Who We Are xxi Introduction 1 Who Is This Book For? What the Book Covers Writing Conventions Road Map 1 First Principles 9 Overview What Are First Principles? What Is the Atomic Cybersecurity First Principle? Conclusion 2 Strategies 41 Overview Strategies vs. Tactics What Are the Essential Strategies Required for a First Principle Infosec Program? Zero Trust Strategy Overview- Intrusion Kill Chain Prevention Strategy Overview Resilience Strategy Overview Risk Forecasting Strategy Overview Automation Strategy Overview Conclusion 3 Zero Trust 57 Overview The Use Case for Zero Trust: Edward Snowden Zero Trust: Overhyped in the Market but. Cyber Hygiene, Defense in Depth, and Perimeter Defense: Zero Trust Before We Had Zero Trust Zero Trust Is Born Zero Trust Is a Philosophy, Not a Product Meat- and- Potatoes Zero Trust Logical and Micro Segmentation Vulnerability Management: A Zero Trust Tactic Software Bill of Materials: A Zero Trust Tactic Identity Management: A Tactic for Zero Trust Single Sign- On: A Zero Trust Tactic Two- Factor Authentication: A Tactic for Zero Trust Software- Defined Perimeter: A Tactic for Zero Trust Why Zero Trust Projects Fail Conclusion 4 Intrusion Kill Chain Prevention 121 Overview The Beginnings of a New Idea The Lockheed Martin Kill Chain Paper Kill Chain Models Cyber Threat Intelligence Operations as a Journey Red/Blue/Purple Team Operations: A Tactic for Intrusion Kill Chain Prevention Intelligence Sharing: A Tactic for Intrusion Kill Chain Prevention Conclusion 5 Resilience 203 Overview What Is Resilience? Crisis Handling: A Tactic for Resilience Backups: A Tactic for Resilience Encryption: A Tactic for Resilience Incident Response: A Tactic for Resilience Conclusion 6 Risk Forecasting 255 Overview Superforecasting, Fermi Estimates, and Black Swans Bayes Rule: A Different Way to Think About Cybersecurity Risk Risk Forecasting with the Bayes Rule: A Practical Example Conclusion 7 Automation 307 Overview Why Security Automation Is Essential Early History of Software Development Philosophies DevSecOps: An Essential Tactic for Automation Compliance: A First Principle Tactic That Cuts Across All Strategies Chaos Engineering for Automation and Resilience Conclusion 8 Summation 341 Overview Zero Trust Conclusion Index 351.
Cybersecurity First Principles: a Reboot of Strategy and Tactics