In cloud security, what is the core principle of Identity and Access Management (IAM) that ensures users and systems are granted only the minimum permissions needed to perform their tasks?
Principle of Least Privilege
You need to limit a user's access to specific resources in a cloud environment, such as granting permission only to certain virtual machines while restricting access to others. What security mechanism should you use?
Authorization
What does an IAM policy define?
Permission and access control rules
A network engineer sets up firewall rules to protect their organization's web application from online threats. To further enhance the application's security against common web exploits like SQL injection or cross-site scripting (XSS), what additional tool should they implement?
WAF
In Google Cloud, what is used to authenticate applications and services, allowing them to securely access Google Cloud resources?
Service Accounts
Your company’s website experiences a sudden surge in traffic, overwhelming the servers and causing the site to crash. What type of attack is likely responsible for this disruption?
DDoS Attack (Distributed Denial of Service)
You need to ensure that different teams have varying levels of access to resources across your cloud environment, what IAM solution allows you to grant precise permissions, facilitating seamless collaboration between your teams while maintaining security and governance?
IAM Roles (AWS)
In a cloud environment, a hacker attempts to overload a specific web application with a high volume of fake requests, causing it to slow down and eventually crash. What type of cyberattack does this scenario represent?
What is an Application Layer Attack, or HTTP Floods/DNS Query Attacks
The following image contains an IAM policy for a network engineer.
TWO PART QUESTION:
1) Name the cloud platform where the policy originates.
2) Does the policy follow the principles of least privilege?
1) Google Cloud Platform (GCP)
2) Policy does not follow the principles of least privilege
In a cloud environment, a hacker launches a massive flood of network traffic with the intention of overwhelming the network's capacity, causing it to become unresponsive. At what layer would this cyberattack occur?
Infrastructure layer or, Layer 3 & Layer 4 of the OSI model