Security concerns related to vulnerabilities Flashcards
What is Cloud-based vs. on-premises vulnerabilities
An application vulnerability is a design flaw that can cause the security system to be circumvented or that will cause the application to crash.
On-premises risks refer to software vulnerabilities, weak configurations, and third-party issues arising from hosts, servers, routers, switches, access points, and firewalls located on a private network installed to private offices or campus buildings. Many companies use cloud services to fully or partly support business workflows. The third-party vendor management, code, and data storage risks discussed previously apply directly to cloud as well as to on-premises. Software and weak configuration risks can also apply, however. They are not the sole responsibility of the cloud service provider (CSP). Clouds operate a shared responsibility model. This means that the cloud service provider is responsible for the security of the cloud, while the cloud consumer is responsible for security in the cloud. The types of software and configuration vulnerabilities that you must assess and monitor vary according to the nature of the service.
What is Zero-day
A vulnerability in software that is unpatched by the developer or an attack that exploits such a vulnerability.
What is Weak configurations
Open Permissions Unsecure root account Errors Weak encryption Unsecure protocols Default settings Open ports and services
What is Open permissions
Open permissions refers to provisioning data files or applications without differentiating access rights for user groups.
What is Unsecure root accounts
The root account, referred to as the default Administrator account in Windows or generically as the superuser, has no restrictions set over system access. A superuser account is used to install the OS. An unsecured root account is one that an adversary is able to gain control of, either by guessing a weak password or by using some local boot attack to set or change the password.
What is Errors
Weakly configured applications may display unformatted error messages under certain conditions. These error messages can be revealing to threat actors probing for vulnerabilities and coding mistakes. Secure coding practices should ensure that if an application fails, it does so “gracefully” without revealing information that could assist the development of an exploit.
What is Weak encryption
Encryption algorithms protect data when it is stored on disk or transferred over a network. Encrypted data should only be accessible to someone with the correct decryption key.
What is Unsecure protocols
An unsecure protocol is one that transfers data as cleartext; that is, the protocol does not use encryption for data protection. Lack of encryption also means that there is no secure way to authenticate the endpoints. This allows an attacker to intercept and modify communications, acting as man-in-the-middle (MITM).
What is Default settings
Relying on the manufacturer default settings when deploying an appliance or software applications is one example of weak configuration. It is not sufficient to rely on the vendor to ship products in a default-secure configuration, though many now do. Default settings may leave unsecure interfaces enabled that allow an attacker to compromise the device. Network appliances with weak settings can allow attackers to move through the network unhindered and snoop on traffic.
What is Open ports and services
Network applications and services allow client connections via Transport Control Protocol (TCP) or User Datagram Protocol (UDP) port numbers. The clients and servers are identified by Internet Prototocol (IP) addresses. Servers must operate with at least some open ports, but security best practice dictates that these should be restricted to only necessary services. Running unnecessary open ports and services increases the attack surface.
What is Third-party risks
Vendor management System integration Lack of vendor support Supply Chain Outsourced code development Data storage
What is Vendor management
Policies and procedures to identify vulnerabilities and ensure security of the supply chain.
Is a process for selecting supplier companies and evaluating the risks inherent in relying on a third-party product or service.
What is System integration
System integration refers to the process of using components/services from multiple vendors to implement a business workflow.
What is Lack of vendor support
The vendor for a variety of reasons has ceased providing a good service or failed to provide good service or security.
What is Supply chain
A supply chain is a network between a company and its suppliers to produce and distribute a specific product to the final buyer.