CompTIA Security+ Exam Notes

CompTIA Security+ Exam Notes
Let Us Help You Pass

Sunday, September 21, 2025

FIPS 140-3: Cryptographic Module Security Requirements

 FIPS 140-3 (Federal Information Processing Standard Publication 140-3)

FIPS 140-3 (Federal Information Processing Standard Publication 140-3) is a U.S. and Canadian government standard that defines security requirements for cryptographic modules—the hardware, software, or firmware that performs encryption, decryption, key management, and other cryptographic functions. It was published by NIST in 2019 and supersedes FIPS 140-2 1.

Purpose and Scope
FIPS 140-3 ensures that cryptographic modules used to protect sensitive information meet rigorous security standards. It applies to:
  • Federal agencies
  • Contractors working with federal systems
  • Private sector organizations (e.g., banks, healthcare, SaaS providers) that handle sensitive data or want to meet procurement requirements 2.
Key Components of FIPS 140-3
FIPS 140-3 builds on international standards ISO/IEC 19790:2012 and ISO/IEC 24759:2017 and includes:

1. Cryptographic Module Specification
  • Defines the module’s architecture, cryptographic algorithms, key sizes, and operations.
2. Module Interfaces and Ports
  • Specifies how the module connects to other systems and ensures secure data flow.
3. Roles, Services, and Authentication
  • Defines user roles (e.g., admin, operator) and access controls.
4. Software/Firmware Security
  • Ensures secure coding practices and protection against tampering.
5. Operating Environment
  • Addresses the security of the OS or platform hosting the module.
6. Physical Security
  • Includes tamper-evidence, tamper-resistance, and environmental protections.
7. Sensitive Security Parameter (SSP) Management
  • Covers secure handling of keys and other sensitive data.
8. Self-Tests
  • Modules must perform startup and conditional tests to verify integrity.
9. Life-Cycle Assurance
  • Ensures secure development, deployment, and maintenance.
10. Mitigation of Other Attacks
  • Addresses side-channel attacks, fault injection, and other advanced threats 1 3.
Security Levels
FIPS 140-3 defines four security levels, each increasing in rigor:
  • Level 1: Basic security; software-only modules allowed.
  • Level 2: Adds role-based authentication and physical tamper-evidence.
  • Level 3: Requires identity-based authentication and physical tamper-resistance.
  • Level 4: Highest level; protects against environmental attacks and advanced threats.
Validation Process
Validation is conducted through the Cryptographic Module Validation Program (CMVP), jointly run by NIST and the Canadian Centre for Cyber Security. The process includes:

1. Pre-validation: Internal assessments and documentation.
2. Testing: Performed by accredited labs; includes penetration testing and algorithm verification.
3. Post-validation: Ongoing monitoring, updates, and revalidation if changes occur 3.

Why It Matters
  • Trust: FIPS validation is often a baseline requirement for government and enterprise contracts.
  • Security: Ensures cryptographic modules are robust against modern threats.
  • Compliance: Helps meet regulatory requirements (e.g., HIPAA, FedRAMP, PCI-DSS).
  • Global Alignment: Harmonizes with international standards for broader applicability 2.

Tuesday, September 16, 2025

Threat Hunting Explained: From Hypothesis to Response

 Threat Hunting

Threat hunting is a proactive cybersecurity approach that aims to detect and mitigate threats that evade traditional security defenses. Unlike reactive methods that respond to alerts, threat hunting involves actively searching for signs of malicious activity within an organization's systems and networks before an alert is triggered.

Core Concepts of Threat Hunting
1. Proactive Investigation
Threat hunters assume that adversaries are already inside the network and look for indicators of compromise (IOCs), tactics, techniques, and procedures (TTPs) that may signal a breach.

2. Hypothesis-Driven
Hunts often begin with a hypothesis based on threat intelligence, past incidents, or behavioral anomalies. For example:
“What if an attacker is using PowerShell to move laterally across our network?”

