Domain 5: Cloud Security Operations Cartes | Quizlet

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/26

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

27 Terms

1
New cards

Authenticated encryption with associated data (AEAD)

Symmetric encryption algorithms that simultaneously support and apply confidentiality and authentication.

2
New cards

Blue/green

A deployment method that can be used where the organization has a mirror of the production environment and logic that can switch users to the new environment once confidence of functionality is reached.

3
New cards

Cloud orchestration

The end-to-end automation workflow or process that coordinates multiple lower-level automations to deliver a resource or set of resources "as a service."

4
New cards

Container

A small form factor-independent executable package of software that is installed and maintained upon a host operating system and includes everything that is needed to run an application, which includes system tools, libraries, settings and code.

5
New cards

Continuous integration/continuous delivery (CI/CD)

An integrated set of practices and tools used to merge developer code, build and test software, and develop deploy-ready packaging.

6
New cards

Deployment management

Moves new hardware, software, documentation, processes, or other components to live environments.

7
New cards

Domain Keys Identified Mail (DKIM)

An asymmetric cryptographic key system that creates organizational nonrepudiation of messaging. Emails are received through proof-of-origin processing to detect spoofing and other fraudulent behavior.

8
New cards

Domain Name System (DNS)

Used to resolve fully qualified domain names (FQDN or www.example.com), to an IP address (e.g. 192.0.2.1).

9
New cards

DNS shadowing

A threat in which the attacker gets access to the domain registrant's account and creates subdomains from the parent domain of the victim to draw unsuspecting visitors to bogus sites.

10
New cards

Domain-based message authentication, reporting and conformance (DMARC)

A scalable system for providing policy configuration for message validation, disposition, and reporting that mail-sending organizations can use for email life cycle management.

11
New cards

Drift

The change in configuration away from the desired baseline.

12
New cards

Forward secrecy

The cryptographic protection for encrypted data based upon the discovery or compromise of a private key in an asymmetric pair. The session key that was used in a previous session will not be available for decryption.

13
New cards

Hardware security module (HSM)

A physical computing device that provides cryptoprocessing as well as safeguarding and managing digital keys for strong authentication.

14
New cards

Immutable environment

New servers are based on a validated and version-controlled image. When a new system is required, the old is destroyed after the new is deployed.

15
New cards

Information security continuous monitoring (ISCM)

Maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions.

16
New cards

Patch management

Updating a system to fix functionality, features, or security.

17
New cards

Release management

Makes available new and changed services and features for use. A version of a service or configuration item (CI) that is made available for use.

18
New cards

Secure Shell Protocol (SSH)

An administrative protocol used to manage remote hosts over the internet in an encrypted fashion.

19
New cards

Security Content Automation Protocol (SCAP)

A multipurpose framework of specifications that supports automated configuration, vulnerability and patch checking, technical control compliance activities, and security measurement. Goals for the development of this protocol include standardizing system security management, promoting interoperability of security products, and fostering the use of standard expressions of security content.

20
New cards

Security group

Applies rules concerning communication to consumer provisioned instances, including allowed and blocked communication protection for systems and storage, thus providing for granularity of control for the ingress/egress traffic flow by the cloud customer.

21
New cards

Security operations management system (SOMS)

The set of guidelines and other elements that work together to ensure the effectiveness of security operations and their processes.

22
New cards

Sender Policy Framework (SPF)

A process to validate an email message that has been sent from an authorized mail server in order to detect forgery and to prevent spam. The owner of a domain can identify exactly which mail servers they are able to send from.

23
New cards

Stateful inspection

Also known as dynamic packet filtering, this type of firewall will watch the interaction between the two hosts and allow or deny connections according to other factors beyond the rule set.

24
New cards

Static packet filtering

Also known as a stateless firewall, this type of filter examines each packet without regard to the packet's context in a session. Packets are examined against static criteria, which cannot be temporarily changed by the firewall to accommodate legitimate traffic. If a protocol requires a port to be temporarily opened, administrators must choose between permanently opening the port and disallowing the protocol.

25
New cards

Trusted Platform Module (TPM)

A special case of an HSM that is designed to be integrated into other products and follows a particular standard from the Trusted Computing Group.

26
New cards

Virtual extensible LAN (VXLAN)

VXLAN is an overlay technology encapsulating layer 2 over layer 3. VXLAN doubles the 12-bit ID of a traditional VLAN to a 24-bit ID VXLAN Network Identifier (VNI), thus allowing for 16 million networks.

27
New cards

En cours (26)

Vous avez commencé à étudier ces termes. Continuez le bel effort !