| name | cybersecurity-analyst |
| description | Analyzes events through cybersecurity lens using threat modeling, attack surface analysis, defense-in-depth, zero-trust architecture, and risk-based frameworks (CIA triad, STRIDE, MITRE ATT&CK). Provides insights on vulnerabilities, attack vectors, defense strategies, incident response, and security posture. Use when: Security incidents, vulnerability assessments, threat analysis, security architecture, compliance. Evaluates: Confidentiality, integrity, availability, threat actors, attack patterns, controls, residual risk. |
Cybersecurity Analyst Skill
Purpose
Analyze events through the disciplinary lens of cybersecurity, applying rigorous security frameworks (CIA triad, defense-in-depth, zero-trust), threat modeling methodologies (STRIDE, PASTA, VAST), attack surface analysis, and industry standards (NIST, ISO 27001, MITRE ATT&CK) to understand security risks, identify vulnerabilities, assess threat actors and attack vectors, evaluate defensive controls, and recommend risk mitigation strategies.
When to Use This Skill
- Security Incident Analysis: Investigate breaches, data leaks, ransomware attacks, insider threats
- Vulnerability Assessment: Identify weaknesses in systems, applications, networks, processes
- Threat Modeling: Analyze potential attack vectors and threat actors for new systems or changes
- Security Architecture Review: Evaluate design decisions for security implications and gaps
- Risk Assessment: Quantify and prioritize security risks using frameworks like CVSS, FAIR
- Compliance Analysis: Assess adherence to security standards (SOC 2, PCI-DSS, HIPAA, GDPR)
- Incident Response Planning: Design detection, containment, eradication, and recovery strategies
- Security Posture Evaluation: Assess overall defensive capabilities and maturity
- Code Security Review: Identify security vulnerabilities in software implementations
Core Philosophy: Security Thinking
Cybersecurity analysis rests on fundamental principles:
Defense in Depth: No single security control is perfect. Layer multiple independent controls so compromise of one doesn't compromise the whole system.
Assume Breach: Modern security assumes attackers will penetrate perimeter defenses. Design systems to minimize damage and enable detection when (not if) breach occurs.
Least Privilege: Grant minimum access necessary for legitimate function. Every excess permission is an opportunity for exploitation.
Zero Trust: Never trust, always verify. Verify explicitly, use least privilege access, and assume breach regardless of network location.
Security by Design: Security cannot be bolted on afterward. It must be fundamental to architecture and implementation from the beginning.
CIA Triad: Security protects three properties—Confidentiality (only authorized access), Integrity (only authorized modification), Availability (accessible when needed).
Threat-Informed Defense: Base defensive priorities on understanding of actual threat actors, their capabilities, motivations, and tactics (threat intelligence).
Risk-Based Approach: Perfect security is impossible. Prioritize security investments based on risk (likelihood × impact) to maximize security per dollar spent.
Theoretical Foundations (Expandable)
Foundation 1: CIA Triad (Classic Security Model)
Components:
Confidentiality: Information accessible only to authorized entities
- Protection mechanisms: Encryption, access controls, authentication
- Threats: Eavesdropping, data theft, unauthorized disclosure
- Example violations: Data breach, password theft, insider leak
Integrity: Information modifiable only by authorized entities in authorized ways
- Protection mechanisms: Hashing, digital signatures, access controls, version control
- Threats: Tampering, unauthorized modification, malware
- Example violations: Database manipulation, man-in-the-middle attacks, ransomware encryption
Availability: Information and systems accessible when needed by authorized entities
- Protection mechanisms: Redundancy, backups, DDoS mitigation, incident response
- Threats: Denial of service, ransomware, system destruction
- Example violations: DDoS attacks, ransomware, infrastructure failures
Extensions:
- Authenticity: Verified identity of entities and origin of information
- Non-repudiation: Cannot deny taking action
- Accountability: Actions traceable to entities
Application: Every security analysis should identify which aspects of CIA triad are at risk and how controls protect each.
Sources:
Foundation 2: Defense in Depth (Layered Security)
Principle: Deploy multiple layers of security controls so compromise of one layer doesn't compromise entire system.
Historical Origin: Military defensive strategy—multiple concentric perimeter defenses
Security Layers:
- Physical: Facility access controls, locked server rooms
- Network: Firewalls, network segmentation, IDS/IPS
- Host: Endpoint protection, host firewalls, patch management
- Application: Input validation, secure coding, authentication
- Data: Encryption at rest and in transit, DLP, tokenization
- Human: Security awareness training, phishing simulation
Key Insight: Redundancy is not waste—it's resilience. Even if attacker bypasses firewall, they still face authentication, authorization, monitoring, encryption, and detection controls.
Application: Security architecture should have multiple independent defensive layers protecting critical assets.
Limitation: Can create complexity and false sense of security if layers are not maintained or are interdependent.
Sources:
Foundation 3: Zero Trust Architecture
Core Principle: "Never trust, always verify" regardless of network location
Contrast with Perimeter Model: Traditional security assumed internal network is trusted ("castle and moat"). Zero trust assumes no network location is trusted.
Key Tenets (NIST SP 800-207):
- Verify explicitly: Always authenticate and authorize based on all available data points
- Least privilege access: Limit user access with Just-In-Time and Just-Enough-Access
- Assume breach: Minimize blast radius and segment access; verify end-to-end encryption
Components:
- Identity-centric security: Identity becomes new perimeter
- Micro-segmentation: Network divided into small zones with separate controls
- Continuous verification: Authentication and authorization are continuous, not one-time
- Data-centric: Protect data itself, not just perimeter around it
Drivers:
- Cloud adoption (no clear perimeter)
- Remote work (users outside traditional perimeter)
- Sophisticated attacks (perimeter breaches common)
Application: Modern security architectures should be designed with zero trust principles, especially for cloud and hybrid environments.
Sources:
Foundation 4: Threat Modeling
Definition: Structured approach to identify and prioritize potential threats to a system
Purpose: Proactively identify security issues during design phase when fixes are cheapest
Benefits:
- Find vulnerabilities before implementation
- Prioritize security work
- Communicate risks to stakeholders
- Guide security testing
Common Methodologies:
STRIDE (Microsoft):
- Spoofing identity
- Tampering with data
- Repudiation
- Information disclosure
- Denial of service
- Elevation of privilege
PASTA (Process for Attack Simulation and Threat Analysis):
- Seven-stage risk-centric methodology
- Aligns business objectives with technical requirements
VAST (Visual, Agile, and Simple Threat modeling):
- Scalable for agile development
- Two types: application threat models and operational threat models
Application: Use threat modeling for new features, architecture changes, or security reviews.
Sources:
Foundation 5: MITRE ATT&CK Framework
Description: Knowledge base of adversary tactics and techniques based on real-world observations
Purpose: Understand how attackers operate to inform defense, detection, and threat hunting
Structure:
- Tactics: High-level goals (e.g., Initial Access, Execution, Persistence, Privilege Escalation)
- Techniques: Ways to achieve tactics (e.g., Phishing, Exploiting Public Applications)
- Sub-techniques: Specific implementations
- Procedures: Specific attacker behaviors
14 Tactics (Enterprise Matrix):
- Reconnaissance
- Resource Development
- Initial Access
- Execution
- Persistence
- Privilege Escalation
- Defense Evasion
- Credential Access
- Discovery
- Lateral Movement
- Collection
- Command and Control
- Exfiltration
- Impact
Application:
- Map defensive controls to ATT&CK techniques
- Identify detection gaps
- Threat intelligence sharing
- Red team/purple team exercises
Value: Common language for describing attacker behavior; basis for threat-informed defense
Sources:
Core Analytical Frameworks (Expandable)
Framework 1: Attack Surface Analysis
Definition: Identification and assessment of all points where unauthorized user could enter or extract data from system
Components:
Attack Surface Elements:
- Network attack surface: Exposed ports, services, protocols
- Software attack surface: Applications, APIs, web interfaces
- Human attack surface: Users, administrators, social engineering targets
- Physical attack surface: Facility access, hardware access
Attack Vectors: Methods attackers use to exploit attack surface
- Network-based: Port scanning, protocol exploits, man-in-the-middle
- Web-based: SQL injection, XSS, CSRF, authentication bypass
- Email-based: Phishing, malicious attachments, credential harvesting
- Physical: Theft, unauthorized access, evil maid attacks
- Social engineering: Pretexting, baiting, tailgating
Analysis Process:
- Enumerate: List all entry points and assets
- Classify: Categorize by type and criticality
- Assess: Evaluate exploitability and impact
- Prioritize: Rank by risk
- Reduce: Minimize unnecessary exposure
Metrics:
- Number of exposed services
- Number of internet-facing applications
- Number of privileged accounts
- Lines of code exposed to untrusted input
Application: Reducing attack surface is fundamental defensive strategy. Eliminate unnecessary exposure.
Sources:
Framework 2: Risk Assessment Frameworks
Purpose: Quantify and prioritize security risks to guide resource allocation
Common Frameworks:
CVSS (Common Vulnerability Scoring System):
- Standard for assessing vulnerability severity
- Score 0-10 based on exploitability, impact, scope
- Base score (intrinsic characteristics) + temporal + environmental scores
- Widely used but criticized for not capturing actual risk in specific contexts
FAIR (Factor Analysis of Information Risk):
- Quantitative risk framework
- Risk = Loss Event Frequency × Loss Magnitude
- Enables cost-benefit analysis of security investments
- More complex but provides dollar-denominated risk figures
NIST Risk Management Framework (RMF):
- Seven steps: Prepare, Categorize, Select, Implement, Assess, Authorize, Monitor
- Links security controls to risk management
- Used by U.S. federal agencies
Qualitative vs. Quantitative:
- Qualitative: High/Medium/Low risk ratings (simpler, faster, subjective)
- Quantitative: Numerical risk values (complex, objective, requires data)
Application: Risk assessment informs prioritization. Not all vulnerabilities are equally important—focus on highest risks.
Sources:
Framework 3: Security Control Frameworks
Purpose: Structured set of security controls to achieve security objectives
Major Frameworks:
NIST Cybersecurity Framework:
- Five core functions: Identify, Protect, Detect, Respond, Recover
- Not prescriptive—flexible for different organizations
- Widely adopted across industries and internationally
NIST SP 800-53 (Security and Privacy Controls):
- Comprehensive catalog of security controls for federal systems
- 20 control families (Access Control, Incident Response, etc.)
- Detailed implementation guidance
CIS Controls (Center for Internet Security):
- 18 prioritized security controls
- Implementation groups (IG1, IG2, IG3) based on organizational maturity
- Actionable and measurable
ISO/IEC 27001:
- International standard for information security management systems
- 14 control domains, 114 controls
- Certification available
Application: Use frameworks to:
- Ensure comprehensive coverage
- Benchmark security posture
- Communicate with stakeholders
- Meet compliance requirements
Sources:
Framework 4: Incident Response Lifecycle
Definition: Structured approach to handling security incidents
Standard Model (NIST SP 800-61):
Phase 1: Preparation
- Establish IR capability, tools, playbooks
- Training and exercises
- Communication plans
Phase 2: Detection and Analysis
- Monitoring and alerting
- Incident classification and prioritization
- Initial investigation
- Scope determination
Phase 3: Containment, Eradication, and Recovery
- Containment: Stop spread (short-term and long-term)
- Eradication: Remove threat from environment
- Recovery: Restore systems to normal operation
Phase 4: Post-Incident Activity
- Lessons learned
- Evidence preservation
- Incident report
- Process improvement
Key Concepts:
- Playbooks: Predefined procedures for common incident types
- Indicators of Compromise (IoCs): Artifacts indicating malicious activity
- Chain of custody: Evidence handling procedures
- Communication: Internal and external stakeholders, legal, PR
Metrics:
- Mean Time to Detect (MTTD)
- Mean Time to Respond (MTTR)
- Mean Time to Contain (MTTC)
Application: Effective incident response minimizes damage, reduces recovery time, and captures learning.
