Secure Architecture Flashcards

1
Q

Threat Modelling

A

A team exercise undertaken to identify and mitigate threats. Typically planned early in the lifecycle. Steps:
1. Identify Security Objectives: Legal, compliance requirements.
2. System Decomposition: Data Flow diagrams (Consider data stores, function calls, trust boundaries [VMs, user privileges, networks]).
3. Threat Identification: DFD creation may identify threats. STRIDE is another way.
4. Threat Mitigation: Strategies - Re-design to mitigate (most preferred), apply std mitigation, invent a new mitigation (costly and time consuming), accept and ignore. Use Attack Tree model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat Modeling - STRIDE for threat identification.

A

Spoofing (Authentication),
Tampering (Integrity),
Repudiation (non-Repudiation),
Information Disclosure (Confidentiality),
Denial of Service ( Availability),
Escalation of privilege (Authorization).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat Modeling - Threat Mitigation - Attack tree

A

An attack tree is a graphical representation of an attack, beginning with the attack objective as the root node. From this node, a hierarchical tree-like structure of necessary conditions is listed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat Modeling - Threat Mitigation - Assessing Priority-How?

A
  1. Multiply probability with Risk/loss.
  2. DREAD - Damage Potential, Reproducibility, Exploitability, Affected Users and Discoverability. Assign 0 to 5 for each, sum and divide by 5 to arrive at a score from 0 to 10.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attack Surface Evaluation and minimization

A

Determined by all the features implemented. Measured by Attack Surface Quotient (ASQ). Disabling unused features, minimizing privileges, env hardening helps. Evaluation happens as the product is updated, typically undertaken during Design phase to avoid rework later.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Threat Intelligence

A

Threat intelligence is the actionable information about malicious actors, their tools, infrastructure, and methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Threat Hunting

A

An iterative process of proactively searching out threats inside the network, typically by forming hypothesis and testing them. E.g. “an adversary is using stolen credentials to mimic authorized users during nonworking hours.”. Verify logs to check if this true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Controls

A

Classes: Administrative, Technical and Physical
For each Class 4 Types: Preventive, Detective, Corrective, Compensating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NIST Special Publication 800-145

A

The NIST Definition of Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Trusted Platform Module (TPM)

A

A chip exists on motherboard, includes a unique RSA key burned into it, which is used for asymmetric encryption. Additionally, it can generate, store, and protect other keys used in the encryption and decryption process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hardware Security Module

A

Typically attached via USB or network connections used to manage and store cryptographic keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

OCTAVE model

A

Operational Critical Threat, Asset and Vulnerability Evaluation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PASTA

A

Process for Attack simulation and Threat Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NIST SP 800 30

A

Has a list of threats in its appendices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly