCs
684
+
685
+ - Pros: Leverages collective knowledge
686
+ - Cons: Reactive (indicators discovered post-compromise)
687
+
688
+ **Detection Development**:
689
+
690
+ 1. Understand attacker technique (MITRE ATT&CK)
691
+ 2. Identify data sources that capture technique
692
+ 3. Develop detection logic
693
+ 4. Test against true positives and false positives
694
+ 5. Tune threshold and logic
695
+ 6. Document detection and response procedures
696
+ 7. Monitor effectiveness and iterate
697
+
698
+ **SIEM and SOC**:
699
+
700
+ - **SIEM**: Aggregate, correlate, and analyze security logs
701
+ - **SOC**: Security Operations Center—team that monitors alerts and responds to incidents
702
+
703
+ **Metrics**:
704
+
705
+ - Detection coverage (% of ATT&CK techniques covered)
706
+ - Alert volume and quality
707
+ - False positive rate
708
+ - Mean Time to Detect (MTTD)
709
+
710
+ **Application**: You can't respond to what you don't detect. Invest in detection capabilities aligned to threats you face.
711
+
712
+ **Sources**:
713
+
714
+ - [Detection Engineering - Splunk](https://www.splunk.com/en_us/blog/learn/detection-engineering.html)
715
+ - [Sigma Rules](https://github.com/SigmaHQ/sigma)
716
+
717
+ ---
718
+
719
+ ## Analysis Rubric
720
+
721
+ ### What to Examine
722
+
723
+ **Assets and Data**:
724
+
725
+ - What sensitive data exists? (PII, credentials, trade secrets, financial data)
726
+ - Where is it stored, processed, transmitted?
727
+ - Who has access?
728
+ - What is business impact if compromised? (confidentiality, integrity, availability)
729
+
730
+ **Attack Surface**:
731
+
732
+ - What systems are exposed to internet?
733
+ - What are entry points for attackers?
734
+ - What authentication is required?
735
+ - What third-party dependencies exist?
736
+
737
+ **Threat Actors**:
738
+
739
+ - Who might target this? (Nation-states, cybercriminals, hacktivists, insiders)
740
+ - What are their capabilities and motivations?
741
+ - What TTPs do they typically use?
742
+ - What threat intelligence exists?
743
+
744
+ **Vulnerabilities**:
745
+
746
+ - Known software vulnerabilities (CVEs)?
747
+ - Configuration weaknesses?
748
+ - Architectural security flaws?
749
+ - Code-level vulnerabilities?
750
+ - Human vulnerabilities (phishing susceptibility)?
751
+
752
+ **Existing Controls**:
753
+
754
+ - What security controls are in place?
755
+ - Do they follow defense-in-depth principles?
756
+ - Are they properly configured and maintained?
757
+ - What detection and response capabilities exist?
758
+
759
+ ### Questions to Ask
760
+
761
+ **Threat Questions**:
762
+
763
+ - What could go wrong?
764
+ - What are most likely attack vectors?
765
+ - What threat actors might target this?
766
+ - What are their goals and capabilities?
767
+ - What historical incidents are relevant?
768
+
769
+ **Vulnerability Questions**:
770
+
771
+ - What weaknesses exist?
772
+ - How exploitable are they?
773
+ - What is impact if exploited?
774
+ - Are there known exploits or active exploitation?
775
+ - How quickly can vulnerabilities be remediated?
776
+
777
+ **Control Questions**:
778
+
779
+ - What protections are in place?
780
+ - How effective are they?
781
+ - What gaps exist in defensive coverage?
782
+ - Can controls be bypassed?
783
+ - How will malicious activity be detected?
784
+
785
+ **Risk Questions**:
786
+
787
+ - What is likelihood of compromise?
788
+ - What is potential impact?
789
+ - What is overall risk level?
790
+ - How does risk compare to organization's risk appetite?
791
+ - What risk treatment options exist? (mitigate, accept, transfer, avoid)
792
+
793
+ **Compliance Questions**:
794
+
795
+ - What regulations or standards apply?
796
+ - Are security requirements met?
797
+ - What evidence demonstrates compliance?
798
+ - What gaps exist?
