Flashcards in “CCSK: Certificate of Cloud Security Knowledge 5 of 6 Practice
How can security be increased in an immutable environment?
A.By disabling remote logins
B.By implementing event-driven security
C.By leveraging serverless computing if offered by the provider
D.By increasing the frequency of vulnerability assessments
A.By disabling remote logins
Explanation:
When leveraging immutable workloads, security can be increased by removing the ability to log in remotely. Any changes must be made centrally in immutable environments. File integrity monitoring can also be implemented to enhance security, as any change made to an immutable instance is likely evidence of a security incident.
Which of the following CI/CD statements is false?
A.Security tests can be automated
B.A Ci/CD system can automatically generate audit logs
C.A CI/CD system replaces the current change management processes
D. A CI/CD leverages a continuous integration server
C.A CI/CD system replaces the current change management processes
Explanation:
The false statement is that a CI/CD system replaces the current change management processes. In fact, a CI/CD system can integrate with your current change management system. All the other statements are true.
How does penetration testing change as a result of the cloud?
A.The penetration tester must understand the various provider services that may be part of the application
B.In most cases, server instances used to run applocations will have customized kernels, which will not be understood by anyone except the provider
C.Because of the nature of virtual networking, penetration tests must be performed by the cloud provider
D.Penetration testing is not possible with containers, so many pentests results will be inconclusive
A.The penetration tester must understand the various provider services that may be part of the application
Explanation:
There is a high probability that applications will leverage various cloud provider services. How communication between these services occurs is critical for the penetration tester, so only testers with experience in a particular platform should perform these tests.
During which phase of the SSDLC should threat modeling be performed by customers?
A.Design
B.Development
C.Deployment
D.Operations
A.Design
Explanation:
Threat modeling should be performed as part of the application design phase, before a single line of code is actually written during the development phase.
During which phase of the SSDLC should penetration testing first be performed by customers?
A.Design
B.Development
C.Deployment
D.Operations
D.Operations
Explanation:
Penetration testing should be initially performed as part of the deployment phase of the SSDLC. You need to have an actual application to perform penetration testing against, and this testing should be performed before the application runs in a production environment. Of course, periodic penetration testing is a good thing during the operations phase, but the question asked when it should first be performed.
What is event-driven security?
A.When a provider will shut down a service for customers in the event of an attack being detected
B.Automating a response in the event of a notification, as established by the provider
C.Automating response in the event of a notification, as established by the customer
D.Automatic notification to a system administrator of an action being performed
C.Automating response in the event of a notification, as established by the customer
Explanation:
Event-driven security is the implementation of automated responses to notifications. This is created by the customer, who often leverages some form of API monitoring. If an API is used, this will trigger a workflow that may include both sending a message to a system administrator and running a script to address the instance automatically (such as reverting a change, changing virtual firewall rulesets, and so on).
What should be offered by SaaS providers to enforce multitenancy isolation?
A.Provider-managed keys
B.Encryption based on AES-256
C.Per customer keys
D.Customer-managed hardware security module
C.Per customer keys
Explanation:
SaaS providers are recommended to implement per-customer keys whenever possible to provide better multitenancy isolation enforcement.
What is event-driven security?
A.When a provider will shut down a service for customers in the event of an attack being detected
B.Automating a response in the event of a notification, as established by the provider
C.Automating response in the event of a notification, as established by the customer
D.Automatic notification to a system administrator of an action being performed
C.Automating response in the event of a notification, as established by the customer
Explanation
Event-driven security is the implementation of automated responses to notifications. This is created by the customer, who often leverages some form of API monitoring. If an API is used, this will trigger a workflow that may include both sending a message to a system administrator and running a script to address the instance automatically (such as reverting a change, changing virtual firewall rulesets, and so on).
What should be offered by SaaS providers to enforce multitenancy isolation?
A.Provider-managed keys
B.Encryption based on AES-256
C.Per-customer keys
D.Customer-managed hardware security module
C.Per-customer keys
Explanation:
SaaS providers are recommended to implement per-customer keys whenever possible to provide better multitenancy isolation enforcement.
If your organization needs to ensure that data stored in a cloud environment will not be accessed without permission by anyone, including the provider, what can you do?
A.Use a local HSM and import generated keys into the providers encryption system as a customer-managed key
B.Use an encryption key based on a proprietary algorithm
C.Do not store the data in a cloud environment
D.Use customer-managed keys to allow for encryption while having complete control over the key itself
C.Do not store the data in a cloud environment
Explanation:
Your only option is not using the cloud. If data is encrypted locally and then copied to a cloud, this would also stop a provider from being able to unencrypt the data if compelled by legal authorities to do so. It is generally not recommended that you create your own encryption algorithms, and they likely wouldn’t work in a provider’s environment anyway.
Which of the following controls can be used to transform data based on the individual accessing the data?
A.Enterprise Rights management
B.Dynamic Data Masking
C.Test Data Generation
D.Data Loss Prevention
B.Dynamic Data Masking
Explanation:
Only dynamic data masking will transform data on the fly with a device such as a proxy that can be used to restrict presentation of actual data based on the user accessing the data. Test data generation requires that data be exported and transformed for every user who is accessing the copied database. None of the other answers is applicable.
Why would an SaaS provider require that customers use provider-supplied encryption?
A.Data encrypted by a customer prior to being sent to the provider application may break functionality
B.Customer-managed keys do not exist in SaaS
C.SaaS cannot use encryption because it breaks functionality
D.All SaaS implementations require that all tenants use the same encryption key
A.Data encrypted by a customer prior to being sent to the provider application may break functionality
Explanation:
If a customer encrypts data prior to sending it to the SaaS provider, it may impact functionality. SaaS providers should offer customer-managed keys to enhance multitenancy isolation.
Which of the following storage types is presented like a file system and is usually accessible via APIs or a front-end interface?
A.Object storage
B.Volume storage
C.Database storage
D.Application/platform storage
A.Object storage
Explanation:
Object storage is presented like a file system and is usually accessible via APIs or a front-end interface. The other answers are incorrect.
Which of the following should be considered your primary security control?
A.Encryption
B.Logging
C.Data Residency Restrictions
D.Access Controls
D.Access Controls
Explanation:
Access controls are always your number-one security control.
Which of the following deployment models allows for a customer to have complete control over encryption key management when implemented in a provider’s cloud environment?
A.Virtual Appliance/Software Key Management
B.HSM/Appliance-based key management
A.Virtual Appliance/Software Key Management
Explanation:
The only option for an encryption key-management system in a cloud environment is the implementation of a virtual machine or software run on a virtual machine that the customer manages.
Which of the following security controls is listed by the payment card industry as a form of protecting credit card data?
A.Tokenization
B.Provider-managed keys
C.Dynamic Data Masking
D.Enterprise Rights Management
A.Tokenization
Explanation:
Tokenization is a control the payment card industry lists as an option to protect credit card data.
Which of the following is a main differentiator between URL filtering and CASB?
A.DLP
B.DRM
C.ERM
D.Ability to block access based on whitelists and blacklists
A.DLP
Explanation:
The main difference between URL filtering and CASB is that, unlike traditional whitelisting or blacklisting of domain names, CASB can use DLP when it is performing inline inspection of SaaS connections
Which of the following is NOT a main component when considering data security controls in cloud environments?
A.Controlling data allowed to be sent to a cloud
B.Protecting and managing data security in the cloud
C.Performing risk assessment of prospective cloud providers
D.Enforcing information lifecycle management
C.Performing risk assessment of prospective cloud providers
Explanation:
Although risk assessment of cloud providers is critical, this activity is not a data security control.
Which of the following is an example of an attribute that can be used with ABAC?
A.If the user logged on with MFA
B.Biometric data
C.Biometric authentication status
D.Both (if the user logged on with MFA) and (biometric authentication status)
D.Both (if the user logged on with MFA) and (biometric authentication status)
Explanation:
Everything about a user and their connection can be used as an attribute to determine access control. However, in the biometric model, actual biometric data is held within the device itself. The fact that biometrics were used is an attribute that can be used.
Why should multifactor authentication always be considered?
A.It is a best practice according to the CSA Guidance
B.Cloud services can be accessed by anyone using a web browser
C.Cloud services have the essential characteristic of broad network access
D.MFA is not recommended because users who lose their phones will require manual effort to reset their accounts
C.Cloud services have the essential characteristic of broad network access
Explanation:
Cloud services have the essential characteristic of broad network access. This is similar to the fact that it can be accessed by any browser (B), but C is the better response because not all access to a cloud service will always require a web browser. Of course, implementing MFA is a CSA best practice, but that alone is not the reason why it should be implemented. While loss of a cell phone with a soft-token MFA device will likely require manual effort to reset the MFA settings, it is not a valid reason to avoid the use of MFA, especially for privileged accounts.
Which of the following is the best federation protocol to implement and support?
A.SAML
B.OAuth
C.OpenID
D.There is no best protocol. You have to determine your use cases and constraints before selecting a protocol
D.There is no best protocol. You have to determine your use cases and constraints before selecting a protocol
Explanation:
There is no “magic bullet” protocol for federation. You must always consider your requirements based on use cases and constraints.
What is a role?
A.A role is part of federation. It is how your group membership within your company is granted entitlements in your IaaS provider
B.A role is the job your perform at work
C.A role is temporary credential that is inherited by a system within a cloud environment
D.All of these are correct
D.All of these are correct
Explanation:
All the answers are correct. This is why the CSA Guidance says that “role is a confusing and abused term used in many ways.”
Which of the following is a factor in multifactor authentication?
A.A secret handshake
B.The color of your eyes
C.A one-time password
D.All of these
D.All of these
Explanation:
The factors are something you know (secret handshake), something you have (one-time password), and something you are (eye color). Do these make sense from a technical perspective? Probably not, but they meet the criteria of the three factors all the same.
Which of the following protocols is XML-based and supports both authentication and authorization?
A.SAML
B.OAuth
C.OpenID
D.SCIM
A.SAML
Explanation:
SAML is XML-based and handles both authentication and authorization. OAuth only deals with “AuthOrization” (memory trick), and OpenID only deals with authentication. SCIM is a provisioning language.