3.6 - 3.7 Flashcards

1
Q

Ha across zones for cloud services

A

Avaialbity zones (az) for cloud services (lime a diff for diff countries) its self contained with independent power, network configs and doesn’t affect other zones from one zone

Need ha high availability can use load balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Resource policies

A

Iam identity and access management

Groups like admins, and users and peoples assigned depending on policies ip address groups date and time.

Centralize users roles and access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cloud storage

A

Has public and private clouds. For public clouds can set up data in different regions and availability

First step is permissions on data in the cloud set to private : Iam, bucket policies, globally blocked public access, put on cloud only if need be

Second is to encrypt server-side to give another layer or protection so the cloud has encrypted data or client side encryption where its received encrypted

Thirdly is replication, to maintain uptime has same data in multiple clouds acts as a backup or a copy for analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Securing cloud storage

A

Cloud networks either public or through remote vpn as private can create virtually and have virtual switches and new instances.

Public and private subnets with private can connect with vpn but public has external ip, theres also a hybrid

Then use segmentation for different containers or micro-services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Computing cloud instance

A

Computing instance like with a virtual machine or container connected through security groups and firewalls

Has dynamic resource allocation lime load balancing but is called rapid elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Irtial private cloud endpoints

A

Private data fileshare for high level access needs vpc gateway endpoint internet but requires but can be used with gateway to internet including cloud storage or can bypass internet with vpc endpoint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Container security

A

Careful of bugs and misconfiguration or insufficient security controls

So group containers, and use container specific os, having same
Types limits Scope of intrusions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud access security broker

A

Casb maintain security of data even if it may not be stored on site

Enforces sec policies by
Visibility, compliance, threat prevention, data security via transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Swg

A

Secure network gateway protects users and devices regardless of connection location

Query checking , Examine api, instance aware security and json strings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Identity provider (idp)

A

Authentication as a service since third party is controlling this.

Uses attributes like name, employee id, phone, email, job title etc

Can also see who that person is through certificates depends on permissions can be Put in smart cards or usb tokens

Can also use ssh, that allows for authentication with personal and
Private keys rather than passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Account types

A

User accounts
Shared accounts
Guest accounts
Service accounts
Privilege accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Account policies

A

User name pw, with pw policies or outside logins,

Perform periodic policies audits to ensure they are being used

Consider lockouts but not for service accounts also consider disabling account if not wanting to delete

Location based policies, geolocation considerations and then geofencing and geotagging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly