The Second Domain of CCSP: Cloud Data Security - PowerPoint PPT Presentation

About This Presentation
Title:

The Second Domain of CCSP: Cloud Data Security

Description:

The CCSP is a globally recognized certification that represents the pinnacle of cloud security knowledge. It was co-created by (ISC)2 and the Cloud Security Alliance (CSA), two of the most respected information security and cloud computing security organizations. – PowerPoint PPT presentation

Number of Views:43

less

Transcript and Presenter's Notes

Title: The Second Domain of CCSP: Cloud Data Security


1
www.infosectrain.com
The Second Domain of CCSP Cloud Data Security
2
InfosecTrain
About Us
InfosecTrain is one of the finest Security and
Technology Training and Consulting organization,
focusing on a range of IT Security Trainings and
Information Security Services. InfosecTrain was
established in the year 2016 by a team of
experienced and enthusiastic professionals, who
have more than 15 years of industry experience.
We provide professional training, certification
consulting services related to all areas of
Information Technology and Cyber Security.
3
(No Transcript)
4
The Second Domain of CCSP Cloud Data Security
  • CCSP
  • The CCSP is a globally recognized certification
    that represents the pinnacle of cloud security
    knowledge. It was co-created by (ISC)2 and the
    Cloud Security Alliance (CSA), two of the most
    respected information security and cloud
    computing security organizations. This
    certification meets the increasing demand for
    trained and certified Cloud Security
    Professionals. A CCSP demonstrates competence in
    Cloud Security architecture, design, operations,
    and service orchestration by applying information
    security expertise to a Cloud computing
    environment. This professional competence is
    assessed against a body of knowledge that is
    globally recognized.
  • Domains of CCSP
  • CCSP comprises a total of six domains
  • Domain 1 Cloud Concepts, Architecture and
    Design (17)
  • Domain 2 Cloud Data Security (19)
  • Domain 3 Cloud Platform Infrastructure
    Security (17)
  • Domain 4 Cloud Application Security (17)
  • Domain 5 Cloud Security Operations (17)
  • Domain 6 Legal, Risk, and Compliance (13)
  • In this blog, we will cover the second domain
    Cloud Data Security.
  • CCISO Certification

5
  • Cloud Data Security
  • The second domain of CCSP, Cloud Data Security,
    is the most crucial domain as it covers the
    central part of the CCSP exam. It holds a
    weightage of 19. It mainly focuses on
  • Describing Cloud Data Concepts
  • Designing and Implementing Cloud Data Storage
    Architecture
  • Designing and Applying Data Security Technologies
    and Strategies
  • Implementing Data Discovery
  • Implementing Data Classification
  • Designing and Implementing Information Rights
    Management (IRM)
  • Understanding the Cloud Data Lifecycle
  • In this, we understand the different phases of
    data during its lifecycle. They are mainly
    referred to as CSUSAD, which stands for Create,
    Store, Use, Share, Archive, and Destroy. Data can
    be found in three states
  • Data in Transit (DIT)
  • Data in Use (DIU)
  • Data at Rest (DAR)

6
  • In order to ensure security in these phases, we
    must be aware of the organization mapping of the
    different stages of a Data Life Cycle. The Cloud
    Security Alliance (CSA) is one of the two
    developers of the CCSP that offers guidance
    regarding the Cloud Data Lifecycle. The
    candidates who want to pursue CCSP certification
    must be familiar with the Cloud Data Lifecycle
    phases and the data protection tools used to
    execute them. Along with Data Lifecycle, Data
    Dispersion also falls under this category, which
    is used for redundancy and robustness.
  • Designing and Implementing Cloud Data Storage
    Architectures
  • In this section, we learn about the different
    types of Cloud Storage Services available that
    vary across the service model. This portion of
    the CCSP is devoted to all facets of cloud
    storage. To be prepared, you must understand the
    various types of storage (long-term, ephemeral,
    and raw-disk), and the kinds of storage we use in
    SaaS, PaaS, and IaaS, respectively. We learn
    about the advantages and drawbacks of these
    storage services. Also, we understand the
    possible threats to each type of storage
    (unauthorized access, unauthorized usage,
    liability due to regulatory non-compliance, etc.)
    and how to address and mitigate these threats
    using encryption and other technologies.
  • Designing and Applying Data Security Strategies
  • This is the most crucial part from the exam point
    of view. In this section, we understand the
    various data-protection resources available and
    how to use them. We learn about
  • Encryption and Key management Symmetric and
    Asymmetric Encryption, ECC, RSA, AES

7

  • Hashing
  • Masking Static and Dynamic Masking
  • Tokenization
  • Data Loss Prevention (DLP)
  • Data Obfuscation
  • Data De-identification and modern and evolving
    cryptography-related technologies.
  • Understanding and Implementing Data
    Classification Techniques
  • In this section, we understand the different
    methods to find data within a cloud environment
    and how to classify data properly. It is about
    analyzing the data value based on the criticality
    and sensitivity of data. We learn about
  • Mapping It involves mapping the sensitive data
    and the security controls deployed to guard.
  • Labeling It provides visibility to the data.
  • Sensitive Data It includes PHI, PII, Card Holder
    data, etc.

8
  • Understanding and Implementing Data Discovery
  • This section opens up a landscape of the
    possibility of enterprise collaborations that is
    enabled by sharing data and analytics. In this
    section, we understand the different types of
    data discovery approaches. We learn about
  • Structured Data
  • Unstructured Data
  • Designing and Implementing Relevant
    Jurisdictional Data Protections for Personally
    Identifiable Information (PII)
  • Personal Identifiable Information (PII) is a
    category of data that is commonly-regulated. In
    this section, we understand the major data
    privacy laws, conduct data discovery, identify
    the data discovered, and chart, define, and apply
    security controls to protected data.
  • Designing and Implementing Information Rights
    Management (IRM)
  • In this section, we understand the technology for
    managing user access to various data. This
    includes being familiar with the controlling of
    data movement in the Cloud. You need to
    understand the difference between Enterprise DRM
    and Consumer DRM. We learn about
  • Objectives Data Rights, Provisioning, Access
    Models, etc.
  • Appropriate Tools Issuing and Revocation of
    Certificates

9
  • Designing and Implementing Data Retention,
    Deletion, and Archiving Policies
  • Data is moved to long-term storage after
    completion of its lifecycle. Data preservation,
    deletion, and archiving policies are stringent in
    most corporate and legally protected data. Due to
    the lack of physical control over the hardware
    where the data is stored, cloud environments can
    make these policies more difficult to implement.
    In this section, we understand data retention,
    deletion, and archiving practices, processes, and
    mechanisms. We learn about
  • Data Retention Policies
  • Data Deletion Procedures and Mechanisms
  • Data Archiving Procedures and Mechanisms
  • Legal Hold
  • Designing and Implementing Auditability,
    Traceability, and Accountability of Data Events
  • In this section, we cover all aspects of event
    management, including identifying event sources,
    recording events, storing events, and constantly
    improving the process. The section also concerns
    chain of custody and ensuring that collected data
    is non-repudiable. We learn about
  • Definition of Event Sources and Requirement of
    Identity Attribution
  • Logging, Storage, and Analysis of Data Events
  • Chain of Custody and Non-repudiation

10
  • CCSP with InfosecTrain
  • You can opt for the Certified Cloud Security
    Professional (CCSP) for professional knowledge
    and an in-depth understanding of Cloud security.
    We are one of the leading training providers with
    our well-read and experienced trainers. The
    courses will help you understand the basic
    concepts and provide a sound knowledge of the
    subject. This certification will indeed merit
    each penny and minute you will invest.

11
(No Transcript)
12
ABOUT OUR COMPANY
OUR CONTACT
InfosecTrain welcomes overseas customers to come
and attend training sessions in destination
cities across the globe and enjoy their learning
experience at the same time.
1800-843-7890
https//www.facebook.com/Infosectrain/
sales_at_infosectrain.com
https//www.linkedin.com/company/infosec-train/
www.infosectrain.com
https//www.youtube.com/c/InfosecTrain
Write a Comment
User Comments (0)
About PowerShow.com