Architecture and Design Flashcards
The only constant is change
- Operating systems, patches, application updates, network modifications, new application instances, etc.
Identify and document hardware and software settings
- Manage the security when changes occur
Rebuild those systems if a disaster occurs
- Documentation and processes will be critical
Configuration Management
Network diagrams - Document the physical wire and device
Physical data center layout - Can include physical rack locations
Device diagrams - Individual cabling
Diagrams
The security of an application environment should be well defined
- All application instances must follow this
- Firewall settings, patch levels, OS file versions
- May require constant updates
Integrity measurements check for the secure baseline
- These should be performed often
- Check against well-documented baselines
- Failure requires an immediate correction
Baseline configuration
Create a standard
- Needs to be easily understood by everyone
Devices
- Asset tag names and numbers
- Computer names - location or region
- Serial numbers
Networks - Port labeling
Domain configurations
- User account names
- Standard email addresses
Standard naming conventions
An IP address plan or model
- Consistent addressing for network devices
- Helps avoid duplicate UP addressing
Locations
- Number of subnets, hosts per subnet
IP ranges
- Different sites have a different subnet
- 10.1.x.x/24, 10.2.x.x/24, 10.3.x.x/24
Reserved addresses
- Users, printers, routers/default gateways
IP schema
Data that resides in a country is subject to the laws of that country
- Legal monitoring, court orders, etc
Laws may prohibit where data is stored
- GDPR (General Data Protection Regulation)
- Data collected on EU citizens must be stored in the EU
- A complex mesh of technology and legalities
Where is your data stored?
- Your compliance laws may prohibit moving data out of the country
Data sovereignty
Data obfuscation
- Hide some of the original data
Protects PII
- and other sensitive data
May only be hidden from view
- The data may still be intact in storage
- Control the view based on permissions
Many different techniques
- Substituting, shuffling, encrypting, masking out, etc.
Data masking
Encode information into unreadable data
- Original information is plaintext, encrypted form is ciphertext
This is a two-way street
- Convert between one and the other
- If you have the proper key
Confusion
- The encrypted data is drastically different than the plaintext
Diffusion
- Change one character of the input, and many characters change of the output
Data encryption
The data is on a storage device
- Hard drive, SSD, flash drive, etc
Encrypt the data
- Whole disk encryption
- Database encryption
- File or folder-level encryption
Apply permissions
- Access control lists
- Only authorized users can access the data
Data at-rest
Data transmitted over the network
- Also called data in-motion
Not much protection as it travels
- Many different switches, routers, devices
Network, based protection
- Firewall, IPS
Provide transport encryption
- TLS (Transport Layer Security)
- IPsec (Internet Protocol Security)
Data in-transit
Data is actively processing in memory
- System RAM, CPU registers and cache
The data is almost always decrypted
- Otherwise, you can’t do anything with it
The attackers can pick the decrypted information
- A very attractive option
Data in-use
Replace sensitive data with a non-sensitive placeholder
Common with credit card processing
- Use a temporary token during payment
- An attacker capturing the card numbers can’t use them later
This isn’t encryption or hashing
- The original data and token aren’t mathematically related
- No encryption overhead
Tokenization
Control how data is used
- Microsoft Office documents, email messages, PDFs
Restrict data access to unauthorized persons
- Prevent copy and paste
- Control screenshots
- Manage printing
- Restrict editing
Each user has their own set of rights
- Attackers have limited options
Information Rights Management (IRM)
Where’s your data?
- Social Security numbers, credit card numbers, medical records
Stop the data before the attackers get it
- Data “leakage”
So many sources, so many destinations
- Often requires multiple solutions in different places
Data Loss Prevention (DLP)
On your computer
- Data in use
- Endpoint DLP
On your network
- Data in motion
On your server
- Data at rest
Data Loss Prevention (DLP) systems
Legal implications
- Business regulations vary between states
- For a recovery site outside of the country, personnel must have a passport and be able to clear immigration
- Refer to your legal team
Offsite backup
- Organization-owned site or 3rd-party secure facility
Offsite recovery
- Hosted in a different location, outside the scope of the disaster
Travel considerations for support staff and employees
Geographical considerations
Incident response and recovery has become commonplace
- Attacks are frequent and complex
Incident response plan should be established
- Documentation is critical
- Identify the attack
- Contain the attack
Limit the impact of an attacker
- Limit data exfiltration
- Limit access to sensitive data
Response and recovery controls
Commonly used to examine outgoing SSL/TLS
- Secure Sockets Layer/Transport Layer Security
SSL/TLS relies on trust
- Without trust, none of this works
Your browser contains a list of trusted CAs
Your browser doesn’t trust a website unless a CA has signed the web server’s encryption certificate
- The website pays some money to the CA for this
The CA has ostensible performed some checks
- Validated against the DNS record, phone call, etc.
Your browser checks the web server’s certificate
- If it’s signed by a trusted CA, the encryption works seamlessly
SSL/TLS Inspection
Represent data as a short string of text
- A message digest
One-way trip
- Impossible to recover the original message from the digest
- Used to store passwords/confidentiality
Verify a downloaded document is the same as the original
- Integrity
Can be a digital signature
- Authentication, non-repudiation, and integrity
Will not have a collision (hopefully)
- Different messages will not have the same hash
Hashing
Control software or hardware programmatically
Secure and harden the login page
On-path attack
- Intercept and modify API messages, replay API commands
API injection
- Inject data into an API message
DDoS
- One bad API call can bring down a system
API considerations
Recovery site is prepped
- Data is synchronized
A disaster is called
- Business processes failover to the alternate processing site
Problem is addressed
- This can take hours, weeks, or longer
Revert back to the primary location
- This process must be documented for both directions
Site resiliency
A exact replica
- Duplicate everything
Stocked with hardware
- Constantly updated
- You buy two of everything
Applications and software are constantly updated
- Automated replication
Flip a switch and everything moves
- This may be quite a few switches
Hot site
No hardware
- Empty building
No data
- Bring it with you
No people
- Bus in your team
Cold site
Somewhere between a hot and cold site
- Just enough to get going
Big room with rack space
- You bring the hardware
Hardware is ready and waiting
- You bring the software and data
Warm site