4.4 Incident, apply mitigation techniques or controls to secure an environment Flashcards
Endpoint configuration: what are the different security controls for endpoints?
- Application approved /deny lists
- OS
Endpoint configuration: why some application are allowed /denied ?
Because some app can be dangerous and contain vulnerabilities, trojan horses, malware
Endpoint configuration: why OS are important for security endopoint ?
Decisons are made in the OS:
- App: allow app with this unique identifier
- OS can allow digitally signed apps from certain publisher (ex: anything signed by microsoft is trusted but not the rest)
- Path: allow application that are install in a specific folder
Security configuration: what can be configured to tighten security?
- Firewall rules
- MDM
- DLP
- Content filter/ URL filter
- Updating or revoking certificates
Security configuration: what is isolation?
Administratively isolate a compromised device from everything else
Security configuration: what can be isolated?
- Network: remediation VLAN
- Process: limit app execution, prevent malicious activity
Security configuration: what is containment?
Run application in its own sandbox
Security configuration: why containment help in security?
Limit interaction with host OS and other application. Therefor, malware would have no method of infection
Security configuration: what is SOAR?
Security Orchestration, Automation and Response helps coordinate, execute and automate tasks between various people and tools all within a single platform.
Ex: reset password, create website certificate, backup data app