Chapter 10 Defense-in-Depth Security Architectures Flashcards
Means each layer of security adds additional protections that help prevent a hole or flaw in another layer from allowing an attacker in
Layered security
Name the four design models used as part of a layered security design?
- Uniform protection
- Protected enclaves
- Risk or threat analysis based designs
- Information classification based designs
- Layered security design
- Provides the same level of protection to all systems or networks
- Can be expensive if every system needs to be protected at the same high level of security
Uniform protection
- Layered security design
- Can take the form of protected network segments, systems, or physical locations that have additional controls to provide additional protection
Protected enclaves
- Layered security design
- Design model that reviews Potential Threat vectors in attempts to address each of them in the design
- May not handle new or emerging threats without frequent review and updates
Risk or threat analysis based designs
- Layered security design
- Uses information classification, tagging, or other methods to guide the application of security controls
Information classification based designs
- Control intended to stop an incident from occurring by taking proactive measures to stop the threat
- i.e. firewalls, training, and security guards
Preventive controls
- Control that detects an incident and captures information about it, allowing a response like alarms or notifications
Detective controls
- Control that remediates an incident or acts to limit how much damage can result from an incident
- i.e. patching, anti-malware software, and system restores from backups
Corrective controls
Name remote services that host a service entirely on the outsourced vendors’ systems and networks.
- Software and a Service (SaaS)
- Platform as a Service (PaaS)
Layered security at an individual host level typically relies on a number of common security controls, what are they?
- Passwords or other strong authentication
- Host firewalls and host IPS software
- Data loss prevention software monitors manages protected data
- Whitelisting or blacklisting software can prevent certain applications from being run or installed on the system
- Anti-malware software for known malware instances
- Patch management and vulnerability assessment tools to ensure OS is fully patched and properly secure
- System hardening and configuration management that ensures that I needed services are turned off and that good security practices are followed
- Encryption either add a file level or full disk encryption
- File Integrity monitoring tools monitor files and directories for changes and can alert an administrator if changes occur
- Logging of events, actions, and issues is a important detective control at the host layer
A provider that usually leverages Security Suite and appliances to capture on-site and hosted data and then use central tools to analyze, report, and alert on issues that they discover
Security as a Service (SECaaS)
Combines data from multiple sources like syslogs, authentication logs, application logs, event logs, and other logs and statistics in a central location for analysis
Data aggregation and correlation
A form of encryption and hashing techniques used to protect data on the wire and at rest, and to validate that data integrity is maintained
Cryptography
Trusted protection modules (TPM) provides what three major capabilities?
- Remote attestation, allowing hardware and software configurations to be verified
- Binding which encrypts data
- Sealing, which encrypts data and sets requirements for the state of the TPM chip before decryption