Sources:
Framework 5: Secure Development Lifecycle (SDL)
Purpose: Integrate security into software development process
Microsoft SDL Phases:
- Training: Security training for developers
- Requirements: Define security requirements and privacy requirements
- Design: Threat modeling, attack surface reduction, defense in depth
- Implementation: Secure coding standards, code analysis tools
- Verification: Security testing (SAST, DAST, penetration testing)
- Release: Final security review, incident response plan
- Response: Execute incident response plan if vulnerability discovered
Key Practices:
- Static Analysis (SAST): Analyze source code for vulnerabilities
- Dynamic Analysis (DAST): Test running application
- Dependency Scanning: Check third-party libraries for known vulnerabilities
- Penetration Testing: Simulate real attacks
- Security Champions: Embed security expertise in development teams
OWASP SAMM (Software Assurance Maturity Model):
- Maturity model for secure software development
- Five business functions: Governance, Design, Implementation, Verification, Operations
- Three maturity levels for each function
Application: Security must be integrated throughout development lifecycle, not just at the end.
Sources:
Methodological Approaches (Expandable)
Method 1: Threat Intelligence Analysis
Purpose: Understand adversaries, their capabilities, tactics, and targets to inform defense
Types of Threat Intelligence:
Strategic: High-level trends for executives
- APT group activity and motivations
- Geopolitical cyber threats
- Industry-specific threat landscape
Operational: Campaign-level information for security operations
- Current attack campaigns
- Threat actor TTPs
- Malware families
Tactical: Technical indicators for immediate defense
- IP addresses, domains, file hashes
- YARA rules, Snort signatures
- CVEs being exploited
Analytical Process:
- Collection: Gather data from internal sources, threat feeds, OSINT, dark web
- Processing: Normalize, correlate, deduplicate
- Analysis: Contextualize, attribute, assess intent and capability
- Dissemination: Share with relevant teams in actionable format
- Feedback: Assess effectiveness and refine
Frameworks:
- Diamond Model: Adversary, Capability, Infrastructure, Victim
- Kill Chain: Reconnaissance → Weaponization → Delivery → Exploitation → Installation → C2 → Actions on Objectives
- MITRE ATT&CK: Map observed techniques to ATT&CK matrix
Application: Threat intelligence enables proactive, threat-informed defense rather than generic security measures.
Sources:
Method 2: Penetration Testing
Definition: Authorized simulated attack to evaluate security of systems
Types:
Black Box: No prior knowledge (simulates external attacker)
Gray Box: Partial knowledge (simulates insider or compromised user)
White Box: Full knowledge (comprehensive security assessment)
Phases (Penetration Testing Execution Standard):
- Pre-engagement: Scope, rules of engagement, legal agreements
- Intelligence gathering: OSINT, network scanning, service enumeration
- Threat modeling: Identify potential attack vectors
- Vulnerability analysis: Identify exploitable weaknesses
- Exploitation: Attempt to exploit vulnerabilities
- Post-exploitation: Assess impact, lateral movement, privilege escalation
- Reporting: Document findings, demonstrate impact, provide remediation guidance
Specialized Types:
- Web application penetration testing: Focus on OWASP Top 10
- Network penetration testing: Internal and external network
- Social engineering: Phishing, vishing, physical intrusion
- Wireless penetration testing: WiFi security assessment
Red Team vs. Penetration Testing:
- Penetration testing: Find as many vulnerabilities as possible
- Red teaming: Goal-oriented (e.g., access specific data), simulates APT, tests detection and response
Application: Regular penetration testing validates effectiveness of controls and identifies gaps before attackers do.
Sources:
Method 3: Security Architecture Review
Purpose: Evaluate system design for security properties and identify architectural vulnerabilities
Review Dimensions:
Structural Analysis:
- Trust boundaries and data flows
- Authentication and authorization architecture
- Network segmentation and isolation
- Data classification and protection
Threat Modeling:
- Apply STRIDE or other methodology
- Identify attack trees
- Assess mitigations for identified threats
Control Assessment:
- Map controls to CIA triad
- Evaluate defense-in-depth layers
- Identify single points of failure
Compliance Review:
- Check against security frameworks (NIST, CIS, ISO)
- Regulatory requirements (PCI-DSS, HIPAA, SOC 2)
Technology Assessment:
- Cryptographic implementation
- Secure protocols
- Patch management approach
- Secret management
Analysis Questions:
- What are trust boundaries?
- Where does sensitive data flow?
- How is authentication/authorization enforced?
- What happens if component X is compromised?
- Are security assumptions documented and validated?
Outputs:
- Architecture diagrams with security annotations
- Threat model
- Risk assessment
- Remediation recommendations
Application: Architecture review during design phase prevents expensive security issues in production.
Method 4: Vulnerability Assessment and Management
Purpose: Systematically identify, classify, prioritize, and remediate security weaknesses
Process:
Phase 1: Discovery
- Asset inventory (what do we have?)
- Vulnerability scanning (automated tools)
- Manual security testing
- Code review (static analysis)
Phase 2: Assessment
- Classify vulnerabilities by type and severity
- Assess exploitability (is there exploit code? Is it being exploited?)
- Determine impact (what data/systems at risk?)
- Calculate risk score (CVSS, contextual factors)
Phase 3: Prioritization
- Rank by risk (likelihood × impact)
- Consider threat intelligence (is it being exploited in wild?)
- Business criticality of affected assets
- Remediation complexity
Phase 4: Remediation
- Patching (ideal)
- Configuration changes
- Compensating controls (if patching impossible)
- Accept risk (document and approve)
Phase 5: Verification
- Rescan to confirm remediation
- Update vulnerability database
- Track metrics (time to remediate, vulnerability density)
Challenges:
- Alert fatigue (too many findings)
- False positives
- Patching disruption
- Legacy systems
Best Practices:
- Risk-based prioritization (not just CVSS)
- SLA-based remediation (Critical: 7 days, High: 30 days, etc.)
- Automate where possible
- Track trends and metrics
Application: Continuous vulnerability management is essential hygiene. Can't fix what you don't know about.
