Security in Cloud Computing Flashcards
What is PaaS and what does it provide?
Platform as a Service (Paas):
Geared towards software development
Hardware and software hosted by provider
Provides ability to develop without having to worry about hardware or software
What is IaaS and what does it provide?
Infrastructure as a Service (IaaS):
Provides virtualized computing resources
Third party hosts the servers with hypervisor running the VMs as guests
Subscribers usually pay on a per-use basis
What is SaaS and what does it provide?
Software as a Service (SaaS):
Provider supples on-demand applications to subscribers
Offloads the need for patch management, compatability and version control
What tool would you use to conduct Multi-Cloud Environments auditing?
ScoutSuite
What tool would you use to conduct AWS Cloud Environment auditing?
Prowler
What tool would you use to conduct AWS exploitation?
Pacu
List 4 type of cloud deployment models.
- Public Cloud (Services on cloud open to public)
- Private Cloud (Single tenant cloud environment)
- Community Cloud (Cloud shared by number of organisations, but not open to public)
- Hybrid Cloud (Combination of multiple cloud deployment models)
What is a cloud carrier?
An intermediary that provides connectivity and transport of cloud services from Cloud Providers to Cloud Consumers
What is a cloud broker?
Manages use, performance and delivery of services as well as relationships between providers and subscribers
What is FedRAMP?
Cyber security risk management program regarding cloud services
What is meant by a Trusted Computing Model?
To resolve and harden computer security risks via hardware enhancements
What is the biggest threat faced in Cloud Computing?
Data Breach or Loss - Malicious theft, erasure or modification
What is meant by the term “Shadow IT”?
System or solutions that is developed but haven’t been through proper approval
Which 2 cloud service models does “Abuse of Cloud Resources” usually applies to?
- IaaS
- PaaS
In Cloud Computing, what is the biggest issue faced with APIs?
Insecurity of Interfaces and APIs