Secure Staging Deployment Concepts

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

33 hours 23 minutes
Video Transcription
Hello and welcome back to decide. Berry 2019 Comp. Tia Security Plus Certification Preparation Course.
We continue our discussion on Marginal with three, which is titled Domain three.
Architecture and Design.
We have a brand new objective, which is 3.4 with seven estates. Explain the importance of cure staging deployment concepts
Surprising enough. The first item on our agenda is a pre assessment quist. In fact, it's a true or false statement, and it reads as follows.
San Boxing is the isolates of application for testing and or patching to determine if it's safe and stable for the intendant environment.
Is this true or false?
In this case, if you selected true, you're absolutely correct.
As stated earlier, we have a brand new objective, which is 3.4, which simply states explain the importance of secure staging deployment concepts.
We have some additional sup
categories that fall within this particular parameter, such as sand, boxing
We also take a look at development
test staging as well as production.
In addition, we're going to take a look at secure, baseline and and actually define exactly what that's all about.
Integrity, measurement as well,
so further do Let's begin by taking a look at a brief introduction.
A secure staging environment clues multiple environments and typically includes different systems used for each stage.
A continent production that were must be available 24 7 365 days to maximize overall performance, reduce costs and lessen risk
to allow. With the availability requirements of a production network, you need to use none production networks to test your configuration changes, software upgrades and other changes to an environment. After you validate changes in a nun production environment or even better in multiple, none production environments,
you can proceed with the changes in your production environment,
so the first item will take a look. It's called San Boxing, Simply put Sandbox and is the isolation of an application for testing and or patching to determine if it's safe and stable for the intent environment.
Think of a sandbox like kids do a place to play in. When kids play in the sandbox, they aren't thinking about anything beyond exploring, experimenting and having fun. However, in the RTM vomit, a sandbox is considered an environment where you admission test things.
For example, if you're thinking about the point, a major application upgrade
Toe aqui application. You might try that in a sandbox first, if you hurt. If you're brand new to the network tool, then you're evaluating you might want also sandboxes. Well, you like perhaps a brand new, too.
Let's turn our ticket or discussion of an environment as a future security plus certified professional. You must be familiar with a different environments. Outline. You should be able to pick the appropriate environment based on a given scenario. For example, if you want to perform a test in an environment that most closely resemble production, which environment would you use?
That's a question that you might be acts or something similar to that on the exam, so that further, let's take a look at the topic of environments.
First, they want to take a look is called Development.
Now at the development stays the requirements for the application on established and it's confirmed that the application meets the intendant minutes need before the actual coding begins
doing it. Testing the testes Days 30. Test the application for any errors that could result in a security vulnerability,
doing a stage and stage. It's a quality assurance test to verify that the cold functions as intended.
Then we have production in the production states, the application released to be used in its actual settings.
This brings us to secure baseline. We think about Secure Baseline. Is they set a basic security objective that must be met by inning given service or system.
Let's not turn out to your discretion off integrity measurements.
When we look at integrity measurement, it is an at a station mechanism designed to be able to convince a remote party external to the coding team that an application running on Lee, a set of known and approve executed bols.
At this point time, we have our post assessment quiz, and it reads as follows.
A software vendor recently developed a pack for one of his application
before releasing the past the customers to bend the knees to test it in different environments. Which of the following solution provides the best method to test a patch in different environments? Is a a baseline image?
Is it b? Bring your own device? Is it see a sandbox or change management?
In this case, if you should let to see a sandbox, you absolutely correct because the sandbox provides a simple method of testing patches and will be used with snapshots so that the Birch machine can be easily reverted to its original state.
At this point town, we have a key takeaways. From this particular video presentation.
We learned that sandboxes is the isolation of application for testing and or patching to determine if it's safe and stable for the intended environment.
We also learned a secure base line is a set of basic UT objective, which must be met by any given service or system.
We also learned staging
stage is a quality surest test to verify the cold function as intended.
We learned that at the development stage of requirements for the application of established and is confirmed, the application meets Tintin. It been his knees before the actual coding begins
related to testing, Stay stern a test application for any errors that could result in a security vulnerability
in our upcoming video. We'll continue our discussion by taking a look at a brain new objective 3.5, where we have to explain to security implications off embedded systems. And again, I look forward to seeing a very next video
Up Next
CompTIA Security+

Interested in the cybersecurity industry? The CompTIA Security+ is the gold standard for those looking to enter the cybersecurity industry. Join thousands of professionals who have gained this certification through this course and launched their careers in information security.

Instructed By