Cloud Security Fundamentals - Apprentice Flashcards

1
Q

3 Properties of cloud technologies as defined by the Cloud Native Computing Foundation?

A
  1. Container Packaged
  2. Dynamically Managed
  3. Microserviced
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Container Packaged

A

Running applications and processes in software containers as isolated units of application deployment, and as mechanisms to achieve high levels of resource isolation. Improves overall developer experience, fosters code and component reuse, and simplifies operations for cloud native applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Dynamically Managed

A

Actively scheduled and actively managed by a central orchestrating process. Radically improves machine efficiency and resource utilization while reducing the cost associated with maintenance and operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Microserviced

A

Loosely coupled with dependencies explicitly described (for example, through service endpoints). Significantly increases the overall agility and maintainability of applications. The foundation will shape the evolution of the technology to advance the state of the art for application management, and to make the technology ubiquitous and easily available through reliable interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

hypervisor

A

A hypervisor allows multiple, virtual (or guest) operating systems to run concurrently on a single physical host computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Native (Type 1 or bare metal) Hypervisor

A

A native (also known as a Type 1 or bare metal) hypervisor runs directly on the host computer’s hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hosted (type 2) Hypervisor

A

A hosted (also known as a Type 2) hypervisor runs within an operating system environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the foundation of cloud computing?

A

Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_______ software allows multiple, virtual guest operating systems to run concurrently on a single physical host computer.

A

Hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hypervisor functions between ______ and _______

A

Computer Operating Systems

Hardware Kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

VM Sprawl

A

Virtual environments can grow quickly, leading to a breakdown in change management processes and exacerbating security issues such as dormant VMs, hypervisor vulnerabilities, and intra-VM communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Kubernetes

A

an open-source orchestration platform that provides an application programming interface (API) that enables developers to define container infrastructure in a declarative fashion, that is, infrastructure as code (IaC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Microservices

A

Microservices architecture is a software development technique that uses containers to break large enterprise application code into smaller chunks, called microservices, for programmers to work on. These microservices run on separate containers, and Kubernetes orchestrates these containers to run the entire application code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hypervisors vs Containers

A

hypervisors abstract hardware and allow you to run operating systems.

Containers abstract the operating system to enable you to run applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Micro-VM

A

Micro-VMs are scaled-down, lightweight virtual machines that run on hypervisor software. Micro-VMs contain only the Linux operating system kernel features necessary to run a container.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cloud Compute Service (AWS/Azure/GCP)

A

AWS - EC2

Azure - Azure VM

GCP - Computer Engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Cloud Object Storage Service (AWS/Azure/GCP)

A

AWS - S3

Azure - Blob Storage

GCP - Cloud Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Cloud Database Service (AWS/Azure/GCP)

A

AWS - RDS

Azure - SQL Database

GCP - Cloud SQL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Cloud Networking Service (AWS/Azure/GCP)

A

AWS - Direct Connect

Azure - Virtual Network

GCP - Cloud Interconnect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Benefits for Serverless Model

A

Reduced Operational Overheard

Increased Agility

Reduced Costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

DAST

A

Dynamic Application Security Testing

DAST tools will only provide testing coverage for HTTP interfaces. This limited capability poses a problem when testing serverless applications that consume input from non-HTTP sources or interact with backend cloud services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

SAST

A

Static Application Security Testing

SAST tools rely on data-flow analysis, control flow, and semantic analysis to detect vulnerabilities in software. This is because serverless applications contain multiple distinct functions that are stitched together using event triggers and cloud services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

IAST

A

Interactive Application Security Testing

IAST tools have better odds at accurately detecting vulnerabilities in serverless applications when compared to both DAST and SAST.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In which model do applications rely on managed services that abstract away the need to manage, patch, and secure infrastructure and virtual machines?

A

Serverless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What are scaled-down, lightweight virtual machines that run on hypervisor software and contain only the Linux operating system kernel features necessary to run a container?
Micro VMs
26
IAM
IAM is a framework of business processes, policies, and technologies that facilitates the management of electronic or digital identities.
27
Technical Debt
Technical debt is a software development concept, which also has been applied more generally to IT, in which additional future costs are anticipated for rework due to an earlier decision or course of action that was necessary for agility but was not necessarily the most optimal or appropriate decision or course of action.
28
Distributed Workforce
Distributed workforce is a workforce that reaches beyond the restrictions of a traditional office environment. A distributed workforce is dispersed geographically over a wide area, domestically or internationally.
29
Cloud Cybersecurity Infrastructure
Cloud cybersecurity refers to the tools, data, and infrastructure that protect cloud-based products from malicious actors.
30
On-Premise
On-premises is a solution hosted in-house and usually supported by a third party.
31
RBAC
Role-based access control (RBAC) is a method of restricting network and resource access based on the roles of individual users within an enterprise.
32
DevOps
DevOps is a set of practices that combines software development (Dev) and IT operations (Ops).
33
OS
An operating system is system software that manages computer software resources and hardware peripheral devices, and provides common services for computer programs.
34
VM
A virtual machine is an emulation of a computer system that runs in the form of software and, like a physical computer, runs an operating system and applications.
35
App Software
Application (app for short) software is a program or group of programs designed to help end users be more productive.
36
Runtime
In computer programming, a runtime environment primarily implements portions of an execution model. Most programming languages have some form of runtime environment in which programs run.
37
Shift-Left
Shift-left seeks to move security activities from the end of the workflow to activities that are earlier in the development process. This can improve security impacts and lower costs by finding issues earlier in the CI/CD process.
38
Three Computing Service Models
SaaS PaaS IaaS
39
Software as a Service (SaaS)
Customers are provided access to an application, such as Google Docs, running on a cloud infrastructure and the application is accessible from internet-connected client devices. The customer does not manage the application or underlying cloud infrastructure that delivers the application. The customer can only create and store user specific data using the provided SaaS application. The customer is responsible for securing user-specific data created using the SaaS application.
40
Platform as a Service (PaaS)
Using PaaS, customers can deploy supported applications onto the Cloud Service provider’s (CSP) infrastructure without the burden of fully managing and controlling the underlying cloud infrastructure. Most CSPs offer databases as a PaaS. The database can be used to store customer information, for example, product inventory. Customers can avoid the tasks of installing and updating database software by choosing database PaaS.
41
Infrastructure as a Service (IaaS)
Using IaaS, customers securely configure, manage, and deploy the virtual environment running their applications. Customers are responsible for securing their virtual machines, the virtual machine operating systems, operating system runtime environments, application software, and application data. CSPs are responsible for securing the physical computers running the virtual environment.
42
NIST defined cloud deployment models
Public Private Hybrid Community
43
Public Cloud
Public cloud is a cloud infrastructure that is open to use by the general public. It’s owned, managed, and operated by a third party (or parties), and it exists on the cloud provider’s premises. Examples of public CSPs are Amazon Web Services (AWS), Google Cloud, and Microsoft Azure.
44
Community Cloud
Community cloud is a cloud infrastructure that is used exclusively by a specific group of organizations.
45
Private Cloud
Private cloud is a cloud infrastructure that is used exclusively by a single organization. It may be owned, managed, and operated by the organization or a third party (or a combination of both), and it may exist on-premises or off-premises.
46
Hybrid Cloud
Hybrid cloud is a cloud infrastructure that comprises two or more of these deployment models and is, therefore, the best of both worlds: private data center for static, older workloads and public cloud for newer apps, agility, and scalability.
47
SaaS Model
Customer Responsible for: Data
48
PaaS Model
Customer Responsible for: Data Applications
49
IaaS Model
Customer Responsible for: Data Applications Runtime Middleware OS
50
Multi-Tenancy Cloud Environments
In multi-tenancy (multiple customers of a cloud vendor are using the same computing resources) cloud environments, particularly in SaaS models, the customer controls and resources are limited by the cloud provider.
51
Dynamic Environment
In a dynamic environment, pools of computing resources are available to support application workloads that can be accessed anywhere, anytime, from any device. Security remains a significant challenge when you embrace this new dynamic, cloud-computing fabric environment. Many of the principles that make cloud computing attractive may go against network security best practices.
52
Software composition analysis (SCA
safely enables developers to leverage open source packages without exposing organizations to unnecessary vulnerabilities or legal and compliance issues.
53
Bolted On Feature Sets
Bolted-on feature sets are used to describe products and systems that can be quickly but securely attached to an existing operating system or website.
54
Continuous Ports
Contiguous ports permit or deny firewall traffic through sequential ports in order, such as TCP ports 20-25.
55
Bursty Demand Load
A bursty demand load is a configuration set up between a private cloud and a public cloud to handle peaks in IT demand. When a private cloud configuration reaches 100 percent of its resource capacity, the overflow traffic is directed to a public cloud so there’s no interruption of services.
56
Form Factor
A form factor is an aspect of design that defines and prescribes the size, shape, and other physical specifications of hardware components.
57
Active/Passive Mode
In an active/passive mode, one firewall actively manages traffic while the other is synchronized and ready to transition to the active state should a failure occur. In this mode, both firewalls share the same configuration settings, and one actively manages traffic until a path, link, system, or network failure occurs.
58
Hybrid Cloud Security Evolution
Phase 1 - Considating Servers within trust levels Phase 2 - Consolidating Servers Across Trust Levels Phase 3 - Selective Network Security Virutalization Phase 4 - Dynamic Computing Fabric
59
Organizations are using which resource to expand their on-premises private cloud compute capacity?
PUblic Cloud
60
Which cloud infrastructure comprises two or more cloud deployment models, bound by standardized or proprietary technology that enables data and application portability?
Hybrid
61
Which value can be achieved by the ability to pool resources in cloud computing?
economies of scale and agility
62
Which cloud solution is hosted in-house and usually is supported by a third party?
on-prem
63
Which software development concept that also has been applied more generally to IT says that additional future costs for rework are anticipated due to an earlier decision or course of action that was necessary for agility but was not necessarily the most optimal or appropriate decision or course of action?
technical debt
64
In which cloud service model are customers responsible for securing their virtual machines and the virtual machine operating systems, and for operating system runtime environments, application software, and application data?
IaaS
65
Which phased approach of hybrid cloud security requires networking and security solutions that not only can be virtualized but also are virtualization-aware and can dynamically adjust as necessary to address communication and protection requirements, respectively?
Dynamic Computing Fabric
66
CNSP
Cloud Native Security Platform The cloud native approach takes the best of what cloud has to offer – scalability, deployability, manageability, and limitless on-demand compute power – and applies these principles to software development, combined with CI/CD automation, to radically increase productivity, business agility, and cost savings.
67
CI/CD
Continuous Integration/Continuous Delivery Application development methodologies are moving away from the traditional “waterfall” model toward more agile continuous integration/continuous delivery (CI/CD) processes with end-to-end automation.
68
"Cloud native”
refers to a methodology of software development that is essentially designed for cloud delivery and exemplifies all the benefits of the cloud by nature.
69
DevOps
DevOps teams are a collaboration between the development teams and IT operations. Traditionally, IT operations did not understand the specific technical and process requirements of the software development process. DevOps teams have a closer relationship with software development teams in order to facilitate the release of applications.
70
SecOps
SecOps team are essentially IT operations team with a focus on security. Historically, IT operations and security were separate teams. SecOps teams directly integrate security into the IT operations.
71
DevSecOps
DevSecOps teams have a more specific focus on ensuring security than DevOps and SecOps teams. They focus on applying application and infrastructure security automation and processes across the CI/CD pipeline.
72
Which one of the four Prisma Cloud pillars enforces machine learning-based runtime protection to protect applications and workloads in real time?
CWP
73
Which term refers to a methodology of software development that is essentially designed for cloud delivery and exemplifies all the benefits of the cloud by nature.
Cloud native
74
Which team has a more specific focus on applying application and infrastructure security automation in the CI/CD pipeline?
DevSecOps
75
Which area is a security parameter that focuses on improving cloud security entitlement risk?
IAM Security
76
loosely coupled
means they are not hardwired to any infrastructure components, thus allowing developers to make changes frequently without affecting other pieces of the application or other team members’ projects across technology boundaries such as public, private, and multicloud deployments.
77
"Cloud native”
refers to a methodology of software development that is essentially designed for cloud delivery and exemplifies all the benefits of the cloud by nature.
78
CNSP and it's functions
Cloud Native Security Platform Visibility Integration Automation
79
Why is CI/CD pipeline in a loop?
Teams can use the feedback from the other stages to plan their next set of code changes. Thus Continuous Improvement
80
CI/CD Pipeline
Workflow when the processes that go into delivering software are integrated.
81
Characteristics of DevOps
1. Collab Teams 2. Culture 3. Strategy 4. More than Automation
82
Continuous integration
Continuous integration requires developers to integrate code into a repository several times per day for automated testing.
83
Continuous delivery
Continuous delivery means that the CI pipeline is automated, but the code must go through manual technical checks before it is implemented in production.
84
Continuous deployment
Continuous deployment takes continuous delivery one step further. Instead of requiring manual checks, the code passes automated testing and is automatically deployed, giving customers instant access to new features.
85
CNAPP
CLOUD NATIVE APPLICATION PROTECTION provide a unified cloud security solution to help security teams scan, identify, and remediate security vulnerabilities.
86
SDLC
Software Development Lifecycle refers to a methodology with clearly defined processes for creating high-quality software.
87
CNCF
Cloud Native Computing Foundation is a Linux OS Foundation project that was founded in 2015 to help advance container technology and align the tech industry around its evolution.
88
Distributed cloud
Distributed cloud is an execution environment where application components are placed at appropriate geographically dispersed locations chosen to meet the requirements of the application.
89
CNAPP Core Security Protections
Cloud Security Posture Management Cloud Workload Protection Cloud Code Security Cloud Infrastructure Entitlement Management
90
CSPM Key Areas
Visibility Governance Compliance
91
CSPM Compliance Requirements
Real-Time Discovery Config Governance Access Governance Compliance Auditing Seamless UX
92
CWP
Cloud Workload Protection provides consistent visibility and control, including vulnerabilities scanning in the development process, workload protection at runtime, application control, memory protection, behavioral monitoring, host-based intrusion prevention and optional anti-malware protection.
93
CIEM
Cloud Infrastrcture Entitlement Manager the process of managing identities and privileges in cloud environments.
94
Purpose of CIEM
The purpose of CIEM is to understand which access entitlements exist across cloud and multicloud environments, and then identify and mitigate risks resulting from entitlements that grant a higher level of access than they should.
95
Four C's of Cloud Native Security
Cloud Clusters Containers Code
96
Cloud Workload Protection (CWP) protects
Cloud Workloads Servers VMs Containers DBs Storage APIs Service Layers
97