Section 15.140 Infrastructure as Code (IaC) Flashcards

Objective 3.1 Compare and contrast security implications of different architecture models. Objectives 4.1 Given a scenario, apply common security techniques to computing resources

1
Q

Infrastructure as Code (IaC)

A

Modern approach to IT infrastructure management that automates provisioning and management through code

■ Used in DevOps and with cloud computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Idempotence

A

○ Operation consistently produces the same results

○ Crucial for consistency and reliability in multiple environments

Idempotence ensures identical environments. It is the abiity to produce the same results as many times as it is executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IaC Method

A

Developers and ops teams manage infrastructure through code

A method in which IT infrastructures are defined in code files that can be versioned, tested and audited

■ High-level languages like YAML, JSON, or domain-specific languages (e.g., HCL)
used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Snowflake Systems

A

The main goal of IAC is to remove snowflake systems

Snowflake sysmtes: A configuration that lacks consistency that might introuduce risks, so it has to be eliminated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Benefits of IaC

A

■ Speed and Efficiency (of development and deployment processes)

■ Consistency and Standardisation (environments set up same way)

■ Scalability (Operations)

■ Cost Savings (Manual configuration is not good)

■ Auditability and Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IaC Challanges

Learning Curve

A

● New skills and mindset required

● Teams learn to write, test, and maintain infrastructure code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IaC Challanges

Complexity

A

● Infrastructure code can become complex

● Mitigated with modularisation and documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IaC Challanges

Security Risks

A

● Sensitive data exposure in code files

● Insecure configurations may be introduced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly