Cloud Security Flashcards

1
Q

Hyperconvergence

A

an IT framework that combines storage, computing, and networking into a single system that can reduce data center complexity and increase scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virtual Desktop Infrastructure: VDI

A

VDI allows a cloud provider to offer a full desktop operating system to an end user from a centralized server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Secure Enclaves

A

Secure Enclaves:
All data is encrypted in memory and decrypted only while being used inside the CPU. The data is still completely protected, even if the operating system, hypervisor or root user are compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security as a Service: SECaaS

A

Provides your organization with various types of security services without the need to maintain a cybersecurity staff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Sandboxing

A

cybersecurity practice where you run and analyze code in a virtual network that mimics end-user operating environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Virtual Private Cloud: VPC

A

private cloud within a public cloud made available to a single cloud consumer within a public cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cloud Access Security Broker: CASB

A

sits between cloud service users and cloud applications, and monitors all activity and enforces security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud access security broker - CASB: Forward Proxy vs reverse proxy

A

A reverse proxy is a server that sits in front of one or more web servers, intercepting, checking, and approving requests from clients. This is different from a forward proxy, where the proxy sits in front of the clients.

Reverse proxy is positioned at the cloud network edge and directs traffic to cloud services if the contents of that traffic comply with policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud access security broker - CASB: API

A

Application Programming Interface:

A method that uses the brokers connections between the cloud service and the cloud consumer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Application Programming Interface - API

A

A library of programming utilities used to enable software developers to access functions of another application

APIs allow for the automated administration, management, and monitoring of a cloud service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Function as a Service: FaaS

A

A cloud service model that supports serverless software architecture by provisioning runtime containers in which code is executed in a particular programming language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Serverless

A

A software architecture that runs functions within virtualized runtime containers in a cloud rather than on server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cloud Threats: Insecure API

A

API must only be used over an encrypted channel (HTTPS)

Data received by an API must pass service-side validation routines

Implement throttling/rate-limiting mechanisms to protect from a DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cloud Threats: Improper Key Management

A

APIs should use secure authentication and authorization before accessing data

Do not create one key with full control to access an application’s functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cloud Threats: Insufficient Logging/Monitoring

A

WARNING: Software as a service may not supply access to log files or monitoring tools

Logs must be copied to non-elastic storage for long-term retention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cloud Threats: Cross Origin Resource Sharing Policy (CORS Policy)

A

is a mechanism that allows restricted resources on a web page to be requested from another domain outside the domain from which the first resource was served. A web page may freely embed cross-origin images, stylesheets, scripts, iframes, and videos.

this can be a threat

17
Q

Security Groups

A

Don´t learn
Firewall for compute instances
Layer 4 (TCP/UDP)
Layer 3 address

18
Q

Instance Awareness

A

Don´t learn
Granular security controls
Identify/manage specific data flows

Define & set policies
Allows uploads to the corporate file share
Deny certain uploads to personal file share
Deny files with sensitive data
Quarantine file & send alert

19
Q

Next-gen SWG (Secure Web Gateway)

A

secure web gateway (SWG) is a security solution that prevents unsecured internet traffic from entering an organization’s internal network.

a Next Gen SWG deals in both cloud and web traffic, whereas the former only deals in web traffic and is blind to cloud-enabled threats and data risks for personal instances of managed apps