Revision Notes
Revision Notes
Domain 7 –
Micro-segmentation operational expenses up
SOP:
1. SDP client for connecting asset
2. SDP controller for authentication and authorization, configuring connect tion to
SDP gateways
3. SDP gateway for terminating SDP traffic
When used, virtual appliances should support auto-scaling to match the elasticity of
the resources they protect. Depending on the product, this could cause issues if the
vendor does not support elastic licensing compatible with auto-scaling.
IP addresses will change far more quickly than on a traditional network, which
security tools must account for. Ideally they should identify assets on the network by
a unique ID, not an IP address or network name.
Software container systems always include three key components: • The execution
environment (the container). • An orchestration and scheduling controller (which can
be a collection of multiple tools). • A repository for the container images or code to
execute. • Together, these are the place to run things, the things to run, and the
management system to tie them together.
Some examples of tasks you can automate include: • Snapshotting the storage of the
virtual machine. • Capturing any metadata at the time of alert, so that the analysis
can happen based on what the infrastructure looked like at that time. • If your
provider supports it, “pausing” the virtual machine, which will save the volatile
memory state.
Domain 10
Cloud computing
Opportunities
- Higher baseline security (significant economic incentives to maintain higher
baseline security)
- Responsiveness
- Isolated environments
- Independent virtual machines
- Elasticity
- DevOps
- Unified Interface
Challenges
- Limited detailed visibility
- Increased application scope (management plane, meta-structure)
- Changing threat models
- Reduced transparency
SSDLC
- Training: secure coding practice, writing security tests. Provider technical training
- Define: code standards, security functional requirements
- Design: threat modelling, secure design
- Develop: code review, unit testing, static analysis, dynamic analysis
- Test: Vulnerability Assessment, Dynamic Analysis, Functional tests, QA
-
Training: Three different roles will require two new categories of training.
Development, operations, and security should all receive additional training on cloud
security fundamentals (which are not provider specific), as well as appropriate
technical security training on any specific cloud providers and platforms used on their
projects. There is typically greater developer and operations involvement in directly
architecting and managing the cloud infrastructure, so baseline security training
that’s specific to the tools they will use is essential.