Section 2.1 Security Concepts in an Enterprise Environment Flashcards
What ensures that systems are configured similarly, configurations are known and documented?
Configuration Management
What helps reduce outages or weakened security from unauthorized changes?
Change Management
What uses a labeling or numbering system to track changes in updated versions of software?
Versioning
What ensures that systems are deployed with a common baseline or starting point, and imaging is a common method?
Baselining
What make identifying device type (router, server, printer) easier?
Standard Naming Convention
What do you call maintaining an up to date asset register to ease the process of tracking and maintaining assets?
Asset Management
What do you call using network segmentation to reduce broadcast traffic and enable filtering/restricting traffic to subnets containing sensitive resources?
IP Schema
What is it called when digital data is subject to the laws and regulations of the country in which it was created? It cannot be moved to another region, even for a backup-related reason.
Data Sovereignty
Confidentiality is often protected through?
Encryption (at rest and in transport)
What is it called where meaningful data is replaced with a token that is generated randomly, and the original data is held in a vault? Stateless, stronger than encryption, keys not local.
Tokenization
What do you call the de-identification procedure in which PII fields within a data record are replaced by one or more artificial identifiers, or pseudonyms? Reversal requires access to another data source
Pseudo-Anonymization
What is it called when only partial data is left in a data field? Commonly implemented within the database tier, but also possible in code of front-end applications.
Data Masking
What is a way to protect sensitive information and prevent its inadvertent disclosure? Can identify, monitor, and automatically protect sensitive information in documents?
DLP
CSP storage providers usually protect data at rest by?
automatically encrypting before persisting it
What helps you encrypt Windows and Linux IaaS VM’s disks using BitLocker (Windows) and dm-crypt feature of Linux to encrypt OS and data disks?
Full Disk Encryption