2.1: Enterprise Security Flashcards
Configuration Management
The only constant is change.
Identify and document hardware and software settings.
Rebuild those systems if a disaster occurs.
Baseline configuration
security of an app evironment should be well defined.
Firewall settings, patch levels, OS file versions.
Standard naming conventions
Create a standard, needs to be understood by everyone.
IP Schema
Ip address plan or model
consistent addressing for network devices. Helps avoid duplicates.
Reserved addresses: Printers, routers etc.
Protecting Data
Data is everywhere, on a storage drive, on the network, in a CPU.
Protecting the data with encryption, security policies.
Data sovereignty
data that resides in a country is subject to the laws of that country.
laws may prohibit where data is stored.
GDPR (General Data Protection Regulation) - Data collected on EU citizens must be stores in EU.
Data Masking
Data obfuscation-hide some of the original data.
Data Encryption
Encode plaintext into cypertext
Two way street, convert between one and the other if you have a proper key.
Data at-rest
Data is on a storage device
encryption can be individual or whole disk encryption
Apply permissions to limit access on a per user basis
Data In-Transit
Data transmitted over the network
Not much protection as it travels
Network based protection through firewall, IPS
Transport encryption TLS, IPSec
Data In-use
In RAM, Caches or CPU register.
almost always decrypted.
can be picked straight out of ram by an attacker.
Tokenization
Replace sensitive data with a non sensitive placeholder
Not encryption or hashing, no overhead.
Hashing
Represent data as a short string of text(message digest)
One way trip, can’t unhash a hash to get the original data.
Hot Site
Exact replica and duplicate of everything, ready to go at a moments notice.
Cold Site
No hardware, empty building.
No data or people, everything has to be brought.
Honeypot
system or series of systems that look very attractive to an attacker.
Honeynet
multiple honeypots to gather info from multiple sources.
Honeyfiles
Attractive bait inside the honeynet. alert is sent if file is accessed.
virtual bear trap.
DNS sinkhole
gives a reponse back with incrorrect/bad info.
Useful to redirect machines infected to track a known site that malware infected machines would try and visit.