SYO-701 Flashcards
(84 cards)
Technical controls (category)
implemented using a system
IT security controls
eg: firewall, anti-virus
Managerial Controls (category)
policies and procedures
admin stuff
SOPs
on-boarding policy, demotion, review login reports, separation of duties
Operational controls (category)
implemented by people instead of systems
guard shack, require multiple guard, awareness training
physical controls (category)
door lock, warning sign, power generator
preventive control type
block access to a resource
firewall rules
door locks
on-boarding policy
deterrent control type
discourage attacks
warning banner
posted warning signs
threat of demotion
Detective control type
identify intrusion attempts
audit log monitoring
motion detectors
Corrective control type
Apply a control after an event has been detected to reverse impact of event
Continue operations with minimal downtime
Ransomware recovery using backups
use law enforcement to manage criminal activity
fire extinguishers
compensating control type
control using other means
existing controls aren’t sufficient
may be a temporary control
use a temporary firewall rule to block an application while waiting for a security patch
implement separation of duties
generator used after a power outage
Directive control type
direct a subject towards compliance
this is a weak security control
tell people to store sensitive files in a protected folder
train users on security policy
Create compliance policies and procedures
security policy training
Zero Trust
Authenticate to each device or process on the network, not just a VPN or firewall.
Everything must be verified, nothing inherently trusted
Data plane
zero trust plane of operation
process frames packet and network data
movement of data across network
Switch ports, NAT, processsing, forwarding, trunking
Control plane
zero trust plane of operation
manage actions of the data plane
network decision making and traffic management
routing tables, NAT tables, IP address configs
Adaptive Identity
zero trust
Consider the source and the requested resources
Multiple risk indicators with relationship to the organization
If user is in China, considered higher risk
Find out how risky the login is.
(zero trust) Threat Scope reduction
zero trust
decrease number of possible entry points
policy-driven access control (zero trust)
zero trust
Make authentication requirements stronger based on Adaptive Identity.
combine adaptive identity with a predefined set of rules
PEP
zero trust
Policy Enforcement Point
everything must be validated via the PEP
Subjects and systems must be vallidated through Policy Enforcment Point
PEP is a gatekeeper for allowing or blocking traffic to resources
Can be multiple devices working together.
Works on the Data plane
PDP
zero trust
Policy Decision Point
gets forwareded requests from the PEP
decides whether traffic should be allowed or not
makes a process for authentication
Works on the control plane
Policy Engine - zero trust
zero trust
Part of the PDP
evaluate each access decision based on policy
grant, deny or revoke access
Policy Administrator - zero trust
Part of the PDP
Generate access tokens
the PA creates or shuts down a communication based on decisions from the Policy Engine
Tells the PEP to allow or disallow access
TPM
trusted platform module
specification for cryptography hardware
cryptography process like random number generator, key generators
unique keys burned in during manufacturing
versatile memory to store keys, hardware config info
securely store bitlocker keys
password protected against dictionary attacks
HSM
hardware security module
used in large environments
- a rack server
securely stoer thousands of keys
high-end cryptographic hardware used to perform crypto functios
key backup
- secure storage for keys
cryptographic accelerators
- GPU for performing crypto functions
secure enclave
protected area in hardware for secrets
- implemented as a hardware processor
- isolated from main processor
- many different technologies and names
extensive security features
- has its own boot ROM
- has its own boot process
- true random number generator
- real-time memory encryption
- root crypto keys
- AES encryption
block chain
distributed ledger
everyone on blockchain tracks the ledger
tracks transaction and sends it everyone
can be used to track progress of parts on an assembly line
block of transactions
secure hash is calcuated from previous blocks of transaction data
hash is added to the new block of verified transactions
chain of hashes
new calculated block is distributed to everyone
if any blocks are altered, all the following hashes in the chain are recalcuated
is the altered chain doesn’t match other chains on network, it will be rejected