DevSecOps Flashcards

(75 cards)

1
Q

What is the mindset shift required in DevSecOps culture?

A

Assume breaches as well as prevent them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List key components of a security strategy.

A
  • Threat models
  • War game exercises
  • Code reviews
  • Central security monitors
  • Security testing
  • Live site penetration tests
  • Security development lifecycle (SDL)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the focus of DevSecOps practices?

A

Improving mean time to detection and mean time to recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why is it important to assume system breaches?

A

It helps answer critical security questions proactively

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What common questions should teams consider regarding security?

A
  • How will you detect an attack?
  • How will you respond if there is an attack?
  • How will you recover from an attack?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does ‘defense in depth’ involve?

A

Minimizing exposure to attackers who have breached internal networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a post-breach assessment?

A

Evaluating performance of security policies after a breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some common threats that need to be mitigated?

A
  • Issues in dependencies like operating systems
  • Bugs in system code
  • Poor secret management
  • Social engineering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fill in the blank: All secrets must be stored in a _______.

A

[protected vault]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Microsoft Defender for Cloud?

A

A Cloud Native Application Protection Platform (CNAPP) for securing applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the core components of Defender for Cloud?

A
  • Development Security Operations (DevSecOps)
  • Cloud Security Posture Management (CSPM)
  • Cloud Workload Protection Platform (CWPP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the term ‘war game exercises’ refer to?

A

Security testing events where red and blue teams simulate attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Who comprises the red team in war game exercises?

A

Members simulating attackers to find security gaps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Who comprises the blue team in war game exercises?

A

Members testing their ability to detect and respond to attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False: War games should be a free-for-all.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What should be documented after security risks are identified?

A

A backlog of repair items

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How often should teams practice war games?

A

Regularly, to enhance security posture and team readiness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a key lesson learned from Microsoft’s war games?

A

Phishing attacks are very effective and should be taken seriously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the purpose of the Cloud Security Posture Management (CSPM) component?

A

To check and improve the security posture of cloud resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What type of threats does Defender for Storage protect against?

A
  • Malware
  • Sensitive data leakage
  • Storage specific threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the benefit of using a hierarchy of vaults for secret management?

A

To eliminate duplication of secrets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What should be included in the report presented after a war game?

A

Lessons learned and vulnerabilities found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the role of Microsoft Defender for APIs?

A

To improve API security posture and detect real-time threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the importance of multi-factor authentication in security?

A

It helps to limit access and enhance security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Fill in the blank: Microsoft Defender for Cloud integrates security into _______.
[DevOps workflows]
26
What does 'credential guard' help with?
Protecting against unauthorized access to credentials
27
What should be the focus of security teams in DevSecOps?
To manage security across multi-pipeline environments
28
What is the purpose of conducting a security pass before war games?
To identify and address issues before simulating attacks
29
What does the acronym CNAPP stand for?
Cloud Native Application Protection Platform
30
What does Infrastructure as Code (IaC) misconfigurations and exposed secrets correlate with?
Other contextual cloud security insights to prioritize remediation in code
31
What platforms can be connected to Defender for Cloud?
Azure DevOps, GitHub, and GitLab repositories
32
What is Cloud Security Posture Management (CSPM)?
A security strategy that ensures proper configuration and deployment of cloud and on-premises resources
33
What does Defender for Cloud provide for Cloud Security Posture Management?
Free Foundational CSPM capabilities and advanced CSPM capabilities with the Defender CSPM plan
34
What is the purpose of centralized policy management in Defender for Cloud?
Define security conditions and translate them into recommendations for resource configurations
35
What is a secure score?
A summary of your security posture based on security recommendations
36
What does multicloud coverage in Defender for Cloud allow you to connect?
Amazon AWS and Google GCP cloud resources
37
What does advanced CSPM tools enable?
Identifying weaknesses, governance, regulatory compliance, and a comprehensive view of the environment
38
What does Data Security Posture Management do?
Automatically discovers datastores with sensitive data and helps reduce risk of data breaches
39
What is attack path analysis in Defender CSPM?
Modeling network traffic to identify potential risks before implementing changes
40
What does Microsoft Entra Permissions Management provide?
Visibility and control over permissions for any identity and resource in Azure, AWS, and GCP
41
What is the role of Cloud Workload Protection Platforms (CWPP)?
Provide workload-specific recommendations to protect workloads from threats
42
What are security alerts?
Real-time notifications of events threatening your environment's security
43
What is the function of source code analysis tools?
Analyze source code or compiled versions to find security flaws
44
What are important selection criteria for SAST tools?
* Support for programming languages * Ability to detect vulnerabilities * Accuracy rates * Ease of setup/use
45
What features are included in GitHub Code Security?
* Code scanning * CodeQL CLI * Copilot Autofix * Security campaigns
46
What does GitHub Secret Protection include?
* Secret scanning * Push protection * Copilot secret scanning * Custom patterns
47
What roles are involved in DevSecOps on Azure Kubernetes Service (AKS)?
* Developers * Cloud Engineers * Operations teams
48
What is the purpose of Azure Policy in AKS?
To enforce policy compliance and security policies
49
What is the significance of continuous monitoring in AKS?
To analyze performance metrics and security logs
50
What is the role of the security team in DevSecOps?
Developing and enforcing security standards
51
What are some best practices for the DevSecOps lifecycle stages?
* Design a secure application platform * Apply Azure Well Architect Framework * Use IDE tools for security checks * Perform Static Code Analysis (SAST)
52
What does dynamic application security testing (DAST) aim to find?
Vulnerabilities in the running application
53
Fill in the blank: The _______ is a map of your cloud environment that lets you build queries to find security risks.
Cloud Security Explorer
54
What is a best practice for deploying container images?
Deploy container images from trusted registries only ## Footnote This helps ensure the integrity and security of the deployed applications.
55
How can Microsoft Defender for Cloud be utilized in production environments?
Enable automated scanning and monitoring of your production configurations ## Footnote This enhances security by identifying vulnerabilities proactively.
56
What role does Azure Policy play in securing AKS clusters?
Secures and governs your AKS clusters ## Footnote Azure Policy helps enforce compliance with organizational standards.
57
What is the function of Azure Monitor?
Continuous monitoring and alerting ## Footnote It collects data to help detect irregular conditions in infrastructure.
58
What does Microsoft Defender for Cloud provide for threat monitoring?
Active threat monitoring ## Footnote It continuously assesses deployed infrastructure for vulnerabilities.
59
What is the importance of centralized log monitoring?
Enables monitoring for real-time security threats using SIEM products ## Footnote Centralized logging provides a comprehensive view of security events.
60
Why is audit logging necessary in production clusters?
To monitor activity on your production clusters ## Footnote Audit logs help track changes and detect unauthorized access.
61
What does DevSecOps for infrastructure as code (IaC) involve?
Using test-driven development to check code changes for IaC templates ## Footnote This approach ensures the quality and security of infrastructure definitions.
62
What triggers automated unit testing in GitHub?
Pull requests ## Footnote This integration ensures that changes are tested before merging.
63
What is the role of GitHub Actions in IaC?
Automates unit testing, security scanning, and infrastructure provisioning ## Footnote It streamlines the CI/CD process for infrastructure changes.
64
How does GitHub CodeQL enhance security in IaC?
Analyzes IaC templates and detects potential security vulnerabilities ## Footnote Custom queries can be created to tailor the analysis.
65
What happens if a vulnerability is detected by GitHub?
GitHub sends alerts to the organization or repository owners ## Footnote This prompt notification allows for quick remediation.
66
What does the IaC tool do for each environment?
Provisions and modifies resources by tailoring size, instance count, and other properties ## Footnote This customization is essential for meeting specific environment needs.
67
What should be done after a manual update to the infrastructure?
Elevated access is removed and a GitHub Issue is logged for reconciliation ## Footnote This ensures changes are documented and reviewed.
68
What is the primary function of SecOps?
Continuously monitors and defends against security threats and vulnerabilities ## Footnote SecOps plays a crucial role in maintaining security posture.
69
What is GitHub?
A code-hosting platform for version control and collaboration ## Footnote It serves as a central repository for development, testing, and governance workflows.
70
What does GitHub Advanced Security provide?
A suite of security features, including static analysis and vulnerability detection ## Footnote This enhances the security of code stored in GitHub.
71
What is CodeQL?
A semantic code analysis engine for detecting vulnerabilities and misconfigurations ## Footnote It enables custom queries for targeted security assessments.
72
What is Terraform?
An open-source infrastructure automation tool developed by HashiCorp ## Footnote Terraform allows for declarative provisioning across cloud environments.
73
What does Microsoft Sentinel do?
Monitors infrastructure activity and raises alerts or GitHub Issues when anomalies are detected ## Footnote It utilizes AI and analytics for threat detection.
74
How does Azure Policy enforce governance?
Validates IaC deployments against organizational and workload standards ## Footnote It can block noncompliant configurations to ensure adherence.
75
What is the purpose of Azure Monitor?
Collects performance metrics and activity logs from Azure resources ## Footnote It helps in detecting irregular conditions and triggering alerts.