CCCS Flashcards
Meaning SDDC
Software defined datacenter
Meaning CSP
Cloud Service Provider
SDN Benefits
Deliver and share system resources quickly and efficiently.
3 layers of SDN framework
Control Layer
Infrastructure Layer
Application Layer
How does Control Layer of the SDN operate
SDN operations using OpenFlow protocol to connect supported devices
What is contained within Infrastructure Layer SDN
Represents physical components e.g. switches and routers
What does the Application Layer of an SDN provide
Open areas to develop end-user apps and services. It also includes configuration, management, monitoring, t-shooting, policies and security
Conventional Network V SDN Architecture
Control plane and data plane fused; therefore limits capacity of virtualizing network resources.
What role API play SDN
API’s are send to send and receive requests to resources
How is SDN routing differ from conventional
direct software programming of routing instead of relying routing protocols
Three Types of Cloud Deployment
- Public
- Private
- Hybrid
Three Cloud Service Model
Infrastructure-as-a-Service (IaaS)
Platform-as-a-Service (PaaS)
Software-as-a-Service (SaaS)
What are the features Infrastructure-as-a-Service (IaaS)
IaaS solutions host data center infrastructure and help customize design of their SDNs.
What features Platform-as-a-Service (PaaS)
PaaS provides organizations with virtual resources that support developing software
What features Software-as-a-Service (SaaS)
SaaS refers to a cloud service that delivers applications to an organization’s end users through a web browser.
What is AWS network called
VPC
What is Azure network called
vNet
What is GCP network called
VPC Network
What is AWS access to the internet called
Internet Gateway
What is Azure internet called
Public IP
What is GCP access to the internet called
Internet Gateway Route
What is AWS autoscaling called
AutoScaling Groups
What is Azure autoscaling called
Virtual Machine scale sets
What is GCP autoscaling called
Instance groups
What is the basis for AWS access control
Security groups
What is the basis for Azure access control
Network security group
What is the basis for GCP access control
Firewall rules
What is AWS automation called
Cloud Formation
What is Azure automation called
Cloud Deployment Manager
What are advantages of cloud
- Flexible
- Efficiency
3, Accessibility - Savings
- Innovation
- Opportunities
What is a limitation of CSP Native Security Controls
Lacking and generally only cover the infrastructure
What direction are attacks not often protected from
Lateral Threats
Why are traditional network attacks more abundant in the cloud.
rapidly changing workloads
Four Cloudguard offerings for private and public cloud
IaaS for Public Cloud
IaaS for Private Cloud
SaaS
Dome9
What is the difference between Public and Private CloudGuard IaaS
Public (AWS) v Private Vendors (ESXi)
What type of applications CloudGuard SaaS protect
Email and other SaaS based apps (dropbox..Etc)
What type of Cloudguard provides security posture management and compliance.
CloudGuard Dome9
What characteristics best define CloudGuard
Centralized Management
Cloud Diversity
Dev Ops Ready
Adaptive and Automatic
What do security layers in policy provide
Granular control and access delegation
What are the primary components of SMS
- SmartConsole
- Management Server
- SmartEvent (optional)
What does the Cloud GuardController do?
provides visibility and allows for automation and adaptive secuirty
What do CloudGuard IaaS security Gateways provide
perimeter and east-west traffic protection in public / private cloud
In Cloudguard what functionality does the identity awareness blade provide.
Allows security policy to be defined by cloud resources collected by the CloudGuard controller
Elastic licensing
Licensing that provides quick provisioning of assets using cores licensed to deployed gateways.
The shared security model requires consumers to provide what 2 items.
Data Security
Network access security
CloudGuard IaaS defends cloud resources via
firewall
data security
advanced threat prevention
forensic analysis
What are the five underlying security principles of secure public cloud
Security with Advanced Threat Prevention Network Segmentation Agility Automation. Efficiency, and Elasticity Borderless
What are the three layers of network segmentation within the CloudGuard solution.
