4.1 Application Security Baselines and Deployment Flashcards

(10 cards)

1
Q

What is the purpose of establishing a security baseline when deploying an application?

A

To ensure that all associated security best practices are implemented and the application instance is as secure as possible.

The baseline must be constantly checked to ensure it remains in place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What types of components are typically included in the security settings for an application deployment?

A
  • Underlying operating system
  • Network devices
  • Firewall settings
  • Configuration settings within the application itself

These components are essential for ensuring comprehensive security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the recommended course of action if a check reveals that an application instance is not adhering to its security baseline?

A

Put together a plan to correct the deviations as soon as possible.

The goal is to ensure the baselines are in place and actively protecting the application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where can organizations find foundational security baselines to use as a starting point?

A

From the application developer, the operating system manufacturer, or manufacturers of any purpose-built appliances being used.

Organizations do not have to create baselines from scratch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Microsoft Security Compliance Toolkit (SCT), and what function does it serve?

A

A set of tools provided by Microsoft to help organizations deploy security baselines for Windows and Windows Server operating systems.

The SCT aids in streamlining the deployment process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is automation considered important when deploying complex security baselines?

A

Because security baselines can be large and complex, with thousands of potential settings, making automated processes necessary for consistent and efficient deployment.

For example, Windows 10 has over 3,000 Group Policy settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Besides centralized consoles like the SCT, what other methods can be used to push security settings to devices?

A
  • Active Directory Group Policy
  • Mobile Device Management (MDM) systems

These methods facilitate broader security settings deployment across networks and devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are three distinct circumstances that might require an existing security baseline to be updated?

A
  • A new vulnerability is discovered
  • The application itself is updated
  • A completely new operating system is installed

These updates are crucial for maintaining security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What potential issue can arise when using security baselines from multiple different manufacturers for a single application instance?

A

A conflict can arise where one manufacturer’s recommended baseline contradicts another’s.

Both baselines must be evaluated to determine which one is better for that specific application instance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What two processes are recommended before and after deploying a baseline to ensure its effectiveness?

A
  • Test the baselines before deployment
  • Audit the systems after deployment

This ensures that the baselines remain in effect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly