Cloud Concepts, Architecture and Design Flashcards
What are the 5 NIST characteristics of a cloud service
On-demand self-service Broad network access Resource pooling Rapid elasticity Measured service or metered service
On-demand self-service
A characteristic of cloud that allows a cloud service customer to provision cloud resources and capabilities with little or no interaction with the cloud service provider
Rapid elasticity
allows a cloud customer to quickly obtain additional cloud resources as the user’s needs require without the cloud customer’s intervention, by automatically scaling and provisioning (referred to as auto-scaling and auto-provisioning) resource based on load
Measured Service
Delivery of cloud services in such a way that its usage can be monitored, accurately reported, and precisely billed
Resource Pooling
AKA Multi tenant environment - multiple customers share the same underlying hardware, software, and network assets
Cloud provider can apportion resources as needed so that resources are not underutilized or overtaxed
Aggregation of cloud service provider’s resources to provide cloud service to one or more cloud service customers
Data Portability
The ability to move data from one system to another without needing to reenter the data
Why is data ownership important to be considered when selecting a cloud service provider?
It is important that cloud providers provide clear terms as to what data they own and what the customer owns, as this has an effect on who is responsible for securing what
Multitenancy
Allocation of cloud resources such that multiple tenants and their data are inaccessible from other tenants who share those resources
Reversibility
Capability for a cloud service customer to retrieve their cloud service customer data and for the cloud service provider to delete this data after a specified period or upon request
What concerns does BYOD raise as it related to cloud?
Concerns around device management and secure access methods to the cloud must be considered. Be mindful of company BYOD policies and consider how cloud systems impact them.
Considerations before moving data to the cloud or from one cloud to another?
Interoperability - can cloud services understand data formats, APIs, configurations, AuthN/AuthZ mechanisms
Portability and reversibility - can customers move applications/services from one cloud provider to another or move between cloud deployment models
Availability
Resiliency - know cloud SLAs or resiliency commitments made in contracts
Security and Privacy - baseline security features provided, advanced features often incur costs; understand security defaults and features; must be aware of what data is in your control vs CSP control
Performance
Governance - most CSPs offer the ability to schedule and automate reporting which enhances governance activities
SLAs - look for many of these considerations (e.g. availability, governance, performance, resilience, etc.)
Maintenance and versioning - should be agreed up on and well understood (e.g. upgrade responsibilities or rollback, is downgrade possible, etc.)
Regulatory Compliance - a shared responsibility between a CSP and customer
Auditability - shared responsibility so must know what you are responsible for and what the CSP is responsible for
Data at rest
What are ways to secure data at rest?
What are ways to secure data at rest in the cloud? What do you have to know as a CSC WRT CSP to secure data at rest?
Data at rest refers to data that is stored on a system or device, and not actively being read, written to, transmitted, or processed.
Consider encryption of sensitive files prior to storage and or encrypting the entire storage volume or drive
Consider CSP support for encryption by default for data at rest or what type of configuration is required. Either way know what your CSP supports and provides and what your responsibility is.
Data in transit
Security considerations?
Data in transit (or data in motion) refers to data that is actively being transmitted across a network or between multiple networks.
Use encryption implemented via TLS, SSL, HTTPS or VPNs to protect data in transit, beware of incompatible encryption between systems.
Data in use
Security considerations?
Data in use is information that is actively being processed by an application. Is synonymous with data that resides in a systems RAM or cache memory.
Impossible or impractical to encrypt data in use so you should use other security controls to mange risks to data in use.
What are Standard Methods of Data Deletion potentially used by CSPs?
overwrite content with a series of random 0s and 1s, sometimes multiple times
crypto-shredding (or cryptographic erasure)
Account hijacking
Account hijacking occurs when an unauthorized party gains access to privileged accounts.