10: Cloud & Virtualization Security Flashcards

1
Q

What are the three major cloud service models?

A

Infrastructure-as-a-service (IaaS), Software-as-a-service (SaaS), Platform-as-a-service (PaaS)

These models represent different levels of service and management in cloud computing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does Infrastructure-as-a-service (IaaS) provide?

A

Basic building blocks of a technology infrastructure

Customers can purchase and interact with virtualized computing resources over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary function of Software-as-a-service (SaaS)?

A

Access to a fully managed application running in the cloud

Users do not need to manage or control the underlying infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does Platform-as-a-service (PaaS) offer customers?

A

A platform to run applications developed by the customers themselves

It provides a framework for developers to create applications without worrying about the infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the public cloud deployment model.

A

Infrastructure accessible to any customers in a multitenant model

Public cloud services are provided over the internet and shared among multiple users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a private cloud?

A

Cloud infrastructure provisioned for use by a single customer

Offers greater control and security for sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What characterizes a community cloud service?

A

Shares characteristics of both public and private models; multitenant environment limited to a specific community

Designed for organizations with shared concerns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define hybrid cloud.

A

Cloud deployments that blend public, private, and/or community cloud services

Allows data and applications to be shared between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the shared responsibility model of cloud security?

A

Division of responsibilities between service providers and customers’ cybersecurity teams

Ensures both parties understand their security obligations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In an IaaS environment, what is the provider responsible for?

A

Security for everything below the operating system layer

The customer is responsible for everything above that layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What additional responsibility does a cloud provider take on in a PaaS environment?

A

Security of the operating system itself

This includes managing the underlying infrastructure and platform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In a SaaS environment, what is the cloud provider responsible for?

A

Security of the entire environment except for access control configuration and data choice

Customers must manage how they access and use the application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What should cloud customers understand to implement appropriate security controls?

A

Controls offered by providers and third parties

This includes how to maintain resource policies and ensure high availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

From a storage perspective, what should cloud customers consider?

A

Permissions, encryption, replication, high availability

Ensures data security and reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What network design considerations should cloud customers keep in mind?

A

Design of virtual networks with public and private subnets for appropriate segmentation

Helps in managing access and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What should customers do from a compute perspective in cloud security?

A

Design security groups to restrict network traffic and maintain instance security

Protects against unauthorized access and threats.