SECURITY Architecture 3.1 Flashcards

1
Q

Who is responsible for the security of a cloud based service?

A

Responsibility matrix will determine who between the customer and the provider are responsible the security for each aspects of the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are hybrid cloud consideration

A
  • There is more than one Public or private cloud. Adds additional complexity.
    -Network protection mismatches (Authentication across platforms, firewall configuration)
    -Different security monitoring between different clouds
    -Data leakage - Data is shared across the public internet.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Third-Party Vendors in the cloud

A

The use of third party security software such as firewalls to protect cloud based appliances should be considered. There should be on going vendor risk assessment and consider incident response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Infrastructure as code

A

Describe a portion of the infrastructure as code. Allows you easily built out and modify the infrastructure as needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Server less Architecture

A

Faas - Function as a service
Instead of accesses a application we access individual functions which are handled by that application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Microservices and API’S

A

Application programming interfaces. Instead of having one single executable that handles everything you can break up individual services and run them as separate instances in the cloud.

Done for scale ability
Done for resilient
Security is more focused as it is tailored for each mircservice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Network appliances - VLANs

A

Physical isolation - Network devices should be physically isolated to prevent an attcker being able to move from one to another. Two separate physical situations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Network Appliances - Logical segmentation

A

Each device being separated by a physical switch becomes unscalable very quickly. Vlans are used to achieve logical segmentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SDN (Software Defined Networking)

A

?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is premises data

A

Security technology is local and on premises. There is a cost associated with managing and securing these data centres.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

On-Premises Security considerations

A

Full control when everything is in house
On-site IT team which can manage security (can be expensive and difficult to staff)
Local team maintains uptime and availability.
Security changes can take time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Centralised vs Decentralised.

A

Most organisations are physically decentralised. Difficult to manage and protect so many diverse systems.
Difficult to manage but made easier with a centralised approach which correlated alerts, log files and analysis.

A centralised system creates one point of failure and has performance issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Virtualisation

A

A technology used in organisations where separate virtual machines can run at the same time with their own operating system and applications.

Hypervisor is the software which manages the resources between the separate virtual machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Containerisation

A

Another way to have multiple applications running all on one piece of hardware. This is more efficient than Virtualisation because all applications share the same host operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Virtualisation vs Containerisation

A

Infrastructure: both have physical device that everything runs on.

Hypervisor: The technology which runs on the infrastructure in a virtualised environment.

Host operating system: The
technology which runs on the infrastructure in a containerised environment.

Docker: The containerisation software which runs on top of the host operating system. - manages the different applications running on the host operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IoT

A

Internet of things:

Sensors, Smart devices, Wearable technology, facility automation. Often have weak security and be a vulnerable that are

15
Q

SCADA/ICS

A

Supervisory Control and data Acquisition System /Industrial control system.

A control system where IT professionals can manage and control IT in a segmented and secure off site environment.

16
Q

RTOS

A

Real-Time Operating System.

An operating system with a deterministic processing schedule.

Self contained and difficult to breach the security of these systems. Extremely sensitive to security issues.

17
Q

Embedded Systems

A

Hardware and software designed for a specific function.

18
Q

High Availability (HA)

A

Configure systems so once one fails there is a contingency plan where traffic could be directed to maintain availability and reduce downtime.

More and more cost associated with increasing HA to avoid downtime.

19
Q

Infrastructure considerations - Availability

A

System uptime, foundation of IT security success of a system is often determined by its availability.

20
Q

Infrastructure considerations - Resilience

A

How quickly can you recover once there is downtime. MTTR - Mean time to repair (The length of time that is would take to replace something that is unavailable with something that is available).

21
Q

Infrastructure consideration - Cost

A

How much money is required?
Installation cost?
Maintenance cost?
Replacement cost
Tax implications

22
Q

Infrastructure consideration - Responsiveness

A

How quickly can we get a response, Humans are sensitive to delays. Speed is an important metric.

23
Q

Infrastructure considerations -Scalability

A

How quickly can we easily can we increase or decrease capacity.

24
Q

Infrastructure considerations - Ease of deployment

A

How easy can we deploy an application.

Orchestration - Build out an entire application easily.

Consider change control?

25
Q

Infrastructure considerations Risk Transference?

A

Moving risk to a third party.
Cybersecurity insurance
Recover internal losses, Outages and business downtime.
Protect against legal issues from customers - limit the cost associated with legal proceeding.

26
Q

Ease of Recovery -Infrastructure considerations

A

How long does it take or how easy is it to get back up and running. Easiest way to recover.

27
Q

Patch Recovery - Infrastructure considerations

A

Patch availability to prevent bugs and security updates.
Normal part of the IT process.

28
Q

Liability to patch - Infrastructure considerations

A

embedded systems likely do not have a patch. May need to add a firewall.

29
Q

Power - Infrastructure considerations

A

A foundation element. The power for a data centre vs office building will be very different.

UPS - Uninterruptible power supply.

30
Q

Compute engine - Infrastructure considerations

A

The part of the process which processes the data. Multiple CPU’s across multiple cloud based technologies.