Cloud Security Flashcards
What is Service Orchestration?
the process of coordinating tools, applications, application programming interfaces (APIs), and infrastructure across private and public clouds into comprehensive workflows.
What is Service Management?
Service management involves the planning, delivery, and support of cloud services to meet business needs. It encompasses service level agreements (SLAs), monitoring, incident management, and governance.
What is Business continuity?
Business continuity ensures that critical business functions can continue during and after disruptions. It involves disaster recovery, backup strategies, and high availability.
What are Deployment Models?
represents a specific type of cloud environment, primarily distinguished by ownership, size, and access.
There are four cloud deployment models: public, private, community, and hybrid.
What is IAM?
a security framework deployed in the cloud used to verify users and control their access rights, including issuing and denying access privileges.
What is KMS?
Cloud KMS is a REST API that can use a key to encrypt, decrypt, or sign data, such as secrets for storage.
KMS allows for centralized key management, simplifying the process of creating, rotating, and revoking encryption keys.
What are cloud Service Models?
SaaS (Software as a Service), IaaS (Infrastructure as a Service), and PaaS (Platform as a Service).They provide you with different levels of control, flexibility, and management
What is learning outcome 1?
Compare and contrast the various cloud delivery and deployment models,
particularly with consideration for regulatory compliance and digital forensics.
What is learning outcome 2?
Analyse virtualisation technology and current attacks against it.
What is learning outcome 3?
Critically evaluate service orchestration, business continuity, security, and
service management functions for a cloud infrastructure.
What is learning outcome 4?
Appraise the mechanisms used to secure cloud computing platforms, including Key
Management Services (KMS) and Identity and Access Management (IAM).
What are four different virtualization attack methods?
VMaware Malware
Escape attack
Hyperjacking
Theft-of-Service
What are the key concepts to IAM?
Users
Groups
Roles
Policies
Permissions
Authentication
What are the key concepts to KMS?
Key policies
CloudTrail
Cryptographic operations (Encryption, decryption, signing, and verification)