Security III Flashcards

1
Q

Security in the cloud is a partnership (T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security of your data on-premises and cloud components you control is your responsibility (T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are Microsoft’s trusted cloud principles?

A

Security using state-of-the-art tech, processes and encryption
Privacy by design with a commitment to use customer information only for services (not advertisements)
Compliance with standards and certifications in the industry
Transparency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SaaS Responsibilities

A

Microsoft: Operates and secures the infrastructure, host OS, and application layers
You: Control access and secure your data and identities, including configuring application controls available in the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

PaaS Responsibilities

A

Microsoft: Operates and secures the infrastructure, host OS
You: Control access and security, application code and configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IaaS Responsibilities

A

Microsoft: Operates and secures base infrastructure and host OS layers
You: Control access and security including any infrastructure controls available from the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Private Cloud Responsibilities

A

Owned, operated, and secured by you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Enterprise organizations do not benefit from taking a methodical approach to cloud security (T/F)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Key to success involves investing in core capabilities within the organization that lead to secure environments (T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Microsoft recommends developing policies that minimize creation of inconsistencies and vulnerabilities that attackers can exploit (T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does ensuring governance and security policies are up to date and implemented across the organization include?

A

Identity policies
Data policies
Compliance policies and documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Consistent access control policies are not a dependency for cloud security (T/F)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Identity services provide the foundation of security systems and need to be secured at or above the level of cloud services (T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Threats to your organization should be evaluated and put into context by leveraging resources like threat intelligence and ISACs (T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are ISACs?

A

Information Sharing and Analysis Centers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You should classify your sensitive data and ensure it is protected and monitored with appropriate access control policies whenever stored or in transit (T/F)

A

True

17
Q

Microsoft makes it easier to achieve compliance by providing customers with compliant, independently verified cloud services (T/F)

A

True

18
Q

What is GDPR?

A

General Data Protection Regulation (EU-centric).
Can be applied anywhere and deals with how end user data is stored, handled and processed. It came into effect May 25th 2018.

19
Q

What does Microsoft’s SDL include?

A
Risk assessments
Attack surface analysis/reduction
Threat modelling
Incident response
Release review and certification
20
Q

What is OSA?

A

Operational Security for Online Services: a framework that focuses on infrastructure issues to help ensure secure operations throughout the lifecycle of cloud-based services.