Cloud Application Review Questions Flashcards
1
Q
List 5 NIST SDLC Phases
A
Initialization:. document enterprise architecture, identify applicable laws, and regulations
Acquisition/Development: Risk assessment, security controls, cost, analysis, testing
Implementation/Assessment: User guidance, security certification
Operations/Maintenance: Configuration management control
Sunset: Transition planning, secure deposal
2
Q
SLDC vs. S-SDLC
A
- Emphasis on security in each phase for S-SDLC
- Loss of control : It systems and do not run on infrastructure owned by the business
- Trust placed in 3rd party
- CSP transparency
- Third-party audit results
- Dependency upon network connectivity to CSP
- Data transmission over the internet
3
Q
Top 5 OWASP 2013 Attack Vectors
A
- Injection
- Broken Authentication and Session Management
- Cross- Site Scripting
- Insecure Direct Object References
- Security Misconfiguration
4
Q
Define security concerns wth respect to RESTful APIs
A
- Lack of predefined security methods
- RESTful APIs are used to retrieve back-end data
- XML/JSON messages are transmitted using HTTP
- Avoid hard-coding URL parameters
- Use TLS
- Use multi-factor authentication
5
Q
Federated Identity and SSO
A
- Federated Identity
- Centralized, trusted identity provider
- Single set of credentials
- Applications are configured to trust the identity provider
- Single Sign-On is a sub-set of federation, and permits access to numerous applications or system