Lesson 7
Lesson 7: Resiliency and Site Security
Asset Management
Asset Tracking:
CMDB (Configuration Management Database): Tracks IT assets and relationshipsMDM (Mobile Device Management): Manages/secures smartphones/tablets (remote wipe)Cloud Discovery: Identifies shadow IT (unauthorized SaaS/IaaS)
Data Protection & Backups
Backup Types:
Full Backup: Complete copy, slow RTO, high storageIncremental: Only changes since last backup, fast RTO, less storageDifferential: Changes since last full backup, moderate RTO
Recovery Speed:
- Incremental: Slowest (requires full + all incrementals)
- Differential: Moderate to fast (requires full + latest differential)
- Full/Image: Fast (restores entire system)
Advanced Data Protection:
Snapshots: Point-in-time system state (Hyper-V, VMware)Replication: Real-time data sync to another site (SAN replication)Journaling: Recording changes before applying (filesystems/databases)Database Mirroring: High-availability feature for data reliability
Secure Data Destruction:
DoD 5220.22M: 3-pass overwriteDegaussing: Magnetic wipe (HDDs/tapes)Shredding: Physical destruction (SSDs, old hardware)
Redundancy Strategies
Key Concepts:
COOP (Continuity of Operations): Keep critical business functions running during/after disasterBCP (Business Continuity Planning): Ensure entire business can recover quicklyBackups: Copy data for restoration after lossCOOP Testing: Validate plan works (exercises, drills)Capacity Planning: Estimate future needs to prevent bottlenecks
People Risks:
Cross-Training: Train others to cover key rolesRemote Work Plans: Ability for offsite work continuityAlternative Reporting Structures: Backup management chainsChanges in Workforce Capacity: Staff level adjustmentsRapid Hiring: Fast scaling for urgent demandsLayoffs: Reduced support, role gaps
High Availability & Fault Tolerance
Clustering Types:
Active/Passive (A/P): One active node, others standby (database servers)Active/Active (A/A): All nodes handle load (web servers, load-balanced environments)Application Clustering: Applications share state between nodes
Comparison:
- A/P: Lower performance, simpler, moderate failover, less efficient
- A/A: Higher performance, complex, fast failover, efficient
- Application: Depends on app design
Site-Level Resiliency (Disaster Recovery Sites)
Real-time Recovery: Instant (0ms), continuous synchronous replication, mission-critical systemsHot Site: Immediate (minutes), fully equipped and ready, minimal downtimeCloud: Fast (minutes), always live and mirrored, 0 RTO/RPOWarm Site: Few hours to 1 day, partially equipped, balanced optionCold Site: Long (days), empty facility with power/internet, cost-effective
Power Redundancy
UPS (Uninterruptible Power Supply): Short-term battery backup (minutes to hours), instant activationGenerator: Long-term power (days with fuel), 10-60 seconds to startDual PSUs (Power Supply Units): Two independent power sources for redundancy
Deception Technologies
Honeypot: Decoy system to attract attackersHoneynet: Network of honeypots simulating full environmentHoneyfile: Decoy file to detect unauthorized accessHoneytoken: Fake data (credentials, API keys) to alert on breachFake Telemetry: Simulated activity data to mislead attackers
Testing Resiliency
Tabletop Exercise: Discussion-based scenario walkthroughFailover Test: Simulate primary system failureSimulation: Controlled realistic test mimicking actual incidentsParallel Processing Test: Run backup systems parallel with primaryRobust Documentation: Clear, up-to-date processes and recovery plans
Physical Security
Perimeter Security:
Fencing: Physical barrier to restrict access and delay intrudersLighting: Enhance visibility, deter unauthorized accessBollards: Block vehicle access to sensitive areas
Access Control:
Physical: Walls, doors, locksElectronic: CCTV, motion detectors, alarmsAccess Control Vestibule (Mantrap): Double-door entry to prevent piggybacking/tailgatingCable Locks: Secure laptops to fixed objectsAccess Badges: Cards with embedded chips for entryBiometrics: Fingerprints, facial recognition, retina scans
Monitoring & Alarms:
CCTV: Continuous video surveillancePIR Sensors: Detect motion via infrared radiationMotion Recognition: Software identifies movementObject Detection: AI identifies specific items (weapons, bags)Drones/UAV: Aerial surveillance, live video, thermal imaging
All Content
Lesson 0: Study Tips and Resources
Study Tips and Resources
Lesson 1: Fundamental Security Concepts
Study Tips and Resources
Lesson 2: Threat Types
Study Tips and Resources
Lesson 3: Cryptographic Solutions
Study Tips and Resources
Lesson 4: Identity and Access Management (IAM)
Study Tips and Resources
Lesson 5: Enterprise Network Architecture
Study Tips and Resources
Lesson 6: Cloud & Zero Trust
Study Tips and Resources
Lesson 8: Vulnerability Management
Study Tips and Resources
Lesson 9: Network Security Capabilities
Study Tips and Resources
Lesson 10: Endpoint Security
Study Tips and Resources
Lesson 11: Application Security
Study Tips and Resources
Lesson 12: Alerting and Monitoring
Study Tips and Resources
Lesson 13: Analyze Indicators of Malicious Activity
Study Tips and Resources
Lesson 14: Security Governance Concepts
Study Tips and Resources
Lesson 15: Risk Management Processes
Study Tips and Resources
Lesson 16: Data Protection and Compliance Concepts
Study Tips and Resources