Cloud Security Flashcards
Used to validate the identity and to control access and permissions for cloud resources
IAM
Concerned with protections around storing and transferring data, which generally includes cryptography
data security
Involves protection of network traffic from the VM level all the way to the network permitter of the CSP
network security
Involves the protection of hypervisors, vms and operating systems
compute based security
provides protections for various types of app implementations and includes microservices, serverless and apis
app security
policy sets the standards for monitoring auditing and incident response
Security monitoring and policy
What are the components of IAM
identity, authentication, multi factor authentication, authorization, privileged identity management PIM, access management
What are the components of data security
data at rest
data in transit/motion
cryptography and key management
remote backups
data and media sanitization
What are the components of network security
VPC virtual private cloud
network perimeter (like load balancer)
virtual switches
virtual firewalls
network security groups
Components of compute based security
compute resources
hypervisors
virtual machines
operating system
middleware and runtime
inventory management
Components of app security
standard apps
microservices
containers
serverless
APIs