Cloud Concepts, Architecture, and Design Flashcards

1
Q

What service model is an application like DropBox and Office 365?

A

SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the customer have access to in SaaS?

A

Enterprise apps, Desktop apps, and Mobile apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What service model is a platform like Windows Server?

A

PaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the customer have access to in PaaS?

A

Development/runtime tools/environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What service model offers processing, storage, or networking resources like a vDC (Virtual Data Center)?

A

IaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the customer have access to in IaaS?

A

CPU, disk drives, networks, and data centers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What service category supports real-time interaction and collaboration? Examples include voice over IP (VoIP or Internet telephony), IM, collaboration and videoconference applications using fixed and mobile devices.

A

CaaS - Communications as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What service category supports processing resources to run software?

A

CompaaS - Compute as a service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Concepts and objects related to software computation. Refers to processing power, memory, networking, storage, and other resources required for the computational success of any program.

A

Compute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What can version control be used for?

A

Tracking versions worked on by developers and track configuration of systems and apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is it called when you have the ability to reverse original operations and a move?

A

Reversibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is it called when you design workloads that don’t leverage vendor specific features?

A

Portability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is it called when a vendor can easily support solution integrations?

A

Interoperability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is it called when data science and statistics are used to uncover hidden knowledge in data accumulated each day?

A

Machine learning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Uncover trends, categorize records, and run biz efficiently.

A

What ML analyzes data to do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are a collection of techniques designed to mimic human thought processes in computers?

A

AI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is descriptive analytics?

A

Describing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Using existing data to predict future events.

A

Predictive analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Optimizing our behavior by simulating many scenarios.

A

Prescriptive analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Storing records to distribute among many different systems in a manner that prevents anyone from tampering with them in a ledger.

A

Blockchain technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is connecting nontraditional devices to the internet for collection, analysis, and control?

A

IoT - Internet of Things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a lightweight way to package an app to make it portable to move easily b/w hardware platforms?

A

Containers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Instead of running hypervisors, systems supporting containers run a…

A

Containerization platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the major benefit of containers over virtual machines?

A

They don’t have their own OS kernel - they use the host’s OS kernel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What technology seeks to replace the binary 1 and 0 bits of digital computing?
Quantum computing
26
What involves putting processing power on remote sensors and allowing them to perform the heavy lifting required to process data before transmitting a small subset of that data back to the cloud?
Edge computing
27
What involves placing gateway devices out in the field to collect info from sensors and perform that correlation centrally at the remote location before returning data to the cloud?
Fog computing
28
What are edge and fog computing for?
Increasing our ability to connect IoT devices to the cloud.
29
Guarantee that no outside process can view or alter the data being handled within the environment.
What trusted execution environments (TEEs) do
30
Enables scalability, reduces error through use of immutable servers, and makes testing easy.
3 things Infrastructure as Code does
31
Broad network access, on-demand self-service, resource pooling, rapid elasticity and scalability, and metered service.
Common cloud characteristics
32
When services are consistently accessible over the network.
Broad network access
33
When customers can scale their compute and/or storage needs w/ little or no intervention from or prior communication with the provider.
On-demand self-service
34
Allows CP to meet various demands from customers while remaining financially viable, and apportion resources as needed so resources aren’t underutilized or overtaxed.
Resource pooling
35
What is rapid elasticity and scalability?
Allows customer to grow/shrink IT footprint to meet operational needs without excess capacity.
36
All cloud activity is metered so you only pay for what you use.
Measured/metered service
37
What is scalability?
Ability of system to grow as demand increases.
38
What is elasticity?
Ability of system to dynamically grow/shrink based on current demand.
39
Aspects of device, process, or employee that are not necessary for accomplishing task but desired.
Non-functional requirements
40
Performance aspects of device, process, employee that are necessary for the business task to be accomplished.
Functional requirements
41
Interviewing functional managers, users, senior mgmt., observing employees, surveying customers, collecting network traffic, inventorying assets, collecting financial/insurance records, marketing data and regulatory mandates.
Methods of gathering business requirements
42
An assessment of the priorities given to each asset and process within the org and the effect harm or loss of asset has to org.
BIA
43
What are important things to consider during BIA?
Critical paths and single points of failure.
44
Routers and servers are examples of _____ assets.
Tangible
45
Software code, ideas, and business methodologies are examples of _____ assets.
Intangible
46
To gain an understanding of what benefits the org might derive from cloud migration and associated costs.
Purpose of a cost-benefit analysis
47
When an organization can experience dramatic/rapid/significant demand without being overwhelmed, and allows customer to dictate volume of resource usage.
Rapid elasticity
48
Augmenting internal/private data center capabilities with managed services during times of increased demand.
Cloud bursting
49
To bring all an organization’s cloud activities under more centralized control, ensure services meet technical, functional, and security requirements, and monitor for duplicative services.
Purpose of a cloud governance program
50
What is Shadow IT?
When BLs provision cloud services on their own to satisfy unmet technical needs.
51
What is a personnel benefit of moving to the Cloud?
Not having to pay expensive salaries for Internal IT.
52
The cloud benefit realized when CP offers holistic, targeted regulatory compliance packages.
Regulatory
53
What’s true about PII?
You’re responsible for the data regardless of if you’re using a Cloud service and any breaches from negligence of CP.
54
Cost-benefit calculations are driven by what?
Security concerns.
55
How do you calculate ROI?
Net Profit/Net Assets
56
What is the service category where the provider delivers an entire app – configuring servers – and customer just uses service?
SaaS
57
What are some SaaS examples?
Google Apps, Microsoft Office 365, Dropbox
58
What is the service category where the customer purchases basic computing resources to create customized IT solutions?
IaaS
59
Compute capacity and data storage are things _____ vendors might provide.
IaaS
60
What are the 4 largest IaaS vendors?
AWS, Azure, Google Compute Engine, and Alibaba.
61
What are these: Virtualized server, block storage, object storage, networking capacity, orchestration of automation to administer the cloud infrastructure.
Types of infrastructure capability for IaaS
62
What is the service category where customers can run their own app code w/out worrying about server config?
PaaS
63
What is the common PaaS capability where customer creates specialized functions that run on a schedule or in response to events?
FaaS – Function as a Service
64
What are the cloud deployment models?
Private, public, hybrid, multi-cloud, and community cloud.
65
What is it called when many different customers share use of the same computing resources?
Multitenancy
66
What is it when a CP can sell customers a total capacity that exceeds the physical capacity of their infrastructure b/c customers will never use all capacity simultaneously?
Oversubscription
67
Multitenancy works because of…
Resource pooling.
68
They offer some product or service that interacts with the primary offerings of a CSP.
Cloud service partner
69
CSPs who offer managed IAM services to cloud customers that integrates security requirements across cloud services.
