From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Key cloud computing characteristics
From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Key cloud computing characteristics
- [Instructor] Welcome to this lesson on key cloud computing characteristics. As promised on the last lesson, in this lesson, we're going to do a deeper dive into the five cloud computing characteristics as defined by NIST. So first we're going to give a quick overview and recap of those, and then we'll go into the definitions of each of those characteristics. And then finally, we're going to touch on a concept called multi-tenancy to help establish that for future lessons. Alright, so as a quick recap, the five key characteristics as defined by NIST SP 800-145 for cloud computing are on-demand, self-service, broad network access, resource pooling, measured service, and finally, rapid elasticity. So getting into these definitions, on-demand self-service is going to be the capability for users to automatically provision and manage resources without human intervention. So what this means is that if I log into Amazon Web Services or Microsoft Azure, I'm going to be able to spin up…
Contents
-
-
-
(Locked)
Domain 1 overview1m 9s
-
(Locked)
Cloud computing definitions, roles, and responsibilities10m 21s
-
(Locked)
Key cloud computing characteristics6m 24s
-
(Locked)
Building block technologies6m 26s
-
(Locked)
Cloud activities, service capabilities and categories, and deployment models7m 51s
-
Cloud shared considerations6m 51s
-
(Locked)
Impact of related technologies9m 53s
-
(Locked)
Cryptography and key management3m 22s
-
(Locked)
Identity and access control5m 12s
-
(Locked)
Data and media sanitization3m 23s
-
(Locked)
Network security7m 5s
-
(Locked)
Virtualization security8m 6s
-
(Locked)
Common threats3m 16s
-
(Locked)
Security hygiene6m 4s
-
(Locked)
Cloud secure data lifecycle3m 51s
-
(Locked)
Business continuity and disaster recovery in the cloud6m 44s
-
(Locked)
Business impact analysis and functional security requirements6m 51s
-
(Locked)
Service model security considerations and cloud design patterns5m 24s
-
(Locked)
DevOps security2m 45s
-
(Locked)
Verifications and certifications using common standards6m 3s
-
(Locked)
-
-
-
-
-