3.1 Security Architecture Flashcards
Fundamental Security Architectural Considerations
High Availability: Ensuring continuous system operation.
Durability: Protecting data from loss or corruption.
Resilience: Ability to recover from failures and disruptions.
Scalability: Ability to handle increasing workloads.
Responsiveness: System performance and responsiveness.
Cost-Effectiveness: Balancing cost with performance and security.
Ease of Deployment: Simplifying deployment and maintenance.
Risk Transference: Shifting risks to third-party providers.
Cloud Computing
IaaS (Infrastructure as a Service): Provides computing resources like servers, storage, and networking.
PaaS (Platform as a Service): Provides a platform for developing and deploying applications.
SaaS (Software as a Service): Provides software applications over the internet.
Shared Responsibility Model: Defines the division of security responsibilities between the cloud provider and the customer.
Hybrid Cloud: Combines public and private cloud environments.
Third-Party Vendors: External providers offering cloud services or solutions.
Infrastructure as Code (IaC)
Automation of Infrastructure: Using code to provision and manage infrastructure.
Configuration Management: Ensuring consistency and reproducibility.
Version Control: Tracking changes to infrastructure configurations.
Increased Efficiency: Streamlining deployment and maintenance processes.
Serverless Technologies
Function as a Service (FaaS): Executing code without managing servers.
Serverless Containers: Running containers without managing servers.
Serverless Databases: Managing databases without managing servers.
Containers and Microservices
Containers: Standardized software packages that include everything needed to run an application.
Microservices: Architectural style that breaks down applications into small, independent services.
Network Infrastructure
Physical Isolation: Separating networks physically to reduce attack surface.
Logical Segmentation: Dividing networks into smaller segments to limit the impact of attacks.
Software-Defined Networking (SDN): Centralized network control and management.
Network Topologies: Various network configurations (e.g., star, bus, ring, mesh)
Industrial Control Systems (ICS) and SCADA
ICS: Control systems for industrial processes.
SCADA: Systems for monitoring and controlling industrial processes.
Vulnerabilities: Security risks associated with ICS and SCADA systems.
Internet of Things (IoT)
Connected Devices: Devices with internet connectivity.
Security Challenges: Protecting IoT devices from attacks.
Data Privacy and Security: Ensuring the privacy and security of IoT data