Security Operations Flashcards
CC Domain 5 Security Operations topics
Data Security
set of practices aimed at protecting information important to the organization
Data Lifecycle
refers to the series of changes data goes through in an organization and how the organization handles the data during each phase of its life.
Create
when the data comes to exist within the organization.
Store, Use, and Share
Data that is created and classified is placed into production, where it is
stored, used, and shared based on the organization’s security policies and
procedures and the appropriate security controls.
Archive
When data is no longer needed in the production environment but needs to
be kept for future use (or due to legal requirements), it may need to be
archived.
Destroy
data is no longer needed, the primary requirement is ensuring that
sensitive data cannot be recovered from the media it was stored on.
Password Salting
passwords are often hashed when they are stored so that if a hacker were able to breach the system and access the password database, they only have access to the hashed password value (versus the plaintext password).
Symmetric encryption
uses the same key for encryption and decryption. The sender and receiver of a message need to both have a copy of the same key in order to encrypt/decrypt the message.
Asymmetric Encryption
uses two keys that are mathematically related: a public key and a private key
Logging and Monitoring
Logging is the capturing and storing of events that occur for later analysis.
Monitoring is the examination of events and other activities.
Logs
files that store information about various events that occur on a system
System Hardening
practice of making these devices harder to attack by reducing the entry points an attacker can potentially use to compromise a system
Change Management Policy
ensures IT resources are inventoried, configured, and documented in a consistent and repeatable manner. policy defines the requirements necessary to ensure that device configurations and documentation are maintained and modified using a consistent repeatable process.
Data Handling Policy
set of rules for employees to follow when working with data.
classification and labels…sometimes called a data protection policy or
data classification and handling policy. It tends to be a broad policy that defines the requirements for how the organization manages and protects data throughout the data lifecycle from inception to destruction
Password Policy
defines the requirements for password size and format, usage, and protection. The policy usually covers requirements for password
creation, changes to passwords, practices for protecting passwords such as secure storage and transmission, and use of passwords in applications.