10.3 Security Architecture Flashcards

Introduction to Cybersecurity Architecture and Infrastructure

1
Q

What is cybersecurity architecture?

A

The design, structure, and implementation of security measures to protect an organization’s digital assets from unauthorized access, data breaches, and cyberattacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does cybersecurity architecture involve?

A

Strategic planning and deployment of security solutions across networks, systems, applications, and endpoints to mitigate risks and ensure robust defense mechanisms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is cybersecurity infrastructure?

A

The underlying framework of hardware, software, networks, and resources that make up an organization’s IT environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the role of cybersecurity infrastructure?

A

Integrating security protocols, technologies, and practices into the IT framework to fortify defenses, detect and respond to threats, and maintain the integrity and availability of critical assets and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the key goals of cybersecurity architecture and infrastructure?

A

To safeguard sensitive data, mitigate risks, and ensure the confidentiality, integrity, and availability of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why should security be integrated into architecture from the beginning?

A

To prevent costly retrofits, enhance resilience, mitigate risks, support compliance, and foster trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is one advantage of integrating security from the outset in system design?

A

It prevents costly retrofits by avoiding the need for complex, time-consuming, and expensive rework.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does integrating security into architecture enhance resilience?

A

By creating a strong foundation that equips systems to withstand attacks and maintain functionality, even in the face of evolving cyber threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does early integration of security help mitigate risks?

A

It allows organizations to identify and mitigate risks early in the development process through thorough risk assessments and appropriate controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does embedding security into architecture support compliance?

A

It helps organizations more easily meet regulatory requirements and industry standards for protecting sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What role does security play in fostering trust?

A

Prioritizing security from the start demonstrates an organization’s commitment to protecting sensitive information and maintaining trust with customers, partners, and stakeholders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the principles of “Secure by Design” and “Secure by Default”?

A

“Secure by Design” focuses on integrating security from the start, while “Secure by Default” ensures products are secure out of the box without needing user intervention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does CISA’s “Secure by Design” principle emphasize?

A

Creating architecture and infrastructure with security in mind from the beginning to enhance security across critical sectors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How is integrating security into architecture like laying a strong foundation for a building?

A

It ensures stability, resilience, and longevity in the system, similar to how a solid foundation ensures the durability of a building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Infrastructure as Code (IaC) is a

A

practice that allows organizations to manage and provision IT infrastructure through code rather than manual processes. It involves writing configuration files or scripts to automate the deployment, configuration, and management of infrastructure components, such as virtual machines, networks, and storage resources. Understanding IaC is crucial for cybersecurity professionals as it enables consistent and reproducible infrastructure deployments while enhancing security and compliance.

Key Points:
- Automation: IaC automates the provisioning and configuration of infrastructure, reducing the likelihood of human error and ensuring consistency across environments.

  • Scalability: By treating infrastructure as code, organizations can easily scale resources up or down to meet changing demands, improving agility and cost-effectiveness.
  • Security: IaC promotes security best practices by allowing security controls to be codified and applied consistently across all infrastructure deployments.
  • Auditing and Compliance: With IaC, organizations can track changes to infrastructure configurations, maintain audit trails, and enforce compliance requirements more effectively.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is serverless computing?

A

A cloud computing model where cloud providers manage the allocation and provisioning of server resources, allowing developers to focus on code without managing infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does “serverless” imply in serverless architectures?

A

It means developers don’t need to manage the underlying servers, though servers are still involved and managed by the cloud provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Function-as-a-Service (FaaS)?

A

A model where applications are broken into smaller functions that are executed in response to events, such as HTTP requests or database changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How does serverless computing provide scalability?

A

It automatically scales resources based on demand, making it highly scalable and cost-efficient for applications with unpredictable workloads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What operational benefit does serverless computing offer?

A

It reduces operational overhead by eliminating the need to provision and manage servers, simplifying deployment and maintenance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are some security considerations in serverless environments?

A

Securing function code, managing access controls, implementing strong authentication and authorization, encryption, and monitoring security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What example highlights the importance of security in serverless computing?

