OWASP principles and security audits Flashcards

1
Q

What does ‘minimize attack surface area’ mean?

A

Reducing all the potential vulnerabilities that a threat actor could exploit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the principle of least privilege?

A

Users should have the least amount of access required to perform their everyday tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is defense in depth?

A

Organizations should have varying security controls that mitigate risks and threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is separation of duties?

A

Critical actions should rely on multiple people, each of whom follow the principle of least privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does ‘keep security simple’ mean?

A

Avoid unnecessarily complicated solutions, as complexity makes security difficult.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does ‘fix security issues correctly’ involve?

A

When security incidents occur:

Identify the root cause
Contain the impact
Identify vulnerabilities
Conduct tests to ensure successful remediation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does ‘establish secure defaults’ mean?

A

The optimal security state of an application should be its default state for users; it should take extra work to make the application insecure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does ‘fail securely’ mean?

A

When a control fails or stops, it should default to its most secure option. For example, a failing firewall should block all connections rather than accept everything.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does ‘don’t trust services’ mean?

A

Organizations shouldn’t explicitly trust that their third-party partners’ systems are secure, even when working together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is ‘avoid security by obscurity’?

A

The security of key systems should not rely on keeping details hidden. Security should depend on factors like password policies, defense in depth, and solid network architecture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What should be included when identifying the scope of an audit?

A

The audit should:

List assets to be assessed
Note how the audit will help achieve organizational goals
Indicate audit frequency
Include evaluation of organizational policies, protocols, and procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are examples of assets that should be assessed in an audit?

A

Examples include:

Firewall configurations
PII security
Physical asset security
Implementation of organizational policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a risk assessment in an audit?

A

An evaluation of identified organizational risks related to:

Budget
Controls
Internal processes
External standards and regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What happens during the audit conducting phase?

A

You assess the security of the identified assets listed in the audit scope.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a mitigation plan?

A

A strategy established to:

Lower the level of risk
Reduce potential costs and penalties
Address issues that can negatively affect the organization’s security posture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What should be included in the final stakeholder communication?

A

A detailed report containing:

Findings
Suggested improvements to lower organizational risk
Compliance regulations and standards the organization needs to follow