CCSP

CCSP Lernkarten

CCSP Lernkarten


Set of flashcards Details

Flashcards 68
Language Deutsch
Category Computer Science
Level Other
Created / Updated 13.09.2020 / 02.08.2021
Weblink
https://card2brain.ch/box/20200913_ccsp
Embed
<iframe src="https://card2brain.ch/box/20200913_ccsp/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>

STAR / STARWatch

Security, Trust and Assurance Registry 

program for security assurance in the cloud

online registry of cloud provicer security controls

SaaS-application to manage CAIQ-data

STAR levels

1: Self-assessment

2: Third party audit

3: Continous Auditing

all: STAR continoius

Data Lifecycle

Create

Store

Use

Share

Archive

Destroy

NIST-800-61

Computer Security Incident Handling Guide

IaaS Encryption (Volume)

Instance-Managed Encryption: EE within instance, key stored in volume but protected by passphrase/keypair

Externally Managed Encryption: EE within instance, keys managed externally

IaaS Encryption (Object/file)

Client-side: EE embedded in application or client 

Server-side: data encrypted on server after transmission, CP has access to keys and runs EE

Proxy: volume connected to special instance/Appliance, connect instance to encryption instance, proxy handles all crypto and key management (local or external)

PaaS encryption 

Application layer: data encrypted in PaaS application or client

Database: data encrypted in database using built in encryption (e.g. Transparent Database encryption, field level..)

Other: provider-managed layers in application

SaaS Encryption

Provider-managed: data encrypted in SaaS-Application

Proxy-managed: data encrypted by encryption proxy before sending to SaaS-application

 

use per-customer keys when possible for tenancy isolation

SAML

OASIS Standard

XML

complex to initially configure

OAuth

IETF-Standard

over HTTP

 

OpenID

Web Services / consumer services

based on HTTP with URLs

XACML

attribute based access control

Policy language (Policy decision points, policy enforcement points)

can be used with SAML and OAuth

SCIM

standard for exchanging identiy information between domains

PCI DSS Merchant Levels

  • Level 1 – Over 6 million transactions annually
  • Level 2 – Between 1 and 6 million transactions annually
  • Level 3 – Between 20,000 and 1 million transactions annually
  • Level 4 – Less than 20,000 transactions annually

Evaluation Assurance Levels (EAL)

 ISO/IEC 15408

ranking based on Common Criteria Security evaluation

to what extent was it the product tested?

 

EAL 1 Functionally tested

EAL 2 Structurally tested

EAL 3 Methodically tested and checked

EAL 4 Methodically designed, tested and reviewed

EAL 5 Semi-formally designed and tested

EAL 6 Semi-formally verified design and tested

EAL 7 Formally verified design and tested

ISO/IEC 15408-1:2009

 Evaluation criteria for IT security

EAL Levels 1-7

FIPS 140-2

 

 U.S. government computer security standard used to approve cryptographic modules

 

Level 1: Requires production-grade equipment and externally tested algorithms.

Level 2: Adds requirements for physical tamper-evidence and role-based authentication. Software implementations must run on an Operating System approved to Common Criteria at EAL2.

Level 3: lvl2 + There must also be physical or logical separation between the interfaces by which “critical security parameters” enter and leave the module. Private keys can only enter or leave in encrypted form.

Level 4: This level makes the physical security requirements more stringent, requiring the ability to be tamper-active, erasing the contents of the device if it detects various forms of environmental attack.

data dispersion

RAID: striping data, adding parity bits for aiding in recovery

Data dispersion: bit splittting (make chunks and distribute them), adding erasure coding as paritiy bits

 

Obscuring data

 

Randomization: replace (parts of) data with random characters, keep format 

Hashing: one-way hash, makes it unrecoverable (integrity checks)

Shuffling: use different entries from the same data set

Masking: hiding data with useless characters, keep format

Nulls: deleting raw data before it is represented

The Uptime Institute’s tiers

Tier 1: generally utilized by small businesses

Tier 2: 

Tier 3: utilized by larger businesses

Tier 4:  typically serve enterprise corporations 

 

    ISO/IEC 27034-1:2011

    Information technology — Security techniques — Application security

    SDLC

    • Defining
    • Designing
    • Development
    • Testing
    • Secure Operations
    • Disposal

    OSI Layers

    All = Application Layer
    People= Presentation Layer
    Seem = Session Layer
    To = Transport Layer
    Need = Network Layer
    Data = Data Link Layer
    Processing = Physical Layer

    Encryption technologies

    TLS

    SSL

    Whole-Instance Encryption

    Volume Encryption

    Data discovery methods

    Label-based

    Metadata-based

    Content-based

    Data Analytics: Data mining, real-time, agile business intelligence

    Hypervisor

    Type 1: Bare-metal

    Type 2: runs on host

    Capability Maturity Model (CMM)

    Measures maturity of software

    1. Initial

    2. Repeatable

    3. Defined

    4. Capable

    5. Efficient