Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying The Official (ISC)2 Guide to the CCSP CBK
  • Table Of Contents Toc
The Official (ISC)2 Guide to the CCSP CBK

The Official (ISC)2 Guide to the CCSP CBK - Second Edition

By : Adam Gordon
close
close
The Official (ISC)2 Guide to the CCSP CBK

The Official (ISC)2 Guide to the CCSP CBK

By: Adam Gordon

Overview of this book

Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)2 the CCSP credential is the ideal way to match marketability and credibility to your cloud security skillset. The Official (ISC)2 Guide to the CCSPSM CBK second edition is your ticket for expert insight through the 6 CCSP domains. The book starts by focusing on building blocks of cloud-based systems and progresses to explaining concepts, principles, structures, and standards for designing, implementing, monitoring, and securing operating systems (OSs), equipment, networks, and applications. Next, you’ll cover cloud infrastructure components, existing threats, and mitigating and developing plans to deal with those threats. Moving ahead, you’ll ensure that the need for training and awareness in application security, the processes involved with cloud software assurance and validation, and the use of verified secure software are understood. Then, you’ll identify critical information and the execution of selected measures that eliminate adversary exploitation of critical information. In the end chapters, you’ll address ethical behavior and compliance with regulatory frameworks. By the end of this book, you’ll acquire the knowledge you'll need to implement strong information security programs in cloud computing.
Table of Contents (12 chapters)
close
close
Lock Free Chapter
1
Foreword
2
Introduction
9
EULA
2
Appendix B: Glossary
3
Appendix C: Helpful Resources and Links

Introduction

Data security is a core element of cloud security (Figure 2.1

Image described by surrounding text

Figure 2.1 Many roles are involved in providing data security.

The data security lifecycle, as introduced by the Securosis Blog and then incorporated into the CSA guidance, enables the organization to map the different phases in the data lifecycle against the required controls that are relevant to each phase.1

The lifecycle contains the following steps:

  1. Map the different lifecycle phases.
  2. Integrate the different data locations and access types.
  3. Map into functions, actors, and controls.

The data lifecycle guidance provides a framework to map relevant use cases for data access, while assisting in the development of appropriate controls within each lifecycle stage.

The lifecycle model serves as a reference and framework to provide a standardized approach for data lifecycle and data security. Not all implementations or situations align fully or comprehensively.

CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
The Official (ISC)2 Guide to the CCSP CBK
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon