Domain 2 - Security Operations Flashcards
What is a baseline?
A detailed configuration standard that includes specific security settings.
Some examples of Security Guidelines?
- Method for selecting a strong password.
- criteria for evaluating new security technology
- Suggest training curricula for staff.
What is a standard?
A formal, documented requirement that set uniform criteria for a specific technology, configuration, nomenclature, or method.
What helps organizations help maintain consistency in the way security risks are addressed?
Standards, baselines, procedures, and even guidelines.
What is a procedure?
Step-by-step instructions for performing a specific task or set of tasks.
What are the typical components of a procedure?
Purpose Applicability Steps Figures Decision Points
What is release management?
A software engineering discipline that controls the release of applications, updates, and patches to the production environment.
What is the goal of release management?
To provide assurance that only tested and approved application code is promoted to production or distributed for use.
Code Signing?
Assists users in validating that the application was issued by a trust source.
Typically used for web apps running Java or ActiveX
Smoke Tested?
High-level, scripted testing of the major application components and interfaces to validate the integrity of the application before making it available.
Systems Assurance?
Process of validating that existing security controls are configured and functioning as expected.
Change Control?
Process adopted by an organization to ensure that all changes to system and application software are subject to the appropriate level of management control.
Change Control Process?
Request Submission Recording Analysis/Impact Assessment Decision Making and Prioritization Approval Status Tracking
CM
CONFIGURATION MANAGEMENT
Discipline that seeks to manage configuration changes so that they are appropriately approved and documented.
“Technical and Administrative’ Process
Typical Steps in the configuration management process.
Change Request Approval Documentation Testing Implementation Reporting
Four Operational Aspects of CM
Identification
Control
Accounting
Auditing
CMBD
CONFIGURATION MANAGEMENT DATABASE
Holds information about the structure of the system.
CI
CONFIGURATION ITEM
Component of each system listed in the CMBD using a name, number, and version ID.
Security Impact Assessment
Analysis conducted by qualified staff within an organization to determine the extent to which changes to the information system affect the security posture of the system.
Interoperability
Describe the extent to which systems and devices can exchange data and interpret that shared data.
Syntactical Interoperability
Two or more systems that are capable of communicating and exchanging data.
Patch Management Process
- Acquisition - Find Patch
- Testing - Test Patch before installation
- Approval - Approve for deployment
- Packaging - Package or configure for OS.
- Deployment
- Verification
SSCP Domains
Access Controls Analysis and Monitoring Cryptography Malicious Code Networks & Telecom Risk, Response, & Recovery Security operations and administration
BMS
BALANCED MAGNETIC STRIP
Device that uses a magnetic strip to determine if an alarm signal is initiated.