Risk Flashcards

1
Q

What is the primary use of risk section?

A

help understand how deployment configuration and runtime activity impact the likelihood of an exploit occurring and how successful those exploits will be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the tabs of a risk item?

A

Risk indicators
Deployment details
Process discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the section for a risk indicator?

A

RBAC Configuration
Violations
Image freshness
Service configuration
Service reachability
Number of components in image
Components Useful for Attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does ACS RHACS monitors runtime activity

A

build a baseline of observed behavior, and tracking deviations from that baseline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are elements of the Event Timeline in process discovery?

A

1) policy violations
2) process restart and terminations
3) process activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly