Sy0-701 - Lesson 06

Download as pdf or txt
Download as pdf or txt
You are on page 1of 33

CompTIA Security+ Exam SY0-701

Lesson 6
Secure Cloud Network Architecture

Copyright © 2023 CompTIA, Inc. All Rights Reserved. | CompTIA.org


1
Lesson 6

Topic 6A
Cloud Infrastructure

Copyright © 2023 CompTIA, Inc. All Rights Reserved. | CompTIA.org


2
Cloud Deployment Models
• Public (or multi-tenant)
• Private
• Hosted Private

• Community
• Hybrid Cloud

3
Cloud Deployment Models
• Security Considerations
• Single-tenant architecture
• Multi-tenant architecture
• Hybrid architecture
• Serverless architecture

4
Cloud Service Models
• Models
• Software as a Service

• Platform as a Service
• Infrastructure as a Service

• Third-Party Vendors

5
Responsibility Matrix
• Describes the balance of
responsibility between a
customer and a cloud service
provider

Responsibility model

6
Responsibility Matrix
• Cloud Service Provider
• Physical security of the infrastructure
• Securing computer, storage, and network equipment
• Securing foundational elements of networking, such as DDoS protection
• Cloud storage backup and recovery
• Security of cloud infrastructure resource isolation among tenants
• Tenant resource identity and access control
• Security, monitoring, and incident response for the infrastructure
• Securing and managing the datacenters located in multiple geographic regions

7
Responsibility Matrix
• Cloud Service Customer
• User identity management

• Configuring the geographic location for storing data and running services
• User and service access controls to cloud resources
• Data and application security configuration
• Protection of operating systems, when deployed
• Use and configuration of encryption, especially the protection of keys

8
Centralized and Decentralized Computing
• Centralized computing architecture
• All data processing and storage is performed in a single location

• All users and devices rely on the central server/authority

• Decentralized computing architecture


• Data processing and storage distributed across multiple locations or devices

• Increasingly important design trend impacting modern infrastructures

9
Centralized and Decentralized Computing
• Decentralized computing examples
• Blockchain

• Peer-to-peer (P2P)
• Content Delivery Networks (CDNs)
• Internet of Things (IoT)
• Distributed databases
• TOR (The Onion Router)

10
Resilient Architecture Concepts
• Replication
• High Availability Across Zones
• Local replication
• Regional replication
• Geo-redundant storage (GRS)

11
Application Virtualization and Container Virtualization
• Application virtualization
• Containerization
• Container versus virtual
machine

Comparison of VMs versus containers.

12
Cloud Architecture
• Virtual Private Cloud (VPC)
• A cloud computing model in which the cloud provider manages the infrastructure
and automatically allocates resources as needed, charging only for the actual
usage of the application

• Serverless Computing
• A private network segment made available to a single cloud consumer on a
public cloud

• Microservices
• An architectural approach to building software applications as a collection of
small and independent services focusing on a specific business capability

13
Cloud Automation Technologies
• Infrastructure as Code (IaC)
• Responsiveness
• Load Balancing
• Edge Computing
• Auto-Scaling

14
Software Defined Networking
• Network functions are divided into three “planes”
• Control plane
• Decisions about how traffic should be prioritized, secured, and where it should
be switched

• Data plane
• Handles the switching and routing of traffic and imposition of security access
controls

• Management plane
• Monitors traffic conditions and network status

15
Software Defined Networking
• SDN is an important part of the
latest automation and
orchestration technologies
• SDN architecture reduces
complexity of enforcing
security policy
• Enables fully automated
deployment (or provisioning)
of network links, appliances,
and servers
Data plane devices managed by a control plane device and monitored by a
management plane. (Images © 123RF.com.)
16
Cloud Architecture Features
• Considerations for Cloud Infrastructure
• Cost
• Scalability
• Resilience
• Ease of deployment
• Ease of recovery
• SLA and ISA
• Power
• Compute
17
Cloud Security Considerations
• Considerations for Cloud Infrastructure Security
• Data protection
• Patching
• Secure Communication
• Software-Defined Wide Area Network (SD-WAN)

