(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
The only official study guide for the new CCSP exam objectives effective from 2022-2025 (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3 rd Edition is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC) 2, this guide help...
Otros Autores: | , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Hoboken, NJ :
John Wiley and Sons
[2023]
|
Edición: | Third edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009724224306719 |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright Page
- Contents
- Introduction
- CCSP Certification
- Taking the CCSP Exam
- Computer-Based Testing Environment
- Exam Retake Policy
- Work Experience Requirement
- Recertification Requirements
- What Does This Book Cover?
- CCSP Exam Objectives
- CCSP Certification Exam Objective Map
- How to Contact the Publisher
- Assessment Test
- Answers to Assessment Test
- Chapter 1 Architectural Concepts
- Cloud Characteristics
- Business Requirements
- Understanding the Existing State
- Cost/Benefit Analysis
- Intended Impact
- Cloud Computing Service Categories
- Software as a Service
- Infrastructure as a Service
- Platform as a Service
- Cloud Deployment Models
- Private Cloud
- Public Cloud
- Hybrid Cloud
- Multi-Cloud
- Community Cloud
- Multitenancy
- Cloud Computing Roles and Responsibilities
- Cloud Computing Reference Architecture
- Virtualization
- Hypervisors
- Virtualization Security
- Cloud Shared Considerations
- Security and Privacy Considerations
- Operational Considerations
- Emerging Technologies
- Machine Learning and Artificial Intelligence
- Blockchain
- Internet of Things
- Containers
- Quantum Computing
- Edge and Fog Computing
- Confidential Computing
- DevOps and DevSecOps
- Summary
- Exam Essentials
- Review Questions
- Chapter 2 Data Classification
- Data Inventory and Discovery
- Data Ownership
- Data Flows
- Data Discovery Methods
- Information Rights Management
- Certificates and IRM
- IRM in the Cloud
- IRM Tool Traits
- Data Control
- Data Retention
- Data Audit and Audit Mechanisms
- Data Destruction/Disposal
- Summary
- Exam Essentials
- Review Questions
- Chapter 3 Cloud Data Security
- Cloud Data Lifecycle
- Create
- Store
- Use
- Share
- Archive
- Destroy
- Cloud Storage Architectures
- Storage Types.
- Volume Storage: File-Based Storage and Block Storage
- Object-Based Storage
- Databases
- Threats to Cloud Storage
- Designing and Applying Security Strategies for Storage
- Encryption
- Certificate Management
- Hashing
- Masking, Obfuscation, Anonymization, and Tokenization
- Data Loss Prevention
- Log Capture and Analysis
- Summary
- Exam Essentials
- Review Questions
- Chapter 4 Security in the Cloud
- Shared Cloud Platform Risks and Responsibilities
- Cloud Customers, Providers, and Similar Terms
- Cloud Computing Risks by Deployment Model
- Private Cloud
- Community Cloud
- Public Cloud
- Hybrid Cloud
- Cloud Computing Risks by Service Model
- Infrastructure as a Service (IaaS)
- Platform as a Service (PaaS)
- Software as a Service (SaaS)
- Virtualization
- Threats
- Risk Mitigation Strategies
- Disaster Recovery (DR) and Business Continuity (BC)
- Cloud-Specific BIA Concerns
- Customer/Provider Shared BC/DR Responsibilities
- Cloud Design Patterns
- Summary
- Exam Essentials
- Review Questions
- Chapter 5 Cloud Platform, Infrastructure, and Operational Security
- Foundations of Managed Services
- Cloud Provider Responsibilities
- Shared Responsibilities by Service Type
- IaaS
- PaaS
- SaaS
- Securing Communications and Infrastructure
- Firewalls
- Intrusion Detection/Intrusion Prevention Systems
- Honeypots
- Vulnerability Assessment Tools
- Bastion Hosts
- Identity Assurance in Cloud and Virtual Environments
- Securing Hardware and Compute
- Securing Software
- Third-Party Software Management
- Validating Open-Source Software
- OS Hardening, Monitoring, and Remediation
- Managing Virtual Systems
- Assessing Vulnerabilities
- Securing the Management Plane
- Auditing Your Environment and Provider
- Adapting Processes for the Cloud
- Planning for Cloud Audits
- Summary.
- Exam Essentials
- Review Questions
- Chapter 6 Cloud Application Security
- Developing Software for the Cloud
- Common Cloud Application Deployment Pitfalls
- Cloud Application Architecture
- Cryptography
- Sandboxing
- Application Virtualization and Orchestration
- Application Programming Interfaces
- Multitenancy
- Supplemental Security Components
- Cloud-Secure Software Development Lifecycle (SDLC)
- Software Development Phases
- Software Development Models
- Cloud Application Assurance and Validation
- Threat Modeling
- Common Threats to Applications
- Quality Assurance and Testing Techniques
- Supply Chain Management and Licensing
- Identity and Access Management
- Cloud Identity and Access Control
- Single Sign-On
- Identity Providers
- Federated Identity Management
- Multifactor Authentication
- Secrets Management
- Common Threats to Identity and Access Management in the Cloud
- Zero Trust
- Summary
- Exam Essentials
- Review Questions
- Chapter 7 Operations Elements
- Designing a Secure Data Center
- Build vs. Buy
- Location
- Facilities and Redundancy
- Data Center Tiers
- Logical Design
- Virtualization Operations
- Storage Operations
- Managing Security Operations
- Security Operations Center (SOC)
- Continuous Monitoring
- Incident Management
- Summary
- Exam Essentials
- Review Questions
- Chapter 8 Operations Management
- Monitoring, Capacity, and Maintenance
- Monitoring
- Physical and Environmental Protection
- Maintenance
- Change and Configuration Management
- Baselines
- Roles and Process
- Release and Deployment Management
- Problem and Incident Management
- IT Service Management and Continual Service Improvement
- Business Continuity and Disaster Recovery
- Prioritizing Safety
- Continuity of Operations
- BC/DR Planning
- The BC/DR Toolkit
- Relocation
- Power.
- Testing
- Summary
- Exam Essentials
- Review Questions
- Chapter 9 Legal and Compliance Issues
- Legal Requirements and Unique Risks in the Cloud Environment
- Constitutional Law
- Legislation
- Administrative Law
- Case Law
- Common Law
- Contract Law
- Analyzing a Law
- Determining Jurisdiction
- Scope and Application
- Legal Liability
- Torts and Negligence
- U.S. Privacy and Security Laws
- Health Insurance Portability and Accountability Act
- The Health Information Technology for Economic and Clinical Health Act
- Gramm-Leach-Bliley Act
- Sarbanes-Oxley Act
- State Data Breach Notification Laws
- International Laws
- European Union General Data Protection Regulation
- Adequacy Decisions
- U.S.-EU Safe Harbor and Privacy Shield
- Laws, Regulations, and Standards
- Payment Card Industry Data Security Standard
- Critical Infrastructure Protection Program
- Conflicting International Legislation
- Information Security Management Systems
- ISO/IEC 27017:2015
- Privacy in the Cloud
- Generally Accepted Privacy Principles
- ISO 27018
- Direct and Indirect Identifiers
- Privacy Impact Assessments
- Cloud Forensics
- Forensic Requirements
- Cloud Forensic Challenges
- Collection and Acquisition
- Evidence Preservation and Management
- e-discovery
- Audit Processes, Methodologies, and Cloud Adaptations
- Virtualization
- Scope
- Gap Analysis
- Restrictions of Audit Scope Statements
- Policies
- Audit Reports
- Summary
- Exam Essentials
- Review Questions
- Chapter 10 Cloud Vendor Management
- The Impact of Diverse Geographical Locations and Legal Jurisdictions
- Security Policy Framework
- Policies
- Standards
- Procedures
- Guidelines
- Exceptions and Compensating Controls
- Developing Policies
- Enterprise Risk Management
- Risk Identification
- Risk Calculation
- Risk Assessment.
- Risk Treatment and Response
- Risk Mitigation
- Risk Avoidance
- Risk Transference
- Risk Acceptance
- Risk Analysis
- Control Risk
- Risk Reporting
- Enterprise Risk Management
- Assessing Provider Risk Management Practices
- Risk Management Frameworks
- Cloud Contract Design
- Business Requirements
- Vendor Management
- Data Protection
- Negotiating Contracts
- Common Contract Provisions
- Contracting Documents
- Government Cloud Standards
- Common Criteria
- FedRAMP
- FIPS 140-2
- Manage Communication with Relevant Parties
- Summary
- Exam Essentials
- Review Questions
- Appendix: Answers to the Review Questions
- Chapter 1: Architectural Concepts
- Chapter 2: Data Classification
- Chapter 3: Cloud Data Security
- Chapter 4: Security in the Cloud
- Chapter 5: Cloud Platform, Infrastructure, and Operational Security
- Chapter 6: Cloud Application Security
- Chapter 7: Operations Elements
- Chapter 8: Operations Management
- Chapter 9: Legal and Compliance Issues
- Chapter 10: Cloud Vendor Management
- Index
- Comprehensive Online Learning Environment
- EULA.