CCSP
CCSP Lernkarten
CCSP Lernkarten
Set of flashcards Details
Flashcards | 68 |
---|---|
Language | Deutsch |
Category | Computer Science |
Level | Other |
Created / Updated | 13.09.2020 / 02.08.2021 |
Weblink |
https://card2brain.ch/box/20200913_ccsp
|
Embed |
<iframe src="https://card2brain.ch/box/20200913_ccsp/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>
|
STAR / STARWatch
Security, Trust and Assurance Registry
program for security assurance in the cloud
online registry of cloud provicer security controls
SaaS-application to manage CAIQ-data
STAR levels
1: Self-assessment
2: Third party audit
3: Continous Auditing
all: STAR continoius
Data Lifecycle
Create
Store
Use
Share
Archive
Destroy
NIST-800-61
Computer Security Incident Handling Guide
IaaS Encryption (Volume)
Instance-Managed Encryption: EE within instance, key stored in volume but protected by passphrase/keypair
Externally Managed Encryption: EE within instance, keys managed externally
IaaS Encryption (Object/file)
Client-side: EE embedded in application or client
Server-side: data encrypted on server after transmission, CP has access to keys and runs EE
Proxy: volume connected to special instance/Appliance, connect instance to encryption instance, proxy handles all crypto and key management (local or external)
PaaS encryption
Application layer: data encrypted in PaaS application or client
Database: data encrypted in database using built in encryption (e.g. Transparent Database encryption, field level..)
Other: provider-managed layers in application
SaaS Encryption
Provider-managed: data encrypted in SaaS-Application
Proxy-managed: data encrypted by encryption proxy before sending to SaaS-application
use per-customer keys when possible for tenancy isolation
SAML
OASIS Standard
XML
complex to initially configure
OAuth
IETF-Standard
over HTTP
OpenID
Web Services / consumer services
based on HTTP with URLs
XACML
attribute based access control
Policy language (Policy decision points, policy enforcement points)
can be used with SAML and OAuth
SCIM
standard for exchanging identiy information between domains
PCI DSS Merchant Levels
- Level 1 – Over 6 million transactions annually
- Level 2 – Between 1 and 6 million transactions annually
- Level 3 – Between 20,000 and 1 million transactions annually
- Level 4 – Less than 20,000 transactions annually
Evaluation Assurance Levels (EAL)
ISO/IEC 15408
ranking based on Common Criteria Security evaluation
to what extent was it the product tested?
EAL 1 Functionally tested
EAL 2 Structurally tested
EAL 3 Methodically tested and checked
EAL 4 Methodically designed, tested and reviewed
EAL 5 Semi-formally designed and tested
EAL 6 Semi-formally verified design and tested
EAL 7 Formally verified design and tested
ISO/IEC 15408-1:2009
Evaluation criteria for IT security
EAL Levels 1-7
FIPS 140-2
U.S. government computer security standard used to approve cryptographic modules
Level 1: Requires production-grade equipment and externally tested algorithms.
Level 2: Adds requirements for physical tamper-evidence and role-based authentication. Software implementations must run on an Operating System approved to Common Criteria at EAL2.
Level 3: lvl2 + There must also be physical or logical separation between the interfaces by which “critical security parameters” enter and leave the module. Private keys can only enter or leave in encrypted form.
Level 4: This level makes the physical security requirements more stringent, requiring the ability to be tamper-active, erasing the contents of the device if it detects various forms of environmental attack.
data dispersion
RAID: striping data, adding parity bits for aiding in recovery
Data dispersion: bit splittting (make chunks and distribute them), adding erasure coding as paritiy bits
Obscuring data
Randomization: replace (parts of) data with random characters, keep format
Hashing: one-way hash, makes it unrecoverable (integrity checks)
Shuffling: use different entries from the same data set
Masking: hiding data with useless characters, keep format
Nulls: deleting raw data before it is represented
The Uptime Institute’s tiers
Tier 1: generally utilized by small businesses
Tier 2:
Tier 3: utilized by larger businesses
Tier 4: typically serve enterprise corporations
ISO/IEC 27034-1:2011
Information technology — Security techniques — Application security
SDLC
- Defining
- Designing
- Development
- Testing
- Secure Operations
- Disposal
STRIDE
- Spoofing
- Tampering
- Repudiation
- Information disclosure (privacy breach or data leak)
- Denial of service
- Elevation of privilege
OSI Layers
All = Application Layer
People= Presentation Layer
Seem = Session Layer
To = Transport Layer
Need = Network Layer
Data = Data Link Layer
Processing = Physical Layer
Encryption technologies
TLS
SSL
Whole-Instance Encryption
Volume Encryption
Data discovery methods
Label-based
Metadata-based
Content-based
Data Analytics: Data mining, real-time, agile business intelligence
Hypervisor
Type 1: Bare-metal
Type 2: runs on host
Capability Maturity Model (CMM)
Measures maturity of software
1. Initial
2. Repeatable
3. Defined
4. Capable
5. Efficient