CCSK - V4 and ENISA (Quizlet) Flashcards
What is the standard cloud computing model used here?
NIST (National Institute of Standards and Technology, a US federal agency); the ISO definition is similar.
What are the five essential characteristics that NIST uses to define cloud computing?
1) broad network access 2) rapid elasticity 3) measured service 4) on-demand self service 5) resource pooling
What are the four cloud deployment models defined by NIST?
1) Public 2) Private 3) Hybrid 4) Community
What is a cloud broker?
Entity that manages the use, performance, and delivery of cloud services (and negotiates relationship with customer)
What is the Jericho Cloud Cube Model?
Four dimensions to differentiate cloud (or IT) formations:
1) External/Internal (physical location)
2) Proprietary/Open (technology)
3) Perimiterized/De-perimiterized (within firewall)
4) Outsourced/Insourced
What is the CSA Cloud Reference Model?
The service models fit in an architectural framework (where APIs are an important access mechanism)
What is Multi-tenancy (in the ISO definition)
The characteristic of multiple independent consumers sharing resources, which implies a need for certain controls.
What are SLAs for?
Important control to allocate responsibility between consumer and provider. Shared responsibility model.
How do characteristics introduce risk?
Broad network access introduces the client device and the network as new sources of risk. Rapid Elasticity brings availability risks. Measured service can bring licensing risk. Resource pooling brings isolation related risks. On-demand self service introduces risks around who can control what.
What are Security concerns for hypervisor architecture?
VM hosts and guests need to be hardened; Hypervisor software and provenance is highest risk area.
What do you need to know about AV?
Don’t run AV scan inside VM; use hypervisor aware products.
What are blind spots?
Inter VM communication may not be visible in the physical network (i.e. through virtual switch or side channel) leading to blind spots.
What are VM isolation (compartmentalization) techniques?
LANs, IDS/IPS, Firewalls, zoning (combinations may be required for complian
How can VM persistent storage leak risk (safe destruction) be countered?
Storage level encryption
What is VM image risk?
Too many different images (sprawl) and images that are not up to date (staleness)
What is Commingling?
Sensitive data may be in non compliant zones.
Why is asset management more complicated?
Asset management for audit/monitoring is complicated by the extra need need to track hosts as well as guests and images.
What is OVF?
Open Virtualization Format (helps ensure interoperability)
What is a instant-on gap?
Securely configured VM when off but vulnerable by the time it is started.
How does In-Motion VM characteristics create complexity for audits?
The unique ability to move virtual machines from one physical server to another creates a complexity for audits and security monitoring. In many cases, virtual machines can be relocated to another physical server (regardless of geographic location) without creating an alert or track-able audit trail.
What are four D’s of perimeter security?
Deter, Detect, Delay and Deny
How are service levels established?
Documentation should make clear how service levels are maintained in the face of technical, natural, and malicious threats.
How is risk associated with a real person and a real machine doing the work on a real location in the cloud managed?
BCM (Business Continuity Management) aims to reduce risk in this area.
Is automation of logging and reporting required (especially over multi-site datacenters)?
Yes
What are the six phases of the Data Security Lifecycle and their key elements?
The six phases of the data lifecycle with their top controls are create (classify), store (encryption), use (logical controls), share (DLP, encryption), archive (asset management), destroy (crypto shredding).
What are data at rest security options?
1) Data dispersion/fragmentation (spread over multiple disks)
2) Replication (multiple copies)
3) Encryption
Which locations can data in motion encryption be applied?
1) Application (server and/or client side encryption) 2) Link (for example: HTTPS, VPN) 3) Proxy based encryption (related to DLP
What are all data in motion security options?
Data can be protected by access controls, encryption, database and file monitoring, URL or content based filtering (Data Loss or Leakage Prevention)
Why are data abstraction levels important?
Distinguish raw storage, volume storage, object storage, database, CDN (each of these abstractions has its own Features, Risks, Threats, and Control opportunity)
What is Portability?
The ease with which applications and data can be moved to a different provider (or into the cloud in the first place)
What is Interoperability?
Elements of the cloud ecosystem working together
What is an example of how open standards can ease interoperability (and portability)?
SAML
How can lock-in risk be mitigated?
Portability
What is WS-Security for?
WS-Security is for securing web services.
What is SAML for?
SAML is for making identities portable and inter-operable.
What is Portability solution for IaaS?
OVF (open virtualization format) - open standard virtual machine images
What is Portability solution for PaaS?
Open API
What should be included in every service offering?
IR functionality should be engineered into any service offering. Up to date contact lists. Responsibilities shift across service models. Virtualization can make IR and forensics easier, including offline analysis. IR readiness is something to check on an (internal) audit.
What is the main data source for analysis of an incident?
Logging.
How can incidents and/or their impact be reduced?
Customer specific application logs
What is the IR (Incident Response) lifecycle?
Preparation, detection & analysis, containment, eradication & recovery
How often should IR testing be performed?
At least annually
What is ENISA?
European Network and Information Security Agency
What are the top 8 risks according to ENISA?
LOSS OF GOVERNANCE (cloud provider does not commit to necessary task) LOCK-IN (vendor lock-in) ISOLATION FAILURE (one tenant influences another) COMPLIANCE RISKS (audit impossible, or no evidence) MANAGEMENT INTERFACE COMPROMISE DATA PROTECTION (protection cannot be demonstrated) INSECURE OR INCOMPLETE DATA DELETION MALICIOUS INSIDER (cloud provider or auditor)
What are the key legal issues common across all scenarios?
Data protection, confidentiality, intellectual property, professional negligence, outsourcing services and changes in control