3.1 Cloud Infrastructures Flashcards

1
Q

Cloud responsibility matrix

A

IaaS, PaaS, SaaS, etc.
– Who is responsible for security?
* Security should be well documented
– Most cloud providers provide a matrix of
responsibilities
– Everyone knows up front
* These responsibilities can vary
– Different cloud providers
– Contractual agreements
– Responsibility matrix example

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hybrid considerations

A

Hybrid cloud
– More than one public or private cloud
– This adds additional complexity
* Network protection mismatches
– Authentication across platforms
– Firewall configurations
– Server settings
* Different security monitoring
– Logs are diverse and cloud-specific
* Data leakage
– Data is shared across the public Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Third-party vendors in the cloud

A

You, the cloud provider, and third parties
– Infrastructure technologies
– Cloud-based appliances
* Ongoing vendor risk assessments
– Part of an overall vendor risk management policy
* Include third-party impact for incident response
– Everyone is part of the process
* Constant monitoring
– Watch for changes and unusual activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Infrastructure as code

A

Describe an infrastructure
– Define servers, network, and applications as code
* Modify the infrastructure and create versions
– The same way you version application code
* Use the description (code) to build other application
instances
– Build it the same way every time based on the code
* An important concept for cloud computing
– Build a perfect version every time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Serverless architecture

A

Function as a Service (FaaS)
– Apps are separated into individual, autonomous functions
– Remove the operating system from the equation
* Developer still creates the server-side logic
– Runs in a stateless compute container
* May be event triggered and ephemeral
– May only run for one event
* Managed by a third-party
– All OS security concerns are at the third-party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Microservices and APIs

A

Monolithic applications
– One big application that does everything
* Application contains all decision making processes
– User interface, business logic, data input and output
* Code challenges
– Large codebase, change control challenges
* APIs - Application Programming Interfaces
* API is the “glue” for the microservices
– Work together to act as the application
* Scalable - Scale just the microservices you need
* Resilient - Outages are contained
* Security and compliance - Containment is built-in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Physical isolation

A

Devices are physically separate
– Air gap between Switch A and Switch B
* Must be connected to provide communication
– Direct connect, or another switch or router
* Web servers in one rack
– Database servers on another
* Customer A on one switch, customer B on another
– No opportunity for mixing data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Physical segmentation

A

Separate devices
– Multiple units, separate infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Logical segmentation with VLANs

A

Virtual Local Area Networks (VLANs)
– Separated logically instead of physically
– Cannot communicate between VLANs without a Layer
3 device / router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SDN (Software Defined Networking)

A

Networking devices have different functional
planes of operation
– Data, control, and management planes
* Split the functions into separate logical units
– Extend the functionality and management of
a single device
– Perfectly built for the cloud
* Infrastructure layer / Data plane
– Process the network frames and packets
– Forwarding, trunking, encrypting, NAT
* Control layer / Control plane
– Manages the actions of the data plane
– Routing tables, session tables, NAT tables
– Dynamic routing protocol updates
* Application layer / Management plane
– Configure and manage the device
– SSH, browser, API

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Attacks can happen anywhere

A

Two categories for IT security
– The on-premises data is more secure!
– The cloud-based data is more secure!
* Cloud-based security is centralized and costs less
– No dedicated hardware, no data center to secure
– A third-party handles everything
* On-premises puts the security burden on the client
– Data center security and infrastructure costs
* Attackers want your data - They don’t care where it is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

On-premises security

A

Customize your security posture
– Full control when everything is in-house
* On-site IT team can manage security better
– The local team can ensure everything is secure
– A local team can be expensive and difficult to staff
* Local team maintains uptime and availability
– System checks can occur at any time
– No phone call for support
* Security changes can take time
– New equipment, configurations, and additional costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Centralized vs. decentralized

A

Most organizations are physically decentralized
– Many locations, cloud providers, operating systems, etc.
* Difficult to manage and protect so many diverse systems
– Centralize the security management
* A centralized approach
– Correlated alerts
– Consolidated log file analysis
– Comprehensive system status and maintenance/patching
* It’s not perfect
– Single point of failure, potential performance issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Virtualization

A

Virtualization
– Run many different operating systems on
the same hardware
* Each application instance has its own
operating system
– Adds overhead and complexity
– Virtualization is relatively expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Application containerization

A

Container
– Contains everything you need to run an application
– Code and dependencies
– A standardized unit of software
* An isolated process in a sandbox
– Self-contained
– Apps can’t interact with each other
* Container image
– A standard for portability
– Lightweight, uses the host kernel
– Secure separation between applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IoT (Internet of Things)

A

Sensors
– Heating and cooling, lighting
* Smart devices
– Home automation, video doorbells
* Wearable technology
– Watches, health monitors
* Facility automation
– Temperature, air quality, lighting
* Weak defaults
– IOT manufacturers are not security professionals

17
Q

SCADA / ICS

A

Supervisory Control and Data Acquisition System
– Large-scale, multi-site Industrial Control Systems (ICS)
* PC manages equipment
– Power generation, refining, manufacturing equipment
– Facilities, industrial, energy, logistics
* Distributed control systems
– Real-time information
– System control
* Requires extensive segmentation
– No access from the outside

18
Q

RTOS (Real-Time Operating System)

A

An operating system with a deterministic processing
schedule
– No time to wait for other processes
– Industrial equipment, automobiles,
– Military environments
* Extremely sensitive to security issues
– Non-trivial systems
– Need to always be available
– Difficult to know what type of security is in place

19
Q

Embedded systems

A

Hardware and software designed for a specific function
– Or to operate as part of a larger system
* Is built with only this task in mind
– Can be optimized for size and/or cost
* Common examples
– Traffic light controllers
– Digital watches
– Medical imaging systems

20
Q

High availability

A

Redundancy doesn’t always mean always available
– May need to be powered on manually
* HA (high availability)
– Always on, always available
* May include many different components working
together
– Active/Active can provide scalability advantages
* Higher availability almost always means higher costs
– There’s always another contingency you could add
– Upgraded power, high-quality server components, etc.

21
Q

Availability

A

System uptime
– Access data, complete transactions
– A foundation of IT security
* A balancing act with security
– Available, but only to the right people
* We spend a lot of time and money on availability
– Monitoring, redundant systems
* An important metric
– We are often evaluated on total available time

22
Q

Resilience

A

Eventually, something will happen
– Can you maintain availability?
– Can you recover? How quickly?
* Based on many different variables
– The root cause
– Replacement hardware installation
– Software patch availability
– Redundant systems
* Commonly referenced as MTTR
– Mean Time to Repair

23
Q

Cost

A

How much money is required?
– Everything ultimately comes down to cost
– Initial installation
– Very different across platforms
* Ongoing maintenance
– Annual ongoing cost
* Replacement or repair costs
– You might need more than one
* Tax implications
– Operating or capital expense

24
Q

Responsiveness

A

Request information
– Get a response
– How quickly did that happen?
* Especially important for interactive applications
– Humans are sensitive to delays
* Speed is an important metric
– All parts of the application contribute
– There’s always a weakest link

25
Q

Scalability

A

How quickly and easily can we increase or
decrease capacity?
– This might happen many times a day
– Elasticity
* There’s always a resource challenge
– What’s preventing scalability?
* Needs to include security monitoring
– Increases and decreases as the system scales

26
Q

Ease of deployment

A

An application has many moving parts
– Web server, database, caching server, firewall, etc.
* This might be an involved process
– Hardware resources, cloud budgets, change control
* This might be very simple
– Orchestration / automation
* Important to consider during the product
engineering phase
– One missed detail can cause deployment issues

27
Q

Risk transference

A

Many methods to minimize risk
– Transfer the risk to a third-party
* Cybersecurity insurance
– Attacks and downtime can be covered
– Popular with the rise in ransomware
* Recover internal losses
– Outages and business downtime
* Protect against legal issues from customers
– Limit the costs associated with legal proceedings

28
Q

Ease of recovery

A

Something will eventually go wrong
– Time is money
– How easily can you recover?
* Malware infection
– Reload operating system from original media - 1 hour
– Reload from corporate image - 10 minutes
* Another important design criteria
– This may be critical to the final product

29
Q

Patch availability

A

Software isn’t usually static
– Bug fixes, security updates, etc.
* This is often the first task after installation
– Make sure you’re running the latest version
* Most companies have regular updates
– Microsoft’s monthly patch schedule
* Some companies rarely patch
– This might be a significant concern

30
Q

Inability to patch

A

What if patching wasn’t an option?
– This happens more often than you might think
* Embedded systems
– HVAC controls
– Time clocks
* Not designed for end-user updates
– This is a bit short sighted
– Especially these days
* May need additional security controls
– A firewall for your time clock

31
Q

Power

A

A foundational element
– This can require extensive engineering
* Overall power requirements
– Data center vs. office building
* Primary power
– One or more providers
* Backup services
– UPS (Uninterruptible Power Supply)
– Generators

32
Q

Compute

A

An application’s heavy lifting
– More than just a single CPU
* The compute engine
– More options available in the cloud
* May be limited to a single processor
– Easier to develop
* Use multiple CPUs across multiple clouds
– Additional complexity
– Enhanced scalability