CompTIA Security+ (SY0-601): Cloud Security
This section explores key virtualization technologies such as hyper convergence, which integrates storage, networking, and compute resources, and Virtual Desktop Infrastructure (VDI), delivering full desktops from centralized servers. It also covers secure enclaves and secure volumes, which protect sensitive data at rest and during processing through hardware-based and encryption-based methods.
Hyperconvergence
Allows providers to fully integrate the storage, network, and servers
Key Terms
Hyperconvergence
Allows providers to fully integrate the storage, network, and servers
VDI
Virtual Desktop Infrastructure:
VDI allows a cloud provider to offer a full desktop ope...
Secure Enclaves & Secure Volumes
Secure Enclaves:
Utilize 2 distinct areas that the data may be stored/accessed from
Can only be accessed by the pr...
SECaaS
Security as a Service:
Provides your organization with various types of security services without the need to maintai...
Sandboxing
Utilizes separate virtual networks to allow security professionals to test suspicious or malicious files
VPC
Virtual Private Cloud:
A private network segment made available to a single cloud consumer within a public cloud
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
Hyperconvergence | Allows providers to fully integrate the storage, network, and servers |
VDI | Virtual Desktop Infrastructure: VDI allows a cloud provider to offer a full desktop operating system to an end user from a centralized server |
Secure Enclaves & Secure Volumes | Secure Enclaves: Secure Volumes: |
SECaaS | Security as a Service: Anti-malware solutions were one of the first SECaaS products |
Sandboxing | Utilizes separate virtual networks to allow security professionals to test suspicious or malicious files |
VPC | Virtual Private Cloud: The consumer is responsible for configuring the IP address space and routing within the cloud VPC is typically used to provision internet-accessible applications that need to be accessed from geographically remote sites Be aware of the possibility of vendor lock in |
CASB | Cloud Access Security Broker: Enterprise management software designed to mediate access to cloud services by users across all types of devices • Single sign-on • Malware and rogue device detection • Monitor/audit user activity • Mitigate data exfiltration Cloud Access Service Brokers provide visibility into how clients and other network nodes use cloud services |
CASB: Forward Proxy | A security appliance or host positioned at the client network edge that forwards user traffic to the cloud network if the contents of that traffic comply with policy An “internal proxy” WARNING: Users may be able to evade the proxy and connect directly |
CASB: Reverse Proxy | An appliance positioned at the cloud network edge and directs traffic to cloud services if the contents of that traffic comply with policy Inbound traffic from the Internet to your internal service WARNING: This approach can only be used if the cloud application has proxy support |
CASB: API | Application Programming Interface: WARNING: Dependent on the API supporting the functions that your policies demand |
API | A library of programming utilities used to enable software developers to access functions of another application APIs allow for the automated administration, management, and monitoring of a cloud service |
FaaS | Function as a Service: |
Serverless | A software architecture that runs functions within virtualized runtime containers in a cloud rather than on dedicated server instances Everything in serverless is developed as a function or microservice Serverless eliminates the need to manage physical or virtual servers The underlying architecture is managed by the cloud service provider |
Cloud Threats: Insecure API | WARNING: An API must only be used over an encrypted channel (HTTPS) Data received by an API must pass service-side validation routines Implement throttling/rate-limiting mechanisms to protect from a DoS |
Cloud Threats: Improper Key Management | APIs should use secure authentication and authorization such as SAML or OAuth/OIDC before accessing data WARNING: Do not hardcode or embed a key into the source code Do not create one key with full control to access an application’s functions Delete unnecessary keys and regenerate keys when moving into a production environment |
Cloud Threats: Insufficient Logging/Monitoring | WARNING: Software as a service may not supply access to log files or monitoring tools Logs must be copied to non-elastic storage for long-term retention |
Cloud Threats: CORS Policy | Cross Origin Resource Sharing Policy: WARNING: Weak CORS policies expose the site to vulnerabilities like XSS |
Security Groups | Firewall for compute instances |
Instance Awareness | Granular security controls Define & set policies |
Next-gen SWG (Secure Web Gateway) | Protect users & devices Monitor API usage Examine JSON strings & API requests Allow/disallow certain activities Instance-aware security Combines CASB, DLP, & Web Security |