Section 1 Flashcards
(43 cards)
Categories of Security Controls (1.1)
-
Technical Controls
- Technologies, hardware, and software mechanisms that are implemented to manage and reduce risks
-
Managerial Controls
- Sometimes also referred to as administrative controls
- Involve the strategic planning and governance side of security
-
Operational Controls
day-to-day basis- Procedures and measures that are designed to protect data on aday-to-day basis
- Are mainly governed by internal processes and human actions
-
Physical Controls
- Tangible, real-world measures taken to protect assets
Types of Security Controls (1.1)
-
Preventive Controls
- Proactive measures implemented to thwart potential security threats or breaches
-
Deterrent Controls
- Discourage potential attackers by making the effort seem less appealing or more challenging
-
Detective Control
- Monitor and alert organizations to malicious activities as they occur or shortly thereafter
-
Corrective Controls
- Mitigate any potential damage and restore our systems to their normal state
-
Compensating Controls
- Alternative measures that are implemented when primary security controls are not feasible or effective
-
Directive Controls
- Guide, inform, or mandate actions
- Often rooted in policy or documentation and set the standards for behavior within an organization
CIA Triad (1.2)
-
Confidentiality
- Ensures information is accessible only to authorized personnel (Encryption, Access control)
-
Integrity
- Ensures data remains accurate and unaltered (Hashing, Digital signatures, Certificates, Non-repudiation, Checksums)
-
Availability
- Ensures information and resources are accessible when needed (Redundancy measures, Fault tolerance)
Non-Repudiation (1.2)
- Guarantees that an action or event cannot be denied by the involved parties (e.g., digital signatures)
- Proof of integrity (hash, if data changes hash changes, doesnt necessarily associate data with individual)
- Proof of origin
Triple A’s of Security (1.2)
-
Authentication
- Verifying the identity of a user or system (e.g., password checks)
-
Authorization
- Determining actions or resources an authenticated user can access (Authorisation model, permissions)
-
Accounting
- Tracking user activities and resource usage for audit or billing purposes
Gap Analysis (1.2)
- Process of evaluating the differences between an organization’s current
performance and its desired performance- Define scope, gather data on organisation, analyse data to identify shortcomings, develop plan to bridge gap
Zero Trust (1.2)
demands verification for every device, user, and transaction within the network, regardless of its origin
To create a zero trust architecture, we need to use two different planes (1.2)
Control Plane, data plane
Control plane (1.2)
- Control Plane: Refers to the overarching framework and set of components responsible for defining, managing, and enforcing the policies related to user and system access within an organization
- Adaptive Identity: Relies on real-time validation that takes into account the user’s behavior, device, location, and more
- Threat Scope Reduction: Limits the users’ access to only what they need for their work tasks because this reduces the network’s potential attack surface
- Policy-Driven Access Control: Entails developing, managing, and enforcing user access policies based on their roles and responsibilities
- Secured Zones: Isolated environments within a network that are designed to house sensitive data
- Policy Engine: Cross-references the access request with its predefined policies
- Policy Administrator: Used to establish and manage the access policies
Data Plane (1.2)
- Subject/System: Refers to the individual or entity attempting to gain access
- Policy Enforcement Point: Where the decision to grant or deny access is actually executed
Physical Security (1.2)
- Barricades/ bollards: prevents access, channels people through access points
- Access control vestibule: All door are normally locked (air lock system)
- Fencing: Perimeter security
- Video surveillance: CCTV cameras
- Guards and access badges
- Lighting: Leads to more security
- Sensors: Detects infrared radiation, pressure sensors, microwaves for large area, ultrasonic for reflection detection
Deception and Disruption Technologies (1.2)
- Honeypots: Decoy systems to attract and deceive attackers
- Honeynets: Network of decoy systems for observing complex attacks
- Honeyfiles: Decoy files to detect unauthorized access or data breaches
- Honeytokens: Fake data to alert administrators when accessed or used
Change management (1.3)
Structured approach to transitioning from a current state to a desired future state
Change Owner (1.3)
- Individual or team responsible for initiating change request
- Advocates for the change, details reasons, benefits, and challenges
- Key in presenting the case for the change
Stakeholders (1.3)
- Individuals or teams with a vested interest in the proposed change
- Directly impacted or involved in assessment and implementation
Impact analysis (1.3)
- Integral part of the Change Management process
- Essential before implementing proposed changes
- Assesses potential fallout, immediate effects, long-term impacts
- Identifies challenges and prepares for maximizing benefits
Backout plan (1.3)
Having a way to revert changes
Technical change management (1.3)
Allow List
- Specifies entities permitted to access a resource
Deny List
- Lists entities prevented from accessing a resource
Restricted Activities (1.3)
- Certain tasks labeled as ‘restricted’ due to their impact on system health or security
Downtime (1.3)
- Any change, even minor, carries the risk of causing downtime
- Estimate potential downtime and assess its negative effects against benefits
Service and application restarts (1.3)
- Some changes, like installing security patches, require service or application restarts
- Restarting critical services can be disruptive, potentially causing data loss
Legacy applications (1.3)
- Older software or systems still in use due to functionality and user needs
- Legacy applications are less flexible and more sensitive to changes
Dependencies (1.3)
- Interconnected systems create dependencies, where changes in one area affect others
- Mapping dependencies is crucial before implementing changes
Documenting changes (1.3)
- Documenting changes provides a clear history of the what, when, and why for accountability and future reference
-
Version Control
- Tracks and manages changes in documents, software, and other files
- Allows multiple users to collaborate and revert to previous versions when needed