Concepts of SCI Flashcards

1
Q

What is the zero trust philosophy?

A

“trust no one, verify everything”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the zero trust guiding principles?

A
  1. Verify explicitly (AuthN and AuthZ on all available data pts.)
  2. Least privileged access (limit access with JIT/JEA, risk-based adaptive policies, data protection)
  3. Assume breach (segment access by network, user, device. Use encryption. Use analytics for visibility and threat detection)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the six zero trust foundational pillars?

A
  • Identities
  • Devices
  • Applications
  • Network
  • Infrastructure
  • Data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe defense in depth

A

A layered approach to security that uses a series of protection at each layer to slow the advance of an attack. If one layer is breached, the next will prevent unauthorized access to data.

Example layers = Physical, identity and access, perimeter, network, compute, application, data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe CIA

A

CIA = confidentiality, integrity, and availability.

Represent security trade-offs around keeping data confidential, ensuring it’s correct, and making it available to those that need it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe encryption methods

A
  • Symmetric (same key) and Asymmetric (public + private key pairs)

Encryption of data can be ‘at rest’ and ‘in transit’,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe hashing.

A

Algorithm for converting plain text to a unique fixed-length hash value. The hash value serves as a unique identifier of the original text without needing to store the original text. e.g. used for storing passwords securely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe Identity.

A

How someone or something can be authenticated and verified to be who they say they are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define identity as the security perimeter

A

The on-prem network is no longer the security perimeter. you now have e.g.

  • SaaS applications hosted outside of the network
  • BYOD accessing the network from home.
  • Unmanaged devices from partners collaborating with employees.
  • IoT devices in corporate networks and customer locations.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe the four pillars of IAM

A
  • Administration (manage how and when to create, update. delete identities)
  • AuthN (how much assurance)
  • AuthZ (determine access)
  • Auditing (tracking who does what, when, where, and how)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe modern authentication and the role of the identity provider

A

AuthN and AuthZ methods between client and server with the IdP.

Central IdP enables SSO, federation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe federated services

A

Federation enables access across domains by establishing trust relationships between identity providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe compliance concepts of data residency, sovereignty, and privacy

A

Residency: where data can be stored, processed.

Sovereignty: data subject to laws where it is collected, held, processed.

Privacy: notice and transparency about collection, use, sharing of personal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe the shared responsibility model

A

Identifies which tasks are customers responsibility and which are the cloud providers.

Info and data, devices, and accounts and identities are always the customer’s responsibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define authentication and authorization

A

Authentication: proving a person is who they say they are

Authorization: determines the level of access or permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly