Study sets, textbooks, questions
Upgrade to remove ads
3.1 Explain use cases and purpose for frameworks, best practices and secure configuration guides
Terms in this set (16)
Industry-standard frameworks and reference architectures: Regulatory
Regulatory frameworks are based on relevant laws and regulations.
Industry-standard frameworks and reference architectures: Non-regulatory
Non-regulatory framework is not required by any law. Instead, it typically identifies common standards and best practices that organizations can follow
Industry-standard frameworks and reference architectures: National vs. international
Some frameworks are used within a single country while others are used internationally
Industry-standard frameworks and reference architectures: Industry-specific frameworks
Some frameworks only apply to certain industries
Benchmarks/secure configuration guides
Benchmarks and secure configuration guides offer guidance for setting up and operating computer systems to a secure level that is understood and documented. The standard for a benchmark is a consensus-based set of knowledge designed to deliver a reasonable set of security across as wide a base as possible.
Benchmarks/secure configuration guides: Platform/vendor-specific guides:
Setting up secure services is important to enterprises, and some of the best guidance comes from the manufacturer form of Platform/vendor-specific guides. these include installation and configuration guidance, and in some cases operational guidance as well.
Benchmarks/secure configuration guides: Platform/vendor-specific guides: Web server
Many different web server are used in enterprises, but the market leaders are Microsoft, Apache, and nginx. By definition, web server offer a connection between users and webpages, and as such they are prone to attacks setting up any external facing application properly is key to prevent unnecessary risk fortunately for these, several authoritative and proscriptive sources of information are available to help administrators properly secure the application.
Benchmarks/secure configuration guides: Platform/vendor-specific guides: Operating system
The operating system is the interface for the applications that we use to perform tasks and the actual physical computer hardware. As such, this is a key component for the secure operation of a system. Comprehensive, pro-scripted configuration guides for all major ones are available from their respective manufacturers, from the Center for Internet security, and from the DoD DISA STIGs program.
Benchmarks/secure configuration guides: Platform/vendor-specific guides: Application server
Application servers are the part of the enterprise that handle specific tasks we associate with IT systems. Whether it is an email server, a database server, a messaging platform, or any other server, these are where the work happens. Proper configuration of these depends to a great degree on the server specifics
Benchmarks/secure configuration guides: Platform/vendor-specific guides: Network infrastructure devices
Network infrastructure devices are the switches, routers, concentrators, firewalls, and other specialty devices that make the network function smoothly. Properly configuring these devices can be challenging but is very important because failures at this level can adversely affect the security of traffic being processed by them. The criticality of these devices makes them targets, for if a firewall fails, in many cases there are no indications until an investigation finds that it failed to do its job. Ensuring these devices are properly configured and maintained is not a job to gloss over, but one that requires professional attention by properly trained personnel, and backed by routine configuration audits to ensure they stay properly configured.
Benchmarks/secure configuration guides: General purpose guides
The best general purpose guide is the CIS Controls, a common set of 20 security controls. This project began as a consensus project out of the US Department of Defense and has over nearly 20 years more into the de facto standard for selecting an effective set of security controls.
Defense-in-depth/layered security: Vendor diversity
The practice of implementing security controls from different vendors to increase security
Defense-in-depth/layered security: Control diversity
The use of different security control types, such as technical controls, administrative controls, and physical controls
Defense-in-depth/layered security: Control diversity: Administrative
Security controls implemented via administrative or management methods
Defense-in-depth/layered security: Control diversity: Technical
Security controls implemented through technology
Defense-in-depth/layered security: User training
The best defense in an organization is to implement a strong user training program that instructs users to recognize safe and unsafe computing behaviors. The best form of this has proven to be user-specific training, training that is related to the tasks that individuals use computers to accomplish. That means you need separate training for executives and management. Users who continually have problems should have to do remedial training.
Sets found in the same folder
1.1 Given a scenario, analyze indicators of compro…
SY0-501 Security+: (2.3) Given a scenario, trouble…
1.5 - Explain the Vulnerability Scanning concepts
4.1 Compare and contrast identity and access manag…
Other sets by this creator
Security+ 501 Definitions (From Objectives)
6.4 Given a scenario, implement public key infrast…
6.3 Given a scenario, install and configure wirele…
6.2 Explain cryptography algorithms and their basi…
Other Quizlet sets
psych 139 ucsb slides 1 and 2
Bio 208 final
Chapter 26 pharm Patho Exam 2
Alteration in Bowel Elimination/Gastro-intestinal…