OBJECTIVE 3.1 Compare and contrast

Compare and contrast security implications of different architecture models

Every architecture model has different security tradeoffs. The exam tests whether you can evaluate which model fits a given scenario and what security controls each requires.

Cloud Models

Infrastructure as a Service (IaaS)

Provider manages: physical hardware, networking, virtualization. Customer manages: OS, middleware, runtime, applications, data.

  • Most control, most responsibility. You patch the OS, configure firewalls, manage access.
  • Examples: AWS EC2, Azure VMs, Google Compute Engine
  • Security implication: Misconfiguration is on you. A misconfigured security group is your problem, not the provider’s.

Platform as a Service (PaaS)

Provider manages: everything in IaaS + OS, middleware, runtime. Customer manages: applications and data.

  • Less control, less operational burden. Provider handles patching the underlying platform.
  • Examples: AWS Elastic Beanstalk, Azure App Service, Heroku
  • Security implication: You can’t harden the OS directly. Trust the provider’s security or don’t use the platform.

Software as a Service (SaaS)

Provider manages: everything. Customer manages: data and user access configuration.

  • Least control. You configure the application; the provider runs everything underneath.
  • Examples: Microsoft 365, Salesforce, Google Workspace
  • Security implication: Your security levers are limited to access controls, data policies, and API integrations. Shadow IT risk — users adopt SaaS without IT approval.

Anything as a Service (XaaS)

Catch-all for other service models: Security as a Service (SECaaS), Desktop as a Service (DaaS), etc.

Shared Responsibility Model

The single most important concept in cloud security:

LayerIaaSPaaSSaaS
DataCustomerCustomerCustomer
ApplicationCustomerCustomerProvider
OS/RuntimeCustomerProviderProvider
InfrastructureProviderProviderProvider
PhysicalProviderProviderProvider

Exam trap: Questions will describe a cloud security incident and ask who’s responsible. Data classification and access control are ALWAYS the customer’s responsibility regardless of model.

Deployment Models

Public Cloud

Shared infrastructure operated by a third-party provider. Multi-tenant — your workloads run alongside other customers’.

  • Cost-effective, scalable, but you share the physical infrastructure

Private Cloud

Dedicated infrastructure for a single organization. Can be on-premises or hosted.

  • More control, higher cost. May be required for compliance (HIPAA, classified data)

Hybrid Cloud

Combination of public and private. Workloads move between them based on requirements.

  • Sensitive data stays private; burstable/scalable workloads go public
  • Security challenge: Consistent policy enforcement across both environments

Community Cloud

Shared infrastructure for organizations with common requirements (e.g., government agencies, healthcare providers).

On-Premises

All infrastructure owned, operated, and maintained in your own facilities.

  • Full control, full responsibility. You own every layer of the stack.
  • Security advantage: Data never leaves your physical control
  • Security disadvantage: You need the expertise and budget for every aspect of security
  • Increasingly rare as a pure model — most orgs are hybrid

Edge and Fog Computing

Edge Computing

Processing data near the source (IoT devices, local gateways) rather than in a central data center.

  • Reduces latency, reduces bandwidth to central systems
  • Security challenge: Many distributed nodes, each a potential attack surface. Physical security of edge devices is often weak.

Fog Computing

Intermediate layer between edge devices and the cloud. Local processing with cloud coordination.

  • Aggregates and pre-processes edge data before sending to cloud

Containerization and Microservices

Containers

Lightweight, isolated environments that package an application with its dependencies.

  • Docker, Podman, containerd
  • Share the host OS kernel (unlike VMs which have their own OS)
  • Security considerations:
    • Container escape vulnerabilities (breaking out to the host)
    • Image security — base images may contain vulnerabilities
    • Registry security — only pull from trusted registries
    • Least privilege — containers shouldn’t run as root
    • Immutable deployments — don’t patch running containers, replace them

Microservices

Architecture pattern where an application is composed of small, independent services communicating via APIs.

  • Each service can be developed, deployed, and scaled independently
  • Security considerations:
    • Service-to-service authentication (mTLS, service mesh)
    • API security for every service boundary
    • Increased east-west traffic that must be monitored
    • More components = larger attack surface to manage

Serverless

Functions that run on-demand without managing servers. Provider handles all infrastructure.

  • AWS Lambda, Azure Functions, Cloudflare Workers
  • Security considerations: Execution environment is ephemeral. You control the code; the provider controls everything else. Function permissions must follow least privilege. Cold-start timing can leak information.

Infrastructure as Code (IaC)

Defining infrastructure through machine-readable configuration files rather than manual setup.

  • Terraform, CloudFormation, Pulumi, Ansible
  • Security benefit: Repeatable, auditable, version-controlled deployments. Drift detection catches unauthorized changes.
  • Security risk: IaC templates with hardcoded secrets or overly permissive defaults become a vulnerability at scale.

Software-Defined Networking (SDN)

Separating the control plane (routing decisions) from the data plane (packet forwarding).

  • Centralized network management, programmable policies
  • Security benefit: Granular microsegmentation, rapid policy changes, consistent enforcement
  • Security risk: The SDN controller is a high-value target — compromise it and you control the entire network

SCADA/ICS and Embedded Systems

Industrial Control Systems (ICS)

Systems that manage physical processes — power grids, water treatment, manufacturing.

SCADA (Supervisory Control and Data Acquisition)

Specific type of ICS for remote monitoring and control of industrial processes.

  • Often legacy systems with long lifecycles (15-25 years)
  • May run outdated, unpatched operating systems
  • Originally designed for isolated networks, now increasingly connected
  • Security considerations:
    • Air gapping (physical isolation) where possible
    • Network segmentation between IT and OT (Operational Technology)
    • Availability is the priority — downtime can cause physical damage or safety hazards
    • Patching is complex — requires maintenance windows and vendor coordination

IoT (Internet of Things)

Connected devices: cameras, sensors, smart appliances, medical devices.

  • Often have weak default credentials, limited update mechanisms, minimal security features
  • Massive attack surface — billions of devices, many unmanaged

Offensive Context

Architecture choices determine the attack surface before a single line of code is written. An attacker evaluating a target asks: cloud or on-prem? What’s the shared responsibility boundary? Are containers hardened or running default Docker Hub images as root? Is the ICS network truly air-gapped or is there a forgotten VPN bridge? The architecture model you choose doesn’t just affect how you defend — it determines what the attacker targets first.