Cloud Application Security Flashcards

1
Q

What are the different deployment Models for the cloud?

A

Public, Private, Community, Hybrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the different SDLC phases?

A

Defining, Designing, Development, Testing, Secure Operations, Disposal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Secure Application Development Standard?

A

ISO/IEC 27034-1, you have the following categories: Business Contet, Regulatory Context, Technical Context, Specifications, Roles, Reponsibilities and Qualifications, Processes, Application Security Control Library. ANF versus ONF. Every application has and ANF that maps back to the ONH. One ONH has many ANF, but the ANF has only one ONF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the Ps for IAM

A

People, processes, procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IAM elements?

A

Authentication, Authorization, User Management, Central User Repository

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name widely used directory serices

A

X.500 and LDAP, A, Novell eDirecotry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name the different type of federation services and explain

A

1) Web-of-Trust Model: each member of the deferations has to review and approve each other member for inclusing in the federeations
2) third party identifier: third party approves on behave of the members

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an identify provider?

A

Party that validates users, provisioings user IDs and psws, deprovisioning them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a relying party

A

Any member of the federation that shares resources based on authenticated identities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name the federation standards which are in use

A

Security Assertion Makeup Language (SAML): xml based and consists of a framework for communicating authentication, authorization or entitlemnet information and attribute information across organisations.
WS-Federation: realms to explain capabilities to allow organisations to trust each other identify information across organisations
Oauth: often used in authorization with mobile apps, the OAuth frameowrk provides third-part applications limited acccess to HTTP services
OpenID Connect: based on Oauth2. It allows developers to authenitcate their users accross websites and applicationsw ithout having to manage usernames and passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the two type of APIs in the cloud?

A

RESTful APIs and SOAP APis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe what a RESTful API is

A

Is scalable and suitable for web-based application, light weighed, it uses simple urls, it is not reliant on XML, it outputs in many formats (CSV, JSON), it is efficeint, smaller mesgs than XML,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In which situations doest RESTfull API work best?

A

situations where bandwidth is limited, when stateless operations are used, when caching is needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe what a SOAP API is

A

protocol to provide exchange of structuerd ifnormation or data in web services. Works over other protocols such as SMTP, FTP and HTTP, characteristics are standards-based, reliant on XML, highli intolerat of errors, slower, built-in error handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In which situations doest SOAP work best?

A

asynchronous processing, format contracts and statefull operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WAF - can they stop DDOS

A

Yes they can

17
Q

At which layer does a WAF (Web application firewall) filter data?

A

Layer 7

18
Q

At what layer does database activity monitoring filter?

A

Layer 7, it stops malicious CMDS being executed on the SQL server, it is network based,

19
Q

What are XML gateways

A

it is installed as a proxy or specific part of the application stack, it can help with access control, loggin and security filtering

20
Q

How can we best protect data in transit?

A

SSL/TLS, IPSEC, VPN

21
Q

How can we best protect data at rest?

A

Encrypt whole instance, volume, file/directory,

22
Q

How can we best protect data while in use?

A

Homomorphic encryption

23
Q

Describe TLS encryption

A

it used to ensure privacy when communication between applications

24
Q

Describe SSL

A

SSL was deprecated in 2015 but is still in use today

25
Q

Describe VPN

A

used by remote workers to securely access data on their companys internal networks

26
Q

What two type of VPNS exist?

A

Virtual and Virtual with Secuity. The first is that you still iee in the Multiprotocol Lbale Swithcing (MPLS). Furthermore, an encrypted PN should technically be referred to as an IPSec VPN. It has encryption end-to-end

27
Q

What is sandboxing related to cloud security?

A

concept o a protected area being ultilized for testing untested or untrusted code or to better understand if an application is working the way it was intended to work. These sandboxes are usually protected areas in memory that will not allow processes of any kind to run outside the environment or allow access inside from any other application or process.

28
Q

t.a.v. web application seurity testing, kan je STRIDE beschrijven?

A

STRIDE stands for Spoofing (impersonation such as IP or user spoofing), Tampering (with data output, data input or data that is stored), Repudiation (whtn the inability to deny ones action has been compromised), Information Disclosure (als data leakage), Denial of Service, Elevation of Privilege.

Stride is usefull in the SDLC to identify vulernabilities throughout the build processes.

29
Q

What is Cross-Site Scriptiong (XSS)

A

XSS is one of the most widely seen applications flaws. XSS occurs when an application allows untrsted data to be sent to a web browser without propoer validation or escaping. This then allows the malicious user to execute ode or hijack sessions in the users browser.

30
Q

What is Insecure Diret Object Access

A

Insecure Direct Object References occur when an application provides direct access to objects based on user-supplied input. As a result of this vulnerability attackers can bypass authorization and access resources in the system directly, for example database records or files.

31
Q

What is Cross-Site Request Forger CSRF

A

Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they’re currently authenticated. CSRF attacks specifically target state-changing requests, not theft of data, since the attacker has no way to see the response to the forged request

32
Q

Describe the CSA Notorius nigh for risks for web application development

A

Data Loss, Data breaches, account takeover or hijacking, insecure APIs, DoS, insider threats, abuse of cloud services, insufficent due diligence, shared technology issues

33
Q

In cloud model what dos QoS (Quality of Service) mean?

A

the idea of ensuring that you do not over-control your enviornment with security measure that degrade your application’s performance

34
Q

Describe SAST testing (static application security testing

A

white box, gefocused op code, offline

35
Q

Describe DAST testing (dynamics application security testing

A

blackbox, analyses code whle running, comibing DAST with SAST is the best (to hit black spots, SQL injecting, ccs, ldap injpection etc)

36
Q

Data masking, what is it?

A

a method for creating similar but ineuthentic datasets used for software testing and user training