Domain1 Flashcards
NIST 800-171
NIST 800-171 applies specifically to the use of controlled unclassified information (CUI).
Orchestration Tools
Orchestration tools are designed to manage workloads and seamlessly shift them between cloud service providers
FIPS 140-2
The Federal Information Processing Standard
FIPS 140-2, the Security Requirements for Cryptographic Modules. This guidance is specific to the cryptographic requirements of systems such as HSMs and would have the most directly relevant guidance
The FIPS 140 standard is used in designing, implementing, and operating cryptographic modules.
NIST 800-53
NIST 800-53 provides general cybersecurity standards for federal agencies,
NIST 800-171
NIST 800-171 applies specifically to the use of controlled unclassified information (CUI).
The common criteria
Common Criteria (CC) provide a certification process for hardware and software products.
The blockchain
The blockchain is technology that uses cryptography to create a distributed immutable ledger.
Accreditation
Accreditation is the act of management formally accepting an evaluating system, not evaluating the system itself.
ISO 17789
ISO 17789 provides a cloud reference architecture and does not offer specific security guidance.
ISO 27701
ISO 27701 provides control guidance for privacy programs
ISO 27001
ISO 27001 is an international standard for the creation of an information security management system (ISMS).
ISO 27001 is a general description of controls appropriate for a cybersecurity program,
ISO 27017
ISO 27017 provides guidance on the security controls that should be implemented by cloud service providers
NIST SP 800-37
NIST SP 800-37 is the Risk Management Framework created by the U.S. government for assessing the security of systems.
NIST SP 800-53
NIST SP 800-53 is the list of security controls approved for use by U.S. government agencies and a means to map them to the Risk Management Framework
Payment Card Industry Security Standards Council (PCI SSC).
The Payment Card Industry Data Security Standard (PCI DSS) is overseen by the Payment Card Industry Security Standards Council (PCI SSC)
OpenID Connect
OpenID Connect is an authentication layer that works with OAuth 2.0 as its underlying authorization framework.
Edge Computing
The edge computing service model would be far more appropriate, as it places computing power at the sensor, minimizing the data that must be sent back to the cloud over limited connectivity network links.
Cloud access security brokers (CASBs)
Cloud access security brokers (CASBs) are designed to enforce security policies consistently across cloud services
Elasticity and Scalability
Elasticity refers to the ability of a system to dynamically grow and shrink based on the current level of demand. Scalability refers to the ability of a system to grow as demand increases but does not require the ability to shrink. Services that are elastic must also be scalable, but services that are scalable are not necessarily elastic
Trusted execution environment (TEE)
Confidential computing protects data in use by using a trusted execution environment (TEE)
Protect data in use in cloud computing ( TEE, Confidential computing)
Trusted Execution Environment (TEE) and Confidential Computing are technologies that protect data in use in cloud computing
Confidential computing
Confidential computing is an emerging technology designed to support the protection of data that is actively stored in memory.
general certification process for computing hardware - Common criteria
The Common Criteria provide a general certification process for computing hardware that might be used in government applications.
FedRAMP- Federal Risk and Authorization Management Program
FedRAMP provides a certification process for cloud computing services but not for hardware
The distinguished name (DN) - LDAP
The distinguished name (DN) is the nomenclature for all entries in an LDAP environment.
DR Approaches - hot, cold, warm sites , cloud site(cost effective)
Hot sites, cold sites, and warm sites all require a significant investment in physical facilities.
BC & DR
BC is about maintaining critical functions during a disruption of normal operations, and DR is about recovering to normal operations after a disruption