Sec+ Chapter 11: Endpoint Security Flashcards
Endpoint
A wide range of devices that includes desktops, mobile devices, servers, etc
The end points of a network, whether that’s wired or wireless
UEFI
Unified extensible firmware interface
A replacement for basic input/output system (BIOS) and leverages two techniques that prove a system is secure
1) Secure boot
2) Measured boot
Secure boot
Ensures the system boots using only software that the OEM (original equipment manufacturer) trusts
Checks the bootloader to ensure no malware has changed the boot process
System must have a signature database listing the secure signatures of trusted software and firmware for boot process
Measured boot
Measures each component, starting with firmware and ending with the boot start drivers
Doesn’t validate against a known good list of signatures. Instead relies on UEFI firmware to hash the firmware, bootloader, drives, and other boot processes loaded during secure and trusted boot
TPM
Trusted platform module
A piece of hardware that helps with cryptographic functions used by apps in the OS
Can include a cryptographic processor that’s used as a random number or key generator
The memory of a TPM can store keys, especially keys that are burned on permanently and not changed
This means we can reference the TPM to obtain a unique value that’s not on any other computer you might have
Password protected and built with anti brute force tech
Hardware root of trust
We put specific security controls in place to ensure that we can rely on and trust our systems
EX: An individual system can have a TPM, or HSM
It’s the hardware root of trust that gives us the ability to trust that the system is going to be safe and secure
A significant security benefit is that hardware is difficult to change, and the hardware has to be installed for the trust to be put into the system
PUF
Physically unclonable function
Based on the unique features of a microprocessor that are created when it’s manufactured, and not intentionally created or replicated
How do antimalware tools detect malicious software?
Can you explain each one?
1) Signature based detection
2) Heuristic/behavior based detection
3) AI and ML systems
4) Sandboxing
Sandbox
An isolated environment where potentially dangerous or problematic software can be run and tested for in-depth analysis
EDR
Endpoint detection and response
Tools that combine monitoring capabilities on endpoint devices and systems with network monitoring and log analysis to collect, correlate, and analyze events
Can also perform a root cause analysis to check why the behavior happened in the first place
Isolate the system, quarantine the thread, or rollback to a previously known good configuration
API-drive, and can be done without any technician present
IoC
Indicators of compromise
DLP
Data loss prevention
Designed to prevent sensitive data across the network either in the clear or encrypted
Tools that can be deployed to endpoints in the form of clients or apps to protect data from prying eyes
Can also be put on networks, servers, email systems, or the cloud to manage data and handle processes
If it identifies sensitive data, it can block that information from being transferred
Host based firewall
Built into most modern OS and typically enabled by default
Usually runs on every endpoint
Doesn’t provide much insight into traffic they filter since they either block or allow apps, services, ports, or protocols
HIPS
Host intrusion prevention system
Analyzes traffic before services or apps on the host process it
Can take action and filter out malicious traffic or block specific elements of data that’s received
Uses signatures, heuristics, or behavior to identify malicious activity
HIDS
Host intrusion detection system
Uses log files to identify intrusions, and can reconfigure firewalls to block
Primarily, it only reports and alerts on issues though
NGFW
Next gen firewall AKA: application layer gateway, stateful multilayer inspection, or deep packet inspection (DPI)
Usually for an entire network vs hosts or endpoints, and sits on OSI layer 7
It inspects all data in every packet, and has:
1) Built in IDS or IPS functionality
2) Antimalware features
3) Geo-IP and geolocation to match threats with real-world locations
4) Proxying, allows device to intercept traffic and analyze it
5) Web app firewall capabilities
6) Sandboxing
Hardening
Changing settings on a system to increase its overall level of security and reduce vulnerability to attack
Attack surface
The places where a system could be attacked
CIS
Center for internet security
Common parts of a hardening process
Can you explain them?
1) Open ports and services
2) The registry
3) Disk encryption
4) OS
5) Patch management (third party updates and auto-update)
Fastest way to decrease attack surface?
Reduce the number of open ports and services that it provides
Best way to deal with open ports and unneeded services?
Disable them entirely
Firewall rules can work as well
OS hardening
Use of system settings to reduce the attack surface for your OS (windows, linux, android, ios, etc), and there are tools, standards, and processes that can help accomplish this
Always update your OS, stay up on patches
Keep user accounts secure with minimum password lengths and complexity, limit account permissions
Limit network access
Monitor and secure with antimalware software
How to harden Windows registry
Configure permissions for the registry and disallow remote access if it’s not required for a specific need
Limit access to registry tools