Atjaunināt sīkdatņu piekrišanu

CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide [Mīkstie vāki]

4.36/5 (29 ratings by Goodreads)
  • Formāts: Paperback / softback, 368 pages, weight: 533 g, 100 Illustrations
  • Izdošanas datums: 22-Jul-2020
  • Izdevniecība: McGraw-Hill Education
  • ISBN-10: 1260460088
  • ISBN-13: 9781260460087
  • Mīkstie vāki
  • Cena: 53,41 €
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 368 pages, weight: 533 g, 100 Illustrations
  • Izdošanas datums: 22-Jul-2020
  • Izdevniecība: McGraw-Hill Education
  • ISBN-10: 1260460088
  • ISBN-13: 9781260460087

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.


This effective study guide provides 100% coverage of every topic on the challenging CCSK exam from the Cloud Security Alliance

This integrated self-study system enables you to take the current edition of the Cloud Security Alliance’s Certificate of Cloud Security Knowledge (CCSK) exam with confidence. Written by CSA-authorized trainer Graham Thompson in collaboration with the Cloud Security Alliance, the book offers exam-focused coverage of the latest cloud technologies, including virtualization, governance, and security. Beyond exam preparation, the book also serves as a valuable on-the-job reference.

To aid in learning, CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide features exam tips that highlight key information, chapter summaries that serves as quick reviews of salient points, and practice questions that allow readers to test their comprehension. All questions closely match those on the live test in tone, format, and content. “Notes,” “Tips,” and “Cautions” throughout provide real-world insight and call out potentially harmful situations.

•  Features real-world examples, case studies, and best practices drawn from author’s experience
•  Online content includes access to 200 additional practice questions in the TotalTester online exam engine
•  Includes 10% discount voucher coupon for the CCSK exam, a $39 value

