From the course: Cloud Data, Platform, and Applications Security by Pearson
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
Cloud vulnerabilities, threats, and attacks
From the course: Cloud Data, Platform, and Applications Security by Pearson
Cloud vulnerabilities, threats, and attacks
One thing to realize on this exam and in the exam objectives is there's redundancy. You'll return to concepts that you covered in previous lessons as we get more into the operational aspect. But something that doesn't change is where do we go to look at the source of our risks, especially when it comes to cloud and cloud data centers. And we're going to rely on that CSA Treacherous 12. So even in the cloud data center, we still have to look at data breaches. So let me use Azure for an example. If you're at an Azure data center, obviously there's going to be strict physical security to get into that facility. There'll be no tailgating, no piggybacking. There'll be multi-factor authentication. they use lease privilege and they use separation of duties. So in an Azure datacenter, it's very rare for an individual to get access to every area of the datacenter in their zero trust initiative. Also, as far as things like data breaches, as you move through the datacenter, you will go through…
Contents
-
-
-
-
-
-
(Locked)
Learning objectives25s
-
(Locked)
Secure data center logical design10m 42s
-
(Locked)
Physical data center design9m 52s
-
(Locked)
Data center environmental design8m 29s
-
(Locked)
Design resilient environments6m 20s
-
(Locked)
Cloud infrastructure risk assessment14m 30s
-
(Locked)
Cloud vulnerabilities, threats, and attacks3m 30s
-
(Locked)
Cloud infrastructure risk mitigation strategies16m 43s
-
(Locked)
-
-
-
-
-