Librería Portfolio Librería Portfolio

Búsqueda avanzada

TIENE EN SU CESTA DE LA COMPRA

0 productos

en total 0,00 €

CCSP (ISC)2 CERTIFIED CLOUD SECURITY PROFESSIONAL OFFICIAL STUDY GUIDE
Título:
CCSP (ISC)2 CERTIFIED CLOUD SECURITY PROFESSIONAL OFFICIAL STUDY GUIDE
Subtítulo:
Autor:
O´HARA, B
Editorial:
JOHN WILEY
Año de edición:
2017
Materia
OTRAS CERTIFICACIONES
ISBN:
978-1-119-27741-5
Páginas:
384
57,95 €

 

Sinopsis

The only official study guide for the new CCSP exam
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you prepare faster and smarter with the Sybex study tools that include pre-test assessments that show you what you know, and areas you need further review. Objective maps, exercises, and chapter review questions help you gauge your progress along the way, and the Sybex interactive online learning environment includes access to a PDF glossary, hundreds of flashcards, and two complete practice exams. Covering all CCSP domains, this book walks you through Architectural Concepts and Design Requirements, Cloud Data Security, Cloud Platform and Infrastructure Security, Cloud Application Security, Operations, and Legal and Compliance with real-world scenarios to help you apply your skills along the way.

The CCSP is the latest credential from (ISC)2 and the Cloud Security Alliance, designed to show employers that you have what it takes to keep their organization safe in the cloud. Learn the skills you need to be confident on exam day and beyond.

Review 100% of all CCSP exam objectives
Practice applying essential concepts and skills
Access the industry-leading online study tool set
Test your knowledge with bonus practice exams and more
As organizations become increasingly reliant on cloud-based IT, the threat to data security looms larger. Employers are seeking qualified professionals with a proven cloud security skillset, and the CCSP credential brings your resume to the top of the pile. CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide gives you the tools and information you need to earn that certification, and apply your skills in a real-world setting.



Table of Contents

Introduction xv

Assessment Test xxiii

Chapter 1 Architectural Concepts 1

Business Requirements 4

Existing State 4

Quantifying Benefits and Opportunity Cost 5

Intended Impact 8

Cloud Evolution, Vernacular, and Definitions 8

New Technology, New Options 8

Cloud Computing Service Models 10

Cloud Deployment Models 11

Cloud Computing Roles and Responsibilities 13

Cloud Computing Definitions 13

Foundational Concepts of Cloud Computing 16

Sensitive Data 17

Virtualization 17

Encryption 17

Auditing and Compliance 18

Cloud Service Provider Contracts 18

Summary 19

Exam Essentials 19

Written Labs 19

Review Questions 20

Chapter 2 Design Requirements 25

Business Requirements Analysis 26

Inventory of Assets 26

Valuation of Assets 27

Determination of Criticality 27

Risk Appetite 29

Boundaries of Cloud Models 31

IaaS Boundaries 31

PaaS Boundaries 32

SaaS Boundaries 32

Design Principles for Protecting Sensitive Data 34

Hardening Devices 34

Encryption 35

Layered Defenses 36

Summary 37

Exam Essentials 37

Written Labs 37

Review Questions 38

Chapter 3 Data Classification 43

Data Inventory and Discovery 45

Data Ownership 45

The Data Life Cycle 46

Data Discovery Methods 49

Jurisdictional Requirements 50

Data Rights Management 51

Intellectual Property Protections 51

DRM Tool Traits 55

Data Control 57

Data Retention 58

Data Audit 59

Data Destruction/Disposal 61

Summary 62

Exam Essentials 63

Written Labs 63

Review Questions 64

Chapter 4 Cloud Data Security 67

Cloud Data Life Cycle 69

Create 70

Store 70

Use 71

Share 71

Archive 72

Destroy 74

Cloud Storage Architectures 74

Volume Storage: File-Based Storage and Block Storage 74

Object-Based Storage 74

Databases 75

Content Delivery Network (CDN) 75

Cloud Data Security Foundational Strategies 75

Encryption 75

Masking, Obfuscation, Anonymization, and Tokenization 77

Security Information and Event Management 80

Egress Monitoring (DLP) 81

Summary 82

Exam Essentials 82

Written Labs 83

Review Questions 84

Chapter 5 Security in the Cloud 87

Shared Cloud Platform Risks and Responsibilities 88

Cloud Computing Risks by Deployment and Service Model 90

Private Cloud 91

Community Cloud 91

Public Cloud 92

Hybrid Cloud 97

IaaS (Infrastructure as a Service) 97

PaaS (Platform as a Service) 97

SaaS (Software as a Service) 98

Virtualization 98

Cloud Attack Surface 99

Threats by Deployment Model 100

Countermeasure Methodology 102

Disaster Recovery (DR) and Business Continuity

Management (BCM) 105

Cloud-Specific BIA Concerns 105

Customer/Provider Shared BC/DR Responsibilities 106

Summary 108

Exam Essentials 109

Written Labs 109

Review Questions 110

Chapter 6 Responsibilities in the Cloud 115

Foundations of Managed Services 118

Business Requirements 119

Business Requirements: The Cloud Provider Perspective 119

Shared Responsibilities by Service Type 125

IaaS 125

PaaS 125

SaaS 125

Shared Administration of OS, Middleware, or Applications 126

Operating System Baseline Configuration and

Management 126

Share Responsibilities: Data Access 128

Customer Directly Administers Access 128

Provider Administers Access on Behalf of

the Customer 129

Third-Party (CASB) Administers Access on Behalf of the Customer 129

Lack of Physical Access 131

Audits 131

Shared Policy 134

Shared Monitoring and Testing 134

Summary 135

Exam Essentials 135

Written Labs 136

Review Questions 137

Chapter 7 Cloud Application Security 141

Training and Awareness 143

Common Cloud Application Deployment Pitfalls 146

Cloud-Secure Software Development Life Cycle (SDLC) 148

ISO/IEC 27034-1 Standards for Secure Application Development 150

Identity and Access Management (IAM) 151

Identity Repositories and Directory Services 153

Single Sign-On (SSO) 153

Federated Identity Management 153

Federation Standards 154

Multifactor Authentication 155

Supplemental Security Devices 155

Cloud Application Architecture 157

Application Programming Interfaces 157

Tenancy Separation 159

Cryptography 159

Sandboxing 162

Application Virtualization 162

Cloud Application Assurance and Validation 162

Threat Modeling 163

Quality of Service 166

Software Security Testing 166

Approved APIs 171

Software Supply Chain (API) Management 171

Securing Open Source Software 172

Runtime Application Self-Protection (RASP) 173

Secure Code Reviews 173

OWASP Top 9 Coding Flaws 173

Summary 174

Exam Essentials 174

Written Labs 175

Review Questions 176

Chapter 8 Operations Elements 181

Physical/Logical Operations 183

Facilities and Redundancy 184

Virtualization Operations 194

Storage Operations 195

Physical and Logical Isolation 197

Security Training and Awareness 198

Training Program Categories 199

Additional Training Insights