Describe security and compliance concepts Flashcards
What is the Shared Responsibility Model in cloud computing?
The Shared Responsibility Model defines which security tasks are managed by the cloud service provider and which are handled by the customer, varying with different types of cloud services like SaaS, PaaS, and IaaS.
In an on-premises datacenter, who is responsible for security?
In an on-premises datacenter, the organization is responsible for 100% of the security, including physical security, software, devices, accounts, and data security.
What does Infrastructure as a Service (IaaS) entail in terms of security responsibilities?
With IaaS, the customer manages the operating systems, network controls, applications, and data protection, while the cloud provider handles the physical infrastructure like hardware, network, and datacenter security.
How does the responsibility change with Platform as a Service (PaaS)?
In PaaS, the cloud provider manages the underlying infrastructure, including hardware and operating systems. The customer is responsible for the applications they deploy and their data.
Describe the customer’s role in Software as a Service (SaaS) under the Shared Responsibility Model.
In SaaS, the customer’s responsibilities are limited to data, devices, accounts, and identities.
List the responsibilities always retained by the customer in any cloud deployment type.
- Information and Data
- Devices (like mobile and PCs)
- Accounts and Identities
What are the benefits of understanding the Shared Responsibility Model?
It clarifies responsibilities, helping organizations to focus on security aspects they are responsible for, ensuring no gaps in security coverage, and optimizing resource allocation.
What is Defense in Depth in cybersecurity?
Defense in Depth is a security strategy that uses multiple layers of security controls to protect valuable data and systems. If one layer fails, subsequent layers provide additional security barriers to stop attackers.
Name the seven layers of security in a Defense in Depth strategy.
7) Physical Security
6) Identity and Access Controls
5) Perimeter Security
4) Network Security
3) Compute Layer Security
2) Application Layer Security
1) Data Layer Security
Explain how Physical Security fits into Defense in Depth.
Physical security involves measures like access controls to datacenters, ensuring only authorized personnel can enter areas where critical systems or data are stored.
What does Identity and Access Security entail?
It includes mechanisms like multifactor authentication and condition-based access to ensure only authorized users can access infrastructure or make changes.
How does Perimeter Security protect against attacks?
Perimeter security, like DDoS protection, filters out large-scale attacks before they can affect the availability of network services.
Describe Network Security in Defense in Depth.
Network security includes segmentation and access controls to limit and control communication between resources, reducing the risk of lateral movement by attackers.
What is the role of Compute Layer Security?
This layer secures virtual machines by implementing security measures like closing unnecessary ports, ensuring only necessary services are exposed.
Why is Application Layer Security important?
It ensures that software applications are free from vulnerabilities, with practices like secure coding, regular updates, and secure configuration.
Explain Data Layer Security.
Data layer security involves managing access to data and encrypting data at rest or in transit to protect it from unauthorized access or tampering.
What does CIA stand for in cybersecurity?
CIA stands for Confidentiality, Integrity, and Availability, which are core goals for protecting information:
- Confidentiality ensures data is only accessible to authorized users.
- Integrity ensures data is accurate and unaltered.
- Availability ensures data is accessible when needed.
What is the Zero Trust model?
Zero Trust is a security concept based on the principle “trust no one, verify everything,” assuming all networks are potentially hostile, even internal ones.