Details

(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide


(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide


Sybex Study Guide 3. Aufl.

von: Mike Chapple, David Seidl

41,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 02.09.2022
ISBN/EAN: 9781119909392
Sprache: englisch
Anzahl Seiten: 416

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>The only official study guide for the new CCSP exam objectives effective from 2022-2025</b> <p><i>(ISC)<sup>2</sup> CCSP Certified Cloud Security Professional Official Study Guide, 3<sup>rd</sup> Edition</i> is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)<sup>2</sup>, this guide helps you prepare faster and smarter with the Sybex study tools that include pre-test assessments that show you what you know, and areas you need further review. In this completely rewritten <i>3<sup>rd</sup> Edition, experienced cloud security professionals Mike Chapple and David Seidl use their extensive training and hands on skills to help you prepare for the CCSP exam. </i>Objective maps, exercises, and chapter review questions help you gauge your progress along the way, and the Sybex interactive online learning environment includes access to a PDF glossary, hundreds of flashcards, and two complete practice exams. Covering all CCSP domains, this book walks you through Cloud Concepts, Architecture and Design, Cloud Data Security, Cloud Platform and Infrastructure Security, Cloud Application Security, Cloud Security Operations, and Legal, Risk, and Compliance with real-world scenarios to help you apply your skills along the way. <p>The CCSP credential from (ISC)<sup>2</sup> and the Cloud Security Alliance is designed to show employers that you have what it takes to keep their organization safe in the cloud. Learn the skills you need to be confident on exam day and beyond. <ul> <li>Review 100% of all CCSP exam objectives</li> <li>Practice applying essential concepts and skills</li> <li>Access the industry-leading online study tool set</li> <li>Test your knowledge with bonus practice exams and more</li></ul><p>As organizations become increasingly reliant on cloud-based IT, the threat to data security looms larger. Employers are seeking qualified professionals with a proven cloud security skillset, and the CCSP credential brings your resume to the top of the pile. <i>(ISC)<sup>2</sup> CCSP Certified Cloud Security Professional Official Study Guide</i> gives you the tools and information you need to earn that certification and apply your skills in a real-world setting.
<p><br /> Introduction xxiii</p> <p>Assessment Test xxxii</p> <p><b>Chapter 1 Architectural Concepts 1</b></p> <p>Cloud Characteristics 3</p> <p>Business Requirements 5</p> <p>Understanding the Existing State 6</p> <p>Cost/Benefit Analysis 7</p> <p>Intended Impact 10</p> <p>Cloud Computing Service Categories 11</p> <p>Software as a Service 11</p> <p>Infrastructure as a Service 12</p> <p>Platform as a Service 12</p> <p>Cloud Deployment Models 13</p> <p>Private Cloud 13</p> <p>Public Cloud 13</p> <p>Hybrid Cloud 13</p> <p>Multi- Cloud 13</p> <p>Community Cloud 13</p> <p>Multitenancy 14</p> <p>Cloud Computing Roles and Responsibilities 15</p> <p>Cloud Computing Reference Architecture 16</p> <p>Virtualization 18</p> <p>Hypervisors 18</p> <p>Virtualization Security 19</p> <p>Cloud Shared Considerations 20</p> <p>Security and Privacy Considerations 20</p> <p>Operational Considerations 21</p> <p>Emerging Technologies 22</p> <p>Machine Learning and Artificial Intelligence 22</p> <p>Blockchain 23</p> <p>Internet of Things 24</p> <p>Containers 24</p> <p>Quantum Computing 25</p> <p>Edge and Fog Computing 26</p> <p>Confidential Computing 26</p> <p>DevOps and DevSecOps 27</p> <p>Summary 28</p> <p>Exam Essentials 28</p> <p>Review Questions 30</p> <p><b>Chapter 2 Data Classification 35</b></p> <p>Data Inventory and Discovery 37</p> <p>Data Ownership 37</p> <p>Data Flows 42</p> <p>Data Discovery Methods 43</p> <p>Information Rights Management 46</p> <p>Certificates and IRM 47</p> <p>IRM in the Cloud 47</p> <p>IRM Tool Traits 47</p> <p>Data Control 49</p> <p>Data Retention 50</p> <p>Data Audit and Audit Mechanisms 53</p> <p>Data Destruction/Disposal 55</p> <p>Summary 57</p> <p>Exam Essentials 57</p> <p>Review Questions 59</p> <p><b>Chapter 3 Cloud Data Security 63</b></p> <p>Cloud Data Lifecycle 65</p> <p>Create 66</p> <p>Store 66</p> <p>Use 67</p> <p>Share 67</p> <p>Archive 69</p> <p>Destroy 70</p> <p>Cloud Storage Architectures 71</p> <p>Storage Types 71</p> <p>Volume Storage: File- Based Storage and Block Storage 72</p> <p>Object- Based Storage 72</p> <p>Databases 73</p> <p>Threats to Cloud Storage 73</p> <p>Designing and Applying Security Strategies for Storage 74</p> <p>Encryption 74</p> <p>Certificate Management 77</p> <p>Hashing 77</p> <p>Masking, Obfuscation, Anonymization, and Tokenization 78</p> <p>Data Loss Prevention 81</p> <p>Log Capture and Analysis 82</p> <p>Summary 85</p> <p>Exam Essentials 85</p> <p>Review Questions 86</p> <p><b>Chapter 4 Security in the Cloud 91</b></p> <p><b>Chapter 5 Shared Cloud Platform Risks and Responsibilities 92</b></p> <p>Cloud Computing Risks by Deployment Model 94</p> <p>Private Cloud 95</p> <p>Community Cloud 95</p> <p>Public Cloud 97</p> <p>Hybrid Cloud 101</p> <p>Cloud Computing Risks by Service Model 102</p> <p>Infrastructure as a Service (IaaS) 102</p> <p>Platform as a Service (PaaS) 102</p> <p>Software as a Service (SaaS) 103</p> <p>Virtualization 103</p> <p>Threats 105</p> <p>Risk Mitigation Strategies 107</p> <p>Disaster Recovery (DR) and Business Continuity (BC) 110</p> <p>Cloud- Specific BIA Concerns 110</p> <p>Customer/Provider Shared BC/DR Responsibilities 111</p> <p>Cloud Design Patterns 114</p> <p>Summary 115</p> <p>Exam Essentials 115</p> <p>Review Questions 116</p> <p>Cloud Platform, Infrastructure, and Operational Security 121</p> <p>Foundations of Managed Services 123</p> <p>Cloud Provider Responsibilities 124</p> <p>Shared Responsibilities by Service Type 125</p> <p>IaaS 125</p> <p>PaaS 126</p> <p>SaaS 126</p> <p>Securing Communications and Infrastructure 126</p> <p>Firewalls 127</p> <p>Intrusion Detection/Intrusion Prevention Systems 128</p> <p>Honeypots 128</p> <p>Vulnerability Assessment Tools 128</p> <p>Bastion Hosts 129</p> <p>Identity Assurance in Cloud and Virtual Environments 130</p> <p>Securing Hardware and Compute 130</p> <p>Securing Software 132</p> <p>Third- Party Software Management 133</p> <p>Validating Open- Source Software 134</p> <p>OS Hardening, Monitoring, and Remediation 134</p> <p>Managing Virtual Systems 135</p> <p>Assessing Vulnerabilities 137</p> <p>Securing the Management Plane 138</p> <p>Auditing Your Environment and Provider 141</p> <p>Adapting Processes for the Cloud 142</p> <p>Planning for Cloud Audits 143</p> <p>Summary 144</p> <p>Exam Essentials 145</p> <p>Review Questions 147</p> <p><b>Chapter 6 Cloud Application Security 151</b></p> <p>Developing Software for the Cloud 154</p> <p>Common Cloud Application Deployment Pitfalls 155</p> <p>Cloud Application Architecture 157</p> <p>Cryptography 157</p> <p>Sandboxing 158</p> <p>Application Virtualization and Orchestration 158</p> <p>Application Programming Interfaces 159</p> <p>Multitenancy 162</p> <p>Supplemental Security Components 162</p> <p>Cloud- Secure Software Development Lifecycle (SDLC) 164</p> <p>Software Development Phases 165</p> <p>Software Development Models 166</p> <p>Cloud Application Assurance and Validation 172</p> <p>Threat Modeling 172</p> <p>Common Threats to Applications 174</p> <p>Quality Assurance and Testing Techniques 175</p> <p>Supply Chain Management and Licensing 177</p> <p>Identity and Access Management 177</p> <p>Cloud Identity and Access Control 178</p> <p>Single Sign- On 179</p> <p>Identity Providers 180</p> <p>Federated Identity Management 180</p> <p>Multifactor Authentication 181</p> <p>Secrets Management 182</p> <p>Common Threats to Identity and Access Management in the Cloud 183</p> <p>Zero Trust 183</p> <p>Summary 183</p> <p>Exam Essentials 184</p> <p>Review Questions 186</p> <p><b>Chapter 7 Operations Elements 191</b></p> <p>Designing a Secure Data Center 193</p> <p>Build vs. Buy 193</p> <p>Location 194</p> <p>Facilities and Redundancy 196</p> <p>Data Center Tiers 200</p> <p>Logical Design 201</p> <p>Virtualization Operations 202</p> <p>Storage Operations 205</p> <p>Managing Security Operations 207</p> <p>Security Operations Center (SOC) 208</p> <p>Continuous Monitoring 208</p> <p>Incident Management 209</p> <p>Summary 209</p> <p>Exam Essentials 210</p> <p>Review Questions 211</p> <p><b>Chapter 8 Operations Management 215</b></p> <p>Monitoring, Capacity, and Maintenance 217</p> <p>Monitoring 217</p> <p>Physical and Environmental Protection 218</p> <p>Maintenance 219</p> <p>Change and Configuration Management 224</p> <p>Baselines 224</p> <p>Roles and Process 226</p> <p>Release and Deployment Management 228</p> <p>Problem and Incident Management 229</p> <p>IT Service Management and Continual Service Improvement 229</p> <p>Business Continuity and Disaster Recovery 231</p> <p>Prioritizing Safety 231</p> <p>Continuity of Operations 232</p> <p>BC/DR Planning 232</p> <p>The BC/DR Toolkit 234</p> <p>Relocation 235</p> <p>Power 237</p> <p>Testing 238</p> <p>Summary 239</p> <p>Exam Essentials 239</p> <p>Review Questions 241</p> <p><b>Chapter 9 Legal and Compliance Issues 245</b></p> <p>Legal Requirements and Unique Risks in the Cloud Environment 247</p> <p>Constitutional Law 247</p> <p>Legislation 249</p> <p>Administrative Law 249</p> <p>Case Law 250</p> <p>Common Law 250</p> <p>Contract Law 250</p> <p>Analyzing a Law 251</p> <p>Determining Jurisdiction 251</p> <p>Scope and Application 252</p> <p>Legal Liability 253</p> <p>Torts and Negligence 254</p> <p>U.S. Privacy and Security Laws 255</p> <p>Health Insurance Portability and Accountability Act 255</p> <p>The Health Information Technology for Economic and Clinical Health Act 258</p> <p>Gramm–Leach–Bliley Act 259</p> <p>Sarbanes–Oxley Act 261</p> <p>State Data Breach Notification Laws 261</p> <p>International Laws 263</p> <p>European Union General Data Protection Regulation 263</p> <p>Adequacy Decisions 267</p> <p>U.S.- EU Safe Harbor and Privacy Shield 267</p> <p>Laws, Regulations, and Standards 269</p> <p>Payment Card Industry Data Security Standard 270</p> <p>Critical Infrastructure Protection Program 270</p> <p>Conflicting International Legislation 270</p> <p>Information Security Management Systems 272</p> <p>Iso/iec 27017:2015 272</p> <p>Privacy in the Cloud 273</p> <p>Generally Accepted Privacy Principles 273</p> <p>Iso 27018 279</p> <p>Direct and Indirect Identifiers 279</p> <p>Privacy Impact Assessments 280</p> <p>Cloud Forensics 281</p> <p>Forensic Requirements 281</p> <p>Cloud Forensic Challenges 281</p> <p>Collection and Acquisition 282</p> <p>Evidence Preservation and Management 283</p> <p>e-discovery 283</p> <p>Audit Processes, Methodologies, and Cloud Adaptations 284</p> <p>Virtualization 284</p> <p>Scope 284</p> <p>Gap Analysis 285</p> <p>Restrictions of Audit Scope Statements 285</p> <p>Policies 286</p> <p>Audit Reports 286</p> <p>Summary 288</p> <p>Exam Essentials 288</p> <p>Review Questions 290</p> <p><b>Chapter 10 Cloud Vendor Management 295</b></p> <p>The Impact of Diverse Geographical Locations and Legal Jurisdictions 297</p> <p>Security Policy Framework 298</p> <p>Policies 298</p> <p>Standards 300</p> <p>Procedures 302</p> <p>Guidelines 303</p> <p>Exceptions and Compensating Controls 304</p> <p>Developing Policies 305</p> <p>Enterprise Risk Management 306</p> <p>Risk Identification 308</p> <p>Risk Calculation 308</p> <p>Risk Assessment 309</p> <p>Risk Treatment and Response 313</p> <p>Risk Mitigation 313</p> <p>Risk Avoidance 314</p> <p>Risk Transference 314</p> <p>Risk Acceptance 315</p> <p>Risk Analysis 316</p> <p>Risk Reporting 316</p> <p>Enterprise Risk Management 318</p> <p>Assessing Provider Risk Management Practices 318</p> <p>Risk Management Frameworks 319</p> <p>Cloud Contract Design 320</p> <p>Business Requirements 321</p> <p>Vendor Management 321</p> <p>Data Protection 323</p> <p>Negotiating Contracts 324</p> <p>Common Contract Provisions 324</p> <p>Contracting Documents 326</p> <p>Government Cloud Standards 327</p> <p>Common Criteria 327</p> <p>FedRAMP 327</p> <p>Fips 140- 2 327</p> <p>Manage Communication with Relevant Parties 328</p> <p>Summary 328</p> <p>Exam Essentials 329</p> <p>Review Questions 330</p> <p>Appendix Answers to the Review Questions 335</p> <p>Chapter 1: Architectural Concepts 336</p> <p>Chapter 2: Data Classification 337</p> <p>Chapter 3: Cloud Data Security 339</p> <p>Chapter 4: Security in the Cloud 341</p> <p>Chapter 5: Cloud Platform, Infrastructure, and Operational Security 343</p> <p>Chapter 6: Cloud Application Security 345</p> <p>Chapter 7: Operations Elements 347</p> <p>Chapter 8: Operations Management 349</p> <p>Chapter 9: Legal and Compliance Issues 350</p> <p>Chapter 10: Cloud Vendor Management 352</p> <p>Index 355</p>
