Section 18: Orchestration and Automation

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/78

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

79 Terms

1
New cards

Automation

  • Reduces the risk of human error

  • Speeds up repetitive tasks

  • Frees up network adminstrators

2
New cards

Orchestration

  • Coordinates automated tasks across interconnected systems

  • Runs tasks on multiple servers/devices simultaneously, increasing efficiency and security

3
New cards

Infrastructure as Code (IaC)

  • Manages and provisions infrastructure through code rather than manual processes

  • Refers to:

    • Virtual Machines

    • Servers

    • Clients

    • Switches

    • Routers

    • Firewalls

    • Security Appliances

4
New cards

Scripted Automation and Orchestration

  • Used in cloud computing for rapid deployment

  • DevSecOps (Development, Security, and Operations) teams can deploy routers, switches, networks, servers, and security devices

  • Benefits of Scripted Automation

    • Less error prone

    • Faster deployment

    • Reusable scripts can reduce mistakes

5
New cards

Key Areas of IAC Implementation (3)

  • Scripting

    • Perform actions in a sequence with basic logic

  • Security Templates

    • Configuration files for network settings, access control, etc.

  • Policies

    • Define rules and permissions for deployments

6
New cards

Snowflakes and Standardization

  • Snowflake system

    • Systems different from the standard configuration template within the organization’s IaC architecture

    • Adds risk to security and long-term supportability

  • Standardization and scripting aim to eliminate special snowflakes for consistency and efficiency

7
New cards

Importance of Standardization

  • Ensures consistency in large environments with thousands of VMs

  • Reduces support and security issues

8
New cards

Automation and Orchestration

  • Critical for secure operations in modern IT and cybersecurity environments

    • Streamlines complex processes

    • Enhances security

    • Improves operational efficiencies

9
New cards

Factors to consider BEFORE Automation and Operation (5)

  • Complexity

  • Cost

  • Single points of failure

  • Technical debt

  • Ongoing supportability

10
New cards

B4 A and O: Complexity

  • Assessing the complexity of the process as well as the resource commitment needed

11
New cards

B4 A and O: Cost

  • Cost of development, implementation, and maintenance

    • Upfront investment for development and implementation

    • Long-term cost savings due to increased efficiency

    • Conduct a comprehensive cost-benefit analysis

12
New cards

B4 A and O: Single points of failure

  • Mitigating Single Points of Failure

    • Implement backup systems or manual processes as redundancy measures

    • Ensure continuity of essential business processes if automation or orchestration fails

13
New cards

B4 A and O: Technical Debt

  • Cost and complexity of poorly implemented software needing future adjustments

  • Managing Technical Debt

    • Regular reviews and updates of automation and orchestration systems

    • Refactoring outdated systems to maintain efficiency and security

14
New cards

B4 A and O: Ongoing supportability

  • Ensuring Ongoing Supportability

    • Develop necessary skills within your team

    • Update systems to adapt to changing technology landscapes

    • Consider both technical and manual redundancy measures

15
New cards

Determining Whether to Automate or Orchestrate

  • Automate

    • For simple, routine tasks like server backups

  • Orchestrate

    • For complex tasks with multiple steps, like incident response

16
New cards

Choosing what to Automate or Orchestra

  • Focus on tasks and workflows that are repeatable and stable

  • Identify consistent processes that can yield significant time and resource savings

  • Should be informed by the specific needs, resources, and circumstances in an organization

17
New cards

Continuous Monitoring and Adaption

  • Conduct continuous monitoring and adaption of orchestration systems to remain effective

  • Align systems with organization goals over time

18
New cards

Benefits of Automation and Orchestration (7)

  • Increased Efficiency and Time Savings

  • Enforcement of Baselines

  • Implementation of Standard Infrastructure Configurations

  • Scaling in a More Secure Manner

  • Increased Employee Retention

  • Faster Reaction Time

  • Workforce Multiplier

19
New cards

Benefits of A and O: Increased Efficiency and Time Savings

  • Reduces manual tasks such as system patching, software deployments, and data backups

  • Frees up human resources and reduces the risk of human errors

  • Ensures reliable and consistent outcomes

20
New cards

Benefits of A and O: Enforcement of Baselines

  • Enables consistent enforcement of security and compliance baselines across the enterprise network

  • Defines standardized configurations and policies aligned with industry best practices and regulatory requirements

  • Minimizes vulnerabilities and reduces the likelihood of security breaches

21
New cards

Benefits of A and O: Implementation of Standard Infrastructure Configurations

  • Increases security and operational stability by maintaining standardized configurations

  • Facilitates the creation and enforcement of standard configurations for consistent system setups

  • Triggers automated corrective actions for deviations from established standards

