90 STUDY GUIDE Flashcards
(47 cards)
7111.01 IT Infrastructure
7111.02 IT Architecture
7111.03 Operating systems (OS)
7111.03 Operating systems (OS)
7111.04 Servers
7111.05 Network infrastructure
Network infrastructure
Purpose:
Connectivity: Establishes connections between various devices and servers for communication and data sharing.
Data transmission: Facilitates the smooth and swift data transmission between connected entities.
Security and control: Network infrastructure incorporates security measures to control access and protect data during transmission.
Examples:
>Switches
>Routers
>Firewalls
>Wireless access points (WAP)
7111.06 End-user devices
End-user devices
Purpose:
* Access to resources: End-user devices are the primary means for individuals to access organizational resources and applications.
* Productivity: These devices enable users to perform various tasks, including document creation, communication, and data analysis.
* Mobility: Allows users to access organizational resources remotely, promoting flexibility and mobility.
Examples:
Personal computers (PCs)
Laptops
Tablets
Smartphones
7111.07 Additional components
Middleware
Storage systems
Virtualization platforms
7111.08
Cloud Computing
Cloud computing is a popular term referring to a concept of computing where processing and storage are performed elsewhere over a network connection rather than locally. Cloud computing is often thought of as internet‐based computing or remote virtualization.
Some of the concepts in cloud computing are listed here:
Platform as a service (PaaS) is a cloud solution that provides all the aspects of a platform (the operating system and complete solution package). The cloud provider might provide virtual desktops so the organization can deploy their applications.
Software as a service (SaaS) provides on‐demand online access to specific software applications or suites without the need for local installation. SaaS can be implemented as a subscription service (for example, Microsoft Office 365).
Infrastructure as a service (IaaS): Users can access the underlying cloud infrastructure resources, such as virtual machines and other abstracted hardware and operating systems. Users can self‐provision their infrastructure from a console to build adaptable and customizable computer systems.
Cloud deployment models:
- A private cloud is a cloud service isolated from the internet within a corporate network. The private cloud is for internal use only. A virtual private cloud is a service offered by a public cloud provider that provides an isolated subsection of a public or external cloud for exclusive use by an organization internally. In other words, an organization outsources its private cloud to an external provider.
- A public cloud is a cloud service that is accessible to the public, typically over an internet connection. Public cloud services may require some form of subscription or pay-per-use or may be offered for free. Although an organization’s or individual’s data is usually kept separated and isolated from other customers’ data in a public cloud, the overall purpose and use of the cloud is the same for all customers.
- A hybrid cloud is a mixture of private and public cloud components. For example, an organization could host a private cloud for exclusive internal use but distribute some resources onto a public cloud for the public, business partners, customers, the external sales force, and so on.
- A community cloud is a cloud environment maintained, used, and paid for by a group of users or organizations for their shared benefit, such as collaboration and data exchange. This may allow for some cost savings compared to accessing private-public clouds independently.
7111.08 Cloud Computing (screenshot)
7111.09 Advantages of cloud computing
Advantages of cloud computing
- Cost reduction: One of the biggest advantages of using cloud computing is the reduction in hardware as well as software maintenance costs, as the cloud service providers make these investments.
- Backup and restore data: It is easy to back up and recover data stored on the cloud.
- Anytime, anywhere accessibility: Information stored on the cloud can be accessed anytime, anywhere in the world, leading to improved productivity for the company.
- Easy to deploy: Applications can be easily deployed globally in multiple geographic locations and the system can function quickly.
- Pay as you go: Companies can pay for the services as per their usage.
- Unlimited storage capacity: As the cloud offers unlimited storage capacity, businesses can easily scale resources up or down to increase or reduce the capacity as per the needs of the business.
- Agility: The cloud offers a range of cutting-edge technologies, enabling businesses to experiment and test new ideas.
7111.10 Disadvantages of cloud computing
Disadvantages of cloud computing
Although cloud computing services are on the rise, the risk exposure is also on the rise.
- Lack of good internet connection: As cloud services depend on internet connectivity, a good internet connection is a must to use these services, lack of which can hamper work.
- Loss of control: The cloud infrastructure is owned and managed by cloud service providers; therefore, the user has no control over the execution of the services.
- Vendor lock-in: One of the biggest security risks in cloud computing is the movement of services from one vendor to another. Not all vendors provide the same platform, which can make the movement of services difficult.
7111.11
Cloud Governance
Cloud governance
Managing cloud services is a shared responsibility between an organization and the cloud service provider. Developing cloud‐specific standards may enable organizations to increase interoperability and optimize cloud adoption while managing their risk appetite and tolerances. Ensuring that IT is aligned with the business objectives, sensitive data is protected, and risk is managed is challenging in any environment and even more complex in a third‐party arrangement.
Organizational policies must be developed or modified to address the process of outsourcing, managing, and terminating the use of cloud services. Organizations should include fundamental governance activities such as goal setting, policy, defining roles and responsibilities, and managing risk into the organization’s policies and practices when conducting business with technology providers.
Once data leaves an organization, it will have little control over the data. Therefore, the organization should choose wisely where its sensitive or critical data goes, how information processing facilities are accessed, how data is processed, what happens to the data, and how data is shared with third parties.
7111.11 Cloud governance (screen shot)
7111.12
Cloud security controls
Cloud security controls:
- ensure the availability of systems and data.
- maintain the integrity and the confidentiality of sensitive data in transit and at rest.
- include the cloud in security policies.
- restrict personal use of cloud storage and services.
- ensure data storage complies with applicable laws and regulations.
Cloud Service Provider’s Services
7111.13
Infrastructure Management
~Hardware and Software Management
~Network Management
Infrastructure management
Hardware and software management
- Provisioning: Setting up necessary hardware and software resources to support cloud-based services
- Maintenance: Regularly updating hardware and software to maintain optimal performance and security
Network management
- Traffic management: Monitoring and managing data traffic to prevent congestion and ensure smooth service delivery
- Security: Installing and managing firewalls, intrusion prevention systems (IPS), and other network security measures
- Connectivity: Ensuring uninterrupted network connectivity through redundant paths and failover mechanisms
Cloud Service Provider’s Services
7111.13
Data Security
~Encryption
~Access Control
Data security
Encryption
- Data at rest: Encrypting data stored in the cloud to prevent unauthorized access
- Data in transit: Encrypting data during transmission between the cloud and client devices
Access control
- Authentication: Implementing robust authentication mechanisms such as multifactor authentication (MFA)
- Authorization: Setting up access controls to restrict user access to only necessary data and services
Cloud Service Provider’s Services
7111.13
Data Backup and Recovery
~Backup strategies
~Disaster Recovery Planning
Data backup and recovery
Backup strategies
- Scheduled backups: Conducting regular backups of data according to a predetermined schedule
- Geo-redundancy: Storing backup data in geographically separate locations to prevent data loss due to regional disasters
Disaster recovery planning
- Disaster recovery: Developing and implementing plans to restore services in case of catastrophic failures
Cloud Service Provider’s Services
7111.13
Compliance and Legal Obligations
~Regulatory Compliance
~Legal Documentation
Compliance and legal obligations
Regulatory compliance
- Data protection laws: Adhering to data protection regulations such as GDPR (General Data Protection Regulation) and HIPAA (Health Insurance Portability and Accountability Act of 1996)
Legal documentation
- Service-level agreements (SLAs): Clearly defining service levels, responsibilities, and customer rights in legal documents
- Privacy policies: Outlining how customer data is handled, used, and protected
Cloud Service Provider’s Services
7111.13
Resource Scalability
~Resource Allocation
~Cost-effectiveness
Resource scalability
Resource allocation
- Dynamic scaling: Offering the ability to scale resources up or down based on demand quickly
- Resource monitoring: Providing tools for monitoring resource usage and performance
Cost-effectiveness
- Pay-as-you-go pricing: Offering flexible pricing models where customers pay only for the resources they use
- Cost optimization tools: Providing tools to help customers manage and optimize their cloud spending
Cloud Service Provider’s Services
7111.13
Maintenance and support
~Support Services
~Knowledge Sharing
Maintenance and support
Support services
- Customer support: Offering customer support through various phone, email, or live chat channels
- Technical support: Providing technical support to help customers resolve issues related to the use of cloud services
Knowledge sharing
- Documentation: Developing comprehensive documentation to help users understand and use the services effectively
- Training and workshops: Conducting training sessions and workshops to educate customers about best practices and new features
Cloud Service Provider’s Services
7111.13
Service Availability and Reliability
~Uptime Guarantee
~Performance Monitoring
Service availability and reliability
Uptime guarantee
- High availability: Implementing systems and infrastructure to ensure high service availability
- Redundancy: Building redundancy into the system to prevent service interruptions due to failures
Performance monitoring
- Service monitoring: Continuously monitoring service performance to identify and address issues promptly
- Performance optimization: Implementing measures to enhance the performance and responsiveness of cloud services
7111.13
Cloud service providers (CSPs) offer a range of computing services and solutions; their roles and responsibilities typically encompass the following aspects:
Cost management and billing
~ Transparent billing:
- Detailed billing: Providing detailed billing statements to help customers understand their charges
- Billing support: Offering support to assist customers with billing-related inquiries and disputes
7111.14
COSO Internal Control Framework:
CONTROL ENVIRONMENT
The COSO Internal Control Framework (the Internal Control—Integrated Framework of the Committee of Sponsoring Organizations (COSO) of the Treadway Commission) can also be applied to cloud computing governance. The following shows how the different components of the COSO Internal Control Framework relate to cloud computing governance:
Control environment
- Ethical values and integrity: Ensures that the management and personnel involved in cloud computing adhere to ethical values and demonstrate integrity, especially when handling sensitive data in the cloud
- Board of directors’ oversight: The board oversees the strategy and policies related to cloud computing to ensure that they align with the organization’s objectives and risk appetite
- Organizational structure: Defines the roles and responsibilities concerning cloud computing governance, establishing clear lines of reporting and communication
- Human resource policies: Develops policies to ensure that personnel involved in cloud computing have the necessary skills and knowledge to manage risks effectively
7111.14
COSO Internal Control Framework:
RISK ASSESSMENT
Risk assessment
- Risk identification: Identifies the potential risks associated with the use of cloud computing services, including data breaches, service interruptions, and compliance risks
- Risk analysis: Analyzes the identified risks to determine their potential impact on the organization and to develop appropriate mitigation strategies
- Risk response: Develops strategies to respond to the identified risks, including implementing controls to prevent, detect, or correct issues