Foreword xix
Acknowledgments xxi
Introduction xxiii
Chapter 1 Cloud Computing Concepts and Architectures 1(28)
Cloud Logical Model
4(2)
Infrastructure
4(1)
Metastructure
4(2)
Infostructure
6(1)
Applistructure
6(1)
Cloud Computing Definitions
6(10)
Essential Characteristics
7(2)
Cloud Service Models
9(5)
Cloud Deployment Models
14(2)
Cloud Security Scope and the Shared Responsibility Model
16(3)
Shared Responsibility Model
16(3)
Cloud Security Alliance Tools
19(5)
Cloud Controls Matrix
19(1)
Consensus Assessments Initiative Questionnaire
20(1)
STAR Registry
21(1)
Cloud Reference and Architecture Models
22(2)
Chapter Review
24(5)
Questions
25(2)
Answers
27(2)
Chapter 2 Governance and Enterprise Risk Management 29(20)
Governance
30(7)
Governance Backgrounder
30(2)
Cloud Governance
32(5)
Risk Management
37(2)
Risk Management Backgrounder
37(2)
Cloud Risk Management
39(5)
The Effects of Service and Deployment Models
39(3)
Cloud Risk Management Trade-Offs
42(1)
Assessing Cloud Service Providers
43(1)
Chapter Review
44(5)
Questions
45(2)
Answers
47(2)
Chapter 3 Legal Issues, Contracts, and Electronic Discovery 49(26)
Legal Frameworks Governing Data Protection and Privacy
50(4)
Required Security Measures
52(1)
Treaties
53(1)
Restrictions to Cross-Border Data Transfers
53(1)
CLOUD Act
53(1)
Regional Examples
54(8)
Asia Pacific Region
54(2)
European Union and European Economic Area
56(4)
The Americas
60(2)
Contracts and Provider Selection
62(4)
Internal Due Diligence
63(1)
Monitoring, Testing, and Updating
64(1)
External Due Diligence
64(1)
Contract Negotiations
65(1)
Third-Party Audits and Attestations
65(1)
Electronic Discovery
66(4)
Possession, Custody, and Control
66(1)
Relevant Cloud Applications and Environment
67(1)
Searchability and E-Discovery Tools
67(1)
Preservation
67(1)
Data Retention Laws and Recordkeeping Obligations
67(1)
Data Collection
68(1)
Forensics
68(1)
Reasonable Integrity
69(1)
Direct Access
69(1)
Native Production
69(1)
Authentication
69(1)
Cooperation Between Provider and Client in E-Discovery
69(1)
Response to a Subpoena or Search Warrant
70(1)
Chapter Review
70(5)
Questions
71(2)
Answers
73(2)
Chapter 4 Compliance and Audit Management 75(20)
Compliance Backgrounder
77(1)
Impact of the Cloud on Contracts
78(1)
How the Cloud Changes Compliance
79(3)
Compliance Inheritance
79(1)
Continuous Compliance
80(2)
Audit Backgrounder
82(1)
Audit Management in the Cloud
83(1)
SOC Reports and ISO Certifications Backgrounder
84(4)
SOC Backgrounder
84(2)
ISO Backgrounder
86(2)
How the Cloud Changes Audits
88(2)
Right to Audit
89(1)
Audit Scope
89(1)
Auditor Requirements
90(1)
Chapter Review
90(5)
Questions
91(2)
Answers
93(2)
Chapter 5 Information Governance 95(18)
Cloud Information Governance Domains
96(9)
Information Classification Backgrounder
97(4)
Information Management Backgrounder
101(4)
The Data Security Lifecycle
105(4)
Locations and Entitlements
106(1)
Functions, Actors, and Controls
107(2)
Chapter Review
109(4)
Questions
109(2)
Answers
111(2)
Chapter 6 Management Plane and Business Continuity 113(20)
Management Plane
114(8)
Application Programming Interface Backgrounder
115(3)
Accessing the Management Plane
118(1)
Securing the Management Plane
119(3)
Business Continuity and Disaster Recovery in the Cloud
122(7)
BCP/DR Backgrounder
123(2)
Architecting for Failure
125(1)
Business Continuity Within the Cloud Provider
126(1)
Chaos Engineering
127(1)
Business Continuity for Loss of the Cloud Provider
128(1)
Continuity for Private Cloud and Providers
128(1)
Chapter Review
129(4)
Questions
129(2)
Answers
131(2)
Chapter 7 Infrastructure Security 133(28)
Cloud Network Virtualization
134(8)
OSI Reference Model Backgrounder
135(1)
VLANs
136(1)
VXLAN
137(2)
Networking Planes Backgrounder
139(1)
Software Defined Networking
139(2)
Network Functions Virtualization
141(1)
How Security Changes with Cloud Networking
142(5)
Challenges of Virtual Appliances
142(1)
Benefits of SDN Security
143(1)
Microsegmentation and the Software Defined Perimeter
144(2)
Additional Considerations for CSPs or Private Clouds
146(1)
Hybrid Cloud Considerations
146(1)
Cloud Compute and Workload Security
147(8)
Compute Abstraction Technologies
147(3)
How the Cloud Changes Workload Security
150(1)
Immutable Workloads Enable Security
150(3)
The Impact of the Cloud on Standard
Workload Security Controls
153(1)
Changes to Workload Security Monitoring and Logging
153(1)
Changes to Vulnerability Assessment
154(1)
Chapter Review
155(6)
Questions
156(2)
Answers
158(3)
Chapter 8 Virtualization and Containers 161(18)
Major Virtualization Categories Relevant to Cloud Computing
162(8)
Compute Virtualization
162(3)
Network Virtualization
165(2)
Storage Virtualization
167(3)
Containers
170(3)
Container Definitions Backgrounder
172(1)
Container Security Recommendations
172(1)
Chapter Review
173(6)
Questions
174(2)
Answers
176(3)
Chapter 9 Incident Response 179(16)
Incident Response Lifecycle
180(4)
Incident and Event Backgrounder
180(1)
Preparation Phase
181(1)
Detection and Analysis Phase
182(1)
Containment, Eradication, and Recovery Phase
183(1)
Post-Incident Activity Phase
183(1)
How the Cloud Impacts Incident Response
184(7)
Preparation
184(4)
Detection and Analysis
188(2)
Containment, Eradication, and Recovery
190(1)
Post-Incident Activity
190(1)
Chapter Review
191(4)
Questions
192(1)
Answers
193(2)
Chapter 10 Application Security 195(20)
The SSDLC and Cloud Computing
196(1)
Secure Design and Development
197(4)
Training
197(1)
Define
198(1)
Design
198(2)
Develop
200(1)
Test
201(1)
Secure Deployment
201(3)
Cloud Impacts on Vulnerability Assessments
202(1)
Cloud Impact on Penetration Testing
202(1)
Deployment Pipeline Security
202(1)
Impact of IaC and Immutable Workloads
203(1)
Secure Operations
204(1)
How the Cloud Impacts Application Design and Architectures
205(2)
Microservices Backgrounder
206(1)
The Rise and Role of DevOps
207(2)
DevOps Backgrounder
207(1)
Security Implications and Advantages of DevOps
208(1)
Chapter Review
209(6)
Questions
210(2)
Answers
212(3)
Chapter 11 Data Security and Encryption 215(20)
Data Security Controls
216(1)
Cloud Data Storage Types
216(1)
Managing Data Migrations to the Cloud
217(3)
CASB Backgrounder
218(1)
Securing Cloud Data Transfers
219(1)
Securing Data in the Cloud
220(6)
Cloud Data Access Controls
220(1)
Storage (at Rest) Encryption and Tokenization
221(4)
Key Management (Including Customer-Managed Keys)
225(1)
Data Security Architecture
226(1)
Monitoring, Auditing, and Alerting
227(1)
Additional Data Security Controls
227(2)
Cloud Platform/Provider-Specific Controls
227(1)
Data Loss Prevention
228(1)
Enterprise Rights Management
228(1)
Data Masking and Test Data Generation
229(1)
Enforcing Lifecycle Management Security
229(1)
Chapter Review
230(5)
Questions
231(2)
Answers
233(2)
Chapter 12 Identity, Entitlement, and Access Management 235(22)
How IAM Works in the Cloud
236(1)
IAM Terms
237(1)
IAM Standards
238(9)
Federation Backgrounder
241(6)
Managing Users and Identities for Cloud Computing
247(4)
Authentication and Credentials
251(1)
Entitlements and Access Management
252(1)
Privileged User Management
252(1)
Chapter Review
252(5)
Questions
253(2)
Answers
255(2)
Chapter 13 Security as a Service 257(10)
Potential Benefits and Concerns of SecaaS
258(1)
Major Categories of SaaS Offerings
259(5)
Identity, Entitlement, and Access Management Services
259(1)
Cloud Access Security Broker
260(1)
Web Security Gateway
260(1)
E-mail Security
261(1)
Security Assessment
261(1)
Web Application Firewall
262(1)
Intrusion Detection/Prevention
262(1)
Security Information and Event Management (SIEM)
262(1)
Encryption and Key Management
263(1)
Business Continuity and Disaster Recovery
263(1)
Security Management
263(1)
Distributed Denial of Service Protection
263(1)
Chapter Review
264(3)
Questions
264(2)
Answers
266(1)
Chapter 14 Related Technologies 267(16)
Big Data
267(6)
Distributed Data Collection Backgrounder
269(1)
Hadoop Backgrounder
269(2)
Security and Privacy Considerations
271(1)
Data Collection
271(1)
Key Management
272(1)
Security Capabilities
272(1)
Identity and Access Management
272(1)
PaaS
272(1)
Internet of Things (IoT)
273(1)
Mobile Computing
274(1)
Serverless Computing
274(2)
Chapter Review
276(7)
Questions
278(2)
Answers
280(3)
Chapter 15 ENISA Cloud Computing: Benefits, Risks, and Recommendations for Information Security 283(20)
Security Benefits of Cloud
284(2)
Security and the Benefits of Scale
284(1)
Security as a Market Differentiator
285(1)
Standardized Interfaces for Managed Security Services
285(1)
Rapid, Smart Scaling of Resources
285(1)
Audit and Evidence Gathering
285(1)
Timely, Effective, and Efficient Updates and Defaults
285(1)
Audit and SLAB Force Better Risk Management
286(1)
Benefits of Resource Concentration
286(1)
Top Security Risks
286(4)
IT Risk Backgrounder
286(1)
Loss of Governance
287(1)
Lock-in
287(2)
Isolation Failure
289(1)
Compliance Risks
289(1)
Management Interface Compromise
289(1)
Data Protection
289(1)
Insecure or Incomplete Data Deletion
289(1)
Malicious Insider
290(1)
Five Key Legal Issues Common Across All Scenarios
290(1)
Data Protection
290(1)
Confidentiality
291(1)
Intellectual Property
291(1)
Professional Negligence
291(1)
Outsourcing Service and Changes in Control
291(1)
Additional Items for the Exam
291(4)
Open Virtualization Format
292(1)
VM Hopping
292(1)
Economic Denial of Service
292(1)
Licensing Risks
292(1)
Risk Concerns of a Cloud Provider Being Acquired
292(1)
Data Controller vs. Data Processor Definitions
293(1)
Guest System Monitoring in IaaS Responsibilities
293(1)
User Provisioning Vulnerability
293(1)
Underlying Vulnerability in Loss of Governance
294(1)
Risks R.1-R.35 and Underlying Vulnerabilities
295(4)
Chapter Review
299(4)
Questions
299(2)
Answers
301(2)
Appendix A Cloud Computing Security Policy Examples 303(4)
Cloud Security Policy: Centralized Example
303(2)
Purpose
303(1)
Scope
304(1)
Background
304(1)
Policy
304(1)
Cloud Security Policy: Classification Example
305(2)
Purpose
305(1)
Scope
305(1)
Background
305(1)
Policy
305(2)
Appendix B About the Online Content 307(4)
System Requirements
307(1)
Your Total Seminars Training Hub Account
307(1)
Privacy Notice
307(1)
Single User License Terms and Conditions
307(2)
TotalTester Online
309(1)
Technical Support
309(2)
Glossary 311(12)
Index 323
Graham Thompson, CCSK, CCSP, CISSP, is a cloud security trainer and consultant with over 20 years of IT security experience in large enterprises. He works with large enterprises and government agencies implementing and assessing security controls in cloud environments.