Agenda
- Section 1: Cloud Computing Terminology
- Key Cloud Computing Terminology
- Terminology Mapped to the Cloud
- Other Terms
- Section 2: Cloud Computing Definition
- Cloud Computing Defined
- NIST Five Essential Characteristics
- NIST Three Service Models
- SaaS Pros and Cons
- PaaS Pros and Cons
- IaaS Pros and Cons
- NIST Four Deployment Models
- Cloud Computing Characteristics
- Section 3: Cloud Computing Benefits
- Why move to the Cloud?
- Cost Benefit Analysis
- ROI Calculation
- TCO Calculation
- Ease of Deployment – Security Risks
- Introductory Security Risks and Benefits
- Section 4: Cloud Computing Reference Model
- Cloud Computing Architecture
- Potential Pitfalls and Confusion
- Cloud Computing Deployment Models
- Jericho Cloud Cube Model
- Example of Service Model Mapped to Controls
- Section 5: What is Security for the Cloud
- The Security Impact of Cloud Architecture
- Where is the security added?
- Cloud Technology Road Map
- NIST Cloud Technology Road Map
- Cloud Cross
- Cutting Aspects
- Architecture Overview
- Business Security Architecture
- Jericho Key Principles (11 Commandments)
- ENISA
- Questions
- Section 1: Cloud Migration Security Evaluation
- Challenges in Decision Making Process of Moving to the Cloud
- Quick Method for Evaluation
- Evaluate the Asset
- Map the Asset to Cloud
- Finalizing the Decision
- Section 2: ENISA Risk Evaluation
- ENISA – Cloud Computing Security Risk Assessment
- ENISA– Top Security Benefits
- Probability vs. Impact of Identified Risks
- ENISA– Top Security Risks
- Top Risks No. 1
- Top Risks No. 2
- Top Risks No. 3
- Top Risks No. 9
- Top Risks No. 10
- Top Risks No. 21
- Top Risks No. 22
- Top Risks No. 23
- Top Risks No. 26
- Assets
- Section 3: Cloud Controls Matrix
- Cloud Controls Matrix (CCM)
- The Control Domains
- Example
- Example Continued
- Section 4: Relevant CCM Controls
- TVM 01 AntiVirus / Malicious Software
- TVM 02 Vulnerability and Patch Management
- TVM 03 Mobile Code
- Questions
- Section 1: Application of Governance and Risk Management to the Cloud
- Corporate Governance
- Customer Expectations
- Four Areas Impacted
- Tools of the Trade
- Who is responsible? Not Accountable!
- Cloud Computing Governance Resources
- Information/Data Governance Types
- Enterprise Risk Management
- Risk Response in the Cloud
- Where do we start?
- Must do items
- Section 2: Importance of the SLA
- Contracts/SLAs
- Contracts/SLAs: Change Your Thinking
- Important SLA Components
- Metrics for Risk Management/Service Level Agreement (SLA)
- Section 3: CCM Relevant Controls
- GRM-01 – Baseline Requirements
- GRM-02 – Data Focus Risk Assessments
- GRM-03 – Management Oversight
- GRM-04 – Management Program
- GRM-05 – Management Support/Involvement
- GRM-06 – Policy
- GRM-07 – Policy Enforcement
- GRM-08 – Policy Impact on Risk Assessments
- GRM-09 – Policy Reviews
- GRM-10 – Risk Assessments
- GRM-11 – Risk
- Management Framework
- Questions
- Section 1: Understanding Unique Risks in the Cloud
- Understand Legal Requirements & Unique Risks Within the Cloud Environment
- Section 2: International Legislation and Potential Conflicts
- International Legislation Conflicts
- GDPR
- Appraisal of Legal Risks Specific to Cloud Computing
- Legal Controls
- Section 3: eDiscovery
- eDiscovery
- Special Issues
- Forensics Requirements
- Section 4: Contract Considerations
- Contract Considerations
- Contractual & Regulated PII: The Differences
- Contractual & Regulated PII: The Similarities
- Country-specific Legislation Related to PII/Data Privacy/Data Protection
- Section 5: Relevant CCM Controls
- SEF-01 – Contract / Authority Maintenance
- Questions
- Section 1: Virtualization Principles
- Virtualization Definition
- How Does Virtualization Work?
- What is a Virtual Machine (VM)?
- What is a Hypervisor?
- Type 1 and Type 2 Hypervisors
- Virtualization Layer
- CPU Hardware Virtualization
- Section 2: Key Components Mapped to Cloud Layer
- vSphere 6.x Virtual Switches
- VMware vSwitch Terminology
- Storage Terminology
- Overview of Virtual Appliances
- Clones and Templates
- Customization Specifications Manager
- vSphere Content Libraries
- VM Snapshots
- vMotion – Hot Migration
- Storage vMotion
- Distributed Resource Scheduler Overview
- Distributed Power Management (DPM)
- VM Swapfile Location
- Host Profiles Overview
- Storage DRS (SDRS) Overview
- Profile Driven Storage Overview
- VSAN Architecture
- Resource Pools Overview
- High Availability Overview
- Fault Tolerance
- Section 3: Key Security Concerns
- Virtualization Risks and Challenges
- Network Security and Perimeter
- Virtualization Security
- Common Architecture Concerns
- vSphere Hardening Guide
- Section 4: Other Technologies Used in the Cloud
- Network Security
- Network and Communications in the Cloud
- Cloud Networking VXLAN
- Section 5: The Layers
- Logical Design Considerations
- Physical Virtual and vCloud Layers
- Software Defined Data Center (SDDC) Components
- SDDC– Physical Configuration
- SDDC– vCenter Cluster Layout
- SDDC– The Big Ugly Picture
- SDDC– The Big Ugly Picture but not as bad!
- Section 6: Relevant CCM Controls
- IVS-01 Audit Logging / Intrusion Detection
- IVS-02 Change Detection
- IVS-03 Clock Synchronization
- IVS-04 Information System Documentation
- IVS-05 Vulnerability Management
- IVS-06 Network Security
- IVS-07 OS Hardening and Base Controls
- IVS-08 Production / Non Production Environments
- IVS-09 Segmentation
- IVS-10 VM Security Data Protection
- IVS-11 Hypervisor Hardening
- IVS-12 Wireless Security
- IVS-13 Network Architecture
- Questions
- Section 1: Cloud/Data Life Cycle
- Data Security Lifecycle
- Locations and Access
- Functions Actors and Controls
- Section 2: Data Security Architectures and Strategies
- Pillars of Functionality
- Storage Types IaaS
- Storage Types PaaS
- Storage Types SaaS
- Top Threats to Storage
- Technologies available to address the threats
- Data Dispersion
- Data Loss Prevention (DLP)
- Encryption
- Encryption Challenges
- Encryption Architecture
- IaaS Data Encryption
- Database Encryption
- Encryption Review
- Key Management
- Key Management Considerations
- Storing keys in the cloud
- Data Masking/Obfuscation
- Data Anonymization
- Tokenization
- Data Security Strategies
- Emerging Technologies
- Section 3: Data Discovery and Classification
- Data Discovery
- Data Classification
- Data Classification Categories
- Cloud Data Challenges
- Section 4: Jurisdictional Data Protection for Personally Identifiable Information (PII)
- Terms
- Implementation of Data Discovery
- Main Input Entities
- Privacy Level Agreement
- Controls for PII
- Typical Security Measures
- Section 5: Data/Information Rights Management
- Data Rights Management
- Information Rights Management
- IRM Cloud Difficulties
- IRM Solutions
- Section 6: Data Retention Deletion and Archival Policies
- Data Protection Policies
- Data Retention Policies
- Data Deletion
- Data Archiving
- Section 7: Accountability of Data Events
- SaaS Potential Event Sources
- PaaS Potential Event Sources
- IaaS Potential Event Sources
- Data Event Logging and Event Attributes
- What to do with data events?
- Security Information and Event Management
- Supporting Continuous Operations
- Section 8: Relevant CCM Controls
- DSI-01 Management Classification
- DSI-02 Data Inventory Flows
- DSI-03 eCommerce Transactions
- DSI-04 Handling / Labeling / Security Policy
- DSI-05 Non Production Data
- DSI-06 Ownership / Stewardship
- DSI-07 Secure Disposal Questions
- Section 1: The Logical Infastructure
- Logical Infastructure Design Notes
- Secure Configuration of Hardware Requirements
- Secure Network Configuration
- Hardening OS and Apps
- Availability of Guest OS
- Managing the Logical Infrastructure
- IT Service Management (ITSM)
- Information Security Management
- Configuration Management Process
- Configuration Change and Availability Management
- Shadow IT
- Change Management Objectives
- Change Management Policies and Procedures
- Problem Management
- Release and Deployment Management Objectives
- Release and Deployment Management
- Service Level Management
- Other Management areas
- Section 2: Manage Communications with all Parties 5 Ws and the H
- Vendors
- Customers
- Partners
- Section 3: Relevant CCM Controls
- CCC-01 New Development / Acquisition
- CCC-02 Outsourced Development
- CCC-03 Quality Testing
- CCC-04 Unauthorized Software Installations
- CCC-05 Production Changes
- HRS-01 Asset Returns
- HRS-02 Background Screening
- HRS-03 Employment Agreements
- HRS-04 Employment Terminations
- HRS-05 Mobile Device Management
- HRS-06 Non Disclosure Agreements
- HRS-07 Roles / Responsibilities
- HRS-08 Technology Acceptable Use
- HRS-09 Training Awareness
- HRS-10 User Responsibility
- HRS-11 Workspace
- STA-01 Data Quality and Integrity
- STA-02 Incident Reporting
- STA-03 Network / Infrastructure Services
- STA-04 Provider Internal Assessments
- STA-05 Supply Chain Agreements
- STA-06 Supply Chain Governance Reviews
- STA-07 Supply Chain Metrics
- STA-08 Third Party Assessment
- STA-09 Third Party Audits
- Questions
- Section 1: Interoperability
- Interoperability
- Reason a change may happen
- Why is this important
- Example
- Recommendations
- Section 2: Portability
- Portability
- Interoperability and Portability Helps to Mitigate
- Golden Rule
- Basic Recommendations
- IaaS Recommendations
- PaaS Recommendations
- SaaS Recommendations
- Private Cloud Recommendations
- Public Cloud Recommendations
- Hybrid Cloud Recommendations
- Section 3: Relevant CCM Controls
- IPY-01 API’s
- IPY-02 Data Request
- IPY-03 Policy and Legal
- IPY-04 Standardized Network Protocols
- IPY-05 Virtualization
- Questions
- Section 1: The Physical Environment
- Physical Environment
- Physically. What does one of these beasts look like?
- Major Factors in building a great datacenter
- Google’s Top 10
- Datacenter Design
- Network and Communications in the Cloud
- Compute
- Storage
- Physical and Environmental Controls
- Protecting Datacenter Facilities
- System and Communication Protections
- Section 2: Planning Process for the Data Center Design
- Support the Planning
- Physical Design Considerations
- DC Design Standards
- Tier Standard Review
- Tiered Model Summary
- Environmental Design
- Design Considerations
- MultiVendor Pathway Connectivity (MVPC)
- Section 3: Implement and Build Physical Infrastructure
- Enterprise Operations
- Security Requirements for Hardware
- Oversubscription
- iSCSI Implementation Considerations
- Section 4: Typical Security for the Datacenter Components
- Access Controls
- Access Control (KVM)
- Access Controls Securing Network Configurations
- OS Hardening
- Everything about the OS
- Standalone Host Availability Considerations
- Availability of Clustered Hosts
- Clustered Storage Architectures
- Performance Monitoring
- Redundant System Architecture
- Backup and Restore of Hosts?
- Log Management Recommendations
- Log Management
- Management Planning Includes
- Business Continuity & Disaster Recovery
- Business Continuity Elements
- Section 5: Relevant CCM Controls
- DCS-01 Asset Management
- DCS-02 Controlled Access Points
- DCS-03 Equipment Identification
- DCS-04 Off Site Authorization
- DCS-05 Off Site Equipment
- DCS-06 Policy
- DCS-07 Secure Area Authorization
- DCS-08 Unauthorized Persons Entry
- DCS-09 User Access
- Questions
- Section 1: Disaster Recovery and Business Continuity Management
- The Business Continuity Management Concept
- BCM Lifecycle
- Business Continuity Disaster Recovery
- BCDR Relevant Cloud Characteristics
- Business Impact Analysis
- BCDR Requirements
- BCDR Risks Requiring Protection
- BCDR Strategy Risks
- BCDR Strategies
- Creating the BCDR Plan
- Planning Testing and Review
- Section 2: Examples
- Virtualization Pass Through
- Backup and DR Software
- Section 3: Relevant CCM Controls
- BCR-01 Business Continuity Planning
- BCR-02 Business Continuity Testing
- BCR-03 Datacenter / Utilities Environmental Conditions
- BCR-04 Operational Resilience Documentation
- BCR-05 Environmental Risks
- BCR-06 Equipment Location
- BCR-07 Equipment Maintenance
- BCR-08 Equipment Power Failures
- BCR-09 Impact Analysis
- BCR-10 Policy
- BCR-11 Retention Policy
- Questions
- Section 1: Incident Management
- Incident Management
- Incident Management Plan
- Incident Classification
- Security Events
- Logs
- Alerts
- What is an Incident?
- Security Incident
- Indication of Compromise
- What is Incident Handling?
- Difference between IH and IR
- Common Tools
- IPS vs WAF
- SOC
- Six Step Approach to Incident Handling
- Section 2: Forensics
- Cloud Forensics Challenges
- Methodology for Forensics
- Access to Data by Service Model
- Forensic Readiness Considerations
- Items to consider when collecting evidence
- Section 3: Relevant CCM Controls
- SEF-01 Contract / Authority Maintenance
- SEF-02 Incident Management
- SEF-03 Incident Reporting
- SEF-04 Legal Preparation
- SEF-05 Incident Response Metrics
- Questions
- Section 1: Components affecting Security
- Web Application Security
- Application Basics
- Application Programming Interface (API)
- WS Features Web Services
- Common Pitfalls
- Encryption Dependencies
- Section 2: Software Development Life Cycle (SDLC)
- Software Development Lifecycle (SDLC)
- Secure Software Development Lifecycle S-SDLC
- Software Development Lifecycle
- Project Initiation
- Requirements Phase
- Secure Design
- Development
- Unit Testing
- Testing
- Production Implementation
- Summary
- Section 3: Vulnerabilities
- OWASP Top 10
- A1 – Injection
- A2 – Broken Authentication
- A3 – Sensitive Data Exposure Threats and Risks
- A4 – XML External Entities (XXE)
- A5 – Broken Access Control
- A6 – Security Misconfiguration
- A7 – Cross-Site Scripting
- A8 – Insecure Deserialization
- A9 – Using Components with Known Vulnerabilities
- A10 – Insufficient Logging and Monitoring
- Cloud Specific Risks
- STRIDE Threat Model
- Recommendations
- Section 4: Identity and Access Management (IAM)
- Identity and Access Management
- Federated Identity Management
- Security Assertion Markup Language 2.0 (SAML 2.0)
- SAML Assertion
- SAML Assertion Child Elements
- SAML Protocols
- SAML Bindings
- Open ID Connect (OIDC)
- OIDC Flows
- OIDC Flow Comparison
- JSON Web Tokens Best Practices
- Which Federated Identity System to use?
- Multi-Factor Authentication
- Identities and Attributes
- Examples
- Identity Management
- Section 5: Software Assurance and Validation
- Assurance
- Handling of Data
- ISO/IEC 27034-1
- Organization Normative Framework (ONF)
- Frameworks Verification and Validation
- Application Security Testing
- Questions
- Section 1: Review from other chapters
- You are the teacher now!
- Cryptography
- Encryption / Data Protection
- Encryption & Key Management
- Emerging Technologies
- Section 2: Key Management in today’s cloud services
- Key Management Interoperability Protocol (KMIP)
- KMIP
- Vendors offering KMIP
- Vendors that support KMIP
- Cloud Access Security Broker (CASB)
- Hardware Security Module (HSM)
- Section 3: Recommendations General Recommendations
- Recommendations Encryption with Databases
- Section 4: Relevant CCM Controls
- EKM-01 Entitlement
- EKM-02 Key Generation
- EKM-03 Sensitive Data Protection
- EKM-04 Storage and Access
- Questions
- Section 1: Introduction to Identity and Access Management
- Terms Used
- Identity and Access Management
- Key points to consider
- Identity Architecture Differences
- Generic Example
- Identity Federation
- General Usage of Federation
- Section 2: Identities and Attributes
- Provisioning
- Examples of Identities and Attributes
- Potential Decision Making Process
- Identity and the Attribute
- Entitlement Process
- Automated Approaches
- Interpretation Locations
- Authorization and Access Management
- Section 3: Options for Architectures
- Hub and Spoke Model
- Mesh or Free Form Model
- Free Form Model
- Hybrid Model
- Bridge or Federation Hub
- Provisioning Accounts
- Identity and Attribute Provisioning
- Section 4: The Identity
- Identity and Data Protection
- Consumerization Challenge
- Section 6: Relevant CCM Controls
- IAM-01 Audit Tools Access
- IAM-02 Credential Lifecycle / Provision Management
- IAM-03 Diagnostic /Configuration Port Access
- IAM-04 Policies and Procedures
- IAM-05 Segregation of Duties
- IAM-06 Source Code Access Restriction
- IAM-07 Third Party Access
- IAM-08 Trusted Sources
- IAM-09 User Access Authorization
- IAM-10 User Access Reviews
- IAM-11 User Access Revocation
- IAM-12 User ID Credentials
- IAM-13 Utility Programs Access
- Questions
- Section 1: Compliance and Audit Cloud Issues
- GRC Value Ecosystem
- Assurance by CSP
- Assurance by CSP– Assurance Frameworks
- Assurance Challenges of Virtualization and Cloud
- Policies
- Risk Audit Mechanisms
- Section 2: Assurance Frameworks
- Assurance by CSP Assurance Frameworks
- Certification Against Criteria
- Assurance Frameworks ISO 2700X
- ISO/IEC 27001 Domains
- Assurance Frameworks – AICPA SOC 1
- SOC II and SOC III
- Assurance Frameworks – NIST SP 800-53
- PCI-DSS Merchant Level
- PCI-DSS 12 Requirements
- Assurance Frameworks – COBIT
- Assurance Frameworks – AICPA/CICA Trust Services
- Assurance Frameworks – Cloud Security Matrix
- Assurance Frameworks – FedRamp
- NIST SP 800-144
- NIST SP 800-144 – Preliminary Activities
- NIST SP 800-144 – Initiating & Coincident Activities
- NIST SP 800-144 – Concluding Activities
- Assurance Frameworks – HITRUST
- Assurance Frameworks – BITS
- Assurance Frameworks – Jericho SAS
- System/Subsystem Product Certification
- Common Criteria Protection Profiles (PP)
- Section 3: The Audit
- Cloud Audit Goals
- Impact of Requirements Programs by the Use of Cloud
- Types of Audit Reports
- Restrictions of Audit Scope
- Gap Analysis
- Standards Requirements (ISO/IEC 27018 GAPP)
- Internal ISMS
- Internal Information Security Control System ISO 27002:2013
- Cloud Computing Audit Characteristics
- Internal and External Audit Controls
- Planning & Scoping the Audit
- Section 4: Relevant CCM Controls
- AAC-01 – Audit Planning
- AAC-02 – Independent Audits
- AAC-03 – Info
FREE
Interested in course?
Course Type: Self Paced