Security Architecture Flashcards
Responsibility Matrix
The division of responsibilities between the cloud service provider and the customer
Third Party Vendors
Provides specialized services that enhance the cloud solution
On-Premise Solutions
A computing infrastructure that is physically located on-site
Cloud Resilience
The cloud provider’s ability to recover from failure
Virtualization
Technology that allows for emulation of servers
Containerization
Lightweight alternative to full machine virtualization
Hypervisor Type 1
Bare metal runs directly on the host’s hardware and functions like an OS; Microsoft’s Hyper-V
Hypervisor Type 2
Operates within a standard OS
Live Migration of Virtual Machines
When a VM needs to move from one host to another
Serverless Computing
Where the responsibility of managing servers, databases, applications, and logic is shifted away from the developers
Microservices
Where large applications are broken down into smaller, independent services
Physical Separation/Air Gapping
Isolation of a network by removing direct or indirect connections from other networks
Logical Separation
Creating boundaries within a network; Firewall
Software-Defined Networks
Enable efficient network configuration to improve performance and monitoring
Software Defined Network Plane Types
Data Plane, Control Plane, and Application Plane
Data Plane
The forwarding plane that is responsible for handling packets and making decisions based on protocols
Control Plane
The brain of the network that designs where the traffic is sent; Centralized Plane
Application Plane
App goes here
Infrastructure as Code (IAC)
Method in which IT infrastructure is defined and code files; YAML is an example
Snowflake system
A conflict that lacks consistency that might introduce risk
Idempotence
The ability of an operation to produce the same result as many times executed
Centralized Architecture
All the computing functions are coordinated and managed from a single authority
Decentralized Architecture
Computer functions are distributed across multiple systems or locations
Centralized Architecture Risks
Single-point failure, scalability, and security