3.0 CompTIA Security+ SY0-701 Security Architecture

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/140

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

141 Terms

1
New cards

cloud responsibility matrix

Documentation listing which security and management tasks are the responsibility of the cloud provider and which are the responsibility of the cloud consumer.

IaaS, PaaS, SaaS, etc.

-Who is responsible for security?

Security should be well-documented

-Most cloud providers provide a matrix of responsibilities

-Everyone knows up front

These responsibilities can vary

-Different cloud providers

-Contractual agreements

<p>Documentation listing which security and management tasks are the responsibility of the cloud provider and which are the responsibility of the cloud consumer.</p><p>IaaS, PaaS, SaaS, etc.</p><p>-Who is responsible for security? </p><p>Security should be well-documented</p><p>-Most cloud providers provide a matrix of responsibilities </p><p>-Everyone knows up front</p><p>These responsibilities can vary</p><p>-Different cloud providers</p><p>-Contractual agreements </p>
2
New cards

Hybrid considerations

Hybrid cloud

-More than one public or private cloud

-This adds additional complexity

Network protection mismatches

-Authentication across platforms

-Firewall configurations

-Server settings

Different security monitoring

-Logs are diverse and cloud-specific

Data leakage

-Data is shared across the public Internet

3
New cards

Third-party vendors in the cloud

You, the cloud provider, and third parties

-Infrastructure technologies

-Cloud-based appliances

Ongoing vendor risk assessments

-Part of an overall vendor risk management policy

Include third-party impact for incident response

-Everyone is part of the process

Constant monitoring

-Watch for changes in unusual activity

4
New cards

Infrastructure as code (IaC)

Describe an infrastructure

-Define servers, networks, and applications as code

Modify the infrastructure and create versions

-The same way you version the application code

Use the description (code) to build other application instances

-Build it the same way every time based on the code

An important concept for cloud computing

-Build a perfect version every time

5
New cards

Serverless Architecture (FaaS)

Function as a Service (FaaS)

-Applications are separated into individual, autonomous functions

-Remove the operating system from the equation

Developer still crates the server-side logic

-Runs in a stateless compute container

It may be event-triggered and ephemeral

-May only run for one event

Managed by a third-party

-All OS security concerns are at the third-party

6
New cards

Microservices and APIs

Monolithic applications

-One big application that does everything

The application contains all decision-making processes

-User interface

-Business logic

-Data input and output

Code challenges

-Large codebase

-Change control challenges

7
New cards

Application Programming Interfaces (API)

API is the "glue" for the microservices

-Work together to act as the application

Scalable

-Scale just the microservices you need

Resilient

-Outages are contained

Security and Compliance

-Containment is built-in

8
New cards

Network infrastructure

Physical isolation

-Air-gapped

Logical segmentation

Software-defined networking (SDN)

9
New cards

Physical isolation

Devices are physically separate

-The air gap between Switch A and Switch B

Must be connected to provide communication

-Direct connect, or another switch or router

Web servers in one rack

-Database servers on another

Customer A on one switch, customer B on another

-No opportunity for mixing data

10
New cards

Physical segmentation

Separate devices

-Multiple units, separate infrastructure

<p>Separate devices</p><p>-Multiple units, separate infrastructure</p>
11
New cards

Logical Segmentation with VLANs

Virtual Local Area Networks (VLANs)

-Separated logically instead of physically

-Cannot communicate between VLANs without a layer three device/ routers

12
New cards

Software Defined Networking (SDN)

Networking devices have different functional planes of operation

-Data, control, and management planes

Split the functions into separate logical units.

-Extend the functionality and management of a single device

-Perfectly built for the cloud

Infrastructure layer/ Data plane

-Process the network frames and packets

-Forwarding, trunking, encrypting, NAT

Control layer/ control plane

-Manages the actions of the data plane

-Routing tables, session tables, NAT tables

-Dynamic routing protocol updates

Application layer/ Management plane

-Configure and manage the device

-SSH, browser, API

<p>Networking devices have different functional planes of operation</p><p>-Data, control, and management planes</p><p>Split the functions into separate logical units.</p><p>-Extend the functionality and management of a single device</p><p>-Perfectly built for the cloud </p><p>Infrastructure layer/ Data plane</p><p>-Process the network frames and packets</p><p>-Forwarding, trunking, encrypting, NAT</p><p>Control layer/ control plane</p><p>-Manages the actions of the data plane</p><p>-Routing tables, session tables, NAT tables</p><p>-Dynamic routing protocol updates </p><p>Application layer/ Management plane </p><p>-Configure and manage the device</p><p>-SSH, browser, API</p>
13
New cards

SDN data flows

knowt flashcard image
14
New cards

SDN Security

Due to SDN's plane separation, security must be implemented for each interface. After designing the SDN architecture, security methods should be considered. The chosen security solution must be secure, scalable, and efficient

15
New cards

On-premises security

Customize your security posture

-Full control when everything is in-house

On-site IT team can manage security better

-The local team can ensure everything is secure

-A local team can be expensive and difficult to staff

The local team maintains uptime and availability

-System checks can occur at any time

-No phone call for support

Security changes can take time

-New equipment, configurations, and additional costs

16
New cards

Centralized vs. Decentralized

Authority can either be focused at the top levels, or it can be delegated to lower-level staff

Most organizations are physically decentralized

-Many locations, cloud providers, operating systems, etc.

It is challenging to manage and protect so many diverse systems

-Centralize the security management

A centralized approach

-Correlated alerts

-Consolidated log file analysis

-Comprehensive system status and maintenance/ patching

It is not perfect

-Single point of failure, potential performance issues

17
New cards

Application containerization

Container

-Contains everything you need to run an application

-Code and dependencies

-A standardized unit of software

An isolated process in a sandbox

-Self-Contained

-Apps can not interact with each other

Container image

-A standard for portability

-Lightweight, uses the host kernel

-Secure separation between applications

18
New cards

Virtualization

Virtualization

-Run many different operating systems on the same hardware

Each application instance has its operating system

-Adds overhead and complexity

-Virtualization is relatively expensive

<p>Virtualization</p><p>-Run many different operating systems on the same hardware</p><p>Each application instance has its operating system </p><p>-Adds overhead and complexity</p><p>-Virtualization is relatively expensive </p>
19
New cards

Internet of Things (IoT)

The idea is that objects are becoming connected to the Internet so they can interact with other devices, applications, or services.

Sensors

-Heating and cooling, lighting

Smart devices

-Home automation, video doorbells

Wearable technology

-Watches, health monitors

Facility automation

-Temperature, air quality, lighting

Weak defaults

-IoT manufacturers are not security professionals

20
New cards

SCADA/ICS

Supervisory Control and Data Acquisition System

-Large-scale, multi-site Industrial Control Systems (ICS)

PC manages equipment

-Power generation, refining, manufacturing equipment

-Facilities, industrial, energy, logistics

Distributed control systems

-Real-time information

-System control

Requires extensive segmentation

-No access from the outside

<p>Supervisory Control and Data Acquisition System</p><p>-Large-scale, multi-site Industrial Control Systems (ICS)</p><p>PC manages equipment</p><p>-Power generation, refining, manufacturing equipment</p><p>-Facilities, industrial, energy, logistics</p><p>Distributed control systems</p><p>-Real-time information</p><p>-System control</p><p>Requires extensive segmentation</p><p>-No access from the outside </p>
21
New cards

Industrial Control Systems (ICS)

Used to control industrial processes such as manufacturing, product handling, production, and distribution.

22
New cards

Supervisory Control and Data Acquisition (SCADA)

A network that includes software, servers, and communication channels. SCADA is responsible for acquiring real-time data from a physical system and managing the physical system or presenting the data to humans, who monitor and manage the system.

23
New cards

Real-Time Operating System (RTOS)

An operating system with a deterministic processing schedule

-No time to wait for other processes

-Industrial equipment, automobiles

-Military environments

Extremely sensitive to security issues

-Non-trivial systems

-Need to always be available

-Difficult to know what type of security is in place

24
New cards

Embedded systems

Hardware and software designed for a specific function

-Operate as part of a larger system

It is built with only this task in mind

-Can be optimized for size and/or cost

Common examples

-Traffic light controllers

-Digital watches

-Medical imaging systems

25
New cards

High availability

Redundancy does not always mean available

-May need to be powered on manually

HA (high availability)

-Always on, always available

May include different components working together

-Active/Active can provide scalability advantages

Higher availability almost always means higher costs

-There's always another contingency you could add

-Upgraded power, high-quality server components, etc.

26
New cards

Availability

System uptime

-Access data, complete transactions

-A foundation of IT security

A balancing act with security

-Available, but only to the right people

We spend a lot of time and money on availability

-Monitoring, redundant systems

An important metric

-We are often evaluated on total available time

27
New cards

Resilience

Eventually, something will happen

-Can you maintain availability

Can you recover? How quickly?

Based on many different variables

-The root cause

-Replacement hardware installation

-Software patch availability

-Redundant systems

Commonly referenced as MTTR

-Mean Time to Repair

28
New cards

Cost

How much money is required?

-Everything ultimately comes down to cost

Initial installation

-Very different across platforms

Ongoing maintenance

-Annual ongoing cost

Replacement or repair costs

-You might need more than one

Tax implications

-Operating or capital expense

29
New cards

Responsiveness

Request information

-Get a response

-How quickly did that happen?

Especially important for interactive applications

-Humans are sensitive to delays

Speed is an important metric

-All parts of the application contribute

-There is always a weakest link

30
New cards

Scalability

How quickly and easily can we increase or decrease capacity?

-This might happen many times a day

-Elasticity

There is always a resource challenge

-What is preventing scalability?

Needs to include security monitoring

-Increases and decreases as the system scales

31
New cards

Ease of deployment

An application has many moving parts

-Web server, database, caching server, firewall, etc

This might be an involved process

-Hardware resources, cloud budgets, change control

This might be very simple

-Orchestration/ automation

It is crucial to consider during the product engineering phase

-One missed detail can cause deployment issues

32
New cards

Risk transference

Many methods to minimize risk

-Transfer the risk to a third-party

Cybersecurity insurance

-Attacks and downtime can be covered

-Popular with the rise in ransomware

Recover internal losses

-Outages and business downtime

Protect against legal issues from customers

-Limit the costs associated with legal proceedings

33
New cards

Easy of recovery

Something will eventually go wrong

-Time is money

-How easily can you recover?

Malware infection

-Reload operating system from original media - 1 hour

-Reload from corporate image - 10 minutes

34
New cards

Patch availability

Software is not usually static

-Bug fixes, security updates, etc.

This is often the first task after installation

-Make sure you are running the latest version

Most companies have regular updates

-Microsoft's monthly patch schedule

Some companies rarely patch

-This might be a significant concern

35
New cards

Inability to patch

What if patching was not an option?

-This happens more often than you might think

Embedded systems

-HVAC controls

-Time clocks

Not designed for end-user updates

-This is a bit short-sighted

-Especially these days

May need additional security controls

-A firewall for your time clock

36
New cards

power

A foundational element

-This can require extensive engineering

Overall power requirements

-Data center vs. office building

Primary power

-One or more providers

Backup services

-UPS (Uninterruptible Power Supply)

-Generators

37
New cards

Compute

An application's heavy-lifting

-More than just a single CPU

The compute engine

-More options available in the cloud

It may be limited to a single processor

-Easier to develop

Use multiple CPUs across multiple clouds

-Additional complexity

-Enhanced scalability

38
New cards

Device Placement

Every network is different

-There are often similarities

Firewalls

-Separate trusted from untrusted

=Provide additional security checks

Other services may require their security technologies

-Honeypots, jump server, load balancers, sensors

39
New cards

Security zones

Zone-based security technologies

-More flexible (and secure) than IP address ranges

Each area of the network is associated with a zone

-Trusted, untrusted

-Internal, external

-Inside, Internet, Servers, Databases, Screened

This simplifies security policies

-Trusted to Untrusted

-Untrusted to Screened

-Untrusted to Trusted

<p>Zone-based security technologies</p><p>-More flexible (and secure) than IP address ranges</p><p>Each area of the network is associated with a zone</p><p>-Trusted, untrusted</p><p>-Internal, external</p><p>-Inside, Internet, Servers, Databases, Screened</p><p>This simplifies security policies</p><p>-Trusted to Untrusted</p><p>-Untrusted to Screened</p><p>-Untrusted to Trusted</p>
40
New cards

Attack surface

How many ways into your home?

