Securing against Threats (Ch. 5,6,7) Flashcards
VM escape
_ attack on host system from within a virtual guest system (running on the host)
_ protect by keeping host system up to date
VM sprawl
_ when VMs are spun up and forgotten
_ don’t get patched
endpoint
_ a computing device on a network
EDR
_ endpoint detection and response
_ monitors endpoints for threats
XDR
_ extended detection and response
_ more comprehensive than EDR
_ extends security to cloud
HIPS
_ host intrusion prevention system
_ prevents intrusion on a single endpoint
Secure baseline
_ known secure starting image for a system
_ maintained over time
_ facilitates deployment of new installations
_ can check systems for deviations from baseline
FDE
_ full disk encryption
SED
_ self-encrypting drive
_ aka hardware-based FDE drive
_ credentials created upon setting up drive
UEFI
_ replacement for BIOS
_ can boot from large disks
_ CPU-independent
_ stored on firmware
_ overwritable with flashing
TPM
_ trusted platform module
_ chip on motherboard that stores cryptographic keys
_ secures boot process
_ most computers have them
_ can be used to encrypt disk
_ contains a burned-in endorsement key
_ can store additional keys
HSM
_ hardware security module
_ peripheral for storing cryptographic keys
_ provides security methods of TPM
EOL
_ end-of-life (hardware)
DLP
_ data loss prevention
_ can prevent use of USB flash drives
_ can block unauthorized data transfers
_ can examine content for terms that can’t be exported
Secure enclave
_ aka trusted execution environment (TEE)
_ uses hardware to provide an isolated system for processing sensitive data
PaaS vs IaaS
_ PaaS provides OS and apps, fully managed
_ IaaS provides hardware (perhaps virtual), customer installs and manages the OS and up
XaaS
_ anything as a service
_ umbrella term that refers to the delivery of products, services, or resources as a service over the internet.
Multi-cloud system
_ uses multiple cloud providers
_ increases resiliency and redundancy
Hybrid cloud system
_ partly public, partly private
DLP
_ data loss prevention
MSSP
_ managed security service provider
_ provided by a third party
_ can be an appliance
_ patch management
_ vulnerability scanning
_ spam/virus filtering
_ data loss prevention (DLP)
_ VPN
_ proxy services for filtering the web
_ IDS and IPS
_ UTM appliances
_ next-generation firewall
MSP
_ managed service provider
_ doesn’t just focus on security, but IT generally
CSP
_ cloud service provider
CASB
_ cloud access security broker
_ runs between an organization’s network and the cloud provider
_ monitors traffic and enforces security policies