2.5 Cloud and Data Center Security Flashcards
1
Q
Benefits of cloud computing model (VM)
A
- Optimized existing hardware resources.
- Reduces data center costs.
- Increases operational flexibility.
- Maximizes efficiency of data center resources.
2
Q
Cloud computing
A
A pool of resources that can be rapidly provisioned in an automated, on-demand manner by virtualization.
3
Q
Principles of cloud computing that are contrary to network security best practices.
A
- Cloud computing doesn’t mitigate existing network security risks.
- Security required isolation and segmentation, cloud relies on shared resources.
- Security deployments are process-oriented, cloud computing environments are dynamic.
- Multi-tenancy a key risk.
4
Q
Key requirements for securing the cloud
A
- Consistent security in physical and virtualized form factors (application control and threat prevention).
- Segment your business applications using Zero Trust principles.
- Centrally manage security deployments; streamline policy updates.
5
Q
Traditional data security weakness
A
- Port First limits visibility and control.
- Lack any concept of unknown traffic.
- Multiple policies, no policy reconciliation tools.
- Cumbersome security policy update process.
6
Q
Types of traffic in a virtualized data center.
A
North-South
Ease-West
7
Q
North-south traffic
A
Data packets that move in and out of the virtualized environment.
8
Q
East-west traffic
A
Data packets moving between virtual workloads entirely within the private cloud.
9
Q
Cloud security common practice
A
- Isolate VMs into different tiers using logical network attributes (VLNA or VXLAN) or logical software constructs (security groups).
- Combination of north-south and east-west protection.
10
Q
Benefits of East-west protection
A
- Authorizes only allowed applications to flow inside the date center, between VMs.
- Reduce lateral threat mvmt. when front-end workload has been compromised.
- Stops known and unknown threats sourced internally within data center.
- Protects against data theft by leveraging data filtering and blocking anti-spyware communications.
11
Q
Implementing security in virtualized data centers
A
Phases
- Consolidating servers within trust levels.
- Consolidating servers across trust levels.
- Selective network security virtualization.
- Dynamic computing fabric (private or hybrid clouds)