Chapter 2 Domain 2: Cloud Data Security (Ben Malisow) Flashcards
In which of these options does the encryption engine reside within the application accessing the database?
A. Transparent encryption
B. Symmetric-key encryption
C. Application-level encryption
D. Homomorphic encryption
C. Application-level encryption
Explanation:
In application-level encryption, the application will encrypt data before it is placed in the database. In transparent encryption, the entire database is encrypted. Symmetric-key encryption is a kind of encryption and not truly indicative of a strategy used in database encryption. Homomorphic encryption is an experimental, theoretical process that might allow processing encrypted information without the need to decrypt it first.
You are the security team leader for an organization that has an infrastructure as a service (IaaS) production environment hosted by a cloud provider. You want to implement an event monitoring (security information and event management [SIEM]/security information management [SIM]/security event management [SEM]) solution in your production environment in order to acquire better data for security defenses and decisions. Which of the following is probably your most significant concern about implementing this solution in the cloud?
A. The solution should give you better analysis capability by automating a great deal of the associated tasks.
B. Dashboards produced by the tool are a flawless management benefit.
C. You will have to coordinate with the cloud provider to ensure that the tool is acceptable and functioning properly.
D. Senior management will be required to approve the acquisition and implementation of the tool.
C. You will have to coordinate with the cloud provider to ensure that the tool is acceptable and functioning properly.
Explanation:
Because the tool will require at least some installation and reporting capability within the cloud environment, it is essential to coordinate with the cloud provider to ensure that the solution you choose will function properly and is allowed by the provider. Option A is true, but not a major concern; that is a benefit of SIEM/SEM/SIM tools. Option B is not true because dashboards can often misconstrue pertinent reporting data when they are used to chase management goals instead of distilling raw data appropriately. Option D is not true because management should not be involved in such granular decisions.
Which of the following is not a step in the crypto-shredding process?
A. Encrypt data with a particular encryption engine.
B. Encrypt first resulting keys with another encryption engine.
C. Save backup of second resulting keys.
D. Destroy original second resulting keys.
C. Save backup of second resulting keys.
Explanation:
In crypto-shredding, the purpose is to make the data unrecoverable; saving a backup of the keys would attenuate that outcome because the keys would still exist for the purpose of recovering data. All other steps outline the crypto-shredding process.
Which of the following sanitization methods is feasible for use in the cloud?
A. Crypto-shredding
B. Degaussing
C. Physical destruction
D. Overwriting
A. Crypto-shredding
Explanation:
Cloud customers are allowed to encrypt their own data and manage their own keys; crypto-shredding is therefore possible. Degaussing is not likely in the cloud because it requires physical access to the storage devices and because most cloud providers are using solid-state drives (SSDs) for storage, which are not magnetic. Physical destruction is not feasible because the cloud customer doesn’t own the hardware and therefore won’t be allowed to destroy it. Overwriting probably won’t work because finding all data in all aspects of the cloud is difficult and the data is constantly being backed up and securely stored, so a thorough process would be very tricky.
Which of the following is not a method for enhancing data portability?
A. Crypto-shredding
B. Using standard data formats
C. Avoiding proprietary services
D. Favorable contract terms
A. Crypto-shredding
Explanation:
Crypto-shredding is for secure sanitization, not portability. The other methods all enhance portability.
When implementing a digital rights management (DRM) solution in a cloud environment, which of the following does not pose an additional challenge for the cloud customer?
A. Users might be required to install a DRM agent on their local devices.
B. DRM solutions might have difficulty interfacing with multiple different operating systems and services.
C. DRM solutions might have difficulty interacting with virtualized instances.
D. Ownership of intellectual property might be difficult to ascertain.
D. Ownership of intellectual property might be difficult to ascertain.
Explanation:
The owner of intellectual property will not change whether the material is stored in the cloud or in a legacy environment. Moving into the cloud will probably result in more use of personal devices, requiring users to install local DRM agents, so option A is true, making it not a suitable answer to this question. Options B and C are also true, due to the nature of cloud computing, and are therefore also not suitable for this question.
When implementing cryptography in a cloud environment, where is the worst place to store the keys?
A. With the cloud provider
B. Off the cloud, with the data owner
C. With a third-party provider, in key escrow
D. Anywhere but with the cloud provider
A. With the cloud provider
Explanation:
Option A creates a conflict of interest and does not enforce separation of duties. The best practice is to not store cryptographic keys with the data they encrypt, to avoid a potential conflict of interest and to enforce separation of duties. Each of the other choices is a reasonable choice and therefore not the answer to this question.
Which of the following is not a security concern related to archiving data for long-term storage?
A. Long-term storage of the related cryptographic keys
B. Format of the data
C. Media the data resides on
D. Underground depth of the storage facility
D. Underground depth of the storage facility
Explanation:
A long-term storage facility may or may not be located underground; the security of that facility (and the data contained therein) is not dependent on this aspect. Option A is a security concern because loss of the keys may result in losing the data (by losing access to the data), and keeping the keys with the data they protect increases risk. Both the format of the data and the media on which it resides (options B and C) are important to bear in mind, as either (or both) may be outmoded by the time the data might need to be retrieved from the archive; data and formats do not age well.
Data dispersion is a cloud data security technique that is most similar to which legacy implementation?
A. Business continuity and disaster recovery (BC/DR)
B. Redundant Array of Inexpensive Disks (RAID)
C. Software-defined networking (SDN)
D. Content delivery network (CDN)
B. Redundant Array of Inexpensive Disks (RAID)
Explanation:
Data dispersion is basically RAID in the cloud, with data elements parsed and stored over several areas/devices instead of stored as a unit in a single place. RAID (and data dispersion) does aid in BC/DR activities by increasing the robustness and resiliency of stored data, but BC/DR is a much more general discipline, so it is not the optimum answer for the question. SDN is used for abstracting network control commands away from production data, and CDN is usually used for ensuring quality of streaming media.
Data dispersion uses _______________, where the traditional implementation is called “striping.”
A. Chunking
B. Vaulting
C. Lumping
D. Grouping
A. Chunking
Explanation:
Where RAID used data striping across multiple drives, with data dispersion this technique is referred to as “chunking,” or sometimes “sharding” when encryption is also used. The other options are not common data dispersion terms used in cloud computing and have no meaning in this context.
Data dispersion uses _______________, where the traditional implementation is called “parity bits.”
A. Smurfing
B. Snarfing
C. Erasure coding
D. Real-time bitlinking
C. Erasure coding
Explanation:
Erasure coding is the practice of having sufficient data to replace a lost chunk in data dispersion, protecting against the possibility of a device failing while it holds a given chunk; parity bits serve the same purpose in a traditional RAID configuration. The other options are not common data dispersion terms used in cloud computing and have no meaning in this context.
Data dispersion provides protection for all the following security aspects except _______________.
A. Protecting confidentiality against external attack on the storage area
B. Loss of availability due to single-storage-device failure
C. Loss due to seizure by law enforcement in a multitenant environment
D. Protecting against loss due to user error
D. Protecting against loss due to user error
Explanation:
Data dispersion can’t aid in inadvertent loss caused by an errant user; if the user accidentally deletes/corrupts a file, that file will be deleted/corrupted across all the storage spaces where it is dispersed. The technique does, however, protect against the other risks. It enhances confidentiality because an attacker gaining illicit access to a single storage space will only get a chunk of the data, which is useless without the other chunks. This same aspect also protects loss when law enforcement seizes a specific storage device/space when they are investigating another tenant at the same cloud provider your organization uses. And loss of availability due to single device failure is probably the primary reason for having data dispersion (like RAID before it).
Your organization is migrating the production environment to an infrastructure as a service (IaaS) cloud implementation. Your users will need to be able to get access to their data, install programs, and partition memory space for their own purposes. You should configure the cloud memory as _______________.
A. Object
B. Volume
C. Synthetic
D. Database
B. Volume
Explanation:
Volume storage allows all the functions described in the question. Object storage has data arranged in a file structure, and databases arrange data in tables and relational schemes; neither of these options offers the functions described in the question. Synthetic is not a cloud memory configuration option.
Your organization is migrating the production environment to an infrastructure as a service (IaaS) cloud implementation. Your users will need to be able to get access to their data and share data with other users in a defined way, according to a hierarchy. You should configure the cloud memory as _______________.
A. Object storage
B. Volume storage
C. Synthetic storage
D. Databases
A. Object storage
Explanation:
Object storage is usually arranged in a file hierarchy. Volume storage has data with no defined structure (only memory space), and databases ar-range data in tables and relational schemes; neither of these options offers the functions described in the question. Synthetic is not a cloud memory con-figuration option.
What is one of the benefits of implementing an egress monitoring solution?
A. Preventing distributed denial of service (DDoS) attacks
B. Inventorying data assets
C. Interviewing data owners
D. Protecting against natural disasters
B. Inventorying data assets
Explanation:
Egress monitoring solutions (often referred to as DLP tools, where DLP stands for data loss protection or data leak prevention, or some combination of these terms) require the organization to appropriately inventory and classify data assets so the tool knows what to protect. DLP does not aid in protections for DDoS or natural disasters, which affect availability, not confidentiality (DLP only enhances confidentiality efforts). Option C is not a benefit of implementing an egress monitoring solution.
