5.3 Organizational Security Flashcards

1
Q

a document stipulating constraints and practices that a user must agree to for access to a corporate network, the internet or other resources.
• What is acceptable use of company assets?
– Detailed documentation
– May be documented in the Rules of Behavior
• Covers many topics
– Internet use, telephones, computers,
mobile devices, etc.
• Used by an organization to limit legal liability
– If someone is dismissed, these are the well-documented
reasons why

A

Acceptable use policies (AUP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

• Job rotation
– Keep people moving between responsibilities
– No one person maintains control for long periods
of time
• Mandatory vacations
– Rotate others through the job
– The longer the vacation, the better chance
to identify fraud
– Especially important in high-security environments

• Separation of duties
– Split knowledge
• No one person has all of the details
• Half of a safe combination
– Dual control
• Two people must be present to perform
the business function
• Two keys open a safe (or launch a missile)

• Clean desk policy
– When you leave, nothing is on your desk
– Limit the exposure of sensitive data to third-parties

A

Business policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the concept and practice of restricting access rights for users, accounts, and computing processes to only those resources absolutely required to perform routine, legitimate activities. Privilege itself refers to the authorization to bypass certain security restraints.
• Rights and permissions should be set to
the bare minimum
– You only get exactly what’s needed to complete
your objective
• All user accounts must be limited
– Applications should run with minimal privileges
• Don’t allow users to run with administrative privileges
– Limits the scope of malicious behavior
Background checks
• Background checks
– Pre-employment screening
– Verify the applicant’s claims
– Discover criminal history, workers compensation
claims, etc.
– Legalities vary by country

A

Least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
a review of a potential employee's criminal, commercial and financial records. The goal of [this] is to ensure the safety and security of the employees in the organization.
• [this]
– Pre-employment screening
– Verify the applicant’s claims
– Discover criminal history, workers compensation
claims, etc.
– Legalities vary by country
• Adverse actions
– An action that denies employment based on the
background check
– May require extensive documentation
– Can also include existing employees
A

Background checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a system of policies and procedures which aim to manage and minimize the risk of people exploiting legitimate access to an organization’s assets or premises for unauthorized purposes.
• NDA (Non-disclosure agreement)
– Confidentiality agreement / Legal contract
– Prevents the use and dissemination of
confidential information
• Social media analysis
– Gather data from social media
– Facebook, Twitter, LinkedIn, Instagram
– Build a personal profile
– Another data point when making a hiring decision

A

Personnel security procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Adding a new user to an identity management system or upgrading the user’s privileges.
• Bring a new person into the organization
– New hires or transfers
• IT agreements need to be signed
– May be part of the employee handbook or
a separate AUP
• Create accounts
– Associate the user with the proper groups
and departments
• Provide required IT hardware
– Laptops, tablets, etc. - Preconfigured and ready to go

A

On-boarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Removing a user from an identity management system or downgrading the user’s privileges.
• All good things… (But you knew this day would come)
• This process should be pre-planned
– You don’t want to decide how to do things at this point
• What happens to the hardware and the data?
• Account information is usually deactivated
– But not always deleted

A

Off-boarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

helps the user in operating the system in efficient way. During the training a manual is given to every user so that they can understand the problem and solved it. The content of training is about the use of data that how they can edit, add, query and delete the records.
• Gamification
– Score points, compete with others, collect badges
• Capture the flag (CTF)
– Security competition
– Hack into a server to steal data (the flag)
– Can involve highly technical simulations
– A practical learning environment
• Phishing simulation
– Send simulated phishing emails
– Make vishing calls
– See which users are susceptible to phishing attacks
without being a victim of phishing
• Computer-based training (CBT)
– Automated pre-built training
– May include video, audio, and Q&A
– Users all receive the same training experience

A

User training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Training tailors training materials and delivery mechanisms to fit the role of an employee and reduces the cyber risk associated with that role.
- addresses management, operational, and technical roles and responsibilities covering physical, personnel, and technical safeguards and countermeasures. Such training can include for example, policies, procedures, tools, and artifacts for the organizational security roles defined.
• Before providing access, train your users
– Detailed security requirements
• Specialized training
– Each user role has unique security responsibilities
• Also applies to third-parties
– Contractors, partners, suppliers
• Detailed documentation and records
– Problems later can be severe for everyone

A

Role-based security awareness training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a part of the supply chain: the network of all the individuals, organizations, resources, activities and technology involved in the creation and sale of a product, from the delivery of source materials from the supplier to the manufacturer, through to its eventual delivery to the end user.
• Every organization works with vendors
– Payroll, customer relationship management,
email marketing, travel, raw materials
• Important company data is often shared
– May be required for cloud-based services
• Perform a risk assessment
– Categorize risk by vendor and manage the risk
• Use contracts for clear understanding
– Make sure everyone understands the expectations
– Use the contract to enforce a secure environment

Target credit card breach - November 2013
• Every point of sale terminal infected
– A third-party was allowed in through lapses in
security policy
• A vendor was infected through an email attachment
– The vendor didn’t have or follow a security policy for
their workstations
• Target didn’t segment the vendor network
from the corporate
– The attackers jumped from the vendor to the
Target network
• The corporate network was not segmented from
point of sale (POS) terminals
– Once on the inside, it was relatively easy to get to
your credit card numbers
– (110 million card numbers)

A

Vendors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the network of all the individuals, organizations, resources, activities and technology involved in the creation and sale of a product. [this] encompasses everything from the delivery of source materials from the supplier to the manufacturer through to its eventual delivery to the end user.
• The system involved when creating a product
– Involves organizations, people, activities, and resources
• Supply chain assessment
– Get a product or service from supplier to customer
– Evaluate coordination between groups
– Identify areas of improvement
– Assess the IT systems supporting the operation
– Document the business process changes
• New laptops arrive with bundled malware
– Lenovo, August 2014 through early 2015
– Superfish software added a self-signed root cert (!)
– Allowed for on-path attacks when browsing any site,
including over HTTPS

A

Supply chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

any entity that you collaborate with on a business-to-business basis.
• Much closer to your data than a vendor
– May require direct access
– May be a larger security concern than an outside hacker
• Often involves communication over a trusted connection
– More difficult to identify malicious activity
• Partner risk management should be included
– Requirements for best practices, data handling,
intellectual property
• Include additional security between partners
– Firewalls and traffic filters

A

Business partners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
• Service Level Agreement (SLA) - defines the level of service you expect from a vendor, laying out the metrics by which service is measured, as well as remedies or penalties should agreed-on service levels not be achieved. 
– Minimum terms for services provided
– Uptime, response time agreement, etc.
– Commonly used between customers and
service providers

• Memorandum of Understanding (MOU) - A document established between two or more parties to define their respective responsibilities in accomplishing a particular goal or mission.
– Both sides agree on the contents
of the memorandum
– Usually includes statements of confidentiality
– Informal letter of intent; not a signed contract

• Measurement system analysis (MSA) - an experimental and mathematical method of determining the amount of variation that exists within a measurement process. Variation in the measurement process can directly contribute to our overall process variability.
– Don’t make decisions based on incorrect data!
– Used with quality management systems,
i.e., Six Sigma
– Assess the measurement process
– Calculate measurement uncertainty

• Business Partnership Agreement (BPA) - a legal document that dictates how a small for-profit business will operate under two or more people. The agreement lays out the responsibilities of each partner in the business, how much of the business each partner owns, and how much profit and loss each partner is responsible for.
– Going into business together
– Owner stake
– Financial contract
– Decision-making agreements
– Prepare for contingencies
A

Common agreements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

from the customer or end user perspective, and is often defined as the time between installation, commissioning or startup, till removed, decommissioned, or failure.

• End of life (EOL) - occurs to hardware and software. It is the stage of a product in which it becomes outdated or unsupported by the manufacturer.
– Manufacturer stops selling a product
– May continue supporting the product
– Important for security patches and updates

• End of service life (EOSL) - support is the biggest differentiating factor. The EoSL label is a little more final than EoL. At this stage, the OEM stops selling the product and won’t offer any more maintenance or support. If they do support the hardware in some way, they may charge you greatly for the service.
– Manufacturer stops selling a product
– Support is no longer available for the product
– No ongoing security patches or updates
– May have a premium-cost support option

• Technology EOSL is a significant concern
– Security patches are part of normal operation

A

Product support lifetime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An agreement signed between two parties that have to disclose confidential information to each other in order to do business.
• Confidentiality agreement between parties
– Information in the agreement should not
be disclosed
• Protects confidential information
– Trade secrets
– Business activities
– Anything else listed in the NDA
• Unilateral or bilateral (or multilateral)
– On-way NDA or mutual NDA
• Formal contract
– Signatures are usually required

A

Non-disclosure agreement (NDA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

the process of managing the availability, usability, integrity and security of the data in enterprise systems, based on internal data standards and policies that also control data usage. Effective [this] ensures that data is consistent and trustworthy and doesn’t get misused.
• Rules, processes, and accountability associated with
an organization’s data
– Data is used in the right ways
• Data steward
– Manages the governance processes
– Responsible for data accuracy, privacy, and security
– Associates sensitivity labels to the data
– Ensures compliance with any applicable laws and
standards
• Formal rules for data
– Everyone must know and follow the processes

