Domain 3: Security Architecture and Engineering Flashcards
Memory Protection
Prevents one program from referencing memory not specifically assigned to it.
o If a program attempts to reference a memory address it is not permitted to access, the system blocks the access, suspends the program, and transfers control to the operating system.
ISO/IEC 19249 (5 design principles)
o Least privilege
o Attack surface minimization
o Centralized parameter validation
o Centralized general security services
o Preparing for error and exception handling
ISO/IEC 19249 (5 architectural principles)
o Domain Separation
o Layering
o Encapsulation
o Redundancy
o Virtualization
Zero Trust Principles (3)
o Always verify
o Use least privilege access
o Assume breach
Privacy by Design (7 principles)
1 - Proactive not Reactive; Preventative not Remedial
2 - Privacy as the Default Setting
3 - Privacy Embedded into Design
4 - Full Functionality — Positive-Sum, not Zero-Sum
5 - End-to-End Security — Full Lifecycle Protection
6 - Visibility and Transparency — Keep it Open
7 - Respect for User Privacy — Keep it User-Centric
Bell-LaPadula Model Rules
o Simple Security Property - No read up
o Star Property - No write down
o Discretionary-Security Property
Bilba Integrity Model Rules
- Simple Integrity Property - No read down
- Star Integrity Property - No write up
Clark-Wilson Model (2 Concepts & 4 Terms)
- Well-formed transaction is that subjects are constrained to make only those changes that maintain the integrity of the data.
- Separation of duties
- Constrained data item (CDI) - This is the key data type in the Clark– Wilson model, and it refers to data whose integrity must be preserved.
- Unconstrained data item (UDI) - This includes all data other than CDIs, typically system inputs.
- Integrity verification procedures (IVPs) - These procedures check and ensure that all CDIs are valid.
- Transformation procedures (TPs) - These procedures enforce a system’s integrity policy and maintain the integrity of CDIs.
Brewer-Nash Model
Subject can right to an object if and only if the subject cannot read another object in a different data set.
Prevents conflict of interest.
Secure Cryptoprocessor
Hardware modules that are resistant to tampering and have a limited interface, making it easier to verify the integrity and secure operation of the (limited) code running on the cryptoprocessor.
Trusted Platform Module (TPM) & 3 Functions
Secure Cryptoprocessor that provides secure storage and cryptographic services as specified by iSO/IEC 11889. It has three core functions:
- Attestation: Creates a cryptographic hash of the system’s known good hardware and software state, allowing third-party verification of the system’s integrity
- Binding: Encrypts data using a cryptographic key that is uniquely associated with (or bound to) the system
- Sealing: Ensures that ciphertext can be decrypted only if the system is attested to be in a known good state
Full-disk Encryption
At the lowest level protects all the data on the storage media, protecting against the physical theft or loss of the drive itself.
It provides no protection from threat actors who have logical access to the system.
Filesystem-level encryption
Allows the encryption to occur at the filesystem level.
Transparent data encryption (TDE)
Protects the data from those who have direct access to the filesystem (i.e., the “root” user), but do not have permission to access the database system and the specific database item.
- Is not intended to be used alone as it doesn’t protect against malicious users (disgruntled admins, SQL Injection, etc.).
Cell-level encryption (CLE)
Encrypts database information at the cell or column level. With this approach, data remains encrypted when read from the database and is decrypted only when requested.
- Can be cumbersome to processing
Symmetric Key Encryption
AKA Secret Key Encryption
- Uses the same key to encrypt and decrypt
- More convenient, but less secure as you have to share the key.
Asymmetric Encryption
AKA: Public key encryption
- Uses a public private key pair. Encrypting with your private key provides non-repudiation
Stream Cipher
Encryption algorithm that works one character or bit at a time.