Security Frameworks Flashcards

1
Q

Compliance

A

• Compliance
—Meeting the standards of laws, policies, and regulations
• A healthy catalog of rules
—Across many aspects of business and life
—Many are industry-specific or situational
penalties
—Fines
— Loss of employment
—Incarceration
• Scope
—Domestic and international requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Regulatory

A

•Sarbanes-Oxley Act (SOX)
— The Public Company Accounting Reform and
Investor Protection Act of 2002
•The Health Insurance Portability and
Accountability Act (HIPAA)
— Extensive healthcare standards for storage, use,
and transmission of health care information
•The Gramm-Leach-Bliley Act of 1999 (GLBA)
— Disclosure of privacy information
from financial institutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HIPAA non-compliance penalties

A

• Fine of up to $50,000, or up to 1 year in prison,
or both; (Class 6 Felony)
• Under false pretenses; a fine of up to $100,000,
up to 5 years in prison, or both; (Class 5 Felony)
• Intent to sell, transfer, or use individually identifiable health information
for commercial advantage, personal gain, or malicious harm, a fine up
to $250,000, or up to 10 years in prison, or both. (Class 4 Felony)
• Civil fines; maximum is $100 for each violation, with the total amount
not to exceed $25,000 for all violations of an identical requirement or
prohibition during a calendar year. (Class 3 Felony)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Non-regulatory

A

•No rule of law
—May be strongly suggested
•A regulation may be in the works
—Get used to the impending change
• Creates value for yourself and/or others
—You don’t need a law if it’s the right thing to do
• Sharing of identified malicious IP addresses
—There’s no law or rule that requires you participate
—It’s in your best interest to share

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Frameworks

A
• Structure and organization 
—What works best for IT? 
• Process management 
—Getting the IT "product" to 
work best with the organization 
• Best practices 
—Guidelines and examples 
for IT management 
—Cost effective, agile 
• Lots of training 
— For everyone
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Industry-specific frameworks

A

• COBIT
—Control Objectives for Information and Related Technologies
—Created by ISACA, formerly the Information Systems Audit
and Control Association
—Focus on regulatory compliance, risk management and
aligning IT strategy with organizational goals
• ITIL
—Formerly the Information Technology Infrastructure Library
—Multiple stages of the IT lifecycle
—Service Design, Service Transition, Service operation,
Service Strategy, Continual Service Improvement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Secure configurations

A
• No system is secure with 
the default configurations 
—You need some guidelines to 
keep everything safe 
• Hardening guides are specific to 
the software or platform 
—Get feedback from the manufacturer 
or Internet interest group 
—They'll have the best details 
• Other general-purpose guides online
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Web server hardening

A

• Access a server with your browser
—The fundamental server on the Internet
—Microsoft Internet Information Server, Apache HTTP Server, et al.
• Huge potential for access issues
—Data leaks, server access
• Secure configuration
—Information leakage: Banner information, directory browsing
—Permissions: Run from a non-privileged account, configure file permissions
—Configure SSL: Manage and install certificates
—Log files: Monitor access and error logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Operating system hardening

A
• Many and varied 
—Windows, Linux, iOS, Android, et al. 
• Updates 
—Operating system updates/service packs, security patches 
• User accounts 
—Minimum password lengths and complexity 
—Account limitations 
• Network access and security 
—Limit network access 
• Monitor and secure 
—Anti-virus, anti-malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Application server

A
• Programming languages, runtime libraries, etc. 
—Usually between the web server and the database 
—Middleware 
• Very specific functionality 
—Disable all unnecessary services 
• Operating system updates 
—Security patches 
• File permissions and access controls 
—Limit rights to what's required 
—Limit access from other devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network infrastructure devices

A
• Switches, routers, firewalls, IPS, etc. 
—You never see them, but they're always there 
• Purpose-built devices 
—Embedded OS, limited OS access 
• Configure authentication 
—Don't use the defaults 
• Check with the manufacturer 
—Security updates 
—Not usually updated frequently 
—Updates are usually important
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Layering the defense

A
• Physical controls 
—Keep people away from the technology 
—Door locks, fences, rack locks, cameras 
•Technical controls 
—Hardware and software to keep things secure 
—Firewalls, active directory 
authentication, disk encryption 
• Administrative controls 
—Policies and procedures 
—On boarding and off boarding 
—Backup media handling
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Defense in depth

A
• Firewall 
• DMZ 
• Hashing and salting passwords 
• Authentication 
• Intrusion prevention system 
• VPN access 
• Card/badge access 
• Anti-virus and 
anti-malware software 
• Security guard
How well did you know this?
1
Not at all
2
3
4
5
Perfectly