Domain 7 - Security Operations Flashcards
User and entity behavior analytics (UEBA)
- entity behavior is collected and input to a threat model, model establishes baseline of normal based on historical data, enables analysis to uncover anomalies
Threat intel feeds
- feed containing malicious entities ingested by cyber tools, educational tools for threat landscape changes, single feed may contain many sources including OSINT, entity = IP, website, actor, hashes
Role of AI and ML (SecOps)
- automate analysis, automated investigation feature, quickly analyze millions of events and identify many different types of threats, profiles are built on users/ assets/ networks/ devices allowing AI to detect and respond to deviations from established norms, factor in anti-malware, SIEM, IDS/IPS, IDaaS
Collusion
- agreement among multiple persons to perform unauthorized action
Separation of duties
- ensure 1 person doesn’t control all elements of a critical function
Job rotation
- employees rotated into different jobs or tasks, flush out fraud
Monitoring privileged operations
- monitor all assignment of privileges and the use of privileged operations, can detect many attacks because attackers commonly use special privileges
Information lifecycle
- Creation (file creation by user or system logs) > classification (to ensure its handled properly) > storage (protect data with adequate controls based on classification) > usage (anytime data is in use or in transit) > archive (sometimes needed to comply with laws or regulations) > destruction (destroyed in a way so it is not readable)
Service level agreements
-performance expectations like max downtimes/ availability numbers, can include penalties, usually applies to vendors
Secure provisioning
- ensures that resources are deployed in a secure manner and maintained in a secure manner throughout lifecycle, ie PC deployed from secure image
Virtual assets
- VMs, VDIs, SDN, SAN, hypervisors are primary component that manage virtual assets but also provide attackers with an additional target, KEEP IT PATCHED!!
Configuration management
ensures that systems are configured in a similar manner, configs are KNOWN and DOCUMENTED
Baselining
- ensures systems are deployed with a common baseline ie imaging, policy based config (GPOs), can then be TAILORED as needed
Change management
- helps reduce outages/ weakened sec from unauthorized changes, make sure all changes are documented/ discussed/ authorized, changes are tested approved and documented
Versioning
- uses labeling/ numbering to track changes in software, helpful in change management process
Patch management
- ensures systems are kept up to date with current sec patches, evaluate/ test/ approve/ deploy patches, system audits verify the deployment of approved patches to system, vuln scanner can identify missing patches
Vuln scanners
- detect vulns, weaknesses, absence of patches, weak passwords ie tenable, qualys
Vuln assessments
- includes review and audits to detects vulns in addition to a scan
Detection (IR)
- monitoring tools, IPS, firewalls, notifying management
Response (IR)
- triage (is it really an incident?), decision to declare, LIMIT DAMAGE
Mitigation (IR)
- first containment effort or step, create team, CONTAINMENT IS HERE
Reporting (IR)
- to relevent stakeholders (customers, vendors, law enforcement), MANAGEMENT DECISION
Recovery (IR)
- returning to normal ops, MANAGEMENT DECISION
Remediation (IR)
- root cause is addressed, ROOT CAUSE ANALYSIS
Lessons learned (IR)
- prevent recurrence, improve IR process
Denial of Service attacks (DoS)
- prevent a system from responding to legit requests for service, blocks resources
SYN flood attack
- disrupts TCP 3 way handshake
Smurf attack
- amplification network (systems under control of bad actor) to send many response packets to victim
Botnet
-collection of compromised computing devices (often called bots or zombies)
Bot herder
- attacker who remotely controls botnet via a C2 server, often use them to launch attacks or send phishing emails
Honeypot
- has pseudo flaws and fake data to lure/ distract intruders, cant entrap someone to commit an actual crime, as long as attackers are in the honeypot they are not in the live network and admins can observe, some IDS can transfer attackers to padded cell after detection (hardened honeypot)
Anti-malware software
- up to date definitions, installed on each system/ boundary device/ email servers/ etc, also has behavioral analysis now
Policies (blocking malicious code)
- enforce basic sec principles ie least privilege, no local admin, etc
Education (blocking malicious code)
- teaching users about risks and methods attackers use to spread viruses
Penetration tests
- discover vulns then mimic an attack to identify what can be exploited, not without consent and knowledge from management, can result in damage so should be done on isolated systems whenever possible, schedule at time of minimal activity
Black box pentesting
- no knowledge of environment
White box pentesting
- full knowledge of environment, open book test
Gray box pentesting
- partial knowledge of environment
IDS
- can respond by passively logging and notifying OR actively by changing the environment, reactive
§ HIDS - monitor activity on single system only, attackers can discover and disable
§ NIDS - monitor activity on a network, not as visible to attackers
IPS
- placed inline with traffic, can block malicious traffic before it reaches target, proactive
Espionage
- external threat, competitor tries to steal info
Sabotage
- insider threat, malicious insiders can become disgruntled, ie mass deletion/ server shutdowns, data theft
Zero-day exploits
- attack that uses a vulnerability that is either unknown to anyone but the attacker or a limited # of people, basic sec practices can often prevent these from being fully utilized
Common log files
- security logs, system logs, application logs, firewall logs, proxy logs, protected by centrally storing them and restricting access so they can’t be modified, read only!