Chapter 1 Flashcards
CASB - The cloud access security broker
managed identity and access management service to cloud customers that integrates security requirements across cloud services
Virtualization platform
virtualization platforms involve the use of a host machine that actually has physical hardware. That hardware then hosts several or many virtual guest machines that run operating systems of their own.
Hypervisor
The host machine runs special software known as a hypervisor to manage the guest virtual machines (VMs).
Type1
In a Type 1 hypervisor, also known as a bare metal hypervisor, the hypervisor runs directly on top of the hardware and then hosts guest operating systems on top of that. This is the most common form of virtualization found in data centers.
Type 2
In a Type 2 hypervisor, the physical machine actually runs an operating system of its own and the hypervisor runs as a program on top of that operating system. This type of virtualization is commonly used on personal computers. Common hypervisors used in this scenario are VirtualBox and Parallels.
Virtualization Security
VM Escape/attack
VM Sprawl
VM Escape/Attack
In a virtualized environment, this may not be the case if the attacker is able to break out of the virtualized guest operating system. This type of attack is known as a VM Escape/attack
VM Sprawl
where there are large numbers of unused and abandoned servers on the network.
This is not only wasteful, it’s also a security risk because those servers are not being properly maintained and may accumulate serious security vulnerabilities over time if they are not properly patched.
Service Level agreements - SLAs
Customers should negotiate specific service levels with vendors during the contracting process and then document those service levels in written agreements called Lime Highlight created at 6:33 AM on 9/8/24service-level agreements (SLAs). SLAs specify the requirements that the vendor agrees to meet and commonly include financial penalties if the vendor fails to live up to operational obligations.
Outsourcing Issues
Reversibility
Portability
Interoperability
Emerging Technologies
AI / ML
Blockchain
IoT
Containers
Quantum computing
Edge and Fog computing
Confidential computing
DevOps and DevSecOps