The Official (ISC)2 CCSP CBK Reference
(Sprache: Englisch)
The only official body of knowledge for CCSP--the most popular cloud security credential--fully revised and updated.Certified Cloud Security Professional (CCSP) certification validates the advanced technical skills needed to design, manage, and secure data,...
Leider schon ausverkauft
versandkostenfrei
Buch (Gebunden)
74.50 €
Produktdetails
Produktinformationen zu „The Official (ISC)2 CCSP CBK Reference “
Klappentext zu „The Official (ISC)2 CCSP CBK Reference “
The only official body of knowledge for CCSP--the most popular cloud security credential--fully revised and updated.Certified Cloud Security Professional (CCSP) certification validates the advanced technical skills needed to design, manage, and secure data, applications, and infrastructure in the cloud. This highly sought-after global credential has been updated with revised objectives. The new third edition of The Official (ISC)² Guide to the CCSP CBK is the authoritative, vendor-neutral common body of knowledge for cloud security professionals.This comprehensive resource provides cloud security professionals with an indispensable working reference to each of the six CCSP domains: Cloud Concepts, Architecture and Design; Cloud Data Security; Cloud Platform and Infrastructure Security; Cloud Application Security; Cloud Security Operations; and Legal, Risk and Compliance. Detailed, in-depth chapters contain the accurate information required to prepare for and achieve CCSP certification. Every essential area of cloud security is covered, including implementation, architecture, operations, controls, and immediate and long-term responses.Developed by (ISC)², the world leader in professional cybersecurity certification and training, this indispensable guide:* Covers the six CCSP domains and over 150 detailed objectives* Provides guidance on real-world best practices and techniques* Includes illustrated examples, tables, and diagramsThe Official (ISC)² Guide to the CCSP CBK is a vital ongoing resource for IT and information security leaders responsible for applying best practices to cloud security architecture, design, operations and service orchestration.
Inhaltsverzeichnis zu „The Official (ISC)2 CCSP CBK Reference “
Acknowledgments vAbout the Authors viiAbout the Technical Editor ixForeword to the Third Edition xxiIntroduction xxiiiDomain 1: Cloud Concepts, Architecture, and Design 1Understand Cloud Computing Concepts 1Cloud Computing Definitions 1Cloud Computing Roles 4Key Cloud Computing Characteristics 5Building Block Technologies 9Describe Cloud Reference Architecture 12Cloud Computing Activities 12Cloud Service Capabilities 13Cloud Service Categories 14Cloud Deployment Models 15Cloud Shared Considerations 17Impact of Related Technologies 23Understand Security Concepts Relevant to Cloud Computing 27Cryptography and Key Management 27Access Control 28Data and Media Sanitization 29Network Security 30Virtualization Security 31Common Threats 32Understand Design Principles of Secure Cloud Computing 33Cloud Secure Data Lifecycle 33Cloud-Based Disaster Recovery and Business Continuity Planning 33Cost-Benefit Analysis 34Functional Security Requirements 35Security Considerations for Different Cloud Categories 36Evaluate Cloud Service Providers 38Verification against Criteria 39System/Subsystem Product Certifications 40Summary 41Domain 2: Cloud Data Security 43Describe Cloud Data Concepts 43Cloud Data Lifecycle Phases 44Data Dispersion 47Design and Implement Cloud Data Storage Architectures 48Storage Types 48Threats to Storage Types 50Design and Apply Data Security Technologies and Strategies 52Encryption and Key Management 52Hashing 55Masking 56Tokenization 56Data Loss Prevention 57Data Obfuscation 60Data De-identification 61Implement Data Discovery 62Structured Data 64Unstructured Data 65Implement Data Classification 66Mapping 68Labeling 68Sensitive Data 69Design and Implement Information Rights Management 71Objectives 72Appropriate Tools 73Plan and Implement Data Retention, Deletion, and Archiving Policies 74Data Retention Policies 74Data Deletion Procedures and Mechanisms 77Data Archiving Procedures and Mechanisms 79Legal Hold 80Design and Implement Auditability, Traceability, and
... mehr
Accountability of Data Events 81Definition of Event Sources and Requirement of Identity Attribution 81Logging, Storage, and Analysis of Data Events 82Chain of Custody and Nonrepudiation 84Summary 85Domain 3: Cloud Platform and Infrastructure Security 87Comprehend Cloud Infrastructure Components 88Physical Environment 88Network and Communications 89Compute 90Virtualization 91Storage 93Management Plane 93Design a Secure Data Center 95Logical Design 95Physical Design 97Environmental Design 98Analyze Risks Associated with Cloud Infrastructure 99Risk Assessment and Analysis 100Cloud Vulnerabilities, Threats, and Attacks 101Virtualization Risks 101Countermeasure Strategies 102Design and Plan Security Controls 102Physical and Environmental Protection 103System and Communication Protection 103Virtualization Systems Protection 104Identification, Authentication, and Authorization in Cloud Infrastructure 105Audit Mechanisms 106Plan Disaster Recovery and Business Continuity 107Risks Related to the Cloud Environment 108Business Requirements 109Business Continuity/Disaster Recovery Strategy 111Creation, Implementation, and Testing of Plan 112Summary 116Domain 4: Cloud Application Security 117Advocate Training and Awareness for Application Security 117Cloud Development Basics 118Common Pitfalls 118Common Cloud Vulnerabilities 119Describe the Secure Software Development Lifecycle Process 120NIST Secure Software Development Framework 120OWASP Software Assurance Security Model 121Business Requirements 121Phases and Methodologies 122Apply the Secure Software Development Lifecycle 123Avoid Common Vulnerabilities During Development 123Cloud-Specific Risks 124Quality Assurance 127Threat Modeling 127Software Configuration Management and Versioning 128Apply Cloud Software Assurance and Validation 129Functional Testing 130Security Testing Methodologies 131Use Verified Secure Software 132Approved Application Programming Interfaces 132Supply-Chain Management 133Third-Party Software Management 134Validated Open Source Software 134Comprehend the Specifics of Cloud Application Architecture 135Supplemental Security Components 136Cryptography 138Sandboxing 139Application Virtualization and Orchestration 139Design Appropriate Identity and Access Management Solutions 140Federated Identity 140Identity Providers 141Single Sign-On 141Multifactor Authentication 142Cloud Access Security Broker 142Summary 143Domain 5: Cloud Security Operations 145Implement and Build Physical and Logical Infrastructure for Cloud Environment 145Hardware-Specific Security Configuration Requirements 146Installation and Configuration of Virtualization Management Tools 149Virtual Hardware-Specific Security Configuration Requirements 150Installation of Guest Operating System Virtualization Toolsets 152Operate Physical and Logical Infrastructure for Cloud Environment 152Configure Access Control for Local and Remote Access 153Secure Network Configuration 155Operating System Hardening through the Application of Baselines 160Availability of Stand-Alone Hosts 162Availability of Clustered Hosts 162Availability of Guest Operating Systems 165Manage Physical and Logical Infrastructure for Cloud Environment 166Access Controls for Remote Access 166Operating System Baseline Compliance Monitoring and Remediation 168Patch Management 169Performance and Capacity Monitoring 172Hardware Monitoring 173Configuration of Host and Guest Operating System Backupand Restore Functions 174Network Security Controls 175Management Plane 179Implement Operational Controls and Standards 180Change Management 180Continuity Management 182Information Security Management 184Continual Service Improvement Management 185Incident Management 186Problem Management 189Release Management 190Deployment Management 191Configuration Management 192Service Level Management 194Availability Management 195Capacity Management 196Support Digital Forensics 197Forensic Data Collection Methodologies 197Evidence Management 200Collect, Acquire, and Preserve Digital Evidence 201Manage Communication with Relevant Parties 204Vendors 205Customers 206Shared Responsibility Model 206Partners 208Regulators 208Other Stakeholders 209Manage Security Operations 210Security Operations Center 210Monitoring of Security Controls 215Log Capture and Analysis 217Incident Management 220Summary 226Domain 6: Legal, Risk, and Compliance 227Articulating Legal Requirements and Unique Risks Within the Cloud Environment 227Conflicting International Legislation 228Evaluation of Legal Risks Specific to Cloud Computing 229Legal Frameworks and Guidelines That Affect Cloud Computing 229Forensics and eDiscovery in the Cloud 236Understanding Privacy Issues 238Difference between Contractual and Regulated Private Data 239Country-Specific Legislation Related to Private Data 242Jurisdictional Differences in Data Privacy 247Standard Privacy Requirements 248Understanding Audit Process, Methodologies, and Required Adaptations for a Cloud Environment 250Internal and External Audit Controls 251Impact of Audit Requirements 251Identity Assurance Challenges of Virtualization and Cloud 252Types of Audit Reports 252Restrictions of Audit Scope Statements 255Gap Analysis 256Audit Planning 257Internal Information Security Management Systems 258Internal Information Security Controls System 259Policies 260Identification and Involvement of Relevant Stakeholders 262Specialized Compliance Requirements for Highly Regulated Industries 264Impact of Distributed Information Technology Models 264Understand Implications of Cloud to Enterprise Risk Management 266Assess Providers Risk Management Programs 266Differences Between Data Owner/Controller vs. Data Custodian/Processor 268Regulatory Transparency Requirements 269Risk Treatment 270Risk Frameworks 270Metrics for Risk Management 272Assessment of Risk Environment 273Understanding Outsourcing and Cloud Contract Design 276Business Requirements 277Vendor Management 278Contract Management 279Supply Chain Management 281Summary 282Index 283
... weniger
Autoren-Porträt von Leslie Fife, Aaron Kraus, Bryan Lewis
(ISC)² is an international, nonprofit membership association for information security leaders like you. (ISC)² is committed to helping their members learn, grow and thrive. More than 150,000 certified members strong, (ISC)² empowers professionals who touch every aspect of information security.
Bibliographische Angaben
- Autoren: Leslie Fife , Aaron Kraus , Bryan Lewis
- 2021, 3. Aufl., 320 Seiten, Maße: 19,1 x 24,4 cm, Gebunden, Englisch
- Verlag: Wiley & Sons
- ISBN-10: 1119603439
- ISBN-13: 9781119603436
- Erscheinungsdatum: 14.07.2021
Sprache:
Englisch
Kommentar zu "The Official (ISC)2 CCSP CBK Reference"
0 Gebrauchte Artikel zu „The Official (ISC)2 CCSP CBK Reference“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "The Official (ISC)2 CCSP CBK Reference".
Kommentar verfassen