From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Infrastructure as code and the management plane
From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Infrastructure as code and the management plane
- [Person] Welcome to this lesson on infrastructure as code and the management plane. In this lesson, of course, we have two key concepts to go over, the first one is infrastructure as code strategy, and then, the second one is the management plane. Starting with IaC strategy, I want to first reemphasize the concept of IaC because it's incredibly useful in creating infrastructure in a modern cloud-computing environment. The core principle behind IaC is to write system configuration files or scripts which are then used by a cloud service to create and manage resources according to the predefined specifications within those scripts. This automation minimizes the risk of human error, which is very often a factor in security breaches. Manual tasks, especially repetitive ones like server deployment, are very prone to mistakes, and IaC ensures that every deployment is performed identically. This reduces the likelihood of mis-configurations or inconsistencies across the cloud environment…
Contents
-
-
-
-
-
-
-
(Locked)
Domain 5 overview1m 57s
-
(Locked)
Hardware security4m 51s
-
(Locked)
Virtualization management, security, and tool sets5m 17s
-
(Locked)
Remote access4m 41s
-
(Locked)
Secure network configurations and controls12m 30s
-
(Locked)
Operating system hardening and configuration6m 46s
-
(Locked)
Availability of hosts and guest operating systems9m 14s
-
Performance, capacity, and hardware monitoring6m 27s
-
(Locked)
Infrastructure as code and the management plane6m 3s
-
(Locked)
Program management, part 18m 41s
-
(Locked)
Program management, part 28m 16s
-
(Locked)
Program management, part 37m 8s
-
(Locked)
Program management, part 46m 27s
-
(Locked)
Forensics, evidence collection, and preservation12m 16s
-
(Locked)
Communication and cloud stakeholders6m 57s
-
(Locked)
Security operations and intelligent monitoring6m 22s
-
(Locked)
Logging, incident management, and vulnerability assessments13m 18s
-
(Locked)
-