SECURITY Architecture 3.1 Flashcards
Who is responsible for the security of a cloud based service?
Responsibility matrix will determine who between the customer and the provider are responsible the security for each aspects of the cloud
What are hybrid cloud consideration
- There is more than one Public or private cloud. Adds additional complexity.
-Network protection mismatches (Authentication across platforms, firewall configuration)
-Different security monitoring between different clouds
-Data leakage - Data is shared across the public internet.
Third-Party Vendors in the cloud
The use of third party security software such as firewalls to protect cloud based appliances should be considered. There should be on going vendor risk assessment and consider incident response.
Infrastructure as code
Describe a portion of the infrastructure as code. Allows you easily built out and modify the infrastructure as needed.
Server less Architecture
Faas - Function as a service
Instead of accesses a application we access individual functions which are handled by that application.
Microservices and API’S
Application programming interfaces. Instead of having one single executable that handles everything you can break up individual services and run them as separate instances in the cloud.
Done for scale ability
Done for resilient
Security is more focused as it is tailored for each mircservice.
Network appliances - VLANs
Physical isolation - Network devices should be physically isolated to prevent an attcker being able to move from one to another. Two separate physical situations.
Network Appliances - Logical segmentation
Each device being separated by a physical switch becomes unscalable very quickly. Vlans are used to achieve logical segmentation.
SDN (Software Defined Networking)
?
What is premises data
Security technology is local and on premises. There is a cost associated with managing and securing these data centres.
On-Premises Security considerations
Full control when everything is in house
On-site IT team which can manage security (can be expensive and difficult to staff)
Local team maintains uptime and availability.
Security changes can take time.
Centralised vs Decentralised.
Most organisations are physically decentralised. Difficult to manage and protect so many diverse systems.
Difficult to manage but made easier with a centralised approach which correlated alerts, log files and analysis.
A centralised system creates one point of failure and has performance issues.
Virtualisation
A technology used in organisations where separate virtual machines can run at the same time with their own operating system and applications.
Hypervisor is the software which manages the resources between the separate virtual machines.
Containerisation
Another way to have multiple applications running all on one piece of hardware. This is more efficient than Virtualisation because all applications share the same host operating system.
Virtualisation vs Containerisation
Infrastructure: both have physical device that everything runs on.
Hypervisor: The technology which runs on the infrastructure in a virtualised environment.
Host operating system: The
technology which runs on the infrastructure in a containerised environment.
Docker: The containerisation software which runs on top of the host operating system. - manages the different applications running on the host operating system.