Key Concepts 7.4 Apply foundational security operations concepts Flashcards

Domain 7 (13 cards)

1
Q

Involves limiting access to data and systems to only individuals with a legitimate business need for that information. This may result in denying access even to some with
necessary security clearance. This approach reduces risk from both external breaches and
unintentional (or malicious) insider actions.

A

Need-to-know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Involves assigning the bare minimum permissions to accounts (user, system,
or service) required to perform their functions. This approach reduces lateral movement
opportunities for attackers and limits the impact of a single account’s compromise

A

Least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Refers to the gradual accumulation of unnecessary or excessive permissions granted to users, applications, or systems over time. This can lead to security vulnerabilities
and unauthorized access.

A

Privilege creep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Involves dividing critical tasks or access roles to ensure one
person doesn’t hold excessive control, thus requiring collusion for fraud or abuse. This
approach prevents conflicts of interest, lowers financial risks, and enhances audit trails.

A

Segregation of Duties (SoD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is an agreement among multiple persons to perform some unauthorized or
illegal actions.

A

Collusion (SoD helps prevent)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is the use of deceitful tactics to gain unauthorized access to information systems,
data, or financial resources

A

Fraud (SoD helps prevent)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Involves covertly obtaining confidential information, often for political, military, or economic advantage. Generally, initiated from outside and organization, but
may involve a malicious insider.

A

Espionage (SoD helps prevent)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which is a deliberate act or omission that damages or disrupts a company’s operations, property, or reputation. It can be carried out by employees, competitors, or
other outsiders.

A

Sabotage (SoD helps prevent)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Involves a special focus on securing those accounts with administrative or higher-than-usual permissions. Is a system for managing, monitoring, and securing all accounts with elevated privileges, ideally regardless of the specific
technology stack in use.

A

Privileged account management (PAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • Reduced attack surface: By limiting the number of active privileged accounts and their
    usage, PAM decreases potential entry points for attackers.
  • Insider threat mitigation: By monitoring and controlling privileged access, PAM helps
    prevent misuse of power by internal users.
  • Enhanced accountability: Clear tracking of who accessed what and when improves
    individual accountability within the organization.
  • Protection against credential theft: JIT access and frequent password rotations make
    stolen credentials less valuable to attackers.
  • Simplified access management: Centralized control over privileged roles and access
    streamlines administrative tasks and reduces human error.
A

Security Benefits of PAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

involves periodically shifting employee roles and responsibilities within the organization. This approach detects anomalies or fraud more easily and spreads domain knowledge to reduce ‘single point of failure’ risks.

A

Job rotation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

are contracts defining performance, availability, and support expectations between customer and provider (usually an external vendor). Establish
security baselines and outline incident response timelines.

A

Service-level agreements (SLAs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An SLA between departments within an organization

A

operating level agreement (OLA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly