1 / 12

The Second Domain of CCSP Cloud Data Security

The CCSP is a globally recognized certification that represents the pinnacle of cloud security knowledge. It was co-created by (ISC)2 and the Cloud Security Alliance (CSA), two of the most respected information security and cloud computing security organizations.<br><br>https://www.infosectrain.com/blog/the-second-domain-of-ccsp-cloud-data-security/<br>

Download Presentation

The Second Domain of CCSP Cloud Data Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. www.infosectrain.com The Second Domain of CCSP: Cloud Data Security

  2. InfosecTrain About Us InfosecTrain is one of the finest Security and Technology Training and Consulting organization, focusing on a range of IT Security Trainings and Information Security Services. InfosecTrain was established in the year 2016 by a team of experienced and enthusiastic professionals, who have more than 15 years of industry experience. We provide professional training, certification & consulting services related to all areas of Information Technology and Cyber Security.

  3. The Second Domain of CCSP: Cloud Data Security CCSP The CCSP is a globally recognized certification that represents the pinnacle of cloud security knowledge . It was co-created by (CSA), two of the most respected information security and cloud computing security organizations . This certification meets certified Cloud Security Professionals . A Security architecture, design, operations, information security expertise to a Cloud computing environment . This professional competence is assessed against a body of knowledge that is globally recognized. (ISC)2 and the Cloud Security Alliance the CCSP and increasing demonstrates service demand for trained and competence orchestration in applying Cloud by Domains of CCSP CCSP comprises a total of six domains : • Domain 1: Cloud Concepts, Architecture and Design (17%) • Domain 2: Cloud Data Security (19%) • Domain 3: Cloud Platform & Infrastructure Security (17%) • Domain 4: Cloud Application Security (17%) • Domain 5: Cloud Security Operations (17%) • Domain 6: Legal, Risk, and Compliance (13%) In this blog , we will cover the second domain: Cloud Data Security. 4 CCISO Certification

  4. Cloud Data Security The second domain of CCSP, Cloud Data Security, is the most crucial domain as it covers the central part of the CCSP exam. It holds a weightage of 19%. It mainly focuses on: • Describing Cloud Data Concepts • Designing and Implementing Cloud Data Storage Architecture • Designing and Applying Data Security Technologies and Strategies • Implementing Data Discovery • Implementing Data Classification • Designing and Implementing Information Rights Management (IRM) Understanding the Cloud Data Lifecycle In this, we understand the different phases of data during its lifecycle . They are mainly referred to as CSUSAD, which stands for Create, Store, Use, Share, Archive, and Destroy. Data can be found in three states: • Data in Transit (DIT) • Data in Use (DIU) • Data at Rest (DAR) 5

  5. In order to ensure security in these phases, we must be aware of the organization mapping of the different stages of a Data Life Cycle. The Cloud Security Alliance (CSA) is one of the two developers of the CCSP that offers guidance regarding the Cloud Data Lifecycle. The candidates who want to pursue CCSP certification must be familiar with the Cloud Data Lifecycle phases and the data protection tools used to execute them. Along with Data Lifecycle, category, which is used for redundancy and robustness. Data Dispersion also falls under this Designing and Implementing Cloud Data Storage Architectures In available that vary across the service model. This portion of the CCSP is devoted to all facets of cloud storage . To be prepared, you must understand the various types of storage (long-term, ephemeral, and raw-disk), and the kinds of storage we use in SaaS, PaaS, and IaaS, respectively. We learn about the advantages and drawbacks of these storage services . Also, we understand the possible threats to each type of storage (unauthorized access, unauthorized usage, liability due to regulatory non- compliance, etc.) and how to address and mitigate these threats using encryption and other technologies. this section, we learn about the different types of Cloud Storage Ser vices Designing and Applying Data Security Strategies This understand the various data-protection resources available and how to use them. We learn about: • Encryption and Key management: Symmetric and Asymmetric Encryption, ECC, RSA , AES is the most crucial part from the exam point of view. In this section, we 6

  6. Hashing • Masking: Static and Dynamic Masking • Tokenization • Data Loss Prevention (DLP) • Data Obfuscation • Data De -identification and modern and evolving cryptography -related technologies. Understanding and Implementing Data Classification Techniques • In this section, we understand the different methods to find data within a cloud environment and how to classify data properly. It is about analyzing the data value based on the criticality and sensitivity of data. We learn about: • Mapping : It involves mapping the sensitive data and the security controls deployed to guard. • Labeling : It provides visibility to the data. • Sensitive Data : It includes PHI, PII, Card Holder data, etc. 7

  7. Understanding and Implementing Data Discovery This section opens up a landscape of the possibility of enterprise collaborations that is enabled by sharing data and analytics . In this section, we understand the different types of data discovery approaches. We learn about: • Structured Data • Unstructured Data Designing and Implementing Relevant Jurisdictional Data Protections for Personally Identifiable Information (PII) Personal regulated . In this section, we understand the major data privacy laws, conduct data discovery, identify the data discovered, and chart, define, and apply security controls to protected data. Identifiable Information (PII) is a category of data that is commonly- Designing and Implementing Information Rights Management (IRM) In this section, we understand the technology for managing user access to various data. This includes being familiar with the controlling of data movement in the Cloud. You need to understand the difference between Enterprise DRM and Consumer DRM. We learn about: ➢ Objectives : Data Rights, Provisioning , Access Models, etc. ➢ Appropriate Tools : Issuing and Revocation of Certificates 8

  8. Designing and Implementing Data Retention, Deletion, and Archiving Policies Data preservation, legally protected data. Due to the lack of physical control over the hardware where the data is stored, cloud environments can implement . In this section, we understand practices, processes, and mechanisms . We learn about: • Data Retention Policies • Data Deletion Procedures and Mechanisms • Data Archiving Procedures and Mechanisms • Legal Hold is moved to long-term and storage after completion are stringent of in its most lifecycle . corporate Data and deletion, archiving policies make data these retention, policies deletion, more difficult and archiving to Designing and Implementing Auditability, Traceability, and Accountability of Data Events In this section, we cover all aspects of event management, including identifying event sources, recording events, storing events, and constantly improving the process. The section also concerns chain of custody and repudiable. We learn about: • Definition of Event Sources and Requirement of Identity Attribution • Log ging , Storage, and Analysis of Data Events • Chain of Custody and Non -repudiation ensuring that collected data is non- 9

  9. CCSP with InfosecTrain You knowledge and an in-depth understanding of Cloud security. We are one of the leading training providers with our well-read and experienced trainers . The courses will help you understand the basic concepts and provide a sound knowledge of the subject. This certification will indeed merit each penny and minute you will invest . can opt for the Certified Cloud Security Professional (CCSP) for professional 10

  10. 11

  11. ABOUT OUR COMPANY OUR CONTACT InfosecTrain welcomes overseas customers to come and attend training sessions in destination cities across the globe and enjoy their learning experience at the same time. https://www.facebook.com/Infosectrain/ 1800-843-7890 sales@infosectrain.com https://www.linkedin.com/company/infosec-train/ www.infosectrain.com https://www.youtube.com/c/InfosecTrain

More Related