Security Architiciture Flashcards
Define Security Architicture
Design, structure, and behaviour of an organization’s information security environment
On-Premises vs. Cloud Deployment
On-Premises
Traditional local infrastructure setup
Cloud
Delivery of computing services over the internet
Cloud Security Considerations
Shared Physical Server Vulnerabilities
Inadequate Virtual Environment Security
User Access Management
Lack of Up-to-date Security Measures
Single Point of Failure
Weak Authentication and Encryption Practices
Unclear Policies and Data Remnants
Virtualization and Containerization
Containerization benefits and risks
Vulnerabilities like vm escape and resource reuse
Serverless Computing
Cloud provider manages server allocation
Developers focus solely on writing code
Microservices Architecture
Collection of small, autonomous services
Each performs a specific business process
Software-Defined Network (SDN)
Dynamic, programmatically efficient network
configuration
Improves network performance and monitoring
Infrastructure as Code (IaC)
Automation of managing and provisioning technology
stack
Software-driven setup instead of manual configuration
Centralized vs. Decentralized Architectures
Benefits and risks of centralized and decentralized setups
Internet of Things (IoT)
Network of physical devices with sensors and
connectivity
Enables data exchange among connected objects
Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) purpose
ICS
For industrial production
SCADA
Subset of ICS
Embedded Systems
Dedicated computer system designed for specific
functions
Part of a complete device system with hardware
components
Cloud Computing and its advantages
Delivery of computing services over the internet, including servers, storage, databases, networking, software, analytics, and intelligence
Advantages
Faster innovation
Flexible resources
Economies of scale
Responsibility Matrix
Outlines the division of responsibilities between the cloud service provider and the customer
Third-Party Vendors
Provides specialized services to enhance functionality, security, and efficiency of cloud solutions
Hybrid Solutions and considerations
Combined on-premises, private cloud, and public cloud services, allowing workload flexibility
Considerations
Sensitive data is protected
Regulatory requirements are met
Systems can communicate with each other
The solution is cost-effectiveness
On-Premise Solutions
Computing infrastructure physically located on-site at a business
9 Key Considerations in Cloud Computing
1: Availability
System’s ability to be accessed when needed
2: Resilience
System’s ability to recover from failures
3: Cost
Consider both upfront and long-term costs
4: Responsiveness
Speed at which the system can adapt to demand
5: Scalability
System’s ability to handle increased workloads
6: Ease of Deployment
Cloud services are easier to set up than on-premises
solutions
7: Risk Transference
Some risks are transferred to the provider, but
customers are responsible for security
8: Ease of Recovery
Cloud services offer easy data recovery and backup
solutions
9: Patch Availability
Providers release patches for vulnerabilities
automatically
Cloud power
Cloud provider manages infrastructure, including power supply
Reduces customer costs and eliminates power management concerns
Compute refers to
Refers to computational resources, including CPUs,
memory, and storage
Cloud providers offer various compute options to suit
different needs
Remember re cloud computing, on-premises solutions and hybrid solutions.
Cloud computing offers flexibility, scalability, and cost-
effectiveness
On-premises solutions provide control and security but
can be expensive and challenging to maintain
Hybrid solutions offer flexibility and control but require
considerations of security, compliance, interoperability,
and cost
Cloud security - Shared Physical Server Vulnerabilities and its mitigations
In cloud environments, multiple users share the same physical server
Compromised data from one user can potentially impact others on the same server
Mitigation
Implement strong isolation mechanisms (e.g.,
hypervisor protection, secure multi-tenancy)
Perform regular vulnerability scanning, and patch
security gaps
Cloud security - Inadequate Virtual Environment Security and its mitigation
Virtualization is essential in cloud computing
Inadequate security in the virtual environment can lead to unauthorized access and data breaches
Mitigation
Use secure VM templates
Regularly update and patch VMs
Monitor for unusual activities
Employ network segmentation to isolate VMs
Cloud security - User Access Management
Weak user access management can result in unauthorized access to sensitive data and systems
Mitigation
Enforce strong password policies
Implement multi-factor authentication
Limit user permissions (Principle of Least Privilege)
Monitor user activities for suspicious behavior
Cloud security - Lack of Up-to-date Security Measures
Cloud environments are dynamic and require up-to-date security measures
Failure to update can leave systems vulnerable to new threats
Mitigation
Regularly update and patch software and systems
Review and update security policies
Stay informed about the latest threats and best
practices
Cloud Security - Single Point of Failure
Cloud services relying on specific resources or processes can lead to system-wide outages if they fail
Mitigation
Implement redundancy and failover procedures
Use multiple servers, data centers, or cloud providers
Regularly test failover procedures
Cloud Security - Weak Authentication and Encryption Practices and mitigation
Weak authentication and encryption can expose cloud systems and data
Mitigation
Use multi-factor authentication
Strong encryption algorithms
Secure key management practices
Cloud security- unclear policies and mitigation
Unclear security policies can lead to confusion and inconsistencies in implementing security measures
Mitigation
Develop clear, comprehensive security policies covering
data handling, access control, incident response, and
more
Regularly review and update policies and provide
effective communication and training