Essential Security Practices for Computing Resources

🧩 4.1 Security Administration on Computing Resources

🔹 Secure Baselines

  • Define secure configurations (disable unused ports, enforce strong passwords, patch systems).

  • Deploy via configuration tools (Group Policy, Ansible, SCCM).

  • Maintain through regular audits and updates.

🔹 System Hardening

TargetKey Techniques
Workstations/ServersDisable Telnet/FTP; patch OS/apps; use AV + firewall; limit admin privileges.
Mobile DevicesUse MDM, enforce encryption, PIN/biometrics, remote wipe, containerization.
Network Devices (Switch/Router)Change defaults, disable unused ports, use SSH/SNMPv3, update firmware.
IoT/Embedded/SCADAChange default passwords, update firmware, isolate on VLANs, monitor traffic.
CloudUse IAM roles, encryption, segmentation, logging, MFA for consoles.

💡 Exam Tip: Expect questions about “first action” in hardening scenarios (answer: disable unused services or apply baseline).

🧾 4.2 Asset Management and Lifecycle

🔹 Asset Tracking

  • Maintain inventory of hardware/software (serials, tags, asset IDs).

  • Use automated discovery tools or SNMP enumeration.

🔹 Lifecycle Phases

  1. Procurement – Evaluate vendor security.

  2. Deployment – Apply secure baseline.

  3. Maintenance – Monitor, patch, track ownership.

  4. DecommissioningSanitize → Destroy → Certify.

🔹 Secure Disposal

  • Clear: Single overwrite.

  • Purge: Degauss/multiple overwrites.

  • Destroy: Shred, crush, melt.

💡 Exam Tip: “Company throws away drives without wiping” → Correct answer: data exposure risk.


🔍 4.3 Vulnerability Management

🔹 Identify

  • Vulnerability Scans: Nessus/OpenVAS.

    • Authenticated = deeper scan.

    • Unauthenticated = external view.

  • Threat Feeds: OSINT, ISACs, proprietary.

  • Pen Tests: Authorized exploitation (needs signed agreement).

  • Bug Bounties: Responsible disclosure.

🔹 Analyze

  • Confirm Findings: False positives/negatives.

  • Prioritize: Based on CVSS, business impact, exposure factor.

  • CVE Database for reference.

🔹 Respond

  • Remediate: Patch, reconfigure, segment, apply compensating controls.

  • Rescan/Audit to verify fix.

  • Report to management.

💡 Exam Tip: Always validate findings before patching. “What’s the next step after scan?” → Verify, then prioritize.

📊 4.4 Security Monitoring, Alerting & Analysis

🔹 Core Tools

ToolPurpose
SIEMAggregate & correlate logs (Splunk, QRadar, Sentinel).
IDS/IPSDetect or block malicious traffic.
EDR/XDREndpoint detection/response (malware, lateral movement).
DLPPrevent data exfiltration.
UBA/UEBADetect abnormal user behavior.
Vulnerability ScannersIdentify missing patches/misconfigurations.

🔹 Common Data Sources

  • Firewall, IDS/IPS, OS logs, authentication logs, applications.

  • Performance anomalies (CPU, memory, bandwidth) may indicate compromise.

  • NetFlow/SNMP traps show network patterns.

💡 Exam Tip: A sudden midnight data transfer = exfiltration alert.
Know the difference: IDS = detect, IPS = detect + block.


🔐 4.5 Identity and Access Management (IAM)

🔹 Authentication

  • Methods: Passwords, MFA, smartcards, biometrics.

  • Protocols:

    • Kerberos – Ticket-based.

    • LDAP/LDAPS – Directory lookups.

    • SAML/OAuth2/OIDC – Federation (SSO).

  • Federation/SSO: Enables cross-platform logins (e.g., Google, AzureAD).

🔹 Access Control Models

ModelDescription
DACOwner controls access (e.g., Windows).
MACSystem-enforced (e.g., military).
RBACRole-based.
ABACAttribute-based (contextual).

🔹 Account & Privilege Management

  • Least Privilege, Need-to-Know, Separation of Duties.

  • Privileged Access Management (PAM):

    • Use vaults, JIT access, ephemeral credentials.

  • Policies:

    • Use long passphrases, not frequent changes (per NIST 800-63B).

    • Enforce lockout thresholds.

💡 Exam Tip: If asked “how to protect shared admin credentials” → answer: password vault or PAM.

⚙️ 4.6 Automation and Orchestration

🔹 Why Automate?

  • Speed, consistency, error reduction, scalability.

🔹 Examples

  • Automated patching, SOAR actions (auto-isolation/quarantine), auto-revoke user access, CI/CD scans (DevSecOps).

🔹 Benefits

  • Consistent baselines, faster response, better scaling.

🔹 Risks

  • Complexity, single point of failure, technical debt, cost.

💡 Exam Tip: Automation improves efficiency but requires human oversight to avoid cascading errors.


🚨 4.7 Incident Response (IR)

🔹 IR Process (6 Steps)

  1. Preparation – Policies, tools, team, communications plan.

  2. Detection/Analysis – Identify incident (SIEM, alerts).

  3. Containment – Isolate affected systems.

  4. Eradication – Remove threat.

  5. Recovery – Restore services.

  6. Lessons Learned – Update playbooks.

🔹 Training & Testing

  • Tabletop Exercises – Discussion-based.

  • Simulations – Realistic practice.

💡 Exam Tip: Contain before eradicate (“Stop the bleeding before healing”).
Know “who to call” and escalation paths.

🧾 4.8 Digital Forensics & Investigations

🔹 Evidence Handling

  • Chain of Custody: Document every handler/time.

  • Order of Volatility: RAM → Network → Disk → Backups.

  • Work on copies, never originals.

🔹 Data Sources

  • Logs (firewall, server, email), memory dumps, disk images, packet captures.

  • Use to reconstruct attack timelines.

💡 Exam Tip: If chain of custody is broken → evidence inadmissible.