Skip to content

Latest commit

 

History

History
160 lines (117 loc) · 8.73 KB

SCENARIOS.md

File metadata and controls

160 lines (117 loc) · 8.73 KB

Example scenarios for an organization 🤷

The following are scenarios to support a simple approach to risk found here. This is not a checklist. This is a reference to assist someone crafting scenarios to model the risks they would like to measure.

These can be modified as much as needed to make sense for a specific organization.

Risk scenarios are hierarchal, like a fault tree. High level risks break down into more specific events that initiate them.

┌──────────────┐                              
│Customer data │                              
│  breached.   │                              
└──────────────┘                              
        │                                     
        │                                     
        ▼                                     
┌──────────────┐                              
│We exposed S3 │                              
│    Bucket    │                              
└──────────────┘                              
        │                                     
        ├─────────────────┬──────────────┐    
        ▼                 ▼              ▼    
┌──────────────┐  ┌───────────────┐  ┌───────┐
│Policy changed│  │  Partner AWS  │  │   ?   │
│  in console  │  │    breach     │  │       │
└──────────────┘  └───────────────┘  └───────┘

Scenarios are variable based on how specific they are and the area they must address. Top level risks set by leadership are usually broad and non-specific scenarios, whereas scenarios managed by a CISO are scoped to technical scenarios, and scenarios approached by individually contributing engineers are far more specific. Engineering efforts that focus on these scenarios will influence the probabilities of higher level scenarios occurring.

All builders and breakers in cybersecurity are manipulating the uncertainties involved with scenarios. They are either reducing the likelihood of a scenario occurring, better understanding the likelihood of them occurring, or understanding how an attacker views these likelihoods differently than yourself.

This is an example of decomposing risk.

Shared scenarios have the opportunity for shared discussion. While these scenarios share a likelihood of being relevant to many organizations, they do not necessarily represent the most important risks your organization should be prioritizing. However, information shared regarding these scenarios could be invaluable in prioritizing your risks.

1. Top level Risks

Broad, strategic risks typically expressed by a board or C-Suite when asked by a security team. These may not be measured often, but will set high level vision for a security organization.

  • A trust issue has threatened investors (We don't want to hurt stock price)
  • A trust issue has created a press event. (Keep us out of the press)
  • A trust issue has begun a regulatory / legal event. (We don't want to get sued)
  • A trust issue has created a loss in customer activity. (We want to keep customers happy)
  • A trust issue is exacerbated due to a poorly handled response. (We should never be caught off guard)
  • An executive is removed do to a mishandled trust issue. (I want to keep my job)

Leadership may call out far more specific risks, and that is OK. ("A warehouse is offline")

2. Scenarios that influence these risks

Risks can be decomposed from top level risks voiced by leadership. These would calibrate a team toward specific issues. Here is an example:

  • A trust issue has created a loss in customer activity.
    • Our application was exploited and customer data was exposed.
      • An IDOR was discovered by an adversary and exploited.
      • An RCE was discovered by an adversary and exploited.
      • Our application retrieved objects from the wrong customer's S3 bucket when exporting data.

3. Tasks that influence these risks

With target risks in mind, a team can pursue OKRs to influence the likelihood of information security scenarios occurring. This is well covered in better OKR's. This approach heavily relies on forecasting.


Reference Scenarios

Common scenario modifiers

These are typical additions to help prioritize the most relevant scenarios. They are not typically scenarios themselves, but help focus mitigation efforts to the highest priority problems.

Some scenarios are only important if they are capable of trigger an incident of a certain severity.

A P0 incident has involved...

A P0 incident has involved an employee who was not off-boarded correctly.

A P0 incident has resulted because an attacker bypassed rate limiting.

Some bugs might not meet a specific "severity" classification but end up leveraged criminally anyways.

...was exploited "in the wild"

An RCE discovered in our software was exploited "in the wild".

An exploit targeting the configuration of web server we host has been observed in the wild.

The publicity involved with a scenario may be the goal of reduction efforts.

The press has disclosed...

An employee has leaked confidential data which the press has disclosed.

We have botched a vulnerability disclosure and the press has disclosed it before we could issue a fix.

A time based scope is always included. Using consistent scopes or calendar based scopes improves everyone's ability to forecast comparable scenarios. "Next Month", "Next Year", "Next Quarter" are all typical.

IT Management Scenarios 📠

Scenarios that are typically of concern to an IT organization.

  • An employee's email has been accessed by an outsider.
  • We have opened an incident to deal with a vendor compromise.
  • Employee communications were compromised.
  • Internal documentation has been exposed to, and indexed by, a search engine.
  • Removable storage containing sensitive data has been lost.
  • An employee laptop has been stolen and was not encrypted.
  • A social engineer has received sensitive documents / data.
  • An employee was not off-boarded correctly.

Employee Scenarios 🧟

Scenarios that involve a "bad employee".

  • An employee has decided to abuse their authorization.
  • An employee is violating the social media policy.
  • An employee is harming another employee.
  • An employee has decided to violate security policy.
  • An employee has harmed the organization with access retained after termination.

AWS Risks ☁️

Scenarios typically involving cloud infrastructure.

  • An IAM secret key has exposed to the internet.
  • An S3 bucket has exposed to the internet.
  • Security groups and ACL's have exposed a high risk server.
  • An adversary has gained access to our AWS account.
  • CloudTrail logs have been deleted or modified.

Endpoint Risks 💻

Typical risks to desktops / laptops.

  • An adversary has implanted malware on an endpoint.
  • Endpoint malware is remotely beaconing to a C2.
  • An adversary has moved laterally in the environment.
  • An adversary has exploited unpatched software on an endpoint.
  • An adversary has elevated privilege on an endpoint.

Application Security Scenarios 📱🌐

Risks involving a product or application being developed by an organization.

  • An adversary has remotely executed code through our application.
  • An adversary has bypassed our rate limiting capability.
  • An adversary has queried our database directly through our application.
  • An adversary has exploited an indirect object reference vulnerability.
  • An XSS vulnerability has been used against another user on our application.
  • A research finding has gone outside of our disclosure process.
  • Payment instruments are exposed to an adversary.
  • Credentials are exposed to an adversary.

Incident Response Scenarios 🚒

Meta-Incidents created by poor incident handling.

  • An incident has sustained for more than two days.
  • We are unable to discover root cause in an incident.
  • We have not been able to comment publicly within our communications SLA.

Physical Security Scenarios 🔫

Physical harm and physical loss.

  • A celebrity employee is harassed in person
  • An employee is involved in violence on company space (real estate or event)
  • Company property over $X has been lost.
  • An unauthorized individual has accessed our facility.
  • An executive is threatened while traveling.
  • An incident was not captured our cameras.