22
New cards

Benefits of A and O: Scaling in a More Secure Manner

  • Enables dynamic scaling of resources while adhering to security protocols

  • Provides secure provisioning of new virtual machines, network resources, and access control

  • Ensures scalability without compromising security, especially in cloud environments

23
New cards

Benefits of A and O: Increased Employee Retention

  • Empowers employees to focus on strategic and creative aspects of their roles

  • Leads to higher job fulfillment, engagement, and reduced burnout

  • Improves overall satisfaction and retention levels

24
New cards

Benefits of A and O: Faster Reaction Time

  • Enables rapid response to security incidents and anomalies

  • Automates intrusion detection, threat analysis, and incident response

  • Provides real-time alerts and executes predefined response actions

25
New cards

Benefits of A and O: Workforce Multiplier

  • Augments the capabilities of existing staff, allowing a smaller team to manage a larger infrastructure

  • Reduces the need for extensive staffing and optimizes resource allocation

  • Saves costs over time compared to manual processes

26
New cards

Incident Response Playbook

  • Used to describe the specific actions taken in response to emergency scenarios of different types

27
New cards

Playbook

  • A checklist of actions to detect and respond to specific types of incidents, ensuring that teams are ready to respond when an incident occurs

  • Most organizations have incident response plans documented for each major type of incident

    • The playbook serves as a guide for junior analysts and incident handlers in response to different situations

28
New cards

Triage and Handling

  • When a triage analyst identifies a suspicious or malicious activity, they categorize it and assign it to an incident handler for remediation based on the organization’s procedures

29
New cards

Creation of Playbooks

  • Each type of incident (e.g., DDoS attack, virus, worm, phishing attack, data exfiltration) should have a playbook with specific responses and procedures

30
New cards

Resources for Playbooks

  • If an organization doesn’t have incident response playbooks, they can find examples online and tailor them to their organization’s needs (e.g., incidentresponse.com/playbooks)

  • Example playbooks provide detailed steps for incident response phases (preparation, detection, analysis, containment, eradication, recovery, post-incident activity)

31
New cards

Automation with SOAR

  • Security Orchestration, Automation, and Response (SOAR)

    • A class of security tools that facilitate incident response, threat hunting, and security configurations without any human assistance

  • Runbook

    • An automated version of playbook that can partially or fully automate the incident response process

  • By using both, organizations can gain efficiencies and allow analysts to focus on higher-level work

32
New cards

Common Threats (3)

  • Ransomware

  • Data exfiltration

  • Social engineering

33
New cards

Ransomware

  • Ransomware Playbook

    • Stress the need to isolate and disconnect networks and systems quickly to prevent the ransomware from spreading WITHOUT powering off systems to preserve evidence

34
New cards

Data Exfiltration

  • Data Exfiltration Playbook

    • Describe tasks needed to stop or mitigate an ongoing exfiltration attack, including forensic analysis to determine data access and transmission

35
New cards

Social engineering attacks

  • Phishing Playbook

    • Include responses to identifying phishing emails, determining user actions, and conducting dynamic analysis to identify indicators of compromise

36
New cards

Automation and Orchestration in Networking

  • Crucial tool to facilitate efficiency and accuracy in upgrades across large scale networks

  • Need to consider in high-velocity and high-availability environments

37
New cards

Role of A and O in Upgrades (5)

  • Streamlining Processes

  • Reducing Human Error

  • Ensuring Consistency

  • Version Control and Consistency

  • Automated Testing and Validation

38
New cards

Role of A and O in Upgrades: Streamlining Processes

  • Helps in upgrading network components efficiently

39
New cards

Role of A and O in Upgrades: Reducing Human Eror

  • Minimizes the chances of errors during upgrades

40
New cards

Role of A and O in Upgrades: Ensuring Consistency

  • Maintains uniformity across the network

41
New cards

Role of A and O in Upgrades: Version Control and Consistency

  • Conducts regular scans to verify software versions against standards

  • Automatically updates devices not meeting baseline requirements

42
New cards

Role of A and O in Upgrades: Automated Testing and Validation

  • Performs systematic testing of network functionalities post-upgrade

  • Checks routing tables, ARP caches, DNS caches, etc., for issues

43
New cards

Role of A and O in Compliance (3)

  • Continuous Monitoring

  • Policy Enforcement

  • Log and Evidence Management

44
New cards

Role of A and O in Compliance: Continuous Monitoring

  • Compares network configs against compliance standards

  • Identifies and rectifies any deviations promptly

45
New cards

Role of A and O in Compliance: Policy Enforcement

  • Implements security policies uniformly across all systems

  • Automatically quarantines non-compliant devices

46
New cards

Role of A and O in Compliance: Log and Evidence Management

  • Generates and preserves logs of network activities and compliance measures

  • Presents logs during compliance audits to ensure compliance

47
New cards

Real-World Use Cases of A and O in Upgrades/Compliance

  • Automated Patch Management

    • Ensures all systems are patched and maintained at the appropriate level

    • Saves time and effort, especially in large networks

  • Compliance Monitoring

    • Provides continuous monitoring and management of network configs

      • Chef

      • Puppet

      • DNA Center

    • Enforces standard configs and corrects deviations automatically

48
New cards

Importance of Automated Network Inventories

  • Crucial for modern networks due to virtualization

  • Essential for tracking devices, users, and software

  • Helps manage scalability

    • Horizontal scaling

    • Vertical scaling

49
New cards

Dynamic Inventory Approach

  • Transforms static, manually managed lists into real-time, automatically updating repositories

  • Provides a comprehensive view of network assets

50
New cards

Benefits of Automated Inventories

  • Real-time updates on device connections and network risks

  • Integration with management tools for automated configuration

    • Ansible

    • Chef

    • Puppet

  • Reduces human error and improves efficiency

51
New cards

Using Nmap for Network Scans

  • Conducts IP and port scans to identify devices and services

  • Helps visualize network topology and identify vulnerabilities

  • Enables impact analysis to protect against single points of failure

52
New cards

Security and Compliance

  • Supports security and compliance programs (e.g., PCI DSS)

  • Can be configured to block unauthorized access and quarantine devices

53
New cards

Integration

  • Combining different subsystems or components into one comprehensive system to ensure they function properly together

54
New cards

Application Programming Interface (API)

  • A set of rules and protocols used for building and integrating application software

  • Allows products or services to communicate in a controlled environment using a specific data exchange format

55
New cards

API Usage

  • Enables software developers to access functions or features of another application programmatically

  • Facilitates automation of administration, management, and monitoring of services and infrastructures

56
New cards

API Types (2)

  • Representational State Transfer (REST)

  • Simple Object Access Protocol (SOAP)

57
New cards

Representational State Transfer (REST)

  • Uses standard HTTP protocols, status codes, uniform resource identifiers (URIs), and MIME types for interaction

  • Relies on JSON for data transfer, making it lightweight and easily integrable with existing websites

  • Generally more straightforward and adaptable

58
New cards

Simple Object Access Protocol (SOAP)

  • Defines a strict standard for message structure, usually in XML format

  • Known for robustness, security features, and transaction compliance

  • Provides higher levels of security and transactional integrity

59
New cards

API Benefits

  • Drive efficiency, innovation, and scalability in modern systems

  • Allow direct integration of third-party applications into web-based applications

    • APIs enable integration between various services, especially cloud-based services like SaaS or PaaS

  • Allow for seamless experiences and interconnections between different services to enhance their capabilities

60
New cards

Git

  • A distributed version control system for managing different versions of code

  • Developed in 2005 by the creator of Linux

  • Used by a vast number of software projects for version control

61
New cards

Source Control Core Concepts

  • Git Repository

    • Storage area for code and related files

  • Package Installation

    • Use package manager to install Git

62
New cards

Major Subcommands (12)

  • config

  • init

  • clone

  • add

  • commit

  • status

  • branch

  • merge

  • pull

  • push

  • log

  • checkout

63
New cards

config

  • Set up repository or user options

64
New cards

init

  • Create or reinitialize a Git repository

65
New cards

clone

  • Create a working copy of an existing repository

66
New cards

add

  • Add files to be tracked by the Git repository

67
New cards

commit

  • Update the Git repository with changes, creating a snapshot

68
New cards

status

  • Display the status of the repository

69
New cards

branch

  • Manage branches or pointers to specific repository snapshots

70
New cards

merge

  • Integrate changes from one branch into a master branch

71
New cards

pull

  • Acquire and merge changes that were made to other repositories and branches into the local working copy

72
New cards

push

  • Upload a local working copy of a repository to a remote repository

73
New cards

log

  • Display the changes made to a local repository

74
New cards

checkout

  • Switch to a specific branch

75
New cards

Repository Creation Process Flow

  1. Configure global settings including username

  2. Create a directory where the project will reside

  3. Change into the created directory and then initialize it with Git to designate it as a Git repository

  4. Add project files to the repository

  5. Commit the changes and take a snapshot of the project

76
New cards

Branching

  • Creating a new branch for feature development or bug fixes

77
New cards

Merging

  • Merge changes from a branch back into the master branch

78
New cards

Collaboration Workflow

  • Pull changes from remote repository, make local changes, and push changes back to remote repository

79
New cards

Additional Concepts

  • .gitignore

    • File to identify files to be ignored during commit

    • *.git/

      • Directory containing Git’s version control files