Chapter 8 - Security in Cloud Computing Flashcards

1
Q

Infrastructure as a Service (IAAS)

A

good choice for day to day infrastructure and for temporary or experimental workloads that change unexpectedly

Typically paid for on a per-use basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Platform as a Service (PAAS)

A

geard to software development. Provides development platform so subscribers don’t have to build their own infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Software as a Service (SAAS)

A

provides on-demand applications to subscribers over the internet (like Salesforce).

removes headaches of patch management and security , administration, version control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4 deployment models for the cloud

A

public
private
community
hybrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

public cloud

A

services are provided over a public network like the internet

used when security and compliance requirements aren’t a major issue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

private cloud

A

operated solely for a single organization, usually not pay-as-you-go. Hardware is dedicated, compliance more easily met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

community cloud

A

infrastructure is shared by multiple organizations, usually with same compliance and policy considerations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

hybrid cloud

A

2 or more of the cloud deployment models

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NIST Publication 500-292
Cloud Computing Reference Architecture

Defines 5 Major Roles in a cloud architecture

A

cloud carrier

cloud consumer

cloud provider

cloud broker

cloud auditor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

cloud carrier

A

provides connectivity between subscriber and provider

responsible for transferring data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

cloud consumer

A

entity that acquires and uses cloud products and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

cloud provider

A

provider of products and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

cloud broker

A

acts as intermediary between consumer and provider, helps consumers through complexity of cloud service offerings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

cloud auditor

A

conducts independent performance and security monitoring of cloud services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

FedRAMP

Federal Risk and Authorization Mgmt Program

A

government program that provides standardized approach to security assessment, authorization, continuous monitoring for cloud products and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

PCI DSS Cloud Special Interest Group

Payment Card Industry, Data Security Standard

A

regulatory compliance effort

17
Q

Cloud Security Alliance (CSA)

A

organization devoted to promoting cloud security best practices and organizing cloud security professionals

offers certification and architectural model

18
Q

Cloud Security Alliance (CSA)

A

organization devoted to promoting cloud security best practices and organizing cloud security professionals

offers certification and architectural model

Defines cloud control layers (figure 8-3) pg 295
applications
information
management
network
trusted computing
computer and storage
physical
19
Q

Cloud Security Tools

Cloudpassage’s Halo
www.cloudpassage.com

A

instant visibility, continuous protection for servers in any combination of data centers, private clouds and public clouds

Delivered as a service, deploys in minutes, scales on demand

20
Q

Threats and Attacks

abuse of cloud resources

A

Attacker gets anonymous access to cloud services can create large clusters for password cracking, rainbow tables, malicious websites, etc.

21
Q

Threats and Attacks

Data breach or loss is at the top of all lists

A

health information and intellectual property loss can be more damaging than financial because of fines, lawsuits, damage to reputation

22
Q

Threats and Attacks

insufficient due diligence

A

ex. moving an application from one cloud environment to another and not knowing the security differences between them

23
Q

Threats and Attacks

Shared technology issues

A

multitenant environment may not properly isolate system and applications

24
Q

Threats and Attacks

Unknown risk profiles

A

subscribers don’t know what security provisions are made by the provider

25
Q

Threats and Attacks

Side Channel Attack (aka cross-guest VM breach)

A

attacker gets control of existing VM or puts his own on same physical host as target and and manipulates other VM on host