Section 26.253 Automating Security Flashcards

Objective 4.7 Explain the importance of automation and orchestration related to secure operations

1
Q

Automating Security

A

Helps prevent security vulnerabilities, respond to threats swiftly, and maintain consistent security policies

■ It involves using technology to perform crucial but repetitive security tasks to maintain updated defenses and swift response to security threats

■ Automation includes the use and configuration of guardrails, security groups, service access management, and permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ways to Automate Security

Implementing Guardrails

A

Guardrails are automated safety controls to protect against insecure infrastructure configurations

● Configured according to security standards and enforce security policies automatically

● Continuously monitor infrastructure, detect security violations, and take predefined corrective actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ways to Automate Security

Managing Security Groups

A

Security groups act as virtual firewalls for cloud-based server instances

● Specify allowed incoming and outgoing network traffic using predefined rules

● Automate assignment of instances to appropriate security groups

● Dynamically adjust security group configurations to respond to evolving threats

● Analyse traffic for unauthorised access attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ways to Automate Security

Enabling and Disabling Services and Access

A

Automate service access management to prevent unnecessary risks and maintain operational efficiency

● Regularly review and manage access to services

● Monitor for unusual activity and automatically restrict or disable access if suspicious

● Enable or disable services based on a predefined schedule when not continuously needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ways to Automate Security

Automating Permissions Management

A

Manage permissions using Role-based Access Controls (RBAC)

● Automate provisioning and de-provisioning of access rights based on assigned roles

● Ensure no unauthorised access to sensitive information

● Perform regular checks on permissions settings to verify compliance with policies and regulations

● Make necessary adjustments over time to maintain security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly