chap 4 - Security architecture and engineering Flashcards
Security engineering : what are the technical processes
- business & mission analysis process -> the scope
- Stakeholder need & requirement definition process -> security requirements
- system requirements definition process -> translate sec requirements to system requirements
- Architecture definition process -> security view of system architecture
- design definition process -> security-related data and information about system
- system analysis process -> essential data & info for tech understanding of the security aspects
- implementation process
- integration process
verification process
technical management process
- project planning
- project assessment & control
- decision mgmt
- risk mgmt
- configuration mgmt
- information mgmt
- measurement
- quality assurance
what are the enabling process
- lifecycle model mgmt
- infrastructure mgmt
- portfolio mgmt
- human resources mgmt
- quality mgmt
- knowledge mgmt
what are the agreement process
- acquisition
- supply
what are the 4 key security models (architecture)
- state machine model
- information flow model
- non-interference model
- ring model
what is the security ring model
Ring 0 -> OS & security kernel
Ring 1 -> device driver
Ring 2 -> system utilities -> admin
Ring 3 -> Applications -> users
Security architecture for establish a secure system
- privileged mode instructions
- processor states
- memory mgmt
- abstraction layers
- data & code space isolation & code & data segregation
- file system attribute
- security kernel
what are the key extensions to basic security architecture
- access control
- virtual machine
- sandbox environment
- cryptographic systems
what is the fundamental building block of info system architecture
Service model
what are the types of service models (systems)
- client based system
- server based system
- Database system
- Industrial control system (ICS)
- embedded systems
- Internet of things IoT)
- distributed systems
- Virtualized systems
- cloud based system
five essential characteristics of cloud computing
- on-demand self-service
- broad network access
- resource pooling
- rapid elasticity
- measured services
(6. multi-tenancy)
what are the main cloud services models
- software as a service (SaaS)
- Platform as a Service (PaaS)
- Infrastructure as a Service (IaaS)
- Network as a Service (NaaS)
what are the cloud deployments models
- private cloud
- community cloud
- public cloud
- hybrid cloud
what are cloud vulnerabilities & mitigations
vulnerabilities:
- exposure to external communication & access
- misconfiguration
- becoming outdated
mitigation:
- stron SLA
what are microservices vulnerabilities & mitigations
vulnerabilities:
- authorization
- quality of service
- denial of service
mitigation:
- IAM
- containers
- API gateway
containerization vulnerabilities & mitigations
vulnerability
- insecure image
- excessive privilege
- unrestricted comms
- rogue malicious process
- improper isolation
mitigation
- image mgmt
- immutable infra
- granular sec
- micro segmentation
- proper config
Serverless architecture vulnerabilities & mitigations
vulnerability:
- malicious injection into function
- insecure conf.
- cross execution’s data persistency
mitigation
- train staff for conf
- secure coding practices
High performance computing sys vulnerabilities & mitigations
vulnerabilities:
- latency constraints
- improper workload
mitigation
- proper architecture design
- monitoring & log practices
edge & Fog computing vulnerabilities & mitigations
vulnerability
- network compromise
- increase attack surface
mitigation
- network monitoring
- incident response
- asset inventory
accountability
industrial control system vulnerabilities & mitigations
vulnerabilities:
- limited functions
- limited protection
- long service life
- misconf & misuse
- susceptible DoS
- attack have physical effect
- remote/unattended locations
mitigation
- isolated network infra
- access control & monitoring
- high segmentation & microsegmentation
- protect comms chanels
- configuration controls
type of industrial control systems
- supervisory control & data acquisition (SCADA)
- Distributed control system (DCSs)
- Programmable logical controllers (PLCs)
embedded system vulnerabilities & mitigations
vulnerabilities
- programming errors
- web-based vulnerability
- weak access control
- poor crypto
- reverse engineering
- malware
- eavesdropping
mitigations
- risk assessment
- patching & updating
- secure coding technique
- implementing 3rd party risk mgmt
IoT vulnerabilities & mitigations
vulnerabilities
- DoS
- Device security
- crypto security
distributed system vulnerabilities & mitigations
vulnerabilities
- lack of monitoring
- lack of access control
mitigation
- IAM
- IDS/IPS
virtualized system vulnerabilities & mitigations
vulnerabilities
- image mgmt (VM sprawl)
- VW escape
- underlying hardware weakness
- knowledge gap
mitigation
- IAM
- change mgmt
why is cryptography critical to security
confidentiality
integrity
authenticity
availability
non-repudiation
access control