Ccsp (ISC)2 certified cloud security professional official study guide

Detalles Bibliográficos
Otros Autores: O'Hara, Brian T., author (author), Malisow, Ben, author
Formato: Libro electrónico
Idioma:Inglés
Publicado: Indianapolis, [Indiana] : John Wiley & Sons, Inc 2017.
Edición:1st ed
Colección:THEi Wiley ebooks.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009849089006719
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright
  • Acknowledgments
  • About the Authors
  • About the Technical Editors
  • Contents at a Glance
  • Contents
  • Introduction
  • Assessment Test
  • Answers to Assessment Test
  • Chapter 1 Architectural Concepts
  • Business Requirements
  • Existing State
  • Quantifying Benefits and Opportunity Cost
  • Intended Impact
  • Cloud Evolution, Vernacular, and Definitions
  • New Technology, New Options
  • Cloud Computing Service Models
  • Cloud Deployment Models
  • Cloud Computing Roles and Responsibilities
  • Cloud Computing Definitions
  • Foundational Concepts of Cloud Computing
  • Sensitive Data
  • Virtualization
  • Encryption
  • Auditing and Compliance
  • Cloud Service Provider Contracts
  • Summary
  • Exam Essentials
  • Written Labs
  • Review Questions
  • Chapter 2 Design Requirements
  • Business Requirements Analysis
  • Inventory of Assets
  • Valuation of Assets
  • Determination of Criticality
  • Risk Appetite
  • Boundaries of Cloud Models
  • IaaS Boundaries
  • PaaS Boundaries
  • SaaS Boundaries
  • Design Principles for Protecting Sensitive Data
  • Hardening Devices
  • Encryption
  • Layered Defenses
  • Summary
  • Exam Essentials
  • Written Labs
  • Review Questions
  • Chapter 3 Data Classification
  • Data Inventory and Discovery
  • Data Ownership
  • The Data Life Cycle
  • Data Discovery Methods
  • Jurisdictional Requirements
  • Data Rights Management
  • Intellectual Property Protections
  • DRM Tool Traits
  • Data Control
  • Data Retention
  • Data Audit
  • Data Destruction/Disposal
  • Summary
  • Exam Essentials
  • Written Labs
  • Review Questions
  • Chapter 4 Cloud Data Security
  • Cloud Data Life Cycle
  • Create
  • Store
  • Use
  • Share
  • Archive
  • Destroy
  • Cloud Storage Architectures
  • Volume Storage: File-Based Storage and Block Storage
  • Object-Based Storage
  • Databases
  • Content Delivery Network (CDN).
  • Cloud Data Security Foundational Strategies
  • Encryption
  • Masking, Obfuscation, Anonymization, and Tokenization
  • Security Information and Event Management
  • Egress Monitoring (DLP)
  • Summary
  • Exam Essentials
  • Written Labs
  • Review Questions
  • Chapter 5 Security in the Cloud
  • Shared Cloud Platform Risks and Responsibilities
  • Cloud Computing Risks by Deployment and Service Model
  • Private Cloud
  • Community Cloud
  • Public Cloud
  • Hybrid Cloud
  • IaaS (Infrastructure as a Service)
  • PaaS (Platform as a Service)
  • SaaS (Software as a Service)
  • Virtualization
  • Cloud Attack Surface
  • Threats by Deployment Model
  • Countermeasure Methodology
  • Disaster Recovery (DR) and Business Continuity Management (BCM)
  • Cloud-Specific BIA Concerns
  • Customer/Provider Shared BC/DR Responsibilities
  • Summary
  • Exam Essentials
  • Written Labs
  • Review Questions
  • Chapter 6 Responsibilities in the Cloud
  • Foundations of Managed Services
  • Business Requirements
  • Business Requirements: The Cloud Provider Perspective
  • Shared Responsibilities by Service Type
  • IaaS
  • PaaS
  • SaaS
  • Shared Administration of OS, Middleware, or Applications
  • Operating System Baseline Configuration and Management
  • Share Responsibilities: Data Access
  • Customer Directly Administers Access
  • Provider Administers Access on Behalf of the Customer
  • Third-Party (CASB) Administers Access on Behalf of the Customer
  • Lack of Physical Access
  • Audits
  • Shared Policy
  • Shared Monitoring and Testing
  • Summary
  • Exam Essentials
  • Written Labs
  • Review Questions
  • Chapter 7 Cloud Application Security
  • Training and Awareness
  • Common Cloud Application Deployment Pitfalls
  • Cloud-Secure Software Development Life Cycle (SDLC)
  • ISO/IEC 27034-1 Standards for Secure Application Development
  • Identity and Access Management (IAM).
  • Identity Repositories and Directory Services
  • Single Sign-On (SSO)
  • Federated Identity Management
  • Federation Standards
  • Multifactor Authentication
  • Supplemental Security Devices
  • Cloud Application Architecture
  • Application Programming Interfaces
  • Tenancy Separation
  • Cryptography
  • Sandboxing
  • Application Virtualization
  • Cloud Application Assurance and Validation
  • Threat Modeling
  • Quality of Service
  • Software Security Testing
  • Approved APIs
  • Software Supply Chain (API) Management
  • Securing Open Source Software
  • Runtime Application Self-Protection (RASP)
  • Secure Code Reviews
  • OWASP Top 9 Coding Flaws
  • Summary
  • Exam Essentials
  • Written Labs
  • Review Questions
  • Chapter 8 Operations Elements
  • Physical/Logical Operations
  • Facilities and Redundancy
  • Virtualization Operations
  • Storage Operations
  • Physical and Logical Isolation
  • Security Training and Awareness
  • Training Program Categories
  • Additional Training Insights
  • Basic Operational Application Security
  • Threat Modeling
  • Application Testing Methods
  • Summary
  • Exam Essentials
  • Written Labs
  • Review Questions
  • Chapter 9 Operations Management
  • Monitoring, Capacity, and Maintenance
  • Monitoring
  • Maintenance
  • Change and Configuration Management (CM)
  • Baselines
  • Deviations and Exceptions
  • Roles and Process
  • Business Continuity and Disaster Recovery (BC/DR)
  • Primary Focus
  • Continuity of Operations
  • The BC/DR Plan
  • The BC/DR Kit
  • Relocation
  • Power
  • Testing
  • Summary
  • Exam Essentials
  • Written Labs
  • Review Questions
  • Chapter 10 Legal and Compliance Part 1
  • Legal Requirements and Unique Risks in the Cloud Environment
  • Legal Concepts
  • U.S. Laws
  • International Laws
  • Laws, Frameworks, and Standards Around the World
  • The Difference Between Laws, Regulations and Standards.
  • Potential Personal and Data Privacy Issues in the Cloud Environment
  • eDiscovery
  • Forensic Requirements
  • International Conflict Resolution
  • Cloud Forensic Challenges
  • Contractual and Regulated PII
  • Direct and Indirect Identifiers
  • Audit Processes, Methodologies, and Cloud Adaptations
  • Virtualization
  • Scope
  • Gap Analysis
  • Information Security Management Systems (ISMSs)
  • The Right to Audit in Managed Services
  • Audit Scope Statements
  • Policies
  • Different Types of Audit Reports
  • Auditor Independence
  • AICPA Reports and Standards
  • Summary
  • Exam Essentials
  • Written Labs
  • Review Questions
  • Chapter 11 Legal and Compliance Part 2
  • The Impact of Diverse Geographical Locations and Legal Jurisdictions
  • Policies
  • Implications of the Cloud for Enterprise Risk Management
  • Choices Involved in Managing Risk
  • Risk Management Frameworks
  • Risk Management Metrics
  • Contracts and Service-Level Agreements (SLAs)
  • Business Requirements
  • Cloud Contract Design and Management for Outsourcing
  • Identifying Appropriate Supply Chain and Vendor Management Processes
  • Common Criteria Assurance Framework (ISO/IEC 15408-1:2009)
  • Cloud Computing Certification
  • CSA Security, Trust, and Assurance Registry (STAR)
  • Supply Chain Risk
  • Summary
  • Exam Essentials
  • Written Labs
  • Review Questions
  • Appendix A Answers to the Review Questions
  • Chapter 1: Architectural Concepts
  • Chapter 2: Design Requirements
  • Chapter 3: Data Classification
  • Chapter 4: Cloud Data Security
  • Chapter 5: Security in the Cloud
  • Chapter 6: Responsibilities in the Cloud
  • Chapter 7: Cloud Application Security
  • Chapter 8: Operations Elements
  • Chapter 9: Operations Management
  • Chapter 10: Legal and Compliance Part 1
  • Chapter 11: Legal and Compliance Part 2
  • Appendix B Answers to the Written Labs
  • Chapter 1
  • Chapter 2.
  • Chapter 3
  • Chapter 4
  • Chapter 5
  • Chapter 6
  • Chapter 7
  • Chapter 8
  • Chapter 9
  • Chapter 10
  • Chapter 11
  • Index
  • EULA.