Domain 3. Security Architecture and Engineering Flashcards
(131 cards)
Principles for Zero Trust
- Know your architecture (users, devices, and services)
- Know your user, service, and device identities
- Know the health of your users, devices, and services
- Use policies to authorize requests
- Authenticate everywhere
- Focus your monitoring on devices and services
- Don’t trust any network, including your own
- Choose services designed for zero trust
Seven foundational principles of Privacy by Design
- Privacy as proactive and preventive, not reactive and remedial
- Privacy as the default setting
- Privacy embedded into design
- Full functionality within a given solution
- End-to-End Security
- Visibility and Transparency
- Respect for User Privacy
The Cyber Kill Chain
- Reconnaissance
- Weaponization
- Delivery
- Exploitation
- Installation
- Command and Control
- Actions
Representation of something real
Model
Representation of what security should look like in an architecture being built
Security model
Comprehensive technical analysis of a solution or a product to ensure it meets the desired needs
Certification
Official management signoff of certification for a set period of time
Accreditation
Security Control Frameworks
Aid with the control selection process. Provide guidance, based upon best practices. Features from multiple frameworks can be used to meet the needs of an organization
Particularly useful for IT assurance, created by ISACA, for information technology management and IT governance, and therefore it is particularly useful for IT assurance activities
The Control Objectives for Information Technologies (COBIT)
Defines the process in a well-run IT department. And also defines the processes for IT service management that focuses on aligning IT services with business goals and objectives.
Information Technology Infrastructure Library (ITIL)
Sets of best practices, standards, and recommendations that help an organization improve its cybersecurity controls.
NIST SP 800-53
Is a standard for organization that handle credit cards like VISA, MasterCard, and AMEX.
Payment Card Industry Data Security Standard (PCI DSS)
Specifies the requirements for establishing, implementing, maintaining, and continually improving an information security management system within the context of the organization. Also includes requirements for the assessment and treatment of information security risks tailored to the needs of the organization.
Organizations can be certified against ISO 27001.
Annex A of the standard contains the following domains:
1. Information security policies
2. Organization of information security
3. Human resources security
4. Asset management
5. Access control
6. Cryptography
7. Physical and environmental security
8. Operations security
9. Communications security
10. System acquisition, development, and maintenance
11. Supplier relationships
12. Information security incident management
13. Information security aspects of business continuity management
14. Compliance
International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) ISO 27001:2022
ISO 27002 ISO/IEC 27002:2022 provides guidelines for organizational information security standards and information security management practices including the selection, implementation, and management of controls, taking into consideration the organization’s information security risk environment(s). Essentially ISO 27002 provides guidance for implementing the controls in ISO 27001.
ISO 27002
is a voluntary private sector initiative dedicated to improving organizational performance and governance through effective internal control, enterprise risk management, and fraud deterrence.
Committee of Sponsoring Organizations of the Treadway Commission (COSO)
Focuses on the protection of protected health information (PHI) of individuals.
Health Insurance Portability and Accountability Act (HIPAA)
requires US federal agencies to develop, document, and implement agency-wide security programs to provide information security for the operations and assets of the agency. Further requires security programs for any other agencies, contractors, or service providers.
Federal Information Security Management (FISMA) Act of 2002
provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. Any cloud services that hold US federal government data must be FedRAMP authorized.
Federal Risk and Authorization Management Program (FedRAMP)
Is a direct result of the wild financial fraud at “Enron”. The US Congress decided better controls were needed to be in place to prevent similar incidents from happening again, and specifically enacted SOX to prevent financial fraud by public companies and thereby protect the financial interests of shareholders.
Sarbanes-Oxley (SOX) Act
Uses mandatory access control (MAC) to enforce the DoD multilevel security policy. Confidentiality. Lattice-based.
- Simple Security Property (no read up)
- Star (*) Security Property (no write down)
- Strong star property (subject can read and write only at their own security level - not above or below)
Bell-LaPadula
Integrity. Lattice-based.
- Simple integrity property (no read down).
- Star (*) integrity property (no write up).
- Invocation property (subject can’t send information to someone that is rated at a higher layer of information than the current one the subject holds.
Biba
Uses security labels to grant access to objects.
- constrained data item (CDI) - is any data item whose integrity is protected by the security model
- unconstrained data item (UDI) - any data item that is not controlled by the security model
- Integrity verification procedure (IVP) - is a procedure that scans data items and confirms their integrity
- transformation procedures (TPs) - are the only procedures that are allowed to modify a CDI
Access control triple (triplet)
Authenticated principal (user) “subjects” > programs (transformational procedures) > data items (UDIs and CDIs) “objects”
the relationship between an authenticated principal (i.e., user) and a set of programs (i.e., TPS) that operate on a set of data items (e.g., UDIs and CDIs)
Clark Wilson
Confidentiality.
That supports four basic operations: take, grant, create, and revoke
Take Grant Model
Confidentiality.
Also called the “Chinese Wall model”. It was developed to prevent conflict of interest (COI) problems.
Brewer and Nash Model