Page 641 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 641

implemented on a manual basis, only after testing and review.
               Oversight of firmware version control should focus on maintaining a

               stable operating platform while minimizing exposure to downtime or
               compromise.


               Wrappers

               A wrapper is something used to enclose or contain something else.
               Wrappers are well known in the security community in relation to
               Trojan horse malware. A wrapper of this sort is used to combine a
               benign host with a malicious payload.

               Wrappers are also used as encapsulation solutions. Some static

               environments may be configured to reject updates, changes, or
               software installations unless they’re introduced through a controlled
               channel. That controlled channel can be a specific wrapper. The
               wrapper may include integrity and authentication features to ensure
               that only intended and authorized updates are applied to the system.


               Monitoring

               Even embedded and static systems should be monitored for
               performance, violations, compliance, and operational status. Some of

               these types of devices can perform on-device monitoring, auditing,
               and logging, while others may require external systems to collect
               activity data. Any and all devices, equipment, and computers within an
               organization should be monitored to ensure high performance,
               minimal downtime, and detecting and stopping violations and abuse.


               Control Redundancy and Diversity

               As with any security solution, relying on a single security mechanism
               is unwise. Defense in depth uses multiple types of access controls in

               literal or theoretical concentric circles or layers. This form of layered
               security helps an organization avoid a monolithic security stance. A
               monolithic mentality is the belief that a single security mechanism is
               all that is required to provide sufficient security. By having security
               control redundancy and diversity, a static environment can avoid the

               pitfalls of a single security feature failing; the environment has several
               opportunities to deflect, deny, detect, and deter any threat.
   636   637   638   639   640   641   642   643   644   645   646