A

Data governance

17
Q

the process of organizing data into categories that make it is easy to retrieve, sort and store for future use. A well-planned [this] system makes essential data easy to find and retrieve. This can be of particular importance for risk management, legal discovery and compliance.
• Identify data types
– Personal, public, restricted, etc.
– Use and protect data efficiently
• Associate governance controls to the classification levels
– How the data class should be managed
• Data compliance
– Laws and regulations regarding certain types of data
– GDPR - General Data Protection Regulation

A

Data classification

18
Q

an organization’s policy or protocol regarding the saving of data for regulatory or compliance purposes, or the disposal of it when no longer needed.
• Keep files that change frequently for version control
– Files change often
– Keep at least a week, perhaps more
• Recover from virus infection
– Infection may not be identified immediately
– May need to retain 30 days of backups
• Often legal requirements for data retention
– Email storage may be required over years
– Some industries must legally store certain data types
– Different data types have different
storage requirements
– Corporate tax information, customer PII,
tape backups, etc.

A

Data retention

19
Q

an established form of software that is used for issuing and managing credentials as part of public key infrastructure (PKI).
• All that stands between the outside world and
all of the data
– The data is everything
• Passwords must not be embedded in the application
– Everything needs to reside on the server, not the client
• Communication across the network should be encrypted
– Authentication traffic should be impossible to see

A

Credential management

20
Q

• An account on a computer associated with
a specific person
– The computer associates the user with a specific
identification number
• Storage and files can be private to that user
– Even if another person is using the same computer
• No privileged access to the operating system
– Specifically not allowed on a user account
• This is the account type most people will use
– Your user community

A

Personnel accounts

21
Q

• Access to external third-party systems
– Cloud platforms for payroll, enterprise resource
planning, etc.
• Third-party access to corporate systems
– Access can come from anywhere
• Add additional layers of security
– 2FA (two factor authentication)
– Audit the security posture of third-parties
• Don’t allow account sharing
– All users should have their own account

A

Third-party accounts

22
Q

• Access to devices
– Mobile devices
• Local security
– Device certificate
– Require screen locks and unlocking standards
– Manage through a Mobile Device Manager (MDM)
• Add additional security
– Geography-based
– Include additional authentication factors
– Associate a device with a user

A

Device accounts

23
Q

• Used exclusively by services running on a computer
– No interactive/user access (ideally)
– Web server, database server, etc.
• Access can be defined for a specific service
– Web server rights and permissions will be
different than a database server
• Commonly use usernames and passwords
– You’ll need to determine the best policy for
password updates

A

Service accounts

24
Q
• Elevated access to one or more systems
– Super user access
• Complete access to the system
– Often used to manage hardware, drivers, and
software installation
• This account should not be used for normal
administration
– User accounts should be used
• Needs to be highly secured
– Strong passwords, 2FA
– Scheduled password changes
A

Administrator/root accounts

25
Q

a structured process for reviewing proposed IT system or service changes. This process occurs prior to implementing the requested change on an organization’s network, thus minimizing or eliminating network outages.
• How to make a change
– Upgrade software, change firewall configuration,
modify switch ports
• One of the most common risks in the enterprise
– Occurs very frequently
• Often overlooked or ignored
– Did you feel that bite?
• Have clear policies
– Frequency, duration, installation process,
fallback procedures
• Sometimes extremely difficult to implement
– It’s hard to change corporate culture

A

Change management

26
Q

mostly used in bringing additional features to software applications, modifying features of applications or systems to suit different requirements, patch installation or network upgrades.
• A formal process for managing change
– Avoid downtime, confusion, and mistakes
• Nothing changes without the process
– Determine the scope of the change
– Analyze the risk associated with the change
– Create a plan
– Get end-user approval
– Present the proposal to the change control board
– Have a backout plan if the change doesn’t work
– Document the changes

A

Change control

27
Q

the process of ensuring an organization’s assets are accounted for, deployed, maintained, upgraded, and disposed of when the time comes. Put simply, it’s making sure that the valuable items, tangible and intangible, in your organization are tracked and being used.
• Identify and track computing assets
– Usually an automated process
• Respond faster to security problem
– You know who, what, and where
• Keep an eye on the most valuable assets
– Both hardware and data
• Track licenses
– You know exactly how many you’ll need
• Verify that all devices are up to date
– Security patches, anti-malware signature updates, etc.

A

Asset management