Acknowledgments |
|
xvii | |
Introduction |
|
xix | |
Chapter 1 How to Obtain the CCSP and Introduction to Security |
|
1 | (16) |
|
|
1 | (1) |
|
|
2 | (1) |
|
|
2 | (7) |
|
Domain 1: Architectural Concepts and Design Requirements |
|
|
2 | (2) |
|
Domain 2: Cloud Data Security |
|
|
4 | (1) |
|
Domain 3: Cloud Platform and Infrastructure Security |
|
|
5 | (1) |
|
Domain 4: Cloud Application Security |
|
|
6 | (1) |
|
|
7 | (1) |
|
Domain 6: Legal and Compliance |
|
|
8 | (1) |
|
Introduction to IT Security |
|
|
9 | (6) |
|
|
10 | (4) |
|
|
14 | (1) |
|
Business Continuity and Disaster Recovery |
|
|
15 | (1) |
|
|
15 | (2) |
Chapter 2 Architectural Concepts and Design Requirements |
|
17 | (60) |
|
|
18 | (5) |
|
Cloud Computing Definitions |
|
|
18 | (1) |
|
|
19 | (1) |
|
Key Cloud Computing Characteristics |
|
|
20 | (3) |
|
Building-Block Technologies |
|
|
23 | (1) |
|
Cloud Reference Architecture |
|
|
23 | (14) |
|
Cloud Computing Activities |
|
|
23 | (1) |
|
Cloud Service Capabilities |
|
|
24 | (1) |
|
|
25 | (4) |
|
|
29 | (4) |
|
Cloud Cross-Cutting Aspects |
|
|
33 | (4) |
|
Security Concepts Relevant to Cloud Computing |
|
|
37 | (18) |
|
|
37 | (3) |
|
|
40 | (2) |
|
Data and Media Sanitation |
|
|
42 | (2) |
|
|
44 | (1) |
|
|
45 | (1) |
|
|
46 | (4) |
|
Security Considerations for the Different Cloud Categories |
|
|
50 | (5) |
|
Design Principles of Secure Cloud Computing |
|
|
55 | (3) |
|
Cloud Secure Data Lifecycle |
|
|
55 | (1) |
|
Cloud-Based Business Continuity/Disaster Recovery Planning |
|
|
56 | (1) |
|
|
57 | (1) |
|
Identify Trusted Cloud Services |
|
|
58 | (6) |
|
Certification Against Criteria |
|
|
59 | (1) |
|
System/Subsystem Product Certifications |
|
|
59 | (1) |
|
ISO/IEC 27001 and 27001:2013 |
|
|
59 | (1) |
|
|
60 | (1) |
|
Payment Card Industry Data Security Standard (PCI DSS) |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
63 | (1) |
|
Cloud Architecture Models |
|
|
64 | (2) |
|
Sherwood Applied Business Security Architecture (SABSA) |
|
|
)64 | |
|
IT Infrastructure Library (ITIL) |
|
|
65 | (1) |
|
The Open Group Architecture Framework (TOGAF) |
|
|
65 | (1) |
|
NIST Cloud Technology Roadmap |
|
|
66 | (1) |
|
|
66 | (1) |
|
|
66 | (11) |
|
|
67 | (2) |
|
|
69 | (8) |
Chapter 3 Cloud Data Security |
|
77 | (46) |
|
Understanding the Cloud Data Lifecycle |
|
|
77 | (3) |
|
|
77 | (3) |
|
Design and Implement Cloud Data Storage Architectures |
|
|
80 | (5) |
|
|
80 | (2) |
|
|
82 | (1) |
|
Technologies Available to Address Threats |
|
|
83 | (2) |
|
Design and Apply Data Security Strategies |
|
|
85 | (6) |
|
|
85 | (2) |
|
|
87 | (1) |
|
Masking/Obfuscation/Anonymization |
|
|
88 | (1) |
|
|
89 | (1) |
|
Application of Technologies |
|
|
89 | (1) |
|
|
90 | (1) |
|
Data Discovery and Classification Techniques |
|
|
91 | (3) |
|
|
91 | (2) |
|
|
93 | (1) |
|
Relevant Jurisdictional Data Protections for Personally Identifiable Information |
|
|
94 | (4) |
|
|
94 | (1) |
|
Privacy Roles and Responsibilities |
|
|
95 | (1) |
|
Implementation of Data Discovery |
|
|
96 | (1) |
|
Classification of Discovered Sensitive Data |
|
|
96 | (1) |
|
Mapping and Definition of Controls |
|
|
97 | (1) |
|
Application of Defined Controls |
|
|
97 | (1) |
|
|
98 | (2) |
|
|
98 | (1) |
|
|
99 | (1) |
|
Data Retention, Deletion, and Archiving Policies |
|
|
100 | (4) |
|
|
100 | (1) |
|
|
101 | (1) |
|
|
101 | (3) |
|
Auditability, Traceability, and Accountability of Data Events |
|
|
104 | (9) |
|
Definition of Event Sources |
|
|
104 | (2) |
|
Identity Attribution Requirements |
|
|
106 | (2) |
|
|
108 | (1) |
|
Storage and Analysis of Data Events |
|
|
109 | (2) |
|
|
111 | (1) |
|
Chain of Custody and Nonrepudiation |
|
|
112 | (1) |
|
|
113 | (1) |
|
|
113 | (10) |
|
|
114 | (2) |
|
|
116 | (7) |
Chapter 4 Cloud Platform and Infrastructure Security |
