Chapter 7 – Cloud Application Security Flashcards
What is Forklifting?
Moving an entire application to the cloud without significant changes; often self-contained stand-alone applications.
What is Cloud-Secure SDLC?
A Software Development Lifecycle focusing on security throughout the development phases.
What is the focus during the Defining phase of SDLC?
To identify the business requirements of the application and describe aspects of the business needs.
What is developed during the Designing phase of SDLC?
User stories, interface design, and requirements for APIs.
What occurs during the Development phase of SDLC?
The phase where the code is written.
What activities are involved in the Testing phase of SDLC?
Initial penetration testing and vulnerability scanning; includes DAST and SAST.
What is Functional Testing?
Ensures the software performs its intended tasks completely and accurately.
What is Security Testing?
Ensures that the controls included in the software are working effectively.
What begins the Secure Operations phase?
When thorough testing is complete and the environment is secure.
What happens during the Disposal phase?
Software must be securely disposed of when it reaches end of life or is replaced.
What is QA (Quality Assurance)?
Management/inspection to reduce the possibility of introducing errors.
What does ISO/IEC 27034-1 Standards for Secure Application Development provide?
An approach for tracking security controls used in software and an overview of application security.
What is ONF (Organizational Normative Framework)?
A framework for all components of application security controls and best practices.
What is ANF (Application Normative Framework)?
Subsets of ONF for each specific application, sharing applicable parts needed for security.
What is the relationship between ANF and ONF?
ANF-to-ONF is one-to-one; ONF-to-ANF is one-to-many.
What is IAM (Identity and Access Management)?
About the people, processes, and procedures used to manage identities.
What is Identity Management?
The process of associating user rights with a given identity.
What is Provisioning in Identity Management?
Issuing a unique identity assertion and a password for authentication.
What does Access Management deal with?
Controlling access to resources and identifying user permissions.
What are Identity Repositories?
Stores of information or attributes of identities.