CCSK

Course
Time
9 hours 29 minutes
Difficulty
Intermediate
CEU/CPE
10

Video Transcription

00:04
this is domain seven infrastructure security.
00:07
We've talked about resource pooling. Being one of the key aspects of cloud
00:12
virtualization is what allows the common pools of physical resources to be allocated to logical cloud. Resource is when you have multiple tenants sharing the same physical resource pools, the cloud provider needs to design things in a way that tenants can isolate themselves within those pools.
00:30
This module will focus on how the cloud provider organizes things to support 10 and isolation.
00:35
And it will talk about how the tenant needs to organize their virtual workloads to keep themselves secure both from other tenants. But more importantly, from the various threats roaming the general Internet
00:48
in this module, we're going to cover Cloud Network, virtualization, Cloud Network security and Cloud Computer and workload, security
00:58
and the remainder of this video. We will gain a perspective on where in the stack this infrastructure security sits.
01:04
We'll talk about common designs for the underlying cloud networks, and we will review the OS I model of traditional networking.
01:14
So it's the pooling of the physical resource is that build the cloud. This is at the very bottom of that pyramid, the raw physical and logical compute networks and storage used by cloud providers to create the resource pools that the cloud customers then use.
01:30
Securing the physical is a discipline of its own. We're talking about creating man trapped doorways, guard dogs, camera systems and so on. We won't be getting into this, But if you ever want some entertainment, go to YouTube and search for videos of semi trucks testing vehicle barriers. You will see some serious metal carnage,
01:49
and there's no way someone's going to blow through one of those to get into your data center.
01:53
Being our focus is cloud. It's much more virtual, little more abstract, and we're going to place our emphasis on securing those. Resource is, this is the virtual infrastructure managed by a cloud user is a result of what the cloud user creates in the management plane. These air, the virtual networks, the virtual machines, virtual storage
02:13
and the many other virtual devices
02:15
on the right hand side is the logical stack that you've seen many times over Domain seven. The infrastructure security domain focuses on the infrastructure layer of that stack.
02:27
This shouldn't be much of a surprise, but is really worth burning this logical stack into your mind that you will definitely get questions about this stack. In the exam,
02:36
Cloud providers use some form of virtual networking to abstract the physical network and network resource pools.
02:43
Standard network designs won't allow the cloud provider to keep multiple tenants secure and empower them to define their own virtual networks. Physical segregation of the networks used in the cloud is important for operational and security reasons.
02:57
Specific providers are gonna have differences in the way they designed these, especially the very large scale providers. But there is generally a common theme.
03:06
The overall cloud network often consists of three separate networks. Thes air separated at the physical layer, meaning separate network cables, separate router devices and so forth.
03:16
Starting at the bottom, we have the service network. This is for communication between virtual machines and the Internet, and it's the basis for the network resource pool.
03:27
Then we have the storage networks. These connect data storage to the virtual machines to the compute, so that would include large scale storage devices as well as the logical hard drives associated with the virtual machines. And finally we have the management at work. This is what hosts that management plain and sends controlled all the notes
03:46
in domain. Six. We spent a good amount of effort talking about the management plane
03:50
and how you really want to secure that We're putting the servers themselves. That host that management plane is a great way to create a strong perimeter around the management plane for the provider to give that level of security and fulfill their portion of the responsibilities.
04:05
There are a lot of other ways to architect a cloud environment, But again, this is a common baseline often used in private cloud, where they don't quite have the same level of complexity and the need to deal with scale to such an extensive amount as the large public cloud providers dio,
04:23
the open Systems interconnection reference model is very commonly used when talking about network traffic. This is the OS I model.
04:31
You won't be directly tested on this in the CCS K, but since we're going to be talking about software defined networks, it's very important you have a grasp of this as a may make reference to the layers by numbers. For example, we just talked about the three networks within a cloud provider and these were physically separated.
04:48
In other words, I could say these air separated at layer watches the physical layer
04:54
that the media itself resides on and the information flows through.
04:58
For example, this includes fiber optic cable, co axial cable, even radio waves floating through the air, which is what we call WiFi or wireless.
05:08
Taking the moment to walk up the OS I layers, we have layer to.
05:12
This is where low level frames are created, the physical addressing its the either net. It's where your switches work, your bridges
05:19
and moving upto layer three. We have the networking layer. This is where the packets exist, where the logical network topology is determined and how routing of those packets across the logical topology is set up, often referred to as the I P. Layer and moving up one, we have the transport layer layer four,
05:38
and this layer helps ensure end end connections
05:41
and bring some reliability. You could have TCP where they ensure no packets get lost, and it has a protocol to have packets recent that they get lost or you can using GDP, which is gonna be a lot faster, but you're not gonna have the same level of reliability in the packet transmissions.
05:58
Moving up another layer. We have layer five, which is the session layer. This is the inter host communication. We're talking about a P eyes and sockets
06:06
and continuing up. We have the presentation layer. So data formatting and encryption. This is your SSL your ssh I map for e mails or FTP for file transfers. And then finally we have the application layer these air the network services, the top portion of the protocols. Http
06:26
Ssh and DNS are very common protocols at this layer.
06:30
And while this won't be directly tested on this see CSK exam, it's good to have a feeling of how these layers work and how they logically inter correlate. A lot of times, layer one and two are talked about together three and four, they work together, and then 56 and seven are often put into a similar bucket on discussions. And if you ever want a pneumonic
06:50
to memorize Theo s I model,
06:53
the one that I personally like and there's a lot of amount there, but one that I've I found have stuck with me is programmers do not throw sausage pizza away.
07:03
So programmers do not throw sausage pizza away. So please keep that one in mind. If you ever stuck, you can just write that down on a piece of paper and impress all your friends by knowing the OS I model.
07:15
In this video, we started out looking at infrastructure security and where it fits into the grander context of cloud. We talked about common designs for underlying cloud networks themselves. And then we did a review of the O S I model.
07:27
We will be building on this in the next video, and I look forward to seeing you there.

Up Next

CCSK

This course prepares you to take the CCSK certification by covering material included in the exam. It explains how the exam can be taken and how CCSK certification process works.

Instructed By

Instructor Profile Image
James Leone
Cloud, IoT & DevSecOps at Abbott
Instructor