Chapter 10 - Cloud and Virtualization Security Flashcards

1
Q

Cloud Computing

A

Cloud Computing is where cloud service providers deliver computing services to their customers over the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Multitenancy

A

Multitenancy is the fact that many different users share resources in the same cloud infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Scalability

A

Scalability allows cloud customers to manually or automatically increase the capacity of their operations. In some cloud environments, this can be completely transparent and be performed behind the scenes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Elasticity

A

Elasticity says that capacity should expand and contract as needs change to optimize costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Measured Service

A

Measured Service refers to how everything you do (processing time, storage, log entries) in the cloud is measured by the provider. They use this information to be able to assess charges based on your usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the common Roles in Cloud Computing?

A
  1. Cloud service provider
  2. Cloud consumer
  3. Cloud partner (offer ancillary products or services that integrate with the offerings of a cloud service provider)
  4. Cloud auditor (third-party assessment of cloud services)
  5. Cloud carrier (provide connectivity between cloud provider and consumer)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Infrastructure as a Service (IaaS)

A

Infrastructure as a Service offerings allow customers to purchase and interact with the basic building blocks of a technology infrastructure. These include computing, storage, and networks. Some examples of IaaS providers include AWS, Microsoft Azure and Google Cloud Platform (GCP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Software as a Service (SaaS)

A

Software as a Service offerings provide customers with access to a fully managed application running in the cloud. The provider is responsible for everything from the operation of the physical datacenters to the performance management of the application itself. A common example of SaaS is web-based email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Platform as a Service (PaaS)

A

Platform as a Service offerings fit into a middle ground between SaaS and IaaS solutions. In PaaS, the service provider offers a platform where customers may run applications that they have developed themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Function as a Service (FaaS)

A

Function as a Service platforms are an example of PaaS computing. This approach allows customers to upload their own code functions to the provider and then the provider will execute those functions on a scheduled basis in response to events and/or on demand. A common example of FaaS would be AWS Lambda.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Managed Service Provider (MSP)

A

Managed Service Providers are service organizations that provide information technology as a service to their customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Public Cloud

A

Public Cloud service providers deploy infrastructure and then make it accessible to any customers who wish to take advantage of it in a multitenant model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Private Cloud

A

Private Cloud describes any cloud infrastructure that is provisioned for use by a single customer. This infrastructure may be built and managed by the organization that will be using the infrastructure, or it may be built and managed by a third party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Community Cloud

A

Community Cloud services share characteristics of both the public and private models. Community Cloud services do run in a multitenant environment, but the tenants are limited to members of a specifically designed community.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hybrid Cloud

A

Hybrid Cloud is a catch-all term used to describe cloud deployments that blend public, private, and/or community cloud services together. It is NOT simply purchasing both public and private cloud services and using them together. AWS Outpost is a common Hybrid Cloud technology.

Another example of a Hybrid Cloud is a firm that operates their own private cloud for the majority of their workloads and then leverages public cloud capacity when demand exceeds the capacity of their private cloud infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Bursting

A

Bursting is a configuration that allows a private cloud to access additional computing resources from a public cloud when there is a sudden increase in demand.

17
Q

Shared Responsibility Model

A

Shared Responsibility Model refers to dividing responsibilities between one or more cloud service providers and the cloud customers’ own cybersecurity teams.

18
Q

Edge Computing

A

Edge Computing is about processing data closer to where it’s being generated, enabling processing at greater speeds and volumes. Only after the data is processed at the edge can it then be sent back to the cloud.

19
Q

Fog Computing

A

Fog Computing uses IoT gateway devices that are located in close physical proximity to the data generation points. These data generation points themselves don’t necessarily have processing power, but they send data to their local gateway that performs preprocessing before sending the results to the cloud.

20
Q

Isolation

A

Isolation, in the context of virtualization, is the primary responsibility of the hypervisor. The hypervisor must present each virtual machine with the illusion of a completely separate physical environment dedicated for use by that virtual machine.

