2.1 Flashcards
Configuration management
Document os, patches, app updates, network modifications, new app instances etc
Identify and document settings
Rebuild these in instances if disasters occur
Use diagrams for networks and even physical wires
Ip schema
Protecting data
So many locations so sec policies and encryption
Data sovereighty
Laws per country depending on where the data resides like the gdpr in eu
Data masking
Or obfuscation that hides data info lime receipts showing ***
Diffusion
Change one character of input and make characters change in encryption output
Data at rest
On a file on storage device like ssd, flash drivez
Need whole disk encryption, data base encryption or file folder level encryption
Then apply permissions
Data in transit or motion
Going between switches, routers and devices,
need firewall or IPS to protect
Transport level encryption with transport level security (TLS) or IPsec (internet sec protocol)
Data in use
In system ram, cpu registers and cache
Usually decrypted cause in use
Hackers can pick decrypted data from ram
Tokenization
Replacing sensitive data with a non-sensitive placeholder
Information rights management
Prevents certain function in doc like copy, paste, edit, screenshots etc and only allowing with permission
Data loss prevention
Examining all data in use, in motion and at rest
Can block access To certain hardware like usb storage
There are also cloud based dlp, that observes traffic and restricts based on rules
Managing security
Geographical considerations such as legal concerns when needing to do things in another country like passports and third parties and backups
Response and recovery to know next steps and document all from beginning to end
Ssl/tls inspection
Secure sockets layer, transport layer to block incoming or outgoing info
Uses trusted CAs certificate authorities
Ssl/tls proxy
Firewall ssl decrypt and internal CA
User has internal CA certs
Hello gets sent to server, intercepted by firewall and sents as proxy
To server, server sends back to firewall, and firewall creates new internal CA with internal encryption internally
Api
Application programming interface needs control software and set it up securely because usually logins go through api
Hackers use on path attack to listen and learn the api and insert their own data using api injection
Can use web app firewall