Front
Back
What is a secure baseline?
A defined, known-good configuration of an application or system that ensures consistent security across all instances.
Why must all application instances follow the secure baseline?
To maintain consistent security settings like firewall rules, patch levels, and OS versions.
What are integrity measurements?
Checks performed to verify that a system matches the secure baseline; deviations must be corrected immediately.
Why are integrity measurements important?
They help detect unauthorized or accidental changes from the secure baseline.
What is the purpose of establishing baselines?
To create foundational security policies that define the expected secure state of systems.
Where can you find security baselines?
From manufacturers like OS vendors, application developers, or appliance makers.
How many group policy settings are in Windows 10?
Over 3,000, but only some are security-related.
How are baselines deployed in large environments?
Through centralized management tools like Active Directory Group Policy or Mobile Device Management (MDM).
Why is automation key in baseline deployment?
It allows consistent deployment to hundreds or thousands of devices efficiently.
Why do baselines need maintenance?
Because new vulnerabilities, updates, or software changes may require updates to the baseline.
What must be tested when maintaining baselines?
Potential conflicts between different baselines or policies.
What is system hardening?
The process of securing a system by reducing vulnerabilities through configuration and updates.
Why are hardening guides important?
They provide vendor-specific or community-recommended security configurations.
Why are updates critical for mobile devices?
They fix bugs and patch known vulnerabilities.
How can segmentation protect mobile data?
By separating company and user data, often via MDM policies.
What should be removed during workstation hardening?
Unnecessary software to reduce the attack surface.
What tool helps manage workstation policies in Windows?
Active Directory Group Policy.
Why must you change default credentials on network devices?
Default logins are easily exploited by attackers.
How often should network device firmware be updated?
Infrequently, but updates are critical when released.
What is the ‘keys to the kingdom’ in cloud environments?
The cloud management workstation, which must be highly secured.
What principle should apply to cloud permissions?
Least privilege—only grant access needed for a task.
What should be enforced on server user accounts?
Minimum password lengths, complexity, and account limitations.
How should network access be controlled on servers?
Limit access and monitor for unauthorized connections.