• Secure Access
• Secure Access Service Edge (SASE)

18
Review Activity: Cloud Infrastructure
• Cloud Deployment Models

• Cloud Services Models

• Responsibility Matrix

• Centralized and Decentralized Computing

• Resilient Architecture Concepts

• Application Virtualization and Container Virtualization

• Cloud Architecture

• Cloud Automation Technologies

• Software Defined Networking

• Cloud Architecture Features

• Cloud Security Considerations

19
Lab Activity
• Assisted Lab: Using Containers
• Assisted Lab: Using Virtualization

20
Lesson 6

Topic 6B
Embedded Systems and Zero Trust
Architecture

Copyright © 2023 CompTIA, Inc. All Rights Reserved. | CompTIA.org


21
Embedded Systems
• Specialized computers
• Many consumer and commercial use cases.
• Some examples:
• Home appliances
• Smartphones and tablets
• Automotive systems
• Industrial automation
• Medical devices
• Aerospace and defense

• Real-Time Operating Systems


22
Industrial Control Systems
• Industrial control systems (ICSs)
• Human-machine interfaces (HMIs)

• Data historian

• Programmable Logic Controller (PLC)

• Supervisory Control and Data Acquisition (SCADA)

• ICS/SCADA Applications
• Energy

• Industrial

• Fabrication and manufacturing

• Logistics

• Facilities

23
Internet of Things
• Network of physical devices, vehicles, appliances, and other objects
embedded with sensors, software, and connectivity, enabling them to
collect and exchange data

• The significantly decreased cost of IoT sensors and devices over the past
few years has made them more affordable and accessible to businesses
and consumers

• Advances in connectivity technology, such as 5G and low-power wireless


networks, have made connecting and managing large numbers of IoT
devices easier and more efficient
24
Internet of Things
• Security Risks Associated with IoT
• Many IoT devices have limited processing power and memory
• Difficult to implement stringent security controls

• Rushed to market
• Lacking or misrepresented security capability
• “Un-patchable”

• Lack of standards in design of IoT devices


• Collect and transmit sensitive information

25
Internet of Things
• Best Practice Guidance for IoT
• The Internet of Things Security Foundation (IoTSF)
• https://iotsecurityfoundation.org

• Industrial Internet Consortium (IIC) Security Framework


• https://www.iiconsortium.org/iisf/

• Cloud Security Alliance (CSA) IoT Security Controls Framework


• https://cloudsecurityalliance.org/artifacts/iot-security-controls-framework

• European Telecommunications Standards Institute (ETSI) IoT Security Standards


• https://www.etsi.org/technologies/consumer-iot-security
26
Deperimeterization and Zero Trust
• Deperimeterization
• Shifts focus from defending the network boundaries to protecting individual
resources

• Zero Trust
• “Never trust, always verify”

27
Deperimeterization and Zero Trust
• Trends Driving Deperimeterization
• Cloud
• Remote Work
• Mobile
• Outsourcing & Contracting
• Wireless Networks

28
Deperimeterization and Zero Trust
• The Key Benefits of a Zero Trust Architecture
• Greater security
• Better access controls
• Improved governance and compliance
• Increased granularity

29
Deperimeterization and Zero Trust
• Essential Components of a Zero Trust Architecture
• Network and endpoint security
• Identity and access management (IAM
• Policy-based enforcement
• Cloud security
• Network visibility
• Network segmentation
• Data protection
• Threat detection and prevention
30
Zero Trust Security Concepts
• Assumes that all devices, users,
and services are not inherently
trusted, regardless of whether
inside or outside a network's
perimeter

Components in NIST's zero trust architecture framework.

31
Review Activity: Embedded Systems and Zero Trust Architecture
• Embedded Systems
• Industrial Control Systems
• Internet of Things
• Deperimeterization and Zero Trust

32
CompTIA Security+ Exam SY0-701

Lesson 6
Summary

Copyright © 2023 CompTIA, Inc. All Rights Reserved. | CompTIA.org


33

You might also like