Windows Security Flashcards
(100 cards)
What should build and test environments reflect?
Same security update levels (patches, service packs) as the user base.
What does Microsoft recommend for security updates?
Install the latest patches and service packs immediately.
Why is waiting to install patches not recommended?
Risk of zero-day exploits.
What should developers determine about app resources?
Resources used and privileged APIs called to assess admin privilege needs.
What is the Secure Development Lifecycle (SDL)?
A process aligning security-focused activities with software development phases.
What activities are part of SDL?
Developing threat models, using code scanning tools, conducting code reviews, security testing.
What is the principle of least possible privilege?
Build apps with minimal privileges to reduce system compromise risk.
Why is least privilege important?
Reduces risk of intrusion from apps calling privileged functions.
What risk do apps with special privileges pose?
May leave the system open to intrusion if run longer than necessary.
How should apps requiring special privileges be managed?
Run for the least time possible and inform users of security risks.
How can apps run with less risk of admin privileges?
Use a less privileged account, break into separate functions, authenticate users.
What function authenticates users for admin privileges?
CredUIPromptforCredentials (CUI) or CredUICmdLinePromptforCredentials (cli).
What does PrivilegeCheck do?
Determines which privileges are enabled in an access token.
When is PrivilegeCheck typically used?
By server apps to check privileges of a client’s access token.
What happens if privileges are insufficient?
Prompt user to log on with an account having sufficient privileges.
What are privileges in Windows?
Rights to perform system tasks like shutdown or changing system time.
How do privileges differ from access rights?
Privileges control system tasks; access rights control securable objects.
Who assigns privileges in Windows?
Administrators, to user and group accounts.
What controls access to securable objects?
The object’s discretionary access control list (DACL).
What is an impersonation token?
An access token capturing a client’s security info for a server to impersonate.
What is an access token?
A structure identifying a user’s security info, created at logon.
What does an access token contain?
User’s identity, group memberships, and privileges.
What are the types of access tokens?
Primary and impersonation tokens.
Who creates a primary token?
Windows kernel, for a process’s default security info.