Security Operations Flashcards
What types of controls should facilities housing sensitive info implement?
Facilities that house systems that process sensitive information should have physical access controls to limit access to authorized personnel only.
How should clipping levels be implemented?
Clipping levels should be implemented to establish a baseline of user activity and acceptable errors.
What should be implemented to prevent collision?
Separation of responsibilities and duties should be in place so that if fraud takes place, it requires collusion.
How should change control and configuration mgmt be implemented?
Change control and configuration management should be put in place so changes are approved, documented, tested, and properly implemented.
What activities are included in change management?
Activities that involve change management include requesting a change, approving a change, documenting a change, testing a change, implementing a change, and reporting to management.
What are key aspects of operational security?
The key aspects of operational security include resource protection, change control, hardware and software controls, trusted system recovery, separation of duties, and least privilege.
What does least privilege ensure?
Least privilege ensures that users, administrators, and others accessing a system have access only to the objects they absolutely require to complete their job.
What are responsibilities of operation department?
The operations department is responsible for any unusual or unexplained occurrences, unscheduled initial program loads, and deviations from standards.
Startup and Shutdown procedures
Standards need to be established that indicate the proper startup and shutdown sequence, error handling, and restoration procedures.
What is always the more important to protect than facilities and assets?
Some physical security controls may conflict with the safety of people. These issues need to be addressed; human life is always more important than protecting a facility or the assets it contains.
What are proximity identification devices?
Proximity identification devices can be user-activated (action needs to be taken by a user) or system sensing (no action needs to be taken by the user).
A transponder is a proximity identification device that does not require action by the user. The reader transmits signals to the device, and the device responds with an access code.
What are the benefits of exterior fencing?
Exterior fencing can be costly and unsightly, but can provide crowd control and help control access to the facility.
How should interior partitions be implemented?
If interior partitions do not go all the way up to the true ceiling, an intruder can remove a ceiling tile and climb over the partition into a critical portion of the facility.
List intrusion detection devices?
Intrusion detection devices include motion detectors, CCTVs, vibration sensors, and electromechanical devices.
What are the benefits of CCTV?
CCTV enables one person to monitor a large area, but should be coupled with alerting functions to ensure proper response.
What are the benefits of Security Guards?
Security guards are expensive but provide flexibility in response to security breaches and can deter intruders from attempting an attack.
What is a whitelist?
A whitelist is a set of known-good resources such as IP addresses, domain names, or applications.
What is patch management?
Patch management is the process for identifying, acquiring, installing, and verifying patches for products and systems.
What is a reciprocal agreement?
A reciprocal agreement is one in which a company promises another company it can move in and share space if it experiences a disaster, and vice versa. Reciprocal agreements are very tricky to implement and may be unenforceable. However, they offer a relatively cheap offsite option and are sometimes the only choice.