Types of Cloud Computing Services
NIST Cloud Deployment Reference Architecture
Containers/pen testing
Pen Testing Strategies and process
Pen testing/ Containers
100

Offers software to subscribers on demand over the internet

Software as a Service

100

A person or organization providing services to interested parties.

Cloud Provider

100

A type of security testing that evaluates an organizations ability to protects its infrastructure

Penatration Test

100

Three broad categories for penetration strategies

Black box, white box, gray box

100

This is a methodological approach to security assessments that emncompass a security audit and a vulnerability assessment, and demonstrates whether a system's vulnerabilities can be exploited

Penetration Test

200

Provides penetration testing, authentication, intrusion detection, etc. 

Security as a Service (SECaaS)
200

A party for making independent assessments of cloud services controls and taking an opinion thereon

Cloud Auditor

200

A package of an application/software, including all its dependencies that run independently of other processes in the cloud environment

Container

200

This checks whether an organization follows a set of standard security policies and procedures.

Security Audit

200

This is a data storage medium used to store digital data in logical pools using a network

Cloud storage

300

Offers development tools, configuration management, and deployment platforms on demand that can be used by subribers to develop custom applications

Platform as a Service (PaaS)

300

An entity that manages cloud services in terms of use, performance, and delivery, and maintains the relationship between cloud providers and consumers.

Cloud Broker

300

The cloud storage architecture consists of three main layers which are:

Front-end, Middleware, and back-end

300

This step in the Penetration Testing process includes defining the extent of testing, states what will be tested, where testing will be performed and who will be performing the test.

Defining the Scope

300

These connect multiple containers and services

Dockers

400

This provides virtual machines and other abstracted hardware and operating systems which may be controlled through a service API

Infrastructure as a service (IaaS)

400

An intermediary for providing connectivity and transport services between cloud consumers and providers.

Cloud Carrier

400

An open-source technology used for developing, packaging, and running applications and all its dependencies in the form of containers, to ensure that the application works in a seamless environment.

Docker

400

This step in the Pen Testing process includes listing vulnerabilities, categorizing risks, and recommending repairs if vulnerabilities are found.

Reporting and Delivering results

400

This provides application portability across heterogeneous infrastructures.

Container Network Model (CNM)

500

Provides a platform for developing, running and managing application functionalities for microservices

Container as a Service (CaaS)

500

Components of the NIST Cloud Deployment Architecture

Cloud Consumer     Cloud Provider     Cloud Carrier     Cloud Auditor

Cloud Broker

500

In what instances should a pen test be performed? List four.

Changes to infrastructure

Changes to policies 

Updated/reinstalled hardware/software

Discovery of a new threat

500

Name the three steps, in order, of the pen testing process.

Defining the scope, performing the pen test, and reporting/delivering results

500

What is the difference between a container and virtualization?

Virtualization is the ability to run multiple operating systems on a single physical system while containers are placed on the top of one physical server and host OS and share the operating system's kernel binaries and libraries.

M
e
n
u