From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Service model security considerations and cloud design patterns
From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Service model security considerations and cloud design patterns
- [Instructor] Welcome to this lesson on security considerations for the different service models and cloud design patterns. In this lesson, we're first going to do a review of the shared responsibility model. After that, we'll talk about security in the different deployment models such as SaaS, PaaS, and IaaS, and then finally, we'll talk about some cloud design patterns. So this is a summary of the shared responsibility model, and because this model is agnostic to the different cloud service providers, you might see some variance of this, but in this model, we can see that the cloud service provider is these big green dots, and the cloud service customer's responsibility is going to be these purple dots. So let's specifically get into how this applies to each service model. Starting with IaaS, we can see that data identity and access and application security are going to all going to be exclusively the responsibility of the customer, whereas network security and host infrastructure…
Contents
-
-
-
(Locked)
Domain 1 overview1m 9s
-
(Locked)
Cloud computing definitions, roles, and responsibilities10m 21s
-
(Locked)
Key cloud computing characteristics6m 24s
-
(Locked)
Building block technologies6m 26s
-
(Locked)
Cloud activities, service capabilities and categories, and deployment models7m 51s
-
Cloud shared considerations6m 51s
-
(Locked)
Impact of related technologies9m 53s
-
(Locked)
Cryptography and key management3m 22s
-
(Locked)
Identity and access control5m 12s
-
(Locked)
Data and media sanitization3m 23s
-
(Locked)
Network security7m 5s
-
(Locked)
Virtualization security8m 6s
-
(Locked)
Common threats3m 16s
-
(Locked)
Security hygiene6m 4s
-
(Locked)
Cloud secure data lifecycle3m 51s
-
(Locked)
Business continuity and disaster recovery in the cloud6m 44s
-
(Locked)
Business impact analysis and functional security requirements6m 51s
-
(Locked)
Service model security considerations and cloud design patterns5m 24s
-
(Locked)
DevOps security2m 45s
-
(Locked)
Verifications and certifications using common standards6m 3s
-
(Locked)
-
-
-
-
-