Chapter 6: Securing the Cloud Flashcards

1
Q

Four Different Cloud Delivery Options

200

A

<b>P</b>rivate Cloud
-Usually means it’s owned and operated by the same person.
<b>P</b>ublic Cloud
-Someone owns the cloud infrastructure and leases it out
<b>C</b>ommunity Cloud
-Exclusive use by a specific community, generally one with common goals
<b>H</b>ybrid Cloud
-A combination of the types listed above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Type I vs. Type II Hypervisor

201

A

<b>T</b>ype I Hypervisor, AKA <b>bare metal</b>
-Independent of the Operating System and boots before it
<b>T</b>ype II Hypervisor, AKA <b>hosted</b>
-The VMware is dependent on the OS and cannot be booted up until the OS is ready. This is common in consumer-grade VMware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Snapshots

203

A

Saving the state of the VM so you can revert it in case of system failure.
-This can also be used for VM cloning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Patch Compatibility

203

A

You need to make sure before you roll a patch out to all your virtual machines that it’s not gonna break them. Make sure to have a test machine readily available any time you want to make a significant change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Host Availability/Elasticity

204

A

Not only is it important for Cloud hosts to have their infrastructure up and running 99.999% of the time, but they also need to be very flexible. A consumer needs to be able to scale up their environment as much as they need to. You should make it feel limitless for them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security Control Testing

204

A

Essentially penetration testing on the Virtual Machine. Throw everything you have at it so you can find its weaknesses and append/report them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Sandboxing

204

A

Running the applications in restricted memory store, limiting the possibility of app crash, which could let the client server hop and fuck someone else up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Multitenancy

A

Cloud computing is so damned cost efficient pretty much only because they run one giant machine that all of their clients use at the same time. If a security flaw can be found, a client could start accessing other peoples’ information.

What you need to do is see if you can segregate your data, encrypt everything you have, keep an eye on the logs, and try to use a VPN if you can. YOU are responsible for your own data, whether someone else is hosting it or not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly