Introducing Defence In Depth Flashcards

1
Q

What is Defense in Depth, and what is its objective?

A

Defense in Depth is a security strategy aimed at slowing or stopping unauthorized data access through layered defense mechanisms. The objective is to ensure that if one layer is breached, other layers can still stop attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the layers of Defense in Depth?

A

The layers include Physical Security, Identity and Access, Perimeter, Network, Compute, Application, and Data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the role of the Physical Security layer in Defense in Depth?

A

The Physical Security layer serves as the first line of defense, controlling building and hardware access to prevent unauthorized entry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the focus of the Identity and Access layer in Defense in Depth?

A

The Identity and Access layer focuses on securing identities and granting account access only to what is needed, minimizing the risk of unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What makes the Data layer a primary target in Defense in Depth?

A

The Data layer is a primary target as it involves securing databases, disks, and SaaS applications, controlling access to sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What security aspects are customers always responsible for across different models?

A

Customers are always responsible for the security of information and data, devices (mobile and PCs), and accounts and identities in all models (SaaS, PaaS, IaaS, and On-prem).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In SaaS and PaaS models, what aspect of security is a shared responsibility between the customer and the Cloud Provider?

A

The security of the “Identity and Directory Infrastructure” is a shared responsibility in SaaS and PaaS models.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What summarizes the essence of Defense in Depth?

A

Defense in Depth involves layered defenses aimed at protecting data. It requires understanding how different layers work together to enhance overall security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the main objective of defense in depth?

A

Defense in depth aims to protect data by implementing multiple layers of security measures to prevent unauthorized access and mitigate cyber threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How is defense in-depth illustrated using a medieval castle example?

A

In the castle defense system, multiple layers of defense, such as moats, walls, guards, and fortifications, are employed to protect the king from attackers, ensuring that even if one layer is breached, others can still thwart the attackers’ progress.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the seven layers of defense in depth?

A

The seven layers are:
1. Physical security
2. Identity and access
3. Perimeter
4. Network
5. Compute
6. Application
7. Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain the role of physical security in defense in depth

A

Physical security serves as the first line of defense, guarding access to physical assets such as data centers and servers, typically managed by the cloud vendor in the cloud model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of the identity and access layer?

A

The identity and access layer focuses on securing user identities and access permissions, ensuring that users have access only to the resources they need, on a need-to-know basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

: Describe the function of the perimeter layer in defense in depth.

A

The perimeter layer protects against network-based attacks from the outer edge or public internet, utilizing measures like DDoS protection and firewalls to identify and thwart attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does the network layer primarily entail?

A

The network layer focuses on limiting network connectivity within the network and across resources, allowing only necessary traffic and implementing secure connectivity to on-premises networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

: Explain the significance of the compute layer in defense in depth.

A

The compute layer involves securing virtual machines, ensuring their protection and keeping the operating system and associated software up to date.

17
Q

What is the role of the application layer?

A

The application layer addresses vulnerabilities within applications, secures access to sensitive applications, and emphasizes designing applications with security in mind from the outset.

18
Q

Define the importance of the data layer in defense in depth.

A

The data layer, the primary target of attackers, includes databases and disk contents, requiring access control measures to limit access to authorized users and protect sensitive data.

19
Q

How do the layers of defense in depth relate to the shared responsibility model?

A

The cloud vendor manages physical assets, aligning with the physical security layer, while responsibilities for other layers may vary depending on the cloud service model, shared between the user and the cloud vendor.

20
Q

What is the main exam objective regarding defense in depth?

A

The main objective is to understand the functions of each layer and how they collaborate to safeguard data from unauthorized access and cyber threats.