Describe Security and Compliance Concepts Flashcards

1
Q

which type of hosting requires the least amount of management by the cloud customer? and vice versa

A

Saas Hosting type requires the least amount of management by the cloud customer.
On-premise requires the most amount of management by the cloud customer.
Paas is the second least.
Iaas is the third least.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the responsibilities always retained by the customer organization?

A

-Information and Data
-Devices (Mobile & PCs)
-Accounts and Identities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe Defense in Depth.

A

A defense-in-depth strategy uses a series of mechanisms to slow the advance of an attack.
Example of layers:
Physical - security at data center
Identity and Access - such as multifactor authentication
Perimeter -security of corporate network to filter large-scale attacks
Network -network segmentation and access controls, to limit communication between resources.
Compute -securing access to virtual machines either on-premise or in the cloud
Application -ensure applications are secure and free of security vulnerabilities.
Data - controls to manage access to business and customer data and encryption to protect data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Zero Trust Guiding principles?

A

1.) Verify Explicitly: always authenticate based on the available data points, including user identity, location, device, service or workload, data classification, and anomalies.

2.) Least privileged access: Limit user access with just-in-time and just-enough access (JIT/JEA).

3.) Assume breach: Segment access. Use encryption to protect data, and use analytics to get visibility, detect threats, and improve your security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the six foundational pillars of the Zero Trust model?

A

1.) Identities: Identities like users, services, and devices must be verified with strong authentication.
2.) Devices: Monitoring devices for health and compliance is an important aspect of security.
3.) Applications: Discovering all applications being used, sometimes called Shadow IT.
4.) Data: should be classified, labeled, and encrypted based on its attributes.
5.) Infrastructure:
6.) Networks: should be segmented, and real-time threat protection, end-to-end encryption, monitoring, and analytics should be employed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe encryption and the two types.

A

Encryption is the process of making data unreadable and unusable to unauthorized viewers.

1.) Symmetric: uses the same key to encrypt and decrypt the data.

2.)Asymmetric: uses a public key and a private key pair. Either key can encrypt data, but the key used to encrypt can’t be used to decrypt. So if you used the public key to encrypt you must use the private key to decrypt, and vice versa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Hashing?

A

Hashing uses an algorithm to convert text to a unique fixed-length value called a hash. Each time the same text is hashed using the same algorithm the same hash values is produced. It is often used to store passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe governance, risk, and compliance (GRC) concepts

A

1.) Governance: is the system of rules, practices, and processes an organization uses to direct and control its activities.

2.) Risk: is the process of identifying, assessing, and responding to threats or events that can impact company or customer objectives. There are external and internal risks. External can be weather events and pandemics. Internal risks can be leaks of sensitive data and theft of computers.

  1. Compliance: refers to the country/region, state or federal laws and regulations that an organization must follow.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly