CCSO - Certified Cloud Security Officer - ML


E-Learning
Description
This course will teach students about Cloud Security. Topics covered include cloud risks, legal implications, data center operations, incident response, application security, and more.
This course will teach students about Cloud Security. Topics covered include cloud risks, legal implications, data center operations, incident response, application security, and more
| Lesson Id | Title | Description |
|---|---|---|
| 1 | Introduction to Cloud Computing and Architectural Concepts |
Section 1: Cloud Computing Terminology Key Cloud Computing Terminology Terminology Mapped to the Cloud Other Terms Section 2: Cloud Computing Definition Cloud Computing Defined NIST Five Essential Characteristics NIST Three Service Models SaaS Pros and Cons PaaS Pros and Cons IaaS Pros and Cons NIST Four Deployment Models Cloud Computing Characteristics Section 3: Cloud Computing Benefits Why move to the Cloud? Cost Benefit Analysis ROI Calculation TCO Calculation Ease of Deployment – Security Risks Introductory Security Risks and Benefits Section 4: Cloud Computing Reference Model Cloud Computing Architecture Potential Pitfalls and Confusion Cloud Computing Deployment Models Jericho Cloud Cube Model Example of Service Model Mapped to Controls Section 5: What is Security for the Cloud The Security Impact of Cloud Architecture Where is the security added? Cloud Technology Road Map NIST Cloud Technology Road Map Cloud Cross Cutting Aspects Architecture Overview Business Security Architecture Jericho Key Principles (11 Commandments) ENISA Questions |
| 2 | Cloud Risks |
Section 1: Cloud Migration Security Evaluation Challenges in Decision Making Process of Moving to the Cloud Quick Method for Evaluation Evaluate the Asset Map the Asset to Cloud Finalizing the Decision Section 2: ENISA Risk Evaluation ENISA – Cloud Computing Security Risk Assessment ENISA– Top Security Benefits Probability vs. Impact of Identified Risks ENISA– Top Security Risks Top Risks No. 1 Top Risks No. 2 Top Risks No. 3 Top Risks No. 9 Top Risks No. 10 Top Risks No. 21 Top Risks No. 22 Top Risks No. 23 Top Risks No. 26 Assets Section 3: Cloud Controls Matrix Cloud Controls Matrix (CCM) The Control Domains Example Example Continued Section 4: Relevant CCM Controls TVM 01 AntiVirus / Malicious Software TVM 02 Vulnerability and Patch Management TVM 03 Mobile Code Questions |
| 3 | ERM and Governance |
Section 1: Application of Governance and Risk Management to the Cloud Corporate Governance Customer Expectations Four Areas Impacted Tools of the Trade Who is responsible? Not Accountable! Cloud Computing Governance Resources Information/Data Governance Types Enterprise Risk Management Risk Response in the Cloud Where do we start? Must do items Section 2: Importance of the SLA Contracts/SLAs Contracts/SLAs: Change Your Thinking Important SLA Components Metrics for Risk Management/Service Level Agreement (SLA) Section 3: CCM Relevant Controls GRM-01 – Baseline Requirements GRM-02 – Data Focus Risk Assessments GRM-03 – Management Oversight GRM-04 – Management Program GRM-05 – Management Support/Involvement GRM-06 – Policy GRM-07 – Policy Enforcement GRM-08 – Policy Impact on Risk Assessments GRM-09 – Policy Reviews GRM-10 – Risk Assessments GRM-11 – Risk Management Framework Questions |
| 4 | Legal Implications |
Section 1: Understanding Unique Risks in the Cloud Understand Legal Requirements & Unique Risks Within the Cloud Environment Section 2: International Legislation and Potential Conflicts International Legislation Conflicts GDPR Appraisal of Legal Risks Specific to Cloud Computing Legal Controls Section 3: eDiscovery eDiscovery Special Issues Forensics Requirements Section 4: Contract Considerations Contract Considerations Contractual & Regulated PII: The Differences Contractual & Regulated PII: The Similarities Country-specific Legislation Related to PII/Data Privacy/Data Protection Section 5: Relevant CCM Controls SEF-01 – Contract / Authority Maintenance Questions |
| 5 | Virtualization and Technical Design |
Section 1: Virtualization Principles Virtualization Definition How Does Virtualization Work? What is a Virtual Machine (VM)? What is a Hypervisor? Type 1 and Type 2 Hypervisors Virtualization Layer CPU Hardware Virtualization Section 2: Key Components Mapped to Cloud Layer vSphere 6.x Virtual Switches VMware vSwitch Terminology Storage Terminology Overview of Virtual Appliances Clones and Templates Customization Specifications Manager vSphere Content Libraries VM Snapshots vMotion – Hot Migration Storage vMotion Distributed Resource Scheduler Overview Distributed Power Management (DPM) VM Swapfile Location Host Profiles Overview Storage DRS (SDRS) Overview Profile Driven Storage Overview VSAN Architecture Resource Pools Overview High Availability Overview Fault Tolerance Section 3: Key Security Concerns Virtualization Risks and Challenges Network Security and Perimeter Virtualization Security Common Architecture Concerns vSphere Hardening Guide Section 4: Other Technologies Used in the Cloud Network Security Network and Communications in the Cloud Cloud Networking VXLAN Section 5: The Layers Logical Design Considerations Physical Virtual and vCloud Layers Software Defined Data Center (SDDC) Components SDDC– Physical Configuration SDDC– vCenter Cluster Layout SDDC– The Big Ugly Picture SDDC– The Big Ugly Picture but not as bad! Section 6: Relevant CCM Controls IVS-01 Audit Logging / Intrusion Detection IVS-02 Change Detection IVS-03 Clock Synchronization IVS-04 Information System Documentation IVS-05 Vulnerability Management IVS-06 Network Security IVS-07 OS Hardening and Base Controls IVS-08 Production / Non Production Environments IVS-09 Segmentation IVS-10 VM Security Data Protection IVS-11 Hypervisor Hardening IVS-12 Wireless Security IVS-13 Network Architecture Questions |
| 6 | Managing Information and Securing Data |
Section 1: Cloud/Data Life Cycle Data Security Lifecycle Locations and Access Functions Actors and Controls Section 2: Data Security Architectures and Strategies Pillars of Functionality Storage Types IaaS Storage Types PaaS Storage Types SaaS Top Threats to Storage Technologies available to address the threats Data Dispersion Data Loss Prevention (DLP) Encryption Encryption Challenges Encryption Architecture IaaS Data Encryption Database Encryption Encryption Review Key Management Key Management Considerations Storing keys in the cloud Data Masking/Obfuscation Data Anonymization Tokenization Data Security Strategies Emerging Technologies Section 3: Data Discovery and Classification Data Discovery Data Classification Data Classification Categories Cloud Data Challenges Section 4: Jurisdictional Data Protection for Personally Identifiable Information (PII) Terms Implementation of Data Discovery Main Input Entities Privacy Level Agreement Controls for PII Typical Security Measures Section 5: Data/Information Rights Management Data Rights Management Information Rights Management IRM Cloud Difficulties IRM Solutions Section 6: Data Retention Deletion and Archival Policies Data Protection Policies Data Retention Policies Data Deletion Data Archiving Section 7: Accountability of Data Events SaaS Potential Event Sources PaaS Potential Event Sources IaaS Potential Event Sources Data Event Logging and Event Attributes What to do with data events? Security Information and Event Management Supporting Continuous Operations Section 8: Relevant CCM Controls DSI-01 Management Classification DSI-02 Data Inventory Flows DSI-03 eCommerce Transactions DSI-04 Handling / Labeling / Security Policy DSI-05 Non Production Data DSI-06 Ownership / Stewardship DSI-07 Secure Disposal Questions |
| 7 | Data Center Operations |
Section 1: The Logical Infastructure Logical Infastructure Design Notes Secure Configuration of Hardware Requirements Secure Network Configuration Hardening OS and Apps Availability of Guest OS Managing the Logical Infrastructure IT Service Management (ITSM) Information Security Management Configuration Management Process Configuration Change and Availability Management Shadow IT Change Management Objectives Change Management Policies and Procedures Problem Management Release and Deployment Management Objectives Release and Deployment Management Service Level Management Other Management areas Section 2: Manage Communications with all Parties 5 Ws and the H Vendors Customers Partners Section 3: Relevant CCM Controls CCC-01 New Development / Acquisition CCC-02 Outsourced Development CCC-03 Quality Testing CCC-04 Unauthorized Software Installations CCC-05 Production Changes HRS-01 Asset Returns HRS-02 Background Screening HRS-03 Employment Agreements HRS-04 Employment Terminations HRS-05 Mobile Device Management HRS-06 Non Disclosure Agreements HRS-07 Roles / Responsibilities HRS-08 Technology Acceptable Use HRS-09 Training Awareness HRS-10 User Responsibility HRS-11 Workspace STA-01 Data Quality and Integrity STA-02 Incident Reporting STA-03 Network / Infrastructure Services STA-04 Provider Internal Assessments STA-05 Supply Chain Agreements STA-06 Supply Chain Governance Reviews STA-07 Supply Chain Metrics STA-08 Third Party Assessment STA-09 Third Party Audits Questions |
| 8 | Interoperability and Portability |
Section 1: Interoperability Interoperability Reason a change may happen Why is this important Example Recommendations Section 2: Portability Portability Interoperability and Portability Helps to Mitigate Golden Rule Basic Recommendations IaaS Recommendations PaaS Recommendations SaaS Recommendations Private Cloud Recommendations Public Cloud Recommendations Hybrid Cloud Recommendations Section 3: Relevant CCM Controls IPY-01 API’s IPY-02 Data Request IPY-03 Policy and Legal IPY-04 Standardized Network Protocols IPY-05 Virtualization Questions |
| 9 | Traditional Security |
Section 1: The Physical Environment Physical Environment Physically. What does one of these beasts look like? Major Factors in building a great datacenter Google’s Top 10 Datacenter Design Network and Communications in the Cloud Compute Storage Physical and Environmental Controls Protecting Datacenter Facilities System and Communication Protections Section 2: Planning Process for the Data Center Design Support the Planning Physical Design Considerations DC Design Standards Tier Standard Review Tiered Model Summary Environmental Design Design Considerations MultiVendor Pathway Connectivity (MVPC) Section 3: Implement and Build Physical Infrastructure Enterprise Operations Security Requirements for Hardware Oversubscription iSCSI Implementation Considerations Section 4: Typical Security for the Datacenter Components Access Controls Access Control (KVM) Access Controls Securing Network Configurations OS Hardening Everything about the OS Standalone Host Availability Considerations Availability of Clustered Hosts Clustered Storage Architectures Performance Monitoring Redundant System Architecture Backup and Restore of Hosts? Log Management Recommendations Log Management Management Planning Includes Business Continuity & Disaster Recovery Business Continuity Elements Section 5: Relevant CCM Controls DCS-01 Asset Management DCS-02 Controlled Access Points DCS-03 Equipment Identification DCS-04 Off Site Authorization DCS-05 Off Site Equipment DCS-06 Policy DCS-07 Secure Area Authorization DCS-08 Unauthorized Persons Entry DCS-09 User Access Questions |
| 10 | BCM and DR |
Section 1: Disaster Recovery and Business Continuity Management The Business Continuity Management Concept BCM Lifecycle Business Continuity Disaster Recovery BCDR Relevant Cloud Characteristics Business Impact Analysis BCDR Requirements BCDR Risks Requiring Protection BCDR Strategy Risks BCDR Strategies Creating the BCDR Plan Planning Testing and Review Section 2: Examples Virtualization Pass Through Backup and DR Software Section 3: Relevant CCM Controls BCR-01 Business Continuity Planning BCR-02 Business Continuity Testing BCR-03 Datacenter / Utilities Environmental Conditions BCR-04 Operational Resilience Documentation BCR-05 Environmental Risks BCR-06 Equipment Location BCR-07 Equipment Maintenance BCR-08 Equipment Power Failures BCR-09 Impact Analysis BCR-10 Policy BCR-11 Retention Policy Questions |
| 11 | Incident Response |
Section 1: Incident Management Incident Management Incident Management Plan Incident Classification Security Events Logs Alerts What is an Incident? Security Incident Indication of Compromise What is Incident Handling? Difference between IH and IR Common Tools IPS vs WAF SOC Six Step Approach to Incident Handling Section 2: Forensics Cloud Forensics Challenges Methodology for Forensics Access to Data by Service Model Forensic Readiness Considerations Items to consider when collecting evidence Section 3: Relevant CCM Controls SEF-01 Contract / Authority Maintenance SEF-02 Incident Management SEF-03 Incident Reporting SEF-04 Legal Preparation SEF-05 Incident Response Metrics Questions |
| 12 | Application Security |
Section 1: Components affecting Security Web Application Security Application Basics Application Programming Interface (API) WS Features Web Services Common Pitfalls Encryption Dependencies Section 2: Software Development Life Cycle (SDLC) Software Development Lifecycle (SDLC) Secure Software Development Lifecycle S-SDLC Software Development Lifecycle Project Initiation Requirements Phase Secure Design Development Unit Testing Testing Production Implementation Summary Section 3: Vulnerabilities OWASP Top 10 A1 – Injection A2 – Broken Authentication A3 – Sensitive Data Exposure Threats and Risks A4 – XML External Entities (XXE) A5 – Broken Access Control A6 – Security Misconfiguration A7 – Cross-Site Scripting A8 – Insecure Deserialization A9 – Using Components with Known Vulnerabilities A10 – Insufficient Logging and Monitoring Cloud Specific Risks STRIDE Threat Model Recommendations Section 4: Identity and Access Management (IAM) Identity and Access Management Federated Identity Management Security Assertion Markup Language 2.0 (SAML 2.0) SAML Assertion SAML Assertion Child Elements SAML Protocols SAML Bindings Open ID Connect (OIDC) OIDC Flows OIDC Flow Comparison JSON Web Tokens Best Practices Which Federated Identity System to use? Multi-Factor Authentication Identities and Attributes Examples Identity Management Section 5: Software Assurance and Validation Assurance Handling of Data ISO/IEC 27034-1 Organization Normative Framework (ONF) Frameworks Verification and Validation Application Security Testing Questions |
| 13 | Encryption and Key Management |
Section 1: Review from other chapters You are the teacher now! Cryptography Encryption / Data Protection Encryption & Key Management Emerging Technologies Section 2: Key Management in today’s cloud services Key Management Interoperability Protocol (KMIP) KMIP Vendors offering KMIP Vendors that support KMIP Cloud Access Security Broker (CASB) Hardware Security Module (HSM) Section 3: Recommendations General Recommendations Recommendations Encryption with Databases Section 4: Relevant CCM Controls EKM-01 Entitlement EKM-02 Key Generation EKM-03 Sensitive Data Protection EKM-04 Storage and Access Questions |
| 14 | Identity Entitlement & Access Management |
Section 1: Introduction to Identity and Access Management Terms Used Identity and Access Management Key points to consider Identity Architecture Differences Generic Example Identity Federation General Usage of Federation Section 2: Identities and Attributes Provisioning Examples of Identities and Attributes Potential Decision Making Process Identity and the Attribute Entitlement Process Automated Approaches Interpretation Locations Authorization and Access Management Section 3: Options for Architectures Hub and Spoke Model Mesh or Free Form Model Free Form Model Hybrid Model Bridge or Federation Hub Provisioning Accounts Identity and Attribute Provisioning Section 4: The Identity Identity and Data Protection Consumerization Challenge Section 6: Relevant CCM Controls IAM-01 Audit Tools Access IAM-02 Credential Lifecycle / Provision Management IAM-03 Diagnostic /Configuration Port Access IAM-04 Policies and Procedures IAM-05 Segregation of Duties IAM-06 Source Code Access Restriction IAM-07 Third Party Access IAM-08 Trusted Sources IAM-09 User Access Authorization IAM-10 User Access Reviews IAM-11 User Access Revocation IAM-12 User ID Credentials IAM-13 Utility Programs Access Questions |
| 15 | Auditing and Compliance |
Section 1: Compliance and Audit Cloud Issues GRC Value Ecosystem Assurance by CSP Assurance by CSP– Assurance Frameworks Assurance Challenges of Virtualization and Cloud Policies Risk Audit Mechanisms Section 2: Assurance Frameworks Assurance by CSP Assurance Frameworks Certification Against Criteria Assurance Frameworks ISO 2700X ISO/IEC 27001 Domains Assurance Frameworks – AICPA SOC 1 SOC II and SOC III Assurance Frameworks – NIST SP 800-53 PCI-DSS Merchant Level PCI-DSS 12 Requirements Assurance Frameworks – COBIT Assurance Frameworks – AICPA/CICA Trust Services Assurance Frameworks – Cloud Security Matrix Assurance Frameworks – FedRamp NIST SP 800-144 NIST SP 800-144 – Preliminary Activities NIST SP 800-144 – Initiating & Coincident Activities NIST SP 800-144 – Concluding Activities Assurance Frameworks – HITRUST Assurance Frameworks – BITS Assurance Frameworks – Jericho SAS System/Subsystem Product Certification Common Criteria Protection Profiles (PP) Section 3: The Audit Cloud Audit Goals Impact of Requirements Programs by the Use of Cloud Types of Audit Reports Restrictions of Audit Scope Gap Analysis Standards Requirements (ISO/IEC 27018 GAPP) Internal ISMS Internal Information Security Control System ISO 27002:2013 Cloud Computing Audit Characteristics Internal and External Audit Controls Planning & Scoping the Audit Section 4: Relevant CCM Controls AAC-01 – Audit Planning AAC-02 – Independent Audits AAC-03 – Info |
Self-Paced
Free
This course includes: :
Full lifetime access