GCGA Ch. 5 Securing Hosts and Data Flashcards
Virtualization
allows multiple servers to operate on a single physical host. It also supports virtual desktops.
VDI
A virtual desktop infrastructure (VDI) hosts a user’s desktop operating system on a server. Thin clients, including mobile devices, can connect to a server and access a VDI.
Container virtualization
runs services or applications within isolated containers or application cells. Containers use the kernel of the host.
VM escape attacks
allow an attacker to access the host system from the VM. The primary protection is to keep the host and guests up to date with current patches.
VM sprawl
occurs if personnel within the organization don’t manage the VMs.
Endpoints
computing devices such as servers, desktops, laptops, mobile devices, or Internet of Things (IoT) devices.
EDR
Endpoint detection and response (EDR) provides continuous monitoring of endpoints. Extended detection and response (XDR) includes other types of devices and systems.
Hardening
the practice of making an operating system or application more secure from its default installation.
Configuration management practices
help organizations deploy systems with secure configurations. A master image provides a secure starting point for systems. Master images are typically created with templates or other baselines to provide a secure starting point for systems. Integrity measurement tools detect when a system deviates from the baseline.
Patch management procedures
ensure operating systems, applications, and firmware are kept up to date with current patches. This ensures they are protected against known vulnerabilities.
Change management policies
define the process for making changes and help reduce unintended outages from changes. An application allow list identifies authorized software but blocks all other software. An application block list blocks unauthorized software but allows other software to run.
Full disk encryption (FDE)
encrypts an entire disk. A selfencrypting drive (SED) has the encryption circuitry built into the drive.
TPM: A Trusted Platform Module (TPM) is a chip included with many desktops, laptops and some mobile devices, and it supports full disk encryption, a secure boot process, and supports remote attestation. TPMs have an encryption key burned into them and they provide a hardware root of trust.
HSM
A hardware security module (HSM) is a removable or external device used for encryption. An HSM generates and stores RSA encryption keys and can be integrated with servers to provide hardware-based encryption. A microSD HSM is a microSD chip with an HSM device installed on it.
Protecting confientiality
The primary method of protecting the confidentiality of data is with encryption and strong access controls. File system security includes the use of encryption to encrypt files and folders.
Database encryption methods
You can encrypt individual columns in a database (such as credit card numbers), entire databases, individual files, entire disks, and removable media.
DLP
Data loss prevention (DLP) techniques and technologies help prevent data loss. They can block transfer of data to USB devices and analyze outgoing data via email to detect unauthorized transfers.
Data exfiltration
the unauthorized transfer of data outside an organization.
Cloud computing
provides an organization with additional resources. Most cloud services are provided via the Internet or a hosting provider. On-premise clouds are owned and maintained by an organization.
SaaS
Software as a Service (SaaS) includes web-based applications such as web-based email.
PaaS
Platform as a Service (PaaS) provides an easy-to-configure operating system and on-demand computing for customers. The vendor keeps systems up to date with current patches.
IaaS
Infrastructure as a Service (IaaS) provides hardware resources via the cloud. It can help an organization limit the size of its hardware footprint and reduce personnel costs.
MSP
A managed service provider (MSP) is a third-party vendor that provides any IT services needed by an organization, including security services. A managed security service provider (MSSP) focuses on providing security services for an organization.
CASB
A cloud access security broker (CASB) is a software tool or service deployed between an organization’s network and the cloud provider. It monitors all network traffic and can enforce security policies.
Private clouds
designed for use by a single organization.