Sec+ Chapter 10: Cloud and Virtualization Security Flashcards
Cloud computing
A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction
Key benefits provided by the cloud
Can you explain each one?
1) On-demand self-service computing
2) Scalability: vertical and horizontal scaling
3) Elasticity
4) Measured service
5) Agility and flexibility
5 key roles in the cloud
Can you explain each one?
1) Cloud service providers
2) Cloud consumers
3) Cloud partners
4) Cloud auditors
5) Cloud carriers
IaaS
Infrastructure as a service, AKA hardware as a service
This is essentially providing you with the hardware required to get your services up and running
CSP gives you a system with storage, CPU, and networking
You’re responsible for app and OS running on the infrastructure as well as data security
You could encrypt your data and the CSP wouldn’t be able to look at your private data
EX: Web service provider that gives you a server, but nothing else
SaaS
Software as a service
Fully managed apps running in the cloud, you don’t need to load an OS, configure or write software, update or patch system, etc
You just log in and use the service they provide
CSP manages both apps and data
EX: Payroll or email services like Gmail or Classy
PaaS
Platform as a service
CSP gives you a platform for you to develop your own apps
They provide the OS, infrastructure underneath, virtualizations services, and the building blocks to write your own apps customized just for you
They have access to your apps, data, and anything else that makes up the app
Think of it as a CSP giving you the building blocks to create a modular app instead of you writing them from scratch
If you need a login or inventory screen, it’s all ready for you to use
EX: Salesforce
FaaS
Function as a service
An example of PaaS computing
Take the OS out of the equation and instead perform individual tasks based on the functions requested by the app
The app dev takes each function of the app and deploys it into a stateless compute container, which are processors that respond to API requests
Our app sends API request to the compute container, and the results are sent back to the client
We can have compute containers that are only available as we need them
EX: As people do inventory management we can have inventory computer containers that are being built and torn down as people access those services
If nobody is using those features, you don’t need to keep a server running and maintained for something not in use
If a user does need to perform a function, you can spin up an individual computer container, perform the req, and disable the compute container—it’s ephemeral
These containers may run for a single event and when it’s done they disappear
Common to have this running at a third party, who would be in charge of the security of data and apps used
MSP
Managed service provider
Organizations that provide IT services to customers
May handle IT completely, or focused services like network design, network connectivity management, backup and disaster recovery, app monitoring, cloud cost management, growth management and planning, etc
MSSP
Managed security service provider
A niche of MSP
MSPs who offer security services like general monitoring, vulnerability management, incident response, patch management, emergency response, and firewall management
Cloud deployment models
Can you explain them?
1) Public cloud: available to everyone on the internet
2) Private cloud: your own virtualized local data center
3) Community cloud: several orgs share the same resources
4) Hybrid cloud: a mix where you determine what parts of your app are public and private
Public cloud bursting
Using private cloud as primary, but leveraging public cloud capacity when demand exceeds private cloud infrastructure capacity
Shared responsibility model
Where cloud customers divide responsibilities between one or more service providers and the customers’ own cybersecurity teams
Always document the division of responsibilities very clearly
CSA
Cloud security alliance
Org focused on developing and promoting best practices in cloud security
CCM
Cloud controls matrix
Developed by CSA, serves as a ref doc to help orgs understand the appropriate use of cloud security controls and map those controls to regulatory standards
Hypervisor
A type of computer software, firmware, or hardware that creates and runs virtual machines
Enforces isolation between VMs, VMs and hosts, etc
Virtualization
A technology that allows the hardware resources of a single computer to be divided into multiple VMs
Bare metal hypervisor
Type 1 hypervisor
Operates directly on top of underlying hardware and supports guest OS for each VM.
Most common in datacenter virtualization because it’s highly efficient
Type 2 hypervisor
Runs as an app on top of an existing OS
OS supports the hypervisor and hypervisor requests resources for each guest OS from the host
Less efficient than type 1
Containerization
Provides application-level virtualization
Instead of creating complex VMs that require their own OS, containers package apps and allow them to be treated as units of virtualization that become portable across OS and hardware platforms