Week 9: Securing the Cloud - Data Flashcards

1
Q

Requirements for data security vary depending on the __, the ___, as well as on your tolerance for __

A

service model, deployment model, risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Entrusting data to an external custodian may result in better and more cost effective___

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Two examples that emphasize the importance of entrusting data to an external provider are the commercial offerings to

A
  • store highly sensitive data for disaster recovery
  • assure the destruction of magnetic media

In both cases, many highly concerned organizations tightly control how they use these services
- However, they often end up using external services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Some data may be so sensitive that the consequence of data exposure is too great for a customer to consider a public cloud
- It is not the case that security needs for such data can’t be met in a public cloud, rather the ___is incompatible with its ___

A

cost

cost model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

We might also expect that future higher-assurance clouds would reduce risk by limiting access by ___

A

selective screening of customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When data is stored with a CSP, the CSP assumes at least partial responsibility (____) if not full responsibility (____) in the role of data custodian

A

PaaS

SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

By the nature of the service offerings, a data owning organization can benefit from their CSP having control and responsibility for___ in the ___model

A

customer data

SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The data owning organization is progressively responsible beginning with ___and expanding with ___

A

PaaS laaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data at rest refers to any data in ___

A

computer storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Protecting___ in a cloud is not radically different than protecting it outside a cloud, except for the partial lack of owner’s control

A

data at rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A data owning organization has several opportunities in proactively ensuring data assurance by a CSP

A
  • Selecting a CSP should be based on verifiable attestation that the CSP follows industry best practices and implements security that is appropriate for the kinds of data they are entrusted with
  • Higher assurance cloud services may come with indemnification (compensation for loss) as a means of monetary backing of assurance for a declared level of security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

___ refers to data as it is moved from a stored state – a file or database entry – to another form in the same or a different location

A

Data in motion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Because data in motion only exists as it is in transition between points, securing this data focuses on __ and __

A

integrity

confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

There is no better protection strategy for data in motion than ___

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Phishing

A

Tricking end users into providing their credentials for access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Some cloud providers have implemented safeguards to help address cloud-targeted phishing attacks

A

Salesforce.com Login Filtering
- A subscriber can instruct Salesforce not to accept logins, even if valid credentials are provided, unless the login is coming from a whitelisted IP address range

Google Apps & other Google services
- These services may randomly prompt users for their passwords, especially in response to suspicious events
- A login from China shortly after a login from the US
for the same account

Amazon Web Services Authentication
- When a subscriber uses EC2 to provision a cloud hosted virtual server, Amazon creates PKI keys and requires them to be used for authentication
- If you provision a new LINUX VM and want to SSH
to it, you have to use SSH with key-based
authentication and not a static password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Phishing is a threat largely because most cloud services currently rely on __

A

simple username/password authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Some issues related to protection from phishing attacks

A

Referring URL Monitoring: Does the CSP actively monitor the referring URLs for authenticated sessions?

Behavioral Policies: Does the CSP employ policies that prohibit weak security activities that could be exploited?
- E-mails with links that users can click to automatically
access data
- Password resets to occur without actively proving
user identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Outsourced services – be they cloud-based or not – can bypass the typical ___controls enforced by IT organizations

A

physical and logical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CSP Privileged Access risk is a function of two primary factors

A

The potential for exposure with unencrypted data

Privileged cloud provider personnel access to both data and keying materials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The ___of data can be a primary concern in cloud computing

A

origin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

For compliance purposes, it may be necessary to have exact records as to

A

what data was placed in a public cloud
when it occurred
what VMs and storage it resided on
where it was processed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Reporting on data lineage may be difficult with a public cloud
This is largely due to the___

A

degree of abstraction that exists between physical and virtualized resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

According to Bruce Schneier, the practice of encrypting data at rest deviates from the historical use of cryptography for ___

A

protecting data in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

For data in motion, encryption keys can be ___, whereas for data at rest, keys must be ___

A

ephemeral

retained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

“Much of the data stored on the Internet is … primarily intended for use by other computers. And therein lies the problem. Keys can no longer be stored in people’s brains. They need to be stored on ___, that the data resides on. And that is much riskier”

A

the same computer, or at least the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

___has been recognized as a critical enabling technology for security in cloud computing

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Cryptography has expanded from protecting ___to techniques for assuring ___, ___, and ___

A

confidentiality
integrity
authentication
digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

To ensure ___, plaintext is converted into ___using mathematical functions meeting several requirements

A

confidentiality

cyphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Cryptographic Requirements

A

The algorithm and implementation must be computationally efficient

The algorithm must be open to analysis by the cryptography community

The resulting output must withstand the use of brute force attacks even by vast numbers of computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Plaintext is encrypted into cyphertext using an___ and the resulting cyphertext is ___using a decryption key

A

encryption key

decrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

In ___cryptography, encryption / decryption keys are the same

A

symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

It is also very difficult to establish a ___ between communicating parties when a secure channel does not already exist for them to securely exchange a ___

A

secret key

shared secret key

34
Q

In ___cryptography (aka ___), the two keys (public and private key) are different but mathematically related

A

asymmetric

public-private key cryptography

35
Q

The primary advantage of asymmetric cryptography is that only the ___ must be kept secret

A

private key

36
Q

Although public-private key pairs are related, it is infeasible to derive a ___from the corresponding___

A

private key

public key

37
Q

Block Ciphers

A

take as input a key along with a block of plaintext and output a block of cyphertext

38
Q

Stream Ciphers

A

operate against an arbitrarily long stream of input data, which is converted to an equivalent output stream of cyphertext

39
Q

Cryptographic Hash Functions

A

take an arbitrarily long input message and output a short, fixed length hash
- A hash can serve various purposes, such as verifying the integrity of a message

40
Q

Uses of cryptography

A

block cipher, stream cipher, cryptographic hash, authentication

41
Q

Common Errors with Data Encryption

A

Failing to use cryptographically secured protocols when they are available

Developing your own cryptographic algorithms

Implement an existing cryptographic algorithm instead of using a proven implementation

Storing keys with data

Not planning how to recover keys if the individuals / entities keeping them suffer a disaster

42
Q

Using traditional ___approaches in a cloud environment is problematic when the enterprise uses multiple CSPs

A

identity management

Synchronizing identity information with the enterprise is not scalable

43
Q

___is an effective foundation for identity management in cloud computing

A

federated identity management (FIM or FIdM)

44
Q

Federated identity uses a ___ model

A

claim-based token

45
Q

Discretionary Access Control (DAC)

A

Access privileges are determined by the owner of the object who decides who will have access and what privileges they will have

46
Q

Nondiscretionary Access Control

A

Mandatory Access Control (MAC)
- Rely upon the use of classification labels for both subjects and objects

Role Based Access Control (RBAC)
- Access privileges are determined based on the role of the user

Task Based Access Control (TBAC)
- Access privileges are determined based on the tasks assigned to a user

47
Q

The objective of ___ is to enable an information-centric framework for data handling

A

information identification and categorization

48
Q

Data at different sensitivity levels require different ___

A

protection strategies

49
Q

Tools to protect categorized data include

A

Encryption

Procedures for ensuring security across phases of the data life cycle

Mechanisms to detect unauthorized access to valuable data

50
Q

___and ___ are examples of OSs supporting data categorization and DoD-style mandatory access controls

A

SELinux

Trusted Solaris

51
Q

There are many consequences when all data is uniformly treated as being equal in sensitivity or value

A

Without any data sensitivity oriented controls, a relatively small percentage of sensitive data is mixed in with far more non-sensitive data and is accessible to anyone with overall access

Failing to identify sensitive data complicates incident resolution and can be problematic when compromised data includes data subject to regulatory compliance

52
Q

A second problem with sensitive information is a common inclination to __

A

classify or label everything as sensitive

Over-classification can lead to a reduction in care in handling actually sensitive data and to increased costs

53
Q

There are multiple ways of encrypting data at rest

A

Full Disk
Directory Level (or Filesystem):
File Level
Application Level

54
Q

Full Disk Encryption

A

The entire content of the disk is encrypted (OS, apps, data)
This entails performance and reliability concerns
Even a minor disk corruption can be fatal

55
Q

Directory Level (or Filesystem) Encryption

A

Entire directories are encrypted
This approach can also be used to segregate data of identical sensitivity into directories that are individually encrypted with different keys

