Title: The Second Domain of CCSP: Cloud Data Security
1The Second Domain of CCSP Cloud Data Security
www.infosectrain.com sales_at_infosectrain.com
2CCSP The CCSP is a globally recognized
certification that represents the pinnacle of
cloud security knowledge. It was co-created by
(ISC)2 and the Cloud Security Alliance (CSA), two
of the most respected information security and
cloud computing security organizations. This
certification meets the increasing demand for
trained and certified Cloud Security
Professionals. A CCSP demonstrates competence in
Cloud Security architecture, design, operations,
and service orchestration by applying information
security expertise to a Cloud computing
environment. This professional competence is
assessed against a body of knowledge that is
globally recognized.
www.infosectrain.com sales_at_infosectrain.com
3www.infosectrain.com sales_at_infosectrain.com
4- Domains of CCSP
- CCSP comprises a total of six domains
- Domain 1 Cloud Concepts, Architecture and Design
(17) - Domain 2 Cloud Data Security (19)
- Domain 3 Cloud Platform Infrastructure
Security (17) - Domain 4 Cloud Application Security (17)
- Domain 5 Cloud Security Operations (17)
- Domain 6 Legal, Risk, and Compliance (13)
- In this blog, we will cover the second domain
Cloud Data Security. - https//www.youtube.com/watch?v6Y1n6kI1MHM
www.infosectrain.com sales_at_infosectrain.com
5- Cloud Data Security
- The second domain of CCSP, Cloud Data Security,
is the most crucial domain as it covers the
central part of the CCSP exam. It holds a
weightage of 19. It mainly focuses on - Describing Cloud Data Concepts
- Designing and Implementing Cloud Data Storage
Architecture - Designing and Applying Data Security Technologies
and Strategies - Implementing Data Discovery
- Implementing Data Classification
- Designing and Implementing Information Rights
Management (IRM)
www.infosectrain.com sales_at_infosectrain.com
6- Understanding the Cloud Data Lifecycle
- In this, we understand the different phases of
data during its lifecycle. They are mainly
referred to as CSUSAD, which stands for Create,
Store, Use, Share, Archive, and Destroy. Data can
be found in three states - Data in Transit (DIT)
- Data in Use (DIU)
- Data at Rest (DAR)
- In order to ensure security in these phases, we
must be aware of the organization mapping of the
different stages of a Data Life Cycle. The Cloud
Security Alliance (CSA) is one of the two
developers of the CCSP that offers guidance
regarding the Cloud Data Lifecycle. The
candidates who want to pursue CCSP certification
must be familiar with the Cloud Data Lifecycle
phases and the data protection tools used to
execute them. Along with Data Lifecycle, Data
Dispersion also falls under this category, which
is used for redundancy and robustness.
www.infosectrain.com sales_at_infosectrain.com
7Designing and Implementing Cloud Data Storage
Architectures In this section, we learn about
the different types of Cloud Storage Services
available that vary across the service model.
This portion of the CCSP is devoted to all facets
of cloud storage. To be prepared, you must
understand the various types of storage
(long-term, ephemeral, and raw-disk), and the
kinds of storage we use in SaaS, PaaS, and IaaS,
respectively. We learn about the advantages and
drawbacks of these storage services. Also, we
understand the possible threats to each type of
storage (unauthorized access, unauthorized usage,
liability due to regulatory non-compliance, etc.)
and how to address and mitigate these threats
using encryption and other technologies.
www.infosectrain.com sales_at_infosectrain.com
8Designing and Applying Data Security
Strategies This is the most crucial part from
the exam point of view. In this section, we
understand the various data-protection resources
available and how to use them. We learn
about Encryption and Key management Symmetric
and Asymmetric Encryption, ECC, RSA,
AES Hashing Masking Static and Dynamic
Masking Tokenization Data Loss Prevention
(DLP) Data Obfuscation Data De-identification and
modern and evolving cryptography-related
technologies.
www.infosectrain.com sales_at_infosectrain.com
9Understanding and Implementing Data
Classification Techniques In this section, we
understand the different methods to find data
within a cloud environment and how to classify
data properly. It is about analyzing the data
value based on the criticality and sensitivity of
data. We learn about Mapping It involves
mapping the sensitive data and the security
controls deployed to guard. Labeling It provides
visibility to the data. Sensitive Data It
includes PHI, PII, Card Holder data,
etc. Understanding and Implementing Data
Discovery This section opens up a landscape of
the possibility of enterprise collaborations that
is enabled by sharing data and analytics. In this
section, we understand the different types of
data discovery approaches. We learn
about Structured Data Unstructured Data
www.infosectrain.com sales_at_infosectrain.com
10Designing and Implementing Relevant
Jurisdictional Data Protections for Personally
Identifiable Information (PII) Personal
Identifiable Information (PII) is a category of
data that is commonly-regulated. In this section,
we understand the major data privacy laws,
conduct data discovery, identify the data
discovered, and chart, define, and apply security
controls to protected data. Designing and
Implementing Information Rights Management
(IRM) In this section, we understand the
technology for managing user access to various
data. This includes being familiar with the
controlling of data movement in the Cloud. You
need to understand the difference between
Enterprise DRM and Consumer DRM. We learn
about Objectives Data Rights, Provisioning,
Access Models, etc. Appropriate Tools Issuing
and Revocation of Certificates
www.infosectrain.com sales_at_infosectrain.com
11Designing and Implementing Data Retention,
Deletion, and Archiving Policies Data is moved
to long-term storage after completion of its
lifecycle. Data preservation, deletion, and
archiving policies are stringent in most
corporate and legally protected data. Due to the
lack of physical control over the hardware where
the data is stored, cloud environments can make
these policies more difficult to implement. In
this section, we understand data retention,
deletion, and archiving practices, processes, and
mechanisms. We learn about Data Retention
Policies Data Deletion Procedures and
Mechanisms Data Archiving Procedures and
Mechanisms Legal Hold
www.infosectrain.com sales_at_infosectrain.com
12Designing and Implementing Auditability,
Traceability, and Accountability of Data
Events In this section, we cover all aspects of
event management, including identifying event
sources, recording events, storing events, and
constantly improving the process. The section
also concerns chain of custody and ensuring that
collected data is non-repudiable. We learn
about Definition of Event Sources and
Requirement of Identity Attribution Logging,
Storage, and Analysis of Data Events Chain of
Custody and Non-repudiation
www.infosectrain.com sales_at_infosectrain.com
13CCSP with InfosecTrain You can opt for the
Certified Cloud Security Professional (CCSP) for
professional knowledge and an in-depth
understanding of Cloud security. We are one of
the leading training providers with our well-read
and experienced trainers. The courses will help
you understand the basic concepts and provide a
sound knowledge of the subject. This
certification will indeed merit each penny and
minute you will invest.
www.infosectrain.com sales_at_infosectrain.com
14About InfosecTrain
- Established in 2016, we are one of the finest
Security and Technology Training and Consulting
company - Wide range of professional training programs,
certifications consulting services in the IT
and Cyber Security domain - High-quality technical services, certifications
or customized training programs curated with
professionals of over 15 years of combined
experience in the domain
www.infosectