Cloud Concepts, Architecture and Design Flashcards

1
Q

What are the 5 NIST characteristics of a cloud service

A
On-demand self-service 
Broad network access 
Resource pooling 
Rapid elasticity 
Measured service or metered service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

On-demand self-service

A

A characteristic of cloud that allows a cloud service customer to provision cloud resources and capabilities with little or no interaction with the cloud service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Rapid elasticity

A

allows a cloud customer to quickly obtain additional cloud resources as the user’s needs require without the cloud customer’s intervention, by automatically scaling and provisioning (referred to as auto-scaling and auto-provisioning) resource based on load

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Measured Service

A

Delivery of cloud services in such a way that its usage can be monitored, accurately reported, and precisely billed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Resource Pooling

A

AKA Multi tenant environment - multiple customers share the same underlying hardware, software, and network assets

Cloud provider can apportion resources as needed so that resources are not underutilized or overtaxed

Aggregation of cloud service provider’s resources to provide cloud service to one or more cloud service customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Portability

A

The ability to move data from one system to another without needing to reenter the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why is data ownership important to be considered when selecting a cloud service provider?

A

It is important that cloud providers provide clear terms as to what data they own and what the customer owns, as this has an effect on who is responsible for securing what

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Multitenancy

A

Allocation of cloud resources such that multiple tenants and their data are inaccessible from other tenants who share those resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Reversibility

A

Capability for a cloud service customer to retrieve their cloud service customer data and for the cloud service provider to delete this data after a specified period or upon request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What concerns does BYOD raise as it related to cloud?

A

Concerns around device management and secure access methods to the cloud must be considered. Be mindful of company BYOD policies and consider how cloud systems impact them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Considerations before moving data to the cloud or from one cloud to another?

A

Interoperability - can cloud services understand data formats, APIs, configurations, AuthN/AuthZ mechanisms

Portability and reversibility - can customers move applications/services from one cloud provider to another or move between cloud deployment models

Availability

Resiliency - know cloud SLAs or resiliency commitments made in contracts

Security and Privacy - baseline security features provided, advanced features often incur costs; understand security defaults and features; must be aware of what data is in your control vs CSP control

Performance

Governance - most CSPs offer the ability to schedule and automate reporting which enhances governance activities

SLAs - look for many of these considerations (e.g. availability, governance, performance, resilience, etc.)

Maintenance and versioning - should be agreed up on and well understood (e.g. upgrade responsibilities or rollback, is downgrade possible, etc.)

Regulatory Compliance - a shared responsibility between a CSP and customer

Auditability - shared responsibility so must know what you are responsible for and what the CSP is responsible for

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data at rest

What are ways to secure data at rest?

What are ways to secure data at rest in the cloud? What do you have to know as a CSC WRT CSP to secure data at rest?

A

Data at rest refers to data that is stored on a system or device, and not actively being read, written to, transmitted, or processed.

Consider encryption of sensitive files prior to storage and or encrypting the entire storage volume or drive

Consider CSP support for encryption by default for data at rest or what type of configuration is required. Either way know what your CSP supports and provides and what your responsibility is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data in transit

Security considerations?

A

Data in transit (or data in motion) refers to data that is actively being transmitted across a network or between multiple networks.

Use encryption implemented via TLS, SSL, HTTPS or VPNs to protect data in transit, beware of incompatible encryption between systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data in use

Security considerations?

A

Data in use is information that is actively being processed by an application. Is synonymous with data that resides in a systems RAM or cache memory.

Impossible or impractical to encrypt data in use so you should use other security controls to mange risks to data in use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are Standard Methods of Data Deletion potentially used by CSPs?

A

overwrite content with a series of random 0s and 1s, sometimes multiple times

crypto-shredding (or cryptographic erasure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Account hijacking

A

Account hijacking occurs when an unauthorized party gains access to privileged accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Insider threat

A

Insider threat is the potential for someone who has or has had legitimate system or data access to intentionally or unintentionally compromise a system, data, or organization.