A

Cybersecurity teams need to protect sensitive data and functions with strong authentication, authorization, and encryption, while monitoring for vulnerabilities and unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a key takeaway for security in serverless computing?

A

Serverless computing offers scalability and operational efficiency but requires robust security measures to defend against potential threats and vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Microservices architecture is a

A

software development approach where applications are composed of small, independent services that communicate with each other through well-defined APIs. Each microservice is responsible for a specific business function and can be developed, deployed, and scaled independently. Understanding microservices architecture is essential for cybersecurity professionals as it introduces new security considerations and challenges in distributed and decentralized environments.

Key Points:
- Decomposition: Microservices break down applications into smaller, loosely coupled services, enabling teams to develop and deploy components independently, improving agility and time-to-market.

  • Scalability: Microservices architectures allow organizations to scale individual services based on demand, providing flexibility and cost-efficiency for applications with varying workloads.
  • Fault Isolation: Isolating services minimizes the impact of failures, improving the resilience and reliability of applications in distributed environments.
  • Security Challenges: Microservices introduce security challenges such as securing inter-service communication, managing access controls, and ensuring data privacy and integrity across distributed components.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is cloud computing?

A

Cloud computing refers to the delivery of computing services, including servers, storage, databases, networking, software, and more, over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

How has cloud computing transformed IT resource management?

A

It has introduced scalability, flexibility, and cost-efficiency, allowing organizations to dynamically deploy and manage IT resources over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the fundamental shift cloud computing represents?

A

It shifts from traditional on-premises data centers to a dynamic, scalable model that provides computing services via the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Why is cloud computing considered more cost-efficient?

A

Cloud computing allows organizations to pay for resources as they use them, avoiding the need for large upfront investments in hardware and infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

How does cloud computing provide scalability?

A

Cloud providers offer the ability to automatically scale resources up or down based on demand, ensuring optimal performance without over-provisioning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are the key benefits of cloud computing?

A

Scalability, flexibility, cost-efficiency, and the ability to access resources over the internet from anywhere.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are two pivotal considerations when adopting cloud computing?

A

Security and compliance, as cloud environments must be protected against threats and adhere to regulatory requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is the responsibility matrix in cloud computing?

A

It outlines the division of security responsibilities between the cloud service provider (CSP) and the customer, based on the shared responsibility model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are the CSP’s main responsibilities in the responsibility matrix?

A

The CSP is responsible for securing the physical environment, underlying infrastructure, virtualization software, and the software used to deliver cloud services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What are the customer’s responsibilities in the responsibility matrix?

A

The customer is responsible for securing their data, applications, access controls, implementing security controls, and ensuring compliance with regulations.

35
Q

Why is the responsibility matrix important in cloud computing?

A

It clarifies security responsibilities, ensures accountability, mitigates risks, and helps avoid misunderstandings.

36
Q

How does the shared responsibility model differ between IaaS, PaaS, and SaaS services?

A

The specifics of security responsibilities vary based on the service model used (IaaS, PaaS, SaaS), with the CSP handling more of the infrastructure in IaaS, while customers handle more in SaaS.

37
Q

What is the role of the CSP in the shared responsibility model for AWS, Azure, and GCP?

A

For AWS, Azure, and GCP, the CSP manages the physical infrastructure and foundational services, while customers secure their data, applications, and configurations.

38
Q

Give an example of CSP and customer responsibilities in the shared model.

A

The CSP manages the physical and network infrastructure, while the customer is responsible for securing data, applications, and access controls within the cloud environment.

39
Q

What is a hybrid cloud environment, and why is it used?

A

A hybrid cloud environment combines on-premises infrastructure with public and private cloud services, offering flexibility, scalability, and addressing security and compliance requirements.

40
Q

What are key security challenges in hybrid cloud environments?

A

Key challenges include data sovereignty and compliance, seamless integration, identity and access management (IAM), and ensuring data protection through encryption.

41
Q

Why is data sovereignty important in hybrid cloud environments?

A

Organizations must ensure that data in both on-premises and cloud environments complies with data protection regulations and industry standards.

42
Q

How should organizations manage integration and identity in hybrid clouds?

