Security Operations Flashcards
Planning
security should be consider prior to development
Provisioning
prep for deployment and instantiating user, system, or service
Security baseline and configuration management key principles
Baseline configuration
need well-vetted hardened baseline configuration
Building baseline configuration
don’t start from scratch
Determine reasonable starting point
establish consistent configuration across the majority of the systems
Reduce time to recover a deployed system
Infrastructure as a Service (IAAS)
Platform as a Service (PAAS)
Software as a Service (SAAS)
Root access
Web Service
Gmail
Cloud Server (Provisioning)
Vuln - weakness present in preconfigured image
Types of Firewall
Packet Filter
Stateful
Proxy
Next Generation Firewalls (NGFW)
Packet filtering firewall
examines each packet independently
No idea where packet came from
fast, not secure.
ACL on some devices
Firewall: Stateful
Slower
Lookup table
Proxy Firewall
2 TCP connection for each request, client & server
In between, inspect, process packets at all seven layers
Firewall: Circuit Level
Operates at session layer
does not use application level proxy software
SOCKS - replaces network connection with socks call
Firewall: Application Level
Proxy server software/Layer 7
Act as in between, moves packet from one network to another
Firewall: Next Generation Firewall (NGFW)
packet inspection beyond ports/protocols
Bastion Host
Host that is outside the firewall
Firewall: Host-Based
e.g Windows Firewall/McAfee, etc…
Intrusion Prevention Systems (IPS)
False positive on IPS cause outages
IDS - passive
IPS - active - think pen test so that why it will stop can cause outage
Malware Detonating Devices (MDD)
Sandboxin
Isolate and try to see what would happen
Basically isolated denotation
Sandboxing Capabilities
Malware checks to see if it is connected to internet before it detonates
IDS
Sniff traffics/sniffer with rules
Passive - sent alert (Does not stop attack)
Active - stop attack (sending resets)
IDS True Positive True Negative False Positive False Negative
True Positive - real attack
True Negative - normal traffic
False Positive - sets off alert and normal traffic
False Negative - does not set off alert and it is attack traffic
Signature Matching
Detect pattern/detects on existing patterns
Will not detect on new patterns, polymorphic malware, or encrypted traffic
Protocol Behavior
detects protocol, syn, syn-ack, ack
False positives on complex/non-standard protocols
Honeypot
designed to be hacked into/public facing
Security Information and Event Management (SIEM)
Devices to view logs for events that are triggered
Audit Logs
Process: must be reviewed
Audit Trails
Individual conducting Transactions
Date
Time
Location(workstation)
Preparing Incidents
Critical decisions must be made before it happens:
pursue legal actions
what actions are authorized to be taken
Understand root cause or reimage/revert
Allowed to attack attackers to persist gain intelligence
templates needs to be built for data gathering
Security Incidents: External Attacker
attacking back is a bad idea
IP is a pivot point so might not be the actual attacker IP
Security Incidents: External Attacker Logs
Attackers will erase their tracks
Look for all systems that might have been connected to all offending IP addresses