3. Data-Driven Analysis
Threat hunters analyze large volumes of data from sources like:
  • Endpoint Detection and Response (EDR)
  • Security Information and Event Management (SIEM)
  • Network traffic logs
  • User behavior analytics
4. Use of Threat Intelligence
External and internal threat intelligence feeds help hunters understand attacker behavior and anticipate future actions.

5. Detection and Response
Once a threat is identified, hunters work with incident response teams to contain and remediate the threat, and update detection rules to prevent recurrence.

Threat Hunting Process
1. Preparation
  • Define scope and objectives.
  • Gather relevant data sources
  • Establish baseline behaviors
2. Hypothesis Creation
  • Based on threat intelligence, known attack patterns, or anomalies
3. Investigation
  • Query logs and data
  • Use tools like YARA, Sigma, or custom scripts
  • Look for patterns, anomalies, and suspicious behavior
4. Validation
  • Confirm whether findings are malicious or benign
  • Correlate with other data sources
5. Response
  • Contain and eradicate threats
  • Document findings
  • Update detection mechanisms
6. Feedback Loop
  • Improve future hunts
  • Refine hypotheses and detection rules
Tools Commonly Used in Threat Hunting
  • SIEM platforms (e.g., Splunk, QRadar, ELK Stack)
  • EDR solutions (e.g., CrowdStrike, SentinelOne)
  • Threat intelligence platforms (e.g., MISP, Recorded Future)
  • Scripting languages (e.g., Python, PowerShell)
  • MITRE ATT&CK Framework – for mapping adversary behavior
Types of Threat Hunting
1. Structured Hunting
  • Based on known TTPs and frameworks like MITRE ATT&CK.
2. Unstructured Hunting
  • Based on anomalies or intuition, often exploratory.
3. Situational Hunting
  • Triggered by specific events or intelligence (e.g., a new vulnerability or breach in a similar organization).
Benefits of Threat Hunting
  • Detects advanced persistent threats (APTs)
  • Reduces dwell time (how long attackers stay undetected)
  • Improves overall security posture
  • Enhances incident response capabilities
  • Strengthens detection rules and automation

Monday, September 15, 2025

U6 Enterprise by Ubiquiti: Tri-Band Wi-Fi 6E for High-Density Networks

 Ubiquiti U6 Enterprise Wireless Access Point

Ubiquiti UniFi U6 Enterprise Review
Overview
The U6 Enterprise is Ubiquiti’s flagship Wi-Fi 6E access point designed for high-performance environments. It supports tri-band connectivity (2.4 GHz, 5 GHz, and 6 GHz), making it ideal for dense client environments, modern homes, and enterprise setups.

Key Features
  • Wi-Fi 6E Support: Adds the 6 GHz band for faster speeds and reduced interference.
  • Tri-Band AXE11000: Offers up to 4,800 Mbps on both 5 GHz and 6 GHz bands, and 600 Mbps on 2.4 GHz.
  • 2.5Gbps PoE+ Port: Enables multi-gig connectivity, ideal for high-speed networks.
  • Compact Design: Despite its power, it’s smaller than many competitors like the NETGEAR WAX630E.
  • No Power Adapter: Requires PoE+ or PoE++ injector or switch; no traditional power port.
Additional Features:
  • Wireless Meshing
  • Band Steering
  • 802.11v BSS Transition Management
  • 802.11r Fast Roaming
  • 802.11k Radio Resource Management (RRM)
  • Advanced Radio Management
  • Passpoint (Hotspot 2.0)
  • Captive Hotspot Portal
  • Custom Branding Landing Page
  • Voucher Authentication
  • Payment-Based Authentication
  • External Portal Server Support
  • Password Authentication
  • Guest Network Isolation
  • Private Pre-Shared Key (PPSK)
  • WiFi Speed Limiting
  • Client Device Isolation
  • WiFi Schedules
  • RADIUS over TLS (RadSec)
  • Dynamic RADIUS-assigned VLAN
Performance
  • Speed: Users report consistent speeds between 700–900 Mbps near the AP and 400–600 Mbps in farther rooms.
  • Bandwidth Distribution: Handles multiple devices better than the U6-LR, evenly distributing bandwidth across clients.
  • Coverage: Rated for up to 1,500 ft, slightly more than the U6-Lite. However, some users noted weaker coverage compared to the U6-LR in fringe areas.
  • MIMO:
    • 6 GHz            4 x 4 (DL/UL MU-MIMO)
    • 5 GHz            4 x 4 (DL/UL MU-MIMO)
    • 2.4 GHz        2 x 2 (DL/UL MU-MIMO)
Setup & Management
  • UniFi Controller Required for Full Features: While it can operate standalone, full functionality (mesh, SSIDs, analytics) requires a UniFi controller or app.
  • Mobile App Setup: Easy setup via Bluetooth or network detection. No web UI for standalone use.
  • Privacy Considerations: Requires a Ubiquiti account for remote management, which may raise privacy concerns.
Pros
  • Excellent performance with Wi-Fi 6E
  • Multi-gig PoE port for high-speed backhaul
  • Great for dense environments with many devices
  • Compact and well-built
  • No subscription required for controller use
Cons
  • No included PoE injector or power adapter
  • Coverage may be slightly less than U6-LR in some setups
  • No web UI for standalone configuration
Ideal Use Cases
  • Enterprise Networks: Offices with high client density
  • Modern Homes: Especially those with gigabit internet and many smart devices
  • Apartments: Where the 6 GHz band can avoid congested RF environments
Final Verdict
The Ubiquiti U6 Enterprise is a top-tier access point for users ready to embrace Wi-Fi 6E and multi-gig networking. While it’s priced higher and lacks some convenience features (like a power adapter), its performance, scalability, and future-proofing make it a compelling choice for both prosumers and businesses.

Out-of-Band Management Explained: Key Concepts, Benefits, and Use Cases

 OOB Out-of-Band Management

Out-of-band management (OOBM) is a method used in IT and network administration to remotely monitor, manage, and troubleshoot systems independently of the primary network connection. It’s beneficial when the main network is down or the system is unresponsive.

Here’s a detailed breakdown:

1. What Is Out-of-Band Management?
Out-of-band management refers to the use of a dedicated management channel that operates separately from the standard data network. This allows administrators to access and control devices even if the operating system is down or the network is unreachable.

2. Key Components
  • Dedicated Management Port: Most enterprise-grade hardware (servers, switches, routers) includes a separate port for OOBM, such as:
    • IPMI (Intelligent Platform Management Interface)
    • iLO (Integrated Lights-Out by HP)
    • DRAC (Dell Remote Access Controller)
    • Cisco's Console Ports
  • Management Network: A separate network infrastructure used solely for management traffic. It’s isolated from the production network for security and reliability.
  • Remote Access Tools: These include SSH, serial console access, or web interfaces that connect through the management port.
3. How It Works
  • The OOBM interface is powered independently of the main system (often via a Baseboard Management Controller or BMC).
  • Admins can:
    • Power cycle the device
    • View system logs
    • Access BIOS/UEFI
    • Mount remote media for OS installation
    • Troubleshoot hardware issues
Even if the OS is crashed or the network is misconfigured, OOBM remains accessible.

4. Benefits
  • Resilience: Access systems during outages or failures.
  • Security: Isolated from the main network, reducing attack surface.
  • Efficiency: Reduces the need for physical presence at data centers.
  • Control: Full hardware-level access, including power and boot settings.
5. Use Cases
  • Data Centers: Managing thousands of servers remotely.
  • Branch Offices: Troubleshooting routers or switches without sending technicians.
  • Disaster Recovery: Accessing systems during major outages.
6. Comparison with In-Band Management



Friday, September 12, 2025

NIST SP 800-207: A Comprehensive Guide to Zero Trust Architecture

 NIST SP 800-207 Zero Trust Architecture

NIST Special Publication 800-207, titled "Zero Trust Architecture (ZTA)", is a foundational cybersecurity framework published by the National Institute of Standards and Technology (NIST) in August 2020. It redefines how organizations should approach security in a world where traditional network perimeters are no longer sufficient.

What Is Zero Trust?
Zero Trust (ZT) is a security philosophy that assumes no user, device, or system should be trusted by default, regardless of whether it is inside or outside the network perimeter. Every access request must be:
  • Explicitly verified
  • Continuously validated
  • Contextually evaluated
This model is a response to modern threats, remote work, BYOD (Bring Your Own Device), and cloud computing.

Core Principles of NIST SP 800-207
NIST outlines seven core tenets of Zero Trust:
1. All data sources and computing services are considered resources.
2. All communication is secured, regardless of network location.
3 Access is granted per session, not permanently.
4 Dynamic policy decisions are based on identity, device posture, and context.
5. Authentication and authorization are enforced before access is granted.
6. Continuous monitoring of asset integrity and security posture.
7. Logging and telemetry are essential for trust evaluation and policy updates.

Key Components of Zero Trust Architecture

NIST SP 800-207 defines a modular architecture with these core components:
Policy Engine (PE): Makes access decisions using identity, risk scores, and telemetry.
Policy Administrator (PA): Enforces decisions by issuing session credentials.
Policy Enforcement Point (PEP): Applies access control near the resource.
These components work together to ensure that access is granular, dynamic, and revocable.

Zero Trust Workflow

A typical ZTA access flow looks like this:
1. Subject (user/device) requests access.
2. PEP intercepts the request.
3. PA consults the PE to evaluate the request.
4. If approved, access is granted only for that session.

This model minimizes the "implicit trust zone" and reduces lateral movement risk.

Deployment Models

NIST SP 800-207 outlines three reference architectures:
1. Enhanced Identity Governance (EIG): Uses IdPs, MFA, and SSO for app-level control.
2. Microsegmentation: Isolates workloads using SDN or host-based agents.
3. Software-Defined Perimeter (SDP): Builds encrypted tunnels between users and services.

Most organizations adopt a hybrid approach tailored to their infrastructure and maturity level.

Implementation Strategy

NIST recommends a phased approach:
1. Asset Discovery
2. Define Trust Zones
3. Model Policies
4. Pilot in a Small Environment
5. Monitor, Adjust, and Expand

This ensures low disruption and high visibility during rollout.

Real-World Threat Mitigation

ZTA helps mitigate:
  • Lateral movement via microsegmentation
  • Credential theft with MFA and session expiration
  • Insider threats through least privilege and behavioral monitoring
  • Supply chain attacks with software attestation and signed artifacts
Compliance and Alignment

SP 800-207 aligns with:
  • NIST 800-53 Rev. 5
  • CMMC 2.0
  • ISO/IEC 27001
  • CIS Controls v8
  • Executive Order 14028
This makes it a strong foundation for both security and regulatory compliance.

Spanning Tree Priority Values: What They Are and Why They Matter

 Spanning Tree Priority Values

In the context of Spanning Tree Protocol (STP), priority values play a crucial role in determining the Root Bridge and the overall topology of a loop-free network. Here's a detailed explanation:

What Are Spanning Priority Values?
Spanning priority values are part of the Bridge ID, which is used to elect the Root Bridge in a network running STP. The Bridge ID consists of:
  • Bridge Priority (2 bytes)
  • MAC Address (6 bytes)
Together, they form an 8-byte identifier unique to each switch.

Role in Root Bridge Election
STP uses the Bridge ID to elect the Root Bridge, which is the central switch in the spanning tree topology. The election process works as follows:
  • Lowest Bridge ID wins.
  • If multiple switches have the same priority, the one with the lowest MAC address becomes the Root Bridge.
By default, the bridge priority is set to 32768 on most switches. You can manually configure it to influence which switch becomes the Root Bridge.

Priority Value Range and Configuration
  • Range: 0 to 65535
  • Lower value = higher priority
  • Common practice:
    • Set Root Primary to a lower priority (e.g., 24576)
    • Set Root Secondary to a slightly higher priority (e.g., 28672)
This ensures predictable Root Bridge selection and failover behavior.

Commands to Set Priority (Cisco Example)

1 spanning-tree vlan 1 root primary
2 spanning-tree vlan 1 root secondary
3

These commands automatically adjust the priority to ensure the switch becomes the Root Bridge (or backup) for the specified VLAN.

Why It Matters
Properly setting spanning priority values:
  • Prevents suboptimal paths
  • Ensures network stability
  • Helps in redundancy planning
If left to default, STP might elect a less optimal switch as the Root Bridge, leading to inefficient traffic flow.

Tuesday, September 9, 2025

NIST SP 800-61r2: A Retrospective on a Pivotal Incident Response Framework

 NIST SP 800-61r2

NIST Special Publication 800-61 Revision 2 (SP 800-61r2), titled Computer Security Incident Handling Guide, is a foundational document published by the National Institute of Standards and Technology (NIST) to help organizations develop and implement effective incident response capabilities. Although it was officially withdrawn in April 2025 and replaced by Revision 3, Revision 2 remains widely referenced and influential 1.

Here’s a detailed breakdown of its contents and guidance:

Purpose and Scope
SP 800-61r2 provides guidelines for incident handling and response, aiming to help organizations:
  • Detect and analyze security incidents.
  • Contain, eradicate, and recover from incidents.
  • Improve incident response capabilities over time.
It is platform-agnostic, meaning it applies regardless of the hardware, operating system, or application.

Structure of the Document

The guide is divided into four major sections:
1. Introduction
  • Defines what constitutes a security incident.
  • Emphasizes the importance of incident response in minimizing damage and recovery time.
  • Encourages proactive planning and continuous improvement.
2. Incident Response Life Cycle

This is the core of the guide, outlining a four-phase lifecycle:
  • Preparation
    • Establish policies, procedures, and tools.
    • Train staff and conduct exercises.
    • Set up communication channels and legal protocols.
  • Detection and Analysis
    • Monitor systems for signs of incidents.
    • Use logs, intrusion detection systems (IDS), and other tools.
    • Classify and prioritize incidents based on impact.
  • Containment, Eradication, and Recovery
    • Short-term and long-term containment strategies.
    • Remove malicious components and restore systems.
    • Validate system integrity before returning to production.
  • Post-Incident Activity
    • Conduct lessons-learned meetings.
    • Update policies and procedures.
    • Improve defenses based on findings.
3. Organizing an Incident Response Capability
  • Discusses team structure (centralized vs. distributed).
  • Covers staffing, training, and resource allocation.
  • Addresses legal and regulatory considerations.
4. Handling Specific Incidents
  • Provides examples of incident types:
    • Network-based attacks
    • Malware infections
    • Insider threats
  • Offers tailored response strategies for each.
Key Principles and Recommendations
  • Incident classification: Not all events are incidents; proper classification is crucial.
  • Evidence handling: Maintain integrity for legal and forensic purposes.
  • Communication: Internal and external communication plans are vital.
  • Metrics and reporting: Track performance and report incidents to stakeholders.
Strengths and Limitations

Strengths:
  • Comprehensive and practical.
  • Adaptable to various organizational sizes and sectors.
  • Encourages continuous improvement.
Limitations:
  • Lacks detailed guidance on emerging threats like ransomware and APTs.
  • Could benefit from a more risk-based approach