SYO-701 Flashcards
Technical controls (category)
implemented using a system
IT security controls
eg: firewall, anti-virus
Managerial Controls (category)
policies and procedures
admin stuff
SOPs
on-boarding policy, demotion, review login reports, separation of duties
Operational controls (category)
implemented by people instead of systems
guard shack, require multiple guard, awareness training
physical controls (category)
door lock, warning sign, power generator
preventive control type
block access to a resource
firewall rules
door locks
on-boarding policy
deterrent control type
discourage attacks
warning banner
posted warning signs
threat of demotion
Detective control type
identify intrusion attempts
audit log monitoring
motion detectors
Corrective control type
Apply a control after an event has been detected to reverse impact of event
Continue operations with minimal downtime
Ransomware recovery using backups
use law enforcement to manage criminal activity
fire extinguishers
compensating control type
control using other means
existing controls aren’t sufficient
may be a temporary control
use a temporary firewall rule to block an application while waiting for a security patch
implement separation of duties
generator used after a power outage
Directive control type
direct a subject towards compliance
this is a weak security control
tell people to store sensitive files in a protected folder
train users on security policy
Create compliance policies and procedures
security policy training
Zero Trust
Authenticate to each device or process on the network, not just a VPN or firewall.
Everything must be verified, nothing inherently trusted
Data plane
zero trust plane of operation
process frames packet and network data
movement of data across network
Switch ports, NAT, processsing, forwarding, trunking
Control plane
zero trust plane of operation
manage actions of the data plane
network decision making and traffic management
routing tables, NAT tables, IP address configs
Adaptive Identity
zero trust
Consider the source and the requested resources
Multiple risk indicators with relationship to the organization
If user is in China, considered higher risk
Find out how risky the login is.
(zero trust) Threat Scope reduction
zero trust
decrease number of possible entry points
policy-driven access control (zero trust)
zero trust
Make authentication requirements stronger based on Adaptive Identity.
combine adaptive identity with a predefined set of rules
PEP
zero trust
Policy Enforcement Point
everything must be validated via the PEP
Subjects and systems must be vallidated through Policy Enforcment Point
PEP is a gatekeeper for allowing or blocking traffic to resources
Can be multiple devices working together.
Works on the Data plane
PDP
zero trust
Policy Decision Point
gets forwareded requests from the PEP
decides whether traffic should be allowed or not
makes a process for authentication
Works on the control plane
Policy Engine - zero trust
zero trust
Part of the PDP
evaluate each access decision based on policy
grant, deny or revoke access
Policy Administrator - zero trust
Part of the PDP
Generate access tokens
the PA creates or shuts down a communication based on decisions from the Policy Engine
Tells the PEP to allow or disallow access
TPM
trusted platform module
specification for cryptography hardware
cryptography process like random number generator, key generators
unique keys burned in during manufacturing
versatile memory to store keys, hardware config info
securely store bitlocker keys
password protected against dictionary attacks
HSM
hardware security module
used in large environments
- a rack server
securely stoer thousands of keys
high-end cryptographic hardware used to perform crypto functios
key backup
- secure storage for keys
cryptographic accelerators
- GPU for performing crypto functions
secure enclave
protected area in hardware for secrets
- implemented as a hardware processor
- isolated from main processor
- many different technologies and names
extensive security features
- has its own boot ROM
- has its own boot process
- true random number generator
- real-time memory encryption
- root crypto keys
- AES encryption
block chain
distributed ledger
everyone on blockchain tracks the ledger
tracks transaction and sends it everyone
can be used to track progress of parts on an assembly line
block of transactions
secure hash is calcuated from previous blocks of transaction data
hash is added to the new block of verified transactions
chain of hashes
new calculated block is distributed to everyone
if any blocks are altered, all the following hashes in the chain are recalcuated
is the altered chain doesn’t match other chains on network, it will be rejected
OCSP stapling
During the TLS/SSL handshake, the server sends the digitally signed OCSP verification with the certificate message to the client.
OCSP stapling improves the client experience by:
* Reducing the time it takes to establish a connection
* Ensuring the browser gets the same response performance for the certificate status as it does for the website content
* Addressing privacy concerns by removing the need for the CA to receive revocation requests directly from the client
UTM
unified threat management
aka all in one security device
aka web security gateway
URL filtering, content inspection
malware inspecion
spam filter
CSU/DSU (LAN to WAN connection)
routing and switching
firewall
IDS/IPS
badwidth shaper for QoS
VPN server
SD-WAN
Software defined networking in a wide area network
WAN built for cloud
cloud based app communicate directly to the cloud
dynamic network connects on-site users directly to cloud applications
SASE
Secure Access Service Edge
VPN for cloud services
SASE servers located on the cloud, near the apps
SASE client installed on devices
BYOD
bring your own device
BYOT
bring your own technology
employee owned devices
difficult to secure
BYOT
bring your own technology
employee owned devices
COPE
corporate owned personally enabled devices
organization owned device
used for both personal and corporate stuff
CYOD
a subset of COPE device
choose your own device
choose apple or android
MIC
message integrity check
wireless security
make sure data is the same as sent
provides data integrity