Sources:
Method 5: Security Monitoring and Detection Engineering
Purpose: Design and operate capabilities to detect malicious activity
Components:
Data Sources:
- Network traffic (NetFlow, full packet capture)
- Endpoint logs (process creation, file access, registry changes)
- Authentication logs (logins, privilege escalation)
- Application logs (errors, transactions)
- Cloud APIs and audit logs
Detection Mechanisms:
Signature-based: Known malicious patterns (antivirus, IDS signatures)
- Pros: Low false positives, fast
- Cons: Only detects known threats
Anomaly-based: Deviations from baseline behavior
- Pros: Can detect novel attacks
- Cons: High false positives, requires tuning
Heuristic-based: Rules based on attacker behavior patterns
- Pros: Detects variations of known attacks
- Cons: Requires security expertise to create rules
Threat intelligence-based: Match against known IoCs
- Pros: Leverages collective knowledge
- Cons: Reactive (indicators discovered post-compromise)
Detection Development:
- Understand attacker technique (MITRE ATT&CK)
- Identify data sources that capture technique
- Develop detection logic
- Test against true positives and false positives
- Tune threshold and logic
- Document detection and response procedures
- Monitor effectiveness and iterate
SIEM and SOC:
- SIEM: Aggregate, correlate, and analyze security logs
- SOC: Security Operations Center—team that monitors alerts and responds to incidents
Metrics:
- Detection coverage (% of ATT&CK techniques covered)
- Alert volume and quality
- False positive rate
- Mean Time to Detect (MTTD)
Application: You can't respond to what you don't detect. Invest in detection capabilities aligned to threats you face.
Sources:
Analysis Rubric
What to Examine
Assets and Data:
- What sensitive data exists? (PII, credentials, trade secrets, financial data)
- Where is it stored, processed, transmitted?
- Who has access?
- What is business impact if compromised? (confidentiality, integrity, availability)
Attack Surface:
- What systems are exposed to internet?
- What are entry points for attackers?
- What authentication is required?
- What third-party dependencies exist?
Threat Actors:
- Who might target this? (Nation-states, cybercriminals, hacktivists, insiders)
- What are their capabilities and motivations?
- What TTPs do they typically use?
- What threat intelligence exists?
Vulnerabilities:
- Known software vulnerabilities (CVEs)?
- Configuration weaknesses?
- Architectural security flaws?
- Code-level vulnerabilities?
- Human vulnerabilities (phishing susceptibility)?
Existing Controls:
- What security controls are in place?
- Do they follow defense-in-depth principles?
- Are they properly configured and maintained?
- What detection and response capabilities exist?
Questions to Ask
Threat Questions:
- What could go wrong?
- What are most likely attack vectors?
- What threat actors might target this?
- What are their goals and capabilities?
- What historical incidents are relevant?
Vulnerability Questions:
- What weaknesses exist?
- How exploitable are they?
- What is impact if exploited?
- Are there known exploits or active exploitation?
- How quickly can vulnerabilities be remediated?
Control Questions:
- What protections are in place?
- How effective are they?
- What gaps exist in defensive coverage?
- Can controls be bypassed?
- How will malicious activity be detected?
Risk Questions:
- What is likelihood of compromise?
- What is potential impact?
- What is overall risk level?
- How does risk compare to organization's risk appetite?
- What risk treatment options exist? (mitigate, accept, transfer, avoid)
Compliance Questions:
- What regulations or standards apply?
- Are security requirements met?
- What evidence demonstrates compliance?
- What gaps exist?
Factors to Consider
Technical Factors:
- System architecture and design
- Technology stack and versions
- Configuration and hardening
- Cryptographic implementation
- Network topology and segmentation
Organizational Factors:
- Security maturity and culture
- Available resources and budget
- Risk tolerance
- Regulatory environment
- Business criticality
Threat Landscape:
- Current threat actor activity
- Emerging attack techniques
- Industry-specific threats
- Geopolitical factors
Operational Factors:
- Patch management processes
- Incident response capabilities
- Security monitoring and detection
- Security awareness and training
- Third-party risk management
Historical Parallels to Consider
- Similar security incidents
- Comparable vulnerability exploits
- Industry-specific attack patterns
- Lessons from major breaches
- Evolution of threat actor TTPs
Implications to Explore
Immediate Security Implications:
- Confidentiality: Data breach risk
- Integrity: Data tampering or corruption risk
- Availability: Service disruption risk
- Financial: Ransom, recovery costs, fines
Broader Implications:
- Reputation damage
- Legal and regulatory consequences
- Customer trust erosion
- Competitive disadvantage
- Systemic risk (if in critical infrastructure)
Strategic Implications:
- Security architecture changes needed
- Security program maturity gaps
- Resource allocation and prioritization
- Risk management approach
Step-by-Step Analysis Process
Step 1: Define Scope and Context
Actions:
- Clearly identify system, application, or event being analyzed
- Determine boundaries and interfaces
- Identify stakeholders and their security requirements
- Understand business context and criticality
- Gather relevant documentation (architecture diagrams, data flows, policies)
Outputs:
- Scope statement
- Asset inventory
- Stakeholder list
- Business context understanding
Step 2: Identify Assets and Data
Actions:
- List critical assets (systems, data, services)
- Classify data by sensitivity (public, internal, confidential, restricted)
- Map data flows (where data is created, stored, processed, transmitted, destroyed)
- Identify crown jewels (most valuable assets)
Outputs:
- Asset inventory with criticality ratings
- Data classification matrix
- Data flow diagrams
- Crown jewels list
Step 3: Analyze Attack Surface
Actions:
- Enumerate all entry points (APIs, web interfaces, network services, physical access)
- Identify trust boundaries (where untrusted input crosses into trusted zones)
- Map authentication and authorization points
- Identify dependencies (third-party services, libraries, suppliers)
Outputs:
- Attack surface map
- Trust boundary diagram
- Entry point inventory
- Dependency list
Step 4: Conduct Threat Modeling
Actions:
- Select threat modeling methodology (STRIDE, PASTA, etc.)
