Lesson 6: Secure Cloud Network Architecture Flashcards

1
Q

What are the four cloud deployment models?

A

Public (Multi-Tenant): Shared resources, cost-efficient but less secure.

Private: Exclusive to one organization; more secure and controlled.

Hybrid: Combines private and public clouds for flexibility and scalability.

Community: Shared by organizations with common interests like regulatory compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the security considerations for the 4 cloud architectures?

A

Single-Tenant: Fully dedicated infrastructure; most secure but costly.

Multi-Tenant: Shared infrastructure; cost-effective but needs strong separation.

Hybrid Architecture: Requires careful integration and consistent policies.

Serverless: Cloud provider manages resources; customers focus on access security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three cloud service models, and what do users manage in each?

A

SaaS (Software as a Service): Fully hosted applications; users handle data configuration.

PaaS (Platform as a Service): Hosts platform for app development; users manage app security.

IaaS (Infrastructure as a Service): Provides IT infrastructure components; users handle OS and app security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do Third-Party Vendors and Service Level Agreements (SLAs) do?

A

Third-party vendors are entities with access to an organization’s data or systems, posing security risks.

Service Level Agreements (SLAs) are contracts that define the level of service and security expected from these vendors, ensuring accountability and mitigating risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can vendor lock-in be mitigated?

A

By adopting multi-cloud strategies and ensuring data portability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the roles in the Responsibility Matrix?

A

Cloud Service Provider (CSP): is responsible for securing the cloud infrastructure itself.
- Infrastructure security, DDos protection, hardware redundancy

Customer: is responsible for securing data and applications running within that infrastructure.
- Date protection, identity access controls, encryption configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Centralized Computing and what are the pros and cons of it?

A

Centralized Computing has a single server control.

Pros: Strict control and easier management.

Cons: Has a single point of failure, Scalability limitations, performance bottlenecks, potential for loss of data or corruption if the server fails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Decentralized Computing and what are the pros and cons of it?

A

Decentralized Computing has resources and tasks are distributed across multiple nodes or devices

Pros: Enhanced Scalability, Security, and Resilience

Cons: Increased complexity and potential for redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are key components of a resilient cloud architecture?

A

Replication: Synchronous or asynchronous for application needs.

Availability Zones: Local, regional, or geo-redundant replication.

Automation: Includes Infrastructure as Code (IaC), edge computing, and auto-scaling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where are embedded systems commonly used?

A

Home appliances, automotive systems, medical devices, and industrial automation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is RTOS and its primary use?

A

Real-Time Operating Systems (RTOS): Designed for high-stability applications like aerospace, automotive, and medical fields.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the risk of Embedded Systems?

A

They are vulnerable to system-level attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the main components of Industrial Control Systems (ICS)?

A

Distributed Control Systems (DCS): Localized management of industrial operations.

SCADA: Manages multiple ICS across large-scale operations (e.g., energy, water supply).

Cybersecurity Priorities: Focus on availability and integrity over confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the Internet of Things (IoT) pertain to?

A

Applications: Smart homes, healthcare, agriculture, and logistics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the primary drivers of IoT adoption?

A

Cost reduction, 5G connectivity, and advancements in analytics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are key risks for Internet of Things (IoT)?

A

Device vulnerabilities, lack of standardization, and data privacy concerns.

17
Q

What are IoT best practices?

A

Following IoTSF, IIC, CSA, and ETSI IoT security guidelines.

18
Q

Why is Zero Trust becoming essential?

A

Trends like BYOD, remote work, and hybrid infrastructures eliminate clear network perimeters.

Zero Trust secures data, users, and devices by requiring constant verification.

19
Q

What are the benefits of Zero Trust?

A

Greater security by authenticating all users/devices.

Improved governance, compliance, and granular access control.

20
Q

What are the key concepts of Zero Trust?

A

Deperimeterization: Security emphasis shifts from network boundaries to individual assets.

Policy-Driven Access Control: Enforces least privilege and denies unauthorized requests.

21
Q

What is the difference between control and data planes in Zero Trust?

A

Control Plane: Defines and monitors access policies, adapts to threats.

Data Plane: Handles secure session transfers in microsegmented trust zones.

22
Q

What are the benefits of separating control and data planes?

A

Scalability, flexibility, and continuous monitoring to detect and terminate anomalous behavior.