Securing against Threats (Ch. 5,6,7) Flashcards
VM escape
_ attack on host system from within a virtual guest system (running on the host)
_ protect by keeping host system up to date
VM sprawl
_ when VMs are spun up and forgotten
_ don’t get patched
endpoint
_ a computing device on a network
EDR
_ endpoint detection and response
_ monitors endpoints for threats
XDR
_ extended detection and response
_ more comprehensive than EDR
_ extends security to cloud
HIPS
_ host intrusion prevention system
_ prevents intrusion on a single endpoint
Secure baseline
_ known secure starting image for a system
_ maintained over time
_ facilitates deployment of new installations
_ can check systems for deviations from baseline
FDE
_ full disk encryption
SED
_ self-encrypting drive
_ aka hardware-based FDE drive
_ credentials created upon setting up drive
UEFI
_ replacement for BIOS
_ can boot from large disks
_ CPU-independent
_ stored on firmware
_ overwritable with flashing
TPM
_ trusted platform module
_ chip on motherboard that stores cryptographic keys
_ secures boot process
_ most computers have them
_ can be used to encrypt disk
_ contains a burned-in endorsement key
_ can store additional keys
HSM
_ hardware security module
_ peripheral for storing cryptographic keys
_ provides security methods of TPM
EOL
_ end-of-life (hardware)
DLP
_ data loss prevention
_ can prevent use of USB flash drives
_ can block unauthorized data transfers
_ can examine content for terms that can’t be exported
Secure enclave
_ aka trusted execution environment (TEE)
_ uses hardware to provide an isolated system for processing sensitive data
PaaS vs IaaS
_ PaaS provides OS and apps, fully managed
_ IaaS provides hardware (perhaps virtual), customer installs and manages the OS and up
XaaS
_ anything as a service
_ umbrella term that refers to the delivery of products, services, or resources as a service over the internet.
Multi-cloud system
_ uses multiple cloud providers
_ increases resiliency and redundancy
Hybrid cloud system
_ partly public, partly private
DLP
_ data loss prevention
MSSP
_ managed security service provider
_ provided by a third party
_ can be an appliance
_ patch management
_ vulnerability scanning
_ spam/virus filtering
_ data loss prevention (DLP)
_ VPN
_ proxy services for filtering the web
_ IDS and IPS
_ UTM appliances
_ next-generation firewall
MSP
_ managed service provider
_ doesn’t just focus on security, but IT generally
CSP
_ cloud service provider
CASB
_ cloud access security broker
_ runs between an organization’s network and the cloud provider
_ monitors traffic and enforces security policies
Cloud-based DLP
_ cloud-based data-loss prevention
_ implements policies for cloud-based data
_ e.g. detect PII or PHI, blocking and sending alerts
SWG
_ secure web gateway
_ proxy server + stateless firewall
_ typically cloud-based
_ URL filtering to block unauthorized sites
_ packet monitoring for malicious traffic
_ malware detection and filtering
Security group
_ means by which a firewall on a virtual cloud network allows you to specify your customer-specific security rules
_ customers can’t change firewall directly or cloud security rules directly because this would affect other customers
IaC
_ infrastructure as code
_ managing data centers with code defining VMs and virtual networks
_ allows for script-based management
Data plane
_ logic that forwards or blocks traffic
Control plane
_ logic that identifies path for data to take
SDN
_ software-defined networking
_ uses virtual technology to route traffic instead of using hardware routers and switches
_ common in cloud solutions
_ separates data and control planes
Edge computing
_ storing and processing data close to the devices that generate and use the data
_ typically stores and processes data on a single node
Fog computing
_ using networks at the edge
CSA
_ cloud security alliance
_ non-profit promoting cloud best practices
Mobile device
_ smartphone or tablet
_ has a full operating system
_ excludes laptops because they don’t include GPS
_ excludes most IoT for lacking an OS
COPE
_ corporate-owned, personally enabled
_ mobile device policy
_ employees are free to use devices for personal purposes
BYOD
_ bring your own device
_ must comply with corporate policies to connect to network
CYOD
_ choose your own device
_ company provides list of acceptable devices