Term
With a ____, the CONSUMER dictates the technology and operating procedures. |
|
Definition
MSP (Managed Service Provider) |
|
|
Term
With a ____, the SERVICE PROVIDER dictates the technology and operational procedures. |
|
Definition
CSP (Cloud Service Provider) |
|
|
Term
Definition of Risk - "AT VIP CARD" |
|
Definition
Asset, Threat, Vulnerability, Impact, Probability, Control = what's left? Risk Determined (residual risk) |
|
|
Term
|
Definition
Relative Attack Surface Quotient |
|
|
Term
As RASQ increases, security... |
|
Definition
|
|
Term
Compare and contrast SLA and OLA? |
|
Definition
SLA = Service Level Agreement, agreement between two separate entities for technology services
OLA = Operational Level Agreement, agreement between departments within the same organization regarding service levels within the same organization |
|
|
Term
Key Cloud Computing Drivers: Elasticity (define, plus sub-bullets V and S) |
|
Definition
Elasticity = The environment transparently manages a user's resource utilization based on dynamically changing needs
Virtualization - Each user has a single view of the available resources, independently
Scalability - Users have access to a large number of resources that scale based on demand |
|
|
Term
Key Cloud Computing Drivers - Simplicity (define, plus sub-bullets R and C) |
|
Definition
Simplicity = IT Environment complexities are reduced
Risk reduction - users can use the cloud to test ideas and concepts before making major investments in technology
Cost - pay only for the resources that are needed, no infrstructure maintenance or upgrade costs |
|
|
Term
Key Cloud computing drivers - Business Expandability (define, plus sub-bullets M and C/I) |
|
Definition
Business Expandability - allows the business to address business needs without respect to geography
Mobility - can access data and applications from anywhere
Collaboration/Innovation - Users can work simultaneously on common data and information from anywhere |
|
|
Term
Name three advantages of thin clients |
|
Definition
less viruses less processing power needed on the client less potential for data loss because little data is sent to the client |
|
|
Term
|
Definition
Economic Denial of Service Hackers/threat actors purposely access cloud resources in a repetitive manner with the purpose of driving up cloud computing bills and putting a victim organization out of business/causing business harm |
|
|
Term
|
Definition
A trusted security zone, beyond which resources are untrusted |
|
|
Term
What's the difference between a clone and a backup? |
|
Definition
Clone = a copy of a "reference image" that's used to produce another server
Backup is a copy of the *data* on a server, but not a copy of the OS |
|
|
Term
In Desktop As A Service (DaaS), what's the difference between implicit vs. explicit entitlements? |
|
Definition
Implicit entitlements are those that come via a user's membership in a group
Explicit entitlements are those that come via a user's job role/ID |
|
|
Term
What's a Global Policy Object? |
|
Definition
A cloud computing policy that's applied across all cloud computing resources for a given customer (for example - no caching, to reduce the risk of exposing company data to ephemeral, client data storage) |
|
|
Term
What's one reason why an attacker would login multiple times to a given cloud resource? |
|
Definition
To gain access to data that's been distributed throughout a cloud environment. With each login they may be assigned to a different physical resource, any one of which might have the specific piece of data they are looking for. |
|
|
Term
Explain the advantage of distributed data in a multi-tenant cloud environment |
|
Definition
If you have data distributed among many different physical assets in a multi-tenant cloud environment, a breach to any one of those assets would only expose a small portion of the overall data record, and may not be of value to the attacker. |
|
|
Term
In cloud data security, what is anonymization? |
|
Definition
Anonymization is when cloud service provider has client data distributed among many different physical assets in a multi-tenant cloud environment, a breach to any one of those assets would only expose a small portion of the overall data record, and may not be of value to the attacker. |
|
|
Term
What are some of the risks associated with a distributed/multi-tenant Security Environment? |
|
Definition
Data co-mingled with that of other organizations If servers are required for legal reasons for another tenant, your data may be lost/exposed |
|
|
Term
What are some of the legal/regulatory risks associated with cloud computing? |
|
Definition
Co-mingling with other organization's assets Jurisdiction/location of servers Privacy requirements differ by location/jurisdiction/country |
|
|
Term
What is an accessibilty/availability zone? |
|
Definition
Where your data is stored by a cloud service provider and from where your users/customers can access it. |
|
|
Term
|
Definition
A treaty-like agreement between the US and EU that attempts (poorly) to bridge the gap of differing data privacy regulations and definitions between the two jurisdictions. |
|
|
Term
|
Definition
Cloud infrastructure that is provisioned for exclusive use by a single organization comprising multiple consumers (e.g. business units). May be owned, managed and operated by the organization, a third party, or some combination, and may exist on or off premises. |
|
|
Term
What is a community clioud? |
|
Definition
cloud infrastructure that is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (e.g. missing, security requirements, etc). May be owned, managed and operated by one or more of the organizations in the community, a third party or a combination |
|
|
Term
|
Definition
Cloud infrastructure provisioned for open use byt he general public. May be owned, managed and operated by a business, academis, or govt org, or a compbination. *Exists on the premises of the cloud provider* |
|
|
Term
|
Definition
Cloud infrastructure that is a composition of two or more distance cloud infrastrucutres (private, community, or public) that remain unique entities, but are bound together by standardized or proprietary tech that enables data and application portability (e.g. cloud bursting for load balancing between clouds). |
|
|
Term
Name the three primary types of Cloud Service Models |
|
Definition
Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) |
|
|
Term
|
Definition
A type of computing, comparable to grid computing, that relies on sharing computing resources rather than having local servers or personal devices to handle applications. |
|
|
Term
|
Definition
Cloud Application Management for Platforms. A specification designed to ease management of applications - including packaging and deployment - across public and private cloud computing platforms. |
|
|
Term
What is IDaaS? Spell out IAAA.... |
|
Definition
IDentity as a Service - Identity and Access Management as a service provided by a cloud service provider
Identity management Authentication Authorization Accounting/Audibility |
|
|
Term
What is the *opposite* of SSO? |
|
Definition
Opposite of Single Sign On (SSO) is "complete mediation", where you are forced to login and present credentials for each and every asset you try to access. |
|
|
Term
Name some problems created by Infrastructure as a Service |
|
Definition
API connections (trusted vs. untrusted connections, interoperability problems)
Latency (due to loosely coupled components/systems)
Audit isn't taken care of for you, you need to ensure that auditibility is there
Privacy - need to ensure proper privacy provisions are in place because *you* are in charge of making that happen |
|
|
Term
What are the four types of risk? (ACID) |
|
Definition
Audit Control Inherent Detection |
|
|
Term
What are the four pillars of data quality (ACID) |
|
Definition
Atomicity (all or none) Consistency Isolated (as in transactional) Durability |
|
|
Term
What's the difference between a Penetration Test and a Vulnerability Scan? |
|
Definition
Penetration tests look for new vulnerabilities
Vulnerability scans search for known vulnerabilities |
|
|
Term
What is cryptographic agility? |
|
Definition
The ability to change cryptographic methods without disruption to your system |
|
|
Term
|
Definition
Return on Security Investment
Cost of a potential breach less cost of security countermeasures to prevent such a breach |
|
|
Term
What are the key benefits of the IaaS service model? |
|
Definition
Usage is metered and priced on basis of units consumed
Ability to scale up and down based on usage
Reduced cost of ownership
Reduced energy and cooling costs |
|
|
Term
What are the key benefits of the PaaS service model? |
|
Definition
OS can be changed and upgraded frequently
Globally distributed development teams able to work collaboratively
Services are available and can be obtained from diverse sources across international boundaries
Upfront and recurring or ongoing costs can be significantly reduced |
|
|
Term
What are the key benefits to the SaaS service delivery model? |
|
Definition
Ease of use and limited./minimal administration
Automatic updates and patch management
Standardization and compatibility
Global accessibility |
|
|
Term
How do you restrict / role manage SaaS? |
|
Definition
Restricted interface (like SharePoint)
View-based controls (e.g. database views) |
|
|
Term
|
Definition
An open source cloud computing and IaaS platform for enabling private clouds. |
|
|
Term
What are the 5 key characteristics of clouding computing, without which it is NOT cloud computing... (OBRRM) |
|
Definition
On-Demand Self-Service Broad Network Access (always on, always accessible) Resource Pooling Rapid Elasticity (pay per use) Measured Service |
|
|
Term
Key components and characteristics of IaaS Cloud Service Deployment Model |
|
Definition
Scale Converged network and IT capacity pool Self-service and on-demand capacity High reliability and resilience |
|
|
Term
|
Definition
Usage is metered and priced on basis of units consumed
Ability to scale up and down based on actual usage
Reduced ownership
Reduced energy and cooling costs |
|
|
Term
Key capabilities and characteristics of PaaS cloud deployment model |
|
Definition
Support multiple programming languages and frameworks
Multiple hosted environments (dev/test/prod)
Flexibility
Allow choice and reduce "lock-in"
Ability to "auto-scale" (key driver for apps that experience seasonal peaks and drops in load) |
|
|
Term
|
Definition
Operating system can be changed and upgraded frequently
Supports globally distributed development teams working in same environment
Services are available and can be obtained from diverse sources that cross international borders
Upfront and recurring/ongoing costs significantly reduced |
|
|
Term
What are the two delivery models of SaaS? |
|
Definition
Hosted application management (e.g. Webex)
Software on Demand (network based copies of software like word/excel) |
|
|
Term
Key characteristics of SaaS cloud deployment model |
|
Definition
Access apps anywhere, anytime
Overall reduction of costs
Application and software licencing (rent, not buy)
Reduced support costs
Back end systems and capabilities |
|
|
Term
|
Definition
Ease of use and limited/minimal administration
Automatic updates and patch management
Standardization and compatibility
Global accessibility |
|
|
Term
Benefits of Public Cloud deployment model |
|
Definition
Easy and inexpensive to setup (hardware, app and bandwidth covered by the provider)
Streamlined and easy-to-provision resources
Scalability to meed customer needs
No wasted resources - pay as you consume |
|
|
Term
Benefits of Private Cloud deployment model |
|
Definition
Increased control over data, underlying systems and applications
Ownership and retention of governance controls (no multi-tenancy)
Assurance over data location, removal of multiple jurisdiction legal and compliance requirements |
|
|
Term
Benefits of hybrid cloud environments |
|
Definition
Retain ownership and oversight of critical tasks and processes
Re-use previous investments in technology
Control over most critical business components and systems
Cost-effective means to fulfilling non-critical business functions
"Cloud bursting" and disaster recovery can be enhanced by hybrid cloud deployments |
|
|
Term
What is a Community Cloud? |
|
Definition
Provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns or mission, security requirements, policy, compliance considerations, etc.
May be owned, managed and operated by one or more of the organizations in the community, a third party or some combination ... |
|
|
Term
|
Definition
A collection of computer resources that are to be protected at the same level and are associated in some way. |
|
|
Term
What is zero knowledge cloud storage? |
|
Definition
Where the cloud provider cannot see the customer's data because that data is encrypted client-side before it reaches the cloud provider, and the cloud provider does not have access to the encryption key. |
|
|
Term
What are X.509 certificates used for within a cloud environment? |
|
Definition
Validating users and devices within a cloud environment using a standard certificate format. |
|
|
Term
What is a certificate revocation list? |
|
Definition
Published by the Certificate Authority, its a list of certificates that have been revoked. Authenticating clients look at this list before validating a cert. |
|
|
Term
What is online certificate status protocol? (OCSP) |
|
Definition
A protocol used for obtaining the revocation status for X.509 certificates. |
|
|
Term
IPsec Transport Mode - what's encrypted? |
|
Definition
|
|
Term
IPsec tunnel mode - what's encrypted? |
|
Definition
|
|
Term
|
Definition
Internet Key Exchange - how key exchange is handled in IPSEC |
|
|
Term
|
Definition
Payload, headers and trailers are all encrypted - all data along a com path (telephone, T1, satellite link) |
|
|
Term
What's better IPSEC or SSL/TLS? |
|
Definition
IPSEC because entire link is encrypted, not just app-to-app communications |
|
|
Term
What is S-RPC, and how does it handle key exchange? |
|
Definition
Secure - Remote Procedure Call. Key exchange handled using Diffie-Hellman key exchange |
|
|
Term
Name two ways to defend against man-in-the-middle attacks |
|
Definition
Time/date stamps Sequencing Two-way authentication using CA (in TLS) DNSSEC Calculating latency expectations and comparing response times |
|
|
Term
|
Definition
Secure Multipurpose Internet Mail Extensions - Standard for encrypting and digtally signing email containing attachments - Developd to countermeasure message interception and forgery - Provides data integrity, confidentiality and authentication (but not non-repudia |
|
|
Term
What is Homomorphic Encryption? |
|
Definition
Enables the processing of encrypted data without the need to decrypt the data.
- Strongest form of encryption - Process, not an algorithm - Allows the cloud customer to upload data to a CSP for processing without the requirement to decipher the data first |
|
|
Term
Contrast Remote Key Management Service with Client Side Key Management. Which is better? |
|
Definition
Remote Key Management Service is where the cloud customer owns, operates and maintains a key management system on premises, and their systems deployed in the cloud connect the KMS.
Client Side Key Management - similar to Remote Key Management service, except that most of the processing and control is done on the customer/cloud user side. Client side looks ot put the customer or cloud user in complete control of encryption and decryption keys.
FOR THE EXAM: Client-side Key Management viewed as better |
|
|
Term
|
Definition
Where a cloud customer may be unable to leave, migrate or transfer to an alternate provider due to technical or non-technical constraints. |
|
|
Term
Name three methods or approaches to ensuring interoperability and transfer of large data sets to alternate providers? |
|
Definition
Standardization Centralized Directory Service SLA provisions regarding open/standardized operation methods |
|
|
Term
What is cryptographic erasure? |
|
Definition
When you encrypt data and then throw away/destroy the key.
Better than overwriting data (which can be recovered from a magnetic disc).
However, keys must be destroyed correctly and not leave any exposure to side-channel/"implementation" attacks (forensics). |
|
|
Term
What type of drives require cryptographic erasure of data? |
|
Definition
Solid state drives (flash, etc) - because they aren't magnetic media and can't be degaussed. |
|
|
Term
What is a Type I Hypervisor? |
|
Definition
Run directly on the hardware with VM resources provided by the hypervisor
"bare metal" or hardware hypervisors
Examples: VMWare ESXI and Citrix XenServer |
|
|
Term
What is a Type II Hypervisor? |
|
Definition
Run on a host operating system to provide virtualization services.
Operating System Hypervisor
Examples: VMWare Workstation and Microsoft Virtual PC |
|
|
Term
Which type of Hypervisor is viewed as less secure? |
|
Definition
Type II - OS - because more vulnerabilities associated with OS/software layer than hardware layer, and software vulnerabilities are more attractive to attackers. |
|
|
Term
|
Definition
Software that routes network packets to a given virtual OS instance in a virtualized environment.
NOTE WELL: If a vswitch goes down, many instances affected. With a hardware switch, only those endpoints physically connected to the bad ports and/or the switch go down. |
|
|
Term
|
Definition
The act of investigating and understanding the risks a company faces |
|
|
Term
|
Definition
The development and implementation of policies and procedures to aid in protecting the company, its assets and its people from threats |
|
|
Term
|
Definition
The development and implementation of policies and procedures to aid in protecting the company, its assets and its people from threats |
|
|
Term
|
Definition
Common type of attack where the malicious software crashes the guest OS to get out of it, then running malicious code on the host OS. Allows malicious VMs to take complete control of the host OS. |
|
|
Term
Name several types of Hypervisor attacks |
|
Definition
VM Escape Hyperjacking BLUEPILL Vitriol SubVir DKSM |
|
|
Term
What threats are introduced with multi-tenancy in a cloud environment? |
|
Definition
Information leakage among separate tenants (when sharing same storage areas, servers/VMs, etc
Increased attack surface potentially leading to VM-to-VM or VM-to-hypervisor compromise. |
|
|
Term
Should PaaS tenants have shell access to the servers that run the platform software? Why or why not? |
|
Definition
No - shouldn't have shell access. This limits the chance and likelihood of configuration or system changes impacting multiple tenants. |
|
|
Term
Name one major challenge of security in a PaaS implementation |
|
Definition
User level permissions - keeping them separated between clients and keeping them from inadventently growing over time. |
|
|
Term
Name one major security challenge for SaaS |
|
Definition
Data segregation - keeping one customer's data separate from another's in a multi-tenancy environment. |
|
|
Term
Name 3-5 of the OWASP Top 10 Web Application Vulnerabilities/exploits: |
|
Definition
Injection Cross-Site Scripting (XSS) Cross-site Request Forgery (CSRF) Insecure direct object references Broken authentication and session management Missing function-level access control Unvalidated redirects and forwards |
|
|
Term
Name the 6 phases of the Cloud Secure Data Life Cycle |
|
Definition
Create Store Use Share Archive Destroy |
|
|
Term
During what phase of the Cloud Data Life Cycle should information classification happen? |
|
Definition
|
|
Term
For BCP with the cloud, what are two critical success factors? |
|
Definition
1) Clearly state and ensure the SLA addresses which components of the business continuity/disaster recovery are covered and to what degree
2) Understanding your responsibilities vs. the cloud provider's responsibilities |
|
|
Term
What does the ISO/IEC 27001 Standard include? |
|
Definition
Standards for information security management system / best practices |
|
|
Term
What does NIST SP 800-53 contain? |
|
Definition
A catalog of controls for information technology |
|
|
Term
What do the SOC I/II/III standards involve? |
|
Definition
Vendor assurance, conducted by a third party |
|
|
Term
What does the PCI DSS standard cover? |
|
Definition
Payment card data security |
|
|
Term
What does FIPS 140-2 cover? |
|
Definition
Standards for encryption for devices (Note: This is a NIST standard) |
|
|
Term
What do SOC I, II and III cover? |
|
Definition
SOC I = financial statements
SOC II = IT managed service providers and cloud providers (more comprehensive info than SOC III - for existing customers)
SOC III = Also covers IT managed service providers, but is written for an audience of potential future customers, contains less specific info and is more broadly distributed than SOC II |
|
|
Term
What's the difference between a SOC Type I vs. Type II assessment? |
|
Definition
Type I = point in time Type II = over a range of time |
|
|
Term
What SOC assessment would a consumer of Cloud services typically look for? |
|
Definition
|
|
Term
Which SOC assessments use the 5 "Trust Service Principles"? |
|
Definition
|
|
Term
What are the 5 SOC "Service Trust Principles"? |
|
Definition
Security Availability Processing Integrity Confidentiality Privacy |
|
|
Term
|
Definition
"Common Criteria" Developed for evaluating information security products, and ensuring that they meet an agreed-upon security standard for government entitles and agencies. |
|
|
Term
What are the two key components of the Common Criteria (ISO/IEC 15480)? |
|
Definition
Protection Profiles (=security requirements)
Evaluation Assurance Levels (EAL) - range from EAL1 to EAL7, with EAL7 being the highest assurance level |
|
|
Term
For FIPS 140-2, how many security levels are there and what's the highest? |
|
Definition
4, with Security Level 4 being the highest |
|
|
Term
What does a "Cloud Developer" do? |
|
Definition
Focuses on development for the cloud infrastructure *itself*. |
|
|
Term
What is a Cloud Services Broker (CSB)? |
|
Definition
Third party entity or company that looks to enhance value to multiple customers of cloud-based services through relationships with multiple cloud service providers. |
|
|
Term
|
Definition
An open source cloud computing and IaaS platform for enabling private clouds. |
|
|
Term
What's the difference between Eucalyptus and Apache Cloud Stack? |
|
Definition
Both are open source IaaS software resources, but Eucalyptus focuses on private clouds, whereas Apache covers all cloud deployment models. |
|
|
Term
What does the Jericho Forum's Cloud Model illustrate? |
|
Definition
How combinations of cloud service models, deployment models, physical locations of resources and attribution of management of ownership can be interwoven to produce various cloud deployment scenarios, in order to understand how cloud computing affects the way in which security might be approached. |
|
|
Term
The lower down the cloud stack you go, the more the burden of security is placed on the ....... |
|
Definition
|
|
Term
What are some of the benefits of Security As a Service? |
|
Definition
Cost-cutting Consistent and uniform protection Constant virus definition updates that are not reliant on user compliance Greater security expertise than is typically available within an organization Faster user provisioning Outsourcing of administrative tasks, such as log management, to save time and money and allow an organization to devote more time to its core competencies A web interface that allows in-house administration of some tasks as well as a view of the security environment and ongoing activities |
|
|