CSSLP Domain 1 – Secure Software Concepts Flashcards

(50 cards)

1
Q
  1. What are the three components of the CIA Triad, and what does each represent?
A

Confidentiality (prevent unauthorized disclosure), Integrity (prevent unauthorized modification), Availability (ensure reliable access).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Define the three elements of AAA in security management.
A

Authentication (verify identity), Authorization (grant access rights), Accounting/Auditing (track user actions).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. What control combination ensures non-repudiation in software systems?
A

Proper configuration of authentication, authorization, and auditing/logging mechanisms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. What does the Bell-LaPadula model enforce?
A

Confidentiality through the ‘no read up, no write down’ rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. What is the main focus of the Biba model?
A

Integrity through the ‘no write up, no read down’ rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. How does the Clark-Wilson model maintain integrity?
A

By enforcing well-formed transactions using Transformation Processes (TPs) and Integrity Verification Processes (IVPs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Which principle limits system access rights to the minimum necessary?
A

Least Privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. What is the main goal of Separation of Duties?
A

To prevent fraud or abuse by dividing responsibilities among multiple individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. What is the principle of Defense in Depth?
A

Using multiple, overlapping, and diverse layers of security controls to protect systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. What does the Fail-Safe principle require when a system fails?
A

It should default to a secure state (e.g., deny access).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Why is Economy of Mechanism important in secure design?
A

Simplicity improves understanding, reduces attack surface, and minimizes misconfigurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Define Complete Mediation.
A

All access requests are checked every time; authorization cannot be bypassed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. What is meant by Open Design in security?
A

System security should not depend on secrecy of design; rely on secrecy of keys instead.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. What is the purpose of the Least Common Mechanism principle?
A

To prevent inadvertent data sharing between users by minimizing shared mechanisms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Why is Psychological Acceptability critical to system security?
A

Users must find controls reasonable and usable to avoid bypassing them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. What does the Weakest Link principle suggest?
A

A system’s security is only as strong as its weakest component or process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. Define Leveraging Existing Components and its risk.
A

Reusing tested components can improve security and efficiency, but creates monoculture risks if a flaw is found.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. What is a Single Point of Failure (SPOF)?
A

A single component whose failure can cause complete system failure; redundancy removes SPOFs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. What are the three main types of access control models?
A

Mandatory Access Control (MAC), Discretionary Access Control (DAC), and Role-Based Access Control (RBAC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. What differentiates MAC from DAC?
A

MAC restricts access based on classification and clearance; DAC allows owners to grant access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. How does Attribute-Based Access Control (ABAC) differ from Role-Based?
A

ABAC uses attributes (user, object, environment) instead of predefined roles to grant access.

22
Q
  1. What is the purpose of Session Management?
A

To ensure communication channels are secure and resistant to hijacking.

23
Q
  1. What is Exception Management and why is it important?
A

Handling all exceptions safely to prevent leakage of system details or insecure states.

24
Q
  1. What is Configuration Management in security?
A

Protecting configuration items from unauthorized changes, ensuring traceability and control.

25
25. Which secure design principle best mitigates privilege escalation attacks?
Least Privilege, supported by Complete Mediation and Separation of Duties.
26
Explain the difference between security governance and security management. (Domain 1)
Security governance defines direction, roles, and policies at a strategic level; security management operationalizes those policies day to day.
27
Describe the importance of aligning software security goals with business objectives. (Domain 1)
Alignment ensures security supports business value delivery rather than obstructing it, balancing risk and opportunity.
28
Define assurance in the context of software security. (Domain 1)
Assurance is confidence that software performs securely as intended, based on evidence such as testing, validation, and process maturity.
29
Explain why software assurance is critical for compliance. (Domain 1)
It demonstrates that the organization systematically prevents vulnerabilities and manages risk across the SDLC, satisfying regulatory expectations.
30
Describe how risk management integrates with secure software concepts. (Domain 1)
Risk management identifies, analyzes, and mitigates threats to software assets, guiding design and control decisions.
31
Explain how culture impacts software security. (Domain 1)
A strong security culture promotes awareness, accountability, and secure behaviors across roles, reducing human-related risk.
32
Define the term 'vulnerability' in software systems. (Domain 1)
A vulnerability is a weakness in design, code, configuration, or process that could be exploited by a threat actor.
33
Identify the role of the CISO in promoting secure software concepts. (Domain 1)
The CISO champions governance, aligns policies with SDLC practices, and ensures teams have resources to embed security.
34
Explain the role of policies, standards, and guidelines in software security. (Domain 1)
Policies define 'what' must be done, standards define 'how,' and guidelines provide flexible recommendations to support compliance.
35
Describe how separation of duties reduces insider threat. (Domain 1)
By dividing critical functions among individuals, no single person can perform or conceal malicious actions without detection.
36
Explain why the principle of least privilege is essential in development environments. (Domain 1)
It limits developer access to only necessary systems and data, reducing risk of accidental or malicious modification.
37
Define the term 'control objective' and give an example. (Domain 1)
A control objective defines the purpose of a control; for example, 'ensure only authorized code is deployed to production.'
38
Describe how auditability supports accountability. (Domain 1)
Auditable logs enable traceability of actions, linking them to specific users or systems to prove accountability.
39
Explain how threat intelligence contributes to secure software concepts. (Domain 1)
It informs developers and architects about emerging attack vectors, enabling proactive design adjustments and testing.
40
Define the term 'security domain' and its purpose. (Domain 1)
A security domain is a logical boundary within which security policies are enforced consistently to control access and data flow.
41
Explain how business impact analysis relates to software security. (Domain 1)
It determines which software assets are most critical and what controls are required to maintain acceptable risk levels.
42
Describe the concept of due care in software security. (Domain 1)
Due care is the demonstration that reasonable measures were taken to protect systems and data from foreseeable risks.
43
Define due diligence in secure software development. (Domain 1)
Due diligence is the ongoing effort to maintain compliance and effectiveness of security measures over time.
44
Explain the relationship between security policy enforcement and accountability. (Domain 1)
Enforcement ensures policies are followed; accountability ensures individuals are responsible for compliance outcomes.
45
Describe how threat agents differ from threat events. (Domain 1)
A threat agent is the entity initiating an attack; a threat event is the specific occurrence or action taken.
46
Define residual risk in the context of secure software. (Domain 1)
Residual risk is the remaining risk after controls have been applied and mitigations are in place.
47
Explain how security design principles apply to cloud-based software. (Domain 1)
Principles like least privilege, defense in depth, and fail-safe defaults remain fundamental but must adapt to shared responsibility models.
48
Describe why change control is a foundational security concept. (Domain 1)
Change control ensures that only authorized, tested, and approved modifications occur, preserving system integrity.
49
Explain the role of continuous monitoring in maintaining software assurance. (Domain 1)
Continuous monitoring detects new threats, vulnerabilities, and deviations from baselines, sustaining assurance between releases.
50
Define the concept of security architecture alignment. (Domain 1)
Security architecture alignment ensures that software controls and design are consistent with organizational architecture and strategy.