Cloud Security Flashcards

(31 cards)

1
Q

Inherited Controls

A

Fully managed by the cloud provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Shared Controls

A

Responsibilities shared between the cloud provider and the client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Shared Responsibility Model

A

Defines which security tasks are handled by the cloud provider and which are handled by the client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Customer-to-cloud Connectivity

A

Refers to the secure connection established between a customer’s network and the cloud provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cloud Service Integration

A

Involves securely linking different cloud services and platforms to work together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Shadow IT Detection

A

Process of identifying and managing unauthorized cloud services or applications that employees may install and use without the IT team’s knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Unsecured Storage Resources

A

Refer to cloud storage that lacks proper security configurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Leakage

A

Refers to the unauthorized transmission of data from within the cloud environment to external parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Remanence

A

Residual data that remains on storage devices after deletion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AWS Storage Resource

A

Buckets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Azure Storage Resource

A

Blobs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cross-Origin Resource Sharing (CORS)

A

Used when data is shared across different domains to control how resources are shared between these domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

API Security

A

Protects APIs from unauthorized access, misuse, and attacks to ensure secure interactions between applications and cloud services
Components include authorization, rate limiting, and logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In API security, authorization is typically implemented through ___

A

Token-based systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CASB

A

Cloud Access Security Broker
A security solution that acts as a control point between cloud service users and cloud applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

API-based CASB

A

Integrates directly with cloud services and uses APIs to monitor and control data flow, enforce security policies, and provide visibility into cloud usage without affecting user experience

17
Q

Proxy-based CASB

A

Routes cloud traffic through a proxy server, allowing real-time inspection, threat prevention, and enforcement of security policies by sitting between the user and the cloud service

18
Q

Forward Proxy CASB

A

CASB is positioned at the edge of the user’s network, ensuring user compliance with security policies before they reach the cloud. Intercepts all user traffic.

19
Q

Reverse Proxy CASB

A

CASB is positioned between the user and the cloud service. Only intercepts and inspects traffic headed to cloud services.

20
Q

Terraform

A

An Infrastructure as Code (IaC) tool, automating the provisioning of cloud infrastructure

21
Q

Ansible

A

Automation tool that focuses on configuration management, application deployment, and task automation
Operates using playbooks, which are simple YAML files that describe the tasks to be executed

22
Q

OWASP Dependency-Check

A

Widely used tool that scans dependencies for known vulnerabilities across various programming languages

23
Q

npm audit

A

Focuses on scanning dependencies in JavaScript and Node.js projects

24
Q

CI/CD Pipeline

A

Continuous Integration/Continuous Development
Automated process of integrating, testing, and deploying code changes in a secure and efficient manner

25
Continuous Integration
Involves regularly merging code changes into a shared repository, where automated tests and security scans are run
26
Continuous Deployment
Automatically deploys tested code to production environments
27
Phases of CI/CD Pipeline
Source code integration Automated Testing Build and Deployment Monitoring and Feedback
28
Serverless Computing
Running application code without managing the underlying infrastructure
29
Serverless Computing - Workloads
Refer to specific tasks or operations that the serverless functions execute
30
Serverless Computing - Functions
The individual units of work in a serverless architecture, where each function performs a specific task
31
Microservices Architecture
In this setup, each function is designed to perform a single task, and multiple functions interact to create a complete application