- The first layer applies a Security Gateway that enforces firewall policies to accept legitimate network traffic flows and deny unauthorized network traffic.
- The second layer uses advanced Threat Prevention Software Blades to extend the Security Gateway’s traffic inspection by identifying and blocking malicious behavior within east-west traffic flows.
- The third layer advances security with micro-segmentation to allow a clear separation of networks and different operating concerns associated with Development. Operations, and IT teams.
Define micro-segmentation
Micro-segmentation creates boundaries by placing inspection points between different applications, sendees, senders, and single hosts within the same network segment.
Why use hub and spoke for Cloud Blueprint
All traffic that enters and exits each spoke must travel through a hub. Spokes use network segmentation to clearly separate SDNs from one another and isolate their workloads. This allows differing ownership in the spoke while controlling security in the hubs
What is a hub in a secure public cloud blueprint layout
Hubs operate as software defined data centers that use Security Gateways in combination with network traffic load balancers to protect the cloud’s perimeter according to its current scale. Each hub manages and delivers traffic to the spoke networks. Individual hubs communicate with one another through the SDN’s routing switches.
What type of traffic does the northbound hub protect
The Northbound hub serves as the front end of the SDDC that permits inbound web communications such as HTTP traffic from the Internet to reach spoke SDNs.
What components commonly in northbound hub
Public IP
External Load Balancers
Security Gateways
Does any inbound traffic not go through northbound hub
Non-transitive traffic, done through peering
What does southbound hub do
outbound transit traffic from the spokes
communication applications
software updates
VPN
What do you use to avoid double NAT in a Azure Southbound peering
UDR (User defined routes)
How do you route transit transit traffic without a UDR in AWS & GCP
VPN’s, leveraging VTI (VPN tunnel Interface) and BGP
OSPF cannot be used layer 2, which does not exist cloud
Checkpoint HA CSP Hub Limitations
two Security Gateway members
AWS and Azure require Security Gateways to reside in the same location in a region
SDNs do not allow HA with state synchronization failover
Which hub (north or South) allows automatic HA deployment
Northbound
What components are commonly found southbound hub to support SDDC connectivity
Load Balancers
VPN Gateways
At a minimum what components should be present in a secure public cloud blueprint
SMS
one or two hubs with security gateways (IaaS)
Peering connection between spokes
Following the Secure Cloud Blueprint what is the Azure recommended config
- Northbound Hub - Supports incoming public facing Internet traffic.
- Southbound Hub - Manages outbound access to Internet and VPN connections to corporate on-premise locations
- Spoke - Represents segmented SDNs with different resources, security, and access levels (IPSEC + BGP)
- CloudGuard Auto Scaling - Protects the Northbound hub entrance with an elastic set of automated Security Gateway deployments.
- Spoke - Represents segmented SDNs with different resources, security, and access levels.
(See document for diagram for more specifics)
Moving applications or services in an SDDC significantly improves what?
Less time
Resources
in a public cloud what are two ways of IaaS Security gateway deployment.
Standalone=Combined security gateway and management
distributed= seperate vm for gateway and management
Why might it be preferred to deploy SMS not in the cloud, but on prem
Can then manage on prem gateways as well as cloud instances
SDDN cluster limitations
- Cluster installations support High Availability mode only. This cluster configuration excludes ClusterXL load sharing or the Virtual Router Redundancy Protocol (VRRP)
- Security Gateways with HA configurations must communicate with the SDDC to achieve failover with the secondary Security Gateway member. The failover process requires extra time to complete since the Security Gateways must communicate with the SDDC first.
- Clusters must include a maximum of two members.
- Avoid deploying management servers and cluster members in a stand alone configuration.
- Both cluster members must reside in the same region and location.
Three ways you can deploy CloudGuard IaaS
- CSP Portal - Provides access to create, view, and manage CloudGuard resources.
- PowerShell - Uses predefined CloudGuard IaaS Security Gateway templates for automated deployments.
- Command Line Interface (CLI) - Launches CloudGuard Security Gateways with command line scripts.
Understanding CSP resources “Geographic Region”
AWS uses Availability Zones
Azure refers to them as Locations
GCP describes them as Zones
Understanding CSP resources “Network”
Make sure correct network association
New cloudguard IaaS will be needed to protect each network segment
Understanding CSP resources “Subnets”
only contains itself and no other VM’s
Understanding CSP resources “Public IP”
Public IP: Ensure static IP for external
Understanding CSP resources “Private IP”
Private IP: Internal resource connectivity
Understanding CSP resources “Load Balancers”
- In the cloud’s inbound perimeter, external load balancers direct Internet traffic to spoke networks with an inbound NAT configuration.
- Within spoke networks, internal load balancers distribute traffic loads between servers.
Understanding CSP resources “Security Group”
- protects inbound and outbound traffic access to virtual machines.
- VMs in the same subnet receive coverage from different Security Groups
- VMs do not receive a Security Group assignment during their deployment, the CSP assigns a default Security Group to them.
Understanding CSP resources “Tags”
CSPs use tags (labels) to attach identifying information to cloud resources
CloudGuard Controller uses tags to discover new. automated CloudGuard IaaS Security Gateway deployments to include in the Security Policy.
Understanding CSP resources “Identity and Access Management”
Identity and Access Management (IAM) credential represents a user or application that needs to contact the SDDC to cany out an operation.
Activating IAM permission on CloudGuard IaaS required add client-id during VM deployment
What to check when deplying CloudGuard IaaS
Tags - Review each VM to confirm it reflects the correct tag associations.
IAM - Verify each CloudGuard IaaS deployment contains the relevant IAM client-id and client-secret credentials.
Networks and Subnets - Examine each CloudGuard deployment and validate that it maps to the correct SDN and subnet.
Installation Time - Wait for the deployment process to finish completely before proceeding with the next phase of configuring security protections.
Some CSP related issues when deploying IaaS
AWS - Register software subscription agreements before deploying CloudGuard IaaS VMs or the CSP will roll back the deployment.
Azure - CloudGuard IaaS deployments require approximately fifteen minutes to finish.
What are the five management tools in CloudGuard IaaS to create and manage policy
- Gaia Portal
- Smartconsole
- CLI
- Security Objects
- Rule base
What is Gaia Portal
Functions as the primary web user interface for the Gaia OS platform. Through this portal, Security Administrators may configure the SMS and Security Gateway properties.
What is SmartConsole
Acts as a GUI that configures and enforces the Security Policies that protect the environment)
What are Security Objects
Represent all the network components such as Security Gateways, web servers, networks, and services.
What is CLI
Provides the interface that activates commands to configure the operation of the CloudGuard IaaS security solution.
What is Rule Base
Establishes a set of rules that define and protect the SDDC’s perimeter and connections to SDNs.
What are to types of policy approaches used in Check Point Policy
- Ordered
2. Inline
What is Ordered Policy
Performs one or more security actions to the rule base in a top-down order against every layer of the Security Policy.
What is Inline Policy
Optimizes the rule matching process by reusing the same security layer in the same policy or in multiple policies.
CloudGuard IaaS security policy combines what two policy types
- Traditional Security Policy
2. Context Aware / Adaptive Policy
What does an adaptive security policy provide
- This policy format broadens the scope of network security by protecting resources created from one or more CSPs.
- application owners gain control of their application deployments since they can add and remove resources without impacting security.
Which cloud defined objects assist in security policy creation
- Data Center Objects
2. Tags
What can an imported data center object contain
subnets,
hosts,
tags
entire cloud data center
What options are available when importing data center objects
Region View - Imports SDNs, subnets, and VMs as security objects by region.
Tags View - Identifies all VM resources with a specific tag key or tag value.
Search View - Uses a search field to locate a specific cloud resource.