Security engineering : what are the technical processes
technical management process
what are the enabling process
what are the agreement process
what are the 4 key security models (architecture)
what is the security ring model
Ring 0 -> OS & security kernel
Ring 1 -> device driver
Ring 2 -> system utilities -> admin
Ring 3 -> Applications -> users
Security architecture for establish a secure system
what are the key extensions to basic security architecture
what is the fundamental building block of info system architecture
Service model
what are the types of service models (systems)
five essential characteristics of cloud computing
what are the main cloud services models
what are the cloud deployments models
what are cloud vulnerabilities & mitigations
vulnerabilities:
- exposure to external communication & access
- misconfiguration
- becoming outdated
mitigation:
- stron SLA
what are microservices vulnerabilities & mitigations
vulnerabilities:
- authorization
- quality of service
- denial of service
mitigation:
- IAM
- containers
- API gateway
containerization vulnerabilities & mitigations
vulnerability
- insecure image
- excessive privilege
- unrestricted comms
- rogue malicious process
- improper isolation
mitigation
- image mgmt
- immutable infra
- granular sec
- micro segmentation
- proper config
Serverless architecture vulnerabilities & mitigations
vulnerability:
- malicious injection into function
- insecure conf.
- cross execution’s data persistency
mitigation
- train staff for conf
- secure coding practices
High performance computing sys vulnerabilities & mitigations
vulnerabilities:
- latency constraints
- improper workload
mitigation
- proper architecture design
- monitoring & log practices
edge & Fog computing vulnerabilities & mitigations
vulnerability
- network compromise
- increase attack surface
mitigation
- network monitoring
- incident response
- asset inventory
accountability
industrial control system vulnerabilities & mitigations
vulnerabilities:
- limited functions
- limited protection
- long service life
- misconf & misuse
- susceptible DoS
- attack have physical effect
- remote/unattended locations
mitigation
- isolated network infra
- access control & monitoring
- high segmentation & microsegmentation
- protect comms chanels
- configuration controls
type of industrial control systems
embedded system vulnerabilities & mitigations
vulnerabilities
- programming errors
- web-based vulnerability
- weak access control
- poor crypto
- reverse engineering
- malware
- eavesdropping
mitigations
- risk assessment
- patching & updating
- secure coding technique
- implementing 3rd party risk mgmt
IoT vulnerabilities & mitigations
vulnerabilities
- DoS
- Device security
- crypto security
distributed system vulnerabilities & mitigations
vulnerabilities
- lack of monitoring
- lack of access control
mitigation
- IAM
- IDS/IPS