CCSK-Combined Flashcards
What are the five essential characteristics of cloud computing as defined by NIST?
Broad Network AccessRapid ElasticityMeasured ServiceOn-Demand Self ServiceResource Pooling
The level of attention and scrutiny paid to enterprise risk assessments should be directly related to what?
The value at risk
In the majority of data protection laws, when the data is transferred to a third party custodian, who is ultimately responsible for the security of the data?
The Data Controller
What is the most important reason for knowing where the cloud service provider will host the data?
So that it can address the specific restrictions that foreign data protection laws may impose.
What are the six phases of the data security lifecycle?
CreateStoreUseShareArchiveDestroy
Why is the size of data sets a consideration in portability between cloud service providers?
The sheer size of data may cause an interruption of service during a transition, or a longer transition period than anticipated.
What are the four D’s of perimeter security?
DeterDetectDelayDeny
In which type of environment is it impractical to allow the customer to conduct their own audit, making it important that the data center operators are required to provide auditing for the customers?
In multiñtenant environments the operator or provider cannot normally accommodate visits by every customer to conduct an audit.
What measures could be taken by the cloud service provider (CSP) that might reduce the occurrence of application level incidents?
SaaS providers that generate extensive customerñspecific application logs and provide secure storage as well as analysis facilities will ease the IR burden on the customer.
How should an SDLC be modified to address application security in a Cloud Computing environment?
Organizations must adopt best practices for development, either by having a good blend of processes, tools, and technologies of their own or adopting one of the maturity models.
What is the most significant reason that customers are advised to maintain inñhouse key management?
To be able to prove that all data has been deleted from the public cloud environment when exiting that environment.
What two types of information will cause additional regulatory issues for all organizations if held as an aspect of an Identity?
PII ñ Personal Identifiable InformationSPI ñ Sensitive Personal Information
Why do blind spots occur in a virtualized environment, where networkñbased security controls may not be able to monitor certain types of traffic?
Virtual machines may communicate with each other over a hardware backplane, rather than a network.
When deploying Security as a Service in a highly regulated industry or environment, what should both parties agree on in advance and include in the SLA?
Agreement on the metrics defining the service level required to achieve regulatory objectives
Economic Denial of Service (EDOS), refers to…
The destruction of economic resources; the worst case scenario would be bankruptcy of the customer or a serious economic impact
How does SaaS alleviate much of the consumer’s direct operational responsibility?
The provider is not only responsible for the physical and environmental security controls, but it must also address the security controls on the infrastructure, the applications, and the data.
In Europe, name the group that has enacted data protection laws and the principles on which they follow.
The European Economic Area (EEA) Member States follow principles set forth in the 1995 European Union (EU) Data Protective Directive and the 2002 ePrivacy Directive as amended in 2009.
What is the minimum that U.S. state laws require when using a Cloud Service Provider?
Written contract with the service provider with reasonable security measures.
What must be included between an organization and a Cloud Service Provider when the organization has contractual obligations to protect the personal information of their clients, contacts or employees, to ensure that the data are not used for secondary use and are not disclosed to third parties?
The organization must ensure contractually that it will have the continued ability to meet the promises and commitments that it made in its privacy notice(s) or other contracts.
What is a clickñwrap agreement?
A nonñnegotiated contract
How does an organization respond to the evolving nature of the cloud environment?
Periodic monitoring, testing, and evaluation of the services.
What must a U.S. litigant provide during eñdiscovery?
All documents that pertain to the case whether favorable to its case or the other litigant’s case.
What is ESI?
Electronically Stored Information
What are four considerations for a cloud customer to understand in reference to regulatory compliance?
ñ Crossñborder or multiñjurisdictionñ Assignment of compliance responsibilities including the CSP’s providersñ CSP capability to show complianceñ Relationship between all parties including customer, CSP, auditors and CSP’s providers
What role do audits perform in the cloud relationships?
Audits must be independently conducted and should be robustly designed to reflect best practice, appropriate resources, and tested protocols and standards.
At what stage should compliance be addressed between an organization and CSP?
Requirements identification stage
What is multiñtenancy?
Use of same resources or application by multiple customers that may belong to the same organization or a different organization.
What does a cloud service model need to include for multiñtenancy consumers?
Policyñdriven enforcementSegmentationIsolationGovernanceService LevelsChargeback/billing models
What services can be shared in multiñtenancy cloud service models?
InfrastructureDataMetadataServicesApplications
What three cloud services make up the Cloud Reference Model?
Infrastructure as a Service (IaaS)Platform as a Service (PaaS)Software as a Service (SaaS)
Define IaaS
IaaS delivers computer infrastructure as a service along with raw storage and networking.
Define PaaS
PaaS delivers computing platform and solution stack as a service.
Define SaaS
SaaS delivers software and its associated data hosted centrally typically in the cloud and are usually accessed by users via a web browser over the Internet.