|
123 | (34) |
|
Cloud Infrastructure Components |
|
|
123 | (7) |
|
|
123 | (2) |
|
|
125 | (1) |
|
|
126 | (1) |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
129 | (1) |
|
Risks Associated with Cloud Infrastructure |
|
|
130 | (3) |
|
Risk Assessment and Analysis |
|
|
130 | (1) |
|
|
131 | (1) |
|
Countermeasure Strategies |
|
|
132 | (1) |
|
Design and Plan Security Controls |
|
|
133 | (7) |
|
Physical and Environmental Protection |
|
|
133 | (1) |
|
System and Communication Protection |
|
|
134 | (1) |
|
Virtualization Systems Protection |
|
|
134 | (2) |
|
Management of Identification, Authentication, and Authorization |
|
|
136 | (3) |
|
|
139 | (1) |
|
Disaster Recovery and Business Continuity Management Planning |
|
|
140 | (8) |
|
Understanding the Cloud Environment |
|
|
140 | (2) |
|
Understanding Business Requirements |
|
|
142 | (1) |
|
|
143 | (1) |
|
Disaster Recovery/Business Continuity Strategy |
|
|
144 | (4) |
|
|
148 | (1) |
|
|
148 | (9) |
|
|
148 | (3) |
|
|
151 | (6) |
Chapter 5 Cloud Application Security |
|
157 | (34) |
|
Training and Awareness in Application Security |
|
|
157 | (6) |
|
|
158 | (1) |
|
|
158 | (2) |
|
|
160 | (3) |
|
Cloud Software Assurance and Validation |
|
|
163 | (3) |
|
Cloud-Based Functional Testing |
|
|
164 | (1) |
|
Cloud Secure Development Lifecycle |
|
|
164 | (1) |
|
|
164 | (2) |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
167 | (1) |
|
Understanding the Software Development Lifecycle (SDLC) Process |
|
|
167 | (3) |
|
|
167 | (2) |
|
|
169 | (1) |
|
Software Configuration Management and Versioning |
|
|
170 | (1) |
|
Applying the Secure Software Development Lifecycle |
|
|
170 | (6) |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
173 | (3) |
|
Cloud Application Architecture |
|
|
176 | (4) |
|
Supplemental Security Devices |
|
|
176 | (2) |
|
|
178 | (1) |
|
|
178 | (1) |
|
Application Virtualization |
|
|
179 | (1) |
|
Identity and Access Management (IAM) Solutions |
|
|
180 | (3) |
|
|
180 | (2) |
|
|
182 | (1) |
|
|
182 | (1) |
|
Multifactor Authentication |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
183 | (8) |
|
|
184 | (2) |
|
|
186 | (5) |
Chapter 6 Operations |
|
191 | (62) |
|
Support the Planning Process for the Data Center Design |
|
|
191 | (7) |
|
|
192 | (1) |
|
|
193 | (4) |
|
|
197 | (1) |
|
Implement and Build the Physical Infrastructure for the Cloud Environment |
|
|
198 | (5) |
|
Secure Configuration of Hardware-Specific Requirements |
|
|
198 | (4) |
|
Installation and Configuration of Virtualization Management Tools |
|
|
202 | (1) |
|
Run the Physical Infrastructure for the Cloud Environment |
|
|
203 | (6) |
|
Configuration of Access Control for Local Access |
|
|
203 | (1) |
|
Securing Network Configuration |
|
|
204 | (3) |
|
OS Hardening via the Application of Baselines |
|
|
207 | (1) |
|
Availability of Standalone Hosts |
|
|
207 | (1) |
|
Availability of Clustered Hosts |
|
|
207 | (2) |
|
Manage the Physical Infrastructure for the Cloud Environment |
|
|
209 | (12) |
|
Configuring Access Controls for Remote Access |
|
|
209 | (1) |
|
OS Baseline Compliance Monitoring and Remediation |
|
|
210 | (1) |
|
|
210 | (2) |
|
|
212 | (1) |
|
|
213 | (1) |
|
Backup and Restore of Host Configuration |
|
|
214 | (1) |
|
Implementation of Network Security Controls |
|
|
214 | (4) |
|
|
218 | (2) |
|
|
220 | (1) |
|
Build the Logical Infrastructure for the Cloud Environment |
|
|
221 | (2) |
|
Secure Configuration of Virtual Hardware-Specific Requirements |
|
|
221 | (1) |
|
Installation of Guest Operating System Virtualization Toolsets |
|
|
222 | (1) |
|
Run the Logical Infrastructure for the Cloud Environment |
|
|
223 | (3) |
|
Secure Network Configuration |
|
|
223 | (1) |
|
OS Hardening via Application of Baselines |
|
|
