Cloud & Compromise Game Cards
Cloud & Compromise Game Cards
Cloud & Compromise Game Cards
ROLE ROLE
ADDITIONAL CONSIDERATIONS
ADDITIONAL CONSIDERATIONS
More than five mitigations requires
More than ten employees requires a CISO
a Deputy CISO
ROLE ROLE
ROLE ROLE
JR ENGINEER INTERN
ADDITIONAL CONSIDERATIONS
This is the base level of an employee ADDITIONAL CONSIDERATIONS
when planning the gaming scenarios More than two interns require at least
one managing engineer
Each headcount should cover roughly
one product
ROLE
CONTRACTOR
SALARY WORK CAPACITY
$250k per use 8 hours
ADDITIONAL CONSIDERATIONS
Remediation work capacity may be
purchased in minimum blocks of 5, 10,
or 20-hour increments
RISK RISK
1 12 2
RISK RISK
3 4
RISK RISK
5 6
RISK RISK
7 8
RISK RISK
9 10
RISK
11
PCI
Transaction
Information
PRODUCT EXAMPLES Revenue/Sales Data
Verifone, Toast, Clover
Customer Data
PII
SYSTEM
COMPONENT
EXTERNAL
SUB-COMPONENTS SPIH
ACCESS
SaaS Probably
HR Software
PaaS Probably
Database
IaaS Possibly
Directory Service
Hybrid Possibly
Employee Info
PRODUCT EXAMPLES
PII
WorkDay, SuccessFactors,
Internally Developed Salary & Bonus info
PCI
PRODUCT EXAMPLES PII
WordPress, Drupal,
Transaction
Joomla, Magento Information
SYSTEM
COMPONENT
EXTERNAL
SUB-COMPONENTS SPIH
ACCESS
Network
PRODUCT EXAMPLES
Admin info
Honeywell, Allied, Amana,
Bosch, Bryant, Carrier Cost information
SaaS Yes
LMS Software
PaaS Probably
Database
IaaS Probably
Media Source
Hybrid Possibly
LEARNING
MANAGEMENT REGULATED/ SENSITIVE
INFORMATION
POTENTIAL MITICATIONS
(CCM CONTROLS)
SYSTEM
HR Info
SYSTEM
COMPONENT
EXTERNAL
SUB-COMPONENTS SPIH
ACCESS
Inventory System
SaaS Probably
Scanners
PaaS Probably
Distribution Equipment
IaaS Probably
Labeling Devices
Hybrid Probably
Industrial Control Systems
PRODUCT EXAMPLES
NetSuite, Katana, Soho, Product Info
Perpetual Inventory System, Proprietary Data
Periodic Inventory System, Contract Info
Barcode System, RFID
System
PII
SYSTEM
COMPONENT
EXTERNAL
SUB-COMPONENTS SPIH
ACCESS
IoT Devices
SaaS Probably
Communications Platform
PaaS Probably
Storage
IaaS Probably
Dashboard
Hybrid Probably
Reporting Structure
Sales Info
SaaS 80K 8 8
PaaS 40K 3 3
IaaS 70K 4 8
Private 60K 7 9
SECURITY &
INCIDENT EVENT Logging within cloud environments varies drastically between ease
of use and cost of storage. Off-line storage and/or accessibility
MONITORING limitations define the cloud SIEM space. SaaS solutions incentivize
tiered pricing increases, where the difference entails operational
expenses (OpEx). While PaaS solutions boast of covering
multi-cloud effectively, the current reality entails the CSP vendor’s
CCM CONTROL offering and features within the competing clouds with mixed
results. IaaS SIEM implementations do not avoid growing storage
costs. Private and on-premise costs will be lower in the long run,
overcoming scalability and tiered storage savings in 1.5 to 2 years.
MITIGATION
TOOL
SETUP/ EASE
SPIH COST EFFECTIVENESS
OF USE
SaaS 20K 7 3
PaaS 20K 5 3
IaaS 30K 8 5
Private 20K 9 5
SECURITY TESTING dependencies and coding practices such as boundary checking or standards
verification. Dynamic incorporates validation of software during operation,
fuzzing inputs of a running system, or checking edge cases. In contrast,
application security testing in the cloud may make adoption easier. Some SaaS
CCM CONTROL providers insert the complete code into the compiled application.
Communications between on-premise and cloud apps may be complex open
vulnerabilities. The agent that some systems require is loaded into the
development environment or on the application servers. Highly regulated
sectors or those with significant intellectual property concerns may need to
formulate requirements carefully considering deployment options. Ease of use
and deployment should keep in mind intellectual property exposure, privacy,
Application & sovereignty, speed of testing, and licensing for SPIH AppSec planning.
Interface Security
SaaS 30K 9 5
PaaS 70K 6 4
IaaS 90K 6 5
Private 70K 8 6
Business Continuity
& Resiliency
MITIGATION
TOOL
SETUP/ EASE
SPIH COST EFFECTIVENESS
OF USE
SaaS 10K 9 5
PaaS 5K 5 4
IaaS 40K 6 7
Private 20K 4 7
CONTINUOUS
INTEGRATION/ Implementing a continuous integration/continuous deployment solution
amounts to the penultimate change control implementation of DevOps.
CONTINUOUS DELIVERY Pipelines are not one-off developers trying a feature tweak or quickly
hacking together a fix for an immediate patch release. Changes occur
within a repository, potentially with automated quality assurance testing,
CCM CONTROL built-in SAST/DAST, and approval requirements. CI/CD pipelines are a
component of immutable software and infrastructure. Private or hybrid
CI/CD instantiations keep code repositories controlled. IaaS allows
dynamic scaling and at-rest confidentiality, similar to on-premise. PaaS
examples, such as Azure DevOps or AWS Production Manager, may be
found as a component of large service providers and typically
incompatible. SaaS protections surround typical expectations of BYOK,
Change Control blinding vendor administrator visibility to subscriber’s code.
SaaS 80K 4 3
PaaS 30K 6 5
IaaS 50K 8 4
Private 40K 9 7
MITIGATION
TOOL
SETUP/ EASE
SPIH COST EFFECTIVENESS
OF USE
SaaS 80K 4 5
PaaS 70K 6 5
IaaS 80K 8 4
Private 90K 9 7
NETWORK Network defenses range broadly. Whether it’s WAF protections, net
Infrastructure Virtual
Services
SaaS 20K 8 5
PaaS 40K 9 8
IaaS 30K 7 10
Private 20K 6 8
CONTROL
(SSO) extends security requirements beyond the enterprise. For example, local
settings for password complexity, reuse, and credential rotation period are set
at the individual endpoints or service provider level. If these are not constantly
maintained or service providers adjust their settings, an inconsistent security
posture may result in exploitable gaps. On-boarding and off-boarding corporate
CCM CONTROL users also leave time gaps, where account privileges for a dismissed employee
may not be accounted for and terminated within a reasonable time. SSO
centralizes authentication within a company’s control, reclaiming trust from
third-party providers and ensuring corporate policies and standards will be met
in the third-party’s offering. SSO offerings come in multiple deployment
models, with several well-known SaaS providers commonly incorporating CSP
PaaS choices and build-your-own integrations. Integration effectiveness and
Identity and Access scalability typically run inversely proportional to ease of use.
Management
MITIGATION
TOOL
SETUP/ EASE
SPIH COST EFFECTIVENESS
OF USE
SaaS 50K 8 3
PaaS 75K 6 6
IaaS 60K 4 8
Private 30K 2 10
DEFENSE defenses as we move up the SPI stack. Licensing costs may become
troublesome in auto-scaling IaaS vs. on-premise installations. While
well understood in the on-premise server and virtualized system,
Legacy corporate EPP is not as effective in a PaaS or SaaS. There's
CCM CONTROL no location to operate or install services without going to another
PaaS or SaaS offering to watch the watchers. This requires an
additional Third Party security assessment and integration approach
to watch the endpoint services. Expect costs to accelerate by
adding multiple clouds or complex custom solutions.
