Domain 1 and Some 2 Flashcards
Many different customers accessing cloud resources hosted on shared hardware.
Multitenancy
Only Matthew’s company has access to any resources hosted on the same physical hardware.
Private cloud
Matthew’s organization is combining resources of public and private cloud computing.
Hybrid cloud
Resource use is limited to members of a particular group.
Community cloud
A strong sanitization technique that involves encrypting data with a strong encryption engine and then taking the keys generated in that process, encrypting them with a different encryption engine, and destroying the resulting keys of the second round of encryption.
Cryptographic erasure
Cryptographic erasure is effective on:
Magnetic and solid-state drives.
T/F: Degaussing and overwriting are not effective on SSDs
True
T/F: Containers provide easy portability.
False, because they are dependent on the host operating system.
Hypervisors are used to:
Host virtual machines on a device.
A platform as a service model that allows cloud customers to run their own code on the provider’s platform without provisioning servers.
Serverless computing
Virtual machines are self-contained and have their own internal operating system, which can be moved between:
different host operating systems.
Responsibilities of the customer
Use cloud services
perform service trials
monitor services
administer service security
provide billing and usage reports
handle problem reports
administer tenancies
perform business administration
select and purchase service
request audit reports.
The ability of a system to dynamically grow and shrink based on the current level of demand.
Elasticity
The ability of a system to grow as demand increases but does not require the ability to shrink.
Scalability
Zero trust decisions are not based on network location, such as IP address. Instead, it’s based on:
User’s identity, the nature of the requested access, and the user’s geographic (not network!) location.
Bare-metal (Type 1) hypervisor is preferable to the hypervisor that runs off the OS (Type 2) because:
It will offer less attack surface.
Network security groups provide functionality equivalent to:
Network firewalls for cloud-hosted server instances.
_____ restrict traffic that might reach a server instance.
Network Security Groups
T/F Only cloud provider can modify network firewalls
True
Restrict the geographic locations from which users may access the servers.
Geofencing
_____ may be used to examine the traffic reaching the instance.
Traffic inspection
Susceptible to disk failures and user error that may unintentionally destroy or modify data.
Vulnerable to ransomware attacks that infect systems with access to the object store and then encrypt data stored on the service.
Object storage flaws
Geofencing may be used to trigger actions, such as an alert, when:
a user or device leaves a defined geographic area.
Geotagging annotates log records or other data with:
the geographic location of the user performing an action.
The Cloud Security Alliance (CSA) provides an enterprise architecture reference guide that offers vendor-neutral _____.
design patterns for cloud security
The use of an API is an example of accessing data programmatically during the _____ phase of the lifecycle
Use
Storage that is available as disk volumes.
Block storage
Object storage maintains files in:
Buckets
T/F Virtualized servers are storage capabilities.
F, Compute capabilities
Network capacity is used to connect _____ to each other
Servers
The sudo command allows a normal user account to execute administrative commands and is an example of
Privileged access
Service access is the access to resources by:
system services, rather than individual people
What protects against the risk of a lost device?
Confidentiality
________ is when the recipient of a message can prove the originator’s identity to a third party.
Nonrepudiation
________ is a means of proving one’s identity.
Authentication
_____ demonstrates that information has not been modified since transmission.
Integrity
_____ are often used in business impact assessment to capture the impact on intangible factors
Qualitative tools
Quantitative tools, such as the computation of annualized loss expectancies and single loss expectancies, are only appropriate for:
easily quantifiable risks.
EAL2 assurance applies when the system has been
structurally tested. It is the second-to-lowest level of assurance under the Common Criteria.
These tools manage workloads and seamlessly shift them between cloud service providers.
Orchestration
Virtualization platforms allow a cloud provider to host:
virtual server instances.
Databases are a cloud service offering that allows for
the organized storage of relational data.
Cloud access service brokers (CASBs) allow for the consistent enforcement of _____ across cloud providers.
security policies
Governs the storage, processing, and transmission of credit card information.
The Payment Card Industry Data Security Standard (PCI DSS)
Regulates the financial reporting of publicly traded corporations.
The Sarbanes–Oxley (SOX) Act
Protects personal financial information.
The Gramm–Leach–Bliley Act (GLBA)
Bring all of an organization’s cloud activities under more centralized control.
They serve as a screening body helping to ensure that cloud services used by the organization meet technical, functional, and security requirements.
They also provide a centralized point of monitoring for duplicative services, preventing different business units from spending money on similar services when consolidation would reduce both costs and the complexity of the operating environment.
Cloud governance programs
use a pair of keys for each user.
Asymmetric cryptosystems
use a pair of keys for each user.
Hybrid cloud strategies combine public and private cloud resources,
not resources from multiple public cloud providers.
Email is an application-level service that is offered by cloud providers as a software as a
service (SaaS) capability.
Block storage and network capacity are infrastructure as a service
(IaaS) offerings and are infrastructure capabilities.
Serverless computing is a _____ offering.
PaaS
Occurs when a customer (not a service provider) purchases more capacity than they need.
Overprovisioning
a mix of public cloud and private cloud services. is an example of a
hybrid cloud environment.
a mix of public cloud and private cloud services. is an example of a
hybrid cloud environment.
In an infrastructure as a service environment, security duties are a _____.
shared responsibility
When Lucca reviews the RTO, he needs to ensure that the organization can recover from an outage in less than two hours based on _____.
the maximum tolerable downtime (MTD) of two hours.
How does the recipient of a message that was encrypted using asymmetric cryptography decrypt a message?
Using their own private key
The sender using asymmetric cryptography would have previously encrypted
using the recipient’s public key.
organization that helps cloud service customers use the services offered by cloud service providers.
cloud service partner
cloud service providers who offer a managed identity and access management service to cloud customers that integrates security requirements across cloud services.
Cloud service brokers
applies specifically to the use of controlled unclassified information (CUI).
NIST 800-171
provide a certification process for hardware and software products.
Common Criteria (CC)
the Security Requirements for Cryptographic Modules. This guidance is specific to cryptographic requirements.
FIPS 140-2
Services should be able to integrate and work together
Interoperability
What is the highest level of assurance under the Common Criteria?
EAL7
What does EAL7 ensure?
A system has been formally verified, designed, and tested
Technology that uses cryptography to create a distributed immutable ledger.
Blockchain
Blockchain is the technical foundation behind ________.
Cryptocurrency
An emerging technology that uses principles of particle physics to perform computing.
Quantum computing
Moves compute power to IoT devices located at the edge of the network.
Edge computing
What’s the difference b/w verification and certification?
Verification can involve a 3P testing service and compile results that may be trusted by many different organizations
An area of research into methods for protecting data in use through the protection provided by a trusted execution environment (TEE)
Confidential computing
The act of management formally accepting (not evaluating) an evaluating system
Accreditation
Verification and certification process both
validate security controls
What is one of the core capabilities of IaaS?
providing servers on a vendor-managed virtualization platform.
Web-based payroll and email systems are examples of
SaaS
Does the CP’s brand influence the cost-benefit analysis?
No
An application platform managed by
T/F: The provider absorbs the cost when the customer requests a modification of the SLA.
False. The customer pays for all costs associated w/ modifications to the SLA. These are chargeable expenses.
Creating computer resources to solve a particular problem and then getting rid of them when you no longer need them.
Ephemeral computing
Guaranteeing that the service will be available 99% of the time
availability committment
Ability of a system to withstand failures
resiliency
Why do users have the most control over the environments hosted on IaaS?
because they are able to manually adjust the resources assigned to an application
What standard provides the security controls that should be implemented by cloud service providers
ISO 27017
What standard provides the security controls that should be implemented for a cybersecurity program
ISO 27001
What standard provides the security controls that should be implemented to provide control guidance for privacy programs?
ISO 27701
What standard provides a cloud reference architecture and does not offer specific security guidance?
ISO 17789
Who oversees the PCI DSS
Payment Card Industry Security Standards Council (PCI SSC)
Cloud computing where the customer only provides application code for execution on a vendor-supplied computing platform are examples of
PaaS
Providing fully functional application to customers as a cloud service
SaaS
CaaS is a subcategory of ____
IaaS
In risk acceptance strategy:
the org does nothing but document the risk
Purchasing insurance is what type of risk strategy
Risk transference
Relocating a data center would be what kind of risk strategy
risk avoidance
Reengineering a facility would be what kind of risk strategy
risk mitigation
Using existing data to predict future events
Predictive analytics
A style of analytics that describes data
Descriptive analytics
A style of analytics that optimizes our behavior by simulating scenarios
Prescriptive analytics
What allows CPs to meet various demands from customers while remaining financially viable?
Resource pooling
The model that allows customers to scale their compute and/or storage needs w/ little or no intervention the provider
On-demand self service
Documents, in formal terms, expectations for availability, performance, or other parameters.
SLAs
An internal agreement b/w service organizations
OLA
The ability to back out of a change.
Reversibiity
Capability to move workloads easily between environments
Portability
T/F: The customer has no access to or ability to maintain the operating system in the PaaS environment.
True
What is block storage used for?
To provide disk volumes.
What is object storage used for?
To store individual files. But they cannot be mounted as a disk.
When should archival storage be used?
Only in cases where data does not need to be frequently accessed.
What is the least disruptive type of disaster recovery test?
Checklist review.
Each team member reviews the content of their disaster recovery checklist and suggest necessary changes.
Checklist review
Team members come together and walk through a scenario without making any changes to information systems.
tabletop exercise
The team activates the disaster recovery site for testing while primary site remains operational.
parallel test
Team takes down primary site and confirms the disaster recovery site is capable of handling regular operations. Most thorough test but also most disruptive.
full interruption test
In SaaS solution, the vendor manages:
the physical infrastructure and complete application stack so customer accesses a fully managed application.
PaaS offerings provide customers with an environment where customers can:
execute their own code.
CaaS is a subcategory of IaaS for:
computing resources provided as a service.
Security baselines provide a:
starting point to scope and tailor security controls to your orgs needs.
T/F: Security baselines ensure systems are always secure and prevent liability.
False
Integrating software development, operations, and quality assurance.
DevOps
What is ITIL?
A collection of best practices for managing IT orgs.