Cloud Concepts, Architecture, and Design Flashcards
What service model is an application like DropBox and Office 365?
SaaS
What does the customer have access to in SaaS?
Enterprise apps, Desktop apps, and Mobile apps
What service model is a platform like Windows Server?
PaaS
What does the customer have access to in PaaS?
Development/runtime tools/environment
What service model offers processing, storage, or networking resources like a vDC (Virtual Data Center)?
IaaS
What does the customer have access to in IaaS?
CPU, disk drives, networks, and data centers
What service category supports real-time interaction and collaboration? Examples include voice over IP (VoIP or Internet telephony), IM, collaboration and videoconference applications using fixed and mobile devices.
CaaS - Communications as a Service
What service category supports processing resources to run software?
CompaaS - Compute as a service
Concepts and objects related to software computation. Refers to processing power, memory, networking, storage, and other resources required for the computational success of any program.
Compute
What can version control be used for?
Tracking versions worked on by developers and track configuration of systems and apps.
What is it called when you have the ability to reverse original operations and a move?
Reversibility
What is it called when you design workloads that don’t leverage vendor specific features?
Portability
What is it called when a vendor can easily support solution integrations?
Interoperability
What is it called when data science and statistics are used to uncover hidden knowledge in data accumulated each day?
Machine learning
Uncover trends, categorize records, and run biz efficiently.
What ML analyzes data to do
What are a collection of techniques designed to mimic human thought processes in computers?
AI
What is descriptive analytics?
Describing data.
Using existing data to predict future events.
Predictive analytics
Optimizing our behavior by simulating many scenarios.
Prescriptive analytics
Storing records to distribute among many different systems in a manner that prevents anyone from tampering with them in a ledger.
Blockchain technology
What is connecting nontraditional devices to the internet for collection, analysis, and control?
IoT - Internet of Things
What is a lightweight way to package an app to make it portable to move easily b/w hardware platforms?
Containers
Instead of running hypervisors, systems supporting containers run a…
Containerization platform
What is the major benefit of containers over virtual machines?
They don’t have their own OS kernel - they use the host’s OS kernel.
What technology seeks to replace the binary 1 and 0 bits of digital computing?
Quantum computing
What involves putting processing power on remote sensors and allowing them to perform the heavy lifting required to process data before transmitting a small subset of that data back to the cloud?
Edge computing
What involves placing gateway devices out in the field to collect info from sensors and perform that correlation centrally at the remote location before returning data to the cloud?
Fog computing
What are edge and fog computing for?
Increasing our ability to connect IoT devices to the cloud.
Guarantee that no outside process can view or alter the data being handled within the environment.
What trusted execution environments (TEEs) do
Enables scalability, reduces error through use of immutable servers, and makes testing easy.
3 things Infrastructure as Code does
Broad network access, on-demand self-service, resource pooling, rapid elasticity and scalability, and metered service.
Common cloud characteristics
When services are consistently accessible over the network.
Broad network access
When customers can scale their compute and/or storage needs w/ little or no intervention from or prior communication with the provider.
On-demand self-service
Allows CP to meet various demands from customers while remaining financially viable, and apportion resources as needed so resources aren’t underutilized or overtaxed.
Resource pooling
What is rapid elasticity and scalability?
Allows customer to grow/shrink IT footprint to meet operational needs without excess capacity.
All cloud activity is metered so you only pay for what you use.
Measured/metered service
What is scalability?
Ability of system to grow as demand increases.
What is elasticity?
Ability of system to dynamically grow/shrink based on current demand.
Aspects of device, process, or employee that are not necessary for accomplishing task but desired.
Non-functional requirements
Performance aspects of device, process, employee that are necessary for the business task to be accomplished.
Functional requirements
Interviewing functional managers, users, senior mgmt., observing employees, surveying customers, collecting network traffic, inventorying assets, collecting financial/insurance records, marketing data and regulatory mandates.
Methods of gathering business requirements
An assessment of the priorities given to each asset and process within the org and the effect harm or loss of asset has to org.
BIA
What are important things to consider during BIA?
Critical paths and single points of failure.
Routers and servers are examples of _____ assets.
Tangible
Software code, ideas, and business methodologies are examples of _____ assets.
Intangible
To gain an understanding of what benefits the org might derive from cloud migration and associated costs.
Purpose of a cost-benefit analysis
When an organization can experience dramatic/rapid/significant demand without being overwhelmed, and allows customer to dictate volume of resource usage.
Rapid elasticity
Augmenting internal/private data center capabilities with managed services during times of increased demand.
Cloud bursting
To bring all an organization’s cloud activities under more centralized control, ensure services meet technical, functional, and security requirements, and monitor for duplicative services.
Purpose of a cloud governance program
What is Shadow IT?
When BLs provision cloud services on their own to satisfy unmet technical needs.
What is a personnel benefit of moving to the Cloud?
Not having to pay expensive salaries for Internal IT.
The cloud benefit realized when CP offers holistic, targeted regulatory compliance packages.
