Introduction
Introduction to CCSP
()
1. Cloud Concepts, Architecture, and Design
Domain 1 overview
()
Cloud computing definitions, roles, and responsibilities
()
Key cloud computing characteristics
()
Building block technologies
()
Cloud activities, service capabilities and categories, and deployment models
()
Cloud shared considerations
()
Impact of related technologies
()
Cryptography and key management
()
Identity and access control
()
Data and media sanitization
()
Network security
()
Virtualization security
()
Common threats
()
Security hygiene
()
Cloud secure data lifecycle
()
Business continuity and disaster recovery in the cloud
()
Business impact analysis and functional security requirements
()
Service model security considerations and cloud design patterns
()
DevOps security
()
Verifications and certifications using common standards
()
2. Cloud Data Security
Domain 2 overview
()
Cloud data life cycle, data dispersion, and data flows
()
Storage types
()
Storage threats
()
Encryption and key management
()
Hashing, data obfuscation, and tokenization
()
Data loss prevention, keys, secrets, and certificates
()
Different structures of data and data location
()
Data classification policies
()
Data mapping and labeling
()
Information rights management
()
Data retention policies
()
Data deletion, archiving, and legal hold
()
Enable data audit, trace, and accountability
()
3. Cloud Platform and Infrastructure Security
Domain 3 overview
()
Physical environment
()
Network communications and computing
()
Virtualization
()
Storage
()
Management plane
()
Design a secure data center
()
Risk analysis
()
Cloud vulnerabilities, threats, attacks, and risk mitigation
()
Physical and environmental protection
()
System, storage, and communication protection
()
Identification, authentication, and authorization in the cloud
()
Audit mechanisms
()
Business continuity (BC) and disaster recovery (DR) strategies
()
Business requirements
()
BC and DR planning and testing
()
4. Cloud Application Security
Domain 4 overview
()
Cloud development basics, common pitfalls, and vulnerabilities
()
Secure software development
()
Business requirements, phases, and methodologies
()
Cloud specific risks
()
Threat modeling
()
Layered security, secure coding, and configuration
()
Cloud software assurance and validation
()
Application testing
()
Securing APIs and supply chains
()
Validating and managing third-party and open-source software
()
Supplemental security components
()
Cryptography, sandboxing, virtualization, and orchestration
()
Federated identity, identity providers (IdP), and SSO
()
MFA, cloud access security brokers, and secrets management
()
5. Cloud Security Operations
Domain 5 overview
()
Hardware security
()
Virtualization management, security, and tool sets
()
Remote access
()
Secure network configurations and controls
()
Operating system hardening and configuration
()
Availability of hosts and guest operating systems
()
Performance, capacity, and hardware monitoring
()
Infrastructure as code and the management plane
()
Program management, part 1
()
Program management, part 2
()
Program management, part 3
()
Program management, part 4
()
Forensics, evidence collection, and preservation
()
Communication and cloud stakeholders
()
Security operations and intelligent monitoring
()
Logging, incident management, and vulnerability assessments
()
6. Legal, Risk, and Compliance
Domain 6 overview
()
Cloud legal requirements
()
Legal frameworks and forensics
()
Privacy in the cloud, part 1
()
Privacy in the cloud, part 2
()
Cloud auditing
()
Audit analysis
()
Distributed infrastructure and compliance
()
Enterprise risk management, part 1
()
Enterprise risk management, part 2
()
Outsourcing and cloud contracts
()