Lunajesus Luigicasestudyanswers
Lunajesus Luigicasestudyanswers
Clearly state all of the issues that need to be addressed at Luigi's. (How did the attack occur?)
(Please use bullets or numbers.)
- Employee brought in personal laptop
- Able to connect not authorized computer to internet
- Attacker being able to connect to the system and scan local network
- User leaving computer on during the weekend
- Not reporting that computer was suspiciously slow
- FTP Service that allowed for anonymous access
- Attacker was able to sensitive data without credentials
- Out of date list of known malicious sites
- Sensitive information on the server was not encrypted or secured
Which CIS Controls v8 could have helped to prevent the attack that is detailed in the case
study? (Please use bullets or numbers.) Why is the Control important? (Answer this for each
control listed in #2, 25 word minimum). Be thorough in your response.
- Control 01 Inventory and Control of Enterprise assets
o This is an important control because the company should have been able to
prevent sensitive document from getting stolen. The information stolen was left
out in the open for an attacker to simply take it. There was no measure of
security regarding that information. Likewise, they should have had a policy that
would restrict non-authorized computers from connecting to their network.
- Control 03 Data Protection
o This control would’ve helped Luigi Inc with their data management. The amount
of sensitive data that was taken was absurd and the information did not have
any security measures that prevented it from being accessed by anyone without
authorization. This control would help in making regulations for data protection,
and how data should be stored and encrypted if necessary.
- Control 05 Account Management
o This control would help in discerning what accounts have access to what
information. It would require that users provide credentials before being able to
access certain parts of the network to ensure it was really them. It would restrict
normal users from accessing sensitive information or information that does not
pertain to their job code.
- Control 06 Access Control Management
o Similar to control 05, however this control deal with what these accounts have
access to. This control ensures that users only have they need to do their jobs
and nothing more. Having a good policy to enforce this is important not just for
Luigi Inc but for many other organizations as it would have limited what
information the attacker had access to.
- Control 07 Continuous Vulnerability Management
o This control is perhaps in the top three controls that would have stopped this
attack from ever happening. If the company had this control in place and did
vulnerability management, they could have picked up that the FTP service was
Luna Assignment 3.6 Case Study CYB469-O 01
not secure and allowed for anonymous connection. Which could have been
removed or patched.
- Control 09 Email and Web Browser Protections
o This control was mainly for the browser portion of it. The attacker was able to
use a malicious website that was not on the list of malicious browsers and thus
was not blocked by the network. Had it been updated the attacker would have
had to result to another browser or different method to extract the data.
- Control 10 Malware Defense
o Having a good antivirus or other malware defense in place would help not only in
this case but in other situations. Being able to prevent viruses on a network is a
great way to protect a network as well as being able to detect these viruses as
they arise and deal with them accordingly.
- Control 12 Network Infrastructure Management
o This particular control was a bit of toss-up if I’m being honest. However ultimate
I decided that if the network infrastructure is up to date then it means that
everything is working in tangent with one another and secured. Ensure that the
network infrastructure is up to date means that everything patched accordingly,
everything is updated to the latest version and working smoothly.
- Control 13 Network Monitoring and Defense
o This control, if it was in place, would promote for constant monitoring and
having alerts in place for when an intruder is detected. Although the company
was able to identify the source of the attack, nothing could be done to stop the
attacker from stealing the information.
- Control 14 Security Awareness and Skills Training
o This one is a given since training is always beneficial. It should be obvious to
anyone that bringing a personal device that is not approved by the company and
using it for work is a security risk. If the employee had the proper training then
they too would have known this and not brough in their own computer for
working on it.
- Control 18 Penetration Testing
o I debated adding this control in because it was struggling to understand whether
it would have truly helped them find the FTP vulnerability that was exploited. I
concluded that if they had done a pentest on their external system they could
have found that vulnerability and exploited it in the same way as the attacker
did. Not only would they have found the FTP vulnerability they could also find a
slew of other vulnerabilities as well.
List the Safeguards for each of the Controls that are listed in question 2, that should have been
implemented to prevent the attack. (Please use bullets or numbers.) Why are the Safeguards
important? (Answer this for each safeguard listed in #3, 25 word minimum). Be thorough in
your response.
▪ This safeguard is necessary since it would help the company known what
is in their inventory and what assets are a top priority for protecting. It
ensures that their inventory is kept up-to-date and keep record of all
devices that have been allowed on the network. Inventory would include
assets connected the network physically, virtually, remotely, and even
those in the cloud.
o 1.2 Address Unauthorized Assets
▪ This safeguard could have prevented the attacked from the beginning. If
this had been in place the compromised computer would not have been
allowed to connect to the network. Thus thwarting the attackers plan.
o 1.3 Utilize an Active Discovery Tool
▪ Having this safeguard in place would help the organization keep track of
what devices are connecting to the network and know which have
authorization and which do not.
- Control 03 Data Protection
o 3.1 Establish and Maintain a Data Management Process
▪ Establishing a Data Management Process is crucial to any business. The
process would address how to deal with sensitive data, data owner, how
long the data can be stored for and how to protect data. The document
would need to get updated annually to keep current or when a significant
event happens.
o 3.2 Establish and Maintain a Data Inventory
▪ This safeguard will help in knowing how much information is being stored
and what way it would be best to store it. It would be based on the
company’s needs and how sensitive the information is to the company.
o 3.3 Configure Data Access Control Lists
▪ This is an incredibly crucial safeguard because it would help with limiting
what the users can access. It configures the controls to a need-to-know
basis, meaning the user can only access what they need to complete their
job. Nothing more, noting less.
o 3.4 Enforce Data Retention
▪ This safeguard is implemented to help with compliance and not storing
information pass their legal limit. Once information becomes obsolete or
reached its minimum or maximum legal retention period it should be
disposed of properly. It was now known what information was stolen
from Luigi Inc’s servers but if any information that was stolen met the
disposal requirements, it could have been prevented.
o 3.5 Security Dispose of Data
▪ This safeguard goes hand in hand with 3.4; once data reaches its
minimum or maximum retention period it should be securely disposed of.
This keeps personal information safe as well as sensitive company
information should be held onto indefinitely.
o 3.6 Encrypt Data on End-User Devices
Luna Assignment 3.6 Case Study CYB469-O 01
▪ This safeguard is being put into place to help keep the admins safe when
browsing on the internet. Limiting them only to certain aspects and not
giving them free reign also though restrictive is extremely important for
security.
- Control 06 Access Control Management
o 6.1 Establish an Access Granting Process
▪ This safeguard would help in creating a process in which new users or
hires would get certain rights without needed to ask for them. Likewise, it
could also be used for when an employee receives a promotion, and the
new job code requires extra rights or different rights.
o 6.5 Require MFA for Administrative Access
▪ Since a lot of the information that was stolen should have been kept
protected and should require administrative credentials to get a hold of
we will be using this safeguard. This Safe not only requires credentials but
also another sort of credential to grant access to anything that requires
administrative access.
o 6.6 Establish and Maintain Inventory of Authentication and Authorization
Systems
▪ The company should have some sort of process that is able to keep track
of everything that requires authentication and authorization to access.
Inventory should be updated every time a new item that requires
authentication or authorization is added. Had this been added, it would
be clear for what information the attacker was gunning for and how they
would need to response to the attack.
- Control 07 Continuous Vulnerability Management
o 7.1 Establish and Maintain a Vulnerability Magnanimity Process
▪ Having this in place would help the IT Sec team accountable for ensuring
vulnerability management takes place. This process should often be
looked over and reviewed annually or when something important
happens.
o 7.3 Perform Automated Operating System Patch Management
▪ Create a process in which the OS will automatically update itself once a
month or more frequently depending on the environment. Doing this
ensures that the OS is kept to date and patches vulnerabilities not dealt
in a pervious patch.
o 7.5 Perform Automated Vulnerability Scans of Internal Enterprise Assets
▪ This would help in ensuring that no assets have present vulnerabilities or
that if they do, they are dealt with accordingly. This would ensure that
any vulnerabilities present are dealt with as soon as they are discovered
and do not have time to affect other assets. This process should take
place on a frequent basis and whenever another asset is introduced.
o 7.7 Remediate Detected Vulnerabilities
▪ Having this safeguard in place would potentially dealt with the vulnerable
FTP process and fixed it as soon as it found it. This safeguard would help
Luna Assignment 3.6 Case Study CYB469-O 01
▪ This safeguard encompasses all of the other safeguards for this control.
This safeguard would help in creating a program for all employees in
which they would be educated in how to best to interact with company
assets in the safest way possible. The program would say how often
employees need to be trained and updated based on new information as
it becomes available.
o 14.9 Conduct Role-Specific Security and Awareness Skills Training
▪ This a great safeguard since not all positions require the same security.
Higher positions will require the most training since they will be dealing
with more sensitive information and will need be educated properly on
what needs to be protected and how best to interact with their job
specific assets.
- Control 18 Penetration Testing
o 18.1 Establish and Maintain a Penetration Testing Program
▪ This safeguard is being put into a place to maintain accountability for
upkeeping of the pentest program. This would help the company
organize a pentest that is appropriate to their level and needs.
o 18.2 Perform Periodic External Penetration Tests
▪ This is perhaps the best way that the FTP vulnerability could have been
spotted. An External Pen Test focuses on vulnerabilities within internet
facing assets like the web, emails and of course FTP Servers. Having a
safeguard to help with performing these tests, it is reasonable to assume
that any internet facing assets with vulnerabilities would be dealt with
accordingly.