Security+ Long Study 3

3.0 Security Architecture (18%)

3.1 Compare and contrast security implications of different architecture models.

  • 3.2 Given a scenario, implement secure network architecture concepts.

  • 3.3 Given a scenario, implement secure system design.

  • 3.4 Explain the importance of resilience and recovery in security architecture.

🟠 Security Architecture

🟠 3.1 Compare and contrast security implications of different architecture models.


🔹 Architecture and Infrastructure Concepts:

Cloud:

- Responsibility Matrix: Defines which security and operational responsibilities belong to the cloud provider and which belong to the customer, helping ensure compliance and risk management.

- Hybrid Considerations: Involves the challenges and security risks associated with integrating on-premises infrastructure with cloud-based environments, requiring careful data flow and identity management.

- Third-party Vendors: Businesses often rely on external vendors for additional cloud services, increasing the need for security assessments, vendor risk management, and contractual security obligations.

- Infrastructure as Code (IaC): A method of managing infrastructure through machine-readable configuration files, ensuring consistency, reducing human errors, and enabling automation.

- Serverless: A cloud computing execution model where cloud providers handle infrastructure management, allowing developers to focus purely on application logic while benefiting from automatic scaling and cost efficiency.

- Microservices: A software architecture approach where applications are divided into small, loosely coupled services that communicate over APIs, improving scalability, fault isolation, and deployment flexibility.


🔹 Network Infrastructure:

Physical Isolation: Refers to completely separating network environments at the hardware level, often used in highly secure environments where air-gapped networks are required.

Logical Segmentation: Dividing a network into segments through VLANs, firewalls, or software-defined networking (SDN) to limit access and reduce the attack surface.

Software-defined Networking (SDN): A network architecture approach that centralizes control using software-based controllers, enabling dynamic network configuration, enhanced security, and automation.

On-premises: Infrastructure that is physically hosted and maintained within an organization’s own data center, offering greater control but requiring significant management and security measures.

Centralized vs. Decentralized: Centralized models consolidate resources and security in a single location, while decentralized architectures distribute resources across multiple locations, impacting performance, security, and manageability.

Containerization: A virtualization method where applications and dependencies are packaged together in lightweight, isolated environments (e.g., Docker, Kubernetes) to enhance portability and security.

Virtualization: The process of creating virtual instances of computing resources (e.g., virtual machines, virtual networks) to improve resource efficiency, scalability, and security.

IoT: A network of interconnected smart devices (e.g., sensors, cameras, industrial controllers) that pose significant security risks due to limited processing power and lack of built-in security controls.

ICS / SCADA: Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems monitor and manage industrial processes but require robust security due to vulnerabilities in legacy designs.

RTOS: Real-Time Operating Systems (RTOS) are used in embedded systems for time-sensitive applications, such as medical devices and industrial automation, requiring strict security controls.

Embedded Systems: Specialized computing devices integrated within larger hardware systems, often lacking update mechanisms and security protections, making them vulnerable to exploits.

High Availability: The design principle of ensuring that systems and services remain operational and accessible with minimal downtime through redundancy, failover mechanisms, and load balancing.


🔹 Considerations:

Availability: The ability of a system to remain operational and accessible, often achieved through redundancy, failover strategies, and robust infrastructure planning.

Resilience: The capability of a system to recover from failures, cyberattacks, or unexpected disruptions, requiring disaster recovery and incident response planning.

Cost: The financial impact of deploying and maintaining infrastructure, balancing security, performance, and business needs.

Responsiveness: The agility of infrastructure to adapt to changing workloads, cyber threats, or operational demands.

Scalability: The ability of a system to expand or contract resources efficiently, ensuring performance remains stable under varying workloads.

Ease of Deployment: How quickly and efficiently infrastructure can be set up, configured, and operationalized, affecting time-to-market and security risks.

Risk Transference: Shifting security risks to third-party providers, such as cloud service providers or cyber insurance companies, to mitigate liability.

Ease of Recovery: The speed and efficiency of restoring services following a failure or cyberattack, depending on backup and disaster recovery strategies.

Patch Availability: The frequency and reliability of security updates, ensuring systems remain protected against known vulnerabilities.

Inability to Patch: The challenge of securing legacy systems that lack vendor support or patching options, requiring compensating security controls.

Power: Ensuring a reliable power supply for infrastructure, including backup power solutions such as uninterruptible power supplies (UPS) and generators.

Compute: Efficiently managing processing resources to optimize performance, cost, and energy consumption.


🟠 3.2 Given a scenario, apply security principles to secure enterprise infrastructure.


🔹 Infrastructure Considerations:

Device Placement: Strategic positioning of network devices and assets based on their role and security requirements to minimize exposure and optimize performance.

Security Zones: Dividing network resources into distinct segments based on trust levels or security requirements (e.g., DMZ, internal, external), reducing exposure and limiting attack surface.

Attack Surface: The total potential entry points that attackers can exploit, which can be minimized through proper segmentation, secure coding practices, and system hardening.

Connectivity: Establishing reliable, secure connections between devices and networks while considering factors such as bandwidth, latency, and reliability to ensure proper communication.


🔹 Failure Modes:

Fail-Open: Systems or devices that, upon failure, default to an insecure or open state, potentially exposing the network to unauthorized access or attacks.

Fail-Closed: Devices or systems that, when they fail, default to a secure or closed state, preventing unauthorized access and maintaining security despite disruptions.


🔹 Device Attributes:

Active vs. Passive: Active devices (e.g., firewalls) take direct action on data, such as filtering or blocking traffic, while passive devices (e.g., network monitoring tools) observe and analyze data without interrupting traffic flow.

Inline vs. Tap/Monitor: Inline devices are placed directly in the data path, allowing them to actively filter or modify traffic, whereas tap/monitor devices are placed outside the data path, passively observing traffic.


🔹 Network Appliances:

Jump Server: A secure intermediary server used to access and manage devices within isolated or secure network segments, reducing direct exposure to sensitive systems.

Proxy Server: Acts as an intermediary between clients and other servers, offering functionalities like web caching, access control, and traffic anonymization.

Intrusion Prevention System (IPS) / Intrusion Detection System (IDS): IPS and IDS monitor network traffic for suspicious activity, with IPS actively blocking threats, while IDS only detects and alerts.

Load Balancer: Distributes network traffic across multiple servers to improve performance, scalability, and availability, reducing the risk of server overload and downtime.

Sensors: Devices that monitor the network environment, collecting data for security analysis, threat detection, and monitoring of system health.


🔹 Port Security:

802.1X: IEEE standard for port-based network access control, enabling authentication and authorization of devices before granting access to the network, ensuring that only authorized devices can connect.

Extensible Authentication Protocol (EAP): A framework used in 802.1X and other protocols to support multiple types of network authentication methods, including certificates, smart cards, and passwords.


🔹 Firewall Types:

Web Application Firewall (WAF): A firewall designed to protect web applications from attacks such as SQL injection, cross-site scripting (XSS), and other common web vulnerabilities.

Unified Threat Management (UTM): An integrated security appliance combining multiple security features (e.g., firewall, antivirus, IDS/IPS, content filtering) into a single platform for easier management and enhanced security.

Next-Generation Firewall (NGFW): A modern firewall that combines traditional firewall capabilities with advanced features like application awareness, deep packet inspection, and intrusion prevention.

Layer 4/Layer 7: Firewalls can operate at different layers of the OSI model. Layer 4 firewalls filter traffic based on IP addresses and port numbers, while Layer 7 firewalls examine traffic based on application-layer data (e.g., HTTP, FTP).


🔹 Secure Communication/Access:

Virtual Private Network (VPN): A secure encrypted tunnel for remote users to access an organization’s internal network over the internet, ensuring confidentiality and integrity of transmitted data.

Remote Access: Allows users to securely connect to network resources from outside the organization’s premises, typically via VPN or other secure methods.


🔹 Tunneling:

Transport Layer Security (TLS): A cryptographic protocol used to secure communications over a computer network, ensuring data integrity and confidentiality for web traffic, email, and other services.

Internet Protocol Security (IPSec): A suite of protocols for securing IP communications by authenticating and encrypting each IP packet, commonly used in VPNs to secure traffic between devices.

Software-Defined Wide Area Network (SD-WAN): A technology that uses software to manage and optimize WAN traffic, improving network performance, reducing costs, and enhancing security by dynamically routing traffic.

Secure Access Service Edge (SASE): A security framework that combines wide-area networking (WAN) and cloud security capabilities, offering secure, direct-to-cloud connectivity for remote users.


🔹 Selection of Effective Controls:

● Choosing appropriate security controls based on a thorough risk assessment, regulatory compliance needs, and the specific requirements of the organization’s infrastructure, ensuring they effectively mitigate identified threats and vulnerabilities.


🟠 Data Protection Concepts and Strategies

🟠 3.3 Compare and contrast concepts and strategies to protect data.


🔹 Data Types:

Regulated Data: Data subject to laws governing its handling, such as HIPAA for health information or PCI DSS for payment card information, requiring stringent security measures.

Trade Secret: Confidential business information that provides a competitive edge, protected under intellectual property laws to prevent unauthorized access.

Intellectual Property: Creations like inventions and artistic works, safeguarded by patents, copyrights, or trademarks, ensuring exclusive ownership and use.

Legal Information: Data linked to legal proceedings, including contracts and litigation documents, which may have legal protections or confidentiality requirements.

Financial Information: Data concerning financial transactions, such as investment details, payment card data, and personally identifiable information (PII), requiring protection against fraud.

Human-Readable vs. Non-Human-Readable: Data that can be understood by humans (e.g., text, images) versus machine-readable formats (e.g., encrypted data, binary data).


