Chapter 4 – Cloud Data Security Flashcards

1
Q

What are the phases of the Data Lifecycle?

A

Create > Store > Use > Share > Archive > Destroy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of the Create phase?

A

Defines classification levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How should data created remotely be handled?

A

Data created by the user should be encrypted before uploading to the cloud; protects against MIIM attacks/insider threats at cloud data center; connection should be secure too (IPsec or TLS VPN solution).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How should data created within the cloud be handled?

A

Should be encrypted upon creation; allows both read and process functions to be performed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the Store phase refer to?

A

Usually refers to near-term storage; this phase will happen when the data is created (occurs simultaneously).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What security measures should be taken during the Store phase?

A

Encryption at rest/transit should happen before this phase begins.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is important during the Use phase?

A

Platforms used to connect to data in the cloud need to be secure (VPN, IRM, DLP); data owners should restrict permissions; logging and audit trails are important when data are manipulated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What should be considered when sharing data?

A

Craft sharing restrictions based on jurisdiction; limit/prevent data being sent to certain locations (export/import controls); implement some form of egress monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are ITAR and EAR?

A

ITAR prohibits defense-related exports; EAR prohibits dual-use items (technologies used for both commercial/military purposes).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Wassenaar Arrangement?

A

A group of 41 members that have agreed to mutually inform each other about conventional military shipments to nonmember countries; not a treaty, not legally binding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of the Archive phase?

A

Phase for long-term storage; cryptography is the essential consideration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is crucial for key management in the Archive phase?

A

Key management is important; if lost, it can lead to exposure or total loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the only feasible means of destruction?

A

Crypto shredding is the only feasible and thorough means available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Volume Storage?

A

Customer is allocated storage space; represented as an attached drive to user’s VM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the threats associated with Volume Storage?

A

All traditional data storage threats remain; malware, deletion of data, and physical disk failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Block Storage?

A

Provides low latency and high-performance values; useful for structured storage.

17
Q

What are the threats associated with Block Storage?

A

Requires greater amount of administration; risk of malware is reduced but parasitical viruses can infect specific files.

18
Q

What is File Storage?

A

Data stored/displayed with a file structure in a traditional environment (files/folders).

19
Q

What is Object-Based Storage best used for?

A

Best used for large unstructured data when durability, unlimited storage, scalability, and metadata management are factors for overall performance.

20
Q

What are the threats associated with Object-Based Storage?

A

Risk of malware is reduced but parasitical viruses can infect specific files; loss due to physical disk failure.

21
Q

What is Ephemeral Storage?

A

Temporary resource used for processing; referred to as instance store volumes.

22
Q

What are the threats associated with Ephemeral Storage?

A

Data will be lost if VM instance is shut down or physical drive fails.

23
Q

What is Long-Term Storage?

A

Durable data storage capacity; offered at low cost and large amounts; used for archiving/backups.

24
Q

What are the threats associated with Long-Term Storage?

A

Insider threat; intermediary (MiiM attacks); ransomware; vendor lock-in.

25
Q

What is SAN?

A

Dedicated high-speed network that interconnects and delivers shared pools of storage devices on multiple servers.

26
Q

What is iSCSI?

A

Makes it possible to set up a shared-storage network where multiple servers and clients can access central storage resources.

27
Q

What is NAS?

A

Remote storage accessed; hosted by 3rd party service provider.

28
Q

What do databases provide?

A

Some structure for stored data; arranged according to characteristics and elements in the data itself.

29
Q

What is a CDN?

A

Used for large amounts of data that require time-sensitive communication and low latency.

30
Q

What are the threats associated with CDN?

A

Intermediaries; insider threats; malware.

31
Q

What is Key Management?

A

How and where encryption keys are stored can affect the risk of data.

32
Q

What is an HSM?

A

Device that safely stores and manages encryption keys; used in servers, data transmission, and log files.

33
Q

What are Key Protection Methods?

A

Masking, Obfuscation, Anonymization, and Tokenization.

34
Q

What is DDM?

A

Dynamic Data Masking: replace sensitive data in transit leaving original at-rest data unaltered.

35
Q

What is SDM?

A

Static Data Masking: permanently replaces sensitive data by altering data at rest.

36
Q

What is Tokenization?

A

Practice of having two distinct databases: one with live, actual sensitive data; one with nonrepresentational tokens mapped to each piece of that data.

37
Q

What is SIEM?

A

Goals implementation of SIEM are to centralize collection of log data; enhance analysis capabilities; dashboarding; automated response.

38
Q

What is Egress Monitoring?

A

Examining data as it leaves the production environment; goals include additional security, policy enforcement, enhanced monitoring, and regulatory compliance.