Section 10.0 Comprehending Security Compliance and Troubleshooting

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/79

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

80 Terms

1
New cards

Data localization

States that information about a country’s citizens must be stored in that country and that rules govern cross-border exchanges of that data

2
New cards

Data Privacy

Impact cloud architecture and implementation. Specifically, it applies to situations where data flows between governing bodies, such as local, regional, and national borders

3
New cards

Data Ownership

An internal governing principle for data management. It determines who is responsible and accountable for data within the organization

4
New cards

Data steward

Responsible for day-to-day administration and maintenance.

5
New cards

Data Residency

Refers to control over the geographical location of data storage. Policy, tax, or other reasons may suggest benefits to specific data locations in particular regions or nations.

Also tied to legal and regulatory compliance

6
New cards

Data Sovereignty

Deals with legal and regulatory issues around data storage.

The goal is to maintain data within the context of specific laws or legal systems to exercise legal protections and/or punishments. These may include tax or privacy laws

7
New cards

Data Localization

Covers control over data created within a governing region, such as a country or state.

It usually pertains to personal data submitted by users who have specific expectations governing that information and its storage based on their local or national laws

8
New cards

Data Locality

Deals information management and processing. It is still relevant to the geographical storage location but does not refer to legal implications

Refers to moving compute power to data to avoid the potential bottlenecks involved with moving large amounts of data to processing centers

9
New cards

Data Classification

Involves identifying internal data and understanding the impact of a security breach

10
New cards

Who is responsible for data classification in the cloud?

Customer's responsibility

11
New cards

Data Retention Policies

Specify how long to retain information to comply with legal, contractual, or regulatory requirements.

These policies normally specify a minimum time for data retention. They may also indicate a maximum time for data retention

12
New cards

Legal hold

A formal process that freezes specific information in anticipation of legal proceedings.

The holds prevent data modification through methods such as deletion, compression, or other means that raise questions about the data’s integrity

13
New cards

Regulatory compliance Examples

Financial information, including tax and accounting data.

Customer personal information.

Employee HR information

14
New cards

Systems and Organization Controls 2 (SOC2)

Standard ensures the service providers you partner with meet or exceed a specific level of data privacy and management

A flexible mechanism that aligns with your business processes. It generates reports based on vendor systems and capabilities to ensure they meet your organization's needs

15
New cards

Payment Card Industry Data Security Standards (PCI DSS)

Define secure practices around credit and debit card transactions. The guidelines and requirements are designed to protect consumers and vendors from theft and fraud

16
New cards

International Organization For Standardization (ISO) 27000 Standards

Guide organizations and consumers through the implementation of information security management systems

17
New cards

International Organization for Standardization (ISO) 27001

A set of guidelines and practices for managing an information security management system (ISMS), helping providers and consumers address risks and weaknesses

18
New cards

Cloud Security Alliance

Provides research, publications, training, and certification on cloud security practices.

Organizations join the Cloud Security Alliance (CSA) to benefit from the research and training by working collaboratively with other members and organizations

19
New cards

Cloud Controls Matrix (CCM)

This framework provides a means for assessing, implementing, and auditing cloud deployments. It includes expectations for which entities perform which roles (cloud consumer versus cloud provider)

20
New cards

Principle of Least Privilege

This idea states that consumers should be given the minimum level of access to accomplish assigned tasks.

Additional privileges can be assigned, if necessary, after approval.

21
New cards

Zero Trust Cloud Security

Begins with the assumption that no devices—even internal systems—should be trusted.

Instead, every entity in the environment must authenticate and be explicitly granted access to resources

22
New cards

Granular access controls:

Uses microsegmentation and policy-driven rules to enforce the principle of least privilege in cloud (and on-premises) environments

23
New cards

Continuous authentication verification:

Requires proof of identity for each request rather than an authenticated credential generated at system sign-on

24
New cards

Zero implicit trust

Distrusts all devices, whether internal or external, client or server, etc

25
New cards

Dynamic security

Dynamic response to security deviations by users and systems

26
New cards

Zero trust works based on the following approaches:

Strict IAM and account management policies.

Effective micro-segmentation of resources.

Increased access monitoring and automated responses.

End-to-end encryption of data in transit.

Encryption of data at rest

27
New cards

Benchmarks

Provide a way to measure risk, establish minimum security settings, and demonstrate return on investment (ROI) results

28
New cards

Center for Internet Security (CIS) Benchmarks for Cloud Security

Provides best practices and configuration information for security public cloud deployments. These practices integrate well with other standards and are vendor-neutral, enabling them to work in many different environments

29
New cards

The CIS benchmarks include two levels of recommendations. They are:

Level 1: Baseline configurations offering immediate returns.

Level 2: Additional layered settings that may impact performance or functionality

30
New cards

Hardening

Consists of several specific tasks, but it can be summed up as, “remove what you don’t need and use the most current version of what’s left.”

31
New cards

Configuration Baselines

Refers to an agreed-upon standard OS version and configuration

32
New cards

Configuration management

Controls OS settings and application deployment by using tools like Ansible

Allows for quick changes to the system’s configuration

33
New cards

Security Patching

May be applied at the operating system (OS) or application/service levels

OS vendor manages security patches and releases them on a predictable schedule. A centralized service typically handles on-premises patch management, allowing administrators to deploy patches to a test environment before production

34
New cards

Hotfixes

Address a specific software bug. They are more focused than patches and may be customer or situation-specific

More urgent than patches, so they are not scheduled for a specific release schedule

35
New cards

Rollups

A combination of a series of patches into a single deployable unit.

36
New cards

Patch Application

Organizations should test and approve patches before deployment. Patch deployment can be prioritized based on threat level, feature enhancements, or network location.

Automated patching tools use a centralized dashboard to schedule and manage updates efficiently

37
New cards

What are signature updates, and why are they important?

Are periodic updates for antivirus and anti-malware solutions that help recognize known threats

Ensure security software remains effective against new and evolving malware. In cloud environments, cloud service providers (CSPs) manage and update these signatures automatically

38
New cards

Encryption

Process of encoding data so that only those with the proper decryption key can access it. Those who do not have the related key cannot decrypt the data and access its contents

39
New cards

Non-repudiation:

The security goal of ensuring that the party that sent a transmission or created data remains associated with that data and cannot deny sending or creating that data.

40
New cards

Symmetric Encryption

Uses a single key to encrypt and decrypt information. The process is quick

41
New cards

Asymmetric Encryption

Uses two mathematically related keys. One is a public key and the other is private. If one key is used to encrypt data, only the other key can decrypt it

Slower than symmetric, but it solves the key delivery problem

42
New cards

Asymmetric Encryption: Encrypt with the public key; decrypt with the private key

Useful for confidentiality where user Bob encrypts data with user Alice's public key, knowing only Alice's private key can decrypt it

43
New cards

Asymmetric Encryption: Encrypt with the private key; decrypt with the public key

This is useful for digital signatures that prove where information came from and guarantee its integrity.

If Bob encrypts a message with his private key, Alice can decrypt it with Bob's public key and be confident the message came from Bob

44
New cards

Hash Cryptography

Method of generating a fixed-length unique value (hash) from input data using a cryptographic hash function

Used for data integrity verification, password storage, and digital signatures by ensuring that even a small change in the input produces a completely different hash

45
New cards

HTTPS

Relies on digital certificates to prove the web server's identity and begin the encryption process.

46
New cards

Transport Layer Security (TLS)

Combines symmetric and asymmetric encryption

Encrypts data transmitted between clients and servers

47
New cards

IPsec Network Encryption

Encrypts data before it leaves the computer. Data remains encrypted across the network and is not decrypted until it enters the destination computer

48
New cards

Server-side encryption (SSE)

A cloud provider or storage service encrypts data at rest on the server before storing it

49
New cards

Disk encryption

The entire drive (or partition) is encrypted during the shutdown process and decrypted during startup. The data is protected while the server is offline. If the drive is stolen, the contents are encrypted

Ex. Bitlocker

50
New cards

File integrity monitoring (FIM)

A type of software that reviews system files to ensure that they have not been tampered with.

51
New cards

Application Programming Interfaces (APIs)

Allow services to get information from each other programmatically for business processes

52
New cards

Use API gateways to:

Authenticate connections.

Control traffic.

Implement rate limiting and request throttling to manage traffic.

Log and monitor tools usage.

53
New cards

Cloud-based container security tasks include the following practices:

Use trusted registries for container images and verify authenticity with digital signatures.

Manage container secrets using tools like Kubernetes Secrets.

Network segmentation to isolate traffic and implement connection rules.

54
New cards

Privileged containers

Are created and run by root (the Linux administrator account). Processes inside the container also run as root.

55
New cards

Unprivileged Container Configuration

Do not run with root privileges. These non-privileged accounts are mapped to non-root accounts on the local host system, further ensuring that escaped processes cannot control the entire host

Better isolated from the host's configuration, better isolated from other containers, and have a reduced attack surface

56
New cards

SHA256 (Secure Hash Algorithm)

More secure than other hash algorithms

57
New cards

MD5 (Message Digest 5S

Should not be used to send confidential information since it easily generates collisions

58
New cards

AES (Advanced Encryption Standard

An encryption algorithm. Advanced Encryption Standard is a symmetric block cipher that encrypts data on a per-block basis

59
New cards

Which of the following statements BEST describes the effectiveness of IPsec in network security compared to application-layer encryption methods like HTTPS?

IPsec is more effective because it encrypts all data at the network layer, regardless of the application

60
New cards

Public Key Infrastructure (PKI)

A framework of certificate authorities, digital certificates, software, services, and other cryptographic components deployed for the purpose of validating subject identities.

61
New cards

If the problem is Credentials have been leaked to unauthorized personnel, consider the following:

Reset passwords

Ensure the use of SSH key-based authentication for all SSH connections

Ensure the use of multifactor authentication (MFA)

Review procedures and credential storage to determine how the leak occurred

Ensure use of the principle of least privilege

62
New cards

Authorization

The ability to access resources after authentication

Problems usually relate to misconfigured permissions, rights, or other access controls. These may include privilege escalation problems and unauthorized access to resources

63
New cards

Privilege Escalation

Allows users (usually administrators) to sign on to a system as a non-privileged (non-administrator) account and then escalate their privileges to admin levels for specific delegated tasks

64
New cards

If the problem is you Cannot access SaaS resources, consider the following:

User subscription access is active for the software

Group access is active for the software

Confirm compatibility between the user’s system and the software

65
New cards

If the problem is you Cannot access PaaS resources, consider the following:

Identity and Access Management (IAM) or other access policies

Maximum user access limit has been reached

Firewall or other filtering configurations

Resource is available and running

66
New cards

If the problem is you Cannot access IaaS resources, consider the following:

IAM or other access policies

Virtualization administrator privileges for access to hypervisor configuration

Instance administrator privileges for access to the virtual machine (VM) instance

67
New cards

Directory services groups

Control access to folders, files, or printer resources.

In Windows, these groups are granted New Technology Filing System (NTFS) permissions to access a resource. In Linux, standard permissions manage access

68
New cards

Security groups are what?

Virtual firewalls.

Misconfigurations can block connectivity to one or more instances

69
New cards

Access control list (ACL) rules

Specify permitted traffic for security group members.

By default, all inbound traffic is denied until the cloud administrator explicitly permits specified connections

70
New cards

Network access controls (NACs)

May check the relative health and security configuration of devices participating in the network.

Troubleshooting these devices involves ensuring the appropriate network nodes are associated with the NAC system and confirming its configuration

71
New cards

If the problem is NAC is not checking all devices, consider the following:

Which devices are being checked or excluded

Which network entry points are checked (VPN, remote access, on-site)

72
New cards

If the problem is Exposure of intellectual property, consider the following:

Data Loss Prevention (DLP) infrastructure covers all data storage

Unencrypted network traffic

Unencrypted stored data

73
New cards

Data Misclassification

Leads to incorrect access controls. If secret information is misclassified as public, automated systems may grant public access, resulting in data exposure

74
New cards

Cipher suites

Are collections of algorithms used for data security. Various suites exist, but weaknesses are regularly discovered. It's essential to use current versions and avoid older solutions

75
New cards

The US National Security Agency (NSA)

Provides security guidelines and requirements for US government agencies.

It recommends using only current cipher suites and confirming the removal of deprecated approaches

76
New cards

What are two common cipher suites used to secure web traffic?

Transport Layer Security (TLS) and Secure Sockets Layer (SSL).

77
New cards

Recommended cipher suites for web communications:

TLS 1.2

TLS 1.3

78
New cards

TLS 1.3

Offers performance and security enhancements, such as faster handshakes and more secure cipher suites

79
New cards

What should be checked if there is no connectivity to one or more VM instances in a cloud deployment?

Ensure the instance has the correct security group assigned.

80
New cards

Which of the following is a potential reason why a Network Access Control (NAC) system is not checking all devices?

The devices are not associated with the NAC system.

This can happen if:

Devices are connected outside of NAC enforcement zones.

They are not registered or authenticated through the NAC solution.

NAC is only applied to certain network segments or device types