CCSP Domain 1 - Cloud Concepts, Architecture and Design
- Description
- Curriculum
- FAQ
- Reviews
In this course we walk through all of the critical concepts within the Cloud Platform & Infrastructure domain. This domain is 17% of the test as of August 2022. I will guide you through all of the concepts that you need to know and advise you on the level of knowledge that you need to get comfortable with.
There are over four hours of video content plus course notes based on information from my book: Cloud Guardians.
We will explore the basics of Governance, Risk management and Compliance and how the cloud affects it in a business.
A solid understanding of the definition of cloud, its deployment models and service categories will be gained through these videos.
An exploration of the threats to the cloud today is in this course. Those controls need to be verified and we use common criteria or ISO 15408. It is also necessary to explore the verification of the physical security with cryptography related products such as Hardware Security Modules (HSM) and Trusted Platform Modules (TPM). That verification is done using FIPS 140-2/-3.
We finish this domain with an exploration of the technologies that are related to the cloud and benefit greatly from all of its offerings.
This domain is the cloud concepts, architecture and design.
The details that are included in (ISC)2’s exam outline of encryption and access controls are in Domain 2.
The details from their exam outline about network and virtualization security is in Domains 3 and 5.
The BCP details are in Domain 5.
I cover DevSecOps in Domain 4 – Cloud Application security
-
7Control VerificationVideo lesson
In this video we will cover:
Control Verification
ISO 15408 Evaluation Assurance Levels
Testing Cryptography Products
FIPS 140-2 Levels
In this video you will learn:
The security controls we choose should be tested and vetted. ISO 15408 Common Criteria is a standardized test methodology so that a situation such as A Cisco FW and a Checkpoint FW can be tested by two different labs in two different countries, but the test results can be compared to determine the best FW for a given use.
There are seven levels of the test. The lowest level is 1 and the highest is seven. If we are testing cryptography specific then it is a different document named FIPS 140-2 and 140-3. A standard for the quality of physical security must be within a cryptographic module within a system. There are four levels of FIPS 140-2. One is the lowest and the four is the highest.
We encourage you to learn more about Control verification by watching this complete video. See you in the Next Video.
-
8PCIVideo lesson
In this video we will cover:
A Contract Vs Law
In this video you will learn:
PCI-DSS is not a law or regulation, basically, it’s a contract. It establishes a requirement to meet the Data Security Standards developed by the Payments Cards Industry. PCI-DSS is a contractual agreement with the payment card company to be able to process card charges and it falls under civil or tort law.
We encourage you to learn more about Intro to PCI by watching this complete video. See you in the Next Video.
-
9PCI Requirement 1-3Video lesson
In this video we will cover:
PCI Requirements 1-3
In this video you will learn:
There are 12 requirements for PCI-DSS. It is highly recommended that you be familiar with the 12 requirements. You should know that building and maintaining a firewall is a part of PCI-DSS requirements, it is not necessary to remember that it is number one on the list though. The second one is: never use vendor-supplied default passwords or configurations. The third is you must protect stored cardholder data.
We encourage you to learn more about PCI Requirements 1-3 by watching this complete video. See you in the Next Video.
-
10PCI Requirements 4-6Video lesson
In this video we will cover:
PCI Requirements 4-6
In this video you will learn:
The fourth is that you must encrypt cardholder data when it is transmitted over a public network. The fifth is that you should use regularly updated antivirus protection. The sixth requirement is to develop and maintain secure systems and applications.
We encourage you to learn more about PCI Requirements 4-6 by watching this complete video. See you in the Next Video.
-
11PCI Requirements 7-12Video lesson
In this video we will cover:
PCI Requirements 7-12
In this video you will learn:
Seven - The next requirement is to restrict access to cardholder data on a need-to-know basis.
Eight - You should have a unique ID for all that have access to the cardholder data.
Nine - It is necessary to physically restrict access to cardholder data, which means the server that maintains the cardholder Information should be protected.
Ten - Track and monitor all network and cardholder data access.
Eleven - Also, you should be testing your security systems regularly.
Twelve - The last requirement is to maintain an information security policy.
We encourage you to learn more about PCI Requirements 7-12 by watching this complete video. See you in the Next Video.
-
14Introduction to encryptionVideo lesson
-
15Symmetric EncryptionVideo lesson
In this video we will cover:
Symmetric Encryption
In this video you will learn:
Symmetric cryptography is also known as a single key, session key, and shared key cryptography because it is a single key that is actually shared between transmitter and receiver. You can use it to encrypt anything, like data, voice, or video. You can also encrypt anything in folders, drives, partitions whatever you want to encrypt, symmetric is great for it. It keeps things confidential.
We encourage you to learn more about Intro to Symmetric by watching this complete video. See you in the Next Video.
-
16Asymmetric EncryptionVideo lesson
-
17Key managementVideo lesson
In this video we will cover:
Key Management Interoperability Protocol (KMIP) Specification
Key Management
Remote- Key Management
Client-Side Key Management
In this video you will learn:
Key Management Interoperability Protocol (KMIP) is a communication protocol for the maintenance of keys. It is a single consistent protocol that consists of objects, operations, and attributes.
