Security & Privacy Flashcards
What are the key security constructs in the cloud environment?
Information, Identity, and Infrastructure
what is the objective of information security?
The objective of information security is to protect information as well as information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Information security is required to protect confidentiality, integrity, and availability of the data
What type of issues does data governance address?
IP Protection, regulatory governance, industry compliance requirements, and data mobility
Why is it necessary to understand the security policies of an organization?
To create a security framework, it is necessary to base the security standards
on the org’s policies.
The policies are needed to identify sensitive information, control its transmission, storage, and use in the cloud , and sharing it among users and devices.
The policies must be consistently enforced across private and public clouds, and physical infrastructure.
Take traditional enterprise identity to control user access and entitlement - of on-premises information and application assets. Extend the principle to identities at cloud service providers, controlling what information employees can access in which clouds, from which devices, and in which locations.
What is NIST definition of cloud computing?
Cloud computing is a model for enabling ubiquitous, convenient, on‐demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.
This cloud model is composed of five essential characteristics, three service models, and four deployment models.
Three service-delivery models:
a) Infrastructure-as-a-service
b) Platform-as-a-service
c) Software-as-a-service
Four cloud deployment models:
a) Public cloud
b) Private cloud
c) community cloud
d) Hybrid cloud
What are key security issues in cloud computing?
Trust (conferred to providers), architecture, identity management, software isolation, data protection, availability
What are vulnerabilities in IaaS?
- Due to hypervisor and virtual infrastructures, such as leaks of sensitive data through the virtual machines (VMs) and lack of intrusion and detection systems in virtual networking infrastructure
- multi-tenancy (due to the cloud characteristic of resource sharing - main source of threats for data protection)
- compliance (no way for users to track data location)
- availability (due to DDoS attacks, permanent and temporary outages)
What are the three levels of cloud security?
Identity security
Information security
Infrastructure security
Define five major actors in the cloud (per NIST definition)
Cloud consumer – A person or organization that maintains a business relationship with and uses services offered by cloud providers.
Cloud provider – A person, organization, or entity responsible for offering various services to cloud consumers.
Cloud auditor – A party that can conduct independent assessments of cloud services, information system operations, performance, and security of cloud implementations.
Cloud broker – An entity that manages the use, performance, and delivery of cloud services, and negotiates relationships between cloud providers and cloud consumers.
Cloud carrier – The intermediary that provides connectivity and transport of cloud services from cloud providers to cloud consumers.
Define Identity security
Requires strong authentication and granular authorization.
for both users and infrastructure components
Covers E2E identity management, 3rd party authentication services, and federated identities to preserve integrity and confidentiality of data and apps
Define information security
SysAdmin, Audit, Network, Security (SANS) defines information security as processes and methodologies that are intended to protect sensitive information or data from unauthorized access, disclosure, modification, or use.
What are the security attributes associated with information security?
Information security encompasses security attributes such as the following:
Confidentiality – This attribute is concerned with protecting sensitive information from unauthorized disclosure.
Integrity – This attribute is concerned with the accuracy, completeness, and validity of information in regard to business requirements and expectations.
Availability – This attribute is concerned with information being operational and accessible whenever it is required by the business process, now as well as in the future. Further, the information must be inaccessible to unauthorized users.
Accountability – This attribute is concerned with responsibility. An organization is obligated to be answerable for its actions.
Nonrepudiation – This attribute is concerned with the ability to prevent users from denying responsibility for the actions they performed.
What is confidentiality?
Confidentiality refers to only authorized parties or systems having the ability to access protected data.
Define Data remanence
Data remanence is the residual representation of data that has been in some way nominally erased or removed.
Define Electronic authentication
Electronic authentication is the process of establishing confidence in user identities that are electronically presented to an information system. Lack of strong authentication can lead to unauthorized access to users account on a cloud, leading to a breach in privacy.