Section 3.6

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Cloud Access Security Broker (CASB)

A software tool or service that enforces cloud-based security requirements. It is placed between the organization's resources and the cloud, monitors all network traffic, and can enforce security policies.

Virtual Network

A software-based network that exists between devices on a physical network.

Application Security

Code written/ measures taken at the application level to thwart attacks such as, SQL injection, brute force attack, network eavesdropping, and etc.

Firewall considerations in a cloud environment

Cost: Need for segmentation: Open systems Interconnection (OSI) Layers

Resource policies

If managed improperly, which of the following would be most detrimental to access management of cloud-based storage resources?

Encryption

Process of converting readable data into unreadable characters to prevent unauthorized access.

Replication

The act of replicating data across multiple systems is part of the resiliency of the cloud, in that single points of failure will not have the same effects that occur in the standard IT enterprise

Integration and auditing

The integration of the appropriate level and quantity of security controls is a subject that is always being audited

third-party solutions

The tools offered from companies not owned by the corporation.

Dynamic Resource Allocation

Upgrading or downgrading cloud resources based on demand.

Next Generation Source Web Gateway

a network security service located between the users and the Internet

Public Subnet

a subnet that is accessible from the internet

Private subnet

a subnet that is not accessible from the internet

API inspection and integration

an active measure to prevent errors from propagating through a system and causing trouble

Security Groups

composed of the set of rules and policies associated with a cloud instance

Virtual private cloud endpoint

connections to and from a virtual private cloud instance.

Cloud Native Controls

provider offers an enterprise subscription as part of the user agreement and service license

High Availability (HA)

refers to measures that can be implemented to prevent the entire system from failing if some components of the system fail

Permissions

restricting or granting of access to specific files and folders on a computer network to a user or group of users.

Instance Awareness

the name of a capability that must be enabled on firewalls, secure web gateways, and cloud access security brokers (CASBs) to determine if the next system in a communication chain is legitimate or not

Segmentation

the network process of separating network elements into segments and regulating traffic between the segments

container security

the process of implementing security tools and policies to ensure your container is running as intended

Secrets management

the term used to denote the policies and procedures employed to connect the IAM systems of the enterprise and the cloud to enable communication with the data


Kaugnay na mga set ng pag-aaral

BIOLOGY - UNIT 7: PLANTS: GREEN FACTORIES

View Set

Six Sigma Roles and Responsibilities Practice

View Set

Exam 2 - African American History

View Set

EHAP Scientific Revolution & Enlightenment Study Guide

View Set

RN QBank Missed Questions--> Safe and Effective Care Environment (Management of Care and Safety and Infection Control)

View Set