Chapter 7: Security Operations Flashcards
Operations Security
Security is primarily concerned with the protection and control of information processing assets in centralized and distributed environments
Security Operations
are primarily concerned with the daily tasks required to keep security services operating reliable and efficiently. Operations security is a quality of other services. Security operations is a service in its own right”
control Mechanisms
Protect information and resources from unauthorized disclosure, modification, and destruction
Types of Control Mechanisms
PhysicalAdministrativeTechnical
Administrative Controls
Development of policies, standards, and procedures Screening personnel, security awareness training, monitoring system and network activity, and change controlExample: - Procedures indicating how servers should be installed, annual security awareness education for all employees, implementing a change control program.
Technical Controls
Logical mechanisms that provide password and resource management, identification and authentication, and software configurationsExample: - Anti-virus software, intrusion detection systems, locking down operating systems, encryption, firewalls.
Physical Controls
Protecting individual systems, the network, employees, and the facility from physical damageExample: - Removing floppy drives from computers, locking chassis’s, security guards monitoring the facility, air conditioning and humidity control.
Preventative Access Control
Controls to prevent undesirable events from taking place
Detective Access Control
Controls used to identify undesirable events that have occurred.
Corrective Access Control
Controls Used to Correct effects of undesirable events.
Deterrent Access Control
Controls used to discourage security violations
Recovery Access Control
Controls used to restore resources and capabilities
Compensation Access Control
Controls used to provide alternate solutions
MTBF
mean time to failure how long will a device last
MTTR
mean time to repair how long for the recovery
RAID - 0
Disk striping
Raid 1
mirroring
Raid 5
Disk striping with parity: fault tolerance + speed
Clustering
2 or more nodes acting as a single or logical entity. can provide load balancing but not always.
Full Backup
Archive bit is reset (is is a flag saying hey i got backed up)
Incremental Backup
Backs up all files that have been modified since last backupArchive Bit is reset
Differential Backup
Backs up all files that have been modified since last full backupArchive Bit is not resetAlways will have to restore 2 tapes
Copy Backup
Same as full backup, but Archive Bit is not resetUse before upgrades, or system maintenanceCopy backup before making a system backup.
configuration management
a process of identifying and documenting hardware components, software and the associated settings.” including bios settings…etc.everything needs to be documented
System Hardening
Removing Unnecessary ServicesInstalling the latest services packs and patchesRenaming default accountsChanging default settingsEnabling security configurations like auditing, firewalls, updates, etcDon’t forget physical security!
Change Management
Directive, Administrative Control that should be incorporated into organizational policy. The formal review of all proposed changes–no “on-the-fly” changes Only approved changes will be implementedThe ultimate goal is system stabilityPeriodic reassessment of the environment to evaluate the need for upgrades/modificationsknow the flow of how it works*
Change management process
Request SubmittalRisk/Impact AssessmentApproval or Rejection of ChangeTestingScheduling/User Notification/TrainingImplementationValidationDocumentation
Patch Management
An essential part of Configuration and Change ManagementMay come as a result of vendor notification or pen testingCve.mitre.org (Common Vulnerability and Exposures) database provides standard conventions for known vulnerabilitiesNvd.nist.gov Enables automation of vulnerability management, security measurement, and compliance. NVD includes databases of security checklists, security related software flaws, incorrect configurations, product names, and impact metrics. www.cert.gov: Online resource concerning common vulnerabilities and attacks
Trusted Recovery
System reboot, emergency system restart, system cold startNo compromise of protection mechanisms or possibility of bypassing themPreparing system for failure and recovering the systemFailure of system cannot be used to breach securityFails - in a secure manner….
Media Management
Production Libraries–Holds software used in production environmentProgrammer Libraries–Holds work in progressSource Code Libraries–Holds source code and should be escrowed (3rd Party Storage)Media Library–Hardware centrally controlled
Media Librarian
Librarian to control accessLog who takes what materials out and whenMaterials should be properly labeledMedia must be properly sanitized when necessaryZeroization (Previous DoD standards required seven wipes. Currently, only one is required.)Degaussing (Only good for magnetic media)Coercivity: Amount of energy required to reduce the magnetic field to zeroPhysical destruction (The best means of removing remnants).