1/5
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Mitigation techniques
- Patching
• Monthly updates -Incremental (and important)
• Third-party updates -Application developers, device drivers
• Auto-update -Not always the best option
• Emergency out-of-band updates -Zero-day and important security discoveries
- Encryption
- Monitoring
- Least privilege
- Configuration enforcement
- Decommissioning
Encryption
Prevent access to application data files
- File system encryption
File level encryption
- Windows EFS
Full disk ecryption (FDE)
- Encrypt everything on the drive
- Bitlocker, FileVault, Etc.
Application data encryption
- Managed by the app
- Stored data is protected
Monitoring
Aggregate information from devices
- Built-in sensors, separate devices
- Integrated into servers, switches, routers, firewalls, etc
Sensors
- Intrusion prevention systems, firewall logs, authentication logs, web server access logs, data base transaction logs, email logs
Collectors
- Proprietary consoles (IPS, firewall), SIEM consoles, syslog servers
- Many SIEMs include a correlation engine to compare diverse sensor data
Least Privilege
Rights and permissions should be set to the bare minimum
- You only get exactly what's needed to complete your objective
All user accounts must be limited
- Applications should run with minimal priveleges
Don't allow users to run with admin privileges
Configuration enforcement
• Perform a posture assessment
- Each time a device connects
• Extensive check
- OS patch version
- EDR (Endpoint Detection and Response) version
- Status of firewall and EDR
- Certificate status
• Systems out of compliance are quarantined
- Private VLAN with limited access
- Recheck after making corrections
Decommissioning
Should b