2.1 Configuration management Flashcards
Why configuration management is important?
Because OS, application updates, network modifications, new applications instances etc may have an impact on security.
Why is documentation important in configuration management ?
It is important to indentify and document hardware & software settings to rebuild those systems if a disaster occurs
What type of documentation is needed & important in network configuration management?
- Network diagram: document the physical wire and device to know what is connect to what
- Physical data center layout (inc. physical rack location):
- Device diagrams: to get detailed on where thing are connected to identify & track the path the wire takes from beginning to end
What type of documentation is needed & important in application configuration management?
It is important to document the way the application is designed. Documents such as firewall settings, patch levels, OS file versions are important and may require constant update
Why is it important to adopt a standard naming convention when documenting ?
Create a standard within an organization such as asset tag name & nb, computer names (+location), serial nb, label switches and routers, domain config (usernames, email) makes easier to understand by everyone for mainteance/ disasters.
What is an IP schema ?
An IP address plan or model that help to avoid duplicate IP adressing, with informations like nb of subnets, hosts per subnets, IP ranges, reservered address (printers, routers, users).
Where data can be located within an organization ?
Everywhere: on a storage drive, on the network or CPU of a system
What are the different ways to protect data?
- Encryption
- Security policies
- Data permissions (not everyone has the same access)
What is data sovereignty ?
Data that resides in a country is subject to the laws of that country.
Laws may prohibit where data is stored ( the compliance laws may prohibit moving data out of the country) and what type of data can be kept (GDPR).
What is data masking in a way to protect data ?
Hide some of the original data (ie ***5428 for a CB)
What is data encryption in a way to protect data?
Encode information into a unreadable data (from plaintext to ciphertext).
If one character of the plaintext input is change, it changes many characters of the cypher output
What is data at-rest and how to protect it?
It refers to the data on a storage device (hard drive, SSD, flash drive etc). To be able to protect these data, we may need to:
- Encrypt the data (disk encryption, DB encryption, file/folder level encryption)
- Apply permissions (access control list)
What is data in-transit and how to protect it?
It refers to data transmitted over the network. To protect these data, we may need to:
- Set up a network-based protection (firewall, IPS)
- Provide transport encryption (TLS/SSL, IPsec)
What is data in-use and how to protect it?
It refers to data actively processing in the memory (system, CPU registers and cache), these data is almost always decrypted (otherwise we couldn’t do anything with it).
The attackers can pick decrypted information out of the RAM
What is tokenization when you want to protect data?
When sensitive data are replace with non-sensitive data. It is comminly use with credit card processing (use a temporary token during payment so an attacker capturing card nb can’t use them later).
This is not encrypting or hashing.