Enhance Application Security Capabilities

CompTIA Security+ SY0-701 — Domain 11

🌐 DNS, Directory Services & SNMP Security

  • DNSSEC: Adds cryptographic signatures to DNS records to protect against spoofing and poisoning. You can learn more about DNSSEC on Cloudflare.
  • Split DNS: Uses separate internal and external DNS views to limit exposure.
  • Sinkholing: Redirects malicious traffic to non-routable IPs for analysis.
  • LDAP over SSL (LDAPS): Encrypts directory queries to prevent credential leakage.
  • SNMPv3: Replaces SNMPv1/v2 with authentication, encryption, and access control features. Learn more about SNMPv3 on Cisco.

🔐 Secure Application Protocols

  • HTTPS: Encrypts HTTP traffic using TLS to ensure confidentiality and integrity. More details about HTTPS on Let's Encrypt.
  • SMTPS, POP3S, IMAPS: Secure mail protocols for client-server email communications.
  • REST APIs: Use OAuth, tokens, and HTTPS for secure stateless API access.
  • SOAP APIs: Often leverage WS-Security standards for integrity and authentication.

📂 Secure File, Email & Video Services

  • SFTP / SCP / FTPS: Encrypt data in transit to avoid man-in-the-middle attacks during transfers.
  • S/MIME / PGP: Provides email confidentiality, integrity, and non-repudiation. Learn more about S/MIME on DigiCert.
  • Secure Video: Stream via RTSP over TLS or HTTPS to prevent eavesdropping.

📧 Email Security Best Practices

  • SPF: Prevents spoofing by verifying sending IPs. Learn more about SPF on SPF Record.
  • DKIM: Adds digital signatures to email headers for sender validation.
  • DMARC: Combines SPF and DKIM policies to enforce domain-level protections.
  • Filtering: Quarantines and flags suspicious content or links.
  • Mail gateways: Act as a perimeter defense, integrating AV, spam filtering, and DLP.

🛠️ Secure Coding Practices (Reinforcement)

  • Input Validation: Reject unexpected inputs with allow-lists. More about input validation on OWASP.
  • Output Encoding: Prevent XSS and injection attacks by escaping user-supplied content.
  • Proper Error Handling: Avoid exposing stack traces or internal logic to users.
  • Memory Safety: Enforce bounds checking and prevent race conditions or leaks.
  • Static/Dynamic Code Analysis: Tools like SAST and DAST detect issues early in the SDLC.