2.1 Explain the importance of security concepts in an enterprise environment Flashcards
Explain the security concepts of CONFIGURATION MANAGEMENT
Configurations are changing constantly. OS’s are changing, there will be patches, updates, network modifications, new application instances, etc. You need to document hardware and software settings to be able to rebuild the baseline in case a disaster occurs.
Explain DIAGRAMS in configuration management
This is part of the documentation that you will be noting for a baseline configuration. You need to document network diagrams like the physical wire or device, you need to have a diagram of the physical data center layout, even individual device diagrams like individual cabling. Diagrams are useful to keep track of all the hardware and software configs in case of an incident.
Explain the BASELINE CONFIGURATION in configuration management
You will need to keep a well defined baseline configuration of an application environment like standard firewall settings, up-to-date patch levels, up-to-date OS versions. Over time, this will need to be updated in the baseline documentation to account for these changes. This documentation helps to perform integrity checks so that you can make note of any deviation in the system and see what that deviation is doing exactly.
Explain STANDARD NAMING CONVENTIONS in Configuration management
This is to be easily understood by everyone and allows for accountability and easier IDing of these devices. Things like asset tags and numbers, computer names, serial numbers, etc. Even with networks like port numbers, Vlans, etc. Even with domain configurations, there should be a standard for user names, email addresses, etc.
Explain INTERNET PROTOCOL (IP) SCHEMA in Configuration Management
It is to ensure there is consistent addressing for network devices. It helps to avoid duplicate IP addressing. It can also allow for you to sent a standardization for the number of subnets and hosts per subnet.
Explain DATA SOVEREIGNTY
Data sovereignty is data that resides in a country and is subject to the laws of that country. Some laws may prohibit where data is stored like the GDPR(General Data Protection Regulation) states that data collected on EU citizens must be stored in the EU. These laws have complex mesh of technology and legalities. Compliance laws may prohibit you from moving data out of the country.
Explain DATA PROTECTION
Without the protection of data, an organization can go out of business. Data is everywhere(storage device, on a network, in a CPU). You can protect data with encryption, security policies, etc. Data should have permission because not everyone should have access to data. Not everyone has the need to know and clearance.
Explain DATA LOSS PREVENTION (DLP) in Data protection
The point of DLP or Data Loss Prevention is to stop the data leakage before attackers can get ahold of it. There are so many sources of data, that multiple DLP solutions need to be in place to safeguard against data loss. There are data loss prevention systems, USB blocking on workstations and servers, cloud-based DLP that manages access on the network to the cloud, and Email DLP because email has been the most critical risk factor for data loss.
Explain MASKING in Data Protection
Data masking is data obfuscation that hides some of the original data. It is used to protect PII and other sensitive data. It may only be hidden from view and intact and stored in a a server somewhere; we just need the right permissions in order to view the data. Data masking can be many different techniques like substituting, shuffling, encrypting, masking out, etc.
Explain ENCRYPTION in Data Protection
Encryption is used to encode information into unreadable data. Original info is plaintext and encrypted info is ciphertext. It is a two way street because you can convert between one and the other if you have the proper key, of course. It is meant to confuse the threat because the encrypted data is drastically different than the plaintext.
Diffusion means to change one character in the input, and the result is many different characters in the ouput.
Explain DATA AT REST in Data Protection
Data-at-rest is data that is on a storage device like a hard drive, SSD, flash drive, etc. In order to protect the data, we need to encrypt the data either through whole data encryption, database encryption, file-or folder-level encryption, etc. You can also protect the data by applying permissions like access control lists where only authorized users can access the data.
Explain DATA IN TRANSIT/MOTION in Data Protection
Data-in-transit/motion is data that is transmitted over the network. There is not much protection as it travels through the many different switches, routers, devices, etc. We might set up a firewall or IPS to help protect this as it goes over the network. Another way to protect this data as it travels is by providing encryption like TLS(Transport Layer Security) or IPSec(Internet Protocol Security).
Explain DATA IN PROCESSING in Data Protection
Data-in-use/processing is data that is actively processing in memory like system RAM, CPU registers and cache. The data is almost always decrypted in order to perform quick calculations; otherwise you can’t do much with it. This makes this data very attractive to attackers to steal it out of the RAM.
Explain TOKENIZATION in Data Protection
Tokenization is the process of replacing sensitive data with a non-sensitive placeholder. It completely replaces the sensitive data with temporary data and this is common with credit card processing. This isn’t encryption or hashing because the original data and token aren’t mathematically related and there is no encryption overhead.
Explain RIGHTS MANAGEMENT in Data Protection
Information rights management controls how data is used and can be seen in Microsoft office documents, email messages, and PDFs. It will restrict data access to unauthorized persons like preventing copy and paste, control screenshots, manage printing, restrict editing, etc. Each user is given their own set of rights and the attacker has limited options.