CCSP (ISC)2 Certified Cloud Security Professional Exam Guide Build Your Knowledge to Pass the CCSP Exam with Expert Guidance

Become a Certified Cloud Security Professional and open new avenues for growth in your career Purchase of this book unlocks access to web-based exam prep resources including mock exams, flashcards, exam tips, and the eBook PDF Key Features Gain confidence to pass the CCSP exam with tricks, technique...

Descripción completa

Detalles Bibliográficos
Otros Autores: Turner, Omar A., author (author), Lakshmana, Navya, author
Formato: Libro electrónico
Idioma:Inglés
Publicado: Birmingham, England : Packt Publishing Ltd [2024]
Edición:First edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009835405406719
Tabla de Contenidos:
  • Cover
  • FM
  • Copyright
  • Contributors
  • Table of Contents
  • Preface
  • Chapter 1: Core Cloud Concepts
  • Making the Most Out of This Book - Your Certification and Beyond
  • What Is Cloud Computing?
  • Essential Cloud Computing Characteristics
  • Cloud Stakeholders
  • ISO/IEC 17789 CCRA Roles and Sub-Roles
  • Cloud Service Customer
  • CSP
  • Cloud Service Partner
  • Cloud Auditor
  • NIST Cloud Computing Key Actors
  • Cloud Consumer
  • Cloud Provider
  • Cloud Broker
  • Cloud Auditor (CA)
  • Cloud Carrier (CC)
  • Key Cloud Computing Technologies and Building Blocks
  • Summary
  • Exam Readiness Drill - Chapter Review Questions
  • Chapter 2: Cloud Reference Architecture
  • Cloud Service Models
  • Software as a Service (SaaS)
  • Platform as a Service (PaaS)
  • Infrastructure as a Service (IaaS)
  • Cloud Service Models and Categories
  • Cloud Deployment Models
  • Shared Responsibility Model
  • Shared Considerations for Cloud Deployments
  • Emerging Technologies in Cloud Computing
  • Data Science
  • Artificial Intelligence and Machine Learning (AI/ML)
  • Blockchain
  • Internet of Things (IoT)
  • Containers
  • Quantum Computing
  • Quantum as a Service (QaaS)
  • Quantum-Enhanced Optimization and ML
  • Quantum Simulation and Modeling
  • Quantum Cloud-Based Software Development
  • Edge Computing
  • Confidential Computing
  • Summary
  • Exam Readiness Drill - Chapter Review Questions
  • Chapter 3: Top Threats and Essential Cloud Security Concepts and Controls
  • The CIA Triad-Confidentiality, Integrity, and Availability
  • Common Threats to Cloud Deployments
  • Data Breaches
  • Misconfiguration
  • Insecure APIs
  • Insider Threats
  • Account Hijacking
  • Security Control Categories and Types
  • Security Control Categories/Classes
  • Security Control Types and Functionality
  • Summary
  • Exam Readiness Drill - Chapter Review Questions.
  • Chapter 4: Design Principles for Secure Cloud Computing
  • Security for IaaS, SaaS, and PaaS
  • Security Considerations for Infrastructure as a Service (IaaS)
  • Core Elements of Security for IaaS
  • Security Considerations for Platform as a Service (PaaS)
  • Core Elements of Security for PaaS
  • Security Considerations for Software as a Service (SaaS)
  • Core Elements of Security for SaaS
  • Shared Responsibility Model for Cloud Service Models
  • Review of Your Responsibilities
  • Summary
  • Exam Readiness Drill - Chapter Review Questions
  • Chapter 5: How to Evaluate Your Cloud Service Provider
  • Key Cloud Service Contractual Documents
  • CSA
  • The Customer Agreement
  • The CSA from a CSP Perspective
  • AUP
  • The Purpose of an AUP
  • The Importance of an AUP
  • SLA
  • The Purpose of an SLA
  • The Key Characteristics of an SLA
  • The Importance of an SLA
  • Evaluation of the CSP Services
  • Know Your Business Needs
  • Assessing Security and Compliance
  • Summary
  • Exam Readiness Drill - Chapter Review Questions
  • Chapter 6: Cloud Data Security Concepts and Architectures
  • Structured and Unstructured Data
  • Key Differences
  • The Cloud Data Lifecycle
  • Data Creation or Procurement
  • Data Storage
  • Data Usage
  • Data Sharing
  • Data Archiving
  • Data Destruction
  • Various Storage Types and Common Threats
  • Object Storage
  • File Storage
  • Block Storage
  • Prevalent Threats to Cloud Data
  • Security Measures for Cloud Object Storage, File Storage, and Block Storage
  • Data Classification and Discovery
  • Recommended Data Classification Process
  • Cloud Data Security Technologies and Common Strategies
  • Encryption in Cloud Data Security
  • IAM
  • SIEM
  • Firewall and Intrusion Detection Systems
  • Data Loss Prevention Tools
  • Critical Cloud Data Security Strategies
  • Importance of a Cloud Security Policy.
  • Implementing a Cloud Security Policy
  • Regular Security Audits and Assessments
  • Employee Training and Awareness
  • Regular Data Backups and Recovery Planning
  • Best Practices for Data Retention, Archival, and Deletion
  • Understanding Data Lifecycle Management
  • Implementing Data Retention Policies
  • Secure Data Deletion Techniques
  • Effective Data Archiving Solutions
  • Compliance with Data Protection Regulations
  • Lessons from Cloud Data Security Breaches
  • Summary
  • Exam Readiness Drill - Chapter Review Questions
  • Chapter 7: Data Governance Essentials
  • Data Governance
  • Data Dispersion in the Cloud
  • The Importance of Data Governance for Cloud Security
  • Leveraging Cloud-Specific Tools and Services
  • IRM
  • The Role of IRM in Data Governance
  • Key Components of an Effective IRM System
  • IRM and Cloud Computing
  • Implementing IRM
  • Implementing IRM in a Cloud Environment
  • Best Practices for IRM Implementation
  • Case Studies of Successful IRM Implementation
  • Auditability in Cloud Data Governance
  • Implementing Auditability in the Cloud
  • Traceability in Cloud Data Governance
  • Implementing Traceability in the Cloud
  • Tools and Technologies for Enhancing Traceability
  • Accountability in Cloud Data Governance
  • Key Components of Accountability
  • Implementing Accountability in Cloud Data Governance
  • Tools and Technologies for Enhancing Accountability
  • Cloud Data Life Cycle
  • The Role of IRM, Auditability, Traceability, and Accountability in Each Phase of the Cloud Data Life Cycle
  • Challenges and Solutions in Implementing IRM and Data Governance in the Cloud
  • Emerging Trends and Technologies in Cloud Data Governance and IRM
  • Summary
  • Exam Readiness Drill - Chapter Review Questions
  • Chapter 8: Essential Infrastructure and Platform Components for a Secure Data Center.
  • Cloud Infrastructure and Platform Components
  • Physical Environment
  • Network and Communications
  • VMs
  • Storage
  • Virtualization
  • Management Plane
  • Designing a Secure Data Center
  • Physical Design
  • Choosing a Location
  • Buying versus Building
  • Environmental Design
  • Heating, Ventilation, and Air Conditioning (HVAC)
  • Multi-Vendor Pathway Connectivity
  • Logical Design
  • Tenant Partitioning
  • Access Control
  • Summary
  • Exam Readiness Drill - Chapter Review Questions
  • Chapter 9: Analyzing Risks
  • Overview of Risk Management
  • Key Concepts in Risk Management
  • Risk Management in Cloud Environments
  • IaaS
  • PaaS
  • SaaS
  • Distinction between Cloud Service Models and Deployment Models (Public, Private, Hybrid, and Community)
  • Cybersecurity
  • Importance of Risk Management in Cloud Computing
  • The Outsourcing Model
  • Vendor-Lock In
  • Data Residency - Processing, Storage, and Transfer Considerations
  • Access to Resources
  • Resources that are not persistent (ephemeral)
  • Risk Identification and Analysis
  • Risk Frameworks
  • Assessing the CSP's Risk
  • SLAs
  • Identifying Cloud Security Risks
  • Tools and Practices for Identifying Risks in Cloud Environments
  • Risk Assessments and Tools
  • External Third-Party Assessments
  • Analyzing and Assessing Cloud Security Risks
  • Qualitative versus Quantitative Risk Analysis Methods
  • Tools and Frameworks for Cloud Risk Assessments
  • Cloud Attack Surface Area, Vulnerabilities, Threats, and Attack Vectors
  • Cloud Attack Surface and Vulnerabilities
  • Hypervisor
  • Direct Connections from Remote Devices
  • Threats, Attack Vectors, and Incident Response (IR) in Cloud
  • IR Planning for Cloud Environments
  • Risk Response Strategies
  • Addressing Cloud Security Risks - Safeguards and Countermeasures
  • Data Breaches and Data Loss
  • Non-Authorized Access.
  • Administrative Concerns
  • Virtualization Risks
  • Regulatory Non-Compliance
  • Distributed Denial of Service (DDoS) Attacks
  • Man-in-the-Middle Attacks
  • Vendor Issues
  • Shadow IT
  • Natural Disasters
  • Insider Threats
  • Insecure APIs
  • Misconfigurations
  • Forensic Challenges in Cloud Environments and Solutions
  • Implementing Cloud Security Best Practices, Controls and Countermeasures
  • Best Practices
  • Controls
  • Data Encryption and Protection Techniques in the Cloud
  • IAM in Cloud Environments
  • Information Rights Management (IRM) / Digital Rights Management (DRM)
  • Virtualization
  • Network Segmentation
  • Firewalls and Other Devices
  • DLP Tools / Egress Monitoring
  • Summary
  • Exam Readiness Drill - Chapter Review Questions
  • Chapter 10: Security Control Implementation
  • Physical and Environmental Protection Controls
  • Site Selection and Facility Design
  • System, Storage, and Communication Protection Controls
  • Protecting Data
  • Cryptographic Key Establishment and Management
  • Managing a Network to Protect Systems and Services
  • Landing Zones
  • Virtualization Systems
  • IAM Solutions for Identification, Authentication, and Authorization
  • OpenID
  • OAuth
  • Identification
  • Authentication
  • Authentication Methods
  • Conditional Authentication Policies
  • Authorization
  • Federation
  • Key Cloud Control Audit Mechanisms
  • Log Collection
  • Correlation
  • Packet Capturing
  • Summary
  • Exam Readiness Drill - Chapter Review Questions
  • Chapter 11: Planning for the Worst-Case Scenario - Business Continuity and Disaster Recovery
  • BCDR Definitions
  • The Importance of BCDR
  • Key Concepts and Terminology
  • BCDR Strategies
  • Defining the Scope of the BCDR Plan
  • Gathering Requirements and Generating Objectives
  • Integrating Requirements
  • Assessing Risk
  • Performance Issues Due to Location Change.
  • Cost and Effort to Maintain Redundancy.