Domain 7 Flashcards
What is the information security lifecylce?
Note that the names of the phases are not important for the exam but the concepts of each are:
1) Planning
2) Provisioning
3) Operating
4) Decommissioning
You must own security from end to end. From inception to destruction
What is the planning phase of the IS lifecycle?
Security should always be considered prior to deployment
Planning needs to account for security. It enables you to make risk based decisions
What is the provisioning phase of the IS lifecylce?
This is concerned with preparing a user, service or system for active deployment. Provisioning ends with instantiation.
examples - creating a new user, deploying a new system, developing a new application
Security must be baked in at this level to ensure an initially secure deployment
Security baselines and configuration management are key
What is baseline configuration?
Baseline configuration seeks to determine the required and necessary components of systems and software. Get rid of anything you do not need!
To build baseline security there are several goals:
- determine a reasonable secure starting point for systems configurations - identify what is necessary and what is not
- establish a consistent configuration across majority of systems
- reduce time to recover a deployed system
Do not start from scratch to determine baseline security and configurations - there are many free resources and guidance on this.
- CIS
- Microsoft
- NIST 800s
- DISA STIGs
What is configuration Change Monitoring?
Once you get a secure baseline, you want to make sure it does not change.
You MUST control changes to the baseline configuration.
- You must have an approval process and maybe even a change control board so unauthorized changes dont occur
- you must have controlling and monitoring for security relevant changes
What is baseline monitoring?
Monitoring for key security relevant changes. Make sure the organization continues to operate under correct assumptions about its security posture.
Must monitor our systems for configuration changes
What is the Operating Phase of the IS lifecylce?
Secure provisioning and deployment
- the lengthiest phase within the lifecycle is typically the deployed operational phase
Key activities include:
- change management
- patching and vulnerability management
- security assessment
- preventing and detecting security issues
You cannot set it and forget it with security. Even if you have good security steps in planning and provisioning, you must continue to monitor it
Operating includes on-going maintenance:
- change and patch management
You must also keep an active inventory of all assets so that you can continue to monitor them
- invetory:
- — dont use spreadsheet methods - too slow and incomplete
- need inventories to ensure are are aware of assets that need a hardened configuration and have a grasp on software installed and patching requirements
What is host discovery?
Identify all hosts on our networks so we have them ll in our inventory
- do you know all your laptops, desktops, routers, switches, HVAC, printers, building automation, physical security devices, etc.
Active host discovery:
- The most direct way to identify hosts is via active host discovery
- from one node, we send a stimulus trying to elicit response from possible endpoints
- examples are ping sweep of relevant IP address space
Passive host discovery:
- if a system does not have a listener, we can detect the systems by sniffing any IP addresses or unknown MAC addresses
- could also determine particular application for some that are generating traffic
- we employ a sniffer and look for evidence of traffic indicative of systems
What is software application tracking?
You also see all the old applications and software out there being used.
Know the various endpoints and some applications. Most important to know about the vulnerable software they may be running
Can do this through vulnerability scans
What is monitoring?
SOC can do this, outsource most of this but not all. You can continuously monitor the state of the organization’s systems, applications and users
What is a security assessment?
Routinely assessing security posture. This is an operational task that must be done continuously.
Discussed in detail in domain 6
What is the decommissioning phase of the IS Lifecylce
decommissioning - process of removing an application, system, user or data from active production
- systems - ensure no sensitive data persists
- — wiping hard disks; formatting is not enough
- — printers are systems too
- users - ensure post employment access is appropriate
- — ensure orgs data is transferred to the right person
- — ensure all users access ceases with their employment
- Data - ensure data past its retention data is appropriately removed/wiped from all locations
What is cloud computing?
Cloud computing uses virtualization to provide highly available applications and servers
- modeled after the electrical grid
- based on network clouds
What is elastic cloud computing?
Focuses on dynamically provisioning resources to cloud services - lowers friction by providing cloud resources dynamically. Instead of operating a service 24/7, a client may deploy a service as needed, from hours on up and then decommission the service when no longer needed.
Can also be used on-demand - e.g. rent a high volume web service for 8 hours
Organizations typically pay per unit not per virtual host
What is IAAS, PASS, and SAAS?
- Infrastructure as a service - IAAS - cloud based virtual private servers sucah as a linux server. you have full control of the OS, including root and admin. You install software, patch the kernal and upgrade the OS
- Platform as a services (PAAS) - a server service, such as an apache web service. a web server instance. Admins have control over the service configuration only and not the general OS. You could restart the web service but not reboot the entire system
- Software as a service (SAAS) - a client service such as client email like Gmail - cloud based application access like webmail
What is provisioning and deprovisioning cloud servers?
1) Provisioning
- you can configure everything yourself of you can provision a preconfigured server with all required software already installed and configured.
- this offers time savings
- risk is misconfiguration, mistakes, security vulnerabilities
2) deprovisioning
- secure deprovisioning is essential
- how do you know if virtual images are securely wiped?, do backups remain on the cloud?, have data remnants been securely deleted?
- contracts should spell out data retention and remanence policies
USE dual factor authentication for your cloud console
What are multi-tenant clouds?
Clouds that combine virtual machines from multiple organizations onto one physical host.
Single-tenant is when clouds dedicate host hardware to a specific organization.
Multi-tenant you could assume some of the risk of the other consumers resources
What are clouds without borders?
Most clouds provide no geographic boundaries: Infrastructure, platrforms, software, and data may move freely across the world.
Must know your regulations and carefully consider them.
Where is your data in the world?
What are details in a cloud contract?
- SLA (establish contractual obligations required to be met in order to provide acceptable service. they must be measurable to determine compliance or noncompliance) - financial compensation if vendor does not meet the SLA
- — turnaround times
- — average response times
- — number of online users
- — system utilization rates
- — system up time
- — volume of transactions
- — production problems
- Right to audit and pen test
- ownership of data
- termination agreement including secure return and or destruction of data and all copies
What are the advantages and disadvantages of cloud?
Advantages:
- no need to manage data center to host equipment and software
- preconfigured services may be quickly deployed
- redundancy
- speedy deployment times
- lower cost
- higher performance
- easier scalability
Security Concerns:
- outsourcing trust to the cloud provider
- what if the cloud provider is compromised?
- where is the data?
- do you have the right to audit?
- no longer have direct control over applications and data
What is Change Management?
The process of ensuring that changes dont negatively impact the system
Changes must be approved by the Change Control Board and documented in the change management database
Security should be considered when approving a change
Goals of change management:
- ensure that changes dont negatively impact the security posture of the organization
- notify stakeholders of upcoming changes
- determine potential system security impacts are acceptable
- document planned changes to allow for review
- identify possible means to revert to prior state should changes have unexpected negative impacts
What is the change control board?
Group responsible for ensuring that changes happen in a manner that doesnt negatively impact the organization.
Helps in the management of change. Changes are proposed, presented, reviewed, approved and scheduled by the CCB.
Need for speed - need fast decision making
What is the change control process?
- Notification of desire for change
- Formally documenting change details (also document failback plan should change not proceed as expected)
- determine appropriate schedule for change
- making the change
- reporting success, failure, and any relevant additional details regarding change
- uptime availability
Changes should be formally tested and a full report must be submitted to management with a summary of the change
What is patch management?
Specific type of change that is routine updating of an OS and applications as vendor updates are released.
Should be done at least monthly if not faster.
Patch testing and deployment procedures are typically required. Need to find a balance between operational stability and uptime versus rapid patch deployment. There are risks with patching without testing as well as not patching fast enough
Patch Now = beyond critical - there is malware on the wire, go now! (do ASAP - within 2 days)
Critical = patch fast - about 2 weeks