2.6 - Security Best Practices Flashcards
1
Q
Data encryption
A
- Full-disk encryption
– Encrypt data-at-rest - File system encryption
– Individual files and folders - Removable media
– Protect those USB flash drives - Key backups are critical
– You always need to have a copy
– This may be integrated into Active Directory
– You’ll want to keep the key handy
2
Q
Password complexity and length
A
- Make your password strong
– Resist guessing or brute-force attack - Increase password entropy
– No single words, no obvious passwords
– Mix upper and lower case and use special characters - Stronger passwords are at least 8 characters
– Consider a phrase or set of words
3
Q
Password expiration and recovery
A
- All passwords should expire
– Change every 30 days, 60 days, 90 days
– System remembers password history,
requires unique passwords - Critical systems might change more frequently
– Every 15 days or every week - The recovery process should not be trivial!
– Some organizations have a very formal process
4
Q
Password best practices
A
- Changing default usernames/passwords
– All devices have defaults
– There are many web sites that document these - BIOS/UEFI passwords
– Supervisor/Administrator password:
Prevent BIOS changes
– User password: Prevent booting - Requiring passwords
– Always require passwords
– No blank passwords
– No automated logins
5
Q
End-user best practices
A
- Require a screensaver password
– Integrate with login credentials
– Can be administratively enforced - Does not require user intervention
– Automatically locks after non-use or timeout - Secure critical hardware
– Laptops can easily walk away -
– Lock them down
6
Q
Securing PII and passwords
A
- Personally identifiable information
– Name, address, social security number, etc. - Control your input
– Be aware of your surroundings - Use privacy filters
– It’s amazing how well they work - Keep your monitor out of sight
– Away from windows and hallways
7
Q
Account management
A
- User permissions
– Everyone isn’t an Administrator
– Assign proper rights and permissions
– This may be an involved audit - Assign rights based on groups
– More difficult to manage per-user rights
– Becomes more useful as you grow - Login time restrictions
– Only login during working hours
– Restrict after-hours activities
8
Q
Disabling unnecessary accounts
A
- All operating systems include other accounts
– Guest, root, mail, etc. - Not all accounts are necessary
– Disable/remove the unnecessary
– Disable the guest account - Disable interactive logins
– Not all accounts need to login - Change the default usernames
– User:admin Password:admin
– Helps with brute-force attacks
9
Q
Locking the desktop
A
- Failed password attempts
– Should lock the account and/or reboot after
a certain threshold
– Prevents online brute force attacks - Automatically lock the system
– After a certain amount of inactivity
– Or when you walk away
10
Q
AutoRun and AutoPlay
A
- Disable AutoRun on older OSes
– autorun.inf in Vista
– No Autorun in Windows 7, 8/8.1, 10, or 11
– Disabled through the registry - Disable AutoPlay
– Configure in Settings >
Bluetooth & devices >
AutoPlay - Get the latest security patches
– Updates to autorun.inf and AutoPlay