-Doors, windows, basements

Everything can be a vulnerability

-Application code

-Open ports

-Authentication process

-Human error

Minimize the surface

-Audit the code

-Block ports on the firewall

-Monitor network traffic in real-time

41
New cards

Connectivity

Everything contributes to security

-Including the network connection

Secure network cabling

-Protect the physical drops

Application-level encryption

-The hard work has already been done

Network-level encryption

-IPsec tunnels, VPN connections

42
New cards

Failure Modes

We hope for 100% uptime

-This is not realistic

-Eventually, something will break

Fail-open

When a system fails, data continues to flow

Fail-closed

-When a system fails, data does not flow

43
New cards

Device connections

Active monitoring

-System is connected inline

-Data can be blocked in real-time as it passes by

-Intrusion prevention is commonly active

Passive monitoring

-A copy of the network traffic is examined using a tap or port monitor

-Data cannot be blocked in real-time

-Intrusion detection is commonly passive

44
New cards

Active monitoring

IDS/IPS sits physically inline

-All traffic passes through the IDS/IPS

Malicious traffic is immediately identified

-Dropped at the IPS

-Does not proceed through the network

Internet -> Firewall -> IPS -> Core Switch

45
New cards

Passive monitoring

Examine a copy of the traffic

-Port mirror (SPAN), network tap

No way to block (prevent) traffic

-Common with Intrusion Detection Systems

IPS -> Switch -> Server, Clients

46
New cards

Jump server

Access secure network zones

-Provides an access mechanism to a protected network

Highly-secured device

-Hardened and monitored

SSH/Tunnel/ VPN to the jump server

- RDP, SSH or jump from there

A significant security concern

-Compromise of the jump server is a significant breach

<p>Access secure network zones </p><p>-Provides an access mechanism to a protected network</p><p>Highly-secured device</p><p>-Hardened and monitored</p><p>SSH/Tunnel/ VPN to the jump server</p><p>- RDP, SSH or jump from there</p><p>A significant security concern</p><p>-Compromise of the jump server is a significant breach</p>
47
New cards

Proxies

Sits between the users and the external network

Receives the user request and sends the request on their behalf (the proxy)

Useful for caching information, access control, URL filtering, content scanning

Applications may need to know how to use the proxy (explicit)

Some proxies are invisible (transparent)

<p>Sits between the users and the external network </p><p>Receives the user request and sends the request on their behalf (the proxy)</p><p>Useful for caching information, access control, URL filtering, content scanning</p><p>Applications may need to know how to use the proxy (explicit)</p><p>Some proxies are invisible (transparent)</p>
48
New cards

Application proxies

One of the simplest "proxies" is NAT

-A network-level proxy

Most proxies in use are application proxies

-The proxy understands the way the application works

A proxy may only know one application

-HTTP

49
New cards

Forward proxy

An "internal proxy."

-Commonly used to protect and control user access to the internet

<p>An "internal proxy."</p><p>-Commonly used to protect and control user access to the internet </p>
50
New cards

Reverse proxy

Inbound traffic from the internet to your internal service

<p>Inbound traffic from the internet to your internal service</p>
51
New cards

Open proxy

A third-party, uncontrolled proxy

-Can be a significant security concern

-Often used to circumvent existing security controls

<p>A third-party, uncontrolled proxy</p><p>-Can be a significant security concern </p><p>-Often used to circumvent existing security controls</p>
52
New cards

Intrusion Prevention System (IPS)

Intrusion Prevention System

-Watch network traffic

Intrusions

-Exploits against operating systems, applications, etc.

-Buffer overflows, cross-site scripting, and other vulnerabilities

Detection vs Prevention

-Intrusion Detection System (IDS - Alarm or alert

-Prevention - Stop it before it gets into the network

53
New cards

Balancing the load

Distribute the load

-Multiple servers

-Invisible to the end-user

Large-scale implementations

-Web server farms, database farms

Fault tolerance

-Server outages have no effect

-Very fast convergence

<p>Distribute the load</p><p>-Multiple servers</p><p>-Invisible to the end-user</p><p>Large-scale implementations</p><p>-Web server farms, database farms</p><p>Fault tolerance</p><p>-Server outages have no effect</p><p>-Very fast convergence </p>
54
New cards

Active/active load balancing

Configurable load

-Manage across servers

TCP offload

-Protocol overhead

SSL offload

-Encryption/Decryption

Caching

-Fast response

Prioritization

-QoS

Content Switching

-Application-centric balancing

<p>Configurable load</p><p>-Manage across servers</p><p>TCP offload</p><p>-Protocol overhead</p><p>SSL offload</p><p>-Encryption/Decryption</p><p>Caching</p><p>-Fast response</p><p>Prioritization</p><p>-QoS</p><p>Content Switching </p><p>-Application-centric balancing</p>
55
New cards

Active/passive load balancing

Some servers are active

-Others are on standby

If an active server fails, the passive server takes it place

<p>Some servers are active</p><p>-Others are on standby</p><p>If an active server fails, the passive server takes it place</p>
56
New cards

Sensors and collectors

Aggregate information from network devices

-Built-in sensors, separate devices

-Integrated into switches, routers, servers, firewalls, etc.

Sensors

-Intrusion prevention systems, firewall logs, authentication logs, web server access logs, database transaction logs, email logs

Collectors

-Proprietary consoles (IPS, firewall), SIEM consoles, Syslog servers

-Many SIEMs include a correlation engine to compare diverse sensor data

<p>Aggregate information from network devices</p><p>-Built-in sensors, separate devices</p><p>-Integrated into switches, routers, servers, firewalls, etc.</p><p>Sensors</p><p>-Intrusion prevention systems, firewall logs, authentication logs, web server access logs, database transaction logs, email logs</p><p>Collectors</p><p>-Proprietary consoles (IPS, firewall), SIEM consoles, Syslog servers</p><p>-Many SIEMs include a correlation engine to compare diverse sensor data</p>
57
New cards

Port security

We have created many authentication methods through the years

-A network administrator has many choices

Use a username and password

-Other factors can be included

Commonly used on wireless networks

-Also works on wired networks

58
New cards

Extensible Authentication Protocol (EAP)

A framework for transporting authentication protocols that define the format of the messages.

There are many different ways to authenticate based on RFC standards

-Manufacturers can build their own EAP methods

EAP integrates with 802.1x

-Prevents access to the network until the authentication succeeds

<p>A framework for transporting authentication protocols that define the format of the messages.</p><p>There are many different ways to authenticate based on RFC standards</p><p>-Manufacturers can build their own EAP methods</p><p>EAP integrates with 802.1x</p><p>-Prevents access to the network until the authentication succeeds </p>
59
New cards

IEEE

Institute of Electrical and Electronic Engineers. International organization focusing on electrical, electronics, and information technology topics. IEEE standards are well respected and followed by vendors around the world.

60
New cards

IEEE 802.1x Authentication

IEEE 802.1x

-Port-based Network Access Control (NAC)

-You do not get access to the network until you authenticate

EAP integrates with 802.1x

-Extensible Authentication Protocol

-802.1x prevents access to the network until the authentication succeeds

Used in conjunction with an authentication database

-RADIUS, LDAP, TACAC+, KERBEROS, etc.

61
New cards

IEEE 802.1X and EAP

Supplicant - the client

Authenticator - The device that provides access

Authentication server - Validates the client's credentials

<p>Supplicant - the client</p><p>Authenticator - The device that provides access</p><p>Authentication server - Validates the client's credentials</p>
62
New cards

Web application firewall (WAF)

Not like a "normal" firewall

-Applies rules to HTTP/HTTPS conversations

Allow or deny based on expected input

-Unexpected input is a common method of exploiting an application

SQL injection

-Add your own commands to an application's SQL query

A major focus of the Payment Card Industry Data Security Standard (PCI DSS)

<p>Not like a "normal" firewall</p><p>-Applies rules to HTTP/HTTPS conversations</p><p>Allow or deny based on expected input</p><p>-Unexpected input is a common method of exploiting an application</p><p>SQL injection</p><p>-Add your own commands to an application's SQL query </p><p>A major focus of the Payment Card Industry Data Security Standard (PCI DSS)</p>
63
New cards

The universal security control

Standard issue

-Home, office, and in your operating system

Control the flow of network traffic

-Everything passes through the firewall

Corporate control of outbound and inbound data

-Sensitive materials

Control of inappropriate content

-Not safe for work, parental controls

Protection against evil

-Anti-virus, anti-malware

64
New cards

Network-based firewalls

Filter traffic by port number or application

-OSI layer 4 vs. OSI layer 7

-Traditional vs NGFW firewalls

Encrypt traffic

-VPN between sites

Most firewalls can be layer 3 devices (routers)

-Often sits on the ingress/egress of the network

-Network Address Translation (NAT) functionality

-Authenticate dynamic routing communication

<p>Filter traffic by port number or application</p><p>-OSI layer 4 vs. OSI layer 7</p><p>-Traditional vs NGFW firewalls</p><p>Encrypt traffic</p><p>-VPN between sites</p><p>Most firewalls can be layer 3 devices (routers)</p><p>-Often sits on the ingress/egress of the network</p><p>-Network Address Translation (NAT) functionality</p><p>-Authenticate dynamic routing communication</p>
65
New cards