- Identify potential threat actors and their goals
- Enumerate potential attack vectors for each asset
- Create attack trees showing attack paths
- Map to MITRE ATT&CK techniques
Outputs:
- Threat model document
- Threat actor profiles
- Attack tree diagrams
- ATT&CK technique mapping
Step 5: Identify Vulnerabilities
Actions:
- Review known CVEs for technologies in use
- Analyze configuration against security benchmarks (CIS, STIGs)
- Review architecture for security design flaws
- Consider code-level vulnerabilities (if applicable)
- Assess human vulnerabilities (phishing susceptibility, privilege misuse)
Outputs:
- Vulnerability inventory
- CVSS scores or risk ratings
- Configuration gap analysis
- Architectural security issues
Step 6: Assess Existing Controls
Actions:
- Inventory security controls across all layers (network, host, application, data)
- Map controls to threats (which threats do controls mitigate?)
- Evaluate control effectiveness (properly configured? maintained? monitored?)
- Identify control gaps (threats without adequate mitigation)
- Assess detection and response capabilities
Outputs:
- Control inventory
- Threat-control mapping matrix
- Control effectiveness assessment
- Detection coverage gaps
Step 7: Analyze Risk
Actions:
- For each threat-vulnerability pair, estimate likelihood and impact
- Calculate risk scores (qualitative or quantitative)
- Prioritize risks
- Compare to organizational risk tolerance
- Consider risk interdependencies and cascading effects
Outputs:
- Risk register
- Risk heat map
- Prioritized risk list
- Risk acceptance recommendations
Step 8: Evaluate Detection and Response
Actions:
- Assess what malicious activities would be detected
- Evaluate MTTD (Mean Time to Detect) for various attack scenarios
- Review incident response plans and playbooks
- Assess incident response team capabilities
- Identify gaps in detection or response
Outputs:
- Detection coverage assessment
- MTTD estimates
- IR capability assessment
- Detection and response gaps
Step 9: Develop Remediation Recommendations
Actions:
- Propose mitigations for identified risks (preventive, detective, corrective)
- Prioritize by risk reduction and implementation effort
- Consider compensating controls where direct mitigation is impractical
- Estimate costs and implementation timelines
- Document risk acceptance for risks not mitigated
Outputs:
- Remediation roadmap
- Prioritized recommendation list
- Cost-benefit analysis
- Risk acceptance documentation
Step 10: Consider Compliance Requirements
Actions:
- Identify applicable regulations and standards
- Map controls to compliance requirements
- Document evidence of compliance
- Identify compliance gaps
- Recommend actions to achieve or maintain compliance
Outputs:
- Compliance matrix
- Gap analysis
- Evidence documentation
- Compliance remediation plan
Step 11: Synthesize and Report
Actions:
- Summarize key findings for different audiences (executives, technical teams, compliance)
- Provide clear risk assessment and recommendations
- Include metrics and KPIs
- Document assumptions and limitations
- Create action plan with owners and timelines
Outputs:
- Executive summary
- Technical findings report
- Remediation roadmap
- Compliance summary
Usage Examples
Example 1: Security Incident - Ransomware Attack
Event: Organization experiences ransomware attack; files encrypted, ransom note demands payment
Analysis:
Step 1 - Scope and Context:
- Affected systems: File servers, workstations, backups
- Business impact: Operations halted, data unavailable
- Critical: Understand ransomware variant, encryption scope, attacker access
Step 2 - Assets:
- Crown jewels: Customer database, financial records, intellectual property
- Status: Files encrypted, availability compromised
Step 3 - Attack Surface Analysis:
- Initial access vector: Likely phishing email or vulnerable RDP endpoint
- Lateral movement: SMB, credential theft
Step 4 - Threat Modeling (Post-Incident):
- Threat actor: Likely cybercriminal group (financial motivation)
- ATT&CK mapping:
- Initial Access: Phishing or Exploit Public-Facing Application
- Execution: User Execution or Exploitation for Client Execution
- Persistence: Registry Run Keys, Scheduled Tasks
- Privilege Escalation: Exploitation for Privilege Escalation
- Credential Access: Credential Dumping
- Lateral Movement: SMB/Windows Admin Shares
- Impact: Data Encrypted for Impact
Step 5 - Vulnerabilities:
- Phishing susceptibility (no email filtering, insufficient user training)
- Unpatched RDP vulnerabilities
- Weak passwords or credential reuse
- Inadequate network segmentation (ransomware spread easily)
- Backup vulnerabilities (backups also encrypted)
Step 6 - Control Assessment:
- Missing: Email security gateway, EDR, MFA
- Inadequate: Network segmentation, backup isolation, patch management
- Failed: Antivirus didn't detect ransomware
Step 7 - Risk Analysis:
- Impact: HIGH (business disruption, data loss, ransom demand, reputation damage)
- Likelihood: HIGH (demonstrated—incident occurred)
- Residual risk: CRITICAL (without improvements, repeat likely)
Step 8 - Detection and Response:
- Detection: Failed until encryption began (no EDR, limited logging)
- MTTD: Hours to days (too slow)
- Response: No playbook, uncoordinated response
- Gaps: No IR team, no communication plan, no legal/PR coordination
Step 9 - Recommendations (Prioritized):
Immediate (Hours to Days):
- Isolate affected systems (contain spread)
- Identify ransomware variant and check for decryption tools
- Engage incident response firm if no internal capability
- Do NOT pay ransom immediately (assess alternatives first)
- Notify legal, insurance, possibly law enforcement
Short-term (Days to Weeks):
- Restore from backups if available and uncompromised
- Deploy EDR on all endpoints
- Implement MFA for all remote access
- Conduct forensic investigation to determine root cause and scope
- Develop and test IR playbook
Medium-term (Weeks to Months):
- Network segmentation (prevent lateral movement)
- Email security gateway (block phishing)
- Privileged access management (limit credential theft)
- Security awareness training (reduce phishing success)
- Backup hardening (air-gapped or immutable backups)
Long-term (Months to Year):
- Security maturity assessment and roadmap
- 24/7 SOC or MDR service
- Penetration testing and red team exercises
- Comprehensive vulnerability management program
Step 10 - Compliance:
- Regulatory notification requirements (GDPR, state breach laws, etc.)
- Cyber insurance claim
- Document incident for auditors
Step 11 - Synthesis:
- Root cause: Combination of phishing/RDP exploit + inadequate detection + weak segmentation + backup vulnerabilities
- Key lesson: Defense-in-depth failures—multiple control failures allowed attack to succeed
- Priority: Immediate containment and recovery, then build detective and preventive controls
- Cost: Ransom demand + downtime + recovery + remediation + reputation damage (potentially millions)
Example 2: Vulnerability Assessment - New Web Application Launch
Event: Organization planning to launch customer-facing web application; pre-launch security review requested
Analysis:
Step 1 - Scope:
- Application: E-commerce web application
- Users: External customers
- Data: PII, payment information, order history
- Criticality: HIGH (revenue-generating, customer trust)
Step 2 - Assets:
- Customer PII and payment data (confidentiality, integrity critical)
- Inventory and pricing data (integrity, availability critical)
- Application availability (revenue impact)
Step 3 - Attack Surface:
- Web interface (public-facing)
- APIs (mobile app, third-party integrations)
- Admin portal (internal users)
- Payment processor integration
- Third-party libraries and dependencies
Step 4 - Threat Modeling (STRIDE):
Spoofing:
- Threat: Attacker impersonates user or admin
- Mitigations: Strong authentication, MFA, session management
Tampering:
- Threat: Attacker modifies prices, orders, or user data
- Mitigations: Input validation, authorization checks, integrity controls
Repudiation:
- Threat: User denies placing order
- Mitigations: Audit logging, transaction signing
Information Disclosure:
- Threat: Attacker accesses other users' PII or payment info
- Mitigations: Authorization checks, encryption, secure session management
Denial of Service:
- Threat: Attacker overwhelms application
- Mitigations: Rate limiting, DDoS protection, scalable infrastructure
Elevation of Privilege:
- Threat: User gains admin access
- Mitigations: Least privilege, secure authorization, privilege separation
Step 5 - Vulnerabilities (OWASP Top 10 Analysis):
- Broken Access Control: Check for IDOR vulnerabilities, horizontal/vertical privilege escalation
- Cryptographic Failures: Verify encryption at rest and in transit, key management
- Injection: Test for SQL injection, XSS, command injection
- Insecure Design: Review for security design flaws, threat model gaps
- Security Misconfiguration: Check for default credentials, unnecessary features, verbose errors
- Vulnerable Components: Scan dependencies for known CVEs
- Authentication Failures: Test password policy, session management, MFA
- Software/Data Integrity: Verify supply chain security, unsigned updates
- Logging Failures: Ensure security events logged, log tampering prevention
- SSRF: Test for server-side request forgery vulnerabilities
Step 6 - Control Assessment:
Positive Findings:
- TLS 1.3 for all connections
- Passwords hashed with bcrypt
- Input validation framework in use
- Dependency scanning in CI/CD
Gaps Identified:
- No MFA for customer accounts
- Admin portal not on separate domain/network
- Verbose error messages expose stack traces
- No rate limiting on API endpoints
- Some third-party dependencies have known CVEs
- Insufficient authorization checks (IDOR vulnerabilities)
- No Web Application Firewall (WAF)
Step 7 - Risk Analysis:
Critical Risks:
- IDOR vulnerabilities: HIGH likelihood, HIGH impact (data breach)
- Vulnerable dependencies: MEDIUM likelihood, HIGH impact (RCE potential)
High Risks:
- No rate limiting: HIGH likelihood, MEDIUM impact (scraping, brute force)
- Admin portal on same domain: LOW likelihood, HIGH impact (credential theft)
Medium Risks:
- Verbose errors: MEDIUM likelihood, MEDIUM impact (information disclosure)
- No MFA: LOW likelihood (for now), HIGH impact (account takeover)
Step 8 - Detection and Response:
- Logging: Adequate for authentication and transactions
- SIEM integration: Not yet configured
- IR playbook: Generic, needs application-specific scenarios
- Recommendation: Configure SIEM, create app-specific IR playbook, implement alerting for suspicious patterns
Step 9 - Recommendations (Prioritized by Risk):
Must-Fix Before Launch (Critical):
- Fix IDOR vulnerabilities (implement authorization checks)
- Update vulnerable dependencies
- Remove verbose error messages in production
- Implement rate limiting on all endpoints
Should-Fix Before Launch (High):
- Deploy WAF with OWASP Core Rule Set
- Separate admin portal (different domain, VPN/IP restriction)
- Configure SIEM integration and alerting
Post-Launch (Medium):
- Implement MFA for customer accounts
- Enhance logging (capture more security events)
- Conduct penetration testing
- Establish bug bounty program
Step 10 - Compliance:
- PCI-DSS: Required for payment card data (use tokenization, minimize cardholder data environment)
- GDPR/CCPA: Customer data privacy requirements (consent, data minimization, breach notification)
- SOC 2: If B2B customers require assurance
Step 11 - Synthesis:
- Application has solid foundation (modern crypto, input validation, dependency scanning)
- Critical issues must be fixed before launch (IDOR, vulnerable dependencies)
- WAF provides defense-in-depth for web threats
- Post-launch: Continue testing, bug bounty, security monitoring
- Go/No-Go: NO GO until critical issues resolved
Example 3: Security Architecture Review - Cloud Migration
Event: Organization planning to migrate on-premises applications to AWS; security architecture review requested
Analysis:
Step 1 - Scope:
- Migration: 50+ applications, mix of web apps, APIs, databases
- Target: AWS (IaaS and PaaS services)
- Timeline: 12-month migration
- Criticality: Mixed (some business-critical applications)
Step 2 - Assets:
- Applications and data currently in controlled on-premises environment
- Concerns: Data sovereignty, compliance, shared responsibility model
Step 3 - Attack Surface Changes:
- Increases: Internet-facing cloud services, cloud management interfaces, broader attack surface
- Decreases: Physical access threats
- New: Cloud misconfigurations, IAM vulnerabilities, API security
Step 4 - Threat Modeling (Cloud-Specific):
Cloud-Specific Threats:
- Account compromise (stolen credentials, phishing)
- Misconfigured storage buckets (public S3 buckets)
- Overly permissive IAM policies
- Insufficient network segmentation (VPC design)
- Data exfiltration via cloud APIs
- Insider threats (cloud admin abuse)
- Supply chain (compromised cloud services or dependencies)
MITRE ATT&CK for Cloud:
- Initial Access: Valid accounts, exploit public-facing application
- Persistence: Account manipulation, create IAM user
- Privilege Escalation: IAM policy manipulation
- Defense Evasion: Disable cloud logs
- Credential Access: Unsecured credentials in code/config
- Discovery: Cloud service discovery
- Lateral Movement: Use alternate authentication material
- Exfiltration: Transfer data to cloud account
Step 5 - Vulnerabilities (Cloud Context):
- Lack of cloud security expertise
- On-premises mindset (perimeter-focused, not zero-trust)
- Unclear cloud IAM strategy
- No cloud configuration management (IaC not used)
- No cloud security posture management (CSPM)
Step 6 - Control Assessment (Shared Responsibility Model):
AWS Responsibilities (Security OF the Cloud):
- Physical security
- Hypervisor security
- Network infrastructure
Customer Responsibilities (Security IN the Cloud):
- IAM and access control
- Data encryption
- Network configuration (VPCs, security groups)
- Application security
- Compliance
Proposed Controls:
Identity and Access Management:
- Implement AWS Organizations with SCPs (Service Control Policies)
- Enforce MFA for all users
- Use IAM roles, not long-term credentials
- Principle of least privilege
- Regular access reviews
Network Security:
- VPC design with public/private subnets
- Security groups (stateful firewalls)
- NACLs (stateless firewalls)
- AWS WAF for web applications
- VPC Flow Logs for monitoring
Data Protection:
- Encryption at rest (S3, EBS, RDS with KMS)
- Encryption in transit (TLS)
- S3 bucket policies (block public access)
- Data classification and handling
Monitoring and Detection:
- AWS CloudTrail (API logging)
- AWS GuardDuty (threat detection)
- AWS Security Hub (aggregate findings)
- AWS Config (configuration compliance)
- SIEM integration
Incident Response:
- Cloud-specific IR playbooks
- Automate response with Lambda
- Snapshot and forensics procedures
- AWS support engagement plan
Compliance:
- AWS Artifact (compliance reports)
- AWS Config rules (continuous compliance)
- Encryption for HIPAA/PCI-DSS
- Data residency (region selection)
Step 7 - Risk Analysis:
High Risks:
- Misconfigured S3 buckets (likelihood: high, impact: high - data breach)
- Compromised IAM credentials (likelihood: medium, impact: high)
- Insufficient monitoring (likelihood: high, impact: medium - delayed detection)
Medium Risks:
- Inadequate network segmentation (likelihood: medium, impact: medium)
- Lack of cloud expertise (likelihood: high, impact: medium - misconfigurations)
Step 8 - Detection and Response:
- Deploy GuardDuty in all regions and accounts
- Centralize CloudTrail logs
- Configure Security Hub and Config
- Create cloud-specific alerts (unusual API calls, IAM changes, public S3 buckets)
- Develop cloud incident response playbooks
Step 9 - Recommendations (Cloud Migration Security Roadmap):
Pre-Migration (Month 1-2):
- Cloud security training for teams
- Design AWS Organizations structure and account strategy
- Define IAM strategy and policies
- Design VPC architecture and network segmentation
- Select and implement CSPM tool
- Establish cloud security baseline (CIS AWS Foundations Benchmark)
During Migration (Month 3-12):
- Use Infrastructure as Code (Terraform/CloudFormation) for all resources
- Automate security checks in CI/CD (SAST, DAST, IaC scanning)
- Enforce encryption at rest and in transit
- Implement least privilege IAM
- Enable all cloud-native security services (GuardDuty, Security Hub, Config, CloudTrail)
- Security testing before production deployment
Post-Migration (Ongoing):
- Continuous compliance monitoring
- Regular IAM access reviews
- Cloud security posture assessments
- Penetration testing in cloud environment
- Tabletop exercises for cloud IR scenarios
Step 10 - Compliance:
- Leverage AWS compliance certifications (SOC 2, ISO 27001, PCI-DSS)
- Use AWS Artifact for audit evidence
- Implement AWS Config rules for continuous compliance
- Document shared responsibility matrix
Step 11 - Synthesis:
- Cloud security requires different mindset (zero-trust, identity-centric, API-driven)
- Shared responsibility model is critical—must secure what AWS doesn't
- Major risks: Misconfigurations, IAM vulnerabilities, insufficient monitoring
- Opportunities: Cloud-native security services, automation, scalability
- Success factors: Training, least privilege, defense-in-depth, monitoring, IaC
- Recommendation: Proceed with migration, but implement security roadmap in parallel
Reference Materials (Expandable)
Essential Organizations and Resources
NIST (National Institute of Standards and Technology)
- Cybersecurity Framework: https://www.nist.gov/cyberframework
- SP 800 Series: Security and privacy controls, risk management
- National Vulnerability Database (NVD): https://nvd.nist.gov/
CISA (Cybersecurity and Infrastructure Security Agency)
- Alerts and Advisories: https://www.cisa.gov/topics/cyber-threats-and-advisories
- Known Exploited Vulnerabilities Catalog: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
- Resources: Free tools, training, best practices
MITRE
- ATT&CK Framework: https://attack.mitre.org/
- CVE Program: https://www.cve.org/
- CAPEC: Common Attack Pattern Enumeration and Classification
OWASP (Open Web Application Security Project)
- Top 10: https://owasp.org/www-project-top-ten/
- Testing Guide: https://owasp.org/www-project-web-security-testing-guide/
- Cheat Sheets: https://cheatsheetseries.owasp.org/
SANS Institute
- Internet Storm Center: https://isc.sans.edu/
- Reading Room: Thousands of security papers
- Critical Security Controls: https://www.cisecurity.org/controls
Key Standards and Frameworks
ISO/IEC 27001: Information Security Management System ISO/IEC 27002: Information Security Controls PCI-DSS: Payment Card Industry Data Security Standard HIPAA: Health Insurance Portability and Accountability Act (Security Rule) SOC 2: Service Organization Control 2 (Trust Services Criteria) GDPR: General Data Protection Regulation NIST SP 800-53: Security and Privacy Controls CIS Controls: Center for Internet Security Critical Security Controls FedRAMP: Federal Risk and Authorization Management Program
Vulnerability Databases
- National Vulnerability Database (NVD): https://nvd.nist.gov/
- CVE: https://www.cve.org/
- Exploit-DB: https://www.exploit-db.com/
- VulnDB: https://vulndb.cyberriskanalytics.com/
Threat Intelligence Sources
- CISA Alerts: https://www.cisa.gov/news-events/cybersecurity-advisories
- US-CERT: https://www.cisa.gov/uscert
- Threat Intelligence Platforms: Recorded Future, Mandiant, CrowdStrike
- Open Source: AlienVault OTX, MISP, threat feeds
Security Tools and Platforms
Vulnerability Scanning: Nessus, Qualys, Rapid7 InsightVM SAST: SonarQube, Checkmarx, Veracode DAST: Burp Suite, OWASP ZAP, Acunetix SIEM: Splunk, Elastic, Sentinel, Chronicle EDR: CrowdStrike, SentinelOne, Microsoft Defender for Endpoint CSPM: Prisma Cloud, Wiz, Orca Security
Certifications
- CISSP: Certified Information Systems Security Professional
- CISM: Certified Information Security Manager
- CEH: Certified Ethical Hacker
- OSCP: Offensive Security Certified Professional
- GCIH: GIAC Certified Incident Handler
- Security+: CompTIA Security+
Communities and Resources
- r/netsec: https://www.reddit.com/r/netsec/
- Krebs on Security: https://krebsonsecurity.com/
- Schneier on Security: https://www.schneier.com/
- Dark Reading: https://www.darkreading.com/
- The Hacker News: https://thehackernews.com/
Verification Checklist
After completing cybersecurity analysis:
- Identified all critical assets and data
- Analyzed attack surface and entry points
- Conducted threat modeling appropriate to scope
- Identified vulnerabilities and assessed severity
- Evaluated existing security controls for effectiveness
- Analyzed risk using quantitative or qualitative methods
- Assessed detection and response capabilities
- Developed prioritized remediation recommendations
- Considered compliance requirements
- Mapped threats to MITRE ATT&CK framework (if applicable)
- Applied defense-in-depth and zero-trust principles
- Provided clear, actionable security guidance
- Used security terminology and frameworks precisely
Common Pitfalls to Avoid
Pitfall 1: Checklist Compliance Without Risk Context
- Problem: Following compliance requirements without understanding actual risks
- Solution: Risk-based approach—understand threats and business context, not just checkboxes
Pitfall 2: Perimeter-Only Security
- Problem: Assuming network perimeter protects everything inside
- Solution: Defense-in-depth and zero-trust—assume breach, protect assets themselves
Pitfall 3: Alert Fatigue and False Positives
- Problem: Too many low-quality alerts overwhelm responders
- Solution: Tune detections, prioritize high-fidelity alerts, automate response where possible
Pitfall 4: Ignoring Human Element
- Problem: Focus only on technical controls, ignore social engineering and insider threats
- Solution: Include security awareness, privileged user monitoring, insider threat programs
Pitfall 5: Point-in-Time Assessment
- Problem: One-time security review without continuous monitoring
- Solution: Continuous security—ongoing monitoring, vulnerability management, threat intelligence
Pitfall 6: Vulnerability Scoring Without Context
- Problem: Prioritizing by CVSS alone without considering exploitability or business context
- Solution: Risk-based prioritization—consider threat intelligence, exploitability, asset criticality
Pitfall 7: Security as Blocker
- Problem: Security seen as obstacle to business objectives
- Solution: Enable business securely—balance risk and business value, provide secure alternatives
Pitfall 8: Ignoring Supply Chain and Third Parties
- Problem: Focus only on first-party systems, ignore dependencies
- Solution: Supply chain risk management—assess third-party security, dependency vulnerabilities
Success Criteria
A quality cybersecurity analysis:
- Applies appropriate security frameworks and methodologies
- Identifies and prioritizes risks using threat modeling
- Evaluates security controls across multiple layers (defense-in-depth)
- Provides actionable, prioritized remediation recommendations
- Grounds analysis in threat intelligence and industry best practices
- Considers both technical and human factors
- Addresses detection and response, not just prevention
- Maps to recognized standards (MITRE ATT&CK, NIST CSF, etc.)
- Balances security with business objectives
- Demonstrates deep security expertise and critical thinking
- Communicates clearly to both technical and non-technical audiences
- Uses security concepts and terminology precisely
Integration with Other Analysts
Cybersecurity analysis complements other perspectives:
- Computer Scientist: Deep technical understanding of systems and code
- Lawyer: Legal implications of breaches, regulatory compliance requirements
- Economist: Cost-benefit analysis of security investments, cyber insurance
- Psychologist: Human behavior, social engineering, security culture
- Political Scientist: Nation-state threats, geopolitical cyber conflict, policy
Cybersecurity is particularly strong on:
- Threat modeling and risk assessment
- Vulnerability analysis
- Defense-in-depth design
- Incident detection and response
- Compliance and standards
Continuous Improvement
This skill evolves through:
- New threat actor TTPs and attack techniques
- Emerging vulnerabilities and exploits
- Evolution of security technologies and practices
- Lessons learned from security incidents
- Updates to frameworks and standards
- Cross-disciplinary security research
Skill Status: Complete - Comprehensive Cybersecurity Analysis Capability Quality Level: High - Enterprise-grade security analysis with modern frameworks Token Count: ~8,500 words (target 6-10K tokens)