6-1 Cloud Security Handbook - Find Out How to Effectively Secure Cloud Environments

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/23

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

24 Terms

1
New cards

What is encryption?

The process of converting plain text into cipher text.

2
New cards

What is symmetric encryption?

A way to transfer data using the same encryption key for both encryption and decryption.

3
New cards

What is asymmetric encryption?

A method of encryption that uses two different keys (public and private) for encryption and decryption.

4
New cards

What does KMS stand for in the context of cloud services?

Key Management Service.

5
New cards

What is the purpose of AWS KMS?

To generate and store cryptographic keys in a secure manner.

6
New cards

What is AES?

Advanced Encryption Standard, the de facto standard for encryption at rest.

7
New cards

What is the primary risk of failing to encrypt sensitive data?

Data exposure and potential lawsuits from customers and regulators.

8
New cards

What is plaintext?

The original human-readable form of information.

9
New cards

What is ciphertext?

The result of encryption that is not human-readable.

10
New cards

What is the Encryption key?

A string that, when combined with an encryption algorithm, encrypts or decrypts ciphertext.

11
New cards

What are the pros of symmetric encryption?

Small ciphertext size, suitable for large data transfers, low CPU resources, and fast encryption time.

12
New cards

What are the cons of symmetric encryption?

Considered less secure and confidential as both parties share the same key.

13
New cards

What is RSA?

A widely used protocol for encryption in transit, key establishment, and digital signatures.

14
New cards

What is the recommended key size for RSA?

Begin at 2,048 bits or higher.

15
New cards

What is the importance of encryption in cloud environments?

It helps maintain data confidentiality, especially due to multi-tenancy and public APIs.

16
New cards

What is the role of a Key Encryption Key (KEK) in KMSes?

Used for generating other encryption keys and is stored inside the KMS.

17
New cards

What is the purpose of AWS Secrets Manager?

To manage and secure sensitive information like database credentials and API keys.

18
New cards

What is the significance of AWS CloudTrail in the context of KMS?

To log all API calls made through AWS KMS.

19
New cards

What is Azure Key Vault?

Azure's key management, secrets management, and certificate management service.

20
New cards

What is the purpose of Google Cloud KMS?

To generate and store cryptographic keys in a regulated manner.

21
New cards

What is the recommended practice regarding the rotation of encryption keys?

Rotate all encryption keys every 365 days.

22
New cards

What does 'data at rest' refer to in encryption?

Data that is stored and not actively being transmitted.

23
New cards

What does 'encryption in transit' mean?

Protecting data as it travels across networks.

24
New cards

What is the purpose of using tagging in KMS?

To have a better understanding of which key belongs to which resource.