Exam CAS-004 All QuestionsBrowse all questions from this exam
Question 69

A company is moving most of its customer-facing production systems to the cloud-facing production systems to the cloud. IaaS is the service model being used.

The Chief Executive Officer is concerned about the type of encryption available and requires the solution must have the highest level of security.

Which of the following encryption methods should the cloud security engineer select during the implementation phase?

    Correct Answer: B

    Storage-based encryption involves encrypting data at the storage level, ensuring that data remains protected whether it is at rest or in transit. This method provides comprehensive protection for the data stored on disk, making it a robust choice for securing sensitive information in a cloud environment. By encrypting data before it is written to storage, it ensures that unauthorized access to physical storage media cannot compromise the data. This makes it highly suitable for meeting the highest level of security requirements in an IaaS implementation.

Discussion
bobthemanofearthOption: B

B. We recommend that you encrypt your virtual hard disks (VHDs) to help protect your boot volume and data volumes at rest in storage, along with your encryption keys and secrets. Azure Disk Encryption helps you encrypt your Windows and Linux IaaS virtual machine disks. Azure Disk Encryption uses the industry-standard BitLocker feature of Windows and the DM-Crypt feature of Linux to provide volume encryption for the OS and the data disks. The solution is integrated with Azure Key Vault to help you control and manage the disk-encryption keys and secrets in your key vault subscription. The solution also ensures that all data on the virtual machine disks are encrypted at rest in Azure Storage. https://docs.microsoft.com/en-us/azure/security/fundamentals/iaas

Mr_BuCk3th34DOption: B

Since we're talking about IaaS we can promptly discard D, array controller-based, since this is encryption at hw level, and in most cases is not an option for cloud providers. Storage-based encryption involves encrypting data at rest, such as data stored on hard drives or in cloud storage. This is typically done using encryption keys that are managed by the cloud provider or by the customer. This method of encryption provides a high level of security, as it protects data from unauthorized access even if an attacker gains physical access to the storage media. Instance-based encryption involves encrypting data in transit, such as data transmitted over a network or the internet. While this method can provide some level of security, it is not as secure as storage-based encryption, as it does not protect data when it is at rest. Proxy-based encryption involves using a proxy server to encrypt data in transit. This method is similar to instance-based encryption, but it uses an additional layer of security by routing data through a secure server. However, it is still not as secure as storage-based encryption.

imatherOption: A

A. Instance based storage protects against physical loss or theft, external administrator(s) accessing the storage, snapshots and storage-level backups being taken and removed from the system. Storage-based only protects against hardware theft or less, so Instance based is a higher level of security https://cloudgal42.com/cloud-data-encryption-architecture-and-options/ https://www.worthinlife.com/what-is-cloud-storage-encryption/

BiteSizeOption: A

Instance-Based encryption is the highest level of security available for an IaaS. Luckily, they are in the implementation phase and can configure it that way from the start. It would be difficult to change later on. Source: Verifying against Chat GPT, my experience, other test banks, a written book, and weighing in the discussion from all users to create a 100% accurate guide for myself before I take the exam. (It isn't easy because of the time needed, but it is doing my diligence)

CASP_MasterOption: A

I would recommend using instance-based encryption for the company's customer-facing production systems in the cloud. Instance-based encryption is a method of encryption that encrypts the data at the virtual machine level before it is sent to the storage device, ensuring the highest level of data security. This method provides end-to-end encryption for data at rest, and it allows the company to maintain control over its encryption keys. Additionally, instance-based encryption is well-suited for IaaS environments as it does not require any modifications to the storage system itself, and it can be implemented easily in the virtual machine images.

javier051977Option: A

Instance-based encryption refers to the encryption of data at the instance level, where the encryption keys are generated and managed at the instance level. This provides granular control over the encryption of data, ensuring that the data is protected both at rest and in transit.

sadamishspicOption: A

Instance-Based = Individual instances or VMS = IAAS

loucrassOption: B

The correct answer is Storage based or B

surfugandaOption: B

B. Storage-based encryption: Storage-based encryption involves encrypting data at the storage level, typically at the disk or volume level. In this approach, data is encrypted before it is written to disk, ensuring that it remains encrypted while at rest. Storage-based encryption offers comprehensive protection for data stored on disk, regardless of the specific instances or VMs accessing the storage. By encrypting data at the storage level, organizations can ensure that data remains protected both at rest and during transmission, providing robust security for customer-facing production systems. This approach is well-suited for IaaS environments as it provides a centralized and consistent method for securing data across multiple instances or VMs.

Delab202Option: B

For the highest level of security in an IaaS (Infrastructure as a Service) cloud environment, where customer-facing production systems are being moved, the most appropriate encryption method would be: B. Storage-based Storage-based encryption typically involves encrypting the data at rest within the storage infrastructure. This ensures that the data stored in the cloud storage, such as block storage or object storage, is protected by encryption. It provides a robust level of security for sensitive data and helps prevent unauthorized access to the stored information.

AnarckiiOption: B

B. Storage-based Storage-based encryption involves encrypting data at the storage level, ensuring that data remains protected whether it is at rest or in transit.

OdinAtlasSteelOption: B

In the context of the highest level of security for encryption in a cloud environment, while instance-based encryption can provide security for data in transit or during processing within specific instances, it's important to note that the highest level of security for data protection in a cloud environment is generally achieved through storage-based encryption. Storage-based encryption focuses on encrypting data at rest, meaning the data stored within the cloud storage is encrypted. This method ensures that even if someone gains unauthorized access to the stored data, they won't be able to interpret or access it without the necessary decryption keys.

strong1Option: B

B: for the highest level of security in an IaaS environment when moving customer-facing production systems to the cloud, you should prioritize data encryption at rest. Therefore, options B (Storage-based) and D (Array controller-based) are the most relevant choices, with the specific choice depending on your cloud provider and infrastructure setup.

p1s3cOption: B

Based on the options provided, the most relevant encryption method for an IaaS cloud environment would be storage-based encryption. This method provides encryption of data at rest, which can help ensure the confidentiality of sensitive information stored in the cloud environment. Instance-based encryption only encrypts data in transit, while proxy-based and array controller-based encryption are not typically used in IaaS environments. However, it's important to note that encryption alone may not be sufficient to ensure the security of a cloud environment, and other security measures such as access control, monitoring, and vulnerability management should also be implemented.

BLADESWIFTKNIFEOption: B

Storage encryption is the use of encryption for data both in transit and on storage media. Data is encrypted while it passes to storage devices, such as individual hard disks, tape drives, or the libraries and arrays that contain them.

23169fdOption: B

Instance-base may not cover all data at rest comprehensively, especially if data is moved outside the instance.

cyspecOption: A

Can't find relevant information on "storage-based" encryption.