Architect Interview Summary
Veritas:
- Managing the security posture for 3 veritas products: ASP, AMP & ITA.
ASP:
Qualys Deployment | |
Qualys and JIRA integration | |
SRE - Grafana Dashboards | |
Journaling Automation | Doker Image, GitLab CI/CD, Terraform |
ASP FedRamp
Sentinel Implementation | |
Defender for Cloud | |
PIM Implementation | |
Image Hardening |
AMP & ITA
Vulneralability Management | Qualys deployed on AKS Clusters, Qualys and JIRA integration |
Web Application Firewall | Analyse WAF Logs, Creating Workbooks |
Sentinel Implementation | Adding Data Connectors, Analytics Rules, Automation Playbooks |
Azure Policies |
PCI HIPAA
Scoping
: Office Location, Data Center Location, App List, Asset List (App, DB, Storage), Diagrams (Architecture, Data Flow, Network), External IP address listNetwork
: Rules, Configuration, Ports, Protocols, Network Access List (I&O), Permissions, Backups, Change Management, Annual Reports, Sample LogsConfiguration Management
: User Access Review, User List, Roles List, WAF, Device Encryption, Controls Implementation (for HTTP, FTP, Telnet, SSL/TLS, SSH), Configruation ScanData Encryption at Rest
: Storage Location, Retention, Encrpytion Details, User List (with access), Identify Storage hold Confidential Data, Data Protection Methods (Encrpytion, Hashing, Tokenization, Hasing, etc), Key ManagementData Encryption in Transit
: Certificates, End-to-End TLS, Public and Private CommunicationAnti-Malware
: Microsoft Defender for Cloud, Defender AgentApplicatino Security
: Code Review Process, Patch Levels, Upgrade Process, Advisory Alerts, Secure Software Developement Policy (CIS Benchmark, OWASP), Test Data Generation, Sample Change Requests, WAF, Duties Segregation, Logical Seperation between Prod and Non-Prod, Secure Code TrainingLogical Acces
: Password Encrpytion, User List, Permissions and its Justification, Process of User CRUD, Password Complexity, MFAPhysical Security
: Physical Locations, User CRUD, Visitor Access, Physical Media, POS DevicesLogging and Monitoring
: Sample Alerts, FIM, Event Logs, Moinitoring Systems, Audit Logs, Network Time Protocol, Central SysLog Server, SIEMSecurity Testing
: Internal & External Pen Test Methods and Reports, Vulnerability Scan Reports and Assessments (Annual, Quarterly), Configuration Assessment ReportHuam Resources
: Information Security Policy, Information Security Awareness Training Material, Employee Background ChecksPolicies and Procedures
: Organization Information Security Policies, Organizational Chart and their roles, Emergency Access Evidence, Technology used for Remote Access. Ex. VPN, Data movement policy, Facility Repairs3rd Party Management
: List, Compliance Documents, Incident Response Plan, Breach Notification Handling ProcessBusiness Continuity Plan/Disaster Recovery
: BCP/DR Plan, DR Test Results, Data Backup Procedures, Enterprise GovernanceRisk Assessment
: Risk Assesment Methodology and ReportsGovernance & Compliance
: Seperation of duties between Operation and Security Teams
FedRamp
- System Security Plan (SSP)
- Security Assessment Plan (SAP)
- Security Assessment Report (SAR)
- Plan of Action and Milestones (POA&M)
- Continuous Monitoring Strategy & Plan
- Role-based Training
- Implement NIST Security Controls
- Third-Party Assessment Organization (3PAO)
- Authorization Package
- Incident Reporting
- FedRAMP Package Repository
- Periodic Assessments
- Engage with FedRAMP PMO (Program Management Office)
- Policies and Procedures
This post is licensed under CC BY 4.0 by the author.