Chap 8 - Security operations Flashcards
what are the common classification of an event
- precursor = signal that something will take place
- indicator = signal that something is taking place
what are the main issues log management addresses
- compliance and standards
- policies throughout the system and info lifecycle
- infrastructure
- generation, collection and normalization
- protection from creation to disposal (archiv/defens destruct
- review, analytics and reporting
what is an IDS
solution that monitors the environment and automatically recognizes malicious attempts to gain unauthorized access
what is an IPS
solution that monitors environment and automatically takes action when it recognizes malicious attempts to gain unauthorized access
IDS/IPS deployment
can be deployed as perimeter placement (DMZ) or host-based or network-based and be located at various physical and logical locations in the IT environment
how can IDS/IPS detect malicious activities
- deviation
- signatures
- pattern matching
- heuristic (machine learning algorithm)
what are the main tradeoff associated with IDS/IPS
- maintenance
- overhead
- false positive
- agility
what are types of SIEM deployments
- self-hosted, self-managed
- cloud SIEM, self-managed
- hybrid self hosted
- SIEM as a Service
what are the main functions of a SIEM
- aggregation = gather info across environment
- normalization = present data in meaningful ways
- correlation = probability that stream of log is of an attack
- secure storage = follow rule of evidence
- analysis = automatic analysis
- reporting
- real-time monitoring = threat detection across network
ingress monitoring
inbound communication traffic
tools:
- firewall
- gateway
- remote authentication servers
- IDS/IPS
Egress monitoring
outbound communication traffic
tools:
- DLP (through signature, pattern, labeling)
DLP can cover data at rest, in motion and in use
what are the main effort as part of data protection
- data discovery / classification / categorization
- monitoring
- enforcement (training, attribution, prevention)
what do we use regression testing for?
confirms that the systems’ behavior has been altered only in ways that the approved change should have caused and that no other anomalous behavior as resulted from changes
what is the Information Technology Infrastructure Library (ITIL)
widely adopted information technology change practices
what are the ITIL process level based on urgency
- standard changes
- emergency changes
- normal changes
what are the 2 important processes that come together via well-implemented change mgmt practices
- baselining
- provisioning
change initiation steps include
- identifying of change requirements
- risk assessment
- change prioritization
- documentation of the RFC
Change review & approval steps include
- evaluating the RFCs for completeness
- assignment to the proper change authorization process
- stakeholder review
- appropriate approvals or rejections
- documentation of approval or rejection
implementation and evaluation steps include
- scheduling the change
- testing the change
- verifying the rollback procedures
- implementing the change
- evaluating the change for proper operation
- documenting the change in the production
what are the practice of patching system challenges
- interoperability
- poorly craft patches
- required downtime
- virtualization-specific concerns
- timing
what are the best practices in patching system
- notice of patch
- determine applicability/evaluation
- determine potential impacts
- testing the patch
after approval ->
- perform a full backup prior to application
- apply the patch
- confirm installation of the patch for all target systems
verify operationality post-patch->
- solicit/receive user feedback
- document
or
- rollback if required
what are the main 4 change management activities
- change management
- vulnerability management
- patch management
- configuration management
when does an event becomes an incident?
when there is a possibility of harm
what are common business practices to handle incident
- incident detection
- assessment
- escalation
- communication
- recovery
- learning
what is the NIST computer security incident handling lifecycle
- preparation
- detection and analysis
- containment, eradication and recovery
- post-incident activity
what are the 4 phases of cyber forensics
- collection (of medias -> data)
- examination (of the data -> to find information)
- analysis (of the information -> to find evidence/artifacts)
- reporting (of the evidence/artifacts)
what are incident response team communication to key stakeholders
- customers (media)
- other response teams
- internet service providers
- incident reporters
- law enforcement agencies
- software and support vendors
what is the primary role of Security Operation Center (SOC)
ENABLE the organization’s senior leadership and management to make INFORMED DECISIONS about emergency or urgent actions to take to PROTECT THE ORGANIZATION from loss or impact
what are some types of event that might be a step of attack kill chain
- input buffer overflows
- endpoint/ removable media infections
- filenames containing unusual/ unprintable characters
- access control system notice
- unplanned restart
- unmanaged host or endpoint try to join network
- notice of unplanned configuration changes
- multiple login failed attempts
- email system alert of increase in bounced/refuse/junk mail
- unusual deviation in network traffic flows