Chapter 4 Flashcards

1
Q

Cloud computing Risks by deployment model

A

To prepare for cloud migration and the requisite contract negotiation (and for familiarization with CCSP CBK content), it is useful to review the risks particular to each of the cloud deployment models. These include the private, community, public, and hybrid cloud models.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cloud computing Risks: Private cloud

A

Personal Threats
Natural disasters
External attacks
Regulatory non compliance
Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cloud computing Risks: Community cloud

Eg: Online gaming as a community cloud

A

1.Resiliency thru shared ownership: this introduces additional risks because each node is its own point of entry and a vulnerability in any one node can result in an intrusion on the others

2.Shared costs: Overhead and cost of the infrastructure is shared among the members of the community, but so are access and control.

3.No Need for Centralized Administration for Performance and Monitoring:
Although this removes many burdens of centralized administration, it also removes the reliability of centralized and homogenized standards for performance and security monitoring.

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cloud computing Risks: Public Cloud

A

Vendor Lock-in
Vendor lock-out
Multitenant environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vendor lock-in

A

There are several things an organization can do to enhance the portability of its data:

  1. Ensure favorable contract terms for portability.
  2. Avoid proprietary formats.
    3.Ensure there are no physical or technical limitations to moving.
  3. Check for regulatory constraints.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vendor lock-out

A

consider the following factors when selecting a cloud provider:

provider longevity
core competency
jurisdictional suitability
supplychain dependencies
legislative env

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Mulit tenant env

A

conflict of interest
escalation of privilege
information bleed
legal activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud computing risks by service model

A

Another consideration in cloud migration and contract negotiation is the risks inherent in each of the cloud service models.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud computing risks - IaaS

A

Personal threats
External threats
Lack of specific skillsets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cloud computing risks - PaaS

A

interoperability issues
Persistent backdoors
Virtualization
Resource sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cloud computing risks - SaaS

A

Proprietary formats
Virtualization
Web app security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Virtualization risks

A
  1. Attacks on the hypervisor: type1, type2:
    Attackers prefer Type 2 hypervisors because of the larger surface area.
  2. Guest escape:
  3. Information bleed
  4. Data seizure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Guest Escape / VM Escape

A

An improperly designed or poorly configured virtualized machine or hypervisor might allow for a user to leave the confines of their own virtualized instance. This is referred to as guest escape or virtual machine (VM) escape. A user who has successfully performed guest escape might be able to access other virtualized instances on the same host and view, copy, or modify data stored there. Worse, the user might be able to access the host itself and therefore be able to affect all the instances on the machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Information bleed

A

This is another risk stemming from malfunctions or failures. The possibility exists that processing performed on one virtualized instance may be detected, in whole or in part, by other instances on the same host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data Seizure

A

Legal activity might result in a host machine being confiscated or inspected by law enforcement or plaintiffs’ attorneys, and the host machine might include virtualized instances belonging to your organization, even though your organization was not the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly