Domain 7: Security Operations Flashcards
Clipping levels
Clipping levels should be implemented to establish a baseline of user activity and acceptable errors.
Why separation of duties?
Separation of responsibilities and duties should be in place so that if fraud takes place it requires collusion.
What should be in place to manage changes?
- Change control
- Configuration management
Change management activities
- Requesting a change
- Approving a change
- Documenting a change
- Testing a change
- Implementing a change
- Reporting to management
How do you counter equipment failure?
Proper fault-tolerant mechanisms
Continuous monitoring
Continuous monitoring allows organizations to maintain ongoing awareness of information security vulnerabilities and threats to support organizational risk management decisions.
Whitelist
A whitelist is a set of known-good resources such as IP addresses domain names or applications.
Conversely a blacklist is a set of known-bad resources.
SIEM
A security information and event management (SIEM) system is a software platform that aggregates:
- Security information (like asset inventories)
- Security events (which could become incidents)
and presents them in a single consistent and cohesive manner.
Key aspects of operational security
The key aspects of operational security include:
- Resource protection
- Change control
- Hardware and software controls
- Trusted system recovery
- Separation of duties
- Least privilege
Least privilege
Least privilege ensures that users administrators and others accessing a system have access only to the objects they absolutely require to complete their job.
Conflict between physical security and human safety
Some physical security controls may conflict with the safety of people. These issues need to be addressed; human life is always more important than protecting a facility or the assets it contains.
Proximity identification
Proximity identification devices can be:
- User activated (action needs to be taken by a user)
- System sensing (no action needs to be taken by the user)
Transponder
A transponder is a proximity identification device that does not require action by the user.
The reader transmits signals to the device and the device responds with an access code.
Intrusion detection system examples
Intrusion detection devices include:
- Motion detectors
- CCTVs
- Vibration sensors
- Electromechanical devices
Cons of intrusion detection systems
- Can be penetrated
- Are expensive to install and monitor
- Require human response
- Are subject to false alarms
Pros and cons of CCTV
Enables one person to monitor a large area
Should be coupled with alerting functions to ensure proper response
Pros and cons of security guards
- Security guards are expensive
- Provide flexibility in response to security breaches
- Can deter intruders from attempting an attack
Vulnerability management
Vulnerability management is the cyclical process of:
- Identifying vulnerabilities
- Determining the risks they pose to the organization
- Applying security controls that bring those risks to acceptable levels
Patch management
Patch management is the process for identifying acquiring installing and verifying patches for products and systems.
Egress monitoring
Egress monitoring is the practice of tracking (and perhaps restricting) the information that is flowing out of a network.
Offsite backup location types
- Hot sites
- Warm sites
- Cold sites
Reciprocal Agreement
A reciprocal agreement is one in which a company promises another company it can move in and share space if it experiences a disaster and vice versa.
Reciprocal agreements are very tricky to implement and may be unenforceable. However they offer a relatively cheap offsite option and are sometimes the only choice.
Hot site
A hot site is fully configured with hardware software and environmental needs.
It can usually be up and running in a matter of hours. It is the most expensive option but some companies cannot be out of business longer than a day without very detrimental results.
Warm site
A warm site does not have computers but it does have some peripheral devices such as disk drives controllers and tape drives.
This option is less expensive than a hot site but takes more effort and time to become operational.