Threat and
Vulnerability
Management
MITIGATION
TOOL
SETUP/ EASE
SPIH COST EFFECTIVENESS
OF USE
In-person 125K 10 10
SECURITY &
AWARENESS Learning Management Systems provide cleaner and easier
consumption of training. In particular, security training provides a
Human Resources
Security
SaaS 80K/4/5 80K/8/8 50K/8/3 10K/9/5 80K/4/3 20K/8/5 30K/9/5 20K/7/3 50K/6/4
PaaS 70K/6/5 40K/3/3 75K/6/6 5K/5/4 30K/6/5 40K/9/8 70K/6/4 20K/5/3 75K/8/6
Cost/ Ease of Use/
Effectiveness
IaaS 60K/8/4 70K/4/8 60K/4/8 40K/5/7 50K/8/4 30K/7/10 90K/6/6 30K/8/5 100K/8/10
Private 90K/9/7 60K/7/9 30K/2/10 20K/4/7 40K/9/7 20K/6/8 70K/8/6 20K/9/5 125K/10/10
DICE IVS A&A TVM CCC CEK IAM BCR AIS HRS
Pandemic Eleven ROLL
Insufficient Identity,
Credentials, Access, and Key 1, 12
Misonfiguration and
Inadequate Change Control 3
Insecure Software
Development 5
Unsecured Third-Party
Resources 6
System Vulnerabilities 7
SaaS 80K/4/5 80K/8/8 50K/8/3 10K/9/5 80K/4/3 20K/8/5 30K/9/5 20K/7/3 50K/6/4
PaaS 70K/6/5 40K/3/3 75K/6/6 5K/5/4 30K/6/5 40K/9/8 70K/6/4 20K/5/3 75K/8/6
Cost/ Ease of Use/
Effectiveness
IaaS 60K/8/4 70K/4/8 60K/4/8 40K/5/7 50K/8/4 30K/7/10 90K/6/6 30K/8/5 100K/8/10
Private 90K/9/7 60K/7/9 30K/2/10 20K/4/7 40K/9/7 20K/6/8 70K/8/6 20K/9/5 125K/10/10
DICE IVS A&A TVM CCC CEK IAM BCR AIS HRS
Pandemic Eleven ROLL
Insufficient Identity,
Credentials, Access, and Key 1, 12
Misonfiguration and
Inadequate Change Control 3
Insecure Software
Development 5
Unsecured Third-Party
Resources 6
System Vulnerabilities 7
SaaS 80K/4/5 80K/8/8 50K/8/3 10K/9/5 80K/4/3 20K/8/5 30K/9/5 20K/7/3 50K/6/4
PaaS 70K/6/5 40K/3/3 75K/6/6 5K/5/4 30K/6/5 40K/9/8 70K/6/4 20K/5/3 75K/8/6
Cost/ Ease of Use/
Effectiveness
IaaS 60K/8/4 70K/4/8 60K/4/8 40K/5/7 50K/8/4 30K/7/10 90K/6/6 30K/8/5 100K/8/10
Private 90K/9/7 60K/7/9 30K/2/10 20K/4/7 40K/9/7 20K/6/8 70K/8/6 20K/9/5 125K/10/10
DICE IVS A&A TVM CCC CEK IAM BCR AIS HRS
Pandemic Eleven ROLL
Insufficient Identity,
Credentials, Access, and Key 1, 12
Misonfiguration and
Inadequate Change Control 3
Insecure Software
Development 5
Unsecured Third-Party
Resources 6
System Vulnerabilities 7
SaaS 80K/4/5 80K/8/8 50K/8/3 10K/9/5 80K/4/3 20K/8/5 30K/9/5 20K/7/3 50K/6/4
PaaS 70K/6/5 40K/3/3 75K/6/6 5K/5/4 30K/6/5 40K/9/8 70K/6/4 20K/5/3 75K/8/6
Cost/ Ease of Use/
Effectiveness
IaaS 60K/8/4 70K/4/8 60K/4/8 40K/5/7 50K/8/4 30K/7/10 90K/6/6 30K/8/5 100K/8/10
Private 90K/9/7 60K/7/9 30K/2/10 20K/4/7 40K/9/7 20K/6/8 70K/8/6 20K/9/5 125K/10/10
DICE IVS A&A TVM CCC CEK IAM BCR AIS HRS
Pandemic Eleven ROLL
Insufficient Identity,
Credentials, Access, and Key 1, 12
Misonfiguration and
Inadequate Change Control 3
Insecure Software
Development 5
Unsecured Third-Party
Resources 6
System Vulnerabilities 7