Describe the concepts of security, compliance, and identity Flashcards
(23 cards)
shared responsibility model
identifies which security tasks are handled by the cloud provider, and which security tasks are handled by you, the customer
SaaS
software as a service; cloud service provider is responsible for the entire solution except for information and data, devices, and accounts and identities; shared responsibility for identity and directory infrastructure
PaaS
platform as a service; cloud service provider manages hardware and OS, some responsibilities (like network controls, applications, and identity and directory infrastructure) are shared between the customer and the service provider
IaaS
infrastructure as a service; cloud service provider manages the hardware, customer manages everything installed or implemented
on-prem
on-premises datacenter; everything is managed by the customer
defense in depth
uses a layered approach to security
layers of defense in depth
- physical security
- identity and access security
- perimeter security
- network security
- compute layer security
- application layer security
- data layer security controls
zero trust model
- verify explicitly
- least privileged access
- assume breach
zero trust foundational pillars
- identities
- devices
- applications
- data
- infrastructure
- networks
encryption
the process of making data unreadable and unusable to unauthorized viewers
hashing
uses an algorithm to convert the original text to a unique fixed-length value, called a hash value
governance, risk, and compliance
helps organizations reduce risk and improve compliance effectiveness
governance
the rules, practices, and processes an organization uses to direct and control its activities
risk management
the process of identifying, assessing, and responding to threats or events that can impact company or customer objectives
compliance
the country/region, state or federal laws or even multinational regulations that an organization must follow
identity
how someone or something can be verified and authenticated
pillars of identity infrastructure
- administration
- authentication
- authorization
- auditing
authentication
the process of proving that a person is who they say they are; grants access
authorization
determines the level of access or the permissions an authenticated person has to your data and resources
identity provider
creates, maintains, and manages identity info; enables organizations to establish authentication and authorization policies, monitor user behavior, and more
directory services
stores directory data and makes it available to network users, administrators, services, and applications
Active Directory
one of the best known directory services; a central component in organizations with on-premises IT infrastructure
federation
A collection of realms (domains) that have established trust among themselves. The level of trust may vary, but typically includes authentication and may include authorization.