Updated OWASP Top Ten (finally)

OWASP typically updates their Top Ten Web Application Security Risks about every two years, so many of us have been excited and anxious waiting for the new release (the last formal version was published in 2017). Of course, with the way things have been in 2020, a delay is certainly understandable, but it’s nice that the new edition is finally out.

Go check it out here: https://owasp.org/Top10/

For those of you studying for INFOSEC exams where questions specifically about the Top Ten might come up (for instance, the CCSK or CCSP), I don’t know if the test material has been updated to reflect the new OWASP list, or when that might happen. I imagine there will be some lag before the tests can be modified to include the 2021 content. My advice: if you plan to take the exam before January, 2022, study the OWASP 2017; anything later, use the 2021 OWASP version.

Part 2 of "How To Pass Your INFOSEC Exam"

My second Udemy course, Part 2 of “How To Pass Your INFOSEC Exam” is now live! Right now, it contains Section 4 of the series, and eventually I’ll be adding Sections 5 and 6 (hopefully, in the next couple of weeks). Then, within two months, I’ll be adding the final course in the series, Part 3, which will include Sections 7, 8, and 9. If you need some extra study materials, please come check out these courses!

https://www.udemy.com/course/how-to-pass-your-infosec-exam-part-2/?referralCode=D74F45D8F7DCA055E994

Recent CCSP Exam Feedback

One of my former students, Mark Landes, shared this with me today. Mark reminds us of the purpose and use of practice questions: not to learn the material, but to prepare for how to deal with questions about the topics. Thanks, Mark, and congratulations!

”Hi Ben. I was in the CCSP boot camp with ISC2 conference last November. Just wanted to let you know I passed the certification exam in December and got the confirmation of award in late January. Your class and books (study guide and practice exams) were a great help. There were not a lot of direct ‘book questions’ from either, but rather a lot of questions applying the cloud models and technologies the books taught. The practice of answering all those sample questions really helped prepare from a psychological perspective. Thanks again!”

Recent CCSP Feedback

Former student/recent CCSP candidate Jullie Essex had this to share:

“i was a student of your ccsp course during the orlando (isc)2 congress. i am pleased to report that i sat for the exam yesterday and passed.

thank-you for presenting the material. i also purchased “official (isc)2 practice tests” and “the official study guide” authored by you and mr. o’hara. both of these proved to be valuable resources.

the exam was not easy but it wasn’t any worse than the cissp. the topics you emphasized are still pertinent. there were some surprises, however i suspect those questions may have been part of the “25”.”

The 25 she refers to are the questions that aren’t scored on the exam, but are included to evaluate whether they should become actual test questions. Congrats, Julie! And good luck to everyone currently studying for the exam.

It IS Possible To Pass The CCSP With Only 10 Days of Preparation

One of my recent students shared their study/exam experience with me. I think it demonstrates some excellent insight:

”After sleeping on it, I wanted to give you some feedback after preparing for the test almost exclusively with materials written by you an/or delivered by you. First, thank you for putting these materials together, I wouldn't have been able to pass without them. I don't know how you could create material that would adequately prepare someone for that test. I got a 81 on the last "fresh" practice test I took, the second one in your example test book. The real exam was MUCH harder than any of the practice tests in any of your books. I felt I was pretty hosed after getting 5 questions into the real test, but stuck through it and was re-checking and changing answers right up until the very end. I feel like the preparation got me the right answer to about 1/2 of the questions, good test taking skills eliminated around 1/2 of the remaining wrong answers, and serious logical deduction got me over the edge.


Some examples would include:

The questions would not have been satisfied by just knowing what HIPAA is, but by knowing what a HIPAA BAA was and used for.

It wasn't just about what PCI-DSS was, but about how their rules effected security practitioners as detailed here https://blog.pcisecuritystandards.org/are-you-ready-for-30-june-2018-sayin-goodbye-to-ssl-early-tls

Not only what a TPM is, but how it is utilized and appropriate use cases.


Despite all of this, technically it is possible to pass the exam while only getting 45/125 questions correct. There were at least 3 questions where the correct answer was given elsewhere in the exam, or could be deduced from different questions. Test taking skills such as, if two options are the same you can eliminate both of them as options were indispensable. What it boils down to is that if you go into the exam only know 1/2 of the answers (around 1/2 of my answers were flagged after the first go round), find 2 or 3 answers elsewhere in the exam, and eliminate about 1/2 of the answer options in the remaining questions, you'll wind up with more than a passing score.


Thanks again for all your help.”


That student also followed up with:

”Here is some more material you are free to use.

How I passed the CCSP in 10 days and study plan.

Friday: Was offered a chance to fill in for someone who had to bail on the CCSP crash course.

Sunday: Received CCSP ISC2 Study Guide.

Sunday-Thursday: study/read/took  1 chapter practice test in morning and 1 in evening… about 2 hours a day.

Friday: Re-read/re-took the practice tests for the sections I struggled with. I found that I had gotten 85-95 on every chapter except chapters 7 and 11. Generally skimmed over materials again. Honestly I did this while waiting in line at an amusement park. Rides make great study breaks and ride lines make a good place to study.

Saturday-Sunday: ISC2 CCSP crash course.

Sunday: picked up official CCSP guide to the CCSP CBK at ISC2 book store. Re-read the sections I was struggling with (legal compliance). Took 1 of the official ISC2 practice tests while at airport/flying home… got an 81. Watched a couple 5 minute or shorter youtube videos on concepts I was weak on (REST vs SOAP)

Monday: Went to work, left early, studied outside test center for 2 hours… practiced my brain dump. They give you a grease pen and paper at the test center so you want to write down your [mnemonic] memory aids if you have any. Took the entire time. I flagged around ½ my questions on my first pass so I was not super confident, but after some serious thinking got it down to where I thought I passed. I think it is important to brush up on good test taking skills before taking something like this, and I think that tips like, “if 2 answers are essentially the same, they are both wrong” got me through. I have no idea how I really did, but I did pass. All in all it was an honest 30-40 hours of study and real application to pass.”

WOW— I am stunned and impressed by this accomplishment. I do NOT recommend that anyone try to cram for the test with such a limited timeframe…but it is evidently possible to pull off.

CCSP How-To: A Legit Cheat-Sheet

A recent CCSP test-taker posted a blog entry (and made a related Reddit post) about their own experience in studying for/taking the exam…it is incredibly detailed and thorough, and reads very well. When I teach test-prep classes, I try to convey a list of “foot-stompers”: those elements of the material that are crucial and which candidates should really drill down on for the exam…this blog entry seems like a perfect list of foot-stompers to me. Enjoy!

“Preparation Guide for ISC2 Certified Cloud Security Professional (CCSP) Certification” by Stanislas Quastana

https://stanislas.io/2018/07/12/preparation-guide-for-isc2-certified-cloud-security-professional-ccsp-certification/

CCSP Feedback From Today

Got this from a former student today:

”I certainly don't want to scare anyone who hasn't taken it yet but I thought it was fairly difficult. Moreso than the CISSP in my opinion. Some of the questions seemed pretty out of left field based on the material we studied. And I think as we all know, the wording and phrasing of the question is super key so you have to pay very close attention to that or you'll get tripped up. Can't emphasize that enough. 180min duration and I wrapped with 7mins left but that was after I went through and reviewed EVERY answer a second time and some three times.”

Good to know.

The Flatline Cohesion Principle

This week’s CCSP class pointed out that one of the multiple-choice answers in my book of practice tests included the term “flatline cohesion principle.” They asked me what it meant, and I had to admit that I had no clue…maybe it meant that I was drinking too much scotch when I wrote the book?

Turns out, it was a nonsense term I invented as a distractor from the correct answer to that specific question. So we discussed the idea, and decided we had to come up with a definition for the completely blank term.

The consensus was that it should mean: “When you write a book of practice tests that may or may not have complicated, misleading questions in it, then use your class to crowdsource how worthy the material is for study purposes.”

I do like this. But I am very open to alternative uses for the term. If someone comes up with something better, put it in the Comments section, and I’ll send you a free copy of the book. I will be the sole judge of what constitutes “better.”

In the meantime: everyone should follow the flatline cohesion principle.

And many, many thanks to this week’s CCSP class participants: y’all were awesome, and I think you’re all gonna to conquer the exam.

CCSP Test Feedback

From a recent student:

”I found it to be quite challenging, mostly because more than a few of the questions and / or answers were so tersely worded that it was very hard to determine what was being asked.  I also ran into some test questions on concepts that weren’t covered in the course material, or if they were,  it was in passing and didn’t really justify the attention it got on the exam.  However, I passed, so it’s all behind me now.  :^) “

Ditching the ALE

At this point in my career, I deliver a lot of certification prep content, through teaching and writing. And I see certain things that were included at the outset of the industry as guidelines and suggestions that just aren't applicable anymore (or at least, not applicable in the same way as when they were proposed). My primary customer is ISC2, for the CISSP and CCSP certs, but I've taught ISACA and CompTIA certification prep courses in the past, and many of them suffer from the same problems. While I can't say for certainty exactly why all the major INFOSEC certifications suffer from the same blind spots, I can guess: most of the test writers have the same training in the same fundamental concepts, get the same certifications (from multiple vendors), and have received that content from their predecessors, and will pass it to the next generation in kind.

This leads to the possibility of stagnancy in content and approach. Which isn't terrible, for certain fundamental security concepts (say, defense-in-depth/layered approach/multiple redundant controls, or the use of two-person integrity), but there are other notions/ideas that are simply treated as sacrosanct in perpetuity, instead of being re-examined for validity, assessed as nonsense, and thrown onto the trash pile of history.

Today, I want to talk about one of the latter: the ALE formula.

If you don't what it is, consider yourself lucky. Then consider yourself unlucky, because if you're going to go get an INFOSEC cert, I can tell you for damn sure that it's going to be one of the things you're going to have to learn and memorize whether you like it or not.

Simply put, it's an approach to estimating the cost of a given type of negative impact as the result of security risk being realized. We teach INFOSEC practitioners that this value determination can be used to weigh the possible costs of controls to address a particular risk, and figure out whether or not to spend the money protecting against it.

Which is a good idea: spending too much on addressing a particular threat is just as bad as not spending enough...and, arguably, sometimes worse, because spending too much leaves you with a false sense of security and a lack of money, where not spending enough just means you have some of that risk left.

But the ALE formula is not really the best tool to accomplish this in our realm of INFOSEC, for many, many reasons. And we should stop requiring its use, and teaching it to newbies.

Why? Well, for starters, let's talk about the potential cost of a single type of incident, known in the formula as the SLE.

It's worth noting that the ALE formula works great in the physical security universe, where tangible assets can be mapped to specific losses. If I'm trying to secure a retail space selling goods that are of a particular size, shape, weight, and cost, I know some discrete, objective information about those assets. I know how many can be stolen at one time, by a single person picking them up and walking off with them. I know the amount (number and dollar value) of my inventory, based on another limiting factor: the footprint of my retail space and storage area. I know the various access points to get at my inventory: the doors/windows/loading areas. All these things can be defined and somewhat limited.

With electronic data as assets, all this numeric determination goes out the window (I mean, not the literal window, like tangible assets, but a metaphorical window, because the determination is impossible). I can't really know how many "data"s a person can steal at any given moment, because the size of files or objects or characters don't really have any meaning in the physical universe-- a flashstick that weighs less than an ounce can carry one file or a thousand files, and any given file can contain one character, or a million characters, and all of this fits inside one person's pocket, anyway (and that person doesn't need any exceptional muscles to carry even the heaviest flashstick).

So trying to determine the monetary impact of a single security event involving data is impossible, unlike the impact of a single security event involving physical assets. If someone steals one spoon in a retail environment, we know the cost of that spoon (and we actually know several costs: the wholesale cost we paid to get the spoon, the retail cost of what we would have realized in revenue if we sold that spoon, and the logistical cost of getting that spoon to the retail location)...but if someone steals a file, the value of the information in that file can vary wildly. A file might contain a photo of the user’s pet kitten (which is of value only to the user, and then only arguably at that, if the user has a copy of the photo), or it can contain the privacy data of the target organization’s entire customer base, and the relevant monetary impact can stretch into the range of millions of dollars, as the result of statutory damages assessed against the organization, or the loss of market share, or direct fraud on the part of the perpetrator using that information, and so on.

Sure, insurance companies in recent years have created various approaches to assigning value to data, but these are all just gibberish. Take, for instance, the idea of “average file cost”-- even if we were to determine the midpoint of value between the kitten photo and the customer list, that medium value would be meaningless when we suffered an actual loss: if we lost the kitten photo, and the insurance claim paid the amount of “average cost,” we’d be receiving far more in cash payout than the thing was worth, and if we lost the customer list the “average cost” claim payout would be far less than the damage we’d suffered. And what’s the size/value of an “average” file, anyway? How many files are there in a given business environment? The concept is absolutely pointless.

When the SLE is just a fictional construct, the entire ALE formula is ridiculous. We could use just this argument to eliminate the wretched thing from our industry. But there are even more reasons why ALE is stupid in the INFOSEC world-- and I’ll get to those in subsequent articles.