1 / 21

CCSP Domain 2 Cloud Data Security

The CCSP is a globally recognized certification that represents the pinnacle of cloud security knowledge. It was co-created by (ISC)2 and the Cloud Security Alliance (CSA), two of the most respected information security and cloud computing security organizations.

Download Presentation

CCSP Domain 2 Cloud Data Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CCSP Domain 2: Cloud Data Security www.infosectrain.com | sales@infosectrain.com

  2. CCSP The CCSP is a globally recognized certification that represents the pinnacle of cloud security knowledge. It was co-created by (ISC)2 and the Cloud Security Alliance (CSA), two of the most respected information security and cloud computing security organizations. This certification meets the increasing demand for trained and certified Cloud Security Professionals. A CCSP demonstrates competence in Cloud Security architecture, design, operations, and service orchestration by applying information security expertise to a Cloud computing environment. This professional competence is assessed against a body of knowledge that is globally recognized. www.infosectrain.com | sales@infosectrain.com

  3. www.infosectrain.com | sales@infosectrain.com

  4. Domains of CCSP www.infosectrain.com | sales@infosectrain.com

  5. CCSP comprises a total of six domains: • Domain 1: Cloud Concepts, Architecture and Design(17%) • Domain 2: Cloud Data Security (19%) • Domain 3: Cloud Platform & Infrastructure Security(17%) • Domain 4: Cloud Application Security (17%) • Domain 5: Cloud Security Operations (17%) • Domain 6: Legal, Risk, and Compliance(13%) In this blog, we will cover the second domain: Cloud Data Security. https://youtu.be/6Y1n6kI1MHM www.infosectrain.com | sales@infosectrain.com

  6. Cloud Data Security • The second domain of CCSP, Cloud Data Security, is the most crucial domain as it covers the central part of the CCSP exam. It holds a weightage of 19%. It mainly focuses on: • Describing Cloud Data Concepts • Designing and Implementing Cloud Data Storage Architecture • Designing and Applying Data Security Technologies and Strategies • Implementing Data Discovery • Implementing Data Classification • Designing and Implementing Information Rights Management (IRM) www.infosectrain.com | sales@infosectrain.com

  7. Understanding the Cloud Data Lifecycle • In this, we understand the different phases of data during its lifecycle. They are mainly referred to as CSUSAD, which stands for Create, Store, Use, Share, Archive, and Destroy. Data can be found in three states: • Data in Transit (DIT) • Data in Use (DIU) • Data at Rest (DAR) • In order to ensure security in these phases, we must be aware of the organization mapping of the different stages of a Data Life Cycle. The Cloud Security Alliance (CSA) is one of the two developers of the CCSP that offers guidance regarding the Cloud Data Lifecycle. The candidates who want to pursue CCSP certification must be familiar with the Cloud Data Lifecycle phases and the data protection tools used to execute them. Along with Data Lifecycle, Data Dispersion also falls under this category, which is used for redundancy and robustness. www.infosectrain.com | sales@infosectrain.com

  8. Designing and Implementing Cloud Data Storage Architectures In this section, we learn about the different types of Cloud Storage Services available that vary across the service model. This portion of the CCSP is devoted to all facets of cloud storage. To be prepared, you must understand the various types of storage (long-term, ephemeral, and raw-disk), and the kinds of storage we use in SaaS, PaaS, and IaaS, respectively. We learn about the advantages and drawbacks of these storage services. Also, we understand the possible threats to each type of storage (unauthorized access, unauthorized usage, liability due to regulatory non-compliance, etc.) and how to address and mitigate these threats using encryption and other technologies. www.infosectrain.com | sales@infosectrain.com

  9. Designing and Applying Data Security Strategies • This is the most crucial part from the exam point of view. In this section, we understand the various data-protection resources available and how to use them. We learn about: • Encryption and Key management: Symmetric and Asymmetric Encryption, ECC, RSA, AES • Hashing • Masking: Static and Dynamic Masking • Tokenization • Data Loss Prevention (DLP) • Data Obfuscation • Data De-identification and modern and evolving cryptography-related technologies. • https://www.infosectrain.com/courses/ccsp-certification-training/ www.infosectrain.com | sales@infosectrain.com

  10. Understanding and Implementing Data Classification Techniques • In this section, we understand the different methods to find data within a cloud environment and how to classify data properly. It is about analyzing the data value based on the criticality and sensitivity of data. We learn about: • Mapping: It involves mapping the sensitive data and the security controls deployed to guard. • Labeling: It provides visibility to the data. • Sensitive Data: It includes PHI, PII, Card Holder data, etc. www.infosectrain.com | sales@infosectrain.com

  11. Understanding and Implementing Data Discovery • This section opens up a landscape of the possibility of enterprise collaborations that is enabled by sharing data and analytics. In this section, we understand the different types of data discovery approaches. We learn about: • Structured Data • Unstructured Data • Designing and Implementing Relevant Jurisdictional Data Protections for Personally Identifiable Information (PII) • Personal Identifiable Information (PII) is a category of data that is commonly-regulated. In this section, we understand the major data privacy laws, conduct data discovery, identify the data discovered, and chart, define, and apply security controls to protected data. www.infosectrain.com | sales@infosectrain.com

  12. Designing and Implementing Information Rights Management (IRM) • In this section, we understand the technology for managing user access to various data. This includes being familiar with the controlling of data movement in the Cloud. You need to understand the difference between Enterprise DRM and Consumer DRM. We learn about: • Objectives: Data Rights, Provisioning, Access Models, etc. • Appropriate Tools: Issuing and Revocation of Certificates www.infosectrain.com | sales@infosectrain.com

  13. Designing and Implementing Data Retention, Deletion, and Archiving Policies • Data is moved to long-term storage after completion of its lifecycle. Data preservation, deletion, and archiving policies are stringent in most corporate and legally protected data. Due to the lack of physical control over the hardware where the data is stored, cloud environments can make these policies more difficult to implement. In this section, we understand data retention, deletion, and archiving practices, processes, and mechanisms. We learn about: • Data Retention Policies • Data Deletion Procedures and Mechanisms • Data Archiving Procedures and Mechanisms • Legal Hold www.infosectrain.com | sales@infosectrain.com

  14. Designing and Implementing Auditability, Traceability, and Accountability of Data Events • In this section, we cover all aspects of event management, including identifying event sources, recording events, storing events, and constantly improving the process. The section also concerns chain of custody and ensuring that collected data is non-repudiable. We learn about: • Definition of Event Sources and Requirement of Identity Attribution • Logging, Storage, and Analysis of Data Events • Chain of Custody and Non-repudiation www.infosectrain.com | sales@infosectrain.com

  15. CCSP with InfosecTrain You can opt for the Certified Cloud Security Professional (CCSP) for professional knowledge and an in-depth understanding of Cloud security. We are one of the leading training providers with our well-read and experienced trainers. The courses will help you understand the basic concepts and provide a sound knowledge of the subject. This certification will indeed merit each penny and minute you will invest. www.infosectrain.com | sales@infosectrain.com

  16. About InfosecTrain • Established in 2016, we are one of the finest Security and Technology Training and Consulting company • Wide range of professional training programs, certifications & consulting services in the IT and Cyber Security domain • High-quality technical services, certifications or customized training programs curated with professionals of over 15 years of combined experience in the domain www.infosectrain.com | sales@infosectrain.com

  17. Our Endorsements www.infosectrain.com | sales@infosectrain.com

  18. Why InfosecTrain Global Learning Partners Access to the recorded sessions Certified and Experienced Instructors Flexible modes of Training Post training completion Tailor Made Training www.infosectrain.com | sales@infosectrain.com

  19. Our Trusted Clients www.infosectrain.com | sales@infosectrain.com

  20. Contact us Get your workforce reskilled by our certified and experienced instructors! IND: 1800-843-7890 (Toll Free) / US: +1 657-221-1127 / UK : +44 7451 208413 sales@infosectrain.com www.infosectrain.com

More Related