CASB
70
Use cloud services, perform service trials, monitor services, administer service security, provide billing and usage reports, handle problem reports, administer tenancies, perform biz admin, select/purchase service, request audit reports.
Customer responsibilities
71
Prepare systems and provide cloud services, monitor/administer services, manage assets/inventories, provide audit data, manage customer relationships and handle customer requests, perform peering w/ other cloud providers, ensure compliance, provide network connectivity.
CSP responsibilities
72
Who fulfills the following: Design, create, maintain service component, test services, perform audits, set up legal agreements, acquire and assess customers, and assess marketplace.
Cloud Service Partners
73
When many different virtual servers make use of the same underlying hardware.
Virtualization
74
Virtualization involves the use of…
A host machine that has physical hardware that then hosts several virtual guest machines.
75
Manages the guest VMs and tricks them to think they’re running on its own hardware instead of shared hardware of host machine.
Hypervisors
76
Also called a bare metal hypervisor, runs directly on top of the hardware and then hosts guest OS on top of that.
Type 1 hypervisor
77
Physical machine runs an OS of its own and the hypervisor runs as a program on top of that OS.
Type 2 hypervisor
78
When a hacker is able to break out of a virtualized guest operating system.
VM escape attack
79
What is virtualization technology designed to do?
Strictly enforce isolation.
80
What does virtualization make it easy to do?
Create new servers in a data center.
81
What is it called when there are large numbers of unused and abandoned servers on the network?
VM sprawl
82
Why is VM sprawl dangerous?
B/c unused and abandoned servers accumulate serious security vulns if they’re not properly patched.
83
What is it called when you can create computing resources to solve a problem and then get rid of them when they’re no longer needed?
Ephemeral computing
84
What is protecting assets from unauthorized access?
Confidentiality
85
What is protecting assets against unauthorized modification?
Integrity
86
What is ensuring assets are available for authorized use w/out disruption?
Availability
87
Protecting personal info we store, process, and transmit
Privacy
88
Working through existing and planned cloud relationships to ensure they comply with security, legal, business, and other constraints.
Governance
89
When contracts specify customer has the right to audit cloud providers.
Auditability
90
Ability of the cloud infrastructure to withstand disruptive events.
Resiliency
91
Third party that can conduct an independent assessment of cloud services, information system operations, performance, and security of the cloud implementation.
Cloud Service Auditor
92
An entity that manages the use, performance and delivery of cloud services and negotiates relationships between cloud providers (CSPs) and cloud consumers.
Cloud broker
93
Service intermediation - enhances service Service aggregation - combines and integrates services Service arbitrage - choose services from multiple agencies
functions of cloud broker
94
Responsible for business agreement, pricing for the cloud customer.
cloud service manager
95
The ability of a system to automatically *grow and shrink* based on app demand
elasticity
96
Ability to grow as demand increases.
scalability
97
Number of minutes of virtual server compute time Amount of disk space you consume Number of function calls you make Amount of network egress and ingress
common metrics for measured service
98
5 building block technologies of the cloud
compute, databases, network, storage, orchestration
99
CSP provides the server, storage, and networking hardware and its virtualization. Customer installs middleware and applications.
compute
100
All virtualized to allow customers to design and customize to their needs. Enables customers to segment and restrict access however they would like.
network
101
A network architecture approach that enables the network to be intelligently and centrally controlled, or ‘programmed,’ using software
storage defined network (sdn)
102
3 layers of sdn
management, control, data
103
The business applications that manage the underlying control plane are exposed with _____.
northbound interfaces
104
Control of network functionality and programmability is made directly to devices at this layer.
control plane
105
The network switches and routers located at this plane are associated with the underlying network infrastructure.
data plane
106
Ensures only trusted, authorized applications access critical network resources.
Northbound interface
107
OpenFlow protocol interfaces with devices through _____
southbound interfaces
108
_____storage maps a logical unit number (LUN) on a storage area network (SAN) to a VM.
raw
109
Offered by some CSPs, this is tailored to the needs of data archiving. This may include features like search, immutability, and data lifecycle management. Typically use either Volume or Object storage infrastructure.
long-term storage
110
Volume storage is also called:
block
111
Examples of object storage
S3 and azure blob
112
Ensures that all copies of the data have been duplicated among all relevant copies before finalizing the transaction to increase availability.
strict consistency
113
Consistency of data is relaxed, which reduces the number of replicas that must be accessed during read and write operations before the transaction is finalized.
eventual consistency
114
Where content is stored in object storage, then replicated to multiple geographically distributed nodes to improve internet consumption speed
content delivery network (cdn)
115
Builds on the foundation of Infrastructure as Code (IaC), reducing manual admin tasks.
orchestration
116
— virtual machines (VM) — virtual desktop infrastructure (VDI) — software defined networks (SDN) — virtual storage area networks (SAN)
virtual assets
117
T/F: Both hypervisors and VMs need to be patched
True
118
The cloud service provider (CSP) provides the least amount of maintenance and security in the _____ model.
IaaS
119
What hypervisor: More secure if implemented properly Commonly used for QA, load testing, and production scenarios Typically, more expensive
Type 1: Bare metal
120
What hypervisor: Increased attack surface (due to the host operating system) Commonly used for individual development and lab scenarios Typically, less expensive
Type 2: Hosted
121
Use cloud services Perform service trials Monitor services Administer service security Provide billing and usage reports Handle problem reports Administer tenancies Perform business administration Select and purchase service Request audit reports
customer responsibilities
122
Prepare systems and provide cloud services Monitor and administer services Manage assets and inventories Provide audit data Manage customer relationships Handle customer requests Perform peering with other cloud service providers Ensure compliance Provide network connectivity
csp responsibilities
123
Design, create, and maintain service components Test services Perform audits Set up legal agreements Acquire and assess customers Assess the marketplace
partner responsibilities
124
Provides guidance in implementing and managing customer usage of a platform
partner
125
Application capability types - reduced support costs and licensing fees Platform capability types - reduces lock in Infrastructure capability types - high reliability and resilience
benefits of public cloud
126
CSP provides building blocks, like networking, storage and compute
IaaS
127
Usage is metered Eases scale (scale up, out, and down) Reduced energy and cooling costs
benefits of IaaS
128
Customer is responsible for deployment and management of apps CSP manages provisioning, configuration, hardware, and OS
PaaS
129
Core infrastructure updated by provider Global collaboration for app development Running multiple languages seamlessly
key benefits of PaaS
130
Customer just configures features CSP is responsible for management, operation, and service availability.
SaaS
131
Limited administration responsibility Limited skills required Service always up to date Global access
key benefits of SaaS
132
Devs have to write code No server management
things PaaS and Serverless have in common
133
Less control over deployment environment Application scales automatically Application code only executes when invoked
Serverless
134
More control over deployment environment Application has to be configured to auto scale Application takes a while to spin up
PaaS
135
A cloud computing execution model where the cloud provider dynamically manages the allocation and provisioning of servers. Hosted as a pay as you go model based on use. Resources are stateless, servers ephemeral and often capable of being triggered.
serverless architecture
136
Provisioning of multiple business services is combined with different IT services to provide a single business solution.
services integration
137
Cloud is cost effective, global, secure, scalable, elastic, and always current
benefits of cloud computing
138
Everything runs on your cloud provider's hardware Advantages include scalability, agility, PAYG, no maintenance, and low skills
public cloud
139
A cloud environment in your own datacenter A cloud environment dedicated to a single customer Advantages include legacy support, control, and compliance
private cloud
140
Combines public and private clouds, allowing you to run your apps in the right location. Advantages include flexibility in legacy, compliance, and scalability scenarios
hybrid cloud
141
Similar to private clouds in that they are not open the general public But they are shared by several related organizations in a common community
community cloud
142
Combines resources from two or more public cloud providers Allows orgs to take advantage of service and price differences, but at the cost of added complexity
multi cloud
143
Access controls help ensure that only authorized subjects can access objects
confidentiality
144
Ensures that data or system configurations are not modified without authorization
integrity
145
Authorized requests for objects must be granted to subjects within a reasonable amount of time
availability
146
Ability of one cloud service to interact with other cloud services by exchanging information according to a prescribed method and obtain predictable results.
interoperability
147
Process for cloud service customers to retrieve their data and application artifacts AND for the CSP to delete all cloud service customer data and contractually specified cloud service derived data after an agreed period.
reversibility
148
Policy - interoperate while complying w/ gov laws/regs Behavioral - results of exchanged info matches expected outcome Transport - commonality of communication b/w cloud consumer, provider, and other providers Syntactic - two or more system understand other system's structure of exchanged info thru encoding syntaxes Semantic Data - ability of systems exchanging info to understand meaning of data model w/in context
5 facets of cloud interoperability
149
Syntactic - using formats that can be decoded Semantic - data model is understood Policy - laws/regs/mandates followed
3 facets of cloud data portability
150
Ability of a cloud services data center and its associated components, including servers, storage, and so on, to continue operating in the event of a disruption.
resiliency
151
A discrete market, typically containing two or more regions, that preserves data residency and compliance boundaries
geography
152
A set of datacenters deployed within a latency defined perimeter and connected through a dedicated regional low latency network.
regions
153
A relationship between 2 Azure Regions within the same geographic region for disaster recovery purposes.
region pairs
154
Unique physical locations within a region with independent power, network, and cooling. Comprised of one or more datacenters Tolerant to datacenter failures via redundancy and isolation
availability zones
155
The duty to ensure private information is kept secret to the extent possible. A legal obligation in regulatory scenarios, and a due care obligation in U.S. law
confidentiality - focus on data
156
The right of an individual to have some control over how their personal information (PII,PHI) is collected, used, and potentially disclosed.
privacy - focus on rights of person
157
Ability of a service to remain responsive to requests to that service with an acceptable level of response latency or processing time.
performance
158
Enforcement of security policies and regulatory requirements, often through policy controls and regular audits.
governance
159
Ability to provide clear documentation of the actions in a data event.
auditability
160
Ability to determine who caused the event. This is known sometimes called “identity attribution”.
Accountability
161
Ability to track down all events related to the investigated event.
traceability
162
A technical or contractual constraint that prevents a customer from moving from a provider.
vendor lock-in
163
The practice of applying data science to prevent, detect, and remediate cybersecurity threats. Data is collected from selected cyber security sources and then analyzed to provide timely, data driven patterns at scale.
cybersecurity data science
164
To create a new block on the chain, the computer that wishes to add the block solves a cryptographic puzzle and sends the solution to the other computers participating in that blockchain.
proof of work
165
A class of devices connected to the internet in order to provide automation, remote control, or AI processing in a home or business setting
internet of things
166
wearables, facility automation, sensors
internet of things
167
Examples include Docker and Kubernetes
containerization
168
A lightweight, granular, and portable way to package applications for multiple platforms. Reduces overhead of server virtualization by enabling containerized apps to run on a shared OS kernel. Share many concerns of server virtualization: isolation at host, process, network, and storage levels
containerization
169
Replaces the binary one and zero bits of digital computing with multidimensional quantum bits known as qubits.
quantum computing
170
The practice of harnessing the principles of quantum mechanics to improve security and to detect whether a third party is eavesdropping on communications. Leverages fundamental laws of physics such as the observer effect, which states that it is impossible to identify the location of a particle without changing that particle.
quantum cryptography
171
The most common example of quantum cryptography. By transferring data using photons of light instead of bits, a confidential key transferred between two parties cannot be copied or intercepted secretly.
Quantum Key Distribution
172
Cryptographic algorithms (usually public key algorithms) that are thought to be secure against an attack by a quantum computer. Post quantum cryptography focuses on preparing for the era of quantum computing by updating existing mathematical based algorithms and standards.
Post quantum cryptography
173
Post quantum algorithms are sometimes called _____ cryptographic algorithms
“quantum resistant”
174
Some compute operations require processing activities to occur locally, far from the cloud. All the processing of data storage is closer to the sensors rather than in the cloud data center.
edge computing
175
Complements cloud computing by processing data from IoT devices. Often places gateway devices in the field to collect and correlate data centrally at the edge. Generally, brings cloud computing nearer to the sensor to process data closer to the device.
fog computing
176
Sensitive data must be encrypted in memory before an app can process it, leaving the data vulnerable is a problem that ____ solves by isolating sensitive data in a protected _____ during processing - also called a _____.
confidential computing / CPU enclave / trusted execution environment (TEE)
177
This is the management of cloud infrastructure (networks, VMs, load balancers, and connection topology) described in code. Just as the same source code generates the same binary, code in this model results in the same environment every time it is applied. This is a key DevOps practice and is used in conjunction with CI/CD.
IaC
178
A chip that resides on the motherboard of the device. Multi purpose, like storage and management of keys used for full disk encryption (FDE) solutions. Provides the operating system with access to keys, but prevents drive removal and data access
trusted platform module
179
A physical computing device that safeguards and manages digital keys, performs encryption and decryption functions for digital signatures, strong authentication and other cryptographic functions.
hardware security module
180
generation - in secure cryptographic module distribution - encrypt key w/ separate encryption key storage - keys protected at rest use revocation destruction
encryption key lifecycle
181
In PKI, you would revoke the certificate on the issuing
Certificate Authority (CA)
182
Encryption keys must be secured _____ as the data they protect.
at the same level of control or higher
183
A _____ is anything that you want to control access to, such as API keys, passwords, certificates, tokens, or cryptographic keys.
secret
184
Something you know (pin or password) Something you have (trusted device) Something you are (biometric)
mfa
185
— Phishing — Spear phishing — Keyloggers — Credential stuffing — Brute force and reverse brute force attacks — Man in the middle (MITM) attacks
all prevented by mfa
186
A _____ is a type of administrator account used to run an application.
service account
187
A solution that helps protect the privileged accounts within a tenant, preventing attacks
privileged access management
188
erasing, clearing (overwriting), purging
less secure data destruction
189
most secure data destruction
crypto shredding
190
Data cannot be recovered from any remnants. High CPU and performance overhead
pro and con of crypto shredding
191
degaussing, shredding, pulverizing
hard drive media destruction methods - not reusable or recoverable
192
Act as a virtual firewall for virtual networks and resource instances. Carries a list of security rules (IP and port ranges) that allow or deny network traffic to resource instances. Provides a virtual firewall for a collection of cloud resources with the same security posture.
network security group
193
Restricting services that are permitted to access or be accessible from other zones using rules to control inbound/outbound traffic. Rules are enforced by the IP address ranges of each subnet. Within a virtual network, this can be used to achieve isolation .
segmentation
194
Port filtering through a network security group
example of segmentation
195
What is the modern approach to writing web service APIs.
Representational State Transfer (REST)
196
Enables multi language support, can handle multiple types of calls, return different data formats. APIs published by an organizations should include encryption, authentication, rate limiting, throttling, and quotas.
API inspection and integration
197
Traffic is often sent direct to resources and promiscuous mode on a VM NIC not possible or effective. EXAMPLES: Network Watcher (Azure), VPC traffic mirroring (AWS)
traffic inspection
198
Uses the Global Positioning System (GPS) or RFID to define geographical boundaries. Once the device is taken past the defined boundaries, the security team will be alerted.
geofencing
199
Treats user identity as the control plane. Assumes compromise / breach in verifying every request.
zero trust security
200
verify explicitly use lease privilege access assume breach
zero trust principles
201
Network Security Group (NSG) Network Firewalls Inbound and outbound traffic filtering Inbound and outbound traffic inspection Centralized security policy management and enforcement
zero trust network architecture
202
Orchestration/scheduling controller Network, storage Container host Container images Container registry
Core components in a container platform (Docker, Kubernetes)
203
Container security shares many of the concerns of server virtualization, but must enforce _____ of network, data, storage access at container level.
isolation
204
These are cloud-based VMs where containers run
container hosts
205
Use API gateways as security buffers (to avoid DDoS attacks) Configure secure authentication (Oauth, SAML, OpenID Connect, MFA) Separate dev and prod environments, implement least privilege
serverless technology
206
REST uses the _____ protocol for web communications to offer API end points
HTTPS
207
Security mechanisms for _____ include API gateway, authentication, IP filtering, throttling, quotas, data validation
APIs
208
When attacks are designed to steal or wedge themselves into the middle of a conversation in order to gain control.
traffic hijacking
209
Process/effort to collect and analyze information before making a decision or conducting a transaction.
due diligence
210
Doing what a reasonable person would do in a given situation. It is sometimes called the “prudent person rule”.
due care
211
do detect is ______ and do correct is _____
due diligence / due care
212
Research Planning Evaluation
due diligence
213
Implementation Operation (upkeep) Reasonable measures
due care
214
Knowledge and research of: Laws and Regulations Industry standards Best practices
due diligence
215
Delivery or execution including: * Reporting security incidents * Security awareness training * Disabling access in a timely way
due care
216
Helps reduce outages or weakened security from unauthorized changes to the baseline configuration
Change Management
217
Uses a labeling or numbering system to track changes in updated versions of baseline (image, application, system,
Versioning
218
Performed to determine whether a particular patch or update applies to a system.
applicability assessment
219
To ensure it’s handled properly, it’s important to ensure data is _____ as soon as possible.
classified
220
Data should be protected by adequate security controls based on its _____.
classification
221
Refers to anytime data is in use or in transit over a network
share
222
Commonly protected with TLS or tunneled through VPN
data in transit
223
In storage (on disk, in database, etc) and protected through encryption
data at rest
224
In memory. Should be flushed from memory when transaction is complete or system is powered down
data in use
225
Helps you encrypt Windows and Linux IaaS VMs disks using BitLocker (Windows) and dm crypt feature of Linux to encrypt OS and data disks.
full disk encryption
226
Helps protect SQL Database and data warehouses against threat of malicious activity with real time encryption and decryption of database, backups, and transaction log files at rest without requiring app changes.
Transparent data encryption (TDE)
227
Ensure the data’s context and meaning are understood, and business rules governing the data’s usage. Use that knowledge to ensure the data they are responsible for is used as intended.
