Configuration Management Flashcards

1
Q

What is the only constant in IT security?

A

Change - Operating systems will change, patches, application updates, network modifications, new application instances, hardware, software, etc. You will have to modify your security to adapt to the changes. Documentation will be critical to track and control everything.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What will be included in Diagrams?

A

Documenting the physical wire and device, physical data center layout to include physical rack locations, device diagrams including the cables from beginning to end.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Baseline Configuration

A

The security of an application environment should be well defined. All applications instances must follow the baseline. Firewall settings, patch levels, OS file versions. This may require constant updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Integrity measurement checks

A

Should be performed often and should check your security settings with the established baselines in the documentation. If the checks fail then corrections need to be immediately implemented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Standard naming conventsion

A

Create a standard by which everyone in the business can easily follow. Devices need to have asset tag names and numbers, computer need to have standardized labeling for location and/or region. Use serial numbers for each device. Networks need standardized port labeling, domain configs need to follow account naming guidelines. Emails addresses should follow a standard as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IP schema

A

IP addresses should be organized in a consistent system for network devices. It helps prevent duplicate IP addressing. Locations should have numbers of subnets, and hosts per subnet. IP ranges should be established per site and have different subnets. Addresses should be annotated and reserved for devices such as users, printers, routers/default gateways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly