Cloud Security Flashcards
On-Premises
Operates locally
Off-Premises
Operates via the cloud
CTSS
Compatible Time-Sharing System
Distributes resources of a single machine for simultaneous multiple user access
IaaS
Infrastructure as a Service
Maintaining server on a cloud-based VM
Provides virtual resources
Customer Responsible for: Accountability, Data, Application, Runtime, Middleware, OS
Provider Responsibility: Virtualization, Servers, Storage, Network
PaaS
Platform as a Service
Creation of platforms for applications & eliminates platform maintenance
Customer Responsible for: Accountability, Data, Application
Provider Responsibility: Runtime, Middleware, OS, Virtualization, Servers, Storage, Network
SaaS
Software as a Service
Running software off-premises (Ex. Dropbox, Gmail, Office365)
Customer Responsible for: Accountability, Data
Provider Responsibility: Application, Runtime, Middleware, OS, Virtualization, Servers, Storage, Network
XaaS
Anything as a Service
All types of products that can be provided via the cloud
DaaS
Desktop as a Service
Hosting an OS on a virtual machine
Provide desktop interfaces for users
Public Cloud
Uses provider resources
Hosts services open to others
DRaaS
Disaster Recovery as a Service
Replication of servers to the cloud (failover solution)
Private Cloud
Separate for each customer
Private customizable environment
Offers a higher level of reliability
Hybrid Cloud
Public and private models combined
Running apps interchangeably, privately,
or publicly
Hypervisor
Manages virtual system resources
Type 1 runs on system hardware (also known as bare metal)
Type 2 runs on host OS as an application
Virtualization Security
Cloud Provider Responsibility: physical infrastructure security and virtualization platform security
Cloud Customer Responsibility: Virtualized security controls (virtualized host encryption)
Cloud Availability Zones
Regions: Multiple availability zones
Availability Zones (AZ) : Geographical (closer is better), Legal/compliance/corporate policy constraints of where data resides, Cost, Offerings
SLA
Service Level Agreement
Agreement between service provider and client regarding the features provided and implementation
IAM
Identity & Access Management
Framework for management of control of permissions, authentication, and identification using digital identities
Data Center Disaster Recovery
Redundancy
Resiliency
Disaster Recovery
Data Backups
EC2
Amazon cloud computing service platform
S3
Amazon data storage services
POLP
Principle of Least Privilege
WAF
Web Application Firewall
Helps protect web applications by filtering and monitoring HTTP traffic
Uses ACLs
Layer 7
NGFW
Next Generation Firewall
3rd generation firewall that provides capabilities beyond a traditional
Volumetric Attacks
Focus on consuming network resources through amplification or botnets.