13.4 Flashcards
Security Requirements Guides (SRGs)
Collections of requirements applicable to a given technology family.
4 Core SRGs
Application
Network Infrastructure
Operating System
Policy
Bind Account
Common type of account used to connect an application to its database.
- Must have full admin access to the database, in order for the application to function properly.
- Disables users after 35 days of inactivity
Database Management System (DBMS)
Controls all database resources in order to secure dataset access
Password Complexity
Measure of the effectiveness of a password in resisting attempts at guessing and brute force attacks.
How to Use Password Complexity
Minimum length Number of upper and lower case characters Number of numeric characters Number of special characters Password reuse
RBAC
Access control used to limit exposure.
Least Privilege
Processes operate at privilege levels no higher than necessary to accomplish required
organizational missions and functions.
Databases limit DoS attacks by.
Limiting number of connections a user can be opened by a single user.
Database Clustering
SQL Injection
Attack in which malicious code is inserted into strings that are later passed to a SQL Server for execution