SC-900 flash cards
Chapter 1
Zero-Trust guiding principles
- Always Verify: Always authenticate and authorize access based on all available elements, includes a user’s identity, location, device health, data classification, service or workload
- Use least privilege access: use just-in-time (JIT) & just-enough-access (JEA) for better data protection
- Assume breach: Always assume an attacker has gained some access to the environment.
What is the new perimeter and preferred control plane?
Identity, has become the new preferred perimeter and control plane for the entire infrastructure
Zero-Trust model
Not trusting anything and always verifying
trustworthiness explicitly.
Six Pillar of Zero-Trust
- Identity
- Endpoint
- Data
- Apps
- Infrastructure
- Network
When cloud computing who’s responsible for physical security?
The Cloud service providers
Which following responsibilities are always retained by the customer:
- Data
- Endpoint
- Account
- Access management
Traditional defense-in-depth layers are?
- Data
- Application
- Host
- Internal network
- Perimeter
- Physical Security
- Policies, people, process
What model approach is DDoS protection found?
Defense-in-Depth
Key capabilities for Applications to handle massive amounts of traffic
High availability
Scale-out
Resiliency
Fault-Tolerance
Attack surface area reduction
Common Threats
- Malware
- Phishing attacks
- Denial of Service (DOS) & Distributed Denial of service (DDoS)
- Ransomware
- Botnet
What is a Malware
Malicious application an code that can cause damage and disrupt the normal use of devices
Phishing Attacks
Attempt to steal sensitive information through emails, websites, text messages, or other forms of electronic communication.
Denial of Service (DoS) and Distributed Denial of Service (DDoS
Disrupts businesses by limiting the function of a network application or exhausting a computing resource until it becomes unavailable.
Botnet
is a network of compromised devices that an attacker
controls without the knowledge of their owners.
Which one of the CIA pillars does a DoS or DDoS attack affect
Availability
What is authentication?
the act of something or someone proving its identity to
something else.