3. Security Architecture Flashcards

1
Q

3.1 Cloud Architecture Concepts

A

Responsibility Matrix: outlines division of responsibilities between CSP and customer. Inlcudes things such as data protection and infrastructure management

Hybrid considerations: offers flexibility and scalability, but also complexity

Third-party Cloud Services: SaaS, PaaS, IaaS. Do security assessments and compliance checks to make sure these services meet security requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3.1 Types of Cloud Environments

A

Public: internet-facing cloud environments (google services)

Private: Cloud services for a specific group or endpoint. Isolated access to the cloud network.

Community: infrastructure is shared between groups with like-concerns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3.1 Infrastructure as Code

A

automates security management which can reduce human error, but introduces large scale risk if code has a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3.1 Network Infrastructure

A

Logical segmentation: use VLANs and subnets. limits spread of attacks

SDN: Software defined networking. Centralizes network control and offers consistent policy enforcement, but the SDN controller can be compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

3.1 Serverless

A

Replaces a server on your network with something else, such as a cloud service like Azure. Reduces the attack surface but introduces risks if the API is insecure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

3.1 Centralized vs. decentralized

A

Centralized is easier to manage but causes a single point of failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

3.1 Containerization

A

containers provide isolated environments for applications, but require careful management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

3.1 Virtualization

A

improves resource utilization but introduces hypervisor vulnerabilities and VM escape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3.1 ICS/SCADA

A

Critical for industrial operations but often run as legacy systems which can be vulnerable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

3.1 RTOS

A

Real-Time operating system: used in systems requiring high reliability and real-time processing, they need to operate without interruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

3.1 Embedded systems

A

Specialized computing systems that have limited resources, difficult to implement robust security measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

3.2 Name some infrastructure considerations for secure enterprise environments

A

Device Placement
Security Zones
Attack Surfaces
Connectivity
Failure Modes
Device Attributes
Network Appliances
Port Security
Firewall Types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

3.2 Define failure-modes

A

fail-open (focuses on availability)
fail-closed (focuses on security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

3.2 Device Attributes

A

Active
Passive
Inline
Tap/Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

3.2 Network Appliances

A

Jump Server
Proxy Server
IDPS
Load Balancers
Sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

3.2 Active/Active vs. Active/Passive Load Balancing

A

Active/Passive: a primary load balancer distributes network traffic, the second one monitors and steps in on failure

Active/Active: Two or more load balancers distribute network traffic together, and maintain caches for speed purposes

17
Q

3.2 Firewall types

A

WAF (web application firewall)
UTM (unified threat management)
NGFW (next-gen firewall)
Layer 4 firewalls (Transport protocols)
Layer 7 firewalls (WAF for example)

18
Q

3.2 Tunneling

A

Two endpoints that can decrypt the encrypted data. Headers are encrypted as well.

TLS: used for things like HTTPS
IPSec: Used for VPN traffic

19
Q

3.2 IPsec modes of connection

A

Transport mode: Data is encrypted, but not IP header. Used for end-to-end between trusted networks.

Tunnel mode: Encrypts the header as well, used for transferring data on public networks, or when one endpoint is a security gateway to a private network (but not the other)

20
Q

3.2 SASE

A

Secure Access Service Edge

A cloud-native network solution that relies on zero-trust for providing access to network resources regardless of geographical location.

21
Q

3.2 Affinity Scheduling

A

Allocation or scheduling of computational tasks to different computer nodes, based on required resources or node appropriation.

22
Q

3.3 Data Types

A

Regulated, Trade secret, intellectual property, Legal information, Financial information, Human and non-human readable

23
Q

3.3 Data Classification

A

Sensitive, Confidential, Public, Restricted, Private, Critical

24
Q

3.3 Data Sovereignty

A

How data is impacted by laws when transmitted across borders/legal areas

25
Q

3.3 Methods to Secure Data

A

Geographic restrictions, encryption, hashing, masking, tokenization, obfuscation, segmentation, permission restrictions

26
Q

3.4 Load Balancing vs. Clustering

A

Both used for establishing high availability

load balancing: servers do not share resources, they contain copies of applications. Load balancer determines which server to forward traffic to.

Clustering: Servers share resources such as databases and communicate with each other to handle requests. The servers are aware of each other on the network.