Comprehensive study guide for CompTIA CySA+ CS0-003
Log Sources: Effective SIEM use requires ingesting Windows Event Logs (Security, System, Application), syslog from network devices, web server access logs, firewall logs, and DNS query logs. Normalizing these into a common schema enables correlation.
Correlation Rules: SIEM correlation rules detect patterns — e.g., multiple failed logins followed by a successful login from the same source IP within 5 minutes = potential brute force success. Tuning rules reduces false positives.
Threat Hunting: Proactive threat hunting uses hypotheses based on threat intelligence (e.g., "APT29 uses living-off-the-land binaries"). Hunters search for indicators of the hypothesis using logs, EDR telemetry, and network captures without waiting for alerts.
ATT&CK organizes adversary TTPs (Tactics, Techniques, and Procedures) into 14 tactics: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, C2, Exfiltration, and Impact. CySA+ analysts map detections to ATT&CK IDs (e.g., T1059 = Command and Scripting Interpreter).
Base Score Metrics: Attack Vector (Network, Adjacent, Local, Physical), Attack Complexity (Low/High), Privileges Required, User Interaction, Scope (Changed/Unchanged), Confidentiality/Integrity/Availability Impact. Base scores range 0.0–10.0.
Temporal Metrics: Exploit Code Maturity, Remediation Level, Report Confidence. These adjust the base score based on current exploitation activity — a Critical with Proof-of-Concept exploit is higher priority than one with Unproven exploit code.
Prioritization: CySA+ analysts combine CVSS scores with asset criticality, exposure (internet-facing vs. internal), and threat intelligence (CISA KEV catalog) to prioritize remediation. A CVSS 7.5 on an internet-facing critical asset outranks CVSS 9.8 on an isolated dev server.
Detection & Analysis: Alert triage begins with validating the alert (true positive vs. false positive), then scoping the incident — how many systems are affected, what data may be at risk, lateral movement indicators? SIEM, EDR, and threat intelligence are used together.
Containment: Short-term containment (isolating affected hosts, blocking C2 IPs) preserves evidence while limiting damage. Long-term containment may involve patching, credential rotation, and reimaging while business operations continue on clean systems.
Post-Incident Activity: The lessons-learned meeting (held within 2 weeks of resolution) identifies process gaps, detection failures, and control improvements. Outputs: updated playbooks, new detection rules, revised asset inventories, and management reports.
MTTD (Mean Time to Detect): The average time between when a security incident occurs and when the SOC first detects it. Lower MTTD reduces the attacker's dwell time. Industry benchmark: under 24 hours for critical incidents.
MTTR (Mean Time to Respond/Remediate): The average time from detection to full containment and remediation. Tracked separately for incident response (containment) and vulnerability management (patching). Patch SLAs typically: Critical = 24h, High = 7d, Medium = 30d, Low = 90d.
Executive Reporting: Board and executive reports emphasize business risk, compliance posture, and trend data — not technical details. Frame security metrics in business terms: "Data breach risk reduced 40% through patch compliance improvements" rather than "CVE coverage improved."