Describe security and compliance concepts Flashcards

1
Q

What is the Shared Responsibility Model in cloud computing?

A

The Shared Responsibility Model defines which security tasks are managed by the cloud service provider and which are handled by the customer, varying with different types of cloud services like SaaS, PaaS, and IaaS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In an on-premises datacenter, who is responsible for security?

A

In an on-premises datacenter, the organization is responsible for 100% of the security, including physical security, software, devices, accounts, and data security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does Infrastructure as a Service (IaaS) entail in terms of security responsibilities?

A

With IaaS, the customer manages the operating systems, network controls, applications, and data protection, while the cloud provider handles the physical infrastructure like hardware, network, and datacenter security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does the responsibility change with Platform as a Service (PaaS)?

A

In PaaS, the cloud provider manages the underlying infrastructure, including hardware and operating systems. The customer is responsible for the applications they deploy and their data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the customer’s role in Software as a Service (SaaS) under the Shared Responsibility Model.

A

In SaaS, the customer’s responsibilities are limited to data, devices, accounts, and identities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List the responsibilities always retained by the customer in any cloud deployment type.

A
  • Information and Data
  • Devices (like mobile and PCs)
  • Accounts and Identities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the benefits of understanding the Shared Responsibility Model?

A

It clarifies responsibilities, helping organizations to focus on security aspects they are responsible for, ensuring no gaps in security coverage, and optimizing resource allocation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Defense in Depth in cybersecurity?

A

Defense in Depth is a security strategy that uses multiple layers of security controls to protect valuable data and systems. If one layer fails, subsequent layers provide additional security barriers to stop attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name the seven layers of security in a Defense in Depth strategy.

A

7) Physical Security
6) Identity and Access Controls
5) Perimeter Security
4) Network Security
3) Compute Layer Security
2) Application Layer Security
1) Data Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain how Physical Security fits into Defense in Depth.

A

Physical security involves measures like access controls to datacenters, ensuring only authorized personnel can enter areas where critical systems or data are stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does Identity and Access Security entail?

A

It includes mechanisms like multifactor authentication and condition-based access to ensure only authorized users can access infrastructure or make changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does Perimeter Security protect against attacks?

A

Perimeter security, like DDoS protection, filters out large-scale attacks before they can affect the availability of network services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe Network Security in Defense in Depth.

A

Network security includes segmentation and access controls to limit and control communication between resources, reducing the risk of lateral movement by attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the role of Compute Layer Security?

A

This layer secures virtual machines by implementing security measures like closing unnecessary ports, ensuring only necessary services are exposed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is Application Layer Security important?

A

It ensures that software applications are free from vulnerabilities, with practices like secure coding, regular updates, and secure configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain Data Layer Security.

A

Data layer security involves managing access to data and encrypting data at rest or in transit to protect it from unauthorized access or tampering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does CIA stand for in cybersecurity?

A

CIA stands for Confidentiality, Integrity, and Availability, which are core goals for protecting information:

  • Confidentiality ensures data is only accessible to authorized users.
  • Integrity ensures data is accurate and unaltered.
  • Availability ensures data is accessible when needed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the Zero Trust model?

A

Zero Trust is a security concept based on the principle “trust no one, verify everything,” assuming all networks are potentially hostile, even internal ones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Why is Zero Trust necessary?

A

Traditional security models based on perimeter defense are insufficient against modern cyber threats that can bypass conventional access controls. Zero Trust strengthens security by not relying on network location for trust.

20
Q

List the three guiding principles of Zero Trust.

A

Verify explicitly - Always authenticate and authorize using multiple data points.
Least privilege access - Grant only necessary access for the shortest duration possible.
Assume breach - Operate under the assumption that a breach has already occurred or will occur.

21
Q

How does Zero Trust implement “Verify Explicitly”?

A

By authenticating and authorizing based on user identity, location, device health, service/workload, data classification, and behavioral anomalies.

22
Q

Explain “Least Privilege Access” in Zero Trust.

A

This involves limiting access to resources through just-in-time and just-enough access, adaptive policies based on risk, and data protection measures.

23
Q

What does “Assume Breach” mean in the context of Zero Trust?

A

This principle involves segmenting access, encrypting data, and using analytics for visibility and threat detection, assuming that some level of compromise might already exist.

24
Q

What are the six foundational pillars of the Zero Trust model?

