3.6 Given a scenario, apply cybersecurity solutions to the cloud. Flashcards
Resources Policies
Are policies that outline a access control for users account. eliminates a single user form having access to two different accounts on a CPS.
Secrets Management
Technology that manages digital authentication credentials
Integration and Auditing
In terms of cloud security Integration is important for introducing CSP to your Local IT to see if can integrate well.
Auditing for CPS insures that users are conducting themselves correctly within the guidelines.
Permissions
Grants users within a CSP read, write, delete data.
Encryption
CSP encrypts that files and the users only has the encryption key.
Replication
Within a CSP multiple copies of users account data is stored in multiple areas to provide backups if data is lost.
CSP Networks
CSP Networks should have Virtual, Private and Public Subnets, Data Segmentation, API Inspection and Integration capabilities.
Compute in relation to CSP
The process power preformed the CSP’s equipment.
Security Groups
A allow and deny list for the CSP equipment. Its good for security and limits abuse for equipment.
Dynamic Resource Allocation
Is elasticity, CSP have additional resources when users needed it for a price. Makes everything more cost effective on the business.
Instance Awareness
A Security monitoring feature that allows you to detect multiple instances(bad things) form the same user.
Virtual Private Cloud (VPC) Endpoint
A VPC Endpoint allows VM, VDI, or VMI access too cloud assets and services. Eliminates a other gateways to a CSP.
Container Security
Applications on a CSP have native security features built within the app itself.