Video description
The complete Certified Cloud Security Professional video course with CCSK extras by Dean Bushmiller
Domain 1 Cloud Concepts, Architecture and Design
1.1 Understand cloud computing concepts
Cloud computing definitionsCloud computing roles and responsibilitiesKey cloud computing characteristicsBuilding block technologies1.2 Describe cloud reference architecture
Cloud computing activitiesCloud service capabilitiesCloud service categories IaaS, PaaS, SaaSCloud deployment modelsCloud shared considerations , auditability, regulatory, outsourcing1.3 Understand security concepts relevant to cloud computing
Cryptography and key managementIdentity and access controlData and media sanitizationNetwork securityVirtualization securityCommon threatsSecurity hygiene1.4 Understand design principles of secure cloud computing
Cloud secure data lifecycleCloud-based business continuity and disaster recovery planBusiness impact analysisFunctional security requirementsSecurity considerations and responsibilities for different cloud categoriesCloud design patterns Enterprise ArchitectureDevOps security1.5 Evaluate cloud service providers
Verification against criteriaSystem/subsystem product certificationsDomain 2 Cloud Data Security
2.1 Describe cloud data concepts
Cloud data life cycle phasesData dispersionData flows2.2 Design and implement cloud data storage architectures
Storage typesThreats to storage types2.3 Design and apply data security technologies and strategies
Encryption and key managementHashingData obfuscationTokenizationData loss preventionKeys, secrets and certificates management2.4 Implement data discovery
Structured dataUnstructured dataSemi-structured dataData location2.5 Plan and implement data classification
Data classification policiesData mappingData labeling2.6 Design and implement Information Rights Management
Legal hold2.7 Design and implement auditability, traceability and accountability of data events
Definition of event sources and requirement of event attributes address, geolocationLogging, storage and analysis of data eventsChain of custody and non repudiationDomain 3 Cloud Platform and Infrastructure Security
3.1 Comprehend cloud infrastructure and platform components
Physical environmentNetwork and communicationsComputeVirtualizationStorageManagement plane3.2 Design a secure data center
Logical designPhysical designEnvironmental designDesign resilient3.3 Analyze risks associated with cloud infrastructure and platforms
Risk assessmentCloud vulnerabilities, threats and attacksRisk mitigation strategies3.4 Plan and implementation of security controls
Physical and environmental protectionSystem, storage and communication protectionIdentification, authentication and authorization in cloud environmentsAudit mechanisms correlation, packet capture3.5 Plan business continuity and disaster recovery
Business continuity and disaster recovery strategiesBusiness requirements , Recovery Point ObjectiveCreation, implementation and testing of planDomain 4 Cloud Application Security
4.1 Advocate training and awareness for application security
Cloud development basicsCommon pitfallsCommon cloud vulnerabilities OWASP Top 104.2 Describe the Secure Software Development Life Cycle process
Business requirementsPhases and methodologies4.3 Apply the Secure Software Development Life Cycle
Cloud specific risksThreat modeling STRIDE and DREADAvoid common vulnerabilities during developmentSecure coding Application Security Verification StandardSoftware configuration management and versioning4.4 Apply cloud software assurance and validation
Functional and non functional testingSecurity testing methodologies SAST DASTQuality assuranceAbuse case testing4.5 Use verified secure software
Securing application programming interfacesSupply chain managementThird party software managementValidated open source software4.6 Comprehend the specifics of cloud application architecture
Supplemental security components , Database Activity Monitoring, Extensible Markup Language firewalls, application programming interface gatewayCryptographySandboxingApplication virtualization and orchestration4.7 Design appropriate identity and access management solutions
Federated identityIdentity providersSingle sign onMulti factor authenticationCloud access security brokerSecrets managementDomain 5 Cloud Security Operations
5.1 Build and implement physical and logical infrastructure for cloud environment
Hardware specific security configuration requirements and Trusted Platform ModuleInstallation and configuration of management toolsVirtual hardware specific security configuration requirements , Hypervisor typesInstallation of guest operating system virtualization toolsets5.2 Operate and maintain physical and logical infrastructure for cloud environment
Access controls for local and remote access , secure terminal access, Secure Shell, console based access mechanisms, jumpboxes, virtual clientSecure network configuration , Transport Layer Security, Dynamic Host Configuration Protocol, Domain Name System Security Extensions, virtual private networkNetwork security controls , intrusion prevention systems, honeypots, vulnerability assessments, network security groups, bastion hostOperating system hardening through the application of baselines, monitoring and remediationPatch managementInfrastructure as Code strategyAvailability of clustered hostsAvailability of guest operating systemPerformance and capacity monitoringHardware monitoringConfiguration of host and guest operating system backup and restore functionsManagement plane5.3 Implement operational controls and standards
Change managementContinuity managementInformation security managementContinual service improvement managementIncident managementProblem managementRelease managementDeployment managementConfiguration managementService level managementAvailability managementCapacity management5.4 Support digital forensics
Forensic data collection methodologiesEvidence managementCollect, acquire, and preserve digital evidence5.5 Manage communication with relevant parties
VendorsCustomersPartnersRegulatorsOther stakeholders5.6 Manage security operations
Security operations centerIntelligent monitoring of security controls , intrusion prevention systems, honeypots, network security groups, artificial intelligenceLog capture and analysis , log managementIncident managementVulnerability assessmentsDomain 6 Legal, Risk and Compliance
6.1 Articulate legal requirements and unique risks within the cloud environment
Conflicting international legislationEvaluation of legal risks specific to cloud computingLegal framework and guidelineseDiscoveryForensics requirements6.2 Understand privacy issues
Difference between contractual and regulated private data , personally identifiable informationCountry specific legislation related to private data , personally identifiable informationJurisdictional differences in data privacyStandard privacy requirementsPrivacy Impact Assessments6.3 Understand audit process, methodologies, and required adaptations for a cloud environment
Internal and external audit controlsImpact of audit requirementsIdentify assurance challenges of virtualization and cloudTypes of audit reportsRestrictions of audit scope statementsGap analysisAudit planningInternal information security management systemInternal information security controls systemPoliciesIdentification and involvement of relevant stakeholdersSpecialized compliance requirements for highly regulated industriesImpact of distributed information technology model6.4 Understand implications of cloud to enterprise risk management
Assess providers risk management programsDifference between data owner/controller vs. data custodian/processorRegulatory transparency requirements , General Data Protection RegulationRisk treatmentDifferent risk frameworksMetrics for risk managementAssessment of risk environment6.5 Understand outsourcing and cloud contract design
Business requirements , master service agreement, statement of workVendor managementContract managementSupply chain management
Table of Contents
Meta Material 0 Preparation for all topics
Welcome
Mindmaps
Notecards Activity
Readings
Cloud lab or NOT Choose a Cloud Management Platform
Cloud+, CCSK, CCSP
CCSP Exam Overview
Core Cloud Concepts
Core Cloud Concepts Introduction
Storage, Networking, CPU, RAM
Metal Enterprise computing before cloud
Virtualization of everything but not cloud yet
Concepts reference architecture
Vendor component names
From Containers to Serverless
Architecture
Governance
Data security
Data security Introduction
Data storage architectures
Security technologies and strategies
Data discovery
Information rights management
Data retention
Auditability
Platform and infrastructure security
Platform and infrastructure security Introduction
Infrastructure and platform components
Risks of infrastructure and platform
Infrastructure and platform security controls
Business Continuity and Disaster Recovery
Application security
Application security Introduction
Training and awareness for application security
Secure software development life cycle SDLC process
Software assurance and validation
Verify secure software
Application architecture
Identity and Access Management
Operations security
Operations security Introduction
Build and implement infrastructure
Operate and maintain infrastructure
Digital forensics
Manage security operations
Legal, risk, compliance, audit
Legal, risk, compliance, audit Introduction
Legal requirements unique to cloud
Privacy issues
Audit process methodologies
Cloud enterprise risk management
Cloud Security Alliance Security as a Service
Security as a Service Introduction
Identity and Access Management
Data Loss Prevention
Web Security
Email Security
Security Assessments
Intrusion Management
Security Information and Event Management
Encryption
BCP and DR
Network Security