4.5 Endpoint Security Flashcards

(8 cards)

1
Q

The endpoint

A
  • The user’s access
    –Applications and data
  • Stop the attackers
    –Inbound attacks
    –Outbound attacks
  • Many different platforms
    –Mobile, desktop
  • Protection is multi-faceted
    –Defense in depth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Edge vs. access control

A
  • Control at the edge
    –Your Internet link
    –Managed primarily through firewall rules
    –Firewall rules rarely change
  • Access control
    –Control from wherever you are
    –Inside or outside
    –Access can be based on many rules
    –By user, group, location, application, etc.
    –Access can be easily revoked or changed
    –Change your security posture at any time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Posture assessment

A
  • You can’t trust everyone’s computer
    –BYOD (Bring Your Own Device)
    –Malware infections / missing anti-malware
    –Unauthorized applications
  • Before connecting to the network, perform a health
    check
    –Is it a trusted device?
    –Is it running anti-virus? Which one? Is it updated?
    –Are the corporate applications installed?
    –Is it a mobile device? Is the disk encrypted?
    –The type of device doesn’t matter - Windows, Mac,
    Linux, iOS, Android
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Health checks/posture assessment

A
  • Persistent agents
    –Permanently installed onto a system
    –Periodic updates may be required
  • Dissolvable agents
    –No installation is required
    –Runs during the posture assessment
    –Terminates when no longer required
  • Agentless NAC
    –Integrated with Active Directory
    –Checks are made during login and logoff
    –Can’t be scheduled
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Failing your assessment

A
  • What happens when a posture assessment fails?
    –Too dangerous to allow access
  • Quarantine network, notify administrators
    –Just enough network access to fix the issue
  • Once resolved, try again
    –May require additional fixes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Endpoint detection and response (EDR)

A
  • A different method of threat protection
    –Scale to meet the increasing number of threats
  • Detect a threat
    –Signatures aren’t the only detection tool
    –Behavioral analysis, machine learning, process
    monitoring
    –Lightweight agent on the endpoint
  • Investigate the threat
    –Root cause analysis
  • Respond to the threat
    –Isolate the system, quarantine the threat,
    rollback to a previous config
    –API driven, no user or technician intervention required
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Extended Detection and Response (XDR)

A
  • An evolution of EDR– Improve missed detections, false positives, and
    long investigation times– Attacks involve more than just the endpoint
  • Add network-based detection– Investigate and respond to network anomalies
  • Correlate endpoint, network, and cloud data– Improve detection rates– Simplify security event investigations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

User behavior analytics

A
  • XDR commonly includes user behavior analytics– Extend the scope of anomaly detection
  • Watch users, hosts, network traffic, data repositories, etc.– Create a baseline or normal activity– Requires data analysis over an extended period
  • Watch for anything unusual– Use a set of rules, pattern matching, statistical analysis
  • Real-time detection of unusual activity. Catch the threat early
How well did you know this?
1
Not at all
2
3
4
5
Perfectly