====== Domain 7: Security Operations ====== **Intrusion Prevention System (IPS)** - A solution that monitors the environment and **automatically takes action** when it recognizes malicious attempts to gain unauthorized access. **Intrusion detection system (IDS)** -- A solution that monitors the environment and **automatically recognizes malicious attempts** to gain unauthorized access. **Least privilege** -- The practice of only granting a user the minimal permissions necessary to perform their explicit job function. **Uninterruptible power supplies (UPS)** -- Batteries that provide temporary, immediate power during times when utility service is interrupted. **Striping** -- RAID technique; writing a data set across multiple drives **Parity bits** -- RAID technique; logical mechanism used to mark striped data; allows recovery of missing drive(s) by pulling data from adjacent drives. **Need-to-know** -- Primarily associated with organizations that **assign clearance levels to all users and classification levels to all assets**; restricts users with the same clearance level from sharing information unless they are working on the same effort. Entails compartmentalization. **Configuration management (CM)** -- A formal, methodical, comprehensive process for **establishing a baseline** of the IT environment (and each of the assets within that environment). **Change management** -- A formal, methodical, comprehensive process for **requesting, reviewing, and approving changes** to the baseline of the IT environment. **Job rotation** -- The practice of having personnel become familiar with multiple positions within the organization as a means to reduce single points of failure and to better detect insider threats. **Media** -- Any object that contains data. **Separation of duties** -- The practice of ensuring that no organizational process can be completed by a single person; forces collusion as a means to reduce insider threats. **Patch** -- An update/fix for an IT asset.