List the four dimensions in the Jericho Cloud Cube Model
ñ Internal (I) / External (E): Physical Locationñ Proprietary (P) / Open (O): State of Ownership ñ Perimeterised (Per) / Deñperimeterised (Dñp): Architectural mindsetñ Insourced / Outsourced: Who provides the cloud service
List the four cloud deployment models
PublicPrivate ñ internal/externalHybridCommunity
What is the key takeaway for security architecture?
The lower down the stack the CSP stops, the more security capabilities and management consumers are responsible for implementing and managing themselves.
What are the risks and pitfalls to consider in the Cloud Security Reference Model?
ñ How / where cloud service are deployedñ Manner in which cloud services are consumedñ Reñperimeterization of enterprise networksñ Types of assets, resources and information being managedñ Who manages them and howñ Which controls are selected and how they are integratedñ Compliance issues
How do you determine the general security posture of a service and how it relates to an asset’s assurance and protection requirements?
ñ Classify a cloud service against the cloud architectural modelñ Map the security architecture and business, regulatory, and other compliance requirements as a gapñanalysis exercise
What do cloud service brokers provide?
ñ Intermediationñ Monitoringñ Transformation/portabilityñ Governanceñ Provisioningñ Integration servicesñ Relationship negotiation between CSP and consumers
What are included in a Service Level Agreement (SLA)?
ñ Service levelsñ Securityñ Governanceñ Complianceñ Liability expectations of the service and provider
What are two types of Service Level Agreements (SLA)?
NegotiableNonñnegotiable
Name the five basic principles followed in Corporate Governance.
ñ Auditing supply chainsñ Board and management structure and processñ Corporate responsibility and complianceñ Financial transparency and information disclosureñ Ownership structure and exercise of control rights
Define Corporate Governance
The set of processes, technologies, customs, policies, laws and institutions affecting the way an enterprise is directed, administered or controlled.
Define Information Risk Management
The process of identifying and understanding exposure to risk and the capability of managing it, aligned with the risk appetite and tolerance of the data owner.
Define Enterprise Risk Management
The methods and processes used by organizations to manage risks and seize opportunities related to the achievement of their objectives.
List four of the specific risks identified and analyzed by management in a cloud environment.
ñ Avoidance: exiting the activities giving rise to riskñ Reduction: taking action to reduce the likelihood or impact related to the riskñ Share or insure: transferring or sharing a portion of the risk to finance itñ Accept: no action is taken due to a cost/benefit decision
What should be specifically targeted in the assessment of a CSP’s third party service providers?
ñ Incident managementñ Business continuityñ Disaster recovery policies, processes and proceduresñ Review of coñlocation and backñup facilities
What is a CSP’s supply chain?
Their service provider relationships and dependencies
How should the cost savings obtained by cloud computing services be utilized?
Reinvest into increased scrutiny of the security capabilities of the provider, application of security controls, and ongoing detailed assessments and audits to ensure requirements are continuously met.
Define Public Cloud
The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.
Define Private Cloud
The cloud infrastructure is operated solely for a single organization. It may be managed by the organization or by a third party and may be located onñpremise or offñpremise.
Define Community Cloud
The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy or compliance considerations). It may be managed by the organizations or by a third party and may be located onñpremise or offñpremise.
Define Hybrid Cloud
The cloud infrastructure is a composition of two or more clouds (private, community of public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for loadñbalancing between clouds).
Define Cloud Bursting
Where an enterprise shares the load with external cloud providers to meet peak demands
In most jurisdictions in the U.S., what types of information are a party obligated to produce?
Documents and data within its possession, custody or control.
What types of data hosted by a CSP could be outside the control of a client?
ñ Disaster recovery systemsñ Certain metadata created and maintained by the CSP to operate its environment
What should a client account for during eñdiscovery?
Additional time and expense where a client may not have the ability or administrative rights to search or access all of the data hosted in the cloud.
In the U.S. what is generally considered to be the obligation of a client who knows or reasonably should know is relevant to a pending or reasonably anticipated litigation or government investigation?
To undertake reasonable steps to prevent the destruction or modification of data or information in its possession, custody or control.
Who is held liable for acts of a subcontractor?
Government agencies, such as the FTC or the state Attorney General, have consistently held organizations liable for the activities of their subcontractors.
What does the GLBA and HIPAA require between an organization and their subcontractor?
The security and privacy rules require organizations to compel their subcontractors in written contracts to use reasonable security measures and comply with data privacy provisions.
What two general categories do assets supported by the cloud fall into?
- Data2. Applications/Functions/Process
What is the first step in evaluating risk for the cloud?
Determine exactly what data or function is being considered for the cloud.
What is the second step in evaluating risk for the cloud?
Determine how important the data or function is to the organization.
For each asset, what three areas are assessed if all or part of the asset is handled in the cloud?
- Confidentiality2. Integrity3. Availability requirements