Module 2.2 Flashcards
(15 cards)
What are the three things you need to balance in info sec governance?
Functionality
Usability
Security
What are the implementation of least privilege?
Design access control points (passwords)
Segmentation (certain roles)
Logging (history)
What is the separation of duties?
Enforcement of dual control = any two people have access to something. Maker and checker, two people authorize the transaction
Enforcement of review and approval = there are people who verify the action
Enforcement of mutual exclusive = their actions are different, they are mutually exclusive so that they remove the risk of collusion
- there is the separation of duties because it reduces room for error
What are the shared responsibilities?
System ownership = one department owns the system
Ownership of controls = owns the certain controls
Information ownership = owns the information
Why are simple systems easier to defend than complex systems?
smaller attack surface (environment an attack can enter), less opportunities to bypass controls, ease of use
What assets should you put defenses up for
network, each level of a system, each component of a system
What is zero trust?
Each part of system must be secure in iteself
How do you implement zero trust?
endpoint device validation, multi-factor authentication, network segmentation
What are the critical systems architecture
This architecture ensures the ability to continue operations despite the failure
- component
- network
- utility
How do you design system availability
Levels of availability
- Fault tolerance = backup is running, more expensive
- High availability = backup isn’t running, like fault tolerance
- Best effort = availability, SLAs
Fail secure
How do you prepare for failure?
Redundancy
Backups
RAID (redundant array of independent disks)
How do you choose system controls?
1) information protection requirements can be met by externally connected systems (shouldn’t all come from you)
2) Control must meet requirements but should not be gold plating (not one-time use)
3) controls selected must customers’ successful
Why do segregated areas need different levels of security
some areas need baseline protection
What are TCB and its four basic functions
Trusted Computing Base (all components in a computing platform are critical in maintaining security)
- Process activation
- Execution domain switching
- Memory protection (manage references of the system)
- Input/output operations
What is TPM
Trusted Platform Module = The TPM is a cryptographic module that enhances computer security and privacy.