Domain 3A - Security Architecture and Engineering Flashcards
what did TLS replace and where is it used
Transport Layer security (TLS) replaced SSL
its used for data in motion (HTTPS)
what is a security architecture
how we secure the components in an architecture
what does a enterprise security architecture do
its how we protect all the components of the enterprise, the people, processes, systems, networks etc.
3 major enterprise architectures
- Zachman
- sabsa (sherwood applied business security architecture) - defines a risk driven enterprise security architecture model
- TOGAF (The Open group Architecture Framework) - helps you break an organization into components so you can build security into each component
2 types of security models
Lattice based and rule based
describe lattice based security model
essentially means Layers
– define layer of confidentiality or integrity
– define rules as to what can be read or written the layers to maintain confidentially or integrity
attributes of lattice based security model Bell-LaPadula
- focused on maintaining confidentiality of information
- simple security property states – no read up
- start property states – no write down
- strong star property - if you are both reading and writing you can only do so at your own level
2 types of lattice (layer) based security models
- Bell-LaPadula
- Biba
describe attributes of lattice based security model Biba (inverse of Bell-LaPadula)
- focused on maintaining integrity of the information
- simple security property - no read down
- star property - no write up
describe attributes of Lipner implementation
- its not a security model, its an implementation
- its a way to get both confidentiality and integrity from both Bell-LaPadula and Biba
attributes of Clark Wilson rule based security model
- focus is on integrity
- (3) goals of integrity
— preventing unauthorized subjects from making changes
— preventing authorized subjects from making bad changes
— maintaining the consistency of the system - (3) rules to achieve the (3) goals
— must have well formed transactions
— must have separation of duties
— must have the access triple (subject, program and object)
attributes of Brewer-Nash rule based security model
- known as the Chinese wall model
- only goal is to prevent conflicts of interest
recognize these as rule based security models
- Graham-Denning
- Harrison-Ruzzo-Ullman — enhancement of Graham-Denning
name the 4 “rules based” security models
- Clark-Wilson
- Brewer-Nash
- Graham-Denning
- Harrison-Ruzzo-Ullman
name the most widely used security framework in the world
ISO 27001
name some attributes about ISO 27001
- best practice recommendations for an ISMS (information security management system)
- defines 114 controls
- 14 domains/categories
- best practices you should have in place for a well run security program!
– security governance, security policies, onboarding, asset management, asset control, cryptography, physical security, network security all the way to having a compliance function. - you can be ISO 27001 certified
attributes of ISO 27002
- code of practice for ISMS (information security management system) controls
- provide the implementation guide for the controls in 27001
- cant be certified for this, its just a guidance
attributes of NIST 800-53
provide guidelines for selecting and specifying security controls for organizations and information systems supporting the executive agencies of the federal government to meet the requirements of FIPS Publication 200, Minimum Security Requirements for Federal Information and Information Systems.
attributes for COSO (Committee of Sponsoring Organizations of the Treadway Commission)
- initiative in the US in the 1980s to combat corporate fraud
- focused on financial reporting controls, it does contain requirement for reasonable security
attributes of ITIL (The Information Technology Infrastructure Library)
- framework of best practices for delivering IT services and are aligned with business goals and objectives
- very useful for looking at IT process like change management, configuration management, access management, availability management etc.
attributes of HIPAA (Health Insurance Portability and Accountability Act)
- focused on safeguarding medical healthcare information
attributes of SOX (Sarbanes-Oxley Act)
- thanks to Enron and WorldCom for the US federal law
- requires top level management (CFO, CEO) to individual certify the accuracy of financial information
- if fraudulent activities are found, the penalty is much more severe
- financial records must have integrity and be available
what are the 7 steps of NIST 800-37 (RMF) - Risk Management Framework
- Prepare to execute the RMF
- Categorize information system
- Select security controls
- Implement security controls
- Assess security controls
- Authorize information systems
- Monitor
3 frameworks that you only need to know that they contain risk management components. no other details needed.
- ISO 31000
- COSO
- ISACA Risk IT