56
Q

File Level Encryption

A

Individual files can be independently encrypted

57
Q

Application Level Encryption

A

The application manages encryption and decryption of application-managed data

58
Q

The two goals of securing data in motion are

A

Integrity: preventing data from being tampered with
Confidentiality: ensuring that data remains confidential

59
Q

The most common way to protect data in motion is to utilize ___ to create channel in which safely pass data to or from the cloud

A

encryption combined with authentication

60
Q

___are typical protocols used for secure data transfer

A

HTTPS, TLS, SSL

61
Q

___ public cloud might not allow subscribers to encrypt their data

A

A Software-as-a-Service

This may be due to functional limitations with the actual service itself
Many SaaS providers might not be able to provide revenue generating services if they have to maintain strict data isolation among users

62
Q

The U.S. Department of Defense has an excellent and well accepted definition illustrating the two key aspects of data deletion

A

Clearing

Sanitization

63
Q

Clearing (Deletion of Data)

A

Clearing is the process of eradicating the data on media before reusing the media in an environment that provides an acceptable level of protection for the data that was on the media before clearing. All internal memory, buffer, or other reusable memory shall be cleared to effectively deny access to previously stored information

64
Q

Sanitization (Deletion of Data)

A

Sanitization is the process of removing the data from media before reusing the media in an environment that does not provide an acceptable level of protection for the data that was in the media before sanitizing. IS resources shall be sanitized before they are released from classified information controls or released for use at a lower classification level

65
Q

Often, data stored in public clouds is not ___to DoD levels

A

sanitized

66
Q

Under various circumstances, deleted data can be restored

A

Computer data is stored in magnetic form or as electrical charges
- Very advanced techniques enable to identify magnetic or electrical charge remnants and recreate the data they still represent

Even more simply, when a file is deleted, the blocks that comprised it are released to the file system for reuse

Deleted data can also be accessed well after simply because it also exists in archives or data backup volumes

67
Q

Data masking

A

(aka data obfuscation, depersonalization) preserves data privacy by removing all identifiable and distinguishing attributes, in order to render the data anonymous, although still useful

68
Q

A common data masking technique involves replacing actual data values (e.g., person names) with ___to an ___

A

keys

external lookup table holding the actual values

69
Q

Data masking must be performed carefully, or the resulting masked data can still ___

A

reveal sensitive data

70
Q

Storage-as-a-Service

A

In the cloud storage model, data is stored on multiple virtualized servers

Physically, the resources will span multiple servers and can even span multiple storage sites

71
Q

Among the additional benefits of such generally low-cost services are the ___performed by the CSP

A

storage maintenance tasks

Backup, replication, and disaster recovery

72
Q

Replication of data is performed at a low level by such mechanisms as ___ or by a ___

A

RAID
file system
- One such file system is ZFS, which was designed by Sun Microsystems as both a file system and a volume manager

73
Q

One of the more recent trends in online cloud-based storage is the ___

A

cloud storage gateway

74
Q

cloud storage gateway

A

Translation of client-used APIs and protocols to those that are used by cloud-based storage services
- The goal is to enable integration with existing applications

Backup and recovery capabilities that work with in-cloud storage

Onsite encryption of data that keeps keys local to the onsite appliance

75
Q

What might happen when an external public cloud becomes business-critical for an organization?

A

It may be extremely difficult to switch to another provider (lock-in)

76
Q

Metadata

A

Metadata is data about data, including things as to where the data came from, who performed what operations against it, and when changes were made

Cloud metadata may include other very valuable information

What happens to the metadata if the subscriber decides to discontinue use of the service?

77
Q

Fortunately, many of the large public cloud providers currently provide the ability to export not only ___ but also ___generated by its subscribers

A

data
metadata

The presence of an export feature is not sufficient

78
Q

Cloud Data Export Feature

A

If the data is exported in a proprietary file format, then that format might not be able to be intelligibly parsed

If it is exported in a plaintext format or in a standard format such as XML, it can be easily imported into the new system

79
Q

Google has gone so far as creating what they call the

A

Data Liberation Front

An example of this can be seen in Google Docs (now Google Drive)

Google Takeout is an interface to export data from different products

80
Q

Data Liberation – Digital Afterlife

A

Not many of us like thinking about death — especially our own. But making plans for what happens after you’re gone is really important for the people you leave behind. So today, we’re launching a new feature that makes it easy to tell Google what you want done with your digital assets when you die or can no longer use your account.”