3.6 Apply cybersecurity solution to the cloud Flashcards

1
Q

Cloud security controls: what is AZ in cloud ?

A

Availability Zones are isolated data centers located within specific regions in which you can access public cloud services.
Anything that happen in 1 availibility zone do not affect other availibility zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cloud security controls: what is HA in cloud ?

A

High Availability: apps build HA can recognizeq an outage and moves to others AZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cloud security controls: is IAM should be enforce in cloud ?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cloud security controls: why IAM should be enforce in cloud ?

A

To manage the access to resources: who gets access, what they get access to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cloud security controls: what is a secret key in cloud ?

A

It can be an API keys, passwords or certificate required when you wnt to loggin to specific cloud services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cloud security controls: why audit trail is important ?

A

To have a traceability of what have been done in the system and regulatory requirement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Securing cloud storage: how to secure cloud storage?

A

By configuring cloud based storage:
- Permission
- Encryption (server & client side)
- Replication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Securing cloud storage: why do we need to secure cloud storage ?

A

To limit and protect access to sensitive data, esp when data are hosted in a public cloud (Microsoft, AWS etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Securing cloud storage: what is permission?

A

It defines which user/groups have access to the doc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Securing cloud storage: what is server-side encryption?

A

Encrypt the data when it’s posted in the cloud. And when a user retrieve information from the cloud, our system decrypt that data so that we’re able to use it.
If someone get acces to that storage drive or files, they won’t be able to read any of the data because it was encrypted when it was stored onto that drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Securing cloud storage: what is client-side encryption?

A

Encrypt the data locally, sending all of that encrypted data across the network in its secure form, and ultimately saving it as that encrypted data on the storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Securing cloud storage: what is replication ?

A

Copy data from one place to another for disaster recovery, high availibility and data analysis (analytics, big data) purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Securing cloud network: what are the different types of cloud network ?

A
  • Virtual network
  • Public & private subnets
  • Segmentation
  • API inspection and integration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Securing cloud network: what is virtual network ?

A

cloud contained virtual devices (switches, routers etc) managed by the organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Securing cloud network: what is public & private subnets ?

A

Inc.:
- virtual private cloud (private cloud in a public cloud) that can be accessed using a VPN
- public cloud
- hybrid cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Securing cloud network: what is segmentation ?

A

Cloud that contains separate VPCs, containers and microservices

17
Q

Securing compute clouds: what are compute cloud instances?

A

IaaS component for the cloud computing environment that are launch (for ex) as a VM, container

18
Q

Securing compute clouds: how to manage the access to compute instances?

A

Via:
- Security groups: firewall, port nb, IP management

19
Q

Cloud security solutions: what is CASB ?

A

Cloud Access Security Broker implement access management and DLP to help control access to and secure cloud-based assets

20
Q

Cloud security solutions: how the CASB operate ?

A

Based on 4 characteristics:
- Visibility: provide visibility into app & services used by the organization (inc. shadow IT)
- Control: enable organization to enforce security policies (inc. DLP, encryption, access control)
- Threat protection: detect & respond to cloud threats (malware, phishing)

21
Q

Cloud security solutions: what are the different cloud security solutions?

A
  • CASB
  • Application security
  • Secure web gateway
  • Firewalls
  • Cloud native security controls
  • 3rd party solutions
22
Q

Cloud security solutions: what is SWG ?

A

Next-Gen Secure Web Gateway provide security to users across all of theu devices, regardless of where they are connecting from.
It can examine the data being send: type of requests, JSON strings, API requests

23
Q

Cloud security solutions: what is cloud-native security controls ?

A

Integrated & supported controls & configuration options inthe cloud (no additional cost)