Chapter 10 - Security in Cloud Computing Flashcards
What are the 3 types of cloud computing?
Infrastructure as a Service, Platform as a Service, Software as a Service
IaaS
Ifrastructure as a Service - Provides virtualized computing resources. Third party hosts the servers with hypervisor running the VMs as a guests. Subscribers usually pay on a per-use basis.
PaaS
Geared towards software development. Hardware and software hosted by provider. Develop without having to worry about hardware or software.
SaaS
Provider supplies on-demand applications to subscribers . Offloads the need for patch management, compatability and version control
Cloud Deployment Model - Public Cloud
Services provided over a network that is open for public to use
Cloud Deployment Model - Private Cloud
Cloud solely for use by one tenant; usually done in larger organziations
Cloud Deployment Model - Community Cloud
Cloud shared by several organizations, but not open to public
Cloud Deployment Model - Hybrid Cloud
A composition of two or more cloud deployment models.
Cloud Carrier
Organization with responsibility of transferring data; akin to power distributor for electric grid.
Cloud Consumer
Aquires and uses cloud products and services
Cloud Provider
Purveyor of products and services
Cloud Broker
Manages use, performance and delivery of services as well as relationships between providers and subscribers
Cloud Auditor
independent assessor of cloud service an security controls
FedRAMP
regulatory effort regarding cloud computing
PCI DSS
Payment Card Industy Data Security Standard - Deals with debit and credit cards, but also has a cloud SIG
Trusted Computing Model
Attempts to resolve computer security problems through hardware enhancements as well as software modifications
Roots of Trust (RoT)
Set of functions within TCM that are always trusted by the OS
CloudInspect
Pen-testing application for AWS EC2 users
CloudPassage Halo
Instant visibility and continuous protection for servers in any cloud
Dell Cloud Manager
Cloud management tool
Qualys Cloud Suite
Cloud management tool
Cloud Threats & Attacks - Data Breach or Loss
Biggest threat; includes malicious theft, erasure or modification
Cloud Threats & Attack - Shadow IT
IT systems or solutions that are developed to handle an issue but aren’t taken through proper approval chains
Cloud Threats & Attack - Abuse of Cloud Resources
Another high threat (usuallly applies to IaaS and PaaS)