What is Security Architecture?
Design, structure, and behavior of an organization’s information security environment
It encompasses various models and techniques to protect information assets.
What are the two types of deployment models in security architecture?
On-Premise refers to traditional local infrastructure, while Cloud involves delivery of computing services over the internet.
Name three cloud security considerations.
These considerations address potential risks in cloud environments.
What is Serverless Computing?
Cloud provider manages server allocation; developers focus solely on writing code
It allows developers to deploy functions without managing server infrastructure.
Define Microservices Architecture.
Collection of small, autonomous services; each performs a specific business process
This architecture contrasts with traditional monolithic systems.
What does Infrastructure as Code (IaC) entail?
Automation of managing and provisioning technology stack
IaC uses code for infrastructure management, enhancing consistency and efficiency.
What are the benefits of Hybrid Solutions?
Hybrid solutions combine on-premise and cloud services for flexibility.
What is a Single Point of Failure?
A reliance on specific resources or processes that can lead to system-wide outages if they fail
Mitigation includes implementing redundancy and failover procedures.
True or False: Cloud security is a shared responsibility.
TRUE
Both the cloud service provider and the customer share responsibilities for security.
What are the two types of Hypervisors?
Type 1 runs directly on hardware, while Type 2 operates within a standard OS.
What is Data Remnants?
Residual data left behind after deletion or erasure processes
In cloud environments, data may not be completely removed, posing a security risk.
What are the key benefits of Containerization?
Containerization encapsulates applications with their OS environment.
What does User Access Management aim to prevent?
Unauthorized access to sensitive data and systems
Mitigation strategies include enforcing strong password policies and implementing multi-factor authentication.
What is the Responsibility Matrix in cloud computing?
Outlines the division of responsibilities between the cloud service provider and the customer
It clarifies who is responsible for various aspects of security and management.
What is Logical Separation?
Establishes boundaries within a network to restrict access to certain areas
Implemented using firewalls, VLANs, and network devices.
What are the challenges of Microservices?
The distributed nature of microservices increases the attack surface and management complexity.
What is Software-Defined Networking (SDN)?
Dynamic, programmatically efficient network configuration
SDN improves network performance and monitoring by decoupling control and forwarding functions.
What is the key advantage of IaC?
Operation consistently produces the same results
Crucial for consistency and reliability in multiple environments.
What is the difference between Physical and Logical Separation?
Physical separation is often referred to as ‘Air Gapping’.
What are the risks associated with centralized architecture?
Centralized systems can disrupt the entire network if a server fails and struggle to handle growth.
What are the benefits of decentralized architecture?
Decentralized systems can continue functioning despite individual node failures and support remote work.
What are the considerations for choosing between centralized and decentralized systems?
The choice depends on the organization’s specific needs and context.
Define Internet of Things (IoT).
Network of physical devices with sensors, software, and connectivity
IoT enables data exchange among connected objects.
What is the role of a Hub/Control System in IoT?
Central component connecting IoT devices
It collects, processes, analyzes data, and sends commands.