Chapter 10 Defense-in-Depth Security Architectures Flashcards

1
Q

Means each layer of security adds additional protections that help prevent a hole or flaw in another layer from allowing an attacker in

A

Layered security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name the four design models used as part of a layered security design?

A
  1. Uniform protection
  2. Protected enclaves
  3. Risk or threat analysis based designs
  4. Information classification based designs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • Layered security design
  • Provides the same level of protection to all systems or networks
  • Can be expensive if every system needs to be protected at the same high level of security
A

Uniform protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • Layered security design
  • Can take the form of protected network segments, systems, or physical locations that have additional controls to provide additional protection
A

Protected enclaves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • Layered security design
  • Design model that reviews Potential Threat vectors in attempts to address each of them in the design
  • May not handle new or emerging threats without frequent review and updates
A

Risk or threat analysis based designs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • Layered security design

- Uses information classification, tagging, or other methods to guide the application of security controls

A

Information classification based designs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • Control intended to stop an incident from occurring by taking proactive measures to stop the threat
  • i.e. firewalls, training, and security guards
A

Preventive controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • Control that detects an incident and captures information about it, allowing a response like alarms or notifications
A

Detective controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • Control that remediates an incident or acts to limit how much damage can result from an incident
  • i.e. patching, anti-malware software, and system restores from backups
A

Corrective controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name remote services that host a service entirely on the outsourced vendors’ systems and networks.

A
  • Software and a Service (SaaS)

- Platform as a Service (PaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Layered security at an individual host level typically relies on a number of common security controls, what are they?

A
  • Passwords or other strong authentication
  • Host firewalls and host IPS software
  • Data loss prevention software monitors manages protected data
  • Whitelisting or blacklisting software can prevent certain applications from being run or installed on the system
  • Anti-malware software for known malware instances
  • Patch management and vulnerability assessment tools to ensure OS is fully patched and properly secure
  • System hardening and configuration management that ensures that I needed services are turned off and that good security practices are followed
  • Encryption either add a file level or full disk encryption
  • File Integrity monitoring tools monitor files and directories for changes and can alert an administrator if changes occur
  • Logging of events, actions, and issues is a important detective control at the host layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A provider that usually leverages Security Suite and appliances to capture on-site and hosted data and then use central tools to analyze, report, and alert on issues that they discover

A

Security as a Service (SECaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Combines data from multiple sources like syslogs, authentication logs, application logs, event logs, and other logs and statistics in a central location for analysis

A

Data aggregation and correlation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A form of encryption and hashing techniques used to protect data on the wire and at rest, and to validate that data integrity is maintained

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Trusted protection modules (TPM) provides what three major capabilities?

A
  1. Remote attestation, allowing hardware and software configurations to be verified
  2. Binding which encrypts data
  3. Sealing, which encrypts data and sets requirements for the state of the TPM chip before decryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Requires more than one individual to perform elements of a task to ensure that fraud or abuse do not occur

A

Separation of duties

17
Q

Ensures continuity for roles, regardless of the reason a person leaves your organization

A

Succession planning

18
Q

A control that requires two individuals to perform and action together

A

Dual control

19
Q

Requires staff members to take a vacation allowing you to identify individuals who are exploiting the rights that they have

A

Mandatory vacation

20
Q

Key considerations and questions when reviewing outsourcing include what following?

A
  • Proper vetting - When hiring consultants, are they properly vetted, with background checks?
  • Access Control
  • Data ownership and control - Is your data encrypted and inaccessible to the outsourced provider?
  • Employment Practices - Does the outsourced win their conduct background checks of their employees?
  • Incident response processes and notification requirements - Will you be notified if there is an incident? When?
21
Q
  • Architectural View
  • Describes how a function is performed or what is it accomplishes
  • Typically shows how information flows but does not capture the technical detail about how data is transmitted, stored, or captured
A

Operational views

22
Q
  • Architectural View
  • Focuses on the technologies, settings, and configurations used in an architecture.
  • Can be helpful in identifying incorrect configuration and insecure design decisions
A

Technical views

23
Q
  • Architectural View
  • Conveys broader information about how a system or service connects or works
  • Typically less technically detailed than a technical view
  • i.e network diagrams
A

Logical View

24
Q

What are four of the most commonly encountered design issues?

A
  1. Single point of failure
  2. Data validation and trust problems
  3. User issues
  4. Authentication and authorization security
25
Q

Ways to protect data?

A
  • Protecting data at rest and in transit using encryption
  • Validating data Integrity using file Integrity checking tools
  • Implementing processes to verify data in an automated or manual fashion
  • Profiling or boundary checking data based on known attributes of the data
26
Q

Ways to limit user error?

A
  • Using automated monitoring and alerting systems to detect human error
  • Constraining interfaces to allow only permitted activities
  • Implementing procedural checks and balances like separation of Duties and other Personnel controls
  • Training and awareness programs designed to help prepare staff for the types of threats they are likely to encounter
27
Q

Authentication and authorization best practices are what?

A
  • Multi-factor Authentication
  • Centralized account and privilege management and monitoring
  • Privileged account usage monitoring
  • Training and awareness efforts
28
Q

How should security designs be maintained?

A

Security design should undergo periodical, and scheduled reviews

29
Q

Name some reasons why an organization may retire a security policy or process

A
  • The process our policy is no longer relevant
  • It has been superseded by a newer policy or process
  • The organization no longer wants to use the policy or process