LDR 551- Book 4 Flashcards
What is the Internet Storm Center?
Internet’s early warning system
What are the four key elements of incident response preparation according to Brown and Roberts?
Telemetry, hardening, process, practice
Why is visibility foundational in incident response?
It’s essential for investigation and response activities.
What helps prioritize response efforts in incident response?
Analytics, key assets, users, and contextual information
Why is having solid process documentation important in incident response?
Prevents figuring out procedures on the go.
What is often the most overlooked part of incident response?
Practice
What must incident response tools, services, and skillsets meet?
Requirements of the environment and constituency
What informs incident response staffing strategy?
Incident response goals
What is essential for effective incident response teamwork?
Strong interpersonal relationships and good communications
What should your SOC consider for each device type and location?
Readiness for different incident scenarios
What is a main consideration for SOC planning?
Scenarios the SOC is willing and capable of responding to
What is a key aspect of prevention as preparation?
Preparing infrastructure to resist intrusion
What are CIS benchmarks?
Best practices for secure configurations
What are the two levels of CIS security settings?
Level 1 and Level 2
What does Level 1 security setting aim to achieve?
Basic security with little impact on functionality
What does Level 2 security setting aim to achieve?
Greater security but may reduce functionality
What are CIS hardened images?
Securely configured virtual machine images
What is NIST SP 800-123?
Guide to General Server Security
What is the purpose of the NIST National Checklist Program?
Provides a searchable index of hardening guides
What are DISA STIGs?
Step-by-step checklists for locking down systems
What is the Australian Signals Directorate known for?
Detailed system configuration guides
What are the CIS Controls?
Prioritized actions for defense against attacks
How are CIS Controls organized?
By activities, not by who manages devices
What should you understand about your environment for effective security?
Normal operations in networks, hosts, applications, users