UTM/ All-in-one security appliance

Unified Threat Management (UTM)/ Web security gateway

URL filter/ Content inspection

Malware inspection

Spam filter

CSU/DSU

Router, Switch

Firewall

IDS/IPS

Bandwidth Shaper

VPN endpoint

66
New cards

Next-generation firewall (NGFW)

The OSI Application Layer

-All data in every packet

Can be called different names

-Application layer gateway

-Stateful multilayer inspection

-Deep packet inspection

Requires some advanced decodes

-Every packet must be analyzed and categorized before a security decision is determined.

Layer 4/ layer 7

67
New cards

NGFWs

Network-based Firewalls

-Control traffic flows based on the application

-Microsoft SQL, Server, Twitter, YouTube

Intrusion Prevention Systems

-Identify the application-specific

-Apply application-specific vulnerability signatures to the traffic

Content filtering

-URL filters

-Control website traffic by category

68
New cards

Virtual Private Network (VPN)

A private data network that creates secure connections, or "tunnels," over regular Internet lines

Encrypted (private) data traversing a public network

Concentrator

-Encryption/decryption access device

-Often integrated into a firewall

Many deployment options

-Specialized cryptographic hardware

-Software-based options available

Used with client software

-Sometimes built into the OS

69
New cards

Remote Access VPN

A user-to-LAN virtual private network connection used by remote users.

70
New cards

Encrypted Tunnel

The result is placing each packet in an encrypted form within another packet before sending it to add a layer of security that protects each packet on its journey over the Internet. The outer packet protects the contents from public view and ensures that the packet moves within a virtual tunnel.

Keep data private across the public internet

-Encryption is the key

Encrypt your data

-Add new headers and trailers

Decrypt on the other side

-Original data is delivered

<p>The result is placing each packet in an encrypted form within another packet before sending it to add a layer of security that protects each packet on its journey over the Internet. The outer packet protects the contents from public view and ensures that the packet moves within a virtual tunnel.</p><p>Keep data private across the public internet</p><p>-Encryption is the key</p><p>Encrypt your data</p><p>-Add new headers and trailers </p><p>Decrypt on the other side </p><p>-Original data is delivered </p>
71
New cards

SSL/TLS VPN (Secure Socket Layer VPN)

Uses common SSL/TLS protocol (TCP/443)

-(Almost) No firewall issues

No big VPN clients

-Usually, remote access communication

Authenticate users

-No requirement for digital certificates or shared passwords (like IPSec)

It can be run from a browser or from a (usually light) VPN client

-Across many operating systems

72
New cards

SSL/TLS VPN

VPN setup through a web browser or portal that uses SSL/TLS to secure traffic. Gives users access to the target network.

On-demand access from a remote device

-Software connects to a VPN concentrator

Some software can be configured as always-on

<p>VPN setup through a web browser or portal that uses SSL/TLS to secure traffic. Gives users access to the target network.</p><p>On-demand access from a remote device</p><p>-Software connects to a VPN concentrator </p><p>Some software can be configured as always-on </p>
73
New cards

IPSec (Internet Protocol Security)

A set of open, non-proprietary standards that you can use to secure data as it travels across the network or the Internet through data authentication and encryption.

74
New cards

Site-to-site IPsec VPN

Always-on

Firewalls often act as VPN concentrators

-Probably already have firewalls in place

<p>Always-on</p><p>Firewalls often act as VPN concentrators</p><p>-Probably already have firewalls in place</p>
75
New cards

SD-WAN - software-defined wide area network

Software Defined Networking in a Wide Area Network

- A WAN built for the cloud

The data center used to be in one place

-The cloud has changed everything

Cloud-based applications communicate directly to the cloud

-No need to hop through a central point

<p>Software Defined Networking in a Wide Area Network</p><p>- A WAN built for the cloud</p><p>The data center used to be in one place</p><p>-The cloud has changed everything</p><p>Cloud-based applications communicate directly to the cloud</p><p>-No need to hop through a central point </p>
76
New cards

