CISSP Domain 3 Flashcards
What are technique of ensuring CIA for processes?
1.Confinement: Process to be assigned only required resources (memory, run time)
2. Bound: Process is authorised to interactions user, Kernel
3. Isolation : Enforcement of bound and implementation of confinement
What is trust and Assurance?
Trust: Presence of security mechanism
Assurance: Degree of confidence in satisfaction of security needs
What is security model?
Map abstract statements into security policy for designers
What is TCB and it’s components?
Enforcement of security policy through:
- Security perimeter: Seperate trusted to in untrusted
- Reference monitor: Restrict the access it’s a theoretical concepts
- Security kernel: Implements the above RM
What is State machine model?
Takes snapshot of a system at given time
It should always be in “secure state”
When the state changes it’s called transition state and it should happen in secure transition state
What is information flow model ?
Multilevel security
Dictates information flow from subject to object to prevent unauthorised, restricted, insecure often between different security level
What are elements of Evaluation criteria?
Protection profile ( and Security Target ()
Non Interference
Actions of subject at a higher level should not take advantage of the lower level
Take grant model
Access rights can be passed on from an object to a different object
Access control matrix
Capability list and access control matrix
Bella padula
Protect confidentiality
simple security property ( no read up) and star security property (no write down)
Discretionary security property
Biba model
Integrity
No read down ( simple integrity rule)
No write up ( star integrity rule)
Clark Wilson model
Provide integrity
Access triplet ( subject, program and object)
Subjects cannot access objects directly but only through TP
CDI - constrained data item to protect integrity using security model
UDI - not restricted
Transformation Procedure - Will use TP for subject to access object
Brewer and nash model
Provides confidentiality
Chinese wall model or to avoid conflict of interest
Goguen - Meseguer model
Integrity
Foundation of non Interference model
Sutherland model
Prevention of interference+ integrity
Graham Denning model
Creation and deletion of both subjects and objects
Harrison -Ruzo -Ulman model
Assignment of object access rights and resilience of assigned rights
Secure design principles
Secure default
Fail securely: physical - digital
Fail open( people, availability)
Fail safe ( people, CI)
Fail closed and secure( assets, CI)
KISS
Zero trust : Microsegmentation, assume there is data breach, trust but verify,
privacy by design- (proactive, default setting, positive sum, data protection, visibility and transparency, user centric)
, trust but verify - now zero trust)
Shared Responsibility
Organization do not operate in isolation in an interconnected World you can have internal and external suppliers
Process and execution types
Brain of computer
- Ready : to be executed after fetching info from memory
- Running: Execution
- Waiting: Has 2 but need to fetch other data from memory in order to complete execution
- Supervisory
- Stopped
Problem state based on low prevlige access
CPU and processing types
Brain of computer
1. Multitasking: Multiple tasks a single core
2. Multi processing: Multiple process and multiple thread executed by processor
3. Multicore : Many core cpu
4. Multi threading: Many thread executed for a single process
5. Multi programming: similar to multitasking
Fetch execute decode
Protection mechanism of OS
Ring 0 kernel
Ring 1 os components
Ring 2 drivers and protocol
Ring 3 i/o devices
What is goal of memory protection and and how can it be achieved (2 methods)?
A computing device is likely running multiple applications and services simultaneously, each occupying a segment of memory. The goal of memory protection is to prevent one application or service from impacting another. There are two primary memory protection methods:
Process isolation: OS provides separate memory spaces for each processes instructions and data, and prevents one process from impacting another
Hardware segmentation: forces separation via physical hardward controls rather than logical processes; in this type of segmentation, the operating system maps processes to dedicated memory locations
Virtualization and types
technology used to host one or more operating systems within the memory of a single host, or to run applications that are not compatible with the host OS. The goal is to protect the hypervisor and ensure that compromising one VM doesn’t affect others on that host
Type 1 hypervisor: Hypervisor directly installe on bare metal server hardware mainly used for servers
Type 2: application are managed through hypervisor
Hardware
Hypervisor
OS
ROM
ROM : only reads
It’s volatile in nature and contents are burned into chips can’t be changed
PROM : Users burn in the content into chips
EEPROM and UVPROM: contents can be erased
Flash memory: USB kind of EEPROM
RAM and types
Can be read and written
Real memory
Secondary memory: ssd
Cache memory: Repetitive tasks
Virtual memory: secondary memory to expand memory space -Page file
Memory addressing
Ways by which cpu accesses memory
Register addressing
Immediate addressing
Direct addressing
Indirect addressing
Base+offset addressing
Data storage devices
Primary vs secondary
Volatile vs non volatile
Random vs sequential
Emnation security and how to reduce it
Related to emanating signals, voltage
Tempest technology can reduce it
Faraday cage
Control Zoning
White noise
Firmware
Mini OS which does very limited function of OS. ROM or EEPROM chip
BIOS and UEFI ( same as BIOS but additional support)
Phlashing and boot attestation or secure boot, measured boot
Malicious code embedded into bios
Protection of local os
Optional feature of UEFI which does hashing
TPM
cryptographic chip that is sometimes included with a client computer or server. A TPM enhances the capabilities of a computer by offering hardware-based cryptographic operations. Many security products and encryption solutions require a TPM
TPM is both a specification for a cryptoprocessor chip on a motherboard and the general name for implementation of the specification
A TPM is an example of ahardware security module (HSM)
An HSM is a cryptoprocessor used to manage and store digital encryption keys, accelerate crypto operations, support faster digital signatures, and improve authentication
Client and server based systems
Client based: Applet (Adobe in chrome)
Server based :
Data Flow Control: movement of data between processes, between devices, across a network, or over a communications channel
Management of data flow seeks to minimize latency/delays, keep traffic confidential (i.e. using encryption), not overload traffic (i.e. load balancer), and can be provided by network devices/applications & services
While attackers may initially target client computers, servers are often the goal
Mitigation: regular patching, deploying hardened server OS images for builds, and use host-based firewalls
DCE
collection of individual systems that work together to support a resource or provide a service
DCEs are designed to support communication and coordination among their members in order to achieve a common function, goal, or operation
Most DCEs have duplicate or concurrent components, are asynchronous, and allow for fail-soft or independent failure of components
DCE is AKA concurrent computing, parallel computing, and distributed computing
DCE solutions are implemented as client-server, three-tier, multi-tier, and peer-to-peer
Securing distributed systems:
in distributed systems, integrity is sometimes a concern because data and software are spread across various systems, often in different locations
Microservices
A component of web application and derivative of SOA instead of developer building all the services of software they can integrate using micro services which can be called upon using API
Containers Vs virtualization
Instead of using tht complete OS it will create and use only whatever is required
AKA OS virtualization is based on the concept of eliminating the duplication of OS elements in a virtual machine; instead each application is placed into a container that includes only the actual resources needed to support the enclosed application, and the common or shared OS elements are then part of the hypervisor
Containerization is able to provide 10 to 100 x more application density per physical server compared to traditional virtualization
Vendors often have security benchmarks and hardening guidelines to follow to enhance container security
Securing containers:
container challenges include the lack of isolation compared to a traditional infrastructure of physical servers and VMs
scan container images to reveal software with vulnerabilities
secure your registries: use access controls to limit who can publish images, or even access the registry; require images to be signed
harden container deployment including the OS of the underlying host, using firewalls, and VPC rules, and use limited access accounts
reduce the attack surface by minimizing the number of components in each container, and update and scan them frequently
Virtualization: System, host os , Hypervisor, guest OS, bin lib , apps
Containers: System, host os, bin abd lib, App..
Serverless architecture
Serverless architecture(AKAfunction as a service (FaaS)): a cloud computing concept where code is managed by the customer and the platform (i.e. supporting hardware and software) or servers are managed by the CSP
Applications developed on serverless architecture are similar to microservices, and each function is created to operate independently and automonomously
A serverless model, as in other CSP models, is a shared security model,and your organization and the CSP share security responsibility