224 | (2) |
|
Availability of the Guest Operating System |
|
|
226 | (1) |
|
Manage the Logical Infrastructure for the Cloud Environment |
|
|
226 | (3) |
|
Access Control for Remote Access |
|
|
226 | (1) |
|
OS Baseline Compliance Monitoring and Remediation |
|
|
227 | (1) |
|
|
227 | (1) |
|
|
228 | (1) |
|
Backup and Restore of Guest OS Configuration |
|
|
228 | (1) |
|
Implementation of Network Security Controls |
|
|
228 | (1) |
|
|
228 | (1) |
|
|
229 | (1) |
|
Ensure Compliance with Regulations and Controls |
|
|
229 | (6) |
|
|
230 | (1) |
|
|
231 | (1) |
|
Information Security Management |
|
|
232 | (1) |
|
Continual Service Improvement Management |
|
|
232 | (1) |
|
|
232 | (1) |
|
|
233 | (1) |
|
Release and Deployment Management |
|
|
234 | (1) |
|
|
234 | (1) |
|
|
234 | (1) |
|
|
235 | (1) |
|
|
235 | (1) |
|
Conduct Risk Assessment for the Logical and Physical Infrastructure |
|
|
235 | (5) |
|
|
235 | (1) |
|
|
236 | (2) |
|
|
238 | (2) |
|
|
240 | (1) |
|
Understand the Collection, Acquisition, and Preservation of Digital Evidence |
|
|
240 | (2) |
|
Proper Methodologies for the Forendk Collection of Data |
|
|
240 | (2) |
|
|
242 | (1) |
|
Manage Communication with Relevant Parties |
|
|
242 | (2) |
|
|
242 | (1) |
|
|
242 | (1) |
|
|
243 | (1) |
|
|
243 | (1) |
|
|
243 | (1) |
|
|
244 | (1) |
|
|
244 | (9) |
|
|
244 | (3) |
|
|
247 | (6) |
Chapter 7 Legal and Compliance Domain |
|
253 | (50) |
|
Legal Requirements and Unique Risks Within the Cloud Environment |
|
|
253 | (7) |
|
International Legislation Conflicts |
|
|
254 | (1) |
|
Appraisal of Legal Risks Specific to Cloud Computing |
|
|
254 | (1) |
|
|
255 | (1) |
|
|
255 | (4) |
|
|
259 | (1) |
|
Privacy Issues and Jurisdictional Variation |
|
|
260 | (6) |
|
Difference Between Contractual and Regulated PII |
|
|
260 | (1) |
|
Country-Specific Legislation Related to PII and Data Privacy |
|
|
261 | (2) |
|
Differences Among Confidentiality, Integrity, Availability, and Privacy |
|
|
263 | (3) |
|
Audit Processes, Methodologies, and Required Adaptions for a Cloud Environment |
|
|
266 | (19) |
|
Internal and External Audit Controls |
|
|
266 | (1) |
|
Impact of Requirements Programs by the Use of Cloud |
|
|
267 | (1) |
|
Assurance Challenges of Virtualization and Cloud |
|
|
267 | (1) |
|
|
268 | (4) |
|
Restrictions of Audit Scope Statements |
|
|
272 | (1) |
|
|
273 | (1) |
|
|
274 | (4) |
|
|
278 | |
|
Internal Information Security Management System (ISMS) |
|
|
80 | (201) |
|
Internal Information Security Controls System |
|
|
281 | (1) |
|
|
282 | (1) |
|
Identification and Involvement of Relevant Stakeholders |
|
|
283 | (1) |
|
Specialized Compliance Requirements for Highly Regulated Industries |
|
|
284 | (1) |
|
Impact of Distributed IT Model |
|
|
284 | (1) |
|
Implications of cloud to Enterprise Risk Management |
|
|
285 | (4) |
|
Assess Providers Risk Management |
|
|
286 | (1) |
|
Difference Between Data Owner/Controller vs. Data Custodian/Processor |
|
|
286 | (1) |
|
|
287 | (1) |
|
Different Risk Frameworks |
|
|
287 | (1) |
|
Metrics for Risk Management |
|
|
288 | (1) |
|
Assessment of the Risk Environment |
|
|
289 | (1) |
|
Outsourcing and Cloud Contract Design |
|
|
289 | (5) |
|
|
290 | (1) |
|
|
290 | (2) |
|
|
292 | (2) |
|
Executive Vendor Management |
|
|
294 | (1) |
|
|
294 | (1) |
|
|
295 | (1) |
|
|
295 | (8) |
|
|
295 | (3) |
|
|
298 | (5) |
Appendix A Exam Review Questions |
|
303 | (92) |
|
|
303 | (19) |
|
|
322 | (1) |
|
Questions and Comprehensive Answer Explanations |
|
|
323 | (72) |
Appendix B About the CD-ROM |
|
395 | (2) |
|
|
395 | (1) |
|
Installing and Running Total Tester Premium Practice |
|
|
|
|
395 | (1) |
|
Total Tester Premium Practice Exam Software |
|
|
395 | (1) |
|
|
396 | (1) |
|
|
396 | (1) |
Glossary |
|
397 | (12) |
Index |
|
409 | |