3.4 Explain the importance of secure staging deployment concepts. Flashcards

1
Q

Sandboxing

A

Sandboxing is the process of creating separate running environments for applications and ensuring you restrict communication between these running environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Environment

A

When implementing a system, it is very important to deploy the system in a secure manner, following any change management processes that your organization has put in place. Make sure to keep separate the system that is used to develop the solution from the system that is used to test the solution, and from the system that is used to run the production version of the solution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Environment - Development

A

The development system or systems are used to develop or create the design of the solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Environment - Test

A

Once the design is created, it is then tested on a test system or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Environment - Staging

A

Once the initial testing of the solution is completed, the solution is moved to the staging environment where more production-like validation is performed to ensure that the solution works.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Environment - Production

A

After staging, you then place the solution into production.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Secure Baseline

A

A secure baseline is a set of configuration settings that places a system in a secure state. Each system should have a secure baseline applied to ensure that it meets the security requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Integrity Measurement

A

Integrity measurement in computer security is ensuring that you are aware of any changes that may occur to an environment. To implement integrity of the system, be sure to use auditing features and hashing technologies to track changes to the system and files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly