Skip to main content

Unit 5: Understanding of Cloud Security – Question Bank

Unit 5: Understanding of Cloud Security – Question Bank

  1. Why is security a major concern in cloud computing?

  2. How do different cloud computing service models vary in terms of built-in security?

  3. What is the concept of a security boundary in cloud computing, and how does it separate client and vendor responsibilities?

  4. With diagram explain the Security service boundary in cloud computing.

  5. Why is storing data in the cloud a particular concern for security?

  6. How can proxy and brokerage services help enhance security in cloud storage?

  7. What are some of the features that need to be considered for logging, auditing, and regulatory compliance in cloud computing systems?

  8. How can identity and related protocols be approached from a security standpoint in the cloud?

  9. What are the unique security risks associated with cloud computing, as highlighted by the Gartner Group?

  10. How can the risks in a cloud deployment be evaluated and analysed?

  11. What is the role of "golden" system image references in maintaining security in cloud computing?

  12. What is RANSAC and how does it contribute to securing the cloud?

  13. How does the Cloud Security Alliance (CSA) contribute to addressing security issues in cloud computing?

  14. How does the Cloud Reference Model help in understanding security boundaries and responsibilities in different cloud service delivery models?

  15. What are the different deployment models and service models in cloud computing, and how do they affect security responsibilities?

  16. How can the Cloud Security Reference Model be used to assess security needs in cloud computing?

  17. What is the importance of mapping the cloud service model to the application being deployed in terms of security mechanisms?

  18. What factors should be considered when determining security mechanisms and controls in cloud computing?

  19. How can compliance standards impact security considerations in cloud computing?

  20. What is the goal of identifying missing security features in the cloud and finding suitable replacements?

  21. How can accountability for security be ensured when operational responsibility is contracted to cloud service providers?

  22. Why is securing data a major concern in cloud computing?

  23. What are the key mechanisms for protecting data in cloud computing?

  24. How can access control, auditing, authentication, and authorization contribute to data security in the cloud?

  25. What is the challenge in securing data stored in the cloud due to its distributed nature?

  26. With diagram explain Brokered cloud storage access

  27. How can a storage "proxy" system help isolate data from direct client access in the cloud?

  28. What role does encryption play in securing data in transit and at rest in the cloud?

  29. How can multiple encryption keys and different data zones enhance data security in cloud storage?

  30. Why are identities and presence important in cloud computing?

  31. How can identity management contribute to data access control, user roles, and regulatory compliance in the cloud?

  32. What are the requirements for establishing and authenticating identities in cloud computing?

  33. What is OpenID and how does it enable single sign-on (SSO) systems in cloud computing?

  34. Explain the authentication process in OpenID.

  35. What are the roles of SAML and XACML in presenting identity-based claims in cloud computing?

  36. How does OAuth differ from OpenID and what is its role in providing validated access to resources in the cloud?

  37. What is the DataPortability Project and how does it relate to emerging identity standards?

  38. How does Windows Azure implement claims-based identity and what services are involved?

  39. Describe the role of Active Directory Federation Services 2.0 (AD FS) in the Windows Azure identity system.

  40. How does the Windows Identity Foundation (WIF) support authentication methods and claims-based identity in Windows Azure?

  41. What is presence and why is it important in cloud computing?

  42. How does presence provide additional context and value to cloud-based services?

  43. Explain the concept of presence state, presentity, and presence service.

  44. How does the presence service rely on watchers and what is their role?

  45. Provide examples of cloud-based services that rely on presence information.

  46. How does Windows Identity Foundation (WIF) contribute to creating a claims-based presence system?

  47. What is the Extensible Messaging and Presence Protocol (XMPP) and how does it relate to presence services?

  48. What are some popular services and platforms that use Jabber XCP and XMPP for presence information?

  49. Why are presence services important for collaboration services and how do they overcome limitations of Service Oriented Architecture (SOA)?

  50. What are the considerations for ensuring data segregation in a multi-tenant cloud environment?

  51. Why is it important to understand who has privileged access to storage in a cloud service provider?

  52. How can disaster recovery capabilities of a cloud service provider impact the security of your data?

  53. What are the challenges and considerations related to encryption and key management in cloud storage?

  54. What is the importance of logging and auditing in cloud computing, particularly for security and compliance purposes?

  55. How can cloud service providers' proprietary log formats impact logging and auditing practices?

  56. Why is regulatory compliance a significant aspect of cloud computing security?

  57. How can the burden of regulatory compliance be managed in a multi-country context?

  58. What steps can organisations take to ensure regulatory compliance in cloud computing?

  59. Why is it important to review contracts and include right-to-audit clauses in service level agreements (SLAs)?

  60. How can the ISO/IEC 27001/27002 standard and SAS70 Type II audits contribute to security and compliance in cloud computing?

  61. What considerations should be made in the event of a cloud service provider failure or acquisition?

  62. Why is it necessary to have security incident response policies in place for cloud computing?

 

Comments

Popular posts from this blog

2.1 VIRTUAL MACHINES PROVISIONING AND MANAGEABILITY

In this section, we will have an overview on the typical life cycle of VM and its major possible states of operation, which make the management and automation of VMs in virtual and cloud environments easier than in traditional computing environments As shown in Figure above, the cycle starts by a request delivered to the IT department, stating the requirement for creating a new server for a particular service.  IT administration to start seeing the servers’ resource pool, matching these resources with the requirements, and starting the provision of the needed virtual machine.  Once provisioned machine started, it is ready to provide the required service according to an SLA, or a time period after which the virtual is being released.

1.2 ROOTS OF CLOUD COMPUTING

We can track the roots of clouds computing by observing the advancement of several technologies, especially in hardware (virtualization, multi-core chips), Internet technologies (Web services, service-oriented architectures, Web 2.0), distributed computing (clusters, grids), and systems management (autonomic computing, data center automation).  Below Figure shows the convergence of technology fields that significantly advanced and contributed to the advent of cloud computing. . We present a closer look at the technologies that form the base of cloud computing, with the aim of providing a clearer picture of the cloud ecosystem as a whole. 1.2.1 From Mainframes to Clouds 1.2.2 SOA, Web Services, Web 2.0, and Mashups 1.2.3 Grid Computing 1.2.4 Utility Computing 1.2.5 Hardware Virtualization 1.2.6 Virtual Appliances and the Open Virtualization Format 1.2.7 Autonomic Computing ______ Cloud computing has its roots in several technologies and developments, including virtualization, gr...

2.1.1 VM Provisioning Process

  Steps to Provision VM. Here, we describe the common and normal steps of provisioning a virtual server: Firstly, you need to select a server from a pool of available servers (physical servers with enough capacity) along with the appropriate OS template you need to provision the virtual machine. Secondly, you need to load the appropriate software (operating system you selected in the previous step, device drivers, middleware, and theneeded applications for the service required). Thirdly, you need to customize and configure the machine (e.g., IP address, Gateway) to configure an associated network and storage resources. Finally, the virtual server is ready to start with its newly loaded software. These are the tasks required or being performed by an IT or a data center’s specialist to provision a particular virtual machine.