Cloud Application Review Questions Flashcards

1
Q

List 5 NIST SDLC Phases

A

Initialization:. document enterprise architecture, identify applicable laws, and regulations

Acquisition/Development: Risk assessment, security controls, cost, analysis, testing

Implementation/Assessment: User guidance, security certification

Operations/Maintenance: Configuration management control

Sunset: Transition planning, secure deposal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SLDC vs. S-SDLC

A
  • Emphasis on security in each phase for S-SDLC
  • Loss of control : It systems and do not run on infrastructure owned by the business
  • Trust placed in 3rd party
    • CSP transparency
    • Third-party audit results
  • Dependency upon network connectivity to CSP
  • Data transmission over the internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Top 5 OWASP 2013 Attack Vectors

A
  • Injection
  • Broken Authentication and Session Management
  • Cross- Site Scripting
  • Insecure Direct Object References
  • Security Misconfiguration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define security concerns wth respect to RESTful APIs

A
  • Lack of predefined security methods
  • RESTful APIs are used to retrieve back-end data
  • XML/JSON messages are transmitted using HTTP
  • Avoid hard-coding URL parameters
  • Use TLS
  • Use multi-factor authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Federated Identity and SSO

A
  • Federated Identity
    • Centralized, trusted identity provider
    • Single set of credentials
    • Applications are configured to trust the identity provider
  • Single Sign-On is a sub-set of federation, and permits access to numerous applications or system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly