Domain 7: Security Operations Flashcards
Clipping levels
Clipping levels should be implemented to establish a baseline of user activity and acceptable errors.
Why separation of duties?
Separation of responsibilities and duties should be in place so that if fraud takes place it requires collusion.
What should be in place to manage changes?
- Change control
- Configuration management
Change management activities
- Requesting a change
- Approving a change
- Documenting a change
- Testing a change
- Implementing a change
- Reporting to management
How do you counter equipment failure?
Proper fault-tolerant mechanisms
Continuous monitoring
Continuous monitoring allows organizations to maintain ongoing awareness of information security vulnerabilities and threats to support organizational risk management decisions.
Whitelist
A whitelist is a set of known-good resources such as IP addresses domain names or applications.
Conversely a blacklist is a set of known-bad resources.
SIEM
A security information and event management (SIEM) system is a software platform that aggregates:
- Security information (like asset inventories)
- Security events (which could become incidents)
and presents them in a single consistent and cohesive manner.
Key aspects of operational security
The key aspects of operational security include:
- Resource protection
- Change control
- Hardware and software controls
- Trusted system recovery
- Separation of duties
- Least privilege
Least privilege
Least privilege ensures that users administrators and others accessing a system have access only to the objects they absolutely require to complete their job.
Conflict between physical security and human safety
Some physical security controls may conflict with the safety of people. These issues need to be addressed; human life is always more important than protecting a facility or the assets it contains.
Proximity identification
Proximity identification devices can be:
- User activated (action needs to be taken by a user)
- System sensing (no action needs to be taken by the user)
Transponder
A transponder is a proximity identification device that does not require action by the user.
The reader transmits signals to the device and the device responds with an access code.
Intrusion detection system examples
Intrusion detection devices include:
- Motion detectors
- CCTVs
- Vibration sensors
- Electromechanical devices
Cons of intrusion detection systems
- Can be penetrated
- Are expensive to install and monitor
- Require human response
- Are subject to false alarms
Pros and cons of CCTV
Enables one person to monitor a large area
Should be coupled with alerting functions to ensure proper response
Pros and cons of security guards
- Security guards are expensive
- Provide flexibility in response to security breaches
- Can deter intruders from attempting an attack
Vulnerability management
Vulnerability management is the cyclical process of:
- Identifying vulnerabilities
- Determining the risks they pose to the organization
- Applying security controls that bring those risks to acceptable levels
Patch management
Patch management is the process for identifying acquiring installing and verifying patches for products and systems.
Egress monitoring
Egress monitoring is the practice of tracking (and perhaps restricting) the information that is flowing out of a network.
Offsite backup location types
- Hot sites
- Warm sites
- Cold sites
Reciprocal Agreement
A reciprocal agreement is one in which a company promises another company it can move in and share space if it experiences a disaster and vice versa.
Reciprocal agreements are very tricky to implement and may be unenforceable. However they offer a relatively cheap offsite option and are sometimes the only choice.
Hot site
A hot site is fully configured with hardware software and environmental needs.
It can usually be up and running in a matter of hours. It is the most expensive option but some companies cannot be out of business longer than a day without very detrimental results.
Warm site
A warm site does not have computers but it does have some peripheral devices such as disk drives controllers and tape drives.
This option is less expensive than a hot site but takes more effort and time to become operational.
Cold site
A cold site is just a building with power raised floors and utilities. No devices are available.
This is the cheapest of the three options but can take weeks to get up and operational.
RTO
Recovery time objective (RTO) is the maximum time period within which a business process must be restored to a designated service level after a disaster to avoid unacceptable consequences.
RPO
Recovery point objective (RPO) is the acceptable amount of data loss measured in time.
MTBF
Mean time between failures (MTBF) is the predicted amount of time between inherent failures of a system during operation.
MTTR
Mean time to repair (MTTR) is the estimated amount of time it will take to get a device fixed and back into production after its failure.
High availability
High availability refers to a system component or environment that is continuously operational.
High availability for DR
High availability for disaster recovery is often a combination of technologies and processes that include:
- Backups
- Redundancy
- Fault tolerance
- Clustering
- Load balancing
How are data recovery and data restoration accomplished?
- Vaulting
- Backups
- Replication technologies
Who returns first to original site after a disaster?
When returning to the original site after a disaster the least critical organizational units should go back first.
COOP
COOP focuses on restoring an organization’s (usually a headquarters element) essential functions at an alternate site and performing those functions for up to 30 days before returning to normal operations.
This term is commonly used by the U.S. government to denote BCP.
Business interruption insurance
Business interruption insurance covers the loss of income that an organization suffers after a disaster while it is in its recovery stage.
Due diligence vs. Due care
- Due diligence means you’re identifying and analyzing risks
- Due care means you’re taking prudent actions day in and day out to mitigate them
Negligence
Elements of negligence include:
- Not fulfilling a legally recognized obligation
- Failure to conform to a standard of care that results in injury or damage
- Proximate causation
Why evidence chain of custody?
To ensure that it will be admissible in court by showing it was properly controlled and handled before being presented in court.
What makes business records admissible?
To be admissible in court business records have to be:
- Made and collected in the normal course of business
- Not specially generated for a case in court
Business records can easily be hearsay if there is no firsthand proof of their accuracy and reliability.
Evidence lifecycle
The life cycle of evidence includes:
- Identification
- Collection
- Storage
- Preservation
- Transportation
MOM
Motive Opportunity and Means (MOM)
When is evidence admissible?
For evidence to be admissible in court it needs to be:
- Relevant
- Complete
- Sufficient