Security in Cloud Computing Flashcards

1
Q

Infrastructure as a Service (IAAS)

A

Provides virtualized computing resources over the Internet. A third party provider hosts infrastructure components, applications and services on behalf of its subscribers with a hypervisor (VMware, Virtualbox, Xen or KVM) running the virtual machines as guests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Platform as a Service (PAAS)

A

Geared toward software development hosted in the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Software as a Service

A

A software distribution model providing on-demand applications to subscribers over the Internet. SAAS provides easier administration, automated patch management, compatibility and version control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cloud Deployment Models

A
  1. Public - over the Internet
  2. Private - private to a company
  3. Community - shared by several organizations
  4. Hybrid - composed of two or more deployment models
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NIST Cloud Computing Reference Architecture 500-292 - Major Cloud Roles

A
  1. Cloud Carrier - data transfer between subscriber and provider
  2. Cloud Consumer - uses cloud services
    3, Cloud Provider - purveyor of cloud services
  3. Cloud Broker - manages relationships between providers and subscribers
  4. Cloud Auditor - independent assessor of cloud services
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cloud regulatory

A

FEDRAMP: Government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.
PCI
FIPS
Cloud Security Alliance (CSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Trusted Computing Model

A

An attempt to resolve computer security problems through hardware enhancements and associated software modifications.
Trusted Computing Group - made up of hardware and software providers who cooperate to come up with specific plans
Roots of Trust (RoT) - set of functions with the Trusted Computing model that are always trusted by the Computer’s operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud Control Layers

A
  1. Applications: Web app firewalls, SDLC, binary analysis, application scanners
  2. Information: Database monitoring, encryption, data loss prevention, content management framework
  3. Management: Patch and configuration management, governance and compliance, virtual machine administration, identity and access management
  4. Network: Firewalls, network intrusion detection/prevention, quality of service, DNS, security
  5. Trusted Computing: Hardware and software roots of trust and APIs
  6. Compute and Storage: Host based intrusion detection, and firewalls, log management, file integrity efforts, encryption, etc
  7. Physical: physical security measures, video monitoring, guards, etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud Security Tools

A
CloudInspect - penetration testing
CloudPassage Halo
Dell Cloud Manager
Qualsys CLoud Suite
Trend Micros Instant-On Cloud Security
Panda Cloud Office Protection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cloud Attacks

A

Data Breach of Loss
Abuse of cloud resources - leveraging the cloud for crypto key cracking for example
Insecure Interfaces and APIs
Insufficient Due Diligence
Shared technology issues in multitenant environments not providing proper isolation
Unknown risk profiles - users don’t know what security providers are using in the background
Malicious Insiders
Inadequate Design
DDOS
Wrapping attack - SOAP message is intercepted and the data in the envelope is changed and then sent/replayed
Session Riding - CSFR under a different name
Side Channel attack - Cross-guest VM breach deals with virtualization itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Shadow IT

A

IT systems and solutions that are developed to handle an issue but aren’t necessarily taken through proper organizational approval chains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly