week 12 Flashcards

cloud security (30 cards)

1
Q

Why does cloud homogeneity make security auditing easier?

A

Because standardised infrastructure reduces variability, making tests, patches, and configurations consistent across large environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

State two reasons cloud providers often have better security than on-premise IT.

A

They have dedicated security teams and higher investment in advanced security infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does “you can outsource responsibility but not accountability” mean in cloud security?

A

Even if a CSP handles operations, the organization remains legally and ethically accountable for breaches and data misuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why are companies still afraid to adopt cloud services?

A

Mainly due to loss of control, lack of trust, multi-tenancy risks, and governance issues like failing SLAs or unfriendly data-center jurisdictions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain the difference between responsibility and accountability in cloud security.

A

The CSP is responsible for operations; the customer is accountable for the results, compliance, and consequences of breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the top three customer security concerns according to survey data?

A

IP/data protection, regulatory enforcement, and unauthorized data use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why is multi-tenancy a major risk in cloud computing?

A

Multiple customers share infrastructure; isolation failure could expose data or allow cross-tenant attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe one method to minimize lack of trust in cloud environments.

A

Use policy languages and certifications (like ISO 27001) to enforce transparent and standardized security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does the shift from private to public cloud create a perception of loss of control?

A

Organizations no longer know exactly where data resides, who manages it, or how it’s backed up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What high-level concern is created by the need to comply with laws like SOX or HIPAA in the cloud?

A

Some workloads cannot legally move to the cloud without auditability and strict control guarantees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List the four major “PAIN” security fundamentals.

A

Privacy, Authorization/Authentication, Integrity, Non-repudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is “Assured Information Access” now considered a fifth security requirement?

A

Modern threats (DDoS, worms) require guaranteeing reliable access even under attack conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which cloud threat involves consuming a victim’s resources without direct compromise?

A

Economic Denial of Service (EDoS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Give an example of “Customer Isolation Failure”.

A

A vulnerability in the hypervisor that allows one VM to access another customer’s data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is insecure data deletion a major cloud risk?

A

Deleted data may still exist on shared storage systems, leading to unauthorized recovery by others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain how subpoenas and legal jurisdiction changes create cloud risk.

A

Governments may demand access to data stored in their territory, even without customer consent.

17
Q

Why must organizations demand the right to audit their cloud provider?

A

To ensure compliance, security controls, and integrity of stored data, especially for regulated industries.

18
Q

What is the key challenge in data lifecycle management in the cloud?

A

Assuring proper data destruction and tracking replicas across distributed systems.

19
Q

What is the role of Business Continuity/Disaster Recovery (BC/DR) in cloud security?

A

Ensures resilience, guarantees recovery locations, validates SLAs, and protects mission-critical workloads.

20
Q

Why is interoperability critical for long-term cloud success?

A

It prevents vendor lock-in and supports migration across cloud platforms using open standards.

21
Q

Why must sensitive cloud data always be encrypted?

A

To protect confidentiality when stored, transmitted, or accessed in multi-tenant environments.

22
Q

What is a major risk of VM image provisioning in virtualized clouds?

A

Insecure or untrusted images may contain vulnerabilities or backdoors.

23
Q

Why is federated identity management essential in cloud services?

A

It allows secure cross-platform authentication while maintaining strong password and SSO policies.

24
Q

What privacy risk arises from cross-jurisdictional storage?

A

Data might be governed by foreign laws, leading to unauthorized government access or weaker privacy protections.

25
Why must storage architectures avoid spanning trust boundaries?
Data from different security zones may intermingle, increasing risk of leaks or unauthorized access.
26
Provide one example of how physical security affects cloud security.
Unauthorized staff may access servers in data centers and steal or tamper with equipment.
27
What is the key challenge in protecting hosts in SaaS/PaaS environments?
The customer cannot control the host OS, yet remains responsible for data security and management.
28
Why is hypervisor security critical in cloud computing?
If compromised, attackers gain control over multiple virtual machines hosted on the same hypervisor.
29
What governance requirement must be included in every cloud SLA?
Availability, service quality, incident response times, and metrics like KPIs and CSFs.
30
Why is “loss of logs” considered a high-risk cloud threat?
Logs are essential for audit, forensics, accountability, and proving whether a breach occurred — without logs, investigations fail