Domain 4 - Cloud Application Security Flashcards
What are the essential components of a security culture per SAFECode?
- Executive support and engagement
- Program design and implementation
- Program sustainment and measurement.
- Training and awareness are important steps in developing a security culture.
How does an organization build a security conscious culture?
- Secure by design - security is part of every step; not a bolt-on
- Shared security responsibility - security is everyone’s job from most junior to senior management
- Security as a business objective - security is not something in addition to what we do; secure computing is what we do!
What are pitfalls associated with developing a security conscious culture?
- Lack of exec support (no budgets for security staffing/programs)
- Failing to understand organizational culture - security program must be tailored to the org’s unique culture
- Staffing - insufficient security staff who are spread across multiple projects
- Framework for SDLC - lack of a well defined process
- Budget constraints leading to training cuts.
What are the top 11 threats to cloud computing according to the CSA?
- Data breaches
- Misconfiguration and inadequate change control
- Lack of cloud security architecture and strategy
- Insufficient id, credential, access and key management
- Account hijacking
- Insider threat
- Insecure interfaces and APIs
- Weak Control Plane
- Metastructure and Applistructure failures
- Limited cloud usage visibility
- Abuse and Nefarious use of cloud services.
What are the top 10 OWASP identified threats in web application security?
- Injection flaws (SQL, NoSQL, OS, and LDAP) - allows attacker to run malicious commands and access data
- Broken authentication- leads to compromise of passwords, keys and tokens
- Sensitive data exposure - due to insecure protocols and lack of encryption
- XML external entities - remote code execution?
- Broken access controls - poor practices allow authN users to view unauthorized sensitive data.
What are the steps in a SW Development Life Cycle?
- Requirements
- Design
- Development
- Testing
- Deployment - includes specifying standard configs.
- Operations & Maintenance
Per NIST Secure SW Development Framework, what the components of a SSDLC?
- Prepare the organization - people, processes and technologies
- Protect the SW - protection from tampering and unauthorized access
- Produce well-secure SW - minimum vulnerabilities
- Respond to vulnerabilities - including preventing them in future releases.
What does the OWASP say about Software Assurance Maturity Model (SAMM)?
- Assess current security posture
- Define a strategy (security target)
- Implement a roadmap
- Offer prescriptive advice on activity implementation.
CSA Security Issue: Data Breach- How can this be mitigated using SSDLC?
- Requirements: identify data to be protected and users that need access; involve a security architect
- Design & Development: use of encryption; AuthZ/N
- Testing: traditional test, pen tests and vulnerability scans
- Deployment: secure by default; monitor and alert changes in config; monitor for new risks
CSA Security Issue: Misconfig/Change Control- How can this be mitigated using SSDLC?
- Default deployment configuration must be secure
- Monitor changes and alert
- Continuous monitoring (e.g. via AWS Config)
- Effective Change Control involving security experts on the CC committee.
What security vulnerabilities arise during deployment phase of services?
- Data storage and transmission (unencrypted)
- Excessive permissions
- Default credentials and settings
- Standard security controls being disabled.
CSA Security Issue: Lack of cloud security architecture/strategy - How can this be mitigated using SSDLC?
- Cloud Adoption framework
- Security focused architecture
These controls precede SSDLC - having this in place first enables SSDLC to deliver to those requirements.
CSA Security Issue: Insufficient ID, Credentials, Access and Key Management - How can this be mitigated using SSDLC?
- Concerns: Scalable IAM, use of MFA, protection/rotation of crypto keys, password policy enforcement, credential protection etc.
- Requirements phase: MFA, strong passwd, etc. should be part of the requirements
- Design/Dev/Test - implementation and testing of these safeguards
How does the role of QA change in the cloud?
Traditional QA was the testing phase separate from development.
Modern QA is embedded in the DevSecOps team. QA occurs at each phase of the SSDLC.
Testing involves both functional and security testing; load test, performance test, stress test, and vuln. mgmt.
What is STRIDE?
STRIDE is a model for identifying computer security threats. The six threat categories are:
- Spoofing (Authenticity)
- Tampering (Integrity)
- Repudiation (Non-repudiability)
- Information disclosure (Confidentiality)
- Denial of Service (Availability)
- Elevation of privilege (Authorization)
The STRIDE model can be used to define security requirements as SSDLC progresses.
What are the phases in threat modeling?
These steps are refined through each of the 5 phases of the SSDLC:
- Define security requirements - precise definitions helps
- Create application overview - review application architecture, characteristics and users to identify relevant threats
- Identify threats
- Mitigate threats - identify controls that mitigate threats
- Validate threat mitigation - monitor and review controls to ensure they lower risk below acceptable threshold.
What is Software Configuration Management and why is it important?
- The role of SCM is to manage SW assets.
- It makes rolling back changes possible.
- Versioning can keep track of different releases for different markets.
- SCM can provide artifacts that prove processes are followed
- Done via a Config Management Database (CMDB)
What is SAST?
Static Application Security Testing aka White-box testing.
Reviewing source code for vulnerabilities; static scanning of source code.
Access to source code is needed.