Managing Security Operations Flashcards

1
Q

Know the difference between need to know and the least privilege principle

A

Need to know and the least privilege principle are two standard IT security principles implemented in secure networks. They limit access to data and systems so that users and other subjects can access only what they require. This limited access helps prevent security incidents and helps limit the scope of incidents when they occur. When these principles are not followed, security incidents result in far greater damage to an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Understand separation of duties and job rotation

A

Separation of duties (SoD) is a basic security principle that ensures that no single person can control all critical functions or system elements. With job rotation, employees are rotated into different jobs, or tasks are assigned to different employees. Collusion is an agreement among multiple persons to perform some unauthorized or illegal actions. Implementing these policies helps prevent fraud by limiting actions individuals can do without colluding with others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Know about monitoring privileged operations

A

Privileged entities are trusted, but they can abuse their privileges. Because of this, it’s essential to monitor all assignment of privileges and the use of privileged operations. The goal is to ensure that trusted employees do not abuse the special privileges they are granted. Monitoring these operations can also detect many attacks because attackers commonly use special privileges during an attack. Advanced privileged account management practices can limit the time users have advanced privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Understand service-level agreements

A

Organizations use service-level agreements (SLAs) with outside entities such as vendors. They stipulate performance expectations such as maximum downtimes and often include penalties if the vendor doesn’t meet expectations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe personnel safety and security concerns

A

Duress systems allow guards to raise alarms in response to emergencies, and emergency management plans help the organization respond to disasters. When employees travel, employees need to be aware of the risks, especially if they travel to different counties. Safety training and awareness programs ensure employees know about these risks and ways to mitigate them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Understand secure provisioning concepts

A

Secure provisioning of resources includes ensuring that resources are deployed in a secure manner and are maintained in a secure manner throughout their lifecycles. Asset management tracks tangible assets (hardware and software) and intangible assets (such as patents, trademarks, the company’s goodwill, and copyrights).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Know how to manage and protect media

A

Media management techniques track media used to hold sensitive data. Media is protected throughout its lifetime and destroyed when it’s no longer needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Know the difference between SaaS, PaaS, and IaaS

A

Software as a service (SaaS) models provide fully functional applications typically accessible via a web browser. Platform as a service (PaaS) models provide consumers with a computing platform, including hardware, operating systems, and a runtime environment. Infrastructure as a service (IaaS) models provide basic computing resources such as servers, storage, and networking resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Recognize security issues with managed services in the cloud

A

Managed services in the cloud include any resources stored in or accessed via the cloud. Storing data in the cloud increases the risk, so additional steps may be necessary to protect the data, depending on its value. When leasing cloud-based services, you must understand who is responsible for maintenance and security. The cloud service provider provides the least amount of maintenance and security in the IaaS model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain configuration and change control management

A

Many outages and incidents can be prevented with effective configuration and change management programs. Configuration management (CM) ensures that systems are configured similarly and the configurations of systems are known and documented. Baselining ensures that systems are deployed with a common baseline or starting point, and imaging is a common baselining method. Change management helps reduce outages or weakened security from unauthorized changes. A change management process requires changes to be requested, approved, tested, and documented. Versioning uses a labeling or numbering system to track changes in updated versions of software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Understand patch management

A

Patch management ensures that systems are kept up to date with current patches. You should know that an effective patch management program will evaluate, test, approve, and deploy patches. Additionally, be aware that system audits verify the deployment of approved patches to systems. Patch management is often intertwined with change and configuration management to ensure that documentation reflects the changes. When an organization does not have an effective patch management program, it will often experience outages and incidents from known issues that could have been prevented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain vulnerability management

A

Vulnerability management includes routine vulnerability scans and periodic vulnerability assessments. Vulnerability scanners can detect known security vulnerabilities and weaknesses such as the absence of patches or weak passwords. They generate reports that indicate the technical vulnerabilities of a system and are an effective check for a patch management program. Vulnerability assessments extend beyond just technical scans and can include reviews and audits to detect vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly