1.6 Explain the security concerns associated with various types of vulnerabilities. Flashcards

1
Q

Attacks and related concepts to be aware of as a cloud user:

A

Increased chances of data loss or disclosure

Target of attacker also using the cloud

CSP having insecure APIs and UIs

Potential failure of isolation

Presence of malicious insiders

Weak auth techs

Loss of reputation due to activities of other cloud tenants

Vulns allowing for privilege escalation

Virtualization attacks resulting in VM escaping

Unauthorized access to backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Zero-day

A

Newly discovered attacks w/no specific defense available from the vendor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Weak configurations

A

Open permissions

Unsecured root accounts

Errors

Weak encryption

Unsecure protocols

Default settings

Open ports and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Third-party risks

A

Vendor management
-System integration
-Lack of support

Supply chain

Outsourced code development

Data storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Improper or weak patch management

A

Firmware

Operating System (OS)

Applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Legacy platforms

A

May still function but are no longer supported by original vendor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Impacts

A

Data loss

Data breaches

Data exfiltration

Identity theft

Financial

Reputation

Availability loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly