3.2 Securing Hosts & Applications Flashcards
What vulnerability exists with anti-virus/malware software?
Relies on known code signatures to detect malware and attackers have figured out ways to bypass this detection
Define Endpoint Detection & Response (EDR) and capabilities it provides
- Uses methods, other than signatures, such as actions to detect malware
- Uses lightweight AI to take actions, such as quarantining files, isolating system from network, or rolling back to a known good config to remedy/detect malware
Define Data Loss Prevention (DLP) (2)
- Prevents sensitive information from being transported on or outside of the network
- Can run on a variety of end-points to provide a robust solution
Define NGFW (2)
- Next Generation Firewall, aka Application Layer Gateway, stateful
- Works at application layer to allow/deny specific applications or sub-features of applications
Define HIPS (2)
- Host-based Intrusion Prevention System
- Runs on OS to actively monitor and block malicious actions
Define HIDS - Host-based Intrusion Detection System
Secondary system that monitors log files for intrusions and can reconfigure host protection to block those
3 reasons to use Host-based Firewall
- Concept Layered Protection - Defense in Depth
- Has direct access to traffic before it is encrypted and sent over network
- Has access to monitor the operating system and detect issues
What protections does UEFI BIOS provide, relative to the BIOS software?
Uses manufacturer’s public key to prevent malicious BIOS updates
4 steps of the UEFI Secure Boot Process
- Secure Boot Process
- Trusted Boot Process
- Measured Boot Process
- Boot Attestation
What does the secure boot process verify?
Verifies that the digital signature of the bootloader matches with the digital signature of the OS to ensure that the bootloader hasn’t been tampered with
What 3 things are verified during the trusted boot process?
- Verifies the digital signature of the OS Kernel
- OS Kernel verifies boot and start-up files
- OS runs ELAM (early launch anti-malware) and verifies digital signatures of all drivers before loading them
What occurs during the measured boot process?
Generates a hash from all the files loaded in the secure and trusted boot processes that can be compared against the same hash that is stored in the TPM
What is boot attestation? (2)
- Comparing a hash generated from all the files loaded during the boot process to a known good hash previously stored in the TPM
- Can be done locally or forwarded to a remote system to verify that the OS booted up is trusted
Define hardware root of trust
Using physically installed hardware as the basis of trust in a system since unlike software, it can only be modified by physically accessing it
TPM - Trusted Platform Module provides (3):
- hardware root of trust
- cryptographic functions
- secure storage of keys and other system info