Cloud Platform, Infrastructure, and Operations Flashcards

1
Q
  • infrastructure and systems/services in use
  • how systems will communicate
  • securing network traffic in shared environment
  • securing the management plane
A

Cloud security considerations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • network/communication capabilities allowing customers to transfer data in and out of cloud vendor’s environment
  • compute (VMs, CPUs, storage, serverless computing, containers, etc.)
  • management plane (controls network, communications, compute, etc.)
A

Cloud components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In what environment does most security work occur?

A

IaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IaaS Shared Responsibility

A

Securing infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

PaaS costumer responsibility

A

Security, apps, data, risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SaaS customer data responsibility

A

Access and administration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are virtual firewalls used in cloud environments?

A

Network security groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security groups use _____ to control traffic

A

Rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Tracking requests/responses to allow responses to return to systems that make an allowed request

A

Stateful (security groups and firewalls)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AWS VPC traffic monitoring capability allows you to _____ traffic.

A

See, capture, and analyze

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Correlating logins and activity to the locations where they originate to ensure credentials aren’t being misused and to identify unexpected traffic patterns based on geoIP info:

A

Geofencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Relying on identities and authorization to ensure users and entities are validated before they access data:

A

Zero Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is packet capture and traffic inspection harder in the cloud?

A

Cloud environments operate at Layer 3 of OSI model, while traditional networks can be accessed at Layers 1 and 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Tools that limit communications based on some criteria.

A

Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In cloud environments, _____ are often the first firewall capability deployed.

A

(Network) security groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Criteria for determining which traffic is allowed is handled by _____.

A

Rules

17
Q

Firewalls
IPS
Access Control
Gateways
WAFs
Backup and Recovery

A

Network security tools

18
Q

Firewalls determine which traffic is allowed by using _____.

A

Rules

19
Q

_____ are designed to identify malicious traffic and alert on it.

A

Intrusion Detection System (IDS)

20
Q

_____ can detect and respond to malicious traffic by stopping it or alerting on it.

A

Intrusion Prevention System (IPS)

21
Q

Tool used to detect, identify, isolate, and analyze attacks by distracting attackers.

A

Honeypot

22
Q

Because many systems in the cloud are ephemeral, your scans need to:

A
  • validate the original system
  • validate changes that occur due to code and component updates
23
Q

Allows admins to access a private network from a lower security zone.

A

Bastion hosts (jump servers/jump boxes)

24
Q

The process by which an identity is validated as belonging to a user

A

Identity proofing

25
Q

Used to generate, store, and manage cryptographic keys as well as for other cryptographic uses in support of hashing and digital signatures, encryption, and decryption of data thru offloading.

A

Hardware Security Modules (HSMs)

26
Q

Hardware device used to secure, store, and manage cryptographic keys for disk encryption, trusted boot, hardware validation, and password management for devices.

A

Trusted Platform Module (TPM)

27
Q
  • Using built-in tools
  • Least privilege
  • Encrypting data at rest and in transit
  • Blocking public access by default
  • Ensuring wildcard or broad access to storage buckets is not allowed
  • Building secure default access control list
  • Versioning and replication
    -Monitoring, auditing, and alerting
A

Ways to keep cloud storage secure

28
Q
  • configuration requirements
  • patches and updates
  • security and notification
  • software composition analysis tools
  • package management tools
A

Checklist for 3P software management

29
Q
  • Provide cryptographic hashes for integrity checks
  • Signing with developer’s certificate
  • GPG or PGP signature
A

Ways to validate open-source software

30
Q

How to validate signatures:

A

You need the provider’s public key and ensure key provided is actually theirs.

31
Q

The organization’s standard for how a system should be configured to meet functional and security goals.

A

Baselines