The Official (ISC)2® Guide to the CCSPSM CBK®
About the Author
Credits
Contents
Foreword
Introduction
DOMAIN 1: ARCHITECTURAL CONCEPTS AND DESIGN REQUIREMENTS
Introduction
Drivers for Cloud Computing
Security, Risks, and Benefits
Cloud Computing Definitions
Cloud Computing Roles
Key Cloud Computing Characteristics
Cloud Transition Scenario
Building Blocks
Cloud Computing Functions
Cloud Service Categories
IaaS
PaaS
SaaS
Cloud Deployment Models
The Public Cloud Model
The Private Cloud Model
The Hybrid Cloud Model
The Community Cloud Model
Cloud Cross-Cutting Aspects
Architecture Overview
Key Principles of an Enterprise Architecture
The NIST Cloud Technology Roadmap
Network Security and Perimeter
Cryptography
Encryption
Key Management
IAM and Access Control
Provisioning and Deprovisioning
Centralized Directory Services
Privileged User Management
Authorization and Access Management
Data and Media Sanitization
Vendor Lock-In
Cryptographic Erasure
Data Overwriting
Virtualization Security
The Hypervisor
Security Types
Common Threats
Data Breaches
Data Loss
Account or Service Traffic Hijacking
Insecure Interfaces and APIs
Denial of Service
Malicious Insiders
Abuse of Cloud Services
Insufficient Due Diligence
Shared Technology Vulnerabilities
Security Considerations for Different Cloud Categories
IaaS Security
PaaS Security
SaaS Security
Open Web Application Security Project Top Ten Security Threats
Cloud Secure Data Lifecycle
Information and Data Governance Types
Business Continuity and Disaster Recovery Planning
Business Continuity Elements
Critical Success Factors
Important SLA Components
Cost-Benefit Analysis
Certification Against Criteria
System and Subsystem Product Certification
Summary
Review Questions
Notes
DOMAIN 2: CLOUD DATA SECURITY
Introduction
The Cloud Data Lifecycle Phases
Location and Access of Data
Location
Access
Functions, Actors, and Controls of the Data
Key Data Functions
Controls
Process Overview
Tying It Together
Cloud Services, Products, and Solutions
Data Storage
IaaS
PaaS
SaaS
Threats to Storage Types
Technologies Available to Address Threats
Relevant Data Security Technologies
Data Dispersion in Cloud Storage
DLP
Encryption
Masking, Obfuscation, Anonymization, and Tokenization
Application of Security Strategy Technologies
Emerging Technologies
Bit Splitting
Homomorphic Encryption
Data Discovery
Data Discovery Approaches
Different Data Discovery Techniques
Data Discovery Issues
Challenges with Data Discovery in the Cloud
Data Classification
Data Classification Categories
Challenges with Cloud Data
Data Privacy Acts
Global P&DP Laws in the United States
Global P&DP Laws in the European Union
Global P&DP Laws in APEC
Differences Between Jurisdiction and Applicable Law
Essential Requirements in P&DP Laws
Typical Meanings for Common Privacy Terms
Privacy Roles for Customers and Service Providers
Responsibility Depending on the Type of Cloud Services
Implementation of Data Discovery
Classification of Discovered Sensitive Data
Mapping and Definition of Controls
Privacy Level Agreement
PLA Versus Essential P&DP Requirements Activity
Application of Defined Controls for PII
Cloud Security Alliance Cloud Controls Matrix
Management Control for Privacy and Data-Protection Measures
Data Rights Management Objectives
IRM Cloud Challenges
IRM Solutions
Data-Protection Policies
Data-Retention Policies
Data-Deletion Procedures and Mechanisms
Data-Archiving Procedures and Mechanisms
Events
Event Sources
Identifying Event Attribute Requirements
Storage and Analysis of Data Events
SIEM
Supporting Continuous Operations
Chain of Custody and Nonrepudiation
Summary
Review Questions
Notes
DOMAIN 3: CLOUD PLATFORM AND INFRASTRUCTURE SECURITY
Introduction
The Physical Environment of the Cloud Infrastructure
Data Center Design
Network and Communications in the Cloud
Network Functionality
Software-Defined Networking
The Compute Parameters of a Cloud Server
Virtualization
Scalability
The Hypervisor
Storage Issues in the Cloud
Object Storage
Management Plane
Management of Cloud Computing Risks
Risk Assessment and Analysis
Cloud Attack Vectors
Countermeasure Strategies Across the Cloud
Continuous Uptime
Automation of Controls
Access Controls
Physical and Environmental Protections
Key Regulations
Examples of Controls
Protecting Data Center Facilities
System and Communication Protections
Automation of Configuration
Responsibilities of Protecting the Cloud System
Following the Data Lifecycle
Virtualization Systems Controls
Managing Identification, Authentication, and Authorization in the Cloud Infrastructure
Managing Identification
Managing Authentication
Managing Authorization
Accounting for Resources
Managing Identity and Access Management
Making Access Decisions
The Entitlement Process
The Access Control Decision-Making Process
Risk Audit Mechanisms
The Cloud Security Alliance Cloud Controls Matrix
Cloud Computing Audit Characteristics
Using a VM
Understanding the Cloud Environment Related to BCDR
On-Premises, Cloud as BCDR
Cloud Service Consumer, Primary Provider BCDR
Cloud Service Consumer, Alternative Provider BCDR
BCDR Planning Factors
Relevant Cloud Infrastructure Characteristics
Understanding the Business Requirements Related to BCDR
Understanding the BCDR Risks
BCDR Risks Requiring Protection
BCDR Strategy Risks
Potential Concerns About the BCDR Scenarios
BCDR Strategies
Location
Data Replication
Functionality Replication
Planning, Preparing, and Provisioning
Failover Capability
Returning to Normal
Creating the BCDR Plan
The Scope of the BCDR Plan
Gathering Requirements and Context
Analysis of the Plan
Risk Assessment
Plan Design
Other Plan Considerations
Planning, Exercising, Assessing, and Maintaining the Plan
Test Plan Review
Testing and Acceptance to Production
Summary
Review Questions
Notes
DOMAIN 4: CLOUD APPLICATION SECURITY
Introduction
Determining Data Sensitivity and Importance
Understanding the API Formats
Common Pitfalls of Cloud Security Application Deployment
On-Premises Does Not Always Transfer (and Vice Versa)
Not All Apps Are Cloud Ready
Lack of Training and Awareness
Lack of Documentation and Guidelines
Complexities of Integration
Overarching Challenges
Awareness of Encryption Dependencies
Understanding the Software Development Lifecycle Process for a Cloud Environment
Secure Operations Phase
Disposal Phase
Assessing Common Vulnerabilities
Cloud-Specific Risks
Threat Modeling
STRIDE Threat Model
Approved Application Programming Interfaces
Software Supply Chain (API) Management
Securing Open Source Software
Identity and Access Management
Identity Management
Access Management
Identity Repository and Directory Services
Federated Identity Management
Federation Standards
Federated Identity Providers
Federated SSO
Multifactor Authentication
Supplemental Security Devices
Cryptography
Tokenization
Data Masking
Sandboxing
Application Virtualization
Cloud-Based Functional Data
Cloud-Secure Development Lifecycle
ISO/IEC 27034-1
Organizational Normative Framework
Application Normative Framework
Application Security Management Process
Application Security Testing
Static Application Security Testing
Dynamic Application Security Testing
Runtime Application Self-Protection
Vulnerability Assessments and Penetration Testing
Secure Code Reviews
OWASP Recommendations
Summary
Review Questions
Notes
DOMAIN 5: OPERATIONS
Introduction
Modern Data Centers and Cloud Service Off erings
Factors That Aff ect Data Center Design
Logical Design
Physical Design
Environmental Design Considerations
Multivendor Pathway Connectivity
Implementing Physical Infrastructure for Cloud Environments
Enterprise Operations
Secure Configuration of Hardware: Specific Requirements
Best Practices for Servers
Best Practices for Storage Controllers
Network Controllers Best Practices
Virtual Switches Best Practices
Installation and Configuration of Virtualization Management Tools for the Host
Leading Practices
Running a Physical Infrastructure for Cloud Environments
Configuring Access Control and Secure Kernel-Based Virtual Machine
Securing the Network Configuration
Network Isolation
Protecting VLANs
Using TLS
Using DNS
Using IPSec
Identifying and Understanding Server Threats
Using Standalone Hosts
Using Clustered Hosts
Resource Sharing
Distributed Resource Scheduling/Compute Resource Scheduling
Accounting for Dynamic Operation
Using Storage Clusters
Clustered Storage Architectures
Storage Cluster Goals
Using Maintenance Mode
Providing HA on the Cloud
Measuring System Availability
Achieving HA
The Physical Infrastructure for Cloud Environments
Configuring Access Control for Remote Access
Performing Patch Management
The Patch Management Process
Examples of Automation
Challenges of Patch Management
Performance Monitoring
Outsourcing Monitoring
Hardware Monitoring
Redundant System Architecture
Monitoring Functions
Backing Up and Restoring the Host Configuration
Implementing Network Security Controls: Defense in Depth
Firewalls
Layered Security
Utilizing Honeypots
Conducting Vulnerability Assessments
Log Capture and Log Management
Using Security Information and Event Management
Developing a Management Plan
Maintenance
Orchestration
Building a Logical Infrastructure for Cloud Environments
Logical Design
Physical Design
Secure Configuration of Hardware-Specific Requirements
Running a Logical Infrastructure for Cloud Environments
Building a Secure Network Configuration
OS Hardening via Application Baseline
Availability of a Guest OS
Managing the Logical Infrastructure for Cloud Environments
Access Control for Remote Access
OS Baseline Compliance Monitoring and Remediation
Backing Up and Restoring the Guest OS Configuration
Implementation of Network Security Controls
Log Capture and Analysis
Management Plan Implementation Through the Management Plane
Ensuring Compliance with Regulations and Controls
Using an ITSM Solution
Considerations for Shadow IT
Operations Management
Information Security Management
Configuration Management
Change Management
Incident Management
Problem Management
Release and Deployment Management
Service-Level Management
Availability Management
Capacity Management
Business Continuity Management
Continual Service Improvement Management
How Management Processes Relate to Each Other
Incorporating Management Processes
Managing Risk in Logical and Physical Infrastructures
The Risk-Management Process Overview
Framing Risk
Risk Assessment
Risk Response
Risk Monitoring
Understanding the Collection and Preservation of Digital Evidence
Cloud Forensics Challenges
Data Access Within Service Models
Forensics Readiness
Proper Methodologies for Forensic Collection of Data
The Chain of Custody
Evidence Management
Managing Communications with Relevant Parties
The Five Ws and One H
Communicating with Vendors and Partners
Communicating with Customers
Communicating with Regulators
Communicating with Other Stakeholders
Wrap-Up: Data Breach Example
Summary
Review Questions
Notes
DOMAIN 6: LEGAL AND COMPLIANCE
Introduction
International Legislation Confl icts
Legislative Concepts
Frameworks and Guidelines Relevant to Cloud Computing
ISO/IEC 27017:2015 Information Technology—Security Techniques—Code of Practice for Information Security Controls Based on ISO/IEC 27002 for Cloud Services
Organization for Economic Cooperation and Development—Privacy and Security Guidelines
Asia-Pacific Economic Cooperation Privacy Framework4
EU Data Protection Directive
General Data Protection Regulation
ePrivacy Directive
Beyond Frameworks and Guidelines
Common Legal Requirements
Legal Controls and Cloud Service Providers
e-Discovery
e-Discovery Challenges
Considerations and Responsibilities of e-Discovery
Reducing Risk
Conducting e-Discovery Investigations
Cloud Forensics and ISO/IEC 27050-1
Protecting Personal Information in the Cloud
Differentiating Between Contractual and Regulated PII
Country-Specific Legislation and Regulations Related to PII, Data Privacy, and Data Protection
Auditing in the Cloud
Internal and External Audits
Types of Audit Reports
Impact of Requirement Programs by the Use of Cloud Services
Assuring Challenges of the Cloud and Virtualization
Information Gathering
Audit Scope
Cloud-Auditing Goals
Audit Planning
Standard Privacy Requirements (ISO/IEC 27018)
GAPP
Internal ISMS
The Value of an ISMS
Internal Information Security Controls System: ISO 27001:2013 Domains
Repeatability and Standardization
Implementing Policies
Organizational Policies
Functional Policies
Cloud Computing Policies
Bridging the Policy Gaps
Identifying and Involving the Relevant Stakeholders
Stakeholder Identification Challenges
Governance Challenges
Communication Coordination
Impact of Distributed IT Models
Clear Communications
Coordination and Management of Activities
Governance of Processes and Activities
Coordination Is Key
Security Reporting
Understanding the Implications of the Cloud to Enterprise Risk Management
Risk Profile
Risk Appetite
Difference Between the Data Owner and Controller the Data Custodian and Processor
SLA
Risk Mitigation
Risk-Management Metrics
Different Risk Frameworks
Understanding Outsourcing and Contract Design
Business Requirements
Vendor Management
Understanding Your Risk Exposure
Accountability of Compliance
Common Criteria Assurance Framework
CSA STAR
Cloud Computing Certification
Contract Management
Importance of Identifying Challenges Early
Key Contract Components
Supply Chain Management
Supply Chain Risk
CSA CCM
The ISO 28000:2007 Supply Chain Standard
Summary
Review Questions
Notes
APPENDIX A: ANSWERS TO REVIEW QUESTIONS
Domain 1: Architectural Concepts and Design Requirements
Domain 2: Cloud Data Security
Domain 3: Cloud Platform and Infrastructure Security
Domain 4: Cloud Application Security
Domain 5: Operations
Domain 6: Legal and Compliance Issues
Notes
APPENDIX B: GLOSSARY
APPENDIX C: HELPFUL RESOURCES AND LINKS
Index
EULA