2.5 Cloud and Data Center Security Flashcards

1
Q

Benefits of cloud computing model (VM)

A
  • Optimized existing hardware resources.
  • Reduces data center costs.
  • Increases operational flexibility.
  • Maximizes efficiency of data center resources.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cloud computing

A

A pool of resources that can be rapidly provisioned in an automated, on-demand manner by virtualization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Principles of cloud computing that are contrary to network security best practices.

A
  • Cloud computing doesn’t mitigate existing network security risks.
  • Security required isolation and segmentation, cloud relies on shared resources.
  • Security deployments are process-oriented, cloud computing environments are dynamic.
  • Multi-tenancy a key risk.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Key requirements for securing the cloud

A
  • Consistent security in physical and virtualized form factors (application control and threat prevention).
  • Segment your business applications using Zero Trust principles.
  • Centrally manage security deployments; streamline policy updates.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Traditional data security weakness

A
  • Port First limits visibility and control.
  • Lack any concept of unknown traffic.
  • Multiple policies, no policy reconciliation tools.
  • Cumbersome security policy update process.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Types of traffic in a virtualized data center.

A

North-South

Ease-West

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

North-south traffic

A

Data packets that move in and out of the virtualized environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

East-west traffic

A

Data packets moving between virtual workloads entirely within the private cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud security common practice

A
  • Isolate VMs into different tiers using logical network attributes (VLNA or VXLAN) or logical software constructs (security groups).
  • Combination of north-south and east-west protection.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Benefits of East-west protection

A
  • Authorizes only allowed applications to flow inside the date center, between VMs.
  • Reduce lateral threat mvmt. when front-end workload has been compromised.
  • Stops known and unknown threats sourced internally within data center.
  • Protects against data theft by leveraging data filtering and blocking anti-spyware communications.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Implementing security in virtualized data centers

A

Phases

  1. Consolidating servers within trust levels.
  2. Consolidating servers across trust levels.
  3. Selective network security virtualization.
  4. Dynamic computing fabric (private or hybrid clouds)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly