1.2 Given a scenario, analyze the organizational requirements to determine the proper infrastructure security design.
Scalability
Scalability is a system's ability to adapt to demand.
Vertically
When a system becomes overwhelmed by requests, we can add more compute resources (CPUs, RAM, faster I/O, networking connections) to the system to enable it to handle the demand. This approach may be more volatile.
Horizontally
When a system becomes overwhelmed by requests, we can add more systems to enable the service to handle the demand.
Resiliency
High availability
High availability provides ensures that systems will have limited downtime.
Diversity/heterogeneity
Relying too heavily on one vendor could impact the security of the environemnt. With the rise of zero-day exploits and supply-chain attacks, one vendor could bring down your environment.
Course of action orchestration
The creation of automated responses to avoid outages. Having scripts respond to outages or other issues increases reaction time to an incident.
Distributed allocation
Having distributed systems that share the workload help provide high availability.
Redundancy
The duplication of systems and data can help with any sort of loss to availability.
Replication
Data that is held in the primary instance is copied to a standby instance, this helps support high availability, backups, and disaster recovery.
Clustering
High availability can be provided through clustering the application. Multiple servers host the application and depending on the workload of each server a load balancer assigns requests to servers that have less workload.
Automation
Autoscaling
When there is a spike in demand additional compute resources can be automatically provisioned to meet the need.
Security Orchestration, Automation, and Response (SOAR)
Automated responses that a SOC uses to respond to security events using Runbooks.
Bootstrapping
Creation of configurations for VMs that are automatically provisioned to help meet demand.
Performance
When designing the security of networks, infrastructure, and procedures performance must be taken into account. Part of the CIA triad is Availability, having low performance due to improperly configuring the infrastructure is a security issue.
Containerization
Using containers such as Docker help provide quick and easy provisioning of applications. Ensure that the containers that are being implemented are secure.
Virtualization
Virtualization allows an organization to run virtual equipment on a hypervisor. This allows an organization to run multiple OSes on a single physical server.
Content delivery network
Content delivery networks are dispersed servers that deliver content to end users. This helps speed up delivery of the content and protects against DDOS attackes/
Caching
Data that is commonly or recently accessed can be stored in high-speed storage like RAM, this speeds the delivery of the content to the end user.