18
Q

Metastructure

A

Metastructure is the set of mechanisms that connects the infrastructure layer to the applications and data being used

It enables and supports infrastructure management and configuration, and is typically the line of demarcation between the cloud provider and customer.

includes the cloud management plan components

19
Q

Applistructure

A

Applistructure includes the applications that are deployed in the cloud and the underlying services used to build them.

20
Q

What typically causes failure of Metastructure and Applistructure?

A

weak API security or poorly implemented and exposed APIs

21
Q

Measured Service

AKA

A

a service where the customer is only charged for what they use
Metered Service

22
Q

ROI

A

Return on investment (ROI) is a term related to cost-benefit measures. ROI is a term used to describe a profitability ratio. It is generally calculated by dividing net profit by net assets.

23
Q

Cloud Backup

A

Backing up data to a remote, cloud-based server. As a form of cloud storage, cloud backup data is stored in an accessible form from multiple distributed resources that make up a cloud.

24
Q

Cloud Computing

A

The use of computing, storage, and network resources with the capabilities of rapid elasticity, metered service, broad network access, and pooled resources.

25
Q

Cloud Bursting

A

One way an organization can use hosted cloud services is to augment internal, private data center capabilities with managed services during times of increased demand (e.g. seasonal, crisis scenario, etc)

26
Q

Cloud Migration

A

The process of transitioning all or part of a company’s data, applications, and services from on-site premises to the cloud, where the information can be provided over the Internet on an on-demand basis.

27
Q

Cloud Portability

A

The ability to move applications and associated data between one cloud provider and another or between legacy and cloud environments.

28
Q

Managed Service Provider

A

An IT service where the customer dictates both the technology and operational procedures, and an external party executes administration and operational support according to a contract.

29
Q

Blockchain

A

Blockchain is an open means of conveying value using encryption techniques and algorithms. It is often referred to as “cryptocurrency.” It is basically a transactional ledger, where all participants can view every transaction, thus making it extremely difficult to negatively affect the integrity of past transactions.

30
Q

What should always drive management decisions?

A

Business Needs which include security and risks decisions; Sometimes security and risk may overtake business and/or operational requirements

31
Q

ISC2 Code of Ethics Canons

A

Protect society, the common good, necessary public trust and confidence and the infrastructure

Act honorably, honestly, justly, responsibly and legally

Provide diligent and competent service to principals

Advance and protect the profession

32
Q

CSP Data Center

A

Individual data centers that comprise of physical servers, storage, data center networking, environmental management equipment and electrical power. Functionality may fail over to other data centers within the same AZ.

33
Q

CSP AZ

A

Multiple geographical local data centers create an AZ. The AZ data centers should have independent sources of power and data connectivity for failover. If an AZ experiences failure, customers’ instances can fail over to other AZs.

34
Q

CSP Region

A

Multiple AZs.

Cloud providers couple multiple availability zones to create regions, and cloud providers create multiple regions with redundant infrastructures and mutual replication capability to ensure full redundancy in the event of regional failure.

35
Q

Capital Expenditure

A

Ever growing expenses in traditional IT resources to implement new systems or accommodate potential peak loads

Assets purchased will depreciate over time, depending on the asset

Increased time required to achieve ROI

36
Q

Operational Expenditure (OpEx)

A

Can eliminate or reduce long-term investments when exploring new business models or help exploit short term business opportunities with pay as you go model in cloud or rent/lease only what is needed.

all expenses involved acquiring and paying for services are immediately tax deductible

37
Q

List typical drivers for cloud adoption

A
  1. Decrease CapEx for increase in OpEx
  2. Cost
    Mobility
  3. Collaboration
  4. Risk Reduction
    Scalability
  5. Elasticity
  6. Virtualization
  7. Shared Responsibility Model
38
Q

Cloud Computing Security Risks

A

Distributed/Multi-tenant Environment Risk
Business/Reputational Risk
Compliance (Legal, Regulatory) Risk
Privacy Risk

39
Q

Vendor Lock-in

A

Vendor lock-in occurs in a situation where a customer may be unable to leave, migrate, or transfer to an alternate provider due to technical or nontechnical constraints.

40
Q

Vendor Lock-out

A

Vendor lock-out occurs when a customer is unable to recover or access their own data due to the cloud provider going into bankruptcy or otherwise leaving the market.