Security Operations Flashcards
Domain 4, Chapters 14-22
What are the 3 pillars of Secure baselines?
Fundamental security configuration standards:
Establish: Define security measures
Deploy: Implement security measures
Maintain: Sustain and update security measures
Chapter 14
What are the 2 options for Establishing secure baselines?
Center for Internet Security (CIS) Benchmarks: CIS benchmarks are comprehensive, community-driven guides meticulously crafted to establish secure configurations for various computing resources. IT professionals and organizations worldwide actively contribute to the
creation and refinement of these benchmarks. This collaborative effort ensures that the benchmarks remain current, adaptable to emerging threats, and applicable to a broad spectrum of technology stacks. CIS benchmarks provide a detailed roadmap for organizations to fortify their defenses by implementing industry-recognized best practices and security recommendations.
Security Technical Implementation Guide (STIG): STIG is a comprehensive repository of cybersecurity guidelines and best practices curated by the United States Department of Defense (DoD). Its primary mission is to enhance the security posture of DoD information
systems and networks. Implementing STIG recommendations involves a systematic approach whereby organizations assess their systems and networks against the guidelines, identify vulnerabilities or areas of noncompliance, and take remedial actions to align with the prescribed security configurations. This iterative process not only fortifies defenses but also ensures continuous monitoring and adaptation to evolving threats. Despite its origins, STIG’s impact also extends far beyondthe defense sector, influencing cybersecurity practices in both government and private industries.
Chapter 14
2 Options to Deploy a security baseline
Microsoft Group Policy: Microsoft Group Policy is an indispensable tool for organizations that predominantly rely on Windows operating systems. It allows administrators to define and enforce security configurations across a network of Windows devices. With Group Policy, a set of predefined security baselines can be created and applied uniformly to all Windows systems within an organization.
Puppet Forge: Puppet Forge is a versatile platform-agnostic solution. It provides a repository of pre-built modules and configurations that can be used to deploy security baselines across a range of operating systems, including Windows, Linux, and macOS. Puppet Forge’s flexibility makes it a favored choice for heterogeneous environments. It leverages the expertise of an open source community, ensuring constant updates and improvements.
Chapter 14
What are x tools to Maintain a baseline?
SCAP Compliance Checker: The Security Content Automation Protocol (SCAP) is a standardized framework for maintaining system security. SCAP Compliance Checker operates by comparing a system’s security settings against a predefined checklist of security requirements. If discrepancies are found, it generates reports highlighting areas of
non-compliance so that organizations can take corrective actions swiftly. A benefit of SCAP Compliance Checker is that it evaluates systems against a wide array of security benchmarks, including those published by the National Institute of Standards and Technology (NIST) and other industry-specific standards.
CIS Configuration Assessment Tool (CIS-CAT): CIS-CAT is a configuration assessment tool designed to evaluate systems and applications against CIS benchmarks, which are curated by the Center for Internet Security (CIS). These benchmarks represent a gold standard for secure configurations and best practices across various technologies, from operating systems to web browsers. Benefits of CISCAT include the tool’s flexibility, which allows organizations to tailor assessments to their specific needs and requirements, and automated scanning, which increases the efficiency of the process and reduces the risk of human error.
Chapter 14
10 Hardening targets
Making targets more secure:
Mobile devices: Secure smartphones and tablets
Workstations: Enhance security on desktop computers
Switches: Secure network switches for data protection
Routers: Strengthen security on network routers
Cloud infrastructure: Secure cloud-based resources
Servers: Enhance security on server systems
ICS/SCADA: Secure industrial control systems and SCADA
Embedded systems: Strengthen security for embedded devices
RTOS: Secure real-time operating systems
IoT devices: Enhance security for Internet of Things devices
Chapter 14
What are two considerations when deploying a Wireless network?
Mobile and wireless technology equipment:
Installation considerations: Factors for successful setup
Site surveys: Assess location for optimal wireless coverage
Heat maps: Visualize signal strength and coverage areas
Site Survey: Conducting site surveys is an essential step in optimizing wireless network performance. These surveys involve a comprehensive analysis of the environment, which includes identification of sources of interference, such as load-bearing walls, cordless phones, microwaves, elevators, metal frames, metal doors, and radio waves. A site survey will help to determine the best places to install the wireless access points that users connect to.
Heat Maps: A heat map is a valuable tool in the hands of a network administrator when addressing reports of inadequate coverage. By visually pinpointing areas with subpar coverage on the map, administrators can efficiently identify potential issues, including malfunctioning WAPs, which may be the root cause of the problem.
Chapter 14
Mobile solutions
Solutions for mobile device management
Mobile device management (MDM)
A Mobile Device Management (MDM) solution provides centralized control and maintenance of mobile devices to ensure strict adherence to the security protocols established by an organization and empowers IT administrators to oversee, configure, and safeguard mobile devices from a remote location. Among its primary responsibilities, MDM is set up by the IT staff to enforce security guidelines such as encryption, password prerequisites, and application whitelisting. These measures guarantee that all devices utilized within the organization align with the prescribed security standards, thereby diminishing the probability of data breaches.
Chapter 14
What are the three mobile device deployment models?
Bring Your Own Device (BYOD): BYOD policies allow employees to use their personal devices for work-related tasks. While this can boost productivity, it also presents a security risk as the nature of such policies means that company data and access are carried on a device that is regularly removed from business premises and otherwise employed for personal use. To mitigate these risks, organizations should implement containerization techniques to separate work and personal data and enforce strict security policies on the work-related portion of the device. The device must be compliant with security policies. The owner of the
device cannot use the device for social purposes during working hours and must allow company-owned applications to be installed.
Choose Your Own Device (CYOD): CYOD is a policy in which the company provides employees with a selection of approved devices to choose from. These devices are owned and managed by the organization. This model allows for increased flexibility with company devices but still maintains security control.
Corporate-Owned, Personally Enabled (COPE): In this model, organizations provide employees with corporate-owned devices that can be used for both business and personal use but must comply with company policies. Full device encryption will be used on these devices
to prevent data theft if the device is left unattended. It is important that mobile devices have strong passwords and screen locks to protect the data stored on the device.
Chapter 14
What are the four wireless Connection methods?
Cellular: Mobile network connectivityCellular networks (the latest versions of which are 4G and 5G) are responsible for providing mobile voice and data services over large geographical areas. They rely on a network of cell towers and satellites to connect mobile devices to the internet and each other. Cellular networks are generally considered secure due to their encryption protocols; however, vulnerabilities such as SIM card cloning and eavesdropping still exist.
Bluetooth is a short-range wireless technology commonly used for connecting peripherals such as headphones and keyboards.
NFC is another technology that leverages cellular connections. NFC allows devices to communicate when they are in close proximity, typically within a few centimeters. This technology is the foundation of contactless payment systems such as Apple Pay and Google Wallet. It enables secure transactions by simply tapping smartphones or credit cards on a compatible terminal. You should store your NFC-enabled card inside an aluminum pouch or wallet to prevent someone standing very close to you from skimming your card.
Global Positioning Services, more commonly known as GPS, is a satellite-based technology that provides precise location information by triangulating signals from multiple satellites. This is known as geolocation. GPS is used by the satellite navigation system in cars to guide you to a destination, and GPS tracking uses these signals to determine the exact geographical coordinates of a device. While GPS itself relies on satellites, the device that receives GPS signals can transmit its location data over a cellular network to be accessed remotely or used in various applications.
Chapter 14
Wi-Fi Protected Access 3 (WPA3) and its 5 key features
Wi-Fi Protected Access 3 (WPA3) primarily relies on Simultaneous Authentication of
Equals (SAE) for key establishment and encryption compared to WPA2’s 128-bit encryption. The following list has some key features of WPA3:
Protected Management Frames (PMF): This can provide multicast transmission and can protect wireless packets against Initialization Vector (IV) attacks, in which the attacker tries to capture the encryption keys.
WPA3-Enterprise: In contrast to the 128 bits supported by WPA2, WPA3 has an Enterprise version that makes it suitable for government and finance departments. WPA3-Enterprise uses Elliptic-Curve Diffie Hellman Ephemeral (ECDHE) for the initial handshake.
SAE: SAE replaces WPA2-PSK. SAE uses a very secure Diffie Hellman handshake called Dragonfly and protects against brute-force attacks. It uses Perfect Forward Secrecy (PFS), which ensures that your session keys cannot be compromised.
Wi-Fi Easy Connect: This makes it very easy to connect IoT devices, such as a smartphone, by simply using a QR code.
Wi-Fi Enhanced Open: This is an enhancement of WPA2 open authentication that uses encryption. It can be used in public areas such as hotels, cafés, and airports where no password is required. It also prevents eavesdropping as it uses PMF.
Chapter 14
AAA/Remote Authentication Dial-In User Service (RADIUS) and its 5 key features
**RADIUS **is a network protocol and a server-client architecture widely used for centralizing authentication, authorization, and accounting (AAA) functions in corporate networks. Key features and aspects of RADIUS include the following:
Authentication: Authentication is the process of verifying who you are using an authentication method such as a password or PIN.
Authorization: Authorization determines the level of access granted to an authenticated user.
Accounting: RADIUS’s accounting feature maintains detailed logs of user activities. This supports security incident detection and responses, post-incident analysis, and compliance.
RADIUS clients: RADIUS clients are not desktop clients but servers in their own right. Examples include VPNs, WAPs, and 802.1x authenticated switches, the last of which requires an endpoint certification.
Shared Secret: A “shared secret” (also known as a shared key or shared password) is used by the RADIUS client to communicate with a RADIUS server for authentication and authorization purposes.
Chapter 14
4 Cryptographic Protocols
Wired equivalent privacy (WEP): WEP’s key management is an outdated protocol that was problematic due to insufficient security. The encryption keys used only a 64-bit encryption key with the RC4 stream cipher to protect data, leaving them vulnerable to attacks. WEP used a
24-bit initialization vector (IV) to help encrypt data packets. However, the IVs were reused, which made it relatively easy for attackers to predict and crack the encryption keys.
WPA: WPA was designed to fix critical vulnerabilities in WEP standards. WPA still uses the RC4 stream cipher but also uses a mechanism called the Temporal Key Integrity Protocol (TKIP) to enhance Wi-Fi security by dynamically changing encryption keys.
Wi-Fi Protected Access version 2 (WPA2): WPA2 is currently the most commonly used protocol. It uses an Advanced Encryption Standard with Counter Mode Cipher Block Chaining Message Authentication Code Protocol (WPA2 CCMP) with a 128-bit encryption key and AES encryption, offering strong protection for wireless networks.
Wi-Fi Protected Access version 3 (WPA3): WPA3 primarily relies on SAE for key establishment and encryption, making it stronger than WPA2-CCMP.
Chapter 14
5 Authentication Protocols
Protected Extensible Authentication Protocol (PEAP): PEAP is a version of Extensible Authentication Protocol (EAP) that encapsulates and encrypts the EAP data using a certificate stored on the server, making it more secure for Wireless Local Area Networks (WLANs).
802.1x: This is an overarching access control standard. 802.1x allows access to only authenticated users or devices and is therefore used by managed switches for port-based authentication. It needs a certificate installed on the endpoint (client or device), which is used for authentication. For wireless authentication, the switch needs to use a RADIUS server for enterprise networks.
EAP-TLS: EAP-TLS is a specific, secure version of wireless authentication that requires a certificate stored on the endpoint (client or device) to verify identity and authorization.
EAP-TTLS: EAP-TTLS uses two phases. The first is to set up a secure session with the server by creating a tunnel using certificates that are stored on the server, and seen by the client. The second is to authenticate the client’s credentials.
EAP-FAST: EAP-FAST, developed by Cisco, is used in wireless networks and point-to-point connections to perform session authentication. It is the only one of these authentication protocols that does not use a certificate.
Chaptger 14
5 key features of Application Security
Input validation: Input validation ensures that all data, (whether entered via a web page or a wizard), complies with predefined rules, formats, and permissible ranges. Imagine filling out a web form swiftly, only to mistakenly place your zip code in the wrong field. Input validation steps in like a helpful guide, promptly detecting and highlighting such errors in a vivid red, signaling that certain parameters require correction. Once these inaccuracies are rectified, the form will graciously accept and process the submission. But input validation’s role extends far beyond the user interface. Input validation protects against attacks such as SQL injection, buffer overflow, and integer overflow attacks by ensuring malicious data is rejected.
Secure cookies: Cookies are small packets of data that serve as a fundamental component of web browsing. They can be both friendly and, in some cases, potentially treacherous. Cookies are tiny pieces of information (packets) that websites send to your web browser and are stored on your computer or device. Their primary purpose is to enhance
your web browsing experience. These encrypted packets preserve user sessions, preferences, and authentication tokens, fortifying applications against data theft and identity compromise. However, they can also be treacherous as they can pose privacy risks and introduce security
vulnerabilities if not properly managed.
Static code analysis: In the process of static code analysis, developers meticulously inspect the source code of their software to identify and eliminate any potential bugs or vulnerabilities that could expose it to security threats such as buffer overflow or integer injection. This examination occurs without executing the code.
Code signing: Code signing is a digital mechanism that functions as a cryptographic seal, providing assurance regarding the authenticity and reliability of software. It verifies that the software has not been tampered with and comes from a trusted source.
Secure coding practices: Secure coding practices are a set of guidelines and principles that software developers follow to write code in a way that prioritizes security and reduces the risk of vulnerabilities or weaknesses that could be exploited by attackers. These practices are
essential to creating software that is secure, resilient, and less prone to security breaches.
Chapter 14
Sandboxing
Sandboxing an application means isolating it from the network for testing, patching, or complete malware inspection.
Chapter 14
5 Acquisition/procurement process considerations
Change management: When you procure new assets or replace existing assets, it is vital that you submit a case to the Change Advisory Board to get approval for the purchase and implementation.
Vendor selection: Selecting the right vendor is crucial for quality, cost efficiency, reliability, and compliance. It’s not just about finding the best deal but also about ensuring the vendor aligns with your organization’s security and compliance requirements. Organizations should thoroughly vet vendors, examining their security protocols, track record, and
adherence to industry standards and regulations.
Total cost of ownership: Not only should you consider the purchase price of an asset but you must also consider maintenance costs and the cost of replacement parts. You don’t want to purchase an acquisition that will become financially burdensome.
Risk assessment: Security considerations must be addressed at every stage of the acquisition process. A comprehensive risk assessment helps identify potential vulnerabilities and threats associated with the new assets. This assessment is essential for developing strategies to mitigate risks and ensure that the acquisition aligns with the organization’s
overall security objectives.
Compliance alignment: Adherence to legal and regulatory requirements is non-negotiable, and security and compliance go hand in hand. Organizations must ensure that the assets they acquire comply with relevant data protection, privacy, and industry-specific regulations. Failure to do so can result in legal repercussions and reputational
damage.
Chapter 15
What are the two major elements of Assignment/accounting?
Asset register: An asset register is a comprehensive record of an organization’s assets, including details such as location, value, and ownership. It is vital that any asset that an organization procures is added to the asset register to ensure all assets are accounted for. If an asset found on your network is not in the asset register, then it is likely to be a rogue device.
Standard naming convention: A standard naming convention is required so that organizations can distinguish between different assets. For example, you might call your desktops PC1 and PC2, your domain controllers DC1 and DC2, and your servers SQL1 and SQL2.
Chapter 15
Two important factors in assignment and accounting
Ownership: Ownership goes hand-in-hand with accountability. When assets are assigned to specific owners, it becomes easier to enforce accountability for their condition and usage. This should be reflected in the asset register. Owners should have a clear understanding of their responsibilities regarding the asset’s security. Access control mechanisms, such as user authentication and authorization, are often tied to ownership to ensure that only authorized individuals can interact with the asset.
Classification: Asset classification involves categorizing assets into critical, essential, and non-essential assets. The value and the sensitivity of the asset are important so that when an asset fails, it gets the correct level of support. For example, if someone’s computer fails, it will not have a high priority for repair, whereas if a network intrusion prevention system fails, it will have immediate support as it is a critical asset within the organization. Depending on the equipment’s classification, it will be afforded the appropriate level of security.
Chapter 15
Chapter 15
Tracking can be conducted by maintaining an asset inventory and enumeration with what two principles?
Chapter 15
*Inventory: An up-to-date record of assets
Enumeration: Identifying and tracking all assets*
REMINDER
Purchasing hardware and software must be done through a reputable vendor and not an unknown third party.
Chapter 15
What are the 4 steps to Disposal/decommissioning?
*Sanitization: Safely wiping data from retired assets via data wiping/overwriting, secure erase, and degaussing.
Destruction: Properly disposing of obsolete assets by shredding, incineration, pulverization, crushing, chemical decomposition, or pulping
Certification: Verifying secure asset disposal
Data retention: Managing data storage for compliance*
REMINDER
When introducing new assets and disposing of legacy assets, it is important that the proper change management process is followed.
Chapter 15
The two types of vulnerability scans
A **non-credentialed **scan operates with restricted privileges and can only identify vulnerabilities that are visible from the network. This is the same view available to external attackers. Noncredentialed scans are quick and efficient in spotting vulnerabilities that require immediate attention, highlighting security gaps that demand immediate remediation to fortify the network’s external perimeter.
A credentialed scan, by comparison, is a much more powerful version of the vulnerability scanner. It has elevated privileges, thereby providing more accurate information. It can scan documents, audit files, and check certificates and account information. The credentialed scan can see information from both native and third-party software, which is essential for maintaining a secure and well-managed IT environment.
Chapter 16
Security Content Automation Protocol (SCAP)
Security Content Automation Protocol (SCAP) is a framework that enables compatible vulnerability scanners to see whether a computer adheres to a predefined configuration baseline.
Chapter 16
The 3 types of application scanners
Static analysis: Static analysis, a foundation of application security, is a proactive method that involves inspecting the source code, binaries, or application artifacts without executing the program. This process enables security experts to unveil vulnerabilities, coding errors, and
potential weaknesses within the application’s structure. By meticulously dissecting the code base, static analysis scanners can identify issues such as code injection vulnerabilities, insecure authentication mechanisms, and poor data validation practices.
Dynamic analysis: In contrast to static analysis, dynamic analysis scanners take a runtime approach to vulnerability detection. They interact with the application while it’s running, probing for vulnerabilities and weaknesses as the program executes. This method
provides a real-world simulation of how an attacker might exploit vulnerabilities in a live environment.
Web application scanners: Web application scanners are specialized tools tailored to the unique challenges posed by web applications. They assist with the security of web-based software, such as online portals, ecommerce platforms, and web services. Their job is to inspect web applications for vulnerabilities such as SQL injection, XSS, security misconfigurations, and authentication weaknesses that can be exploited by attackers via the web. Web application scanners simulate real-world attacks by sending crafted requests and observing how an application responds. By doing so, they reveal vulnerabilities that might otherwise remain hidden until exploited by cybercriminals.
Chapter 16
Package Monitoring
Package typically refers to a software component or module that is used within an application. These packages can include libraries, frameworks, plugins, or other pieces of code that are integrated into an application to provide specific functionality.
At the heart of package monitoring lies access to comprehensive vulnerability databases. These repositories catalog known vulnerabilities associated with specific software packages. Security
teams rely on these databases to cross-reference the components they use in their applications against reported vulnerabilities.
Chapter 16
CVE
Common Vulnerabilities and Exposures (CVE) list, which is a database of publicly disclosed cybersecurity vulnerabilities and exposures that is maintained by the MITRE Corporation, helping organizations manage the security of their systems against known vulnerabilities.
Chapter 16
Threat Feeds
Threat feeds are curated streams of real-time information that provide insights into current and emerging cyber threats. These feeds aggregate data from various sources, including the following:
Security vendors: Leading cybersecurity companies often maintain their own threat feeds, offering insights into the latest threats and vulnerabilities.
**Government agencies: **National cybersecurity organizations such as the United States’ Cybersecurity and Infrastructure Security Agency (CISA) provide threat feeds with information on threats that may have national or global significance. More information can be found on its
website at https://www.cisa.gov/news-events/cybersecurity-advisories.
Open Source Intelligence (OSINT): OSINT feeds gather data from publicly available sources, including forums, social media, and dark web monitoring. Alien Vault is a community threat feed, and more detailed information can be found at https://otx.alienvault.com/.
Commercial threat intelligence providers: Many companies specialize in collecting, analyzing, and distributing threat intelligence data to subscribers.
Chapter 16
Three types of Penetration Testing
Known environment: In a known environment, testers (known as white-box pen testers) are provided with extensive information about an organization’s systems and infrastructure. This allows them to focus on specific targets and vulnerabilities within the environment.
Partially known environment: Pen testers (known as gray-box pen testers) are given limited information about an organization’s systems and infrastructure in a partially known environment. This simulates a scenario where an attacker has acquired some knowledge about the target but not all of it.
Unknown environment: In an unfamiliar setting, pen testers (known as black-box pen testers) operate without prior information about an organization’s systems, infrastructure, or security protocols. This simulates an attacker with no inside information attempting to breach
the organization.
Chapter 16
Common Vulnerability Scoring System (CVSS)
Common Vulnerability Scoring System (CVSS) is a standardized system for assessing the severity of vulnerabilities, according to factors such as the impact, exploitability, and ease of remediation.
Chapter 16
Application Monitoring
Continuously observe for potential issues
Using logging and alerting systems, systems responsible for monitoring can detect threats and malicious activity. Enhanced monitoring enables security analysts to act swiftly on the detailed information provided. Commercial applications such as SolarWinds Security Event Manager and Splunk offer robust monitoring and alerting solutions for businesses to help them detect
and respond to potential security threats. They use methods such as data collection, real-time analysis, and alerts.
Chapter 14