Describe security and compliance concepts Flashcards

1
Q

On-premises datacentres

A

In an on-premises datacenter, you have responsibility for everything from physical security to encrypting sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Infrastructure as a Service (IaaS)

A

IaaS is a cloud service model where the cloud provider offers computing infrastructure.

It requires the most management by the customer among all cloud services.

The customer uses the provider’s infrastructure but is not responsible for physical components or datacentre security.

The customer is responsible for software components, including operating systems, network controls, applications, and data protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Platform as a Service (PaaS)

A

PaaS is a cloud service model for building, testing, and deploying software applications.

The focus of PaaS is on rapid application development without managing the infrastructure.

The cloud provider handles hardware and operating system management.

The customer’s responsibility lies in developing and managing applications and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Notes on Software as a Service (SaaS):

A

SaaS is a cloud service model where software is hosted and managed by the provider.

It is accessed through a subscription and examples include Microsoft 365, Skype, and Dynamics CRM Online.

SaaS requires minimal management from the customer.
The provider manages everything except data, devices, accounts, and identities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Customer responsibilities in the cloud:

A

Cloud customers own their data and identities.

Customers are responsible for protecting the security of their data and identities.

On-premises resources, including devices like mobile devices, PCs, and printers, are the responsibility of the customer.

Customer responsibilities include information and data, devices, accounts, and identities.

The shared responsibility model clarifies the responsibilities of both the customer and the cloud provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Defence In Depth

A

Défense in depth employs multiple layers of security instead of relying on a single perimeter.

Each layer adds protection, making it difficult for attackers to gain unauthorized access to data.

Example layers of security include:

  • Physical security restricts access to authorized personnel in datacentres.
  • Identity and access security controls include multifactor authentication and condition-based access.
  • Perimeter security protects corporate networks from DDoS attacks.
  • Network security involves segmentation and access controls to limit resource communication.
  • Compute layer security secures access to virtual machines by closing specific ports.
  • Application layer security ensures applications are free of vulnerabilities.
  • Data layer security manages access to data and uses encryption for protection.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Confidentiality, Integrity, Availability (CIA)

A

CIA (Confidentiality, Integrity, Availability) is a key aspect of a cybersecurity strategy:

Confidentiality ensures sensitive data remains secret and can be achieved through encryption.

Integrity focuses on maintaining the correctness and accuracy of data or messages.

Availability ensures data is accessible to authorized users when needed.

Microsoft offers solutions to help organizations achieve the goals of the CIA triad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Zero Trust principles and practices:

A
  • Zero Trust assumes an untrusted network and does not trust resources behind firewalls.
  • The model operates on the principle of “trust no one, verify everything.”
  • Conventional access controls are no longer sufficient due to attackers bypassing them.
  • Security is strengthened by not relying solely on the integrity of the corporate network.
  • Multi-factor authentication is used to enhance user validation beyond passwords.
  • Access is granted only to specific applications or data that users need, rather than all devices on the corporate network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Zero Trust guiding principles

A

Zero Trust Model principles:

  1. Verify explicitly: Authentication and authorization are based on multiple data points, such as user identity, location, device, service/workload, data classification, and anomalies.
  2. Least privileged access: Limit user access through just-in-time and just-enough access (JIT/JEA), risk-based adaptive policies, and data protection. This approach safeguards both data and productivity.
  3. Assume breach: Segment access by network, user, devices, and application. Utilize encryption for data protection and leverage analytics to gain visibility, detect threats, and enhance overall security.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The six foundational pillars of the Zero Trust model

A
  1. Identities: Verify identities with strong authentication and adhere to least privilege access principles.
  2. Devices: Monitor device health and compliance to mitigate security risks.
  3. Applications: Discover and manage all applications, including permissions and access control.
  4. Data: Classify, label, and encrypt data based on its attributes to ensure its protection.
  5. Infrastructure: Assess and secure infrastructure for vulnerabilities, configurations, and just-in-time access. Use telemetry for attack detection and protective actions.
  6. Networks: Implement network segmentation, micro segmentation, real-time threat protection, end-to-end encryption, monitoring, and analytics.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Encryption in cybersecurity

A

Encryption makes data unreadable and unusable to unauthorized viewers.

To decrypt encrypted data, a secret key is required.

Two top-level types of encryption: symmetric and asymmetric.

Symmetric encryption uses the same key for encryption and decryption.

Asymmetric encryption uses a public-private key pair and requires a paired key for decryption.

Asymmetric encryption is used for HTTPS protocol and electronic data signing.

Encryption can protect data at rest or in transit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Encryption for data at rest

A
  • Data at rest refers to data stored on a physical device, like a server.
  • Encryption of data at rest ensures that the data is unreadable without the necessary decryption keys and secrets.
  • Even if an attacker gains access to encrypted data, without the encryption keys, they cannot read the data.
  • Encryption provides an additional layer of security to protect sensitive information stored on physical devices.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Encryption for data in transit:

A
  • Data in transit refers to data moving between locations, such as over the internet or through a network.
  • Encryption of data in transit ensures that the data is protected during its transmission.
  • Secure transfer can be achieved by encrypting the data at the application layer or using protocols like HTTPS.
  • Encryption in transit safeguards the data from unauthorized access and reduces the risk of exposure during transmission.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Encryption for data in use:

A
  • Data in use refers to data being actively processed or accessed by the CPU or other components.
  • Encryption of data in use involves securing data in nonpersistent storage, such as RAM or CPU caches.
  • Technologies can create secure enclaves to protect and keep the data encrypted while it is being processed.
  • Encrypting data in use helps maintain data confidentiality and prevent unauthorized access or exposure during processing.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hashing

A
  • Hashing converts text to a unique fixed-length value called a hash using an algorithm.
  • The same text hashed with the same algorithm will always produce the same hash value.
  • Hashing doesn’t use keys, and the hash value is not decrypted back to the original text.
  • Hashing is commonly used to store passwords, comparing the hash of the entered password with the stored hashed version.
  • Hashing is more secure than storing plain text passwords, but hackers can use brute-force attacks to guess passwords by hashing and comparing them.
  • To enhance security, passwords are often “salted” by adding a random value before hashing to create unique hashes for the same input.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data residency

A

Data residency regulations govern the physical locations where data can be stored, processed, transferred, or accessed.

Compliance with data residency regulations ensures that data is handled in accordance with specific jurisdictional requirements.

Regulations can vary significantly across jurisdictions, leading to differences in how and when data can be stored, processed, or accessed internationally.

Organizations must understand and adhere to data residency regulations to ensure compliance and protect the privacy and security of sensitive information.

17
Q

Data sovereignty

A

Data sovereignty refers to the concept that data is subject to the laws and regulations of the country or region where it is collected, held, or processed.

It recognizes that data, especially personal data, is governed by the legal framework of the jurisdiction in which it resides.

Compliance with data sovereignty requires organizations to adhere to the specific laws and regulations of each country or region involved in the data lifecycle.

The complexity arises when data is collected, stored, or processed across multiple locations, as it may be subject to different laws and regulations from various countries or regions.

Managing data sovereignty requires careful consideration and compliance with applicable laws to protect privacy, security, and legal obligations related to data handling.

18
Q

Data privacy

A

Data privacy refers to the protection and proper handling of personal data, which includes any information relating to an identified or identifiable natural person.

Privacy laws and regulations require organizations to provide notice and be transparent about how they collect, process, use, and share personal data.

The definition of personal data has expanded beyond “PII” or “personally identifiable information” to include any data that is directly or indirectly linkable to an individual.

Organizations must comply with a variety of laws, regulations, codes of conduct, industry-specific standards, and compliance standards related to data privacy.

Compliance with data privacy regulations requires organizations to implement appropriate safeguards, data protection measures, and privacy practices to ensure the confidentiality and security of personal data.

Transparency, informed consent, and accountability are essential principles in data privacy, emphasizing the importance of respecting individuals’ rights and protecting their personal information.

19
Q

An organization has deployed Microsoft 365 applications to all employees. Considering the shared responsibility model, who is responsible for the accounts and identities relating to these employees?

A. The organization.

B. Microsoft, the SaaS provider.

C. There’s shared responsibility between an organization and Microsoft.

A

A. The organization.

In the shared responsibility model, the customer organization always has responsibility for their data, including information and data relating to employees, devices, and accounts and identities.

20
Q

Which of the following measures might an organization implement as part of the defence in-depth security methodology?

A. Locating all its servers in a single physical location.

B. Multifactor authentication for all users.

C. Ensuring there’s no segmentation of your corporate network.

A

B. Multifactor authentication for all users.

Multifactor authentication is an example of defence in-depth at the identity and access layer.

21
Q

The human resources organization wants to ensure that stored employee data is encrypted. Which security mechanism would they use?

A. Hashing.

B. Encryption in transit.

C. Encryption at rest.

A

C. Encryption at rest.

Encryption at rest could be part of a security strategy to protect stored employee data.

22
Q

Which of the following best describes the concept of data sovereignty?

A. There are regulations that govern the physical locations where data can be stored and how and when it can be transferred, processed, or accessed internationally.

B. Data, particularly personal data, is subject to the laws and regulations of the country/region in which it’s physically collected, held, or processed.

C. Trust no one, verify everything.

A

B. Data, particularly personal data, is subject to the laws and regulations of the country/region in which it’s physically collected, held, or processed.

Data sovereignty is the concept that data, particularly personal data, is subject to the laws and regulations of the country/region in which it’s physically collected, held, or processed.