Domain 3 Flashcards
Infrastructure as a Service (Iaas)
Customer is responsible for configuring VM’s, Virtual network and guest OS security as if systems were on Premises. CSP is responsible for the physical components, internal network and tool provided.
Platform as a Service(Paas)
CSP is responsible for physical components, the internal network, and tools provided. Cheaper for customer but less control.
Software as a Service(Saas)
Customer is responsible for configuring access to the cloud service for their users as well as shared responsibility for data recovery.
Public Cloud
Everything run on the cloud providers hardware
Private Cloud
Cloud environment in your data centre
Hybrid Cloud
Combines Public and Private Cloud
Multi Cloud
2 or more public cloud providers
Multitenancy
Logical isolation in CSP
Infrastructure as a Code
Management of infrastructure (Networks, VM, load balancers and connection topology) described in code. It is a key DevOps practice and is used in conjunction with continuous integration and continuous delivery
Serverless Architecture
Cloud computing execution model where cloud provider dynamically manages the allocation and provisioning of servers
Microservices
Microservices are an architectural style in software development where a system is built as a collection of small, independent, and loosely coupled services. Each service is designed to perform a specific business function and communicates with other services through well-defined APIs.
Logical segmentation
Vlans ( Layer 2) - Logically segment a local area network into subnetworks
VPN
Creating an encrypted tunnel between devices or networks to pass traffic using protocols like IPsec
Virtual routing and forwarding
Allows a single router or switch to function as a multiple virtual router or switches.
Software Defined Network (SDN)
Network architecture approach that enables the network to be centrally controlled or programmed using software. Has a capacity to reprogram the data plane at any time. Use cases include SD-Lan and SD-Wan
Containerization
Lightweight portable way to package applications for multiple platforms
Virtualization
Server Virtualization the process of dividing a physical server into multiple unique and isolated virtual servers by means of software application (Hypervisor)
VM Escape
Where attacker gains access to a VM then attacks either the host machine that holds all the VMs, the hypervisor or any other VMs
VM Sprawl
Unmanaged VM on the network
IOT (Internet of Things)
Connected to the internet . Elective curve(Smaller keys). Limited Compute resources and Limited ability to patch
SCADA ( Supervisory Control and Data Acquisition)
Large amount of industrial equipment. Do not have direct access for greater security. Should be segmented
RTOS (Real time operating systems)
Smart devices like wearables and embedded systems Operate with very specific scheduling.
Embedded Systems
Technology component of an IOT devices . A full computer system embedded inside another larger system ( Examples - GPS, Drones, VoIP phones)
Availability
Ensuring a system or service is accessible to authorised users when needed
Resilience
System availability to handle disruptions
Responsiveness
Ability to respond to user request or events in a timely manner
Scalability
Ability to scale resources
Ease of deployment
Complexity and effort required implementation
Risk Transference
Security risks mitigated by transferring some responsibility to third parties
Internet
A Private network that is designed to host the information internal to the organisation
Extranet
Section of an organisation network that has been sectioned off to act as intranet for the private network but also serves information to external business partners
Screened Subnet
DMZ/ Perimeter network
Attack vectors
Consist of all the threat vectors that a system is exposed to
Fail-Open
Allows everything to pass through system when it fails. No security controls are enforced. There is no disruption in network activity
Fail- Closed
Nothing can pass through the system when it fails . No security controls are ignored, network traffic is disrupted
NIPS/NIDS - Inline
Place near the fire wall as an additional layer of security
NIPS/ NIDS - Tap ( Out of band)
replicates traffic. Active taps - require power to operate. Passive taps -does not require operate
Jump Server
Place on Screened Subnet allows admins to connect remotely to the network
Forward Proxy
Server that controls requests from clients seeking resources on the internet or an external network
Reverse Proxy
Placed on a screened subnet, performs the authentication and decryption of a secure session to enable it to filter the incoming traffic
IDS
Analyses whole packets, both headers and payload looking for known events. Known event is detected, a log is generated
IPS
Analyses whole packets both header and payload looking for known events. Know event is detected, packet is rejected
HIDS/HIPS
Host Based IDS/IPS - Monitor activity on a single system