2.1 Security Concepts in Enterprise Environment
Configuration Management
Keeping up with all the changes happening in your configuration settings within your system. - document all updates, identify and document
Diagrams - network diagrams (documents the physical wire and devices) (physical/logical diagrams) - device diagrams
Baseline configurations - firewall settings, patch levels, OS file versions - drawing a baseline to compare it with the future changes of the systems
Protecting Data
Data sovereignty = data that resides in a country is subject to the laws of that country, legal monitoring | court orders | GDPR (data collected on EU citizens must be stored in EU)
Data obfuscating = making the data difficult to read | protects PII (personally identifiable information) other sensitive data - substituting, shuffling, masking, encrypting
Data encryption = encode information into unreadable data
Data at-rest = the data that resides in a storage device like hard drive, SSD, or flash drive - encrypt the data, whole disk encryption, file or folder-level encryption
Data in-transit = data going between devices over the network - protect data with network-based IDS/IPS - provide transport layer encryption like TLS, IPsec
Data in-use = data is actively processing in memory, system RAM, CPU registers and cache - data is always decrpyted because it needs very quick access
Tokenization = replace sensitive data with a non-sensitive placeholder. this is commonly being used in credit card numbers
Information Rights Management (IRM) = control how data is used in documents which restricts data access to unauthorized persons - prevents copy and paste | control screenshots | manage printing | restricts editing
Data Loss Prevention
Set of policies, procedures, and technologies designed to prevent sensitive data from being accessed, shared, or transmitted improperly or without authorization.
The goal of DLP is to protect sensitive and confidential information, such as intellectual property, financial data, personally identifiable information (PII), and trade secrets, from unauthorized disclosure or loss - can identify and block the transmission of sensitive data across the network
Managing Security
Geographical consideration - legal implications between different countries - offsite backup, which party has access to the data
Manage the response and recovery controls - documentation and identification | limit the impact of an attacker, limit data exfiltration, limit access to sensitive data
With SSL/TLS inspection, we put ourselves in the middle of the conversation and use specialized tools to understand the encrypted communicated between two endpoints. - your browser doesn't trust a website unless a CA (certificate authority) has signed the web server's encryption certificate
Site Resiliency
The ability to maintain critical business functions and IT operations in the face of disruptions, disasters, or unexpected events that impacts its primary business site or data center.
Hot Site (backup site) = a copy of a data center with all of your hardware and software running concurrently with your primary site - duplicates everything in the infrastructure, applications and software are constantly updated - set up and ready to go -- one can arrive and continue to work immediately
Cold Site = opposite of hot side, room with no equipment in it - you need to set up the equipment first, make all connections, load the software - not used to mission-critial data
Honeypots and Deception
Detects and defends against cyber threats by luring attacker into controlled environments or misdirecting them away from critical systems
Honeypot purpose: Honeypots are decoy systems or assets intentionally deployed within an organization's network to attract and trap attackers. The primary purpose of honeypots is to gather information about attackers' tactics, techniques, and motivations.
Deception purpose: Deception technologies are a broader category of security solutions that include not only decoy assets (like honeypots) but also tactics such as misinformation, misdirection, and fake credentials. Their primary purpose is to confuse, mislead, or redirect attackers away from valuable assets.
DNS sinkhole = security mechanism that redirects malicious traffic away from its intended targets to a controlled environment (the sinkhole server), where it can be analyzed or discarded
Last updated
Was this helpful?