CySA+
  • CySA+ CS0-002 Exam Objectives
  • Threat Intelligence Cycle
  • Intelligence Sources
  • Security Intelligence Sharing
  • Threat Classification and Threat Actors
  • Threat Research and Indicators of Compromise
  • Attack Frameworks and The Cyber Kill Chain
  • Defining Threat Modeling and Threat Hunting
  • Vulnerability Identification and Validation
  • Vulnerability Scan Results and CVSS Scores
  • Nmap and Enumeration
  • Security Controls
  • Defense in Depth Security Baselines
  • Security Trend Analysis
  • Remediation Issues
  • Asset, Change, and Configuration Management
  • Software Development Lifecycle & Development Models
  • Software Assessment and Code Review
  • Mitigating Attack Types Part 1
  • Mitigating Attack Types Part 2
  • Mitigating Attack Types Part 3
  • Password Cracking and Hashing
  • Privilege Escalation & Man-in-the-Middle
  • Network Based IoCs
  • Host Based IoCs
  • Network Architecture and Segmentation
  • Network Traffic, Packet, and Protocol Analysis
  • Pentesting and Active Defense
  • Firewalls
  • URL Analysis & DNS in Malware
  • Network Access Control and Port Security
  • Identity and Access Management (IAM)
  • Web Application Scanners
  • SSL/TLS Digital Certificate Management
  • Mobile Threats
  • Email Threats and Mitigation
  • Data Loss Prevention (DLP)
  • Endpoint Security and Behavior Analysis
  • Hardware Assurance
  • Blackholes and Sinkholes
  • IoT, Embedded Systems & ICS/SCADA Threats
  • Log Analysis & Continuous Security Monitoring
  • SIEM and Event Correlation
  • Malware Analysis
  • Cloud Models and Service Threats
  • Cloud Automation and Other Cloud Threats
  • VDI, Containers, and Microservices
  • CI/CD, IaC, DevOps
  • AI and Machine Learning
  • Digital Forensics
  • Technical Controls for Securing Data
  • Non-Technical Controls for Securing Data
  • Security Policies and Procedures
  • Continuity Planning and Risk Assessment
  • Incident Response Phases and Communication
Powered by GitBook
On this page

VDI, Containers, and Microservices

  • VMs running in a data center instead of dedicated desktops/laptops

  • Thin clients (minimal computers) for remote connections to the VMs.

  • Management heaven

  • Single point of failure

  • SOA – Service Oriented Architecture

    • Then: monolithic (all in one) apps

    • Now: Virtualized app components designed around business requirements

    • Inputs and outputs

    • Sub services

    • No external state

    • Independent upgrades

    • Code independent

    • Easier interoperability

    • Communication mesh

  • Containers – Isolated environments designed to run a set of applications

    • Docker

    • Flexible and fast

    • Development: create and destroy test environments

    • Packaging and distributing apps

    • Infrastructure as Code

    • Less secure out of the box than VMs

  • Microservices

    • Split larger, monolithic functionality into individual microservices.

    • Replace, upgrade components individually

    • Brings the SOA approach to software development (agile)

    • No such thing as sub-microservice

    • Unix philosophy: each piece of software should do one thing and do it well.

    • Containers: #1 solution for a pure microservices based architecture

  • SOAP

    • Microservices (and soa-based solutions) must communicate with each other

    • Historically, this was ensured by SOAP – Simple Object Access Protocol

    • SOAP manages sending and receiving data in web apps using XML

    • Security features: auth, encryptions, async, errors

    • Risks:

      • Proving

      • Coercive parsing

      • External references

      • Malware

      • SQL injection

  • REST APIs

    • Used for interaction with services in a programmatic way

    • Machine to machine communication

    • SOAP (XML) vs REST APIs (HTTP)

    • APIs increase attack surface

    • API keys

    • REST (Representaiton State Transfer)

    • Principles:

      • Uniformity

      • Decoupling

      • Statelessness

      • Cacheabiltiy

PreviousCloud Automation and Other Cloud ThreatsNextCI/CD, IaC, DevOps

Last updated 2 years ago