CCSK - V4 and ENISA (Quizlet) Flashcards
What is the standard cloud computing model used here?
NIST (National Institute of Standards and Technology, a US federal agency); the ISO definition is similar.
What are the five essential characteristics that NIST uses to define cloud computing?
1) broad network access 2) rapid elasticity 3) measured service 4) on-demand self service 5) resource pooling
What are the four cloud deployment models defined by NIST?
1) Public 2) Private 3) Hybrid 4) Community
What is a cloud broker?
Entity that manages the use, performance, and delivery of cloud services (and negotiates relationship with customer)
What is the Jericho Cloud Cube Model?
Four dimensions to differentiate cloud (or IT) formations:
1) External/Internal (physical location)
2) Proprietary/Open (technology)
3) Perimiterized/De-perimiterized (within firewall)
4) Outsourced/Insourced
What is the CSA Cloud Reference Model?
The service models fit in an architectural framework (where APIs are an important access mechanism)
What is Multi-tenancy (in the ISO definition)
The characteristic of multiple independent consumers sharing resources, which implies a need for certain controls.
What are SLAs for?
Important control to allocate responsibility between consumer and provider. Shared responsibility model.
How do characteristics introduce risk?
Broad network access introduces the client device and the network as new sources of risk. Rapid Elasticity brings availability risks. Measured service can bring licensing risk. Resource pooling brings isolation related risks. On-demand self service introduces risks around who can control what.
What are Security concerns for hypervisor architecture?
VM hosts and guests need to be hardened; Hypervisor software and provenance is highest risk area.
What do you need to know about AV?
Don’t run AV scan inside VM; use hypervisor aware products.
What are blind spots?
Inter VM communication may not be visible in the physical network (i.e. through virtual switch or side channel) leading to blind spots.
What are blind spots?
Inter VM communication may not be visible in the physical network (i.e. through virtual switch or side channel) leading to blind spots.
What are VM isolation (compartmentalization) techniques?
LANs, IDS/IPS, Firewalls, zoning (combinations may be required for complian
How can VM persistent storage leak risk (safe destruction) be countered?
Storage level encryption
What is VM image risk?
Too many different images (sprawl) and images that are not up to date (staleness)
What is Commingling?
Sensitive data may be in non compliant zones.
Why is asset management more complicated?
Asset management for audit/monitoring is complicated by the extra need need to track hosts as well as guests and images.
What is OVF?
Open Virtualization Format (helps ensure interoperability)
What is a instant-on gap?
Securely configured VM when off but vulnerable by the time it is started.
How does In-Motion VM characteristics create complexity for audits?
The unique ability to move virtual machines from one physical server to another creates a complexity for audits and security monitoring. In many cases, virtual machines can be relocated to another physical server (regardless of geographic location) without creating an alert or track-able audit trail.
What are four D’s of perimeter security?
Deter, Detect, Delay and Deny
How are service levels established?
Documentation should make clear how service levels are maintained in the face of technical, natural, and malicious threats.
How is risk associated with a real person and a real machine doing the work on a real location in the cloud managed?
BCM (Business Continuity Management) aims to reduce risk in this area.