Hardening Flashcards

(32 cards)

1
Q

What is the process of hardening in cybersecurity?

A

Enhancing system, application, or network security

Measures include applying security patches, configuring access controls, and disabling unnecessary services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List the measures involved in the hardening process.

A
  • Apply security patches
  • Configure access controls
  • Disable unnecessary services

These measures aim to strengthen overall security posture and resilience against cyberattacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are default configurations?

A

Preset settings that come with a system or application

Changing default passwords, open ports, and insecure configurations is crucial for security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of restricting applications?

A

To control which applications can run on a workstation

This includes application allowlisting and blocklisting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the risks of running unnecessary services?

A

Increased attack surface and potential vulnerabilities

Disabling unnecessary services helps reduce these risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define trusted operating systems.

A

Operating systems designed to provide a secure computing environment

They enforce stringent security policies and often rely on mandatory access controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Evaluation Assurance Level (EAL)?

A

A predefined security standard and certification for evaluating security controls

EAL 1 is the lowest level, while EAL 7 is the highest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the difference between updates and patches?

A
  • Updates: Additional functionality, may introduce vulnerabilities
  • Patches: Fix security issues, should be applied immediately

Effective patch management is crucial for maintaining security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is patch management?

A

Planning, testing, implementing, and auditing of software patches

It is important for compliance and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the four-step process of patch management?

A
  • Planning
  • Testing
  • Implementing
  • Auditing

Each step is crucial for effective patch management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Group Policies in Windows environments?

A

A set of rules and policies applied to users or computer accounts

They help manage user and computer settings centrally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of secure baselines?

A

To establish a secure starting point for minimizing security risks

Secure baselines help in maintaining consistent security configurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is SELinux?

A

A security mechanism that provides an additional layer of security for Linux distributions

It enforces Mandatory Access Control (MAC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the three main contexts in SELinux?

A
  • User Context
  • Role Context
  • Type Context

These contexts help in fine-grained access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the modes of SELinux?

A
  • Disabled Mode
  • Enforcing Mode
  • Permissive Mode

Each mode determines how SELinux policies are applied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the difference between allowlisting and blocklisting?

A
  • Allowlisting: Only approved applications can run
  • Blocklisting: All applications can run except those explicitly denied

Allowlisting is generally more secure than blocklisting.

17
Q

What is the role of Group Policy Editor?

A

To create and manage policies within a Windows environment

Access it by entering ‘gpedit’ in the run prompt.

18
Q

What is data encryption?

A

The process of converting data into a secret code to prevent unauthorized access

Different levels of data encryption exist, including full-disk and file encryption.

19
Q

What does SELinux capture in an audit log?

A

Violation messages

Violations occur when unauthorized access is attempted or actions contradict existing policies.

20
Q

What is required for initial SELinux setup to avoid false violations?

A

Policy tweaking and fine-tuning

Strong security depends on creating effective restricted profiles and hardening applications.

21
Q

Define Data Encryption.

A

Process of converting data into a secret code to prevent unauthorized access

Data encryption is crucial for protecting sensitive information.

22
Q

What are the levels of data encryption?

A
  • Full-disk
  • Partition
  • Volume
  • File-level
  • Database
  • Record

Each level serves different purposes in securing data.

23
Q

What does full-disk encryption do?

A

Encrypts the entire hard drive

This protects all data stored on the drive.

24
Q

What is the purpose of VeraCrypt?

A

Selectively encrypts partitions

It allows for encryption of sensitive documents while leaving the OS partition unencrypted.

25
What does **file-level encryption** do?
Encrypts an individual file ## Footnote This is different from encrypting an entire partition or disk drive.
26
What is a **secure baseline**?
Standard set of security configurations and controls ## Footnote It helps organizations maintain consistent security postures and mitigate common vulnerabilities.
27
What is the first step in **establishing a secure baseline**?
Thorough assessment of the system, network, or application ## Footnote This includes identifying data types, workflows, and evaluating vulnerabilities.
28
What are some **best practices** for defining a secure baseline?
* Industry standards * Compliance requirements (e.g., ISO 27001, NIST SP 800-53) ## Footnote These serve as starting points for creating a secure baseline.
29
What is involved in **configuring a secure baseline**?
* Install and update the OS * Check against baseline configuration guides * Scan for vulnerabilities * Install required applications ## Footnote This ensures the system is secure and compliant.
30
What tools can be used for **deployment** of secure baselines?
* Automated tools * Scripts * Group Policy Objects (GPO) in Windows * AWS Config in cloud environments ## Footnote These tools help ensure consistent application of the secure baseline.
31
What is necessary for the **maintenance** of a secure baseline?
* Regular audits * Monitoring * Continuous assessment ## Footnote This keeps the baseline up-to-date and secure.
32
What should be included in **employee training and awareness** regarding secure baselines?
* Importance of adhering to configurations * Risks of deviating from the baseline * Reporting suspicious activities ## Footnote Training helps mitigate risks associated with security deviations.