3. Security Architecture Flashcards

1
Q

3.1 Cloud Architecture Concepts

A

Responsibility Matrix: outlines division of responsibilities between CSP and customer. Inlcudes things such as data protection and infrastructure management

Hybrid considerations: offers flexibility and scalability, but also complexity

Third-party vendors: SaaS, PaaS, IaaS. Do security assessments and compliance checks to make sure these services meet security requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3.1 Infrastructure as Code

A

automates security management which can reduce human error, but introduces large scale risk if code has a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3.1 Network Infrastructure

A

Logical segmentation: use VLANs and subnets. limits spread of attacks

SDN: Software defined networking. Centralizes network control and offers consistent policy enforcement, but the SDN controller can be compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3.1 Serverless

A

Replaces a server on your network with something else, such as a cloud service like Azure. Reduces the attack surface but introduces risks if the API is insecure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3.1 Centralized vs. decentralized

A

Centralized is easier to manage but causes a single point of failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

3.1 Containerization

A

containers provide isolated environments for applications, but require careful management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

3.1 Virtualization

A

improves resource utilization but introduces hypervisor vulnerabilities and VM escape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

3.1 ICS/SCADA

A

Critical for industrial operations but often run as legacy systems which can be vulnerable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

3.1 RTOS

A

Real-Time operating system: used in systems requiring high reliability and real-time processing, they need to operate without interruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3.1 Embedded systems

A

Specialized computing systems that have limited resources, difficult to implement robust security measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly