\newline Logo
Left arrow icon.
Go to Previous Chapter
Go to Previous Chapter
SECTION 14Leveraging Security Frameworks & Questionnaires
Course Thumbnail of Security from Zero.Security from Zero
  • CHAPTER 1
    Workload Management: Issue tracking
    • SECTION 1.1Keep a List
    • SECTION 1.2File a Ticket
    • SECTION 1.3Managing tickets
    • SECTION 1.4Ranking Issues
    • SECTION 1.5Removing Obstacles
    • SECTION 1.6Master list
    • SECTION 1.7For your eyes only
  • CHAPTER 2
    Threat Modeling Exercises
    • SECTION 2.1Lightweight vs Heavyweight
    • SECTION 2.2A Lightweight Approach
    • SECTION 2.3Frequency
    • SECTION 2.4Other Threat Modeling Methodologies and Techniques
  • CHAPTER 3
    Introduction
    • SECTION 3.1What is Security?
    • SECTION 3.2Future-proof Security
  • CHAPTER 4
    Planning Your Security Budget
    • SECTION 4.1First Year
    • SECTION 4.2Example Budget Exercise
    • SECTION 4.3Anticipating Growth
  • CHAPTER 5
    Tracking Vulnerabilities
    • SECTION 5.1CVE: Common Vulnerabilities and Exposures
    • SECTION 5.2Part of Your Workflow
    • SECTION 5.3Automate the Boring Stuff
  • CHAPTER 6
    Goals of this Book
    • SECTION 6.1Have No Fear, Everything Can Be Fixed
  • CHAPTER 7
    Effective Bug Bounty Programs
    • SECTION 7.1What is a Bug Bounty Program?
    • SECTION 7.2The Most Common Mistake
    • SECTION 7.3What are the benefits of a Bug Bounty Program?
    • SECTION 7.4What makes a Bug Bounty Program successful?
    • SECTION 7.5Competitor Comparison
    • SECTION 7.6Comparison of Bug Bounty Service Providers
    • SECTION 7.7Financial Analysis
    • SECTION 7.8Program Scope
    • SECTION 7.9Workflow Best Practices
    • SECTION 7.10Additional Advice
  • CHAPTER 8
    Kickstarting Your Security Program
    • SECTION 8.1When to Start Thinking About Security
    • SECTION 8.2Understanding and Identifying Risk
    • SECTION 8.3The stage of your company
    • SECTION 8.4Your Industry
    • SECTION 8.5Your Competition
    • SECTION 8.6Resources Available
    • SECTION 8.7Getting Buy-In and Support from Leadership
  • CHAPTER 9
    The Importance of Security Culture
    • SECTION 9.1Practices of a Healthy Security Culture
    • SECTION 9.2Fostering a Culture of Security
    • SECTION 9.3Simple Steps You Can Take Today
  • CHAPTER 10
    Responding to Incidents
    • SECTION 10.1Elementary Schools Have Better Incident Response Than Your Company
    • SECTION 10.2What is Incident Response?
    • SECTION 10.3Goals
    • SECTION 10.4Non-Goals
    • SECTION 10.5Improvement Through Reflection with Post-Mortems
    • SECTION 10.6Practice, Practice, Practice
    • SECTION 10.7Continuously Adapt and Improve
    • SECTION 10.8Helpful Tips
  • CHAPTER 11
    Prioritizing the Work: Effort vs Impact
    • SECTION 11.1Level of Effort vs Level of Impact
    • SECTION 11.2Borrowing The Fibonacci Scale from Agile
    • SECTION 11.3Urgency and Importance: The Eisenhower Matrix
    • SECTION 11.4Turning off Easy Mode
  • CHAPTER 12
    Least Privilege & Access Controls
    • SECTION 12.1Practicing the Principle of Least Privilege
    • SECTION 12.2Onboarding & Offboarding
    • SECTION 12.3Trust but Verify with Regular Reviews
    • SECTION 12.4Keep it Simple with Identity Management Software
    • SECTION 12.5Limiting Access with a VPN
    • SECTION 12.6Layered Security with Multi-Factor Authentication
  • CHAPTER 13
    Conclusion
    • CHAPTER 14
      Leveraging Security Frameworks & Questionnaires
      • CHAPTER 15
        Changelog
        • SECTION 15.1Revision 7 (2020-04-17)
        • SECTION 15.2Revision 6 (2020-04-14)
        • SECTION 15.3Revision 5 (2020-04-10)
      • CHAPTER 16
        Your Data-Driven Security Program
        • SECTION 16.1Choosing and Collecting the Right Data
        • SECTION 16.2Metrics Aren't Goals
        • SECTION 16.3Making Data-Driven Decisions
        • SECTION 16.4Making Your Data Presentable
      • CHAPTER 17
        Your First Security Hire
        • SECTION 17.1The Skillset You're Looking For
        • SECTION 17.2Relevant Experience
        • SECTION 17.3Setting Them Up For Success
      • CHAPTER 18
        Monitoring & Alerting
        • SECTION 18.1Smoke Alarms Detect Smoke, Not Fire
        • SECTION 18.2Logging: Your Software's Paper Trail
        • SECTION 18.3Monitoring for Events and Anomalies
        • SECTION 18.4Event-Based Alerting
        • SECTION 18.5Modern Infrastructure: Centralized Monitoring for Decentralized Systems
        • SECTION 18.6Admin Interfaces & Audit Logs
      • CHAPTER 19
        Appendix
        • SECTION 19.1Responding to Incidents
        • SECTION 19.2Threat Modeling Exercises
        • SECTION 19.3Effective Bug Bounty Programs
        • SECTION 19.4Least Privilege & Access Control
        • SECTION 19.5Monitoring & Alerting
      • CHAPTER 20
        Regulation and Compliance
        • SECTION 20.1Lessons from Security Frameworks
        • SECTION 20.2Keeping Up With New Rules
        • SECTION 20.3The Business Case
        • SECTION 20.4Ensuring On-Going Compliance
      • CHAPTER 21
        Acknowledgements
        Right arrow icon.
        Go to Next Chapter
        Go to Next Chapter
        SECTION 16Your Data-Driven Security Program
        • Go Pro
        • Log In

        Changelog

        Table of Contents
        • Section 15.1Revision 7 (2020-04-17)
        • Section 15.2Revision 6 (2020-04-14)
        • Section 15.3Revision 5 (2020-04-10)
        • Books
        • Security from Zero
        • Changelog
        • Go To Previous Lesson
          Leveraging Security Frameworks & Questionnaires
          Leveraging Security Frameworks & Questionnaires
        • Go To Next Lesson
          Your Data-Driven Security Program
          Your Data-Driven Security Program