CIS test 4 Flashcards
(129 cards)
IDS type that:1) Analyzes activity loges, including system calls, application logs, etc.2) Better view of the monitored system but high vulnerability for an attack on IDS itself.
Server based IDS
3 type of Intrusion Detection Systems (IDSs)
1) Server-based IDS 2) Network-based IDS3) Integrated IDS
Process of detecting events and/or entities that could possibly compromise the security of the system.
Intrusion Detection
Key method for providing confidentiality and integrity services
Encryption of data in flight
Protocol which allows client / server applications to enforce encryption service.
Transport Layer Security (TLS)
Benefit of network level encryption
Network level encryption is independent of the underlying guest OS.
Two general encryption methods
1) Application Level (where data is generated) 2) Network Level (IPSec to encrypt IP packets)
Key measure against “sniffing” attacks
Encryption of data in flight
True or False: A virtualized DMZ can fully support and enforce multiple trust zones.
TRUE
Physical or logical (sub)network that limits the exposure of the nodes in the internal network from external networks.
Demilitarized Zone (DMZ)
Why can sandboxing be used as a security measure against side-channel-attacks?
Because sandboxing disallows a malicious software from monitoring system components.
Where guest OS sandboxing is achieved
On the hypervisor level or at the OS kernel level.
Where sandboxing should be applied
On a vulnerable or suspected guest OS or application.
Guest OS Hardening Measures
Deleting unused files and applying latest patches. Applying hardening checklists available for specific OSs. Installing the guest OS in TCB mode if the VM is to be used for critical applications.
VM Hardening Considerations
Use VM templates to provision new VMs. Limit the resources that VM can consume to prevent DoS attacks. Disable unused functions and devices on VM. Use a directory service for authentication. Perform vulnerability scanning and penetration testing of the guest OS.
Ways to protect hypervisor management systems
1) Configuring strong security on the firewall between the management system and the network. 2) Providing direct access to management server only to administrators. 3) Disable access to management console to prevent unauthorized access.
Process of changing the default configuration in order to achieve greater security.
Hardening
Hypervisor Security Measures
1) Install hypervisor updates. 2) Harden VMs to prevent attacks.
Protection measures for physical server security
1) Authentication and authorization mechanisms. 2) Disabling unused hardware such as NICs, USB ports, or drives. 3) Physical premises security.
Server security considerations
1) Deciding whether the server will be used for specific applications or for general purpose. 2) Identifying the network services to be provided on the server. 3) Identifying users and/or user groups who will be given access rights on the server, including specific access privileges.
Included in securing a compute system
Securing physical server. Securing hypervisor. Securing VMs (VM isolation, VM hardening). Security at guest OS level (guest OS hardening). Security at application level (application hardening).
VM protective measure against DOS attacks
Resource consumption of a VM needs to be restricted.
Attempt to prevent legitimate users from accessing a resource or service.
Denial of Service (DOS)
Could reveal information of a client to another malicious client that runs its VMs on the same server.
Cross-VM Side Channel Attack (SCA)