Module 2 - 02-4 Flashcards
OWASP principles and security audits
Define Vulnerability Scanner?
A network tool (hardware and/or software) that scans network devices to identify generally known and organization specific CVEs. It may do this based on a wide range of signature strategies.
A tool (hardware and/or software) used to identify hosts/host attributes and associated vulnerabilities (CVEs, CWEs, and others).
What does CVE stand for?
Common Vulnerabilities and Exposures
What does CWE stand for?
Common Weakness Enumeration
What does OWASP stand for?
Open Web Application Security Project, recently renamed Open Worldwide Application Security Project®
How many Security Principles does OWASP have?
Ten (10)
What are the OWASP Security Principles (10)?
1) Minimize Attack Surface Area
2) Establish Secure Defaults
3) The Principle of Least Privilege
4) The Principle of Defense in Depth
5) Fail Securely
6) Don’t Trust Services
7) Separation of Duties
8) Avoid Security by Obscurity
9) Keep Security Simple
10) Fix Security Issues Correctly
Define Minimize Attack Surface Area
Attack surface refers to all the potential vulnerabilities a threat actor could exploit
Define Attack Vector
Pathways attackers use to penetrate security defenses
What is an example of a common Attack Vector (2)?
- Phishing emails
- Weak passwords
How can an organization minimize attack surfaces and avoid security incidents (3)?
- Disable software features
- Restrict who can access certain assets
- Establish more complex password requirements
Define the Principle of Least Privilege
Users have the least amount of access required to perform their everyday tasks
What is the main reason for limiting access to organizational information and resources?
To reduce the amount of damage a security breach could cause
Define Defense in Depth
Organizations should have multiple security controls that address risks and threats in different ways
Define Security Controls
Safeguards designed to reduce specific security risks
What is an example of security controls (4)?
- Multi-factor authentication (MFA)
- Firewalls
- Intrusion Detection Systems (IDSs)
- Permission settings that can be used to create multiple points of defense
What are examples of security controls that can be used to create multiple points of defense a threat actor must get through to breach an organization (4)?
- Multi-factor authentication (MFA)
- Firewalls
- Intrusion detection systems (IDSs)
- Permission settings
Define Separation of Duties
Critical actions should rely on multiple people, each of whom follow the principle of least privilege.
No one should be given so many privileges that they can misuse the system
Used to prevent individuals from carrying out fraudulent or illegal activities
Define Keep Security Simple
Avoid unnecessarily complicated solutions. Complexity makes security difficult.
When implementing security controls, unnecessarily complicated solutions should be avoided because they can become unmanageable.
The more complex the security controls are, the harder it is for people to work collaboratively.
Define Fix Security Issues Correctly
When security incidents occur, identify the root cause, contain the impact, identify vulnerabilities, and conduct tests to ensure that remediation is successful.
Identify the root cause quickly and it is important to correct any identified vulnerabilities and conduct tests to ensure that repairs are successful
Define Establish Secure Defaults
The optimal security state of an application is also its default state for users; it should take extra work to make the application insecure
Define Fail Securely
When a control fails or stops, it should do so by defaulting to its most secure option
Define Don’t Trust Services
An organization shouldn’t explicitly trust that their partners’ systems are secure
Define Avoid Security by Obscurity
The security of key systems should not rely on keeping details hidden.
Consider the following example from OWASP (2016):
The security of an application should not rely on keeping the source code secret. Its security should rely upon many other factors, including reasonable password policies, defense in depth, business transaction limits, solid network architecture, and fraud and audit controls.
Define Audit
Independent reviews that evaluate whether an organization is meeting internal and external criteria
Define Internal criteria
Outlined policies, procedures, and best practices.
Define External criteria
Regulatory compliance, laws, and federal regulations
Define Security Audit
A review of an organization’s security controls, policies, and procedures against a set of expectations
What is the goal of a security audit?
To ensure an organization’s information technology (IT) practices are meeting industry and organizational standards
What do Audits provide?
Direction and Clarity by Identifying what the current failures are and developing a plan to correct them
What is the objective of an internal security audit?
To identify and address areas of remediation and growth
What are two main types of security audits?
- External
- Internal
What are the purposes of internal security audits (3)?
- Identify organizational risk
- Assess controls
- Correct compliance issues
How can internal security audits help an organization (2)?
- Improve an organization’s security posture
- Avoid fines from governing agencies due to a lack of compliance.
What are the common elements of internal security audits (5)?
- Establishing the Scope and Goals
- Conducting a Risk Assessment
- Completing a Controls Assessment
- Assessing Compliance
- Communicating Results
What two elements are part of the Audit Planning Process?
- Establishing the scope and goals
- Conducting a risk assessment
Define Scope
The specific criteria of an internal security audit