A

They should focus on seamless integration between environments and implement strong IAM solutions to manage user identities and access permissions.

43
Q

How can organizations protect data in hybrid cloud environments?

A

Encrypt data both in transit and at rest to mitigate risks, particularly when data moves across multiple networks.

44
Q

Why are third-party vendors important in cloud computing, and what risks do they introduce?

A

Third-party vendors provide specialized services but introduce security risks, including data protection, compliance, and incident response challenges.

45
Q

What is due diligence when managing third-party vendors?

A

Conducting thorough assessments of a vendor’s security practices, certifications, and compliance with industry standards to ensure they meet security requirements.

46
Q

What should be included in contractual agreements with third-party vendors?

A

Contracts should clearly define security responsibilities, data protection requirements, incident response expectations, and compliance monitoring.

47
Q

Why is ongoing monitoring essential for third-party vendors?

A

Continuously monitor the vendor’s security posture to ensure compliance with agreements and mitigate any emerging risks.

48
Q

How should organizations manage incident response with third-party vendors?

A

Collaborate to develop and test incident response plans, ensuring coordinated responses to potential security breaches.

49
Q

What does the NSA recommend regarding third-party vendors in cloud security?

A

Understand the shared responsibility model, ensure network segmentation, and manage third-party provider risks as part of cloud migration strategies.

50
Q

What key strategies should cybersecurity professionals understand to secure and optimize network infrastructure?

A
  • Physical Isolation: Separating critical systems from the broader network to prevent unauthorized access.
  • Air-Gapped Systems: Systems disconnected from external networks for high security.
  • Logical Segmentation: Virtual segmentation (e.g., VLANs) to isolate sensitive data and restrict access.
  • Software-Defined Networking (SDN): Centralized control of network traffic, offering flexible, automated, and dynamic security responses.
51
Q

What is Physical Isolation in the context of cybersecurity?

A

Physical Isolation refers to the practice of physically separating sensitive systems and networks from other networks, ensuring that the hardware hosting sensitive information is not connected to less secure networks.

52
Q

What is the primary benefit of Physical Isolation?

A

Physical Isolation helps mitigate the risk of cyber attacks by ensuring that if one network is compromised, the isolated network remains unaffected, thus protecting sensitive data.

53
Q

Why is Physical Isolation important for environments handling highly sensitive data?

A

It is crucial for protecting environments such as military operations, critical infrastructure, and financial systems from cyber espionage or sabotage, where the risk of attack is high.

54
Q

Give an example of Physical Isolation in practice.

A

A government agency might use physically isolated networks for handling classified information, ensuring no physical connection exists with the internet or external networks. Another example is a data center dedicated solely to processing classified documents, separated from external networks.

55
Q

How does Physical Isolation apply to industrial control systems?

A

A standalone computer used for programming industrial control systems might be physically isolated from the company’s general office network to prevent potential security breaches.

56
Q

What are air-gapped systems in cybersecurity?

A

Air-gapped systems are completely isolated from other networks, including the internet, with no wireless interfaces enabled (such as WiFi or Bluetooth), creating a literal “air gap” between the system and potential cyber threats.

57
Q

What is the primary benefit of using air-gapped systems?

A

The primary benefit is protection against remote cyber attacks, ensuring that the only way to access the system is through physical presence, which makes them highly resistant to online threats.

58
Q

What is a real-world example of an air-gapped system?

A

A computer holding sensitive national security information that never connects to the internet or external devices, ensuring its contents remain confidential and tamper-proof.

59
Q

What incident highlighted the limitations of air-gapped systems?

A

The Stuxnet attack, where malware infiltrated Iran’s air-gapped nuclear facilities through infected USB drives, demonstrated that air-gapped systems are not immune to cyber threats.

60
Q

In what type of environment are air-gapped systems commonly used?

A

They are used in secure facilities where sensitive technology is developed or where data integrity and confidentiality are of utmost importance, such as in national security or intellectual property protection.

61
Q

What is logical segmentation in network security?

A

Logical segmentation involves creating virtual boundaries within a network using technologies like VLANs and firewall policies to segment the network into smaller, logically separate subnetworks.

62
Q

How does logical segmentation enhance security?

A

By limiting the spread of malicious activities and reducing the attack surface, it prevents attackers who compromise one segment from gaining automatic access to other segments.

62
Q

What is the difference between macro segmentation and micro segmentation?

A

Macro segmentation divides a network into large, distinct zones (e.g., separating marketing from HR), while micro segmentation further breaks down these zones to control access between individual systems within the same zone.

62
Q

What are the benefits of logical segmentation?

A

It helps minimize the lateral movement of threats, contains potential breaches to limited segments, reduces overall risk exposure, and allows for finer control over traffic flow and access rights.

63
Q

Provide an example of logical segmentation in a corporate network.

A

HR, Finance, and R&D departments can be segmented into different VLANs to ensure that sensitive information in the Finance VLAN is not accessible to users in HR or R&D VLANs unless explicitly permitted.

64
Q

What organization publishes best practices on micro segmentation?

A

IAN, a security research organization, publishes best practices on micro segmentation and other security measures.

65
Q

Software-Defined Networking (SDN) is an

A

approach to networking that uses software-based controllers or application programming interfaces (APIs) to direct traffic on the network and communicate with the underlying hardware infrastructure.

  • It separates the network’s control plane (making decisions about where traffic is sent) from the data plane (actually sending packets to the selected destination).
  • It allows for more agile and flexible network management, including dynamic provisioning and scaling.
  • Provides a more flexible and efficient way to manage and secure network resources.
  • Allows for dynamic, automated, and programmable network configurations, enhancing the network’s responsiveness to changing security needs and conditions.
  • Can be used to implement and manage logical segmentation more efficiently, automate security policies, and adapt to changing network conditions or threats dynamically.
66
Q

A nuclear power plant may use ___ for its control networks, ensuring that no external cyber attack can directly affect the nuclear reactors’ control systems.

A

an air-gapped system

67
Q

On-Premises vs. Cloud Environments

A

On-Premises Environments:
These refer to situations where an organization’s data and applications are stored and run on servers physically located within the organization’s property.
- Advantages: Complete control over the infrastructure, data, and security measures. It is often preferred for highly sensitive data requiring strict regulatory compliance.
- Challenges: Requires significant capital investment and skilled personnel to manage the infrastructure and security.

Cloud Environments:
Involves storing data and applications on servers located off-premises, typically managed by a third-party provider.
- Advantages: Scalability, flexibility, and cost-effectiveness, as resources can be quickly adjusted to meet demand without the need for upfront hardware investments.
- Challenges: Relies on the cloud provider’s security measures, and there may be concerns about data sovereignty and privacy.

68
Q

A company needs to store large amounts of customer data and frequently runs data analytics to gain insights. They decide to use Amazon Web Services (AWS) to manage their data storage and analytics needs. This allows them to scale their storage capacity based on usage and take advantage of advanced analytics tools without purchasing additional hardware.

This company is using an on-premises environment.

True or False:

A

False

69
Q

Centralized vs. Decentralized Architectures

A

Centralized Architectures:
Having a single point of control and management simplifies the deployment of policies and security measures.
- Advantages: Easier to manage and secure due to the concentration of resources and control.
- Challenges: Can create a single point of failure. If the central node is compromised, the entire network can be at risk.

Decentralized Architectures:
Distributing control and management across multiple nodes or locations.
- Advantages: Enhanced resilience and redundancy; the compromise of a single node does not necessarily endanger the entire network.
- Challenges: Can be more complex to manage and secure, requiring sophisticated coordination and security policies.

70
Q

A financial institution stores all its transaction records and performs all its data processing in a single data center. This approach allows the institution to have tight control over all data and processing tasks, with a single point of management and security.

This institution is using a centralized environment.

True or False:

A

True

71
Q

Containerization and Virtualization

A

Containerization is a lightweight form of virtualization that packages an application and its dependencies into a single container that can run on any computing environment.
- Advantages: Provides a highly efficient, isolated environment for applications, improving scalability and reducing conflicts between running applications.
- Challenges: Containers share the host system’s kernel, which can introduce security vulnerabilities if not properly managed.

