2C Flashcards

1
Q

There are several areas of concern when deploying virtual machines:

A

training and education
change control
asset tracking and management
patch management
authentication and authorization
logging and auditing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When assessing the customer’s security implementations, we often find significant attention focused on technology to the detriment of the end users. It is vital that users are ___ ___ about new technology to understand and plan for any change in processes brought about by the new technology.

A

trained properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It is recommended to ____ administrators, operational staff, solution architects, and users on the topic of virtualization.

A

train

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___ need to know the proper way to set up virtualization configurations and be mindful of any pitfalls. ____ must also understand what the security capabilities of the underlying technologies are and the assurances they provide. For instance, certain features can be disabled by the ____ at a global level, but they can still be enabled by individual users for their own virtual machines. It is crucial to be aware of such features so other control mechanisms can be put in place or to enable an audit trail.

A

Administrators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

___ ___ and review boards should carefully consider any changes to the base infrastructure before approving them. Making changes at the base level is like upgrading the hardware or firmware on a physical machine. Such an operation would be treated with utmost care on production machines in the physical world and the same care should be applied to updates, upgrades, and installation of any software or changes to configurations of a virtualized
environment.

A

Change control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

These changes can often affect the three fundamentals of security:

A
  • Confidentiality- all users and devices have network access.
  • Integrity- Data is not compromised.
  • Availability – data readily available to authorized users.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

First, any change should be tested in a ___ ___ to ensure the change does not adversely affect either the host or guest operating systems. This could mean running a battery of security tests before and after the change to verify this—ranging from a simple port scan to see if
the Transfer Control Protocol/Internet Protocol (TCP/IP) fingerprint has changed, to a full-blown vulnerability scan as new services on the host come online for virtual management.

A

staging environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Secondly, once testing is complete, changes should only be made during approved ___ ___ ___ no matter how trivial or small the change appears to be on the host. All the change control best practices continue to apply for the guest workloads.

A

change control windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Getting a new server up and running can be as simple as cloning an existing VM or importing an existing physical machine. Features such as live virtual-machine migration and dynamic load balancing can result in new machines being “spun up” on the fly. This can lead to difficulty from an ___ ___ perspective. Lack of ___ ___ and management puts companies at risk of falling out of compliance with licensing requirements.

A

asset tracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

With VMs being brought up and torn down, licenses may even be lost. To manage this risk, it is imperative operations applied in a virtual environment adhere to the same standards created for
___ ___.

A

physical systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Organizations should create and maintain detailed ____ of the software. Once the ____ is created, it is important to track the usual vulnerability news sources (security mailing lists, vendor websites, and the popular security press) to watch for any newly discovered
vulnerabilities and their associated mitigation options.

A

inventory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Another important aspect of virtualization is that assets can be ____ _____ ____. Several virtualization vendors offer preconfigured virtual appliances (a combination of hardware and software). These appliances are built, optimized, and typically serve specific purposes such as a firewall or an Internet browser appliance.

A

downloaded from the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A further complication to keep in mind is most of the virtualization technologies available today support ___ ___ ___, making such virtual machines undetectable by the network while still providing them with unrestricted access to the host and the network itself.

A

complex networking schemes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A common problem with many organizations, even before the introduction of virtualization, is patching efforts focusing only on perceived big targets. This includes the operating system and
possibly server software—Web servers, application servers, and database servers. Unfortunately, the smaller, seemingly inconsequential components (especially those from third
parties or open-source libraries) tend to be _____. This can expose the network infrastructure to several critical security issues.

A

forgotten

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The host and guest operating systems, the software applications, and the virtualization software itself must all be ____.

A

patched

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Nothing changes significantly from the physical world when it comes to authentication. Virtualization products do add new components and considerations, though the basic security threats do not change. For example, ___ accounts on the host.

A

provisioning

17
Q

Provisioning accounts should be handled in a very ____ manner since providing a user with access to the host can potentially be a very powerful privilege over a guest account.

A

sensitive

18
Q

It is a good idea to link authentication to the host to existing identity management solutions. This can include integrating with ___ ___ or another corporate directory solutions.

A

active directory

19
Q

Organizations need to determine who will be responsible for these tasks and perhaps create new roles, such as…?

A

VM administrators, authors and users.

20
Q

___ and ___ a strong audit trail of all activities occurring in a virtual environment is imperative. This can be used to determine who powered off the Web server virtual machine or who created a copy of the database server virtual machine.

A

logging and maintaining

21
Q

Most of the virtualization solutions currently available provide some support for such audit trails. However, these should be _____ to integrate with existing event notification systems in use within the network environment

A

augmented

22
Q

It is important to treat virtual machines just like physical hardware. One possible risk is a physical hardware fault could take down multiple virtual machines. It is therefore vital to know
about such problems as early as possible. This is best done by continuously and consistently…?

A

monitoring the host machine

23
Q

Logs should be monitored to maintain an ___, ____, and ____ network. Any logging capability is only useful if the logs are monitored. It is essential administrative staff monitor the system for alerts and respond to them appropriately. This goes back to the training and awareness requirements for operational staff.

A

operational, efficient and secure network

24
Q

Administrators responding to alerts must understand their options, the impact of each option, and why it’s critical to choose the right option for the business. In many ways, virtualization only increases the number of options available to administrators as compared to a pure physical infrastructure. However, while more options do provide greater flexibility, they also add to ____ and create a higher probability of making the wrong decision.

A

complexity

25
Q

From an auditing perspective, log files must have proper access controls in place to prevent unauthorized tampering. Logs may need to be retained and archived based on the organization’s
compliance requirements and environment. Logs gained from virtualization systems should be treated just like those from an operating system on physical machines but with more
____ since they contain data about multiple virtual machines.

A

attentiveness