Information Technology /CompTIA Security+ (SY0-601): Weak Points #3

CompTIA Security+ (SY0-601): Weak Points #3

Information Technology36 CardsCreated about 2 months ago

This section compares various access control methods including Rule-Based Access Control, which uses ACLs and labels; Attribute-Based Access Control (ABAC), which considers context like user attributes and environment; and Mandatory Access Control (MAC), where access policies are centrally enforced using sensitivity labels and clearance levels.

Rule-Based Access Control

An access control model in which access to resources is granted or denied depending on the contents of Access Control List (ACL) entries

Label-based access control that defines whether access should be granted or denied to objects by comparing the object label and the subject label

Tap or swipe ↕ to flip
Swipe ←→Navigate
SSpeak
FFocus
1/36

Key Terms

Term
Definition

Rule-Based Access Control

An access control model in which access to resources is granted or denied depending on the contents of Access Control List (ACL) entries

ABAC Access Policy Properties

Subject (user or process requesting access)
Type of action (for example “read”, “write”, “execute”)
Resource type (medical record, bank accou...

MAC Characteristics

Users are not allowed to change access policies at their own discretion

Labels and clearance levels can only be appl...

PAM

Privileged Access Management:

A security solution that provides control over elevated (i.e....

DER Characteristics

Encoded in binary format

.der and .cer file extension

Generally used for Java servers...

PEM Characteristics

Encoded in text (ASCII Base64) format

.pem .crt .cer .key file extensions

Generally u...

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition

Rule-Based Access Control

An access control model in which access to resources is granted or denied depending on the contents of Access Control List (ACL) entries

Label-based access control that defines whether access should be granted or denied to objects by comparing the object label and the subject label

ABAC Access Policy Properties

Subject (user or process requesting access)
Type of action (for example “read”, “write”, “execute”)
Resource type (medical record, bank account etc.)
Environment (contextual data, such as time of day or geolocation)

MAC Characteristics

Users are not allowed to change access policies at their own discretion

Labels and clearance levels can only be applied and changed by an administrator

Every resource has a sensitivity label matching a clearance level assigned to a user

PAM

Privileged Access Management:

A security solution that provides control over elevated (i.e. administrative type) accounts

DER Characteristics

Encoded in binary format

.der and .cer file extension

Generally used for Java servers

PEM Characteristics

Encoded in text (ASCII Base64) format

.pem .crt .cer .key file extensions

Generally used for Apache servers or similar configurations

PFX & P12 Characteristics

Encoded in binary format

.pfx .p12 file extensions

Generally used for Windows servers

P7B Characteristics

Encoded in text (ASCII Base64 format)

.p7b file extension

Generally used for Windows & Java Tomcat servers

IPFIX

An IETF specification that defines how IP flow information is to be formatted and transferred from an exporter to a collector

Order of Volatility

Cache memory -> RAM -> Swap/Pagefile -> Temporary files -> Disk files -> Archival media

Operational Control Examples


Data backups
Configuration management
Awareness programs

Preventative Control Examples

Security Guards
System hardening
Separation of duties

Detective Control Examples

Log monitoring
Security audits
CCTV
IDS

Corrective Control Examples

IPS
Backups & system recovery
Alternate site
Fire suppression system

Compensating Control Examples

Backup power system
Sandboxing
Temporary port blocking
Temporary service disablement

CIS (Simplified)

Center for Internet Security:

Configuration guidelines for hardening

ISO/IEC 27001

Basic procedure for cybersecurity (international standard) - focused on establishing/maintaining info systems


ISO/IEC 27002

International standard focused on information security controls
(to protect those systems)


ISO/IEC 27701

Adding privacy to ISMS (privacy extension for ISO 27001)

Focuses on privacy data management


ISO/IEC 31000

Attempt to create global risk management framework

A family of standards providing principles & guidelines for risk management


SOC 2 Audits (SSAE 18)

System & Organization Controls:
Provides detailed information and assurance about a service organization’s security, availability, processing integrity, confidentiality and/or privacy controls, based on their compliance with the AICPA’s TSC (Trust Services Criteria)

SOC 2 Audit Type I

Provides a snapshot of the organization’s control landscape in a specific point in time


SOC 2 Audit Type II

Evaluates the effectiveness of controls over a period of time of at least six consecutive calendar months


CSA

Cloud Security Alliance:

A nonprofit organization promoting best security practices related to cloud computing environments

CSA: CCM

Cloud Security Alliance: Cloud Control Matrix

Designed to provide fundamental security principles to guide cloud vendors and to assist prospective cloud customers in assessing the overall security risk of a cloud provider

Cloud-specific security controls
Controls are mapped to standards/best practices/regulations

CSA: Reference Architecture

Gives us the outline of what we want & build roadmap to meet needs

NIST RMF

Risk Management Framework:
Integrates security/risk management into the system development life cycle

Prepare, Categorize, Select, Implement, Assess, Authorize, Monitor

NIST CSF

Cybersecurity Framework:
Standards/best practices to help manage cybersecurity risks

Identify, protect, detect, respond, recover

USB OTG

USB On-the-Go:
Allows USB devices (phones/tablets/etc) to act as a host, allowing other USB devices (flash drives/cameras/mouse/keyboard) to be attached to them.

One is host, one is peripheral

CCMP (Counter-mode/CBC-MAC Protocol)

Employs 128-bit keys and a 48-bit initialization vector that minimizes vulnerability to replay attacks

The Counter Mode component provides data privacy

The Cipher Block Chaining Message Authentication Code component provides data integrity and authentication

NAT Gateway

Allows systems to connect to another network without being directly exposed to it

Opal (FDE/SED)

A set of specifications for features of data storage devices that enhance their security

Defines a way of encrypting the stored data so that an unauthorized person who gains possession of the device cannot see the data

EDR

Endpoint Detection & Response:

Monitor and collect activity data from endpoints that could indicate a threat

Analyze this data to identify threat patterns

Automatically respond to identified threats to remove or contain them, and notify security personnel

Forensics and analysis tools to research identified threats and search for suspicious activities

FISMA

Federal Information Security Management Act:
A US federal law that defines a comprehensive framework to protect government information, operations, and assets against natural or human-made threats.

Requires that government agencies and other organizations that operate systems on behalf of government agencies comply with security standards.

PtH (Pass the Hash)

The process of harvesting an account's cached credentials when the user logs into a SSO system.
(The cached credentials are in hash form)

Heuristic vs. Behavioral Detection

Behavioral Detection (AKA: Statistical or Profile-based):
The engine is trained to recognize baseline traffic or expected events associated with a user account or network device. Anything that deviates from this baseline (outside a defined level of tolerance) generates an alert

Heuristic Detection:
Determines whether several observed data points constitute an indicator and whether related indicators make up an incident depending on a good understanding of the relationship between the observed indicators