Example: quiz answers

The permanent and official location for Cloud Security ...

The permanent and official location for Cloud Security Alliance's Security guidance for Critical Areas of Focus in Cloud computing is guidance -v4/. official Study Guide for the 2017 Cloud Security Alliance All Rights Reserved. The Security guidance for Critical Areas of Focus in Cloud computing ( guidance ) is licensed by the Cloud Security Alliance under a Creative Commons Attribution-NonCommercial- ShareAlike International License (CC-BY-NC-SA ). Sharing - You may share and redistribute the guidance in any medium or any format, only for non- commercial purposes. Adaptation - You may adapt, transform, modify and build upon the guidance v4 and distribute the modified guidance , only for non-commercial purposes. Attribution - You must give credit to the Cloud Security Alliance, link to guidance webpage located at , and indicate whether changes were made. You may not suggest that CSA endorsed you or your use. Share-Alike - All modifications and adaptations must be distributed under the same license as the original guidance No additional restrictions - You may not apply legal terms or technological measures that restrict others from doing anything that this license permits.

adoption of cloud computing technology. The Cloud Security Alliance promotes implementing best practices for providing security assurance within the domain of cloud computing and has delivered a practical, actionable roadmap for organizations seeking to adopt the cloud paradigm. The fourth version of the Security Guidance for

Tags:

  Computing, Security, Cloud, Guidance, Cloud computing, Security guidance, Cloud security

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of The permanent and official location for Cloud Security ...

1 The permanent and official location for Cloud Security Alliance's Security guidance for Critical Areas of Focus in Cloud computing is guidance -v4/. official Study Guide for the 2017 Cloud Security Alliance All Rights Reserved. The Security guidance for Critical Areas of Focus in Cloud computing ( guidance ) is licensed by the Cloud Security Alliance under a Creative Commons Attribution-NonCommercial- ShareAlike International License (CC-BY-NC-SA ). Sharing - You may share and redistribute the guidance in any medium or any format, only for non- commercial purposes. Adaptation - You may adapt, transform, modify and build upon the guidance v4 and distribute the modified guidance , only for non-commercial purposes. Attribution - You must give credit to the Cloud Security Alliance, link to guidance webpage located at , and indicate whether changes were made. You may not suggest that CSA endorsed you or your use. Share-Alike - All modifications and adaptations must be distributed under the same license as the original guidance No additional restrictions - You may not apply legal terms or technological measures that restrict others from doing anything that this license permits.

2 Commercial Licenses - If you wish to adapt, modify, share or distribute copies of the guidance for revenue generating purposes you must first obtain an appropriate license from the Cloud Security Alliance. Please contact us at Notices: All trademark, copyright or other notices affixed onto the guidance must be reproduced and may not be removed. Security guidance Copyright 2017, Cloud Security Alliance. All rights reserved 2. FOREWORD. Welcome to the fourth version of the Cloud Security Alliance's Security guidance for Critical Areas of Focus in Cloud computing . The rise of Cloud computing as an ever-evolving technology brings with it a number of opportunities and challenges. With this document, we aim to provide both guidance and inspiration to support business goals while managing and mitigating the risks associated with the adoption of Cloud computing technology. The Cloud Security Alliance promotes implementing best practices for providing Security assurance within the domain of Cloud computing and has delivered a practical, actionable roadmap for organizations seeking to adopt the Cloud paradigm.

3 The fourth version of the Security guidance for Critical Areas of Focus in Cloud computing is built on previous iterations of the Security guidance , dedicated research, and public participation from the Cloud Security Alliance members, working groups, and the industry experts within our community. This version incorporates advances in Cloud , Security , and supporting technologies; reflects on real-world Cloud Security practices; integrates the latest Cloud Security Alliance research projects; and offers guidance for related technologies. The advancement toward secure Cloud computing requires active participation from a broad set of globally-distributed stakeholders. CSA brings together this diverse community of industry partnerships, international chapters, working groups, and individuals. We are profoundly grateful to all who contributed to this release. Please visit to learn how you can work with us to identify and promote best practices to ensure a secure Cloud computing environment.

4 Best regards, Luciano ( ) Santos Executive Vice President of Research Cloud Security Alliance Security guidance Copyright 2017, Cloud Security Alliance. All rights reserved 3. ACKNOWLEDGEMENTS. Lead Authors Rich Mogull James Arlen Francoise Gilbert Adrian Lane David Mortman Gunnar Peterson Mike Rothman Editors John Moltz Dan Moren Evan Scoboria CSA Staff Jim Reavis Luciano ( ) Santos Hillary Baron Ryan Bergsma Daniele Catteddu Victor Chin Frank Guanco Stephen Lumpe (Design). John Yeoh Contributors On behalf of the CSA Board of Directors and the CSA Executive Team, we would like to thank all of the individuals who contributed time and feedback to this version of the CSA Security guidance for Critical Areas of Focus in Cloud computing . We value your volunteer contributions and believe that the devotion of volunteers like you will continue to lead the Cloud Security Alliance into the future. Security guidance Copyright 2017, Cloud Security Alliance. All rights reserved 4. LETTER FROM THE CEO.