A

Identities - Verification and least privilege for users, services, or devices.
Devices - Monitoring for health and compliance.
Applications - Managing permissions and discovering all used applications.
Data - Classification, labeling, and encryption.
Infrastructure - Ensuring secure configurations and real-time monitoring.
Networks - Segmenting networks and employing real-time threat protection.

25
Q

How does Zero Trust handle identity verification?

A

Every identity must be strongly authenticated and access permissions should adhere to the principle of least privilege.

26
Q

What role does device management play in Zero Trust?

A

Devices are monitored to ensure they comply with security standards, reducing the attack surface by ensuring only healthy, compliant devices have access.

27
Q

In Zero Trust, why is application management crucial?

A

To control who can access which applications and to manage potential unauthorized or unmanaged applications (Shadow IT).

28
Q

What is encryption used for in cybersecurity?

A

Encryption is used to make data unreadable and unusable to unauthorized viewers by converting it into a coded format which can only be accessed with a decryption key.

29
Q

What are the two main types of encryption?

A

Symmetric Encryption: Uses the same key for encryption and decryption.
Asymmetric Encryption: Uses a public key for encryption and a private key for decryption.

30
Q

Describe Symmetric Encryption.

A

Symmetric encryption involves using the same key to both encrypt and decrypt the data. It’s fast and efficient for large amounts of data but requires secure key distribution.

31
Q

Explain Asymmetric Encryption.

A

Asymmetric encryption uses two keys: a public key for encryption, which can be shared, and a private key for decryption, which must be kept secret. It’s used for secure communication over the internet, like HTTPS.

32
Q

What does encrypting data “at rest” mean?

A

Encryption at rest refers to securing data stored on physical devices like servers or databases, making it unreadable without the decryption keys.

33
Q

How is data “in transit” protected through encryption?

A

Data in transit is encrypted while it moves across networks, ensuring that if intercepted, it remains confidential. Examples include using HTTPS for web traffic.

34
Q

What is the purpose of encrypting data “in use”?

A

Encryption in use aims to protect data while it’s being processed or temporarily stored in memory, using technologies like secure enclaves to keep data encrypted in CPU caches or RAM.

35
Q

Define hashing in the context of data security.

A

Hashing converts data into a fixed-length value or hash using an algorithm. It’s used for verifying data integrity or storing passwords securely, where the hash is compared rather than the original data.

36
Q

How does hashing differ from encryption?

A

Hashing does not require keys, and the process is one-way; you cannot reverse hash back to the original data, unlike encryption where data can be decrypted.

37
Q

What is “salting” in password hashing?

A

Salting involves adding a random value to the data before hashing to prevent brute-force attacks by creating unique hashes for the same password, making precomputed attacks (like rainbow tables) ineffective.

38
Q

What does GRC stand for in the context of organizational management?

A

GRC stands for Governance, Risk, and Compliance. It’s a structured approach to aligning IT with business objectives, managing risk, and ensuring compliance with regulations.

39
Q

Define Governance in GRC.

A

Governance refers to the system of rules, practices, and processes by which an organization is directed and controlled, often in response to external standards and expectations.

40
Q

What is Risk Management in the GRC framework?

A

Risk Management is the identification, assessment, and response to threats or events that could adversely affect organizational or customer objectives, stemming from both external and internal sources.

41
Q

Explain the concept of Compliance in GRC.

A

Compliance involves adhering to laws, regulations, and standards relevant to the organization’s operations, particularly in how data is handled, processed, and protected.

42
Q

How does Compliance differ from Security?

A

Compliance focuses on meeting the minimum legal requirements, while security encompasses all measures to protect data, which often goes beyond what compliance mandates.

43
Q

What is Data Residency?

A

Data Residency refers to regulations specifying where data must physically reside, affecting how and when data can be stored, transferred, or accessed internationally.

44
Q

Describe Data Sovereignty.

A

Data Sovereignty is the principle that data is subject to the laws of the country/region where it is collected, stored, or processed, adding complexity to multi-jurisdictional data management.

45
Q

What does Data Privacy entail?

A

Data Privacy involves the protection of personal data, ensuring transparency in how data is collected, used, shared, and processed, adhering to privacy laws and regulations.

46
Q

Why is understanding GRC important for organizations?

A

Understanding GRC is crucial for organizations to effectively manage their operations in line with legal requirements, reduce risks, enhance decision-making, and protect stakeholder interests.

47
Q

What are some common sources of risk in an organization?

A

External: Economic conditions, natural disasters, pandemics, security breaches.
Internal: Data leaks, theft of intellectual property, fraud, insider trading.