Egress monitoring solutions usually include a function that _______________.
A. Arbitrates contract breaches
B. Performs personnel evaluation reviews
C. Discovers data assets according to classification/categorization
D. Applies another level of access control
C. Discovers data assets according to classification/categorization
Explanation:
Egress monitoring solutions (often referred to as DLP tools, where DLP stands for data loss protection or data leak prevention, or some combination of these terms) will often include a discovery function, which will locate data assets according to criteria defined by the organization. DLP solutions cannot arbitrate contract breaches or perform personnel evaluations. Usually, DLPs also do not apply additional access controls; that is typically a characteristic of a digital rights management (DRM) solution.
Egress monitoring solutions usually include a function that _______________.
A. Uses biometrics to scan users
B. Inspects incoming packets
C. Resides on client machines
D. Uses stateful inspection
C. Resides on client machines
Explanation:
Egress monitoring solutions (often referred to as DLP tools, where DLP stands for data loss protection or data leak prevention, or some combination of these terms) will often include an agent that resides on client devices in order to inspect data being shared/sent by end users. DLP tools do not inspect incoming packets, with or without stateful inspection; this is the job of firewalls. DLP solutions do not typically use biometrics in any way.
Digital rights management (DRM) solutions (sometimes referred to as information rights management, or IRM) can be used to protect all sorts of sensitive data but are usually particularly designed to secure ____________.
A. Personally identifiable information (PII)
B. Intellectual property
C. Plans and policies
D. Marketing material
B. Intellectual property
Explanation:
DRM is mainly designed to protect intellectual property. It can also sometimes be used for securing PII, but intellectual property is a better answer here. Plans and policies aren’t usually protected in this manner, and marketing material is usually meant to be disseminated, so it does not require protection.
Digital rights management (DRM) solutions (sometimes referred to as information rights management, or IRM) often protect unauthorized distribution of what type of intellectual property?
A. Patents
B. Trademarks
C. Personally identifiable information (PII)
D. Copyright
D. Copyright
Explanation:
DRM is often deployed to ensure that copyrighted material (frequently software) is only delivered to and used by licensed recipients. Patents are more complicated and not often distributed to a mass market, so DRM does not assist in that way. Trademarks are representations of a brand and meant to be distributed, so DRM does not protect them. PII is not typically a type of intellectual property.
Which of the following characteristics is associated with digital rights management (DRM) solutions (sometimes referred to as information rights management, or IRM)?
A. Persistence
B. Influence
C. Resistance
D. Trepidation
A. Persistence
Explanation:
Persistence is the trait that allows DRM protection to follow protected files wherever they might be stored/copied. The other options are not characteristics associated with DRM solutions.
Which of the following characteristics is associated with digital rights management (DRM) solutions (sometimes referred to as information rights management, or IRM)?
A. Automatic expiration
B. Multilevel aggregation
C. Enhanced detail
D. Broad spectrum
A. Automatic expiration
Explanation:
Automatic expiration is the trait that allows DRM tools to prevent access to objects when a license expires or to remove protections when intellectual property moves into the public domain. The other options are not characteristics associated with DRM solutions.
Which of the following characteristics is associated with digital rights management (DRM) solutions (sometimes referred to as information rights management, or IRM)?
A. Transparent encryption modification
B. Bilateral enhancement
C.Continuous audit trail
D .Encompassing flow
C.Continuous audit trail
Explanation:
Continuous audit trail is the trait that allows DRM tools to log and exhibit all access to a given object. The other options are not characteristics associated with DRM solutions.
Which of the following characteristics is associated with digital rights management (DRM) solutions (sometimes referred to as information rights management, or IRM)?
A. Mapping to existing access control lists (ACLs)
B. Delineating biometric catalogs
C. Preventing multifactor authentication
D. Prohibiting unauthorized transposition
A. Mapping to existing access control lists (ACLs)
Explanation:
Mapping to existing access control lists (ACLs) is the trait that allows DRM tools to provide additional access control protections for the organization’s assets. The other options are not characteristics associated with DRM solutions.
According to the (ISC)2 Cloud Secure Data Lifecycle, which phase comes soon after (or at the same time as) the Create phase?
A. Store
B. Use
C. Deploy
D.Archive
A. Store
Explanation:
The Cloud Secure Data Lifecycle phases are, in order, Create, Store, Use, Share, Archive, Destroy (a good mnemonic might be CSU-SAD). Options B and D are phases of CSU-SAD but do not immediately follow Create. Option C is not a phase of CSU-SAD.