Zero trust, deception & disruption, change management Flashcards

1
Q

Zero trust

A

You have to authenticate or prove yourself each time you want to gain access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can we start implementing zero trust?

A

Take our security devices & break them into smaller components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data plane

A

Part of device that processes frames, packets, network data.
Ex: switch, router firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Control plane

A

Manages actions occurring in the data plane, Configuring policies & rules.
Ex: routing tables, firewall rule, NAT tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do we control trust?

A
  1. Adaptive Identity
  2. Threat scope reduction
  3. Policy-driven access control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Adaptive identity

A

We want to look at the source of the requested resources.
Ex: physical location, IP address, relationship to org.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Threat scope reduction

A

decrease the # of possible entry points to get into the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Policy-driven access control

A

Combines all the individual data points (adaptive identity) then decides what type of authentication to use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Another way to qualify identity of a person is through-

A

Security Zones, look at where they’re coming from and where they’re going.
**set rules on what zone has access to other zones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Policy enforcement point (gatekeeper)

A

§ Gathers all info about traffic, then provides it to PDP.
All of traffic that’s traversing through network must pass through PEP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Policy decision point

A

responsible for examining the authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Policy engine

A

Evaluates each access decision based on policy.
Grant, deny, or revoke.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Policy administrator

A

○ Takes that decision and communicates w/ PEP
○ Generates access tokens or credentials
○ Tells the PEP to allow or disallow access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Honeypot

A

Attract attackers to system, & keep them involved to trap them there.
Creates a virtual world to explore.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Honeynets

A

A large deception network w. one or more honeypots.
Ex: servers, workstations, routers, switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Honeyfiles

A

bait for the honeynet
Add many honey files to file shares

17
Q

Honeytokens

A

track malicious data, add traceable data

18
Q

Change approval process includes-

A
  1. Complete the request forms
  2. Determining the purpose of the change
  3. Identify the scope of the change (single system or multiple systems)
  4. Schedule a date and time of the change
  5. Determine affected systems & impact
  6. Analyze the risk associated w/ change
19
Q

Impact analysis

A

Recognizing the risk that is involved in a particular change

20
Q

What are the risk of not making a change?

A
  1. Security vulnerability
  2. Application unavailability
  3. Unexpected downtime
21
Q

Sandbox testing environment

A

Perform as many tests as you’d like and have no effect on your production system

22
Q

Backout plan

A

strategy for reverting back to your previous system state
**Always have backups

23
Q

Maintenance window

A

Scheduled periods of time when system updates, backups, and tests are performed on applications.
**overnight best choice

24
Q

Standard operating procedure

A

Step-by-step instructions to help workers carry out routine operations.
**process must be documented

25
Living document
policy, plan or framework that is continuously updated and revised to reflect the changing cyber landscape.
26
A change approval is-
1. Timely 2. Scope of change is important 3. Specific
27
Legacy applications
Applications that were here before you arrived. No longer supported by developer
28
Dependencies
Connections between assets where the state of one relies to the other. A service will not start w/o other active services.
29
Version control
A software system that tracks changes to a file or configuration data over time.