D4: SECURITY ARCHITECTURE ANALYSIS Flashcards

(49 cards)

1
Q

Security operations architecture

A

Design of processes tools and data flows that support monitoring detection response and improvement of security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security operations center

A

Central team and facility that monitors security telemetry analyzes alerts and coordinates response to incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Use case in detection

A

Documented scenario describing what malicious or risky behavior to detect which data sources to use and what logic to apply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security information and event management

A

Platform that collects normalizes correlates and analyzes events from many sources to support detection and reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Log management

A

Processes and tools to collect store index and retain logs from systems applications and security devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Log source coverage

A

Extent to which critical systems cloud resources applications and network elements send logs into the central monitoring platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Baseline behavior

A

Model of typical activity patterns for users systems or networks used to identify deviations and anomalies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Alert correlation

A

Technique of combining related events and alerts into a single incident or story to reduce noise and improve context

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Incident

A

Confirmed or reasonably suspected event that jeopardizes confidentiality integrity or availability of information or systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Event triage

A

Initial evaluation and prioritization of alerts to determine severity scope and whether further investigation is needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Incident response plan

A

Document that defines roles procedures communication and decision points for handling security incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Incident response lifecycle

A

Phases such as preparation detection analysis containment eradication recovery and post incident lessons learned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Containment strategy

A

Approach for limiting the impact of an incident such as isolating hosts disabling accounts or blocking network paths

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Eradication and recovery

A

Activities that remove the threat actor or malware and restore systems and data to trusted operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Post incident review

A

Structured analysis of an incident to identify root causes lessons and improvements for controls and processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Forensic readiness

A

Preparation of systems so they capture reliable evidence such as synchronized time detailed logs and chain of custody procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Time synchronization

A

Use of consistent time sources so that events across different systems can be accurately correlated during investigations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Vulnerability management

A

Continuous process of discovering assessing prioritizing and remediating vulnerabilities in systems and applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Patch management

A

Structured approach to evaluating testing and deploying updates to software and firmware within defined timeframes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Configuration management

A

Definition and control of baseline configurations and changes to them to reduce misconfiguration risk

21
Q

Change control

A

Process to evaluate approve implement and document changes to systems and security controls to avoid unintended consequences

22
Q

Endpoint security monitoring

A

Collection and analysis of telemetry from servers workstations and mobile devices to detect malicious activity

23
Q

Endpoint detection and response

A

Tools that provide advanced endpoint visibility behavior analysis and remote response actions such as isolation

24
Q

Network security monitoring

A

Observation and analysis of network traffic metadata or packets to detect anomalies intrusions or policy violations

25
Threat intelligence
Information about adversaries indicators tactics and vulnerabilities used to improve detection and response
26
Use of threat intelligence feeds
Integration of external indicators into security tools such as firewalls proxies and SIEM to enhance detection
27
Playbook or runbook
Detailed sequence of steps for analysts to follow when handling a specific incident type or operational task
28
Security orchestration and automation
Automation of repetitive detection and response actions across tools to increase speed and consistency
29
Case management
System for tracking investigations evidence decisions and status of incidents within security operations
30
Key performance indicators for operations
Metrics such as mean time to detect mean time to respond false positive rate and coverage of critical assets
31
Noise and false positive reduction
Tuning of detection rules and filters so that alerts are actionable and analysts are not overwhelmed
32
Health monitoring of security tools
Continuous verification that sensors agents collectors and rules are functioning and sending expected data
33
Data retention strategy
Decisions about how long to keep different types of logs and snapshots based on legal forensic and storage considerations
34
Segregation of duties in operations
Ensuring that individuals who monitor activity are not the same people who administer critical systems they observe
35
Operational runbook for maintenance
Documented procedures for recurring tasks such as log review backup verification and rule tuning
36
Operational change windows
Planned periods when changes to security tools or monitoring are allowed with rollback plans if issues occur
37
Red team and blue team
Exercise structure where attackers simulate adversaries and defenders operate detection and response to test capabilities
38
Purple team
Collaborative approach where offensive and defensive teams work together to refine detection and response techniques
39
Simulation and tabletop exercises
Practice activities where scenarios are walked through to test communications decision making and procedures
40
Service level objectives for SOC
Agreed targets defining expected response times handling times and communication expectations for incidents
41
Integration with business continuity
Alignment of incident response with continuity and disaster recovery plans so operations know when to fail over
42
Monitoring of cloud environments
Collection of logs events and configuration data from cloud services using provider APIs and native tools
43
Security monitoring in DevOps
Integration of monitoring and logging for new services into pipelines so that operations has visibility from day one
44
Operational handoff between shifts
Structured communication of ongoing incidents changes and tool status to ensure continuity of coverage
45
Threat hunting
Proactive analyst driven search through telemetry for indicators of threats that have evaded automated detection
46
Data quality in telemetry
Ensuring events have consistent formats fields and reliability so analytics and correlation work correctly
47
Third party managed security services
Use of external providers to perform some or all monitoring and response functions under defined contracts
48
Escalation procedures
Rules and contact paths for moving incidents to higher expertise levels or management based on severity and impact
49
Security operations documentation
Collection of playbooks architecture diagrams data flow descriptions and standard operating procedures for the operations function