Selection of effective controls

Many different security options

-Selecting the right choice can be challenging

VPN

-SSL/TLS VPN for user access

-IPsec tunnels for site-to-site access

SD-WAN

-Manage the network connectivity to the cloud

-Does not adequately address security concerns

SASE

-A complete network and security solution

-Requires planning implementation

77
New cards

Secure Access Service Edge (SASE)

Update secure access for cloud services

-Securely connect from different locations

A "next generation" VPN

Security technologies are in the cloud

-Located close to existing cloud services

SASE clients on all devices

-Streamlined and automatic

<p>Update secure access for cloud services</p><p>-Securely connect from different locations</p><p>A "next generation" VPN</p><p>Security technologies are in the cloud</p><p>-Located close to existing cloud services </p><p>SASE clients on all devices</p><p>-Streamlined and automatic </p>
78
New cards

Data types

Regulated

Trade Secret

Intellectual property

Legal information

Financial information

Human and non human readable

79
New cards

Regulated

Managed by a third-party

Government laws and statutes

80
New cards

Trade secret

An organization's secret formulas

Often unique to an organization

81
New cards

Intellectual property

It may be publicly visible

Copyright and trademark restrictions

82
New cards

Legal information

Court records and documents, judge and attorney information, etc.

PII and other sensitive details

Usually stored in many different systems

83
New cards

Financial information

Internal company financial details

Customer financials

Payment records

Credit card data, bank records, etc.

84
New cards

Human-readable

Humans can understand the data

Very clear and obvious

85
New cards

Non-human readable

Not easily understood by humans

Encoded data

Barcodes

Images

86
New cards

Hybrid formats

CSV, HXM, JSON, etc.

87
New cards

Classifying sensitive data

Not all data has the same level of categorization

-License tag numbers vs. health records

Different levels require different security and handling

-Additional permissions

-A different process to view

-Restricted network access

88
New cards

Data Classifications

Proprietary

-Data that is the property of an organization

-May also include trade secrets

-Often data unique to an organization

PII - Personally Identifiable Information

-Data that can be used to identify an individual

-Name, date of birth, mother's maiden name, biometric information

PHI- Protected health information

-Health information associated with an individual

-Health status, health care records, payments for health care, and much more.

Types

Sensitive

Confidential

Public

Restricted

Private

Critical

89
New cards

Sensitive data

Intellectual property, PII, PHI

90
New cards

Confidential Data

Very sensitive, must be approved to view

91
New cards

Public/ Unclassified

No restrictions on viewing the data

92
New cards

Private/Classified/Restricted Data

Restricted access, may require an NDA

93
New cards

Critical Data

Data should always be available

94
New cards

States of Data

Data at rest

Data in transit

Data in Use

95
New cards

Data at Rest

The data is on a storage device

-Hard drive, SSD, flash drive, etc.

Encrypt the data

-Whole disk encryption

-Database encryption

-File or folder-level encryption

Apply for permissions

-Access control lists

-Only authorized users can access the data

96
New cards

Data in transit

Data transmitted over the network

-Also called data-in-motion

Not much protection as it travels

-Many different switches, routers, devices

Network-based protection

-Firewall, IPS

Provide transport encryption

-TLS (Transport Layer Security)

IPsec(Internet Protocol Security)

97
New cards

Data in use

Data is actively processed in memory

-System RAM, CPU registers and cache

The data is almost always decrypted

-Otherwise, you could not do anything with it

The attackers can pick the decrypted information out of RAM

-A very attractive option

98
New cards

Data sovereignty

Data Sovereignty

-Data that resides in a country is subject to the laws of that country

-Legal monitoring, court orders, etc.

Laws may prohibit where data is stored

-GDPR (General Data Protection Regulation)

-Data collected on EU citizens must be stored in the EU

-A complex mesh of technology and legalities

Where is your data stored

-Your compliance laws may prohibit moving data out of the country

99
New cards

Geolocation

Location details

-Tracks within a localized area

There are many ways to determine a location

-802.11, mobile providers, GPS

Can be used to manage data access

-Prevent access from other countries

Limit administrative tasks unless a secure area is used

-Permit enhanced access when inside the building

100
New cards

Geographic restrictions

Network location

-Identify based on IP subnet

-Can be difficult with mobile devices

Geolocation - Determine a user's location

-GPS - mobile devices, very accurate

-802.11 wireless, less accurate

-IP address, not very accurate

Geofencing

-Automatically allow of restricting access when the user is in a particular location

-Do not allow this app to run unless you are near the office