05 Flashcards

1
Q

____________ refers to the cybersecurity policies, best practices, controls, and technologies used to secure applications, data, and infrastructure in cloud environments

A

Cloud Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_____________ is the act of complying with regulatory standards of cloud usage in accordance with local, national, and international laws

A

Cloud Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A ___________ conforms to one or more specific sets of security and privacy standards

A

Compliant Cloud Environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

__________ Under this model, cloud providers are responsible for managing some aspects of security. While the burden of securing most facets of resources that end users deploy in the cloud lies with end-users

A

Shared Responsibility Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The _____________ requires “reasonable security” to protect sensitive data

A

General Data Protection Regulation (GDPR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the general procedures for GDPR?

A

Define compliance rules
perform compliance audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The ______________ is European legislation that was designed to unify and strengthen the data protection laws of member states across the European union

A

GDPR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the definitions for each GDPR regulation?
Data Residency
Data minimization
Storage limitations
right of access
right of erasure

A

Organizations may only process and store their personal data within the EEA and a limited number of other permitted countries unless they consent otherwise

Organizations should only collect and store personal data that is necessary pertaining to the organization requirements

Organizations must not retain this data for any longer then necessary

organizations must meet requests from individuals to access the personal data held about them

Organizations must meet requests from individuals to have there personal data erased

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_______________ is one of the few examples of governmental regulation that specifically covers data processed and stored in the cloud

A

Federal Risk and Authorization Management program (FEDRAMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

__________ is a streamlined version of _________ but specifically adapted to cloud environments

A

FEDRAMP FISMA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

______________ is a library of requirements categorized according to the risk to data, created from FEDRAMP

A

NIST SP 800-53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

______________ series is a family of international standards that provide best practice recommendations on how to protect information systems from a range of threats

A

ISO 27000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_________ The core standard within the series, providing a general set of controls for managing information security

A

ISO 27001

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_________ An additional set of security controls for cloud computing implementations

A

ISO 27017

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_________ A set of privacy controls for managing personal data in cloud-based environments

A

ISO 27018

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_________________________ is a security-oriented standard that applies to any organization that accepts or processes card payments. It specifies 12 requirements that must be met to protect payment card transactions and cardholder details

A

Payment card industry data security standard (PCI DSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are each of the challenges when it comes to cloud compliance?

Certifications and Attestations

Data Residency

Cloud Complexity

Different Approach to security

A

Making sure the cloud environment is up to date on certifications and that they are monitor data protection laws and change as they do

Working within multiple regions and keeping track of all their data laws can be hard so ensuring their on top of that is important

The cloud is very complex and has lots of moving parts so it can be hard to come up with a protection strategy

Traditional security methods wont work in the cloud so a new approach is required with more focus on configuration management and individual workload protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are some of the best practices to follow to help meet regulatory requirements?

Encryption
Privacy By default
Principle of least privilege
Zero Trust
Well-architected frameworks

A

encrypting data both at rest and in transit and ensuring good secure key management practices

privacy should form the basis for system design and process activities to make integrating compliance easier

Organizations should only grant users access to only the data and resources that are needed to carry out their specific duties

Organizations should use well-trusted/secure frameworks and follow their guiding principles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are each of the Challanges when it comes to cloud computing?

A

Certifications and Attestations

Data Residency

Cloud Complexity

Different Approach to security

20
Q

What are some of the best practices to follow to help meet regulatory requirements?

A

Encryption
Privacy By default
Principle of least privilege
Zero Trust
Well-architected frameworks

21
Q

_________________ encompasses the technologies, policies, services, and security controls that protect any type of data in the cloud from loss, leakage, or misuse through breaches, exfiltration, and unauthorized access

A

Cloud Data Security

22
Q

_______________ is a shared responsibility between the csp and its customers

A

Cloud Data Security

23
Q

______ helps protect sensitive data by tagging it, it is another best practice and is part of an organization’s overall security strategy that helps sensitive information from being leaked or stolen.

A

Data Loss prevention tool DLP

24
Q

________ refers to the state of data when it is stored, rather then moving from one place to another or loaded into memory for use by a software program

A

Data at rest

25
Q

What are the best practices for protecting data at rest?

A

Data classification, data encryption, data federation, hierarchical password protection

26
Q

___________ is data moving from one place to another, such as when it is transmitted over the internet

What are security measures for it?

A

Data in motion

authentication, access controls

27
Q

_______ is a hybrid approach of symmetric and asymmetric encryption

A

PKI

28
Q

__________ is meant to protect data as it moves to and from cloud-based applications, as well as when it is stored on the cloud network

A

Cloud Encryption

29
Q

What are some of the challenges with cloud encryption?

A

Time and cost
Data loss
key management

30
Q

A _____________ encrypts network traffic before it leaves the source computer and then decrypts the traffic on the destination computer

A

VPN

31
Q

What are the most popular tunneling protocols?

A

Layer 2 tunneling protocol L2TP
Secure socket tunneling protocol SSTP
OpenVpn
Internet key exchange version 2 IKEv2
point-to-point tunneling protocol PPTP
Internet protocol security IPSEC

32
Q

________ is the process of reducing risk to cloud systems by establishing and maintaining secure configurations and identifying and mitigating other vulnerabilities

A

Cloud Hardening

33
Q

_________ an application or data that is allowlisted is not checked against DLP rules. It is explicitly permitted

A

Allow-listing

34
Q

__________ data that is prevented from leaving the network environment, as identified by keywords or other criteria. It is explicitly denied

A

deny listing/ block list

35
Q

____________ is a defense-in-depth cybersecurity approach that wraps layer upon layer of security around IT systems and data, significantly reducing the risk of data breaches

A

Cloud Network Segmentation

36
Q

___________ is a cloud security process that applies identity-based protection to workloads without any architectural changes to the networks.

A

Cloud Workload segmentation

37
Q

What are the three goals of IAM?

A

AAA
Authorization
Authentication
Accounting

38
Q

____________ is a common goal for security administrators. This practice allows users to authenticate one time and then access all resources for which they are authorized, without having to re-authenticate

A

Single sign-on

39
Q

When two or more factors are required, that is known as ____________

What are some of the factors of this?

A

Multifactor authentication

What you know
What you have
Who you are

40
Q

________________ widely used, strong security

A

L2TP

41
Q

________________ primarily used with Windows OS’s

A

SSTP

42
Q

________________ open-source, very strong security, slower

A

OpenVpn

43
Q

________________ open-source protocol, strong security, fast

A

IKEv2

44
Q

_________________ Older, poor security, should be avoided

A

PPTP

45
Q

_________________ Easily implemented, powerful, flexible

A

IPSec