Cloud Platform, Infrastructure, and Operations Flashcards

1
Q
  • infrastructure and systems/services in use
  • how systems will communicate
  • securing network traffic in shared environment
  • securing the management plane
A

Cloud security considerations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • network/communication capabilities allowing customers to transfer data in and out of cloud vendor’s environment
  • compute (VMs, CPUs, storage, serverless computing, containers, etc.)
  • management plane (controls network, communications, compute, etc.)
A

Cloud components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In what environment does most security work occur?

A

IaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IaaS Shared Responsibility

A

Securing infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

PaaS costumer responsibility

A

Security, apps, data, risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SaaS customer data responsibility

A

Access and administration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are virtual firewalls used in cloud environments?

A

Network security groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security groups use _____ to control traffic

A

Rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Tracking requests/responses to allow responses to return to systems that make an allowed request

A

Stateful (security groups and firewalls)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AWS VPC traffic monitoring capability allows you to _____ traffic.

A

See, capture, and analyze

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Correlating logins and activity to the locations where they originate to ensure credentials aren’t being misused and to identify unexpected traffic patterns based on geoIP info:

A

Geofencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Relying on identities and authorization to ensure users and entities are validated before they access data:

A

Zero Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is packet capture and traffic inspection harder in the cloud?

A

Cloud environments operate at Layer 3 of OSI model, while traditional networks can be accessed at Layers 1 and 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Tools that limit communications based on some criteria.

A

Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In cloud environments, _____ are often the first firewall capability deployed.

A

(Network) security groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Criteria for determining which traffic is allowed is handled by _____.

17
Q

Firewalls
IPS
Access Control
Gateways
WAFs
Backup and Recovery

A

Network security tools

18
Q

Firewalls determine which traffic is allowed by using _____.

19
Q

_____ are designed to identify malicious traffic and alert on it.

A

Intrusion Detection System (IDS)

20
Q

_____ can detect and respond to malicious traffic by stopping it or alerting on it.

A

Intrusion Prevention System (IPS)

21
Q

Tool used to detect, identify, isolate, and analyze attacks by distracting attackers.

22
Q

Because many systems in the cloud are ephemeral, your scans need to:

A
  • validate the original system
  • validate changes that occur due to code and component updates
23
Q

Allows admins to access a private network from a lower security zone.

A

Bastion hosts (jump servers/jump boxes)

24
Q

The process by which an identity is validated as belonging to a user

A

Identity proofing

25
Used to generate, store, and manage cryptographic keys as well as for other cryptographic uses in support of hashing and digital signatures, encryption, and decryption of data thru offloading.
Hardware Security Modules (HSMs)
26
Hardware device used to secure, store, and manage cryptographic keys for disk encryption, trusted boot, hardware validation, and password management for devices.
Trusted Platform Module (TPM)
27
- Using built-in tools - Least privilege - Encrypting data at rest and in transit - Blocking public access by default - Ensuring wildcard or broad access to storage buckets is not allowed - Building secure default access control list - Versioning and replication -Monitoring, auditing, and alerting
Ways to keep cloud storage secure
28
- configuration requirements - patches and updates - security and notification - software composition analysis tools - package management tools
Checklist for 3P software management
29
- Provide cryptographic hashes for integrity checks - Signing with developer's certificate - GPG or PGP signature
Ways to validate open-source software
30
How to validate signatures:
You need the provider's public key and ensure key provided is actually theirs.
31
The organization's standard for how a system should be configured to meet functional and security goals.
Baselines