3-23.7 Flashcards
What is the difference between automation and orchestration?
Automation is the application of tech, programs, robotics, or processes to achieve outcomes with minimal human interaction. Orchestration is the integration of disparate tools and platforms for an automated response.
Describe Scalability vs Elasticity:
Scalability is the ability of system to accomodate larger loads by adding resources (up via hardware or out via more nodes). Elasticity is the ability to fit the resources needed to copy dynamically.
What is infrastructure as Code?
Used to define and provision networking components such as servers network and storage that can be aversion, control, tested, and automated through machine readable files.
What are some security concerns with infrastructure as a code?
If an attacker gains access to the IAC files or config’s, they can create whatever they want leading to unauthorized access or data exfiltration. Insecure code flaws in the code could create vulnerabilities in the infrastructure configurations. Misconfigurations could expose sensitive data or resources.
What is serverless computing?
An execution model in which a cloud provider dynamically allocates computer resources and storage needed to execute a particular piece of code. Security concerns include injections, malware, and data privacy.
What are micro services and security concerns regarding them?
Software development approach with large application is broken down to smaller independent services. Each micro service is a self-contained component that can be deployed updated and scaled without affecting the rest. Security and concerns include increased tax services and service to service authentication and authorization.
What is containerization and some security concerns around it?
Containerization is a technology that allows applications to be packaged and run in isolated environments. Security concern include container, breakouts, where an attacker could gain access to the host by breaking out of the container. Also container orchestration vulnerabilities, orchestration tools can be vulnerable to exploits, especially if they are not properly configured.