Security Domain Flashcards

1
Q

I: SECURE 3-TIER APP

A

Presentation tier

S3 Bucket: Bucket ACLs (read/write, etc.), Encryption (object) – custom key or Amazon default key
CloudFront: OAI (origin access identity), Geo restrictions, Custom headers, Signed URLs, Signed cookies, HTTPS & DDoS

Application tier

API Gateway: Resource policies, Identity pools, Client certificates, Usage plans, Throttling, Caching, API Keys
Lambda: Lambda triggers, Lambda role, Lambda security group, SSM parameter store

Data tier

Amazon RDS: DB security group, DB encryption, Private endpoint, KMS

Additional security

WAF: Layer 7 firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

I: STATEFUL FIREWALL

A

Stateful firewall (Security groups) this means any changes applied to an incoming rule will be automatically applied to the outgoing rule. e.g. If you allow an incoming port 80, the outgoing port 80 will be automatically opened. Security group support allow rules only (by default all rules are denied). e.g. You cannot deny a certain IP address from establishing a connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

I: WAF

A

WAF (layer 7) is an advanced Firewall system which offers the security from threats, malware, and other vulnerable attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

I: IDS

A

is a system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered.

FireEye
CrowdStrike
Zeek
Snort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

I: SSL/TLS HANDSHAKE

A

Client Hello Server. I want to establish secure communication between the two of us. Here are my cipher suits and compatible SSL/TLS version.

Server Hello Client. I have checked your cipher suits and SSL/TLS version. I think we’re good to go ahead. Here are my certificate file and my public key.

Client Let me verify your certificate. Okay, it seems fine, but I need to verify your private key. What I’ll do is, I will generate and encrypt a pre-master (shared secret key) key using your public key. Decrypt it using your private key and we’ll use this master key to encrypt and decrypt the information

Server Done. Now that both the parties know who they’re talking to, the information transferred between them will be secured using the master-key. Keep in mind that once the verification part is over, the encryption takes place through the master-key only. This is symmetric encryption.

Client I’m sending you this sample message to verify that our master-key works. Send me the decrypted version of this message. If it works, our data is in safe hands

Server Yeah, it works. I think we’ve accomplished what we were looking for.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

I: HTTP

A

used for transferring data over a network. Most information that is sent over the Internet, including website content and API calls, uses the HTTP protocol. There are two main kinds of HTTP messages: requests and responses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

I: TLS/SSL PROCESS

A

is public key encryption: there are two keys, a public key and a private key, and the public key is shared with client devices via the server’s SSL certificate. When a client opens a connection with a server, the two devices use the public and private key to agree on new keys, called session keys, to encrypt further communications between them.

All HTTP requests and responses are then encrypted with these session keys, so that anyone who intercepts communications can only see a random string of characters, not the plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

I: TLS TERMINATION

A

SSL should terminate at the load balancer is because it offers a centralized place to correct SSL attacks such as CRIME or BEAST. If SSL is terminated at a variety of web servers, running on different OS’s you’re more likely to run into problems due to the additional complexity. Keep it simple, and you’ll have fewer problems in the long run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

I: HASHING

A

Meant to verify that a file or piece of data hasn’t been altered, in other words, a checksum.

MD4
MD5
SHA
RIPEM
WHIRLPOOL
TIGER
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

I: AT REST

A

it is not traveling within the system or network, and it is not being acted upon by any application or third-party. It’s something that has reached a destination, at least temporarily.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

I: CERTIFICATES PROCESS

A

Your web browser downloads the web server’s certificate, which contains the public key of the web server. It uses this public key to verify that the web server’s certificate was indeed signed by the trusted certificate authority. The certificate contains the domain name and/or ip address of the web server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

I: PKI

A

is a set of processes, policies, and technology for associating cryptographic keys with the entity to whom those keys were issued.

PKI is made of several elements which are:

Certification Authority (CA) 
Registration Authority (RA) 
Certificate Revocation List (CRL) 
Certification Practice Statement (CPS)
Transport Layer Security (TLS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

I: SECURE LOGINS

A

Secure digital certificates

encryption standards

zero-interaction zuthentication (ZIA)

fingerprint readers

account key feature

trust score system

persona-based authentication

advanced biometrics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

I: SYMMETRIC ENCRYPTION

A

is a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information.

RC4,
AES
DES
3DES
QUAD
Blowfish, etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

I: CUSTOMER KEYS

A

Customer master keys (CMKs) You can use a CMK to encrypt and decrypt up to 4 KB (4096 bytes) of data. Typically, you use CMKs to generate, encrypt, and decrypt the data keys that you use outside of AWS KMS to encrypt your data. This strategy is known as envelope encryption. AWS KMS will store keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

I: MFA

A

is a simple best practice that adds an extra layer of protection on top of your username and password. With MFA enabled, when a user signs into an AWS Management Console, they will be prompted for their username and password (the first factor—what they know), as well as for an authentication code from their AWS MFA device (the second factor—what they have). Taken together, these multiple factors provide increased security for your AWS account settings and resources.

17
Q

I: DOS (denial of service)

A

is a denial of service attack where a computer (or computers) is used to flood a server with TCP and UDP packets.

18
Q

I: ANTIVIRUS

A

Anti-virus is to detect, neutralize or eradicate malware (malicious software). AV software not only will identify and destroy the computer virus, but it’s also designed to fight off other kinds of threats such as phishing attacks, worms, Trojan horses, rootkits and more.

  • Norton
  • AVG
  • Avast
  • McAfee
  • Kaspersky
  • TrendMicro
19
Q

I: IAM Roles

A

IAM Role is an IAM identity that you can create in your account that has specific permissions.

Instead of being uniquely associated with one person, a role is intended to be assumable by anyone who needs it.

When you assume a role, it provides you with temporary security credentials for your role session.

20
Q

I: AUTHENTICATION

A

Authentication is the process of verifying a user’s identity. Most commonly, users authenticate with a username (which identifies the user) and a password (which confirms the user is who he claims).

21
Q

I: SSO

A

SSO, allows a user to access multiple applications using a single set of credentials. Typically, employees sign on to multiple business applications to do their jobs, such as messaging and email accounts, HR functions, intranet sites, financial records, etc. With SSO, they can access all of the resources they need with one set of login credentials, eliminating the need to remember or enter a unique password for each account

22
Q

I: FEDERATED SSO

A

refers to the establishment of a trusted relationship between separate organizations and third parties, such as application vendors or partners, allowing them to share identities and authenticate users across domains.

FIM is achieved through the use of standard protocols like SAML, OAuth, OpenID Connect and SCIM.

23
Q

I: DevSecOps

A

integrates application and infrastructure security seamlessly into Agile and DevOps processes and tools. It addresses security issues as they emerge, when they’re easier, faster, and less expensive to fix and before they are put into production.

24
Q

I: STATELESS FIREWALL

A

Stateless firewalls (Network ACLs) this means any changes applied to an incoming rule will not be applied to the outgoing rule. e.g. If you allow an incoming port 80, you would also need to apply the rule for outgoing traffic. Network ACL support allow and deny rules. By deny rules, you could explicitly deny a certain IP address to establish a connection.

25
Q

I: FIREWALL

A

Firewall (layer 3/4) is to control the access and to monitor the web traffic across the network. It also authorizes the outbound sessions.

26
Q

I: IPS

A

An intrusion prevention system (IPS) is like an intrusion detection system but differs in that an IPS can be configured to block potential threats.

Monitor, log and report activities
Also be configured to stop threats without the involvement of a system administrator

27
Q

I: HTTPS

A

HTTPS stands for “secure.” HTTPS uses TLS (or SSL) to encrypt HTTP requests and responses, so in the example above, instead of the text, an attacker would see a bunch of seemingly random characters

28
Q

I: ENCRYPTION

A

is the practice of scrambling information in a way that only someone with a corresponding key can unscramble and read it.

29
Q

I: IN-TRANSIT

A

is data transmission going on between the server and the client.

30
Q

I: COMPROMISED LOGINS

A

Compromised credential stuffing, phishing, password spraying, brute force, local discovery, extortio

31
Q

I: ASYMMETRIC ENCRYPTION

A

encrypts and decrypts the data using two separate yet mathematically connected cryptographic keys. These keys are known as a ‘Public Key’ and a ‘Private Key.’ Together, they’re called a ‘Public and Private Key Pair.’

Diffie-Hellman
RSA

32
Q

I: DDOS (dynamic denial of service)

A

is where multiple systems target a single system with a DoS attack. The targeted network is then bombarded with packets from multiple locations.

33
Q

I: AUTHORIZATION

A

is the process of granting users’ access to specific resources after they have been authenticated.

34
Q

I: SECURITY GROUPS

A

Security Groups are associated with EC2 instances and provide security at the protocol and port access level. Each security group — working much the same way as a firewall — contains a set of rules that filter traffic coming into and out of an EC2 instance.

35
Q

I: NACLs/ACLs

A

NACLs/ACLs is an optional layer of security for your VPC that acts as a firewall for controlling traffic in and out of one or more subnets. You might set up network ACLs with rules similar to your security groups in order to add an additional layer of security to your VPC.

36
Q

I: TLS AUTHENTICATION

A

ensures that traffic is both secure and trusted in both directions between a client and server. It allows requests that do not log in with an identity provider to demonstrate that they can reach a given resource.

37
Q

I: FEDERATION

A

is the trust relationship that exists between organizations; it is concerned with where the user’s credentials are actually stored and how trusted third parties can authenticate against those credentials without actually seeing them.