Module 7_Cloud and Virtualization Security

0.0(0)
Studied by 3 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/83

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:47 AM on 5/18/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

84 Terms

1
New cards

Cloud Computing

It is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.

2
New cards

Amazon Web Services (AWS),

Google Cloud,

Oracle,

VMware,

Microsoft Azure

Cloud Providers (5)

3
New cards

Cost efficiency,

Scalability,

Enhanced Collaboration and Accessibility,

Security and Reliability,

Automatic Software Updates,

Environmental Sustainability

Benefits of Cloud Computing (6)

4
New cards

Cost efficiency

Reduces capital expenditure by avoiding heavy investment in hardware and data centers.

5
New cards

Pay-as-you-go,

Reduced Maintenance,

Lower Entry Barrier

Cost efficiency (3)

6
New cards

Scalability

Resources can be scaled up or down dynamically based on demand.

7
New cards

Vertical Scaling,

Horizontal Scaling,

Elasticity

Scalability (3)

8
New cards

Enhanced Collaboration and Accessibility

Data and applications can be accessed globally with an internet connection.

9
New cards

Remote work,

Device Independence,

Version Control

Enhanced Collaboration and Accessibility (3)

10
New cards

Security and Reliability

Cloud providers typically invest more in security infrastructure than most individual companies can afford.

11
New cards

Data Encryption,

Redundancy,

Disaster Recovery

Security and Reliability (3)

12
New cards

Automatic Software Updates

Cloud-based applications automatically refresh and update themselves.

13
New cards

Security Patches,

Feature Access

Automatic Software Updates (2)

14
New cards

Environmental Sustainability

Cloud computing is generally more “green” than traditional on-site data centers.

15
New cards

Resource Efficiency,

Reduced Carbon Footprint

Environmental Sustainability (2)

16
New cards

On-demand self-service,

Broad network access,

Resource pooling,

Rapid elasticity,

Measured service

Core Characteristics of Cloud Services (5)

17
New cards

On-demand self-service

  • User control and automation.

  • Users provision resources automatically without human intervention.

18
New cards

Autonomy,

Speed

On-demand self-service (2)

19
New cards

Broad network access

  • Connectivity from any device/location.

  • Resources are accessible via various devices such as mobile phones, tablets, and laptops

20
New cards

Ubiquity,

Multi-device support

Broad network access (2)

21
New cards

Resource pooling

  • Efficiency through shared hardware.

  • Multi-tenant model where resources are shared but isolated among users.

22
New cards

Shared Infra,

Location Independence

Resource pooling (2)

23
New cards

Rapid elasticity

  • Flexibility to handle workload changes.

  • Automatic scaling of resources to meet workload changes.

24
New cards

Dynamic Adjustment,

Infinite Scalability

Rapid elasticity (2)

25
New cards

Measured service

  • Transparency and pay-per-use billing.

  • Monitoring and reporting of resource usage for transparency and cost management.

26
New cards

Transparency,

Utility Pricing

Measured service (2)

27
New cards

Public Cloud,

Private Cloud,

Hybrid Cloud,

Community Cloud,

Types of Clouds (4)

28
New cards

Public Cloud

  • Shared infrastructure accessible over the Internet to many customers.

  • Examples

    • AWS,

    • Google Cloud,

    • Azure.

  • Ownership:

    • Third-party provider

  • Tenancy:

    • Multi-tenant (Resources are shared with other organizations)

  • Cost:

    • Low; Pay-as-you-go model with no hardware investment

  • Best for:

    • Startups, web applications, and non-sensitive data processing.

29
New cards

Private Cloud

  • Dedicated to a single organization, either on-premises or hosted externally.

  • Can be hosted on-premises or externally managed by third parties.

  • Ownership:

    • The organization itself or a specialized provider.

  • Tenancy:

    • Single-tenant (Dedicated Resources)

  • Cost:

    • High; requires significant investment in hardware and specialized staff.

  • Best for:

    • Government agencies, financial institutions, or large enterprises with strict security and regulatory requirements.

30
New cards

Hybrid Cloud

  • Combination of public and private clouds allowing data and app sharing between them.

  • Often employed in Custom enterprise solutions

  • Structure:

    • Uses a private cloud for sensitive, core workloads and a public cloud for “cloud bursting” (handling of sudden spikes in traffic).

  • Flexibility:

    • Provides the most control, allowing organizations to keep critical assets is secure environment while utilizing the cost-effectiveness of the public cloud when needed.

  • Best for:

    • Organizations with fluctuating workloads or those transitioning from on-premise systems to the cloud.

31
New cards

Community Cloud

  • Shared by several organizations with similar requirements such as security or compliance.

  • Used by groups such as government agencies to meet specific regulatory demands while reducing costs.

  • Ownership:

    • Managed and operated by the member organizations or a third party.

  • Tenancy:

    • Multi-tenant, but restricted to a specific group.

  • Cost:

    • Shared among the community members, making it cheaper than a full private cloud.

  • Best for:

    • Healthcare organizations sharing patient data, or educational institutions collaborating on research projects.

32
New cards

On-premises,

Off-premises,

Fog Computing,

Edge Computing

Cloud Locations (4)

33
New cards

On-premises

  • Cloud infrastructure within an organization’s physical data center;

  • maximum control but high capital and operational costs.

34
New cards

Off-premises

  • Hosted by third-party providers;

  • offers scalability and cost savings but less physical control.

35
New cards

Fog Computing

Processing data closer to IoT devices at the network edge to reduce latency (e.g., smart traffic lights).

36
New cards

Edge Computing

Distributed computation near data source to optimize real-time applications such as manufacturing or autonomous vehicles.

37
New cards

Thin clients,

Transit gateways,

Serverless infrastructure

Cloud Architecture Components (3)

38
New cards

Thin clients

Low-performance computing devices that rely on a server to perform most of its processing tasks.

39
New cards

Transit gateways

A network transit hub that interconnects virtual private clouds (VPC) and on-premises networks.

40
New cards

Serverless infrastructure

An architecture where the cloud provider manages the setup, capacity planning, and server management, allowing developers to focus solely on the individual functions of their applications.

41
New cards

Software as a Service (SaaS),

Platform as a Service (PaaS),

Infrastructure as a Service (IaaS),

Everything-as-a-Service (XaaS)

Cloud Service Models (4)

42
New cards

Software as a Service (SaaS)

Software distribution model where applications are hosted by a third-party provider and made available to customers over the internet.

43
New cards

Platform as a Service (PaaS)

Offers hardware and software tools over the internet, typically those needed for application development.

44
New cards

Infrastructure as a Service (IaaS)

Provides virtualized computing resource: over the internet, offering complete control over the computing infrastructure.

45
New cards

Everything-as-a-Service (XaaS)

A collective term that refers to the delivery of anything as a service through cloud computing.

46
New cards

Efficient resource use,

Cost management,

Automation,

Performance monitoring,

Optimal service management

How to Properly Handle Cloud:

Cloud Management & Optimization Techniques (5)

47
New cards

Efficient resource use

Resource allocation, autoscaling (e.g., AWS autoscaling), and right-sizing to avoid overprovisioning and reduce cost.

48
New cards

Cost management

Tracking spending and optimizing service usage to identify savings.

49
New cards

Automation

Automating backups, scaling, and updates to reduce errors and operational load.

50
New cards

Performance monitoring

Continuous monitoring to detect and resolve issues proactively.

51
New cards

Optimal service management

Managing Service Level Agreements (SLAs), security, budgets, and compliance through portals (e.g., Microsoft Azure).

52
New cards

Cloud Security

  • It is the practice of protecting cloud-based data, applications, and infrastructure from threats through policies, controls, and technologies such as access management, encryption, and monitoring.

  • It ensures confidentiality, integrity, and availability across deployment models like public, private, and hybrid clouds.

53
New cards

Secure Web Gateways (SWG),

Cloud Access Security Brokers (CASB),

Secure Access Service Edge (SASE)

Cloud Security Mechanisms (3)

54
New cards

Secure Web Gateways (SWG)

Filter unwanted software, malware, and unauthorized web access.

55
New cards

Cloud Access Security Brokers (CASB)

Enforce security policies between users and cloud providers, including authentication, encryption, and threat protection.

56
New cards

Secure Access Service Edge (SASE)

Combines network security functions (like SD-WAN, firewall-as-a-service) into cloud-delivered services for secure, dynamic access.

57
New cards

Unauthorized Access,

Insecure APIs,

System Vulnerabilities,

Exposed Secrets

Cloud Security Challenges (4)

58
New cards

Unauthorized Access

  • Description

    • Gaining access without permission

  • Implications

    • Data breach, resource misuse

  • Preventive Measures

    • Multi-factor authentication, strict access control

59
New cards

Insecure APIs

  • Description

    • Vulnerable APIs exposed to attacks

  • Implications

    • Data exposure, DoS attacks

  • Preventive Measures

    • Secure coding, encryption, rate limiting, audits

60
New cards

System Vulnerabilities

  • Description

    • Flaws allowing malware, data corruption

  • Implications

    • System compromise

  • Preventive Measures

    • Regular patching, vulnerability scanning, ethical hacking

61
New cards

Exposed Secrets

  • Description

    • Exposure of credentials and keys

  • Implications

    • Security breaches

  • Preventive Measures

    • Secret management tools (HashiCorp Vault, AWS Secrets Manager)

62
New cards

Virtualization

is the creation of software-based versions of computing resources, such as servers, storage, or networks, allowing multiple virtual instances to run on a single physical machine.

63
New cards

Virtual Machines (VMs),

Hypervisors,

Containers,

Virtual Desktop Infrastructure (VDI)

Virtualization Types (4)

64
New cards

Virtual Machines (VMs)

Software emulations of physical computers, isolated and secure.

65
New cards

Type 1 (bare-metal),

Type 2 (hosted)

Hypervisors (2)

66
New cards

Type 1 (bare-metal)

  • Runs directly on hardware

  • (e.g., VMware ESXi, Microsoft Hyper-V).

67
New cards

Type 2 (hosted)

  • Runs on top of an OS

  • (e.g., VMware Workstation, Oracle VirtualBox).

68
New cards

Containers

  • Lightweight OS-level virtualization for running multiple workloads on a single OS (e.g., Docker).

  • Faster and more resource-efficient than VMs.

69
New cards

Virtual Desktop Infrastructure (VDI)

Centralized desktop hosting delivered to users remotely (e.g., Citrix XenDesktop).

70
New cards

Resource Optimization,

Flexibility and Agility,

Cost Reduction

Advantages of Virtualization (3)

71
New cards

Resource Optimization

Dynamic allocation maximizes hardware usage and lowers costs.

72
New cards

Flexibility and Agility

Quick deployment, testing, and scaling without affecting physical infrastructure.

73
New cards

Cost Reduction

Fewer physical servers, lower power, cooling, and space requirements.

74
New cards

Infrastructure as Code (IaC) and Software-Defined Networking

  • Managing infrastructure through code for automation, consistency, and reduced human error.

  • Tools

    • Terraform,

    • Ansible,

    • AWS CloudFormation

75
New cards

Software-Defined Networking (SDN),

Software-Defined WAN (SD-WAN),

Software-Defined Visibility (SDV)

Infrastructure as Code (IaC) and Software-Defined Networking (3)

76
New cards

Software-Defined Networking (SDN)

Programmatic network management to improve performance and flexibility (e.g., Cisco ACI).

77
New cards

Software-Defined WAN (SD-WAN)

Optimizes wide-area network connectivity, improving bandwidth and resilience (e.g., VMware SD-WAN).

78
New cards

Software-Defined Visibility (SDV)

Enhanced network monitoring and analytics for security and performance (e.g., Gigamon).

79
New cards

VM Escape,

Insecure APIs,

Snapshot/Image Flaws,

Hyperjacking

Virtualization Specific Vulnerabilities (4)

80
New cards

VM Escape

  • Description

    • Attacker breaks out of VM to host or other VMs

  • Impact

    • Full host compromise

81
New cards

Insecure APIs

  • Description

    • APIs allowing unauthorized control

  • Impact

    • Manipulation of virtual environment

82
New cards

Snapshot/Image Flaws

  • Description

    • Sensitive data exposed in VM snapshots

  • Impact

    • Data leakage

83
New cards

Hyperjacking

  • Description

    • Rogue hypervisor installed to control host

  • Impact

    • Complete system takeover

84
New cards

Segmentation, isolation,

IDS/IPS,

access controls,

patch management,

VM sprawl,

Encryption,

regular security audits, compliance

Virtualization Security Strategies (7)

  1. _____ and _____ (micro-segmentation).

  2. Deploy intrusion detection and prevention systems (_____).

  3. Strong _____ with multi-factor authentication.

  4. Regular _____ (hypervisor, OS, apps).

  5. Monitoring and managing _____; decommission unused VMs.

  6. _____ of data at rest and in transit.

  7. Conduct _____ and _____ assessments.