Describe the concepts of security, compliance, and identity Flashcards

(23 cards)

1
Q

shared responsibility model

A

identifies which security tasks are handled by the cloud provider, and which security tasks are handled by you, the customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SaaS

A

software as a service; cloud service provider is responsible for the entire solution except for information and data, devices, and accounts and identities; shared responsibility for identity and directory infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PaaS

A

platform as a service; cloud service provider manages hardware and OS, some responsibilities (like network controls, applications, and identity and directory infrastructure) are shared between the customer and the service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IaaS

A

infrastructure as a service; cloud service provider manages the hardware, customer manages everything installed or implemented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

on-prem

A

on-premises datacenter; everything is managed by the customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

defense in depth

A

uses a layered approach to security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

layers of defense in depth

A
  1. physical security
  2. identity and access security
  3. perimeter security
  4. network security
  5. compute layer security
  6. application layer security
  7. data layer security controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

zero trust model

A
  • verify explicitly
  • least privileged access
  • assume breach
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

zero trust foundational pillars

A
  • identities
  • devices
  • applications
  • data
  • infrastructure
  • networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

encryption

A

the process of making data unreadable and unusable to unauthorized viewers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

hashing

A

uses an algorithm to convert the original text to a unique fixed-length value, called a hash value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

governance, risk, and compliance

A

helps organizations reduce risk and improve compliance effectiveness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

governance

A

the rules, practices, and processes an organization uses to direct and control its activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

risk management

A

the process of identifying, assessing, and responding to threats or events that can impact company or customer objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

compliance

A

the country/region, state or federal laws or even multinational regulations that an organization must follow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

identity

A

how someone or something can be verified and authenticated

17
Q

pillars of identity infrastructure

A
  • administration
  • authentication
  • authorization
  • auditing
18
Q

authentication

A

the process of proving that a person is who they say they are; grants access

19
Q

authorization

A

determines the level of access or the permissions an authenticated person has to your data and resources

20
Q

identity provider

A

creates, maintains, and manages identity info; enables organizations to establish authentication and authorization policies, monitor user behavior, and more

21
Q

directory services

A

stores directory data and makes it available to network users, administrators, services, and applications

22
Q

Active Directory

A

one of the best known directory services; a central component in organizations with on-premises IT infrastructure

23
Q

federation

A

A collection of realms (domains) that have established trust among themselves. The level of trust may vary, but typically includes authentication and may include authorization.