Information Technology /Security+ (SY0-701): Lesson 6: Secure Cloud Part 2

Security+ (SY0-701): Lesson 6: Secure Cloud Part 2

Information Technology45 CardsCreated about 2 months ago

This deck covers key concepts related to cloud deployment models, service models, architectures, and vendor management in cloud computing.

What protocol is the foundation of Application virtualization?

HTLM5 because users can access them through ordinary web browser software.

Tap or swipe ↕ to flip
Swipe ←→Navigate
SSpeak
FFocus
1/45

Key Terms

Term
Definition

What protocol is the foundation of Application virtualization?

HTLM5 because users can access them through ordinary web browser software.

Define 'Containerization'

Enforces resource separation at the operating system level and containing everything required to run a service, application, or microservice.

How does an OS separate containers?

OS defines isolated "cells" for each user instance to run in and is allocated CPU and memory resources.

Define a 'virtual private cloud (VPC)'

A private network segment made available to a single cloud consumer on a public cloud.

What are typical services of a virtual private cloud (VPC)?

Authentication, web applications, and communications.

What is the infrastructure used to support a virtual private cloud (VPC)?

Applications are developed as functions and microservices, each interacting with other functions to facilitate client requests.

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition

What protocol is the foundation of Application virtualization?

HTLM5 because users can access them through ordinary web browser software.

Define 'Containerization'

Enforces resource separation at the operating system level and containing everything required to run a service, application, or microservice.

How does an OS separate containers?

OS defines isolated "cells" for each user instance to run in and is allocated CPU and memory resources.

Define a 'virtual private cloud (VPC)'

A private network segment made available to a single cloud consumer on a public cloud.

What are typical services of a virtual private cloud (VPC)?

Authentication, web applications, and communications.

What is the infrastructure used to support a virtual private cloud (VPC)?

Applications are developed as functions and microservices, each interacting with other functions to facilitate client requests.

Define a 'Microservice'

An independent, single-function module with well-defined and lightweight interfaces and operations.

What is the purpose of a 'Microservice'

Architectural approach to building software applications as a collection of small and independent services focusing on a specific business capability.

Define 'Infrastructure as Code (IaC)'

Deployment/management of infrastructure is performed by scripted automation and orchestration using machine-readable definition files.

List different file types that contain code that is read and executed by machines in Infrastructure as Code (IaC)

YAML, JSON, and HCL (HashiCorp Configuration Language.)

What is defined in files like YAML, JSON, and HCL (HashiCorp Configuration Language)?

Configuration settings, networking requirements, security policies, and other settings.

What is the main purpose of Infrastructure as Code (IaC)?

Infrastructure can be deployed and managed automatically and consistently, reducing the risk of errors caused by manual intervention.

What is a secondary benefit of Infrastructure as Code (IaC)?

Replicate infrastructure across different environments, such as development, staging, and production, to ensure that the environments are consistent.

Define 'Edge Computing'

Cloud networking concept utilizing distributed computing resources to minimize the distance data needs to travel.

What is the purpose of edge computing?

To reduce network latency and improve responsiveness.

Define 'software-defined networking (SDN)'

Networking model with APIs and compatible network appliances enabling programmable networking.

What are the 3 'planes/levels' of software-defined networking (SDN)?

  1. Control Plane

  2. Data Plane

  3. Management Plane

Define the 'Control Plane'

Makes decisions about how traffic should be prioritized, secured, and where it should be switched.

Define the 'Data Plane'

Handles the switching and routing of traffic and enforcement of security access controls.

Define the 'Management Plane'

Monitors traffic conditions and network status.

What is the management plane comprised of?

Administrators and their devices along with front end management.

How are decisions from the control plane processed at the data plane?

A network controller application, which interfaces with the network devices using APIs.

Define a 'northbound API'

Interface between the SDN applications and the SDN controller (Control plane to Management plane).

Define 'southbound API'

Interface between the SDN controller and the SDN appliances (Control plane to Data plane).

Define an 'Interconnection Security Agreement (ISA)'

Establishes the security requirements and responsibilities between the organization and the cloud service provider.

What is the purpose of an Interconnection Security Agreement (ISA)

To define encryption methods, access controls, vulnerability management, data segregation techniques, specify data ownership, audit rights, and data backup, recovery, and retention procedures.

What are the two main cloud security considerations?

Data protection and pathing of services.

Define 'Software-Defined Wide Area Network (SD-WAN) '

Services that use software-defined mechanisms and routing policies to implement virtual tunnels and overlay networks over transport networks.


What is the purpose of an organization implementing Software-Defined Wide Area Network (SD-WAN)?

Enables organizations to connect their various branch offices, datacenters, and cloud infrastructure over a wide area network (WAN).

Define 'Secure Access Service Edge (SASE)'

Combines security services like firewalls, identity and access management, and secure web gateway with networking services such as SD-WAN to provide access to cloud applications.

Define an 'Embedded system'

Electronic system that is designed to perform a specific, dedicated function.

What are examples of items that use embedded systems?

Smartphones, Automotive systems, medical devices, aerospace and defense.

Define a 'Real-Time Operating Systems (RTOS)'

A type of OS high levels of stability and processing speed to ensure consistent response.

Define 'Internet of Things (IoT)'

The network of physical devices, and other objects embedded with sensors, software, and connectivity, enabling them to collect and exchange data.

How does oversaturation of IoT devices cause security risk?

Too many devices to manage securely; IoT devices are designed with limited processing power and memory, making it difficult to implement strong security controls.

Define 'zero trust'

Security design paradigm where every/any request (host-to-host or container-to-container) must be authenticated before being allowed.

Define 'Deperimeterization'

Security approach that shifts the focus from defending a network's boundaries to protecting individual resources and data within the network.

How is deperimeterization achieved?

Authentication, encryption, access control, and continuous monitoring to maintain the security of critical resources regardless of location.

What are the 3 fundamental concepts of zero trust architecture?

  1. Adaptive Identity

  2. Threat scope reduction

  3. Policy-driven access control

Define 'Adaptive Identity'

Recognizes that user identities are not static and that identity verification must be continuous and based on a user's current context and the resources they are attempting to access.

Define 'Threat scope reduction'

Similar to role based access/least privilege; access is limited to only those resources required to complete a specific task.

Define 'Policy-driven access control'

Attribute Based Access Control (ABAC); Access control policies enforce access restrictions based on user identity, device posture, and network context.

Define 'device posture'

Refers to the security status of a device, including its security configurations, software versions, and patch levels.

Combining a software defined networking, and zero trust architecture, what is the role of the control plane?

Defines/manages policies that dictate how users and devices are authorized to access network resources.

Combining a software defined networking, and zero trust architecture, what is the role of the data plane?

Systems in the data plane establish sessions for secure information transfers between resources.