There are two specific terms in key management, the first is internally managed and the second is externally managed. If the keys are stored in VM then they are internally managed and If not then they are externally managed. In externally managed keys are stored separately from the encryption engine.
Two more very specific terms are remote-key management and client-side key management. In both scenarios, the data is stored in the cloud and the customer has the key. The question to answer is where is the processing done?
In remote-key management, the key is on-premises with the customer, and data encryption/decryption processing is done with the cloud provider. The key is sent to the cloud for processing.
In client-side key management, the key is on-premises with the customer, and data encryption/decryption processing is done on the customer side. Data is sent to the customer for processing.
We encourage you to learn more about Key management by watching this complete video. See you in the Next Video.
-
18Basic IAAA IntroVideo lesson
In this video we will cover:
Identity And Access Management
Identification and Authentication
In this video you will learn:
We will cover the basics of Identity and Access Management (IAM). With that, we have Identification, Authentication, Authorization, and Accountability (IAAA).
Identification- Statement of who you say you are.
Authentication- Verification of claimed identity.
Authorization- Permissions granted or not.
Accountability- Log created so that someone can be held accountable for their actions.
In authentication, there are three factors.Factor 1 is something you know, e.g., passwords.
Factor 2 is something we have, such as soft or hard tokens.
Factor 3 is something you are. A biometric which would be behavioral or physiological, such as a fingerprint or a vocal print.
We encourage you to learn more about Basic IAAA Introduction by watching this complete video. See you in the Next Video.
-
19Authorization and RBACVideo lesson
-
20Single Sing-On (SSO)Video lesson
In this video we will cover:
Single Sign-On
In this video you will learn:
The next important topic to discuss is you try to add Single Sign-On (SSO) to make things easier for users. Sometimes it makes things easier for bad guys as well. The number of accounts, passwords, tokens and other access mechanisms that we have to try and manage in business today is many per user.
Personally, you can think about your bank account, Amazon account, and many other places to log on that you have a user ID and password. It is a lot to manage.
Most people use a single account to log In, for e.g people use Facebook to log in at different places so they don't have to set up more identification and password combinations again and again.We encourage you to learn more about Single Sign-On by watching this complete video. See you in the Next Video.
-
21Network Security Group (NSG)Video lesson
In this video we will cover:
Network Security Group
Storage Area Network (SAN)
Fibre Channel
World Wide Name (WWN)
iSCSI
In this video you will learn:
Security Groups (SG) or Network Security Groups (NSG) is a virtual LAN protected by a Firewall. Microsoft is using NSGs to secure traffic flow within. It is a little bit of Firewall Logic and a little bit of VLAN Logic combined together.
The more data we have, the more we need a SAN. You can think of a SAN as many massive drives attached to a LAN that is dedicated to this purpose. Storage Area Network we have two protocols, Fibre Channel and iSCSI.
Fibre Channel uses a different addressing scheme of LUNs (Logical Unit Number). If necessary Fibre Channel can be run across Ethernet. SCSI (Small Computer System Interface) protocol runs over TCP/IP. SCSI is a protocol developed by ANSI for attaching something like a printer directly to a computer.We encourage you to learn more about the NSG and SAN by watching this complete video. See you in the Next Video.
-
22Egregious 11 Numbers 1-5Video lesson
In this video we will cover:
Cloud Infrastructure Risks
Egregious 11
In this video you will learn:
There are so many Cloud Issues, there are two documents from Cloud Security Alliance and Egregious is one of them. It is not in the 2022 exam outline, but it is still good to look at. These are significant problems with the cloud today. It is worth your time to look into these and be familiar with them regardless of whether (ISC)2 mentions this document name.
Misconfiguration and Inadequate Change Control is a huge problems today. Moving to the cloud usually means that there will be more virtual machines than you had in the physical environment. Configuration issues are rising to the top of the problems that we are seeing. For example, the AWS S3 has a default configuration that does not include encryption of the stored data.
When you don't carefully control the configurations that you have of the servers that are in the cloud-like routers, switches, and everything that is virtualized it’s gonna be a problem. It leads us to the third risk which is the Lack of Cloud Security Architecture and Strategy.
We encourage you to learn more about Egregious 11 by watching this complete video. See you in the Next Video. -
23Egregious 11 Numbers 6-11Video lesson
In this video we will cover:
Egregious 11 6-11
In this video you will learn:
The egregious 11 continues with some threats that have neither changed nor improved. Insider threats and insecure APIs. It is a good idea to be familiar with APIs, but we will address that later.
There are some new threats that have been added (since the Treacherous 12) and they are weak control plane, metastructure, and aplistructure failures as well as limited cloud visibility. The CSA uses the term ‘control plane’ to refer to what is often referred to as the ‘management plane’. You must protect this connection. It is how you, or a hacker, can control your cloud. Again think multi-factor authentication.
We encourage you to learn about Egregious 11 by watching this complete video. See you in the Next Video.
External Links May Contain Affiliate Links read more