cloud 2 Flashcards
(129 cards)
What is the primary concern when considering moving to the cloud?
Security concerns.
What does this section focus on regarding cloud environments?
Common threats and tools for mitigating risks.
What are some common internal and external threats to cloud security?
- Data breaches
- DoS and DDoS attacks
- Insecure interfaces
- User error
- Data loss
Name three popular scanning tools used to improve cloud security.
- Nmap
- Nessus
- Metasploit
What is a credentialed scan in the context of network security?
A deeper scan performed using system credentials.
What are agent-based scans?
Small applications that collect data from devices for analysis.
What are network-based scans?
Tools that check devices on a network.
What is shadow IT and why is it a concern for cloud security?
Shadow IT: Unapproved cloud apps used by employees. Concern: Leads to breaches and less IT control.
What is an approved application list?
A list of trusted and secure applications for employees.
What are the advantages of built-in security tools in cloud platforms?
- Reduces compatibility issues
- Increases visibility
- Provides centralized monitoring
- Scales efficiently.
What are allow and deny rules in cloud security?
- Allow List: Only lets in traffic you approve.
- Deny List: Blocks traffic you don’t want.
What are the characteristics of NACL (Network Access Control List)?
NACL rules can allow or deny traffic, are numbered for priority, and are stateless.
What is the function of security groups in AWS?
Act as a virtual firewall for instances in a subnet.
What is the function of VPC flow logs in AWS?
Record traffic for monitoring and troubleshooting.
What does traffic mirroring do?
Captures and analyzes network traffic.
What is a perimeter network in Azure and why is it recommended?
A DMZ that manages Internet traffic to protect internal resources.
What is a Network Virtual Appliance (NVA)?
A VM that controls traffic with added security.
Name three security features that third-party NVAs can provide.
- Firewalling
- IDS/IPS
- Antivirus
What does a Network Security Group (NSG) do?
Provides firewall protection at the subnet level.
What is an Application Security Group (ASG)?
Allows security policies based on application or workload type.
Name two other Azure security tools.
- Azure Firewall
- MS Defender for Cloud
What is the purpose of GCP’s virtual firewall?
IPv4 traffic to/from the VPC.
What can the rules of GCP’s firewall target?
- Specific protocols
- Ports
- Sources
- Destinations
What do VPC flow logs do?
Log TCP and UDP traffic at the subnet level.