Virtualization involves creating virtual instances of physical hardware (servers, storage devices, network devices) to run multiple operating systems and applications on a single physical hardware.
- Advantages: Maximizes resource utilization, enhances flexibility, and isolates environments, which can improve security.
- Challenges: Requires careful management to avoid security oversights in the virtual environment, such as neglecting to secure the hypervisor.

72
Q

Each architectural model offers distinct implications for cybersecurity.

A
  • On-premises environments offer control at the cost of higher management requirements, while cloud environments offer flexibility but depend heavily on the security measures of third-party providers.
  • Centralized architectures simplify management but create potential single points of failure, whereas decentralized architectures offer resilience at the expense of increased management complexity.
  • Both containerization and virtualization offer efficient ways to deploy and manage applications, with their unique security considerations that must be carefully addressed.
73
Q

A software development team uses virtual machines to run different applications on a single physical server. Each machine operates its own complete operating system, which allows the team to isolate different applications and manage resources more effectively.

The team is using containerization.

True or False

A

False

74
Q

What does the Internet of Things (IoT) encompass?

A

The IoT includes a vast network of interconnected devices, such as smart home appliances and industrial sensors, that communicate and exchange data over the internet.

75
Q

What are common cybersecurity challenges associated with IoT devices?

A

IoT devices often lack robust security features, making them vulnerable to attacks, serving as entry points for network breaches, data theft, or as part of botnets for DDoS attacks.

76
Q

What strategies can enhance IoT security?

A

Implementing strong authentication and encryption, performing regular software updates, network segmentation, and adopting a zero-trust security model can improve IoT security.

77
Q

What does a zero-trust security model entail for IoT devices?

A

The zero-trust model ensures that devices are not trusted by default, even if they are inside the network perimeter, requiring continuous verification and validation.

78
Q

Why is regular software updating important for IoT security?

A

Regular updates help patch vulnerabilities and protect against newly discovered threats, reducing the risk of exploitation.

79
Q

Industrial Control Systems (ICS) / Supervisory Control and Data Acquisition (SCADA)

A

ICS and SCADA systems are critical in managing industrial processes across various sectors, including manufacturing, energy, and water treatment. These systems monitor and control physical processes through direct interaction with machinery and sensors.

Cybersecurity Challenges:
Attacks on ICS/SCADA can have catastrophic consequences, including physical damage and disruption of critical services. These systems were often designed without internet connectivity in mind, making them vulnerable when networked.

Strategies for Mitigation: Enhancing physical security, segmenting networks, and implementing intrusion detection systems are crucial. Regularly updating and patching systems, along with conducting vulnerability assessments, are also vital practices.

80
Q

Real-Time Operating Systems (RTOS)

A

RTOS are used in environments where time-critical operations are essential, such as in medical devices, automotive controls, and embedded systems. They prioritize high availability and predictability.

Cybersecurity Challenges: The real-time requirements and often limited resources of devices running RTOS can make traditional security measures difficult to implement. Vulnerabilities in these systems can lead to life-threatening situations.

A few years ago, vulnerabilities were discovered in pacemakers, allowing malicious actors to hack into them, potentially sending shocks, shutting them down, or altering their functions. This posed serious physical risks to users. Such incidents highlight the critical need for robust security in medical devices, as public awareness of these risks grows.

Strategies for Mitigation: Employing secure coding practices, ensuring data encryption, and conducting thorough testing can mitigate risks. Security must be considered from the design phase to address the unique constraints of RTOS environments.

81
Q

Embedded Systems

A

Embedded systems are specialized computing systems that perform dedicated functions within larger mechanical or electrical systems, such as appliances, vehicles, and medical devices.

Cybersecurity Challenges: These systems are often designed for specific tasks with efficiency in mind, not security, making them susceptible to attacks that can compromise the larger systems they’re part of.

Strategies for Mitigation: Key strategies include adopting a secure development lifecycle, incorporating hardware-based security features, and ensuring secure communication protocols. Regular security assessments and updates are also essential to protect against emerging threats.