Sy0-701 - Lesson 06
Sy0-701 - Lesson 06
Sy0-701 - Lesson 06
Lesson 6
Secure Cloud Network Architecture
Topic 6A
Cloud Infrastructure
• Community
• Hybrid Cloud
3
Cloud Deployment Models
• Security Considerations
• Single-tenant architecture
• Multi-tenant architecture
• Hybrid architecture
• Serverless architecture
4
Cloud Service Models
• Models
• Software as a Service
• Platform as a Service
• Infrastructure as a Service
• Third-Party Vendors
5
Responsibility Matrix
• Describes the balance of
responsibility between a
customer and a cloud service
provider
Responsibility model
6
Responsibility Matrix
• Cloud Service Provider
• Physical security of the infrastructure
• Securing computer, storage, and network equipment
• Securing foundational elements of networking, such as DDoS protection
• Cloud storage backup and recovery
• Security of cloud infrastructure resource isolation among tenants
• Tenant resource identity and access control
• Security, monitoring, and incident response for the infrastructure
• Securing and managing the datacenters located in multiple geographic regions
7
Responsibility Matrix
• Cloud Service Customer
• User identity management
• Configuring the geographic location for storing data and running services
• User and service access controls to cloud resources
• Data and application security configuration
• Protection of operating systems, when deployed
• Use and configuration of encryption, especially the protection of keys
8
Centralized and Decentralized Computing
• Centralized computing architecture
• All data processing and storage is performed in a single location
9
Centralized and Decentralized Computing
• Decentralized computing examples
• Blockchain
• Peer-to-peer (P2P)
• Content Delivery Networks (CDNs)
• Internet of Things (IoT)
• Distributed databases
• TOR (The Onion Router)
10
Resilient Architecture Concepts
• Replication
• High Availability Across Zones
• Local replication
• Regional replication
• Geo-redundant storage (GRS)
11
Application Virtualization and Container Virtualization
• Application virtualization
• Containerization
• Container versus virtual
machine
12
Cloud Architecture
• Virtual Private Cloud (VPC)
• A cloud computing model in which the cloud provider manages the infrastructure
and automatically allocates resources as needed, charging only for the actual
usage of the application
• Serverless Computing
• A private network segment made available to a single cloud consumer on a
public cloud
• Microservices
• An architectural approach to building software applications as a collection of
small and independent services focusing on a specific business capability
13
Cloud Automation Technologies
• Infrastructure as Code (IaC)
• Responsiveness
• Load Balancing
• Edge Computing
• Auto-Scaling
14
Software Defined Networking
• Network functions are divided into three “planes”
• Control plane
• Decisions about how traffic should be prioritized, secured, and where it should
be switched
• Data plane
• Handles the switching and routing of traffic and imposition of security access
controls
• Management plane
• Monitors traffic conditions and network status
15
Software Defined Networking
• SDN is an important part of the
latest automation and
orchestration technologies
• SDN architecture reduces
complexity of enforcing
security policy
• Enables fully automated
deployment (or provisioning)
of network links, appliances,
and servers
Data plane devices managed by a control plane device and monitored by a
management plane. (Images © 123RF.com.)
16
Cloud Architecture Features
• Considerations for Cloud Infrastructure
• Cost
• Scalability
• Resilience
• Ease of deployment
• Ease of recovery
• SLA and ISA
• Power
• Compute
17
Cloud Security Considerations
• Considerations for Cloud Infrastructure Security
• Data protection
• Patching
• Secure Communication
• Software-Defined Wide Area Network (SD-WAN)
• Secure Access
• Secure Access Service Edge (SASE)
18
Review Activity: Cloud Infrastructure
• Cloud Deployment Models
• Responsibility Matrix
• Cloud Architecture
19
Lab Activity
• Assisted Lab: Using Containers
• Assisted Lab: Using Virtualization
20
Lesson 6
Topic 6B
Embedded Systems and Zero Trust
Architecture
• Data historian
• ICS/SCADA Applications
• Energy
• Industrial
• Logistics
• Facilities
23
Internet of Things
• Network of physical devices, vehicles, appliances, and other objects
embedded with sensors, software, and connectivity, enabling them to
collect and exchange data
• The significantly decreased cost of IoT sensors and devices over the past
few years has made them more affordable and accessible to businesses
and consumers
• Rushed to market
• Lacking or misrepresented security capability
• “Un-patchable”
25
Internet of Things
• Best Practice Guidance for IoT
• The Internet of Things Security Foundation (IoTSF)
• https://iotsecurityfoundation.org
• Zero Trust
• “Never trust, always verify”
27
Deperimeterization and Zero Trust
• Trends Driving Deperimeterization
• Cloud
• Remote Work
• Mobile
• Outsourcing & Contracting
• Wireless Networks
28
Deperimeterization and Zero Trust
• The Key Benefits of a Zero Trust Architecture
• Greater security
• Better access controls
• Improved governance and compliance
• Increased granularity
29
Deperimeterization and Zero Trust
• Essential Components of a Zero Trust Architecture
• Network and endpoint security
• Identity and access management (IAM
• Policy-based enforcement
• Cloud security
• Network visibility
• Network segmentation
• Data protection
• Threat detection and prevention
30
Zero Trust Security Concepts
• Assumes that all devices, users,
and services are not inherently
trusted, regardless of whether
inside or outside a network's
perimeter
31
Review Activity: Embedded Systems and Zero Trust Architecture
• Embedded Systems
• Industrial Control Systems
• Internet of Things
• Deperimeterization and Zero Trust
32
CompTIA Security+ Exam SY0-701
Lesson 6
Summary