3. Security Architecture Flashcards

(26 cards)

1
Q

3.1 Cloud Architecture Concepts

A

Responsibility Matrix: outlines division of responsibilities between CSP and customer. Inlcudes things such as data protection and infrastructure management

Hybrid considerations: offers flexibility and scalability, but also complexity

Third-party Cloud Services: SaaS, PaaS, IaaS. Do security assessments and compliance checks to make sure these services meet security requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3.1 Types of Cloud Environments

A

Public: internet-facing cloud environments (google services)

Private: Cloud services for a specific group or endpoint. Isolated access to the cloud network.

Community: infrastructure is shared between groups with like-concerns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3.1 Infrastructure as Code

A

automates security management which can reduce human error, but introduces large scale risk if code has a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3.1 Network Infrastructure

A

Logical segmentation: use VLANs and subnets. limits spread of attacks

SDN: Software defined networking. Centralizes network control and offers consistent policy enforcement, but the SDN controller can be compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

3.1 Serverless

A

Replaces a server on your network with something else, such as a cloud service like Azure. Reduces the attack surface but introduces risks if the API is insecure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

3.1 Centralized vs. decentralized

A

Centralized is easier to manage but causes a single point of failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

3.1 Containerization

A

containers provide isolated environments for applications, but require careful management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

3.1 Virtualization

A

improves resource utilization but introduces hypervisor vulnerabilities and VM escape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3.1 ICS/SCADA

A

Critical for industrial operations but often run as legacy systems which can be vulnerable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

3.1 RTOS

A

Real-Time operating system: used in systems requiring high reliability and real-time processing, they need to operate without interruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

3.1 Embedded systems

A

Specialized computing systems that have limited resources, difficult to implement robust security measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

3.2 Name some infrastructure considerations for secure enterprise environments

A

Device Placement
Security Zones
Attack Surfaces
Connectivity
Failure Modes
Device Attributes
Network Appliances
Port Security
Firewall Types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

3.2 Define failure-modes

A

fail-open (focuses on availability)
fail-closed (focuses on security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

3.2 Device Attributes

A

Active
Passive
Inline
Tap/Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

3.2 Network Appliances

A

Jump Server
Proxy Server
IDPS
Load Balancers
Sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

3.2 Active/Active vs. Active/Passive Load Balancing

A

Active/Passive: a primary load balancer distributes network traffic, the second one monitors and steps in on failure

Active/Active: Two or more load balancers distribute network traffic together, and maintain caches for speed purposes

17
Q

3.2 Firewall types

A

WAF (web application firewall)
UTM (unified threat management)
NGFW (next-gen firewall)
Layer 4 firewalls (Transport protocols)
Layer 7 firewalls (WAF for example)

18
Q

3.2 Tunneling

A

Two endpoints that can decrypt the encrypted data. Headers are encrypted as well.

TLS: used for things like HTTPS
IPSec: Used for VPN traffic

19
Q

3.2 IPsec modes of connection

A

Transport mode: Data is encrypted, but not IP header. Used for end-to-end between trusted networks.

Tunnel mode: Encrypts the header as well, used for transferring data on public networks, or when one endpoint is a security gateway to a private network (but not the other)

20
Q

3.2 SASE

A

Secure Access Service Edge

A cloud-native network solution that relies on zero-trust for providing access to network resources regardless of geographical location.

21
Q

3.2 Affinity Scheduling

A

Allocation or scheduling of computational tasks to different computer nodes, based on required resources or node appropriation.

22
Q

3.3 Data Types

A

Regulated, Trade secret, intellectual property, Legal information, Financial information, Human and non-human readable

23
Q

3.3 Data Classification

A

Sensitive, Confidential, Public, Restricted, Private, Critical

24
Q

3.3 Data Sovereignty

A

How data is impacted by laws when transmitted across borders/legal areas

25
3.3 Methods to Secure Data
Geographic restrictions, encryption, hashing, masking, tokenization, obfuscation, segmentation, permission restrictions
26
3.4 Load Balancing vs. Clustering
Both used for establishing high availability load balancing: servers do not share resources, they contain copies of applications. Load balancer determines which server to forward traffic to. Clustering: Servers share resources such as databases and communicate with each other to handle requests. The servers are aware of each other on the network.