Chapter 7 - Cloud Application Security Flashcards

1
Q

What is forklifting ?

A

Bringe an app into the cloud without significant changes in the code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are common cloud application deployment pitfalls

A

Quick Remote calls take longer in the cloud, the code is not ready And Multi tenancy can lead to e.g. information bleeding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the steps of the SDLC?

A

Define, design, develop, test, secure operations and disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the ISO/IEC 27034 about?

A

Information technology - security techniques - application security.

Include pets of ONF and ANF related to application security . One to N relation from I to a and one to one from a to o.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is IAM

A

Identity and access management

Identity management is the process. Contains issuing an identity, creating a Password

Access management is about authentication, authorization , policy management, federation and Identity repositories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the two options on federated identity management?

A

Web of trust where each member reviews and approve each member… low scalability

Third party identifier where a third party takes this tasks. Third party could be CASB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the roles in federated I’m

A

Identity provider and relying Parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are Federation standards?

A

SAML (most used one)
WS federation
OAuth
OpenIDConnect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the concept of web application firewalls

A

They are applied in addition to traditional firewalls. It knows how the application should behave and detected the smallest changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is database survived monitoring DAM and deception technology

A

Piece of software that watches databases and sends alerts in case of unusual activity or requests

Deception technology is the use of WAF and DAM. Deception occurred by quietly rerouting the traffic to a database filled wir useless data to tell and enforce law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which technique is typically used with data in transit ?

A

SSL and Tal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which types of vPN exist?

A

Virtual vpn and virtual wir security

Virtual vpn hat no encryption and works with shims
Virtual with security are known as IPSec VPN and used end to end encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is whole instance encryption?

A

The entire storage is encrypted as a whole. Today with strong processors it is feasible on small smart devices. Snapshots must also be considered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is volume encryption

A

Just as whole instance encryption but only a certain volume is encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the STRIDE model?

A
Spoofing 
Tampering
Repudiation
Information disclosure
Denial of service
Elevation of privileges

It is used to address threats to an application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are common vulnerabilities?

A

Injection, broken authentication, cross site scripting, insecure direct object access, security misconfiguration, sensitive data exposure, missing function level access control, cross site request forgery , using components with known vulnerabilities and invalidated redirects and forwards

17
Q

What does quality of service target?

A

That security mechanisms do not increase performance to heavily

18
Q

What are vulnerability scans and penetration testing?

A

Vulnerability scanning is scanning for known vulnerabilities

Penetration testing of vulnerability scanning plus taking action and thus having an active component

19
Q

What is sast and what is dast

A

Sast is a form of what box testing where the code is reviewed whereas dast is a sort of black box testing where code is not known and the application is run to look for problems and vulnerabilities

20
Q

What does the NIST Framework for critical infrastructure cybersecurity consist of?

A

Framework core components: identify, protect, detect, respond, recover

Framework Profile: used to Assists organization align activities with business requirements

Framework implementation Tiers: identity where organization is with regard to their particular approach

21
Q

What is runtime application self-perfection?

A

It is able to reconfigure itself without human intervention. It is called Ringtone because it launches itself as the application is executed in benotet