SC-100: Security Best Practices Flashcards

(34 cards)

1
Q

What are the guiding principles of Zero Trust?

A

Verify Explicitly
Use Least Priviledge Access
Assume Breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Azure Well-Architected Framework

A

A framework designed to help customers build secure, high-performing, resilient, and efficient infrastructure for their applications and workloads in Azure.

Five Pillars:
Cost Optimization
Operational Excellence
Performance Efficiency
Reliability
Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Azure Well-Architected Framework’s
Five Pillars!

A

Cost Optimization
Operational Excellence
Performance Efficiency
Reliability
Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is a key principle of Azure’s Well-Architected Framework?

A

Plan for failure!

Planning for potential problems and creating resilient systems that can withstand failures without significant downtime or data loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Azure’s Well Architected Framework pillars of IoT!

A

Strong Identity
Least Privilege
Device Health
Device Update
Monitor System Security/Plan Incident response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Microsoft Cloud Adoption Framework

A

A documentation and implementation framework for best practices throughout the cloud adoption lifecycle, providing a step-by-step approach to cloud migration and management using Azure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Microsoft Cloud Adoption Framework Steps!

A

Define Strategy
Plan

Ready

Adopt (Migrate, modernize, innovate)
Secure

Manage
Govern

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of the Cloud Adoption Framework?

A

To help organizations build secure applications and infrastructure in the cloud.

The Cloud Adoption Framework helps organizations to design, deploy, and operate workloads that are consistent with their business objectives and meet security and compliance requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Azure Landing Zones?

A

Azure Landing Zones provide an automated and prescriptive reference implementation to rapidly set up a comprehensive secure cloud baseline

A well-defined, structured environment within Azure that serves as a starting point for migrating, modernizing, and innovating applications at scale.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Microsoft Cybersecurity Reference Architectures (MCRA)

A

A set of technical diagrams that describes Microsoft’s cybersecurity capabilities. Show how Microsoft security capabilities integrate with the following:

-Microsft platforms like Microspft 365 and Azure
-Third party apps like ServiceNow and Salesforce
-Third part platforms like AWS and Google Cloud Platform (GCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Microsoft Cybersecurity Reference Architectures (MCRA) contain diagrams on the following:

A

Microsoft cybersecurity capabilities
Zero Trust and Zero Trust Rapid Modernization Plan (RaMP)
Zero Trust User Access
Security Operations
Operational Technology (OT)
Multicloud and cross-platform capabilities
Attack chain coverage
Azure native security controls
Security organizational functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following best defines the objective of a cloud reference architecture like Microsoft Cybersecurity Reference Architecture (MCRA) from Microsoft?

A

MCRA is designed to provide security-focuses reference architecture guidance that can apply almost anywhere no matter what underlying technologies, workloads, or data types are involved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a key benfit of using best practices, such as those found in the Microsoft Cybersecurity Reference Architecture (MCRA) when addressing cloud security concerns?

A

Using best practices can reduce staffing needs, complexity, and risk exposure, bringing financial benefits that arise from economies of reuse and simplification rather than reducing the number of platforms, components or architectures alone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Microsoft Cloud Security Benchmark (MCSB)

A

A framework for assessing the security posture of an organization;s cloud environment against industry standards and best practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Microsoft Cloud Security Benchmark (MCSB) domains/control families

A

Network Security
Identity Management
Privileged Access
Data Protection
Asset Management
Logging and Threat Detection
Incident Response
Posture and Vulnerability Management
Endpoint Security
Backup and Recovery
DevOps Security
Governance and Strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Control

A

A control is a high-level description of a feature or activity that needs to be addressed and isn’t specific to a technology or implementation

Example: Data Protection is one of the security control families. Data Protection contains specific actions that must be addressed to help ensure data is protected

17
Q

Baseline

A

The implementation of the Control on the individual Azure services. Each organization dictates a benchmark recommendation and corresponding configuration needed in Azure.

Example: The Contoso Company looks to enable Azure SQL security features by following the configuration recommendation in the Azure SQL security baseline

18
Q

What is the purpose of the Microsoft Cloud Security Benchmark (MCSB)?

A

It is designed to provide a set of recommended security configurations and best practices for Microsoft cloud services.

19
Q

What is the difference between defensive and detective security controls, as discussed in the Microsoft Cloud Security Benchmark (MCSB)?

A

Defensive controls proactively prevent security incidents while Detective controls detect and respond to these incidents after they occur.

20
Q

What are attack vectors?

A

An attack vector is an entry point or route for an attacker to gain access to a system.

Examples include: Email, social media, insiders, removable devices, browsers, cloud services, devices, wifi

21
Q

What is a security breach?

A

Any attack that results in someone gaining unauthorized access to devices, services, or networks.

22
Q

What are data breaches?

A

A data breach is when an attacker successfully gains access or control of data.

23
Q

Attack Chain Modeling

A

An attack chain describes the typical chain of events uring an attack that leads to organizational damage. This includes technical and non-technical steps taken by adversaries or insiders during the attack.

24
Q

Microsoft’s best practices for ransomware protection

A
  1. Prepare your recovery plan
  2. Limit the scope of the damage
  3. Make it hard to get in
25
Azure Backup
Azure Backup provides security to your backup environment, both when your data is in transit and at rest. With Azure Backup you can back up: On-prem files, folders, and system states Entire Windows/Linux VMs Azure managed disks Azure file shares to a storage account SQL Server databases running on Azure VMs
26
What is the primary method for mitigating against ransomware attacks?
Backing up data regularly and testing restore procedures. Regular backups are essential for restoring any lost or encrypted data after a ransomware attack. Testing restore procedures ensure that the backups can actually perform the desired restore.
27
What is a critical component of business resiliency planning?
Performing regular risk assessments. Understanding potential risk is key to developing effective resiliency plans. Regular risk assessments help identify these risks and allow for appropriate mitigation strategies to be developed.
28
Update Manager
A unified services to help manage and govern updates for all your machines. You can use Update Manager in Azure to: Oversee update compliance for your entire fleet of machines in Azure, on-prem, and other clouds. Instantly deploy critical updates to help secure your machines. Use flexible patching options such as automatic virtual machine guest patching in Azure, hotpatching, and customer-defined maintenance schedules.
29
How can update management automation help mitigate against security threats?
Facilitating quicker deployment of critical security patches across infrastructure. Update management automation helps quickly deploy critical security patches, reducing the time attackers have to exploit vulnerabilities
30
NIST Cybersecurity Framework
Framework for improving the cybersecurity posture of an organization
31
OWASP
Reference for web app security best practices
32
STRIDE
A methodology widely used approach for Threat Modeling that helps identify and classify threats based on their nature and impact.
33
DREAD
A scoring system for Threat prioritization.
34
What is the Enterprise Access model?
It is a security architecture that leverages multiple layers to protect privileged assets. The Enterprise access model helps organizations control access to resources and minimize security risks by relying on layer security principles and role-based access control.