ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 123 - 312-40 discussion

Report
Export

TeratInfo Pvt. Ltd. is an IT company that develops software products and applications for financial organizations. Owing to the cost-effective storage features and robust services provided by cloud computing, TeratInfo Pvt. Ltd. adopted cloud-based services. Recently, its security team observed a dip in the organizational system performance. Susan, a cloud security engineer, reviewed the list of publicly accessible resources, security groups, routing tables, ACLs, subnets, and IAM policies. What is this process called?

A.
Checking audit and evidence-gathering features in the cloud service
Answers
A.
Checking audit and evidence-gathering features in the cloud service
B.
Checking for the right implementation of security management
Answers
B.
Checking for the right implementation of security management
C.
Testing for virtualization management security
Answers
C.
Testing for virtualization management security
D.
Performing cloud reconnaissance
Answers
D.
Performing cloud reconnaissance
Suggested answer: D

Explanation:

The process that Susan, a cloud security engineer, is performing by reviewing the list of publicly accessible resources, security groups, routing tables, ACLs, subnets, and IAM policies is known as performing cloud reconnaissance.

1.Cloud Reconnaissance: This term refers to the process of gathering information about the cloud environment to identify potential security issues. It involves examining the configurations and settings of cloud resources to detect any misconfigurations or vulnerabilities that could be exploited by attackers.

1.Purpose of Cloud Reconnaissance:

oIdentify Publicly Accessible Resources: Determine if any resources are unintentionally exposed to the public internet.

oReview Security Groups and ACLs: Check if the access control lists (ACLs) and security groups are correctly configured to prevent unauthorized access.

oExamine Routing Tables and Subnets: Ensure that network traffic is being routed securely and that subnets are configured to segregate resources appropriately.

oAssess IAM Policies: Evaluate identity and access management (IAM) policies to ensure that they follow the principle of least privilege and do not grant excessive permissions.

1.Outcome of Cloud Reconnaissance: The outcome of this process should be a comprehensive understanding of the cloud environment's security posture, which can help in identifying and mitigating potential security risks.

Cloud Security Alliance: Cloud Reconnaissance and Security Best Practices.

NIST Cloud Computing Security Reference Architecture.

asked 18/09/2024
Novy Kingra
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first