Architecture & Cybersecurity - Module 4 ELO 4.1Identify cybersecurity concerns associated with a Cloud service offering at the Infrastructure, Network.

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

Distributed Data Processing
SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Security Controls – What Works
IT PLANNING Enterprise Architecture (EA) & Updates to the Plan.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
Stephen S. Yau CSE , Fall Security Strategies.
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
SaaS, PaaS & TaaS By: Raza Usmani
5205 – IT Service Delivery and Support
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Storage Security and Management: Security Framework
CLOUD COMPUTING  IT is a service provider which provides information.  IT allows the employees to work remotely  IT is a on demand network access.
What is Enterprise Architecture?
Cloud Computing. What is Cloud Computing? Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Introduction to Cloud Computing
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Module 14: Configuring Server Security Compliance
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Chapter © 2006 The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/ Irwin Chapter 7 IT INFRASTRUCTURES Business-Driven Technologies 7.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Server Virtualization
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Bizfss File Sync and Sharing Solution, Built on Microsoft Azure, Allows Businesses to Sync, Share, Back Up Using Their Own Cloud Storage MICROSOFT AZURE.
Chapter 2 Securing Network Server and User Workstations.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Business & Contracting – Module 7 ELO-170Identify risks of not having a direct contractual relationship with the cloud service provider. ELO-180Match cloud-related.
Security Vulnerabilities in A Virtual Environment
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Architecture & Cybersecurity - Module 4 ELO-075Identify cybersecurity concerns associated with a Cloud service offering at the Infrastructure, Network.
Architecture & Cybersecurity – Module 3 ELO-100Identify the features of virtualization. (Figure 3) ELO-060Identify the different components of a cloud.
Definitions – Module 8 CLE - Module 9 - Definitions1.
Software Acquisition Management. Cloud Computing 2.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Business & Contracting – Module 6 ELO 6.1Identify the Cloud-related guidance when contracting for cloud services ELO 6.2Identify contract and legal considerations.
Flight is a SaaS Solution that Accelerates the Secure Transfer of Large Files and Data Sets Into and Out of Microsoft Azure Blob Storage MICROSOFT AZURE.
Table of Contents – Module 0 Overview of files associated with the Cloud CLM CLE - Module 0 - CLM Table of Contents1.
IS3220 Information Technology Infrastructure Security
Microsoft Azure and ServiceNow: Extending IT Best Practices to the Microsoft Cloud to Give Enterprises Total Control of Their Infrastructure MICROSOFT.
ISA 201 Intermediate Information Systems Acquisition.
The NIST Special Publications for Security Management By: Waylon Coulter.
Architecture & Cybersecurity – Module 3 ELO 3.1Identify the different components of a cloud architecture. (Service Offering View and Network View) Figure.
© 2012 Eucalyptus Systems, Inc. Cloud Computing Introduction Eucalyptus Education Services 2.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Chapter 6: Securing the Cloud
Understanding The Cloud
Avenues International Inc.
By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani
Critical Security Controls
Architecture & Cybersecurity - Module 4
Chapter 21: Cloud Computing and Related Security Issues
Introduction to Cloud Computing
Chapter 22: Cloud Computing Technology and Security
Cloud Testing Shilpi Chugh.
IS4680 Security Auditing for Compliance
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
Cloud computing mechanisms
PLANNING A SECURE BASELINE INSTALLATION
IT Management Services Infrastructure Services
Presentation transcript:

Architecture & Cybersecurity - Module 4 ELO 4.1Identify cybersecurity concerns associated with a Cloud service offering at the Infrastructure, Network and Application Layers. Figure 1 ELO 4.2Identify the Cybersecurity concerns for how and where data is stored. ELO 4.3Identify the Cybersecurity Risks, Benefits and Concerns of Virtualization ELO 4.4Match key cybersecurity terms from the section to appropriate definitions. CLE - Module 4 - Arch & Cybersecurity (b)1

TopicsYou should be able to: Module Introduction Recapitulation Cybersecurity for Infrastructure, Network and Application Layers Concerns for where the data the stored Module Review Module Summary Questions Identify cybersecurity concerns associated with a Cloud service offering at the Infrastructure, Network and Application Layers Identify the concerns for where the data is stored; Identify the different ways of storing data Match foundational cloud terms from the section to appropriate definitions. Module – 4: Arch & Cyber CLE - Module 4 - Arch & Cybersecurity (b)2

Topic You should be able to: Content Questions Review Previous Content Recapitulation of Modules – 1, 2, 3 CLE - Module 4 - Arch & Cybersecurity (b)3

Topic You should be able to: Content Questions CLE - Module 4 - Arch & Cybersecurity (b)4 Cloud Cybersecurity Overview 1.(New MT) Identify key cybersecurity policy elements Cloud Cybersecurity Overview Risk Management Framework (RMF) Provisional Authorization Risk Management tools – DOD Cloud Computing Security Requirements Guide (DISA) ( ex.aspx) ex.aspx – Draft Cloud Access Point (CAP) Functional Requirements Document (FRD) V2.2 ( ex.aspx) ex.aspx – Best Practices Guide for DoD Cloud Mission Owners ( ex.aspx) ex.aspx

Topic You should be able to: Content Questions CLE - Module 4 - Arch & Cybersecurity (b)5 Identify the Cybersecurity Concerns with a CSO at the Infrastructure, Network and Applications Layers Identify the Cybersecurity Concerns Associated with a CSO at the Infrastructure, Network and Application Layers The DoD Cloud Computing Security Requirements Guide provides guidance on the various architectural considerations related to DoD’s use of commercial cloud services in the following areas: – The connection between the Cloud Service Provider’s infrastructure and the DoD Information Network (DoDIN), – Cloud Service Provider service protections and integration into required DoDIN Computer Network Defense (CND) and access control services, and – Mission system/application protections and integration into required DoDIN CND and access control services. 1.Which document provides guidance on the various architectural considerations related to DoD’s use of commercial cloud services? The DoD Cloud Computing Security Requirements Guide Application Network Infrastructure DoDIN CAP CSP Commercial

Topic You should be able to: Content Questions CLE - Module 4 - Arch & Cybersecurity (b)6 Identify the Cybersecurity Concerns with a CSO at the Infrastructure, Network and Applications Layers Identify the Cybersecurity Concerns Associated with a CSO at the Infrastructure, Network and Application Layers Infrastructure, as related to cloud service offerings, is the physical hardware (i.e. server platforms and storage), and network interconnecting the hardware that supports the cloud service and its virtualization technology (if used). Infrastructure includes the systems and networks used by the Cloud Service Provider to manage the infrastructure. Both private and community cloud service offerings can serve multiple tenants (missions) within the customer organizations the service supports. Shared infrastructure refers to the physical cloud infrastructure being available to DoD and Federal Government tenants as well as non-DoD and non-Federal Government tenants. This is also referred to as a public cloud. Infrastructure CSP

Topic You should be able to: Content Questions CLE - Module 4 - Arch & Cybersecurity (b)7 Identify the Cybersecurity Concerns with a CSO at the Infrastructure, Network and Applications Layers Identify the Cybersecurity Concerns Associated with a CSO at the Infrastructure, Network and Application Layers The 15 December 2014 DoD CIO memo regarding Updated Guidance on the Acquisition and Use of Commercial Cloud Computing Services, states “Commercial cloud services used for Sensitive Data must be connected to customers through a Cloud Access Point (CAP).” A DoD Cloud Access Point (CAP) is a system of network boundary protection and monitoring devices, otherwise known as an IA stack, through which CSP infrastructure will connect to a DoD Information Network (DoDIN) service; the Non- secure Internet Protocol Router Network (NIPRNet), or Secret Internet Protocol Router Network (SIPRNet). 1.True or False: All Commercial cloud services must be connect to DoD customers through a Cloud Access Point (CAP). False

Topic You should be able to: Content Questions CLE - Module 4 - Arch & Cybersecurity (b)8 Identify the Cybersecurity Concerns with a CSO at the Infrastructure, Network and Applications Layers 1.The Cloud Access Point protects the DoD Information Network and its network services. Identify the Cybersecurity Concerns Associated with a CSO at the Infrastructure, Network and Application Layers A Cloud Access Point (CAP) provides the following protections: – Protects the DoDIN and its network services. – Protects other DoD missions from incidents that affect a particular CSP’s supported missions. – Provides perimeter defenses and sensing for applications hosted in the commercial cloud service. – Provides a point at which Boundary Computer Network Defense sensing will occur. 1.True or False: The Cloud Access Point’s only purpose is to serve as the entry point into a Cloud Service Offering. False 2.True or False: The Cloud Access Point has many purposes, one of which is to protect the DoDIN and its networks. True Network Infrastruc ture DoDIN NIPRNet SIPRNet CAP CSP Commercial – Extends the DoD de- militarized zone (DMZ) architecture to external facing mission systems and applications.

Topic You should be able to: Content Questions CLE - Module 4 - Arch & Cybersecurity (b)9 Identify the Cybersecurity Concerns with a CSO at the Infrastructure, Network and Applications Layers Identify the Cybersecurity Concerns Associated with a CSO at the Infrastructure, Network and Application Layers DoD uses the concept of defense-in-depth when protecting its networks and data/information. The Mission Owner relies on the CSP and the security posture of its SaaS offering for the protection of DoD information. Defense-in-depth security/protective measures for SaaS 1.DoD uses the concept of defense-in-depth when protecting its networks and data/information. Applicati on Network Infrastruc ture DoDIN NIPRNet SIPRNet CAP CSP Commercial - Application Layer Firewall and Intrusion Detection/Prevention Systems protection of the CSP’s infrastructure supporting the SaaS application offering, as well as segmentation from the CSP’s other offerings and corporate networks

Topic You should be able to: Content Questions CLE - Module 4 - Arch & Cybersecurity (b)10 Identify the Cybersecurity Concerns with a CSO at the Infrastructure, Network and Applications Layers Identify the Cybersecurity Concerns Associated with a CSO at the Infrastructure, Network and Application Layers Mission Owners build systems and applications on virtualized infrastructure provided by the CSO under IaaS/PaaS. There must be a clear delineation of responsibility for security between the CSP and the Mission Owner, which depends upon how the CSP presents the security features it supports in the CSO. Under IaaS the Mission Owner is fully responsible for securing the guest operating systems and applications that they build; the CSP will be responsible for securing the virtualization OS (i.e. hypervisor) and supporting infrastructure. Under PaaS, the Mission Owner is fully responsible for securing the guest OS and the platform applications and applications they build. CSP IaaS and PaaS offerings must support the defense-in-depth security/protective measures tha the Mission Owner must implement to secure the systems and applications that they build on the service offering.

Topic You should be able to: Content Questions CLE - Module 4 - Arch & Cybersecurity (b)11 Identify the Cybersecurity Concerns with a CSO at the Infrastructure, Network and Applications Layers Identify the Cybersecurity Concerns Associated with a CSO at the Infrastructure, Network and Application Layers Most of the areas of concern for implementing defense-in-depth security/protective measures that a Mission Owner must address across all information impact levels when implementing systems/applications on Iaas/PaaS include, but are not limited to, the following: – Implement Virtual Machines (VMs) in one or more virtual networks in which data-flows between VMs, and between VMs and external networks (both physical and virtual) may be controlled. – Implement virtual networks in accordance with the approved architecture for the type of application – Implement data-at-rest encryption on all DoD files housed in CSP IaaS storage service offerings – Implement Host Based Security System IAW DoD Policy – Implement scanning using an Assured Compliance Assessment Solution server IAW CYBERCOM – Implement DoD PKI server certificates for establishing secure connections – Implement all required data-in-transit encryption protections

Topic You should be able to: Content Questions CLE - Module 4 - Arch & Cybersecurity (b)12 Cybersecurity for Infrastructure, Network and Application Layers 1.MT Identify different types of storage media Identify Cybersecurity Concerns for How and Where Data is Stored Cloud storage media includes network accessible storage, virtualized storage and various disc arrays The DOD Cloud Computing Security Requirements Guide provides detailed implementation details for securing data at rest and transit. With the move to commercial cloud computing, the DoD is adopting a risk-based approach in applying network defense capabilities and processes. As we will describe in the next module, DoD has defined Impact Levels commensurate to the risk and type of data, with each higher level warranting greater protections. 1.True or False: Cloud storage media includes the hard disk drive on your workstation. False 2.With the move to commercial cloud computing, the DoD is adopting a risk-based approach in applying network defense capabilities and processes. 3.A Mission Owner should implement data-at- rest and data-in transit encryption on all DoD files housed in Cloud Service Providers’ IaaS storage service offerings.

Topic You should be able to: Content Questions CLE - Module 4 - Arch & Cybersecurity (b)13 Cybersecurity for Infrastructure, Network and Application Layers 1.MT Identify different ways cloud service providers store users data Identify Cybersecurity Concerns for How and Where Data is Stored Cloud storage is referred to in layers, for example: – Objects – metadata and data organized as web-based content. – Datasets – organized data in relational or other record formats – Blocks – stored at the hardware level – this is the smallest element of data accessible by a user or other system – Files – data objects (documents, spreadsheets, pictures, etc.) organized into folders for easy visualization by users. 1.Which is NOT an example of how service providers store user data in the cloud: Objects Datasets Blocks Packets - X Files

Topic You should be able to: Content Questions CLE - Module 4 - Arch & Cybersecurity (b)14 Cybersecurity for Infrastructure, Network and Application Layers 1.MT Identify different ways of protecting data Identify Cybersecurity Concerns for How and Where Data is Stored Data must be protected to maintain confidentiality and integrity. – Confidentiality is protection from unauthorized access by those without an appropriate security clearance and need to know. Confidentiality is often protected with encryption, identity and access management and physical security measures (doors, guards, cameras, etc.) – Integrity is guarding against unwanted changes to data. For example Global Positioning System (GPS) data is protected from changes that would miss-identify locations. 1.Data must be protected to maintain confidentiality and integrity. 2.Confidentiality is protection from unauthorized access by those without an appropriate security clearance and need-to-know. 3.Integrity is guarding against unwanted changes to the data.

Topic You should be able to: Content Questions CLE - Module 4 - Arch & Cybersecurity (b)15 Where Data is Stored Identify Cybersecurity Concerns for How and Where Data is Stored Legal considerations, including legal jurisdiction, control where DoD and US Government data can be located. Impact Level 2/4: Cloud Service Providers will maintain all government data that is not physically located on DoD premises within the 50 States, the District of Columbia, and outlying areas of the US. Authorizing Officials (AOs), which will be described more in the next module, after careful consideration of the legal ramifications, may authorize other locations if necessary to support mission requirements. Impact Level 5/6: To protect against seizure and improper use by non-US persons and government entities, all data/information stored and processed for the DoD must reside in a facility under the exlusive legal jurisdictionof the US. CSPs will maintain all government data that is not physically located on DoD premises within the 50 States, the District of Columbia and outlying areas of the US.

Topic You should be able to: Content Questions CLE - Module 4 - Arch & Cybersecurity (b)16 Data Storage Cybersecurity 1.MT concerns - security Identify the Cybersecurity Concerns for How and Where Data is Stored Data storage Cybersecurity concerns generally fall into two categories. The first is the location of the physical hardware globally and the second is the configuration within a data center. Global location of the cloud data center is a concern because of local laws that may impact the confidentiality of the system. Some countries require access to any data on their soil. Generally DoD Clouds can only be located on US soil in the US. Configuration in the data center includes physical separation to mitigate risks including vulnerabilities in interfaces, APIs and management systems. 1.What are two of the cybersecurity concerns with data storage? Data center location and physical configuration of the hardware.

Topic You should be able to: Content Questions CLE - Module 4 - Arch & Cybersecurity (b)17 Identify Cybersecurity Features of Virtualization Identify the Cybersecurity Risks of Virtualization The risks and legal considerations in using virtualization technologies further restrict the types of tenants that can obtain cloud services from a virtualized environment on the same physical infrastructure and the types of cloud deployment models (i.e., public, private, community, and hybrid) in which the various types of DoD information may be processed or stored. While shared cloud environments provide significant opportunities for DoD entities, they also present unique risks to DoD data and systems that must be addressed. These risks include exploitation of vulnerabilities in virtualization technologies, interfaces to external systems, APIs, and management systems. These have the potential for providing back door connections and CSP privileged user access to customer’s systems and data (insider threat). While proper configuration of the virtual and physical environment can mitigate many of these threats, there is still residual risk that may or may not be acceptable to DoD. Legal concerns such as e-discovery and law enforcement seizure of non-government CSP customer/tenant’s data pose a threat to DoD data if it is in the same storage media. Due to these concerns, DoD is currently taking a cautious approach with regard to Level 5 information. 1.True or False: There are minimal considerations that must be accounted for when deciding whether other tenants can obtain cloud services from a virtualized environment on the same physical infrastructure in which DoD information may be processed or stored. False