<p><b> About the Authors</b></p> <p><b> Mike Chapple, PhD, CCSP, CISSP,</b> is a bestselling author and Teaching Professor of Information Technology, Analytics, and Operations at Notre Dame’s Mendoza College of Business. He is also the Academic Director of the University’s Master of Science in Business Analytics program and holds multiple technical certifications, including the CIPP/US, CySA+, CISM, PenTest+, and Security+. <p><b> David Seidl, CISSP,</b> is Vice President for Information Technology and Chief Information Officer at Miami University. He holds multiple technical certifications including GPEN, GCIH, PenTest+, and CySA+ and has written books on security certification and cyberwarfare.
<p><b>Your Official Study Guide for the Certified Cloud Security Professional (CCSP)<sup>®</sup> Exam </b></p> <p>Organizations increasingly rely on cloud-based services, making cloud data security more vital than ever. The (ISC)2 Certified Cloud Security Professional (CCSP) credential proves your expertise in every aspect of essential cloud security, and this Sybex Study Guide is the only Official Study Guide reviewed and endorsed by (ISC)2. Covering 100% of CCSP exam objectives and completely updated and all-new for the 2022 exam objectives, this book helps you prepare with assessment tests that check exam readiness, objective maps, exercises, chapter review questions, and an industry-leading online study tool set. Along with plenty of practice in applying critical concepts and skills, you’ll have online access to two complete practice exams, a searchable glossary of essential terms, and more than 100 electronic flash cards to help you review. It’s the smartest, most effective way to prepare for the exam – and further your career. <p><b>Coverage of all exam objectives in this Study Guide means you’ll be ready for: </b> <ul><li>Cloud Concepts, Architecture, and Design</li> <li>Cloud Data Security</li> <li>Cloud Platform and Infrastructure Security</li> <li>Cloud Application Security</li> <li>Cloud Security Operations</li> <li>Legal, Risk, and Compliance</li></ul> <p><b>Interactive learning environment </b> <p> Take your exam prep to the next level with Sybex’s superior interactive online study tools. To access our learning environment, simply visit www.wiley.com/go/sybextestprep, register your book to receive your unique PIN, and instantly gain one year of FREE access after activation to: <ul><b><li>Interactive test bank with 2 practice exams to help you identify areas where further review is needed. Get more than 90% of the answers correct, and you’re ready to take the certification exam.</li> <li>More than 100 electronic flashcards to reinforce learning and last-minute prep before the exam.</li> <li>Comprehensive glossary in PDF format gives you instant access to the key terms so you are fully prepared.</li></b></ul> <p><b>ABOUT THE CCSP CERTIFICATION </b> <p><b>The CCSP is the premier cloud security certification from (ISC)<sup>2</sup>. This vendor-neutral certification validates IT and information security professionals’ knowledge and competency to apply best practices to cloud security architecture, design, operations, and service orchestration. It shows you’re on the forefront of cloud security. (ISC)<sup>2</sup> is a global nonprofit organization that maintains the Common Body of Knowledge for information security professionals. Candidates must have experience, adhere to the (ISC)<sup>2</sup> Code of Ethics and maintain continuing education requirements or recertify every three years. Visit www.isc2.org to learn more.</b>

Diese Produkte könnten Sie auch interessieren:

Google Earth For Dummies
Google Earth For Dummies
von: David A. Crowder
PDF ebook
19,99 €