799
+
800
+ ### Factors to Consider
801
+
802
+ **Technical Factors**:
803
+
804
+ - System architecture and design
805
+ - Technology stack and versions
806
+ - Configuration and hardening
807
+ - Cryptographic implementation
808
+ - Network topology and segmentation
809
+
810
+ **Organizational Factors**:
811
+
812
+ - Security maturity and culture
813
+ - Available resources and budget
814
+ - Risk tolerance
815
+ - Regulatory environment
816
+ - Business criticality
817
+
818
+ **Threat Landscape**:
819
+
820
+ - Current threat actor activity
821
+ - Emerging attack techniques
822
+ - Industry-specific threats
823
+ - Geopolitical factors
824
+
825
+ **Operational Factors**:
826
+
827
+ - Patch management processes
828
+ - Incident response capabilities
829
+ - Security monitoring and detection
830
+ - Security awareness and training
831
+ - Third-party risk management
832
+
833
+ ### Historical Parallels to Consider
834
+
835
+ - Similar security incidents
836
+ - Comparable vulnerability exploits
837
+ - Industry-specific attack patterns
838
+ - Lessons from major breaches
839
+ - Evolution of threat actor TTPs
840
+
841
+ ### Implications to Explore
842
+
843
+ **Immediate Security Implications**:
844
+
845
+ - Confidentiality: Data breach risk
846
+ - Integrity: Data tampering or corruption risk
847
+ - Availability: Service disruption risk
848
+ - Financial: Ransom, recovery costs, fines
849
+
850
+ **Broader Implications**:
851
+
852
+ - Reputation damage
853
+ - Legal and regulatory consequences
854
+ - Customer trust erosion
855
+ - Competitive disadvantage
856
+ - Systemic risk (if in critical infrastructure)
857
+
858
+ **Strategic Implications**:
859
+
860
+ - Security architecture changes needed
861
+ - Security program maturity gaps
862
+ - Resource allocation and prioritization
863
+ - Risk management approach
864
+
865
+ ---
866
+
867
+ ## Step-by-Step Analysis Process
868
+
869
+ ### Step 1: Define Scope and Context
870
+
871
+ **Actions**:
872
+
873
+ - Clearly identify system, application, or event being analyzed
874
+ - Determine boundaries and interfaces
875
+ - Identify stakeholders and their security requirements
876
+ - Understand business context and criticality
877
+ - Gather relevant documentation (architecture diagrams, data flows, policies)
878
+
879
+ **Outputs**:
880
+
881
+ - Scope statement
882
+ - Asset inventory
883
+ - Stakeholder list
884
+ - Business context understanding
885
+
886
+ ### Step 2: Identify Assets and Data
887
+
888
+ **Actions**:
889
+
890
+ - List critical assets (systems, data, services)
891
+ - Classify data by sensitivity (public, internal, confidential, restricted)
892
+ - Map data flows (where data is created, stored, processed, transmitted, destroyed)
893
+ - Identify crown jewels (most valuable assets)
894
+
895
+ **Outputs**:
896
+
897
+ - Asset inventory with criticality ratings
898
+ - Data classification matrix
899
+ - Data flow diagrams
900
+ - Crown jewels list
901
+
902
+ ### Step 3: Analyze Attack Surface
903
+
904
+ **Actions**:
905
+
906
+ - Enumerate all entry points (APIs, web interfaces, network services, physical access)
907
+ - Identify trust boundaries (where untrusted input crosses into trusted zones)
908
+ - Map authentication and authorization points
909
+ - Identify dependencies (third-party services, libraries, suppliers)
910
+
911
+ **Outputs**:
912
+
913
+ - Attack surface map
914
+ - Trust boundary diagram
915
+ - Entry point inventory
916
+ - Dependency list
917
+
918
+ ### Step 4: Conduct Threat Modeling
919
+
920
+ **Actions**:
921
+
922
+ - Select threat modeling methodology (STRIDE, PASTA, etc.)
923
+ - Identify potential threat actors and their goals
924
+ - Enumerate potential attack vectors for each asset
925
+ - Create attack trees showing attack paths
926
+ - Map to MITRE ATT&CK techniques
927
+
928
+ **Outputs**:
929
+
930
+ - Threat model document
931
+ - Threat actor profiles
932
+ - Attack tree diagrams
933
+ - ATT&CK technique mapping
934
+
935
+ ### Step 5: Identify Vulnerabilities
936
+
937
+ **Actions**:
938
+
939
+ - Review known CVEs for technologies in use
940
+ - Analyze configuration against security benchmarks (CIS, STIGs)
941
+ - Review architecture for security design flaws
942
+ - Consider code-level vulnerabilities (if applicable)
943
+ - Assess human vulnerabilities (phishing susceptibility, privilege misuse)
944
+
945
+ **Outputs**:
946
+
947
+ - Vulnerability inventory
948
+ - CVSS scores or risk ratings
949
+ - Configuration gap analysis
950
+ - Architectural security issues
951
+
952
+ ### Step 6: Assess Existing Controls
953
+
954
+ **Actions**:
955
+
956
+ - Inventory security controls across all layers (network, host, application, data)
957
+ - Map controls to threats (which threats do controls mitigate?)
958
+ - Evaluate control effectiveness (properly configured? maintained? monitored?)
959
+ - Identify control gaps (threats without adequate mitigation)
960
+ - Assess detection and response capabilities
961
+
962
+ **Outputs**:
963
+
964
+ - Control inventory
965
+ - Threat-control mapping matrix
966
+ - Control effectiveness assessment
967
+ - Detection coverage gaps
968
+
969
+ ### Step 7: Analyze Risk
970
+
971
+ **Actions**:
972
+
973
+ - For each threat-vulnerability pair, estimate likelihood and impact
974
+ - Calculate risk scores (qualitative or quantitative)
975
+ - Prioritize risks
976
+ - Compare to organizational risk tolerance
977
+ - Consider risk interdependencies and cascading effects
978
+
979
+ **Outputs**:
980
+
981
+ - Risk register
982
+ - Risk heat map
983
+ - Prioritized risk list
984
+ - Risk acceptance recommendations
985
+
986
+ ### Step 8: Evaluate Detection and Response
987
+
988
+ **Actions**:
989
+
990
+ - Assess what malicious activities would be detected
991
+ - Evaluate MTTD (Mean Time to Detect) for various attack scenarios
992
+ - Review incident response plans and playbooks
993
+ - Assess incident response team capabilities
994
+ - Identify gaps in detection or response
995
+
996
+ **Outputs**:
997
+
998
+ - Detection coverage assessment
999
+ - MTTD estimates
1000
+ - IR capability assessment
1001
+ - Detection and response gaps
1002
+
1003
+ ### Step 9: Develop Remediation Recommendations
1004
+
1005
+ **Actions**:
1006
+
1007
+ - Propose mitigations for identified risks (preventive, detective, corrective)
1008
+ - Prioritize by risk reduction and implementation effort
1009
+ - Consider compensating controls where direct mitigation is impractical
1010
+ - Estimate costs and implementation timelines
1011
+ - Document risk acceptance for risks not mitigated
1012
+
1013
+ **Outputs**:
1014
+
1015
+ - Remediation roadmap
1016
+ - Prioritized recommendation list
1017
+ - Cost-benefit analysis
1018
+ - Risk acceptance documentation
1019
+
1020
+ ### Step 10: Consider Compliance Requirements
1021
+
1022
+ **Actions**:
1023
+
1024
+ - Identify applicable regulations and standards
1025
+ - Map controls to compliance requirements
1026
+ - Document evidence of compliance
1027
+ - Identify compliance gaps
1028
+ - Recommend actions to achieve or maintain compliance
1029
+
1030
+ **Outputs**:
1031
+
1032
+ - Compliance matrix
1033
+ - Gap analysis
1034
+ - Evidence documentation
1035
+ - Compliance remediation plan
1036
+
1037
+ ### Step 11: Synthesize and Report
1038
+
1039
+ **Actions**:
1040
+
1041
+ - Summarize key findings for different audiences (executives, technical teams, compliance)
1042
+ - Provide clear risk assessment and recommendations
1043
+ - Include metrics and KPIs
1044
+ - Document assumptions and limitations
1045
+ - Create action plan with owners and timelines
1046
+
1047
+ **Outputs**:
1048
+
1049
+ - Executive summary
1050
+ - Technical findings report
1051
+ - Remediation roadmap
1052
+ - Compliance summary
1053
+
1054
+ ---
1055
+
1056
+ ## Usage Examples
1057
+
1058
+ ### Example 1: Security Incident - Ransomware Attack
1059
+
1060
+ **Event**: Organization experiences ransomware attack; files encrypted, ransom note demands payment
1061
+
1062
+ **Analysis**:
1063
+
1064
+ **Step 1 - Scope and Context**:
1065
+
1066
+ - Affected systems: File servers, workstations, backups
1067
+ - Business impact: Operations halted, data unavailable
1068
+ - Critical: Understand ransomware variant, encryption scope, attacker access
1069
+
1070
+ **Step 2 - Assets**:
1071
+
1072
+ - Crown jewels: Customer database, financial records, intellectual property
1073
+ - Status: Files encrypted, availability compromised
1074
+
1075
+ **Step 3 - Attack Surface Analysis**:
1076
+
1077
+ - Initial access vector: Likely phishing email or vulnerable RDP endpoint
1078
+ - Lateral movement: SMB, credential theft
1079
+
1080
+ **Step 4 - Threat Modeling (Post-Incident)**:
1081
+
1082
+ - Threat actor: Likely cybercriminal group (financial motivation)
1083
+ - ATT&CK mapping:
1084
+ - Initial Access: Phishing or Exploit Public-Facing Application
1085
+ - Execution: User Execution or Exploitation for Client Execution
1086
+ - Persistence: Registry Run Keys, Scheduled Tasks
1087
+ - Privilege Escalation: Exploitation for Privilege Escalation
1088
+ - Credential Access: Credential Dumping
1089
+ - Lateral Movement: SMB/Windows Admin Shares
1090
+ - Impact: Data Encrypted for Impact
1091
+
1092
+ **Step 5 - Vulnerabilities**:
1093
+
1094
+ - Phishing susceptibility (no email filtering, insufficient user training)
1095
+ - Unpatched RDP vulnerabilities
1096
+ - Weak passwords or credential reuse
1097
+ - Inadequate network segmentation (ransomware spread easily)
1098
+ - Backup vulnerabilities (backups also encrypted)
1099
+
1100
+ **Step 6 - Control Assessment**:
1101
+
1102
+ - Missing: Email security gateway, EDR, MFA
1103
+ - Inadequate: Network segmentation, backup isolation, patch management
1104
+ - Failed: Antivirus didn't detect ransomware
1105
+
1106
+ **Step 7 - Risk Analysis**:
1107
+
1108
+ - Impact: HIGH (business disruption, data loss, ransom demand, reputation damage)
1109
+ - Likelihood: HIGH (demonstrated—incident occurred)
1110
+ - Residual risk: CRITICAL (without improvements, repeat likely)
1111
+
1112
+ **Step 8 - Detection and Response**:
1113
+
1114
+ - Detection: Failed until encryption began (no EDR, limited logging)
1115
+ - MTTD: Hours to days (too slow)
1116
+ - Response: No playbook, uncoordinated response
1117
+ - Gaps: No IR team, no communication plan, no legal/PR coordination
1118
+
1119
+ **Step 9 - Recommendations (Prioritized)**:
1120
+
1121
+ _Immediate (Hours to Days)_:
1122
+
1123
+ 1. Isolate affected systems (contain spread)
1124
+ 2. Identify ransomware variant and check for decryption tools
1125
+ 3. Engage incident response firm if no internal capability
1126
+ 4. Do NOT pay ransom immediately (assess alternatives first)
1127
+ 5. Notify legal, insurance, possibly law enforcement
1128
+
1129
+ _Short-term (Days to Weeks)_:
1130
+
1131
+ 1. Restore from backups if available and uncompromised
1132
+ 2. Deploy EDR on all endpoints
1133
+ 3. Implement MFA for all remote access
1134
+ 4. Conduct forensic investigation to determine root cause and scope
1135
+ 5. Develop and test IR playbook
1136
+
1137
+ _Medium-term (Weeks to Months)_:
1138
+
1139
+ 1. Network segmentation (prevent lateral movement)
1140
+ 2. Email security gateway (block phishing)
1141
+ 3. Privileged access management (limit credential theft)
1142
+ 4. Security awareness training (reduce phishing success)
1143
+ 5. Backup hardening (air-gapped or immutable backups)
1144
+
1145
+ _Long-term (Months to Year)_:
1146
+
1147
+ 1. Security maturity assessment and roadmap
1148
+ 2. 24/7 SOC or MDR service
1149
+ 3. Penetration testing and red team exercises
1150
+ 4. Comprehensive vulnerability management program
1151
+
1152
+ **Step 10 - Compliance**:
1153
+
1154
+ - Regulatory notification requirements (GDPR, state breach laws, etc.)
1155
+ - Cyber insurance claim
1156
+ - Document incident for auditors
1157
+
1158
+ **Step 11 - Synthesis**:
1159
+
1160
+ - Root cause: Combination of phishing/RDP exploit + inadequate detection + weak segmentation + backup vulnerabilities
1161
+ - Key lesson: Defense-in-depth failures—multiple control failures allowed attack to succeed
1162
+ - Priority: Immediate containment and recovery, then build detective and preventive controls
1163
+ - Cost: Ransom demand + downtime + recovery + remediation + reputation damage (potentially millions)
1164
+
1165
+ ### Example 2: Vulnerability Assessment - New Web Application Launch
1166
+
1167
+ **Event**: Organization planning to launch customer-facing web application; pre-launch security review requested
1168
+
1169
+ **Analysis**:
1170
+
1171
+ **Step 1 - Scope**:
1172
+
1173
+ - Application: E-commerce web application
1174
+ - Users: External customers
1175
+ - Data: PII, payment information, order history
1176
+ - Criticality: HIGH (revenue-generating, customer trust)
1177
+
1178
+ **Step 2 - Assets**:
1179
+
1180
+ - Customer PII and payment data (confidentiality, integrity critical)
1181
+ - Inventory and pricing data (integrity, availability critical)
1182
+ - Application availability (revenue impact)
1183
+
1184
+ **Step 3 - Attack Surface**:
1185
+
1186
+ - Web interface (public-facing)
1187
+ - APIs (mobile app, third-party integrations)
1188
+ - Admin portal (internal users)
1189
+ - Payment processor integration
1190
+ - Third-party libraries and dependencies
1191
+
1192
+ **Step 4 - Threat Modeling (STRIDE)**:
1193
+
1194
+ **Spoofing**:
1195
+
1196
+ - Threat: Attacker impersonates user or admin
1197
+ - Mitigations: Strong authentication, MFA, session management
1198
+
1199
+ **Tampering**:
1200
+
1201
+ - Threat: Attacker modifies prices, orders, or user data
1202
+ - Mitigations: Input validation, authorization checks, integrity controls
1203
+
1204
+ **Repudiation**:
1205
+
1206
+ - Threat: User denies placing order
1207
+ - Mitigations: Audit logging, transaction signing
1208
+
1209
+ **Information Disclosure**:
1210
+
1211
+ - Threat: Attacker accesses other users' PII or payment info
1212
+ - Mitigations: Authorization checks, encryption, secure session management
1213
+
1214
+ **Denial of Service**:
1215
+
1216
+ - Threat: Attacker overwhelms application
1217
+ - Mitigations: Rate limiting, DDoS protection, scalable infrastructure
1218
+
1219
+ **Elevation of Privilege**:
1220
+
1221
+ - Threat: User gains admin access
1222
+ - Mitigations: Least privilege, secure authorization, privilege separation
1223
+
1224
+ **Step 5 - Vulnerabilities (OWASP Top 10 Analysis)**:
1225
+
1226
+ 1. **Broken Access Control**: Check for IDOR vulnerabilities, horizontal/vertical privilege escalation
1227
+ 2. **Cryptographic Failures**: Verify encryption at rest and in transit, key management
1228
+ 3. **Injection**: Test for SQL injection, XSS, command injection
1229
+ 4. **Insecure Design**: Review for security design flaws, threat model gaps
1230
+ 5. **Security Misconfiguration**: Check for default credentials, unnecessary features, verbose errors
1231
+ 6. **Vulnerable Components**: Scan dependencies for known CVEs
1232
+ 7. **Authentication Failures**: Test password policy, session management, MFA
1233
+ 8. **Software/Data Integrity**: Verify supply chain security, unsigned updates
1234
+ 9. **Logging Failures**: Ensure security events logged, log tampering prevention
1235
+ 10. **SSRF**: Test for server-side request forgery vulnerabilities
1236
+
1237
+ **Step 6 - Control Assessment**:
1238
+
1239
+ _Positive Findings_:
1240
+
1241
+ - TLS 1.3 for all connections
1242
+ - Passwords hashed with bcrypt
1243
+ - Input validation framework in use
1244
+ - Dependency scanning in CI/CD
1245
+
1246
+ _Gaps Identified_:
1247
+
1248
+ - No MFA for customer accounts
1249
+ - Admin portal not on separate domain/network
1250
+ - Verbose error messages expose stack traces
1251
+ - No rate limiting on API endpoints
1252
+ - Some third-party dependencies have known CVEs
1253
+ - Insufficient authorization checks (IDOR vulnerabilities)
1254
+ - No Web Application Firewall (WAF)
1255
+
1256
+ **Step 7 - Risk Analysis**:
1257
+
1258
+ _Critical Risks_:
1259
+
1260
+ - **IDOR vulnerabilities**: HIGH likelihood, HIGH impact (data breach)
1261
+ - **Vulnerable dependencies**: MEDIUM likelihood, HIGH impact (RCE potential)
1262
+
1263
+ _High Risks_:
1264
+
1265
+ - **No rate limiting**: HIGH likelihood, MEDIUM impact (scraping, brute force)
1266
+ - **Admin portal on same domain**: LOW likelihood, HIGH impact (credential theft)
1267
+
1268
+ _Medium Risks_:
1269
+
1270
+ - **Verbose errors**: MEDIUM likelihood, MEDIUM impact (information disclosure)
1271
+ - **No MFA**: LOW likelihood (for now), HIGH impact (account takeover)
1272
+
1273
+ **Step 8 - Detection and Response**:
1274
+
1275
+ - Logging: Adequate for authentication and transactions
1276
+ - SIEM integration: Not yet configured
1277
+ - IR playbook: Generic, needs application-specific scenarios
1278
+ - Recommendation: Configure SIEM, create app-specific IR playbook, implement alerting for suspicious patterns
1279
+
1280
+ **Step 9 - Recommendations (Prioritized by Risk)**:
1281
+
1282
+ _Must-Fix Before Launch (Critical)_:
1283
+
1284
+ 1. Fix IDOR vulnerabilities (implement authorization checks)
1285
+ 2. Update vulnerable dependencies
1286
+ 3. Remove verbose error messages in production
1287
+ 4. Implement rate limiting on all endpoints
1288
+
1289
+ _Should-Fix Before Launch (High)_:
1290
+
1291
+ 1. Deploy WAF with OWASP Core Rule Set
1292
+ 2. Separate admin portal (different domain, VPN/IP restriction)
1293
+ 3. Configure SIEM integration and alerting
1294
+
1295
+ _Post-Launch (Medium)_:
1296
+
1297
+ 1. Implement MFA for customer accounts
1298
+ 2. Enhance logging (capture more security events)
1299
+ 3. Conduct penetration testing
1300
+ 4. Establish bug bounty program
1301
+
1302
+ **Step 10 - Compliance**:
1303
+
1304
+ - **PCI-DSS**: Required for payment card data (use tokenization, minimize cardholder data environment)
1305
+ - **GDPR/CCPA**: Customer data privacy requirements (consent, data minimization, breach notification)
1306
+ - **SOC 2**: If B2B customers require assurance
1307
+
1308
+ **Step 11 - Synthesis**:
1309
+
1310
+ - Application has solid foundation (modern crypto, input validation, dependency scanning)
1311
+ - Critical issues must be fixed before launch (IDOR, vulnerable dependencies)
1312
+ - WAF provides defense-in-depth for web threats
1313
+ - Post-launch: Continue testing, bug bounty, security monitoring
1314
+ - Go/No-Go: NO GO until critical issues resolved
1315
+
1316
+ ### Example 3: Security Architecture Review - Cloud Migration
1317
+
1318
+ **Event**: Organization planning to migrate on-premises applications to AWS; security architecture review requested
1319
+
1320
+ **Analysis**:
1321
+
1322
+ **Step 1 - Scope**:
1323
+
1324
+ - Migration: 50+ applications, mix of web apps, APIs, databases
1325
+ - Target: AWS (IaaS and PaaS services)
1326
+ - Timeline: 12-month migration
1327
+ - Criticality: Mixed (some business-critical applications)
1328
+
1329
+ **Step 2 - Assets**:
1330
+
1331
+ - Applications and data currently in controlled on-premises environment
1332
+ - Concerns: Data sovereignty, compliance, shared responsibility model
1333
+
1334
+ **Step 3 - Attack Surface Changes**:
1335
+
1336
+ - **Increases**: Internet-facing cloud services, cloud management interfaces, broader attack surface
1337
+ - **Decreases**: Physical access threats
1338
+ - **New**: Cloud misconfigurations, IAM vulnerabilities, API security
1339
+
1340
+ **Step 4 - Threat Modeling (Cloud-Specific)**:
1341
+
1342
+ _Cloud-Specific Threats_:
1343
+
1344
+ - Account compromise (stolen credentials, phishing)
1345
+ - Misconfigured storage buckets (public S3 buckets)
1346
+ - Overly permissive IAM policies
1347
+ - Insufficient network segmentation (VPC design)
1348
+ - Data exfiltration via cloud APIs
1349
+ - Insider threats (cloud admin abuse)
1350
+ - Supply chain (compromised cloud services or dependencies)
1351
+
1352
+ _MITRE ATT&CK for Cloud_:
1353
+
1354
+ - Initial Access: Valid accounts, exploit public-facing application
1355
+ - Persistence: Account manipulation, create IAM user
1356
+ - Privilege Escalation: IAM policy manipulation
1357
+ - Defense Evasion: Disable cloud logs
1358
+ - Credential Access: Unsecured credentials in code/config
1359
+ - Discovery: Cloud service discovery
1360
+ - Lateral Movement: Use alternate authentication material
1361
+ - Exfiltration: Transfer data to cloud account
1362
+
1363
+ **Step 5 - Vulnerabilities (Cloud Context)**:
1364
+
1365
+ - Lack of cloud security expertise
1366
+ - On-premises mindset (perimeter-focused, not zero-trust)
1367
+ - Unclear cloud IAM strategy
1368
+ - No cloud configuration management (IaC not used)
1369
+ - No cloud security posture management (CSPM)
1370
+
1371
+ **Step 6 - Control Assessment (Shared Responsibility Model)**:
1372
+
1373
+ _AWS Responsibilities_ (Security OF the Cloud):
1374
+
1375
+ - Physical security
1376
+ - Hypervisor security
1377
+ - Network infrastructure
1378
+
1379
+ _Customer Responsibilities_ (Security IN the Cloud):
1380
+
1381
+ - IAM and access control
1382
+ - Data encryption
1383
+ - Network configuration (VPCs, security groups)
1384
+ - Application security
1385
+ - Compliance
1386
+
1387
+ _Proposed Controls_:
1388
+
1389
+ **Identity and Access Management**:
1390
+
1391
+ - Implement AWS Organizations with SCPs (Service Control Policies)
1392
+ - Enforce MFA for all users
1393
+ - Use IAM roles, not long-term credentials
1394
+ - Principle of least privilege
1395
+ - Regular access reviews
1396
+
1397
+ **Network Security**:
1398
+
1399
+ - VPC design with public/private subnets
1400
+ - Security groups (stateful firewalls)
1401
+ - NACLs (stateless firewalls)
1402
+ - AWS WAF for web applications
1403
+ - VPC Flow Logs for monitoring
1404
+
1405
+ **Data Protection**:
1406
+
1407
+ - Encryption at rest (S3, EBS, RDS with KMS)
1408
+ - Encryption in transit (TLS)
1409
+ - S3 bucket policies (block public access)
1410
+ - Data classification and handling
1411
+
1412
+ **Monitoring and Detection**:
1413
+
1414
+ - AWS CloudTrail (API logging)
1415
+ - AWS GuardDuty (threat detection)
1416
+ - AWS Security Hub (aggregate findings)
1417
+ - AWS Config (configuration compliance)
1418
+ - SIEM integration
1419
+
1420
+ **Incident Response**:
1421
+
1422
+ - Cloud-specific IR playbooks
1423
+ - Automate response with Lambda
1424
+ - Snapshot and forensics procedures
1425
+ - AWS support engagement plan
1426
+
1427
+ **Compliance**:
1428
+
1429
+ - AWS Artifact (compliance reports)
1430
+ - AWS Config rules (continuous compliance)
1431
+ - Encryption for HIPAA/PCI-DSS
1432
+ - Data residency (region selection)
1433
+
1434
+ **Step 7 - Risk Analysis**:
1435
+
1436
+ _High Risks_:
1437
+
1438
+ - Misconfigured S3 buckets (likelihood: high, impact: high - data breach)
1439
+ - Compromised IAM credentials (likelihood: medium, impact: high)
1440
+ - Insufficient monitoring (likelihood: high, impact: medium - delayed detection)
1441
+
1442
+ _Medium Risks_:
1443
+
1444
+ - Inadequate network segmentation (likelihood: medium, impact: medium)
1445
+ - Lack of cloud expertise (likelihood: high, impact: medium - misconfigurations)
1446
+
1447
+ **Step 8 - Detection and Response**:
1448
+
1449
+ - Deploy GuardDuty in all regions and accounts
1450
+ - Centralize CloudTrail logs
1451
+ - Configure Security Hub and Config
1452
+ - Create cloud-specific alerts (unusual API calls, IAM changes, public S3 buckets)
1453
+ - Develop cloud incident response playbooks
1454
+
1455
+ **Step 9 - Recommendations (Cloud Migration Security Roadmap)**:
1456
+
1457
+ _Pre-Migration (Month 1-2)_:
1458
+
1459
+ 1. Cloud security training for teams
1460
+ 2. Design AWS Organizations structure and account strategy
1461
+ 3. Define IAM strategy and policies
1462
+ 4. Design VPC architecture and network segmentation
1463
+ 5. Select and implement CSPM tool
1464
+ 6. Establish cloud security baseline (CIS AWS Foundations Benchmark)
1465
+
1466
+ _During Migration (Month 3-12)_:
1467
+
1468
+ 1. Use Infrastructure as Code (Terraform/CloudFormation) for all resources
1469
+ 2. Automate security checks in CI/CD (SAST, DAST, IaC scanning)
1470
+ 3. Enforce encryption at rest and in transit
1471
+ 4. Implement least privilege IAM
1472
+ 5. Enable all cloud-native security services (GuardDuty, Security Hub, Config, CloudTrail)
1473
+ 6. Security testing before production deployment
1474
+
1475
+ _Post-Migration (Ongoing)_:
1476
+
1477
+ 1. Continuous compliance monitoring
1478
+ 2. Regular IAM access reviews
1479
+ 3. Cloud security posture assessments
1480
+ 4. Penetration testing in cloud environment
1481
+ 5. Tabletop exercises for cloud IR scenarios
1482
+
1483
+ **Step 10 - Compliance**:
1484
+
1485
+ - Leverage AWS compliance certifications (SOC 2, ISO 27001, PCI-DSS)
1486
+ - Use AWS Artifact for audit evidence
1487
+ - Implement AWS Config rules for continuous compliance
1488
+ - Document shared responsibility matrix
1489
+
1490
+ **Step 11 - Synthesis**:
1491
+
1492
+ - Cloud security requires different mindset (zero-trust, identity-centric, API-driven)
1493
+ - Shared responsibility model is critical—must secure what AWS doesn't
1494
+ - Major risks: Misconfigurations, IAM vulnerabilities, insufficient monitoring
1495
+ - Opportunities: Cloud-native security services, automation, scalability
1496
+ - Success factors: Training, least privilege, defense-in-depth, monitoring, IaC
1497
+ - Recommendation: Proceed with migration, but implement security roadmap in parallel
1498
+
1499
+ ---
1500
+
1501
+ ## Reference Materials (Expandable)
1502
+
1503
+ ### Essential Organizations and Resources
1504
+
1505
+ #### NIST (National Institute of Standards and Technology)
1506
+
1507
+ - **Cybersecurity Framework**: https://www.nist.gov/cyberframework
1508
+ - **SP 800 Series**: Security and privacy controls, risk management
1509
+ - **National Vulnerability Database (NVD)**: https://nvd.nist.gov/
1510
+
1511
+ #### CISA (Cybersecurity and Infrastructure Security Agency)
1512
+
1513
+ - **Alerts and Advisories**: https://www.cisa.gov/topics/cyber-threats-and-advisories
1514
+ - **Known Exploited Vulnerabilities Catalog**: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
1515
+ - **Resources**: Free tools, training, best practices
1516
+
1517
+ #### MITRE
1518
+
1519
+ - **ATT&CK Framework**: https://attack.mitre.org/
1520
+ - **CVE Program**: https://www.cve.org/
1521
+ - **CAPEC**: Common Attack Pattern Enumeration and Classification
1522
+
1523
+ #### OWASP (Open Web Application Security Project)
1524
+
1525
+ - **Top 10**: https://owasp.org/www-project-top-ten/
1526
+ - **Testing Guide**: https://owasp.org/www-project-web-security-testing-guide/
1527
+ - **Cheat Sheets**: https://cheatsheetseries.owasp.org/
1528
+
1529
+ #### SANS Institute
1530
+
1531
+ - **Internet Storm Center**: https://isc.sans.edu/
1532
+ - **Reading Room**: Thousands of security papers
1533
+ - **Critical Security Controls**: https://www.cisecurity.org/controls
1534
+
1535
+ ### Key Standards and Frameworks
1536
+
1537
+ **ISO/IEC 27001**: Information Security Management System
1538
+ **ISO/IEC 27002**: Information Security Controls
1539
+ **PCI-DSS**: Payment Card Industry Data Security Standard
1540
+ **HIPAA**: Health Insurance Portability and Accountability Act (Security Rule)
1541
+ **SOC 2**: Service Organization Control 2 (Trust Services Criteria)
1542
+ **GDPR**: General Data Protection Regulation
1543
+ **NIST SP 800-53**: Security and Privacy Controls
1544
+ **CIS Controls**: Center for Internet Security Critical Security Controls
1545
+ **FedRAMP**: Federal Risk and Authorization Management Program
1546
+
1547
+ ### Vulnerability Databases
1548
+
1549
+ - **National Vulnerability Database (NVD)**: https://nvd.nist.gov/
1550
+ - **CVE**: https://www.cve.org/
1551
+ - **Exploit-DB**: https://www.exploit-db.com/
1552
+ - **VulnDB**: https://vulndb.cyberriskanalytics.com/
1553
+
1554
+ ### Threat Intelligence Sources
1555
+
1556
+ - **CISA Alerts**: https://www.cisa.gov/news-events/cybersecurity-advisories
1557
+ - **US-CERT**: https://www.cisa.gov/uscert
1558
+ - **Threat Intelligence Platforms**: Recorded Future, Mandiant, CrowdStrike
1559
+ - **Open Source**: AlienVault OTX, MISP, threat feeds
1560
+
1561
+ ### Security Tools and Platforms
1562
+
1563
+ **Vulnerability Scanning**: Nessus, Qualys, Rapid7 InsightVM
1564
+ **SAST**: SonarQube, Checkmarx, Veracode
1565
+ **DAST**: Burp Suite, OWASP ZAP, Acunetix
1566
+ **SIEM**: Splunk, Elastic, Sentinel, Chronicle
1567
+ **EDR**: CrowdStrike, SentinelOne, Microsoft Defender for Endpoint
1568
+ **CSPM**: Prisma Cloud, Wiz, Orca Security
1569
+
1570
+ ### Certifications
1571
+
1572
+ - **CISSP**: Certified Information Systems Security Professional
1573
+ - **CISM**: Certified Information Security Manager
1574
+ - **CEH**: Certified Ethical Hacker
1575
+ - **OSCP**: Offensive Security Certified Professional
1576
+ - **GCIH**: GIAC Certified Incident Handler
1577
+ - **Security+**: CompTIA Security+
1578
+
1579
+ ### Communities and Resources
1580
+
1581
+ - **r/netsec**: https://www.reddit.com/r/netsec/
1582
+ - **Krebs on Security**: https://krebsonsecurity.com/
1583
+ - **Schneier on Security**: https://www.schneier.com/
1584
+ - **Dark Reading**: https://www.darkreading.com/
1585
+ - **The Hacker News**: https://thehackernews.com/
1586
+
1587
+ ---
1588
+
1589
+ ## Verification Checklist
1590
+
1591
+ After completing cybersecurity analysis:
1592
+
1593
+ - [ ] Identified all critical assets and data
1594
+ - [ ] Analyzed attack surface and entry points
1595
+ - [ ] Conducted threat modeling appropriate to scope
1596
+ - [ ] Identified vulnerabilities and assessed severity
1597
+ - [ ] Evaluated existing security controls for effectiveness
1598
+ - [ ] Analyzed risk using quantitative or qualitative methods
1599
+ - [ ] Assessed detection and response capabilities
1600
+ - [ ] Developed prioritized remediation recommendations
1601
+ - [ ] Considered compliance requirements
1602
+ - [ ] Mapped threats to MITRE ATT&CK framework (if applicable)
1603
+ - [ ] Applied defense-in-depth and zero-trust principles
1604
+ - [ ] Provided clear, actionable security guidance
1605
+ - [ ] Used security terminology and frameworks precisely
1606
+
1607
+ ---
1608
+
1609
+ ## Common Pitfalls to Avoid
1610
+
1611
+ **Pitfall 1: Checklist Compliance Without Risk Context**
1612
+
1613
+ - **Problem**: Following compliance requirements without understanding actual risks
1614
+ - **Solution**: Risk-based approach—understand threats and business context, not just checkboxes
1615
+
1616
+ **Pitfall 2: Perimeter-Only Security**
1617
+
1618
+ - **Problem**: Assuming network perimeter protects everything inside
1619
+ - **Solution**: Defense-in-depth and zero-trust—assume breach, protect assets themselves
1620
+
1621
+ **Pitfall 3: Alert Fatigue and False Positives**
1622
+
1623
+ - **Problem**: Too many low-quality alerts overwhelm responders
1624
+ - **Solution**: Tune detections, prioritize high-fidelity alerts, automate response where possible
1625
+
1626
+ **Pitfall 4: Ignoring Human Element**
1627
+
1628
+ - **Problem**: Focus only on technical controls, ignore social engineering and insider threats
1629
+ - **Solution**: Include security awareness, privileged user monitoring, insider threat programs
1630
+
1631
+ **Pitfall 5: Point-in-Time Assessment**
1632
+
1633
+ - **Problem**: One-time security review without continuous monitoring
1634
+ - **Solution**: Continuous security—ongoing monitoring, vulnerability management, threat intelligence
1635
+
1636
+ **Pitfall 6: Vulnerability Scoring Without Context**
1637
+
1638
+ - **Problem**: Prioritizing by CVSS alone without considering exploitability or business context
1639
+ - **Solution**: Risk-based prioritization—consider threat intelligence, exploitability, asset criticality
1640
+
1641
+ **Pitfall 7: Security as Blocker**
1642
+
1643
+ - **Problem**: Security seen as obstacle to business objectives
1644
+ - **Solution**: Enable business securely—balance risk and business value, provide secure alternatives
1645
+
1646
+ **Pitfall 8: Ignoring Supply Chain and Third Parties**
1647
+
1648
+ - **Problem**: Focus only on first-party systems, ignore dependencies
1649
+ - **Solution**: Supply chain risk management—assess third-party security, dependency vulnerabilities
1650
+
1651
+ ---
1652
+
1653
+ ## Success Criteria
1654
+
1655
+ A quality cybersecurity analysis:
1656
+
1657
+ - [ ] Applies appropriate security frameworks and methodologies
1658
+ - [ ] Identifies and prioritizes risks using threat modeling
1659
+ - [ ] Evaluates security controls across multiple layers (defense-in-depth)
1660
+ - [ ] Provides actionable, prioritized remediation recommendations
1661
+ - [ ] Grounds analysis in threat intelligence and industry best practices
1662
+ - [ ] Considers both technical and human factors
1663
+ - [ ] Addresses detection and response, not just prevention
1664
+ - [ ] Maps to recognized standards (MITRE ATT&CK, NIST CSF, etc.)
1665
+ - [ ] Balances security with business objectives
1666
+ - [ ] Demonstrates deep security expertise and critical thinking
1667
+ - [ ] Communicates clearly to both technical and non-technical audiences
1668
+ - [ ] Uses security concepts and terminology precisely
1669
+
1670
+ ---
1671
+
1672
+ ## Integration with Other Analysts
1673
+
1674
+ Cybersecurity analysis complements other perspectives:
1675
+
1676
+ - **Computer Scientist**: Deep technical understanding of systems and code
1677
+ - **Lawyer**: Legal implications of breaches, regulatory compliance requirements
1678
+ - **Economist**: Cost-benefit analysis of security investments, cyber insurance
1679
+ - **Psychologist**: Human behavior, social engineering, security culture
1680
+ - **Political Scientist**: Nation-state threats, geopolitical cyber conflict, policy
1681
+
1682
+ Cybersecurity is particularly strong on:
1683
+
1684
+ - Threat modeling and risk assessment
1685
+ - Vulnerability analysis
1686
+ - Defense-in-depth design
1687
+ - Incident detection and response
1688
+ - Compliance and standards
1689
+
1690
+ ---
1691
+
1692
+ ## Continuous Improvement
1693
+
1694
+ This skill evolves through:
1695
+
1696
+ - New threat actor TTPs and attack techniques
1697
+ - Emerging vulnerabilities and exploits
1698
+ - Evolution of security technologies and practices
1699
+ - Lessons learned from security incidents
1700
+ - Updates to frameworks and standards
1701
+ - Cross-disciplinary security research
1702
+
1703
+ ---
1704
+
1705
+ **Skill Status**: Complete - Comprehensive Cybersecurity Analysis Capability
1706
+ **Quality Level**: High - Enterprise-grade security analysis with modern frameworks
1707
+ **Token Count**: ~8,500 words (target 6-10K tokens)