Introduction Flashcards

1
Q

What is a Canonical Data Model (CDM)? When should we practice CDM or apply such?

A

Type of Data Model aiming to present data entities and relationships in the simplest possible form to integrate processes and systems.

Why? Improves processes and practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the following term (IaaS)?

A

Infrastructure as a Service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the following term (PaaS)?

A

Platform as a Service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the following term(SaaS)?

A

Software as a Service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why activate (MFA)?

A

Security for users within your system leveraging open source software in the GCPm enhancing security.

MFA requires more than one mechanism to authenticate a suer. this secures user logins from attackers exploiting stolen or weak credentials, default= not set.

Multi Factor Authentication, step 2 in Best Practices for admins utilizing Google Cloud Platform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define (IDaaS).

A

Cloud Identity is a stand alone Identity as a Service.

IDaaS gives Google Cloud users access to many of the identity managements features that the workspace provides.

A suite of secure cloud-native collaboration and production apps that can be enabled or disabled by user within the org and or on GCP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cloud identity management layer for (GCP).

A

Creates an Organizational node for your domain helping map the corporate structure and controls to GCP resources through resource hierarchy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Cloud Custodian on GCP?

A

A Cloud Security Posture Management (CSPM) tool. CSPM tools evaluate your cloud configuration and identity configuration mistakes.

Enables Monitoring of cloud logs to detect threats and configuration changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why use GCP Service: Identity and Access Management (IAM)?

A

Enforces least privilege access control to your cloud resources. Use IAM to restrict who is authenticated and authorized to utilize such sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is KMS (GCP) and why utilize it?

A

Google Cloud Key Management Services engine (KMS) requires (ADP) for managing encryption keys for other Google cloud services that enterprises can use to implement functions for cryptography.

Vault Key Management Secrets engine provides distribution and lifecycle management features for cloud provider keys. (GCP CloudKeyMangServ).

KMS is also used for REST APIs that uses a key to encrypt, decrypt or sign data such as secrets for storage access and retrieval.

Creation of a key rings in cloud console, in the key ring name field enter desired name for your key ring, then select region zone location and create.

Manage cryptographic keys in the cloud as one would perform on a local or on premise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Personas?

A

End2End scenario described earlier involves one persona:
- admin : a user with privileged permissions to
configure secrets engines.

Prerequisites: Vault Enterprise with Advanced Data Protection Module with versions greater than v 1.9.0.

  • jQuery processor(jq) is required to pretty print JSON output.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe ./ jq capabilities and use cases.

A

jq is like SED for JSON data - slice and filter and map for transforming structured data with the same ease that SED, AWK, GREP within text.

jq is written in portable C, and has 0 runtime dependencies.

Download a single binary, SCP it to a far away machine of same type.

jq can mangle the data format you have into the one needed for change or wants within a shorter and simpler program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is (HSM) and why use it?

A

Hardware Security Module (HSM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the strongest form of two factor authentication?

- Give example… (SMS)=? (OTO)=?

A

Security Key Enforcement ensures that admins use Security Keys to log in rather than second factors like SMS or OTP.

Use physical keys, as they send an encrypted signature rather than a code so logins cannot be phished.

Code:
“””
gcloud organizations get-iam-policy ORGANIZATION_ID
“””

After, enable SKE for configuring backup security keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How would you prevent the use of user managed service accounts keys?

A

GCP-managed keys are used by Cloud Platform services, such as App Engine and Compute Engine.

Google holds the key and rotates it automatically every week.

User-Managed Keys can be easily compromised by common dev practives within source code, downloands dir.

List all service accounts list in CL/terminal:
“"”gloud iam service-accounts list”””

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define the Client - Server Model

A

the paradigm by which modern systems are designed that consists of clients requesting data or service from servers.

Servers then provide data or service to clients.