Cheatography
https://cheatography.com
***********************************************
This is a draft cheat sheet. It is a work in progress and is not finished yet.
LEAN
|
Big Key Factors |
|
1. Deliver value from your customer’s perspective |
|
2. Eliminate waste (things that don’t bring value to the end product) |
|
3. Continuous improvement |
LEAN starts with understanding with identifying value and then flows into the company needs
Security Protocols
SSO -Single-Sign On: SAML enables SSO; using one set of credentials
OAuth (Open-standard authorization protocol)
- provides apps the ability for "secure designated access"
- Ex. Like giving ESPN access to post on and access your profile without giving up your password
- In the even that ESPN is breached, your Facebook is safe
- OAuth uses API calls extensively
SAML (Security Assertion Markup Language)
-is an open standard that allows identity providers (IdP) to pass authorization credentials to service providers (SP)
-Basically you can use one set of creds to log into many different websites.
-Drops a session cookie in a browser that allows a user to access certain web page. Great for short-lived work days.
CIMS (Coordinated Incident Management System)
-response tools
-Situation report
-Action plan
-Resource request
-Incident report
EUA???????
RBAC (Role-Based Access Control)
-users are granted access to resources based on their role in the company
-Aid with the principle of least privilege
-TALK ABOUT ENTITLEMENTS AND THE PRIVILEGES MAPPED TO POWERBI AND DEVOPS |
|
|
Misc.
What is a threat, vulnerability, exploit, and mitigation?
Vulnerability: Weak point of the network that can compromise the security of the network
Exploit: Refers to a tool that can be used to find a vulnerability in a network
Threat: Refers to a person or a program that uses exploits and vulnerabilities to break into the network
Mitigation Technique: Refers to a tool or a technique that can be used to protect the network or weak points of the network |
Vulnerabilities, Exploits and Threats examples
-Weak points of the network that can be used to break into the network
-Tools that can be used to find other weak points
-Persons or programs that break-in, destroy, steal or modify something without permission.
-Tools and techniques that can be used to fix weak points.
ISO Model
Application |
Network process to application |
Presentation |
encryption and decryption |
Session |
Interhost communication |
Transport |
Reliable delivery of segments between points on a network |
Network |
Addressing routing |
Data Link |
Reliable direct P2P data collection |
Physical |
Direct P2P connectoin |
Ansible
Modules |
The packages that are sent to remote machines |
Executables |
Playbooks |
are the language by which Ansible orchestrates |
Inventories |
file that describes hosts and groups in ansible |
|
|
|