data steward
228
The person or entity that controls processing of the data.
data controller
229
A natural or legal person, public authority, agency, or other body, which processes personal data solely on behalf of the data controller.
data processor
230
Responsible for day-to-day: safe custody, transport, and storage of data, and implementation of business rules, technical controls. Does not decide what controls are needed, but does implement controls for data owner
data custodian
231
focuses on the whole business
bcp
232
focuses more on the technical aspects of recovery
drp
233
T/F: BCP is an umbrella policy and DRP is part of it
True
234
addresses site level failure
region pairs
235
These address datacenter failures within a cloud region.
Availability zones
236
address rack level failures within a regional datacenter
availability sets
237
Contains two important items: ✓ a cost-benefit analysis (CBA) AND ✓ a calculation of the return on investment (ROI)
BIA
238
Can be strictly quantitative: adding the financial benefits and subtracting the associated costs to determine whether a decision will be profitable.
CBA
239
Define a system or its component and specifies what it must do. Captured in use cases, defined at a component level .
Functional security requirements
240
Specify the system’s quality, characteristics, or attributes. Apply to the whole system (system level)
Non functional security requirements
241
VM attacks Virtual network Hypervisor attacks VM-based rootkits Virtual switch attacks Colocation DoS attack
security considerations for IaaS
242
System and Resource Isolation User-Level Permissions Access Management Protection Against Malware, Backdoors, and Trojans
security considerations for PaaS
243
Data Segregation Data Access and Policies Web Application Security
security considerations for SaaS
244
When unmanaged VMs have been deployed on your network. Because IT doesn't know it is there, it may not be patched and protected, and thus more vulnerable to attack
vm sprawl
245
Enforcement of security policies for adding VMs to the network, as well as periodic scanning to identify new virtualization hosts is how to avoid _____.
vm sprawl
246
Ensure patches and hypervisor and VMs are always up to date, guest privileges are low. Server level redundancy and HIPS/HIDS protection also effective.
how to protect against vm escape
247
Freely available on the internet and exploit known vulnerabilities in various operating systems enabling attackers to elevate privilege.
Rootkit (escalation of privilege) - avoid by keeping security patches up to date, anti malware software, EDR/XDR
248
Undocumented command sequences that allow individuals with knowledge of the back door to bypass normal access restrictions. Often used in development and debugging.
back door - counter with firewalls, anti malware, network monitoring, code review
249
Volume based attacks targeting flaws in network protocols, often using botnets, using techniques such as UDP, ICMP flooding, or SYN flooding (TCP based).
network DDoS
250
Exploit weaknesses in the application layer (Layer 7) by opening connections and initiating process and transaction requests that consume finite resources like disk space and available memory.
application DDoS
251
Targets the weaknesses of software and hardware devices that control systems in factories, power plants, and other industries, such as IoT devices.
operational technology (ot) DDoS
252
These are countermeasures for _____ IDS, IPS, rate limiting, firewall ingress/egress filters
DDoS
253
Automated software scanning Automated vulnerability scanning Web application firewall Software dependency management Access and activity logging Application performance management Are all _____ technical controls.
DevOPS
254
Developer application security training Documented policies and procedures Code review, approval gates
DevOPS admin controls
255
Provides guidelines for information security controls applicable to the provision and use of cloud services. Provides cloud based guidance on several ISO/IEC 27002 controls, along with seven cloud controls that address: 1) Who is responsible for what between the cloud service provider and the cloud customer 2) The removal/return of assets when a contract is terminated 3) Protection and separation of the customer’s virtual environment 4) Virtual machine configuration 5) Administrative operations and procedures associated with the cloud environment 6) Customer monitoring of activity within the cloud 7) Virtual and cloud network environment alignment
ISO 27017
256
> a secure network must be maintained in which transactions can be conducted > cardholder information must be protected wherever it is stored > systems should be protected against the activities of malicious hackers > cardholder data should be protected physically as well as electronically. > networks must be constantly monitored and regularly tested > a formal information security policy must be defined, maintained, and followed
PCI DSS objectives
257
Ensures customers that security products they purchase have been thoroughly tested by independent third-party testers and meets customer requirements.
ISO 15408
258
– Level 1: Lowest level of security. – Level 2: Specifies the security requirements for cryptographic modules that protect sensitive information. – Level 3: Requires physical protections to ensure a high degree of confidence that any attempts to tamper are evident and detectable
FIPS 140-2 security levels
259
AWS Well Architected Framework Azure Well Architected Framework Google Cloud Architecture Framework
cloud provider architecture reference
260
Microsoft Cybersecurity Reference Architecture AWS Security Reference Architecture Google Cloud Security Foundations Guide
cloud provider security reference