Menu

Software and Systems Security

  1. Given a scenario, apply security solutions for infrastructure management.

    • Cloud vs. on-premises

    • Asset management

      • Asset tagging
    • Segmentation

      • Physical
      • Virtual
      • Jumpbox
      • System isolation
        • Air gap
    • Network architecture

      • Physical
      • Software-defined
      • Virtual private cloud (VPC)
      • Virtual private network (VPN)
      • Serverless
    • Change management

    • Virtualization

      • Virtual desktop infrastructure (VDI)
    • Containerization

    • Identity and access management

      • Privilege management
      • Multifactor authentication (MFA)
      • Single sign-on (SSO)
      • Federation
      • Role-based
      • Attribute-based
      • Mandatory
      • Manual review
    • Cloud access security broker (CASB)

    • Honeypot

    • Monitoring and logging

    • Encryption

    • Certificate management

    • Active defense

  2. Explain software assurance best practices.

    • Platforms

      • Mobile
      • Web application
      • Client/server
      • Embedded
      • System-on-chip (SoC)
      • Firmware
    • Software development life cycle (SDLC) integration

    • DevSecOps

    • Software assessment methods

      • User acceptance testing
      • Stress test application
      • Security regression testing
      • Code review
    • Secure coding best practices

      • Input validation
      • Output encoding
      • Session management
      • Authentication
      • Data protection
      • Parameterized queries
    • Static analysis tools

    • Dynamic analysis tools

    • Formal methods for verification of critical software

    • Service-oriented architecture

      • Security Assertions Markup Language (SAML)
      • Simple Object Access Protocol (SOAP)
      • Representational State Transfer (REST)
      • Microservices
  3. Explain hardware assurance best practices.

    • Hardware root of trust

      • Trusted platform module (TPM)
      • Hardware security module (HSM)
    • eFuse

    • Unified Extensible Firmware Interface (UEFI)

    • Trusted foundry

    • Secure processing

      • Trusted execution
      • Secure enclave
      • Processor security extensions
      • Atomic execution
    • Anti-tamper

    • Self-encrypting drive

    • Trusted firmware updates

    • Measured boot and attestation

    • Bus encryption