From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Business requirements, phases, and methodologies
From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Business requirements, phases, and methodologies
- [Instructor] Welcome to this lesson on Business Requirements, Phases and Methodologies. In this lesson, we'll be mostly talking about the software development process and specifically, how these things relate to that process. Jumping into it, we'll first address some key business requirements, the first of which is cost effectiveness of early security integration. And what this is talking about is that if vulnerabilities and security risks are identified early in the development process so that they can be removed or mitigated in some way prior to some of the later phases like testing and deployment, that can actually reduce both the number of hours that developers have to spend on ultimately remediating those vulnerabilities, which in turn translates to reduced costs, with the overall building and management of those applications. Another key benefit is the impact of the secure software development lifecycle on development costs. This is along the same thought process as the…
Contents
-
-
-
-
-
-
(Locked)
Domain 4 overview1m 59s
-
(Locked)
Cloud development basics, common pitfalls, and vulnerabilities13m 6s
-
(Locked)
Secure software development4m 8s
-
(Locked)
Business requirements, phases, and methodologies4m 53s
-
(Locked)
Cloud specific risks10m 21s
-
(Locked)
Threat modeling7m 19s
-
(Locked)
Layered security, secure coding, and configuration4m 11s
-
Cloud software assurance and validation6m 48s
-
(Locked)
Application testing5m 13s
-
(Locked)
Securing APIs and supply chains3m 8s
-
(Locked)
Validating and managing third-party and open-source software3m 54s
-
(Locked)
Supplemental security components8m 19s
-
(Locked)
Cryptography, sandboxing, virtualization, and orchestration9m 31s
-
(Locked)
Federated identity, identity providers (IdP), and SSO6m 10s
-
(Locked)
MFA, cloud access security brokers, and secrets management5m 35s
-
(Locked)
-
-