5 I am thrilled by this latest contribution to the community's knowledge base of Cloud Security best practices that began with Cloud Security Alliance's initial guidance document released in April of 2009. We hope that you will carefully study the issues and recommendations outlined here, compare with your own experiences and provide us with your feedback. A big thank you goes out to all who participated in this research. Recently, I had the opportunity to spend a day with one of the industry experts who helped found Cloud Security Alliance. He reflected that for the most part CSA has completed its initial mission, which was to prove that Cloud computing could be made secure and to provide the necessary tools to that end. Not only did CSA help make Cloud computing a credible secure option for information technology, but today Cloud computing has become the default choice for IT and is remaking the modern business world in very profound ways. The resounding success of Cloud computing and CSA's role in leading the trusted Cloud ecosystem brings with it even greater challenges and urgency into our renewed mission.

6 Cloud is now becoming the back end for all forms of computing , including the ubiquitous Internet of Things. Cloud computing is the foundation for the information Security industry. New ways of organizing compute, such as containerization and DevOps are inseparable from Cloud and accelerating our revolution. At Cloud Security Alliance, we are committed to providing you the essential Security knowledge you need for this fast moving IT landscape and staying at the forefront of next-generation assurance and trust trends. We welcome your participation in our community, always. Best regards, Jim Reavis Co-Founder & CEO. Cloud Security Alliance Security guidance Copyright 2017, Cloud Security Alliance. All rights reserved 5. TABLE OF CONTENTS. DOMAIN 1 DOMAIN 2 DOMAIN 3 DOMAIN 4. Cloud computing Governance and Enterprise Legal Issues, Contracts and Compliance and Concepts and Architectures Risk Management Electronic Discovery Audit Management DOMAIN 5 DOMAIN 6 DOMAIN 7 DOMAIN 8. Information Governance Management Plane and Infrastructure Virtualization and Containers Business Continuity Security DOMAIN 9 DOMAIN 10 DOMAIN 11 DOMAIN 12.

7 Incident Response Application Security Data Security and Encryption Identity, Entitlement, and Access Management DOMAIN 13 DOMAIN 14. Security as a Service Related Technologies Security guidance Copyright 2017, Cloud Security Alliance. All rights reserved 6. DOMAIN 1. Cloud computing Concepts and Architectures Introduction This domain provides the conceptual framework for the rest of the Cloud Security Alliance's guidance . It describes and defines Cloud computing , sets our baseline terminology, and details the overall logical and architectural frameworks used in the rest of the document. There are many different ways of viewing Cloud computing : It's a technology, a collection of technologies, an operational model, a business model, just to name a few. It is, at its essence, transformative and disruptive. It's also growing very, very quickly, and shows no signs of slowing down. While the reference models we included in the first version of this guidance are still relatively accurate, they are most certainly no longer complete.

8 And even this update can't possibly account for every possible evolution in the coming years. Cloud computing offers tremendous potential benefits in agility, resiliency, and economy. Organizations can move faster (since they don't have to purchase and provision hardware, and everything is software defined), reduce downtime (thanks to inherent elasticity and other Cloud characteristics), and save money (due to reduced capital expenses and better demand and capacity matching). We also see Security benefits since Cloud providers have significant economic incentives to protect customers. However, these benefits only appear if you understand and adopt Cloud -native models and adjust your architectures and controls to align with the features and capabilities of Cloud platforms. In fact, taking an existing application or asset and simply moving it to a Cloud provider without any changes will often reduce agility, resiliency, and even Security , all while increasing costs. The goal of this domain is to build the foundation that the rest of the document and its recommendations are based on.

9 The intent is to provide a common language and understanding of Cloud computing for Security professionals, begin highlighting the differences between Cloud and traditional computing , and help guide Security professionals towards adopting Cloud -native approaches that result in better Security (and those other benefits), instead of creating more risks. Security guidance Copyright 2017, Cloud Security Alliance. All rights reserved 7. This domain includes 4 sections: Defining Cloud computing The Cloud logical model Cloud conceptual, architectural, and reference model Cloud Security and compliance scope, responsibilities, and models The Cloud Security Alliance isn't setting out to create an entirely new taxonomy or reference model. Our objective is to distill and harmonize existing models most notably the work in NIST Special Publication 800-145, ISO/IEC 17788 and ISO/IEC 17789 and focus on what's most relevant to Security professionals. Overview Defining Cloud computing Cloud computing is a new operational model and set of technologies for managing shared pools of computing resources.

10 It is a disruptive technology that has the potential to enhance collaboration, agility, scaling, and availability, as well as providing the opportunities for cost reduction through optimized and efficient computing . The Cloud model envisages a world where components can be rapidly orchestrated, provisioned, implemented and decommissioned, and scaled up or down to provide an on-demand utility-like model of allocation and consumption. NIST defines Cloud computing as: Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources ( , networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. The ISO/IEC definition is very similar: Paradigm for enabling network access to a scalable and elastic pool of shareable physical or virtual resources with self-service provisioning and administration on-demand.


Related search queries