Topic You should be able to: Content Questions CLE - Module 4 - Arch & Cybersecurity (b)18 Identify Cybersecurity Features of Virtualization 1.MT Identify the benefits and concerns with virtual servers Identify the Cybersecurity Benefits of Virtualization Virtual Servers enable flexible computing capacity on demand. Traditional, physical servers, required funding, purchase, receipt, mounting, configuration and maintenance for any hardware failures. Virtual Servers do not require setup or physical maintenance for the acquiring organization as the cloud provider takes care of everything from the hypervisor down through hardware. Virtual server concerns include – lack of trained workforce for cloud implementations. – Expectations that it will be considered a panacea for architecture issues in existing systems migrating to cloud. 1.What are the benefits of virtual servers? Enable flexible computing capacity on demand. 2.Which of the following is NOT a concern with virtual servers? There is a lack of trained workforce for cloud implementation They do not require mounting, configuration and maintenance for hardware failures. There is an expectation that cloud architecture is a panacea for issues in migrating existing systems to the cloud.

Topic You should be able to: Content Questions CLE - Module 4 - Arch & Cybersecurity (b)19 Data Storage Cybersecurity 1.MT Identify the benefits and concerns with virtual networks Identify the Cybersecurity Benefits of Virtualization Virtual networks can be constructed and maintained without having to move physical links and cables. Traditional networks required significant planning for changes and, as a result, took a great deal of time to implement changes. Virtual networks still require planning for secure implementation but do not require changing cable and physical router changes.

Topic You should be able to: Content Questions CLE - Module 4 - Arch & Cybersecurity (b)20 Data Storage Cybersecurity 1.MT one benefit of virtualization is sharing of resources (resources pooling/sharing) Identify the Cybersecurity Benefits of Virtualization Shared resources improve reliability and rapid access. Reliability is improved when shared storage is maintain across physical servers in redundant configurations so that a failed hard drive can be replaced without any interruption in service. For example storage across multiple machines using Hadoop stores information on 3 separate machines so that failure of 1 of 3 can be repaired without bringing down applications. The new hard drive is inserted and the cloud instance automatically configures it to replace the failed drive.

Topic You should be able to: Content Questions CLE - Module 4 - Arch & Cybersecurity (b)21 Data Storage Cybersecurity 1.MT supports elasticity 2.MT supports automation Identify the Cybersecurity Benefits of Virtualization Virtualized data storage can be configured to expand based on the needs of the system being supported. For example if an application or user requires an initial storage level of 100 GB but is expected to increase to 1TB over the course of a year the provider can set the storage to expand as it is needed. This avoids purchasing more storage than required as would be the case with traditional hardware storage. Virtualization supports many automation capabilities to enable stand up of new virtual machines. Using automatically configured systems reduces the time to implement and the likelihood of misconfigured systems. Automation can also audit virtual machines, networks and storage to ensure cybersecurity postures are maintained and kept up to date.

Topic You should be able to: Content Questions CLE - Module 4 - Arch & Cybersecurity (b)22 Data Storage Cybersecurity 1.MT physical hardware Identify the Cybersecurity Concerns with Virtualization Physical hardware includes all of the equipment provided or used by the cloud service provider. Examples include building, cooling system, power, network connectivity, server racks, servers, switches and other equipment required to support a virtualized environment. DOD must be prepared for threats that include cross talk across networks and environments. In some cases, including classified systems, servers, routers and cabling must be physically separated. Examples include separation of classified systems onto different physical networks known as “air gapping”. 1.How does a cloud service provider implement data storage cybersecurity requirements? By physically separating the hardware, such as the network connectivity, servers, switches and other equipment required to support a virtualized environment.

Topic You should be able to: Content Questions CLE - Module 4 - Arch & Cybersecurity (b)23 Data Storage Cybersecurity 1.MT requires less people, increases ability to manage more machines Identify the Cybersecurity Concerns with Virtualization Physical systems often require staff be collocated to conduct maintenance on the hardware and software. This included the need to physically press a button to restart a machine. Virtualization allows systems owners and administrators to access systems remotely to build, deploy and maintain them. This can include remote restarts of virtual machines and remote metrics visibility. Remote management can improve response times to security events and it can reduce the cost of having dedicated collocated staff. 1.How is this a concern for where the data is stored (ELO-090)?

Topic You should be able to: Content Questions CLE - Module 4 - Arch & Cybersecurity (b)24 Data Storage Cybersecurity 1.MT requires less people, increases ability to manage more machines Identify the Cybersecurity Concerns with Virtualization Physical servers and infrastructure often are managed locally. An administrator would go into the server room and log in at the actual machine. This was time consuming and expensive. Virtualized servers can be accessed remotely thus reducing time spent working on a single machine and thus making management more efficient. An administrator can log in remotely to address any security concerns or issues. This virtualized, remote access, improves response time to security incidents and can reduce the time required to mitigate vulnerabilities. 1.After reading what can be done using virtualized servers and what can be done remotely by an administrator, I become concerned that administrators may have too much privileges and there is a cybersecurity threat similar to what we experienced with Edward Snowden.

Topic You should be able to: Content Questions CLE - Module 4 - Arch & Cybersecurity (b)25 Data Storage Cybersecurity 1.MT standardization - each virtual machine is the same therefore easier to manage Identify the Cybersecurity Concerns with Virtualization Physical machine implementation is often inefficient because the hardware had to be ordered, installed, configured and managed for each server. Virtualized machines can be standardized into prepackaged installs that can be automatically implemented. This approach provides a level of standardization that makes implementation much faster and easier to operate. For example DISA and others have standardized templates for new virtual machines to make it easier to rapidly deploy the desired configuration. 1.How does standardization of data storage increase or decrease cybersecurity risks?

Topic You should be able to: Content Questions CLE - Module 4 - Arch & Cybersecurity (b)26 Data Storage Cybersecurity 1.MT concern- performance due to sharing of resources Identify the Cybersecurity Concerns with Virtualization Virtual machines are efficient because they share resources. This, however; can lead to resource constraints outside of the systems administrator’s control. For example, if one organization has virtualized their public facing web site on the same infrastructure as a commercial news service. These are logically and virtually separated but they are on the same infrastructure. In this case when a hot news story drive large data flow and processing from the news site the host may reduce the performance to the command site. This is referred to as the noisy neighbor problem. 1.Is this an availability cybersecurity risk? Virtual machines pose an increased potential of cybersecurity risks to the availability of a resource?

Topic You should be able to: Content Questions CLE - Module 4 - Arch & Cybersecurity (b)27 Data Storage Cybersecurity 1.MT faster redeployment as a result of standardization Identify the Cybersecurity Concerns with Virtualization Because cloud instances can be stood up without needing to go through the lengthily process of ordering, installing and configuring bare hardware. This results in a significant reduction labor and time needed in the tasks required by systems owners. Standardized VMs can improve security and accreditation because of their standardization. This way if a bug is identified it can be mitigated with the minimum time available. 1.I understand how having a standard virtual machine configuration can make it easy to install a cloud service offering, but doesn’t a standard configuration make it more vulnerable as a whole if an individual vulnerability is identified in one of the Virtual Machines?

Topic You should be able to: Content Questions CLE - Module 4 - Arch & Cybersecurity (b)28 Data Storage Cybersecurity 1.MT faster back-up and recovery due to standardization Identify the Cybersecurity Concerns with Virtualization Cloud implementations and their associated data can be configured to speed backup and recovery. Virtual machines or groups of these machines can be automatically backed up to physically distant data centers where common hosting environments can spin up quickly. This approach leveraged the ability to abstract the hypervisor layer and the ability to take data snapshots for backups. Depending on the configurations, standardized machines can be implemented as hot sites with load balancing across sites. This approach allows for fail over of a site without impacting the enterprise.

Topic You should be able to: Content Questions CLE - Module 4 - Arch & Cybersecurity (b)29 ELO-115 Match key cybersecurity terms from the section to appropriate definitions. 1.MT Match XYZ to the correct definition Key Cybersecurity Terms Need a list of the Cybersecurity terms

Topic You should be able to: Content Questions Summary Module 4 - Review CLE - Module 4 - Arch & Cybersecurity (b)30

Topic You should be able to: Content Questions Summary Module 4 – Summary Questions CLE - Module 4 - Arch & Cybersecurity (b)31