🔹 Data Classifications:

Sensitive: Data requiring protection due to its potential impact if exposed, such as personal health information or financial records.

Confidential: Data that must be kept private and only disclosed to authorized parties under confidentiality agreements or legal obligations.

Public: Data that is openly available for distribution without any security concerns, like public domain content or open-source software.

Restricted: Data with limited access, often requiring specific authorizations, commonly containing sensitive or confidential information.

Private: Data for internal organizational use, not intended for public access or sharing.

Critical: Data vital for the organization’s operations, whose loss or compromise could have severe consequences for business continuity.


🔹 General Data Considerations:

Data States:

- Data at Rest: Data stored in storage systems, including hard drives or databases.

- Data in Transit: Data being transmitted across networks or communication channels.

- Data in Use: Data actively processed or accessed by users or applications.

Data Sovereignty: Refers to the jurisdiction governing data and the legal obligations tied to its storage and processing.

Geolocation: Tracking the physical location of data, which may have implications for compliance with data privacy laws.


🔹 Methods to Secure Data:

Geographic Restrictions: Limiting access based on user location to comply with local regulations and reduce exposure.

Encryption: Transforming data into unreadable ciphertext to prevent unauthorized access, essential for securing sensitive information in storage or transit.

Hashing: Converting data into a fixed-size string for integrity checks, ensuring that the original data has not been tampered with.

Masking: Concealing sensitive portions of data while retaining its usability for authorized purposes, useful in development or testing environments.

Tokenization: Replacing sensitive data with a non-sensitive token that maintains the same structure and length but cannot be exploited.

Obfuscation: Scrambling data to make it unintelligible to unauthorized users, often used to protect intellectual property or proprietary algorithms.

Segmentation: Dividing networks into smaller parts to limit the impact of security breaches and prevent lateral movement.

Permission Restrictions: Applying strict access controls based on roles and privileges to minimize exposure and enforce the principle of least privilege.


🟠 Resilience and Recovery in Security Architecture

🟠 3.4 Explain the importance of resilience and recovery in security architecture.


🔹 High Availability:

Load Balancing: Distributes incoming network traffic evenly across multiple servers to ensure optimal resource usage, minimize downtime, and improve availability.

Clustering: Multiple servers or nodes work together as a single system, providing redundancy and ensuring fault tolerance, so if one node fails, others can take over.


🔹 Site Considerations:

Hot Site: A fully equipped backup facility ready to become operational quickly after a disaster, ensuring minimal downtime.

Cold Site: A basic facility without infrastructure, requiring setup before it can be used, typically leading to longer recovery times.

Warm Site: Partially equipped facility that provides some infrastructure, allowing quicker recovery than a cold site but slower than a hot site.

Geographic Dispersion: Distributing critical resources across different locations to reduce risks from regional disasters or disruptions.


🔹 Platform Diversity:

● Utilizing a mix of hardware, software, and cloud services to reduce the risk of dependency on a single vendor or platform, increasing system resilience.


🔹 Multi-cloud Systems:

● Spreading applications and services across multiple cloud providers to ensure redundancy, prevent vendor lock-in, and enhance flexibility and resilience.


🔹 Continuity of Operations:

● Ensuring that essential business operations continue without interruption during and after disruptions, including maintaining critical services and processes.


🔹 Capacity Planning:

People: Ensuring availability of skilled personnel to manage systems during normal and emergency operations.

Technology: Assessing and preparing resources to meet future demand, such as hardware, software, and network infrastructure.

Infrastructure: Optimizing IT infrastructure to scale up or down to accommodate changes in workload or business requirements.


🔹 Testing:

Tabletop Exercises: Simulated walkthroughs of disaster scenarios to assess readiness and refine response plans.

Failover: Testing automatic or manual switching to backup systems in case of failure to ensure continued operations.

Simulation: Creating real-world disaster scenarios to evaluate the effectiveness of recovery and business continuity plans.

Parallel Processing: Running tasks simultaneously across systems to improve performance and resilience.


🔹 Backups:

Onsite/Offsite: Storing data backups either within the same physical location (onsite) or at a different location (offsite) to reduce risks of data loss.

Frequency: Setting up backup schedules based on the criticality of the data and business needs, ensuring regular and timely backups.

Encryption: Encrypting backup data to protect confidentiality and prevent unauthorized access.

Snapshots: Capturing point-in-time images of data to enable fast recovery and ensure data consistency.

Replication: Creating real-time or near-real-time copies of data to ensure availability in case of a disaster or failure.

Journaling: Recording changes to data or systems over time for easy rollback or recovery.


🔹 Power:

Generators: Backup power systems that ensure continued operation during power outages, protecting critical systems and data.

Uninterruptible Power Supply (UPS): Provides short-term backup power to prevent data loss and damage to equipment during outages or power fluctuations.