Security Operations 4.1 Flashcards
Given a Scenario apply common security techniques to computing resources
Secure Baselines - Establish
Security Baselines need to be established. All application instances must follow this baseline. List of security baselines is often already established and provided by the manufacture.
Secure Baselines - Deploy
How do we put those baselines into action. How do we deploy the baselines. May require multiple deployment mechanisms.
Secure Baselines- Maintain
Many of these are maintained through best practices. Test and measure to avoid conflicts. Audit baselines to make sure they maintain in effect.
Hardening targets - Mobile Phones
Bug fixes and security Patches, Prevent any known vulnerabilities.
Segmentation can protect data (Company data and user data are separated)
Harding Techniques- Workstations
User desktops and laptops likely use windows, macOS, Linux, etc
Constant monitoring and updates
Remove unnecessary software.
Network Infrastructure Devices
Examples: Switches, routers
They often have an embedded OS, with a limited OS.
Harden by not using default credentials and checking with the manufacturer for security updates. Not usually updated frequently.
Cloud infrastructure
Secure the cloud management workstation. Use principle of least privilege. All services, network setting, application rights and permissions.
Configure endpoint detection and response.
Always have back ups - Cloud to cloud
Servers
Make sure operating system is updated. Make sure user accounts have minimum password lengths. Network access and security. Server should have anti-virus and anti-malware
SCADA/ICS - hardening techniques.
Supervisory Control and Data Acquisition System
Provide insight into the the systems. Should be hardened with the use of segmentation no access from the outside.
Embedded system - Hardening techniques
Hardware and software designed for a specific function. Can be difficult to harden, unlikely to have a security patch. Important to provide additional security by putting them on a segmented network and a firewall.
RTOS - hardening techniques
Real time operating system.
An operating system with a deterministic processing schedule. Industrial equipment, automobiles, military environments.
Isolated from the rest of the network
Run with the minimum services which helps to prevent for exploit.
IoT - hardening devices.
Internet of things
Heating, cooling and lighting. Home automation, wearable technology.
Put updates for IoT’s at a high priority.
Securing Wireless and Mobile - Site Survey
Determine the existing wireless landscape. Sample the existing wireless spectrum. Identify existing access points. Work around existing frequencies.
Heat maps.
Wireless survey tools - Security.
Shows signal coverage, Potential interference, Built-in tools, 3rd.
Mobile Device management -Securing Wireless and Mobile
Manage company owned and user-owned mobile devices. Centralised management of mobile devices.Employer can implement security controls and segmentation on mobile devices.