Security Plus - Chapter 5 Flashcards
Vulnerability Management
A program used to identify, prioritize, and remediate vulnerabilities.
Vulnerability Scanning
Tools used to detect new vulnerabilities as they arise and implement a remediation workflow that addresses the highest priority vulnerabilities.
Asset Inventory
A list of all of the assets that are in an environment.
Asset Criticality
Determining the level of importance that an asset is to the organization and how the asset should be protected with security controls.
Asset Map
The asset inventory as it is distributed throughout the organizations network.
Risk Appetite
The willingness to tolerate risk within the environment.
Regulatory Requirements
Requirements imposed by governmental agencies to provide guidance on how to apply security controls to protect the organization’s data.
PCI
HIPAA
FISMA
Technical Constraints
The lack of technical resources that a tool may have to complete the requested task. Ex. The scanning system may only be capable of performing a certain number of scans per day, and organizations may need to adjust scanning frequency to ensure scans complete successfully.
Business Constraints
The lack of business resources that may cause a tool the inability to complete a task. Ex. Running a vulnerability scan may result in high usage of server resources that in turn may cause a slowdown of the network.
Licensing Limitations
Licensing of a scanning tool may either be a limitation of the amount of bandwidth the tool is permitted to use or a limit of the number of assets that the tool is permitted to scan.
Vulnerability Scan Configuration
All of the functions that are established to schedule, produce reports, determine the types of checks performed, provide credentials to access the targets, installation of scanning agents and conduct scans from a variety of network perspectives.
Scan Sensitivity Levels
These settings determine the types of checks that the scanner will perform and should be customized to ensure that the scan meets its objectives while minimizing the possibility of disrupting the target environment.
Credentialed Scanning
Scans of network assets with a provided network login to improve the accuracy of the vulnerability scans. These can provide the scanner with the ability to access operating systems, databases, and applications as well. This could cause some disruption to these systems though with this increased scanning ability.
Server-Based Scanning
Vulnerability scanning performed by a tool installed on a server within the network.
Agent-Based Scanning
Administrators install small software agents on each target server which provides an inside out scan and report information back to vulnerability management platform for analysis and reporting.
Scan Perspectives
Conducting scans from different locations within the network, providing a different view into vulnerabilities. Ex. External, Internal, Data Center
Controls That May Affect Scan Results
Firewall Settings
Network segmentation
Intrusion Detection Systems
Intrusion Prevention Systems
Vulnerability Feeds
Updates of vulnerabilities that are sent to the vulnerability management platform on a regular basis.
Security Content Automation Protocol (SCAP)
An effort by the security community led by the National Institute of Standards (NIST), to create a standardized approach for communicating security-related information.
SCAP Standards
Common Configuration Enumeration (CCE)
Common Platform Enumeration (CPE)
Common Vulnerabilities and Exposures (CVE)
Common Vulnerability Scoring System (CVSS)
Extensible Configuration Checklist Description Format (XCCDF)
Open Vulnerability and Assessment Language (OVAL)
Common Configuration Enumeration (CCE)
Provides a standard nomenclature for discussing system configuration issues.
Common Platform Enumeration (CPE)
Provides a standard nomenclature for describing product names and versions.
Common Vulnerabilities and Exposures (CVE)
Provides a standard nomenclature for describing security-related software flaws.
Common Vulnerability Scoring System (CVSS)
Provides a standardized approach for measuring and describing the severity of security-related software flaws.