Section 15.134 Cloud Security Flashcards

Objective 3.1 Compare and contrast security implications of different architecture models. Objectives 4.1 Given a scenario, apply common security techniques to computing resources

1
Q

Cloud security threats 1

Shared Physical Server Vulnerabilities

A

In cloud environments, multiple users share the same physical server

● Compromised data from one user can potentially impact others on the
same server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Shared Physical Server Risk Mitigation

A

● Implement strong isolation mechanisms (e.g hypervisor protection, secure multi-tenancy)

● Perform regular vulnerability scanning, and patch security gaps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cloud security threats 2

Inadequate Virtual Environment Security

A

Virtualisation is essential in cloud computing

● Inadequate security in the virtual environment can lead to unauthorized access and data breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Inadequate Virtual Environment Security Mitigation

A

● Use secure VM templates
● Regularly update and patch VMs
● Monitor for unusual activities
● Employ network segmentation to isolate VMs

VM = Virtual Machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cloud security threats 3

User Access Management

A

Weak user access management can result in unauthorized access to sensitive data and systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

User Access Management Mitigation

A

● Enforce strong password policies

● Implement multi-factor authentication

● Limit user permissions (Principle of Least Privilege)

● Monitor user activities for suspicious behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cloud security threats 4

Lack of Up-to-date Security Measures

A

Cloud environments are dynamic and require up-to-date security measures

● Failure to update can leave systems vulnerable to new threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Lack of Up-to-date Security Measures Mitigation

A

● Regularly update and patch software and systems

● Review and update security policies

● Stay informed about the latest threats and best practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud security threats 5

Single Point of Failure

A

Cloud services relying on specific resources or processes can lead to system-wide outages if they fail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Single Point of Failure Mitigation

A

● Implement redundancy and failover procedures

● Use multiple servers, data centers, or cloud providers

● Regularly test failover procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cloud security threats 6

Weak Authentication and Encryption Practices

A

Weak authentication and encryption can expose cloud systems and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Weak Authentication and Encryption Practices Mitigation

A

● Use multi-factor authentication
● Strong encryption algorithms
● Secure key management practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cloud security threats 7

Unclear Policies

A

Unclear security policies can lead to confusion and inconsistencies in
implementing security measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Unclear Policies Mitigiation

A

● Develop clear, comprehensive security policies covering data handling, access control, incident response, and more

● Regularly review and update policies and provide effective communication and training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cloud security threats 8

Data Remnants

A

Residual data left behind after deletion or erasure processes

● In a cloud environment, data may not be completely removed, posing a
security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data Remnants Mitigation

A

● Implement secure data deletion procedures

● Use secure deletion methods

● Manage backups securely

● Verify data removal after deletion