1. Cloud Computing Concepts and Architectures - DONE Flashcards
Cloud Logical Model Definitions of Cloud Computing Cloud Service Models Cloud Deployment Models Reference and Architecture Models Cloud Security, Compliance Scope, and the Shared Responsibility Model Areas of Critical Focus in Cloud Security
What are the 4 layers of functionality and applicable security requirements? (traditional and cloud environments)
*Infrastructure layer -Infrastructure security
*Metastructure layer -Virtual environment security
*Infostructure layer -Data security
*Applistructure layer -Application and operating system security
What is the infrastructure layer comprised of?
What are the Security concerns surrounding the infrastructure layer?
In this layer, there are the servers, networking, and storage pools.
Describe the Metastructure layer and how it works.
2.What is the single biggest difference between the cloud and traditional IT
In this layer, you both configure and manage a cloud deployment of any type. It is within the metastructure logical layer that you build the virtual tools required for a virtual world (the cloud)
You’ll perform configuration in themanagement planethrough a graphical user interface (GUI), a command-line interface (CLI), or an API, depending on what the provider offers to interact with its infrastructure.
Want to add a new user for SaaS? You do it here. Want to set up a zero-trust network in IaaS? This is the place to do it.
Describe the Infostructure layer and its security concerns.
This is where the information and data reside. This could be file storage, databases—whatever. Security in this layer doesn’t really change; how you secure things may change, but the principles of data security remain the same.
Describe the Applistructure layer and its security concerns.
Applications and all of the services used to build and support them reside here. Your applications could be running on a Microsoft or Linux server of your own, or they could be running in technologies such as containers, microservices, or serverless networks.
If you take an image of a running system and migrate it into the cloud, nothing changes from a security perspective. In this scenario, operating systems will always need patches, and application security still applies as it always has.
As you start to take advantage of the new technologies the cloud offers, your security is likely to change dramatically.
The web server is part of the applistructure. “installing a firewall agent, that would occur at the applistructure layer.
What is the management plane?
It is part of the metastructure.
The element of a system that controls the management of infrastructure, platforms, applications, and resources through the use of API calls and web consoles
What should your main focus be on when you are migrating your application in a like-for-like fashion
Focus your efforts on the metastructure layer.
Nothing about your assessment of the application itself changes. The controls at the operating system are the same, as are the application security controls.
List the essential characteristics of the cloud.
- Resource pooling
- Rapid elasticity
- Broad Network Access
- On-Demand Self-Service
- Measured Service
Define Resource pooling
Resources (Computer, Network, Storage) are pooled and consumers are granted access.
Multitenancy - A consumer’s access to the pools is tightly isolated from that of other consumers, typically based on policies atthe provider’s side. (“ISO/IEC 17788 refers to multitenancy as a sixth essential characteristic.)
Define Broad Network Access
The service is available over a network (the Internet). There is no special requirement for direct physical connectivity or provider-supplied network connectivity.
e.g. manage an entire IaaS implementation via the browser on your cell phone.
Define Rapid Elasticity
It enables consumers to scale resources based on demand, often automatically.
Scaling up generally refers to using more powerful servers (such as a four-CPU configuration instead of two), whereas scaling out refers to adding more servers (for example, servers to a web farm to service requests).
In addition to adding capacity when demand increases, you need to be able to scale down when demand drops. This aspect is critical, because you don’t want to scale up to respond to a temporary increase in demand.
Define Measured Service
The measured service essential characteristic makes the cloud a pay-as-you-go model of computing: you’re simply charged for what you use.
Another term used in the CSA Guidance is “utility computing,” which is akin to how you consume electricity or water from a utility.
Define On-Demand Self-Service
You can provision resources on your own without human intervention on the provider’s side.
If your provider tells you that your ticket for a new server instance is very important to them and they will act on it in 48 to 72 hours, you’re being cloudwashed.
List the 3 service models of the cloud.
- IaaS
- PaaS
- SaaS
What is IaaS
IaaS is the underlying foundation that consists of the physical facilities and infrastructure hardware.
or
an IaaS system can be summarized as consisting of facilities (physical data centre), hardware (proprietary or standard), abstraction (virtualization), and orchestration (APIs)
What is a hypervisor?
The most commonly known form of virtualization is a virtual machine, which is generally synonymous with hypervisor (also called a virtual machine monitor (VMM)) technology.
Essentially, the hypervisor acts as the host and allows a single hardware server to host many virtual machines that are referred to as “guests.” The hypervisor is tasked with “tricking” the guest machines into thinking they are directly accessing the underlying hardware, but in reality, they are operating in an isolated virtual environment with their virtual hardware resources. (Put in a more polished way, the hypervisor is an abstraction layer that decouples the physical hardware from the guest operating system.)
What are the different types of hypervisor?
There are two types of hypervisors of note: Type 1 hypervisors are installed directly onto the physical server (such as VMware ESXi, Xen, or KVM), and Type 2 hypervisors are installed on top of the operating system already running on a server (such as VMware Workstation, VMware Workstation Player, or Oracle VM VirtualBox). I can’t imagine any cloud service provider using anything other than a Type 1 hypervisor.
The hypervisor used by the provider can have an impact on consumers and thus should be known in advance of provider selection. Not all hypervisors are created equal from performance and capability perspectives.
Define Orchestration (Iaas context)
The orchestration enables a controller to request resources from the pools of resources, and all this is automated through the use of APIs (mostly RESTful APIs).