12.2 Cloud System Management Flashcards
_________, ________, and ________are new technologies that provide powerful solutions to some of the most difficult problems of infrastructure management.
Containers, infrastructure as code (IaC), and provisioners are new technologies that provide powerful solutions to some of the most difficult problems of infrastructure management.
_______ can be thought of as “lightweight VMs.”
Containers can be thought of as “lightweight VMs.”
_______ are tools that automatically configure VMs or containers for you
Provisioners are tools that automatically configure VMs or containers for you
Instead of manually logging into a machine and issuing commands like apt get, or editing configuration files
yourself, you can use a ______ to do this automatically.
provisioner
Instead of manually logging into a machine and issuing commands like apt get, or editing configuration files
yourself, you can use a provisioner to do this automatically.
____________ is the idea that the configurations for all of the VMs, containers, and networks in your deployment should be defined in text files, which you can use with provisioners to automatically recreate machines and networks whenever necessary.
Infrastructure as code (IaC) is the idea that the configurations for all of the VMs, containers, and networks in your deployment should be defined in text files, which you can use with provisioners to automatically recreate machines and networks whenever necessary.
What is the primary benefit to IaC?
The primary benefit to IaC is that everyone can see exactly how the network is configured by reading text files. These can be easily version controlled with tools like Git, Apple Time Machine, or Microsoft OneDrive.
________________________ is the concept of automatically updating machines on the network whenever your IaC files change.
Continuous Integration/ Continuous Deployment (CI/CD) is the concept of automatically updating machines on the network whenever your IaC files change.
What is the difference between secure configuration and secure architecture
SC is setting secure “rules” for individual machines and networks. Secure architecture is connecting these
individual machines and networks in safe ways.
SA can effectively mitigate the fallout of a breach.
But, the machines deployed according to that architecture must be securely configured in order for the architecture to fully deliver its security guarantees.
Important cloud security concepts include ________ and _______.
Important cloud security concepts include fault tolerance and redundancy.
True or False:
A fault tolerant system cannot keep running even if one or more components within the system fail.
False
A fault tolerant system can keep running even if one or more components within the system fail.
Network Redundancy
If one system or component is lost or compromised, a redundant system or component can step in and keep the system going.
If one system or component is lost or compromised, a redundant system or component can step in and keep the system going.
When making decisions about network architecture, we should always consider the amount of _______ needed versus the amount of ________.
When making decisions about network architecture, we should always consider the amount of redundancy needed versus the amount of budget available.
Placing a gateway router between VMs on a network forces all traffic through a single node. Securing and monitoring this single node is called ______.
Placing a gateway router between VMs on a network forces all traffic through a single node. Securing and monitoring this single node is called fanning in.
By focusing on the interactions between the routers instead of all of the machines, we only have to worry
about a few connections between a few machines, rather than connections between all machines.
Using a jump box, which is essentially identical to a gateway router, what are some other steps you should take to harden the system? (7)
- Limiting the number of machines that our jump box can access.
- Locking the root account and limiting sudo access of the admin account on the jump box.
- Implementing log monitoring on the jump box.
- Implementing two-factor authentication for SSH login to the jump box.
- Implementing a host firewall (UFW or IPtables) on the jump box.
- Limiting jump box network access with a virtual private network (VPN).
What is a LAMP server?
Linux
A web server like Apache
A database like MYSQL
A back-end codebase like PHP