Regulatory
What’s true about PII?
You’re responsible for the data regardless of if you’re using a Cloud service and any breaches from negligence of CP.
Cost-benefit calculations are driven by what?
Security concerns.
How do you calculate ROI?
Net Profit/Net Assets
What is the service category where the provider delivers an entire app – configuring servers – and customer just uses service?
SaaS
What are some SaaS examples?
Google Apps, Microsoft Office 365, Dropbox
What is the service category where the customer purchases basic computing resources to create customized IT solutions?
IaaS
Compute capacity and data storage are things _____ vendors might provide.
IaaS
What are the 4 largest IaaS vendors?
AWS, Azure, Google Compute Engine, and Alibaba.
What are these: Virtualized server, block storage, object storage, networking capacity, orchestration of automation to administer the cloud infrastructure.
Types of infrastructure capability for IaaS
What is the service category where customers can run their own app code w/out worrying about server config?
PaaS
What is the common PaaS capability where customer creates specialized functions that run on a schedule or in response to events?
FaaS – Function as a Service
What are the cloud deployment models?
Private, public, hybrid, multi-cloud, and community cloud.
What is it called when many different customers share use of the same computing resources?
Multitenancy
What is it when a CP can sell customers a total capacity that exceeds the physical capacity of their infrastructure b/c customers will never use all capacity simultaneously?
Oversubscription
Multitenancy works because of…
Resource pooling.
They offer some product or service that interacts with the primary offerings of a CSP.
Cloud service partner
CSPs who offer managed IAM services to cloud customers that integrates security requirements across cloud services.
CASB
Use cloud services, perform service trials, monitor services, administer service security, provide billing and usage reports, handle problem reports, administer tenancies, perform biz admin, select/purchase service, request audit reports.
Customer responsibilities
Prepare systems and provide cloud services, monitor/administer services, manage assets/inventories, provide audit data, manage customer relationships and handle customer requests, perform peering w/ other cloud providers, ensure compliance, provide network connectivity.
CSP responsibilities
Who fulfills the following: Design, create, maintain service component, test services, perform audits, set up legal agreements, acquire and assess customers, and assess marketplace.
Cloud Service Partners
When many different virtual servers make use of the same underlying hardware.
Virtualization
Virtualization involves the use of…
A host machine that has physical hardware that then hosts several virtual guest machines.
Manages the guest VMs and tricks them to think they’re running on its own hardware instead of shared hardware of host machine.
Hypervisors
Also called a bare metal hypervisor, runs directly on top of the hardware and then hosts guest OS on top of that.
Type 1 hypervisor
Physical machine runs an OS of its own and the hypervisor runs as a program on top of that OS.
Type 2 hypervisor
When a hacker is able to break out of a virtualized guest operating system.
VM escape attack
What is virtualization technology designed to do?
Strictly enforce isolation.
What does virtualization make it easy to do?
Create new servers in a data center.
What is it called when there are large numbers of unused and abandoned servers on the network?
VM sprawl
Why is VM sprawl dangerous?
B/c unused and abandoned servers accumulate serious security vulns if they’re not properly patched.
What is it called when you can create computing resources to solve a problem and then get rid of them when they’re no longer needed?
Ephemeral computing
What is protecting assets from unauthorized access?
Confidentiality
What is protecting assets against unauthorized modification?
Integrity
What is ensuring assets are available for authorized use w/out disruption?
Availability
Protecting personal info we store, process, and transmit
Privacy
Working through existing and planned cloud relationships to ensure they comply with security, legal, business, and other constraints.
Governance
When contracts specify customer has the right to audit cloud providers.
Auditability
Ability of the cloud infrastructure to withstand disruptive events.
Resiliency
Third party that can conduct an independent assessment of cloud services, information system operations, performance, and security of the cloud implementation.
Cloud Service Auditor
An entity that manages the use, performance and delivery of cloud services and negotiates relationships between cloud providers (CSPs) and cloud consumers.
Cloud broker
Service intermediation - enhances service
Service aggregation - combines and integrates services
Service arbitrage - choose services from multiple agencies
functions of cloud broker
Responsible for business agreement, pricing for the cloud customer.
cloud service manager
The ability of a system to automatically grow and shrink based on app demand
elasticity
Ability to grow as demand increases.
scalability
Number of minutes of virtual server compute time
Amount of disk space you consume
Number of function calls you make
Amount of network egress and ingress
common metrics for measured service
5 building block technologies of the cloud
compute, databases, network, storage, orchestration
CSP provides the server, storage, and networking hardware and its virtualization. Customer installs middleware and applications.
compute
All virtualized to allow customers to design and customize to their needs. Enables customers to segment and restrict access however they would like.
network
A network architecture approach that enables the network to be intelligently and centrally controlled, or ‘programmed,’ using software
storage defined network (sdn)
3 layers of sdn
management, control, data
The business applications that manage the underlying control plane are exposed with _____.
northbound interfaces
Control of network functionality and programmability is made directly to devices at this layer.
control plane