21
Q

Containers

A

Containers provide application-level virtualization. Instead of creating complex virtual machines that require their own operating systems, containers package applications and allow them to be treated as units of virtualization that become portable across operating systems and hardware platforms.

22
Q

Block Storage

A

In cloud computing, Block Storage allocates large volumes of storage for use by virtual server instances. These volumes are then formatted as virtual disks by the operating system on those server instances and used as they would a physical drive. An example of Block Storage in the cloud is Elastic Block Storage (EBS) by AWS.

23
Q

Object Storage

A

In cloud computing, Object Storage provides customers with the ability to place files in buckets and treat each file as an independent entity that may be accessed over the web or through the provider’s API. An example of Object Storage in the cloud is AWS Simple Storage Service (S3).

24
Q

What are the three most important security considerations to keep in mind while working with cloud storage?

A
  1. Set permissions properly
  2. Consider high availability and durability options
  3. Use encryption to protect sensitive data
25
Q

Segmentation

A

Segmentation allows network engineers to place systems of differing security levels and functions on different network subnets.

26
Q

Virtual Private Cloud (VPC)

A

Virtual Private Clouds allow teams to group systems into subnets and designate those subnets as public or private, depending on whether access to them is permitted from the Internet. A VPC will have fully dedicated resources rather than potentially sharing the underlying hardware.

27
Q

Infrastructure as Code (IaC)

A

Infrastructure as Code is one of the key enabling technologies behind the DevOps movement. IaC is the process of automating the provisioning, management, and deprovisioning of infrastructure services through scripted code rather than human intervention. IaC approaches depend on the use of APIs offered by cloud providers.

28
Q

Data Sovereignty

A

Data Sovereignty is a principle that states that data is subject to the legal restrictions of any jurisdiction where it is collected, stored, or processed.

29
Q

Virtual Machine Escape

A

Virtual Machine Escape attacks are when the attacker has access to a single virtual host and then manages to leverage that access to intrude upon the resources assigned to a different virtual machine.

30
Q

Virtual Machine Sprawl

A

Virtual Machine Sprawl occurs when IaaS users create virtual service instances and then forget about them or abandon them, leaving them to accrue costs and accumulate security issues over time.

31
Q

Resource Reuse

A

Resource Reuse occurs when cloud providers take hardware resources that were originally assigned to one customer and reassign them to another customer. If the data was not properly removed from that hardware, the new customer may inadvertently gain access to data belonging to another customer.

32
Q

Secure Web Gateways (SWGs)

A

Secure Web Gateways provide a layer of application security for cloud-dependent organizations. SWGs monitor web requests made by internal users and evaluate them against the organization’s security policy, blocking requests that run afoul of these requirements.

33
Q

Auditability

A

Auditability, in the context of the cloud, describes the customers ability to perform audits on cloud service providers either themselves or via third party auditor.

34
Q

Cloud Access Security Broker (CASB)

A

Cloud Access Security Brokers are software tools that serve as intermediaries between cloud service users and cloud service providers. This positioning allows them to monitor user activity and enforce policy requirements.

35
Q

Inline CASB Solutions

A

Inline CASB Solutions physically or logically reside in the connection path between the user and the service. They may do this through a hardware appliance or an endpoint agent that routes requests through the CASB.

36
Q

API-Based CASB Solutions

A

API-Based CASB Solutions do not interact directly with the user but rather interact directly with the cloud provider through the provider’s API. This approach does not allow the CASB to block requests that violate policy. API-Based CASBS are limited to monitoring user activity and reporting on or correcting policy violations after the fact.

37
Q

Resource Policies

A

Cloud providers offer Resource Policies that customers may use to limit the actions that users of their accounts may take.

38
Q

VPC Endpoint

A

VPC Endpoints allow connections of VPCs to each other using the cloud provider’s secure network.

39
Q

Cloud Transit Gateways

A

Cloud Transit Gateways extend the model of VPC endpoints even further, allowing the direct interconnection of cloud VPCs with on-premises VLANs for hybrid cloud operations.