Security Flashcards
Strategies to reduce risk of data confidentiality
Provider ensured data fully destroyed
Multiple encryption keys
Logical isolation of multiple customers
Federated identity management
Arrangement between two or more trust domains
Use same digital idenity
Security risks of user identity federation
Less control over use lifecycle
Single point of failure
____ Identity Server can act as a hub that connects multiple identity providers to authenticate users to a particular service provider
WSO2
The Google ____ 2.0 system supports server-to-server interactions such
as those between a web application and a Google service
0Auth
Difference between WSO2 and 0Auth
0Auth supports server to server interactions
WSO2 acts as a hub, “more frontend”
RACI stands for
Responsible Accountable Consulted Informed Model
Bussiness COntinuty
Activity performed to ensure bussiness continues in case of disaster
What is it important contracts define froma bussienss continuity and resilience perspective
Recovery time
Objects
Monetary Penalty if downtime
BS 259999
Now ISO 22301
International Standard for implementing and maintaining effective business continuity plans
Usage of data consideration
- Personal died used without consent
- Data sent across borders
- No opt out features
- Lack of individual control
- Local law
What can be done to data to make it be used for more general purposes?
De-identification
Risks of multi-tenancy if managed uncorrectly
- Inadequate local seperation
- Co-mingled tenant data
- Uncoordinated change controls
- Performance risks
Visually descriobe a multi-tenant application
Ref img
Multi-tennacy - keys
Per Tenant Key management
What is important to manage risk
Third Party Assessments
In the event of a security incident, applications and services hosted at a Cloud provider are
difficul to investgate
distributed logging
Infrastructure Security Architecture- Cloud
Tiered zones
Only allow required access in each zone
Examples of third party audit lifecycle
Vulnerability identification
Results Analysis
Risk Assessment
Redmediation
Improving security of network and apps is referred to as
Hardening
Are non-prod enviroments immune to exposure?
No - even more at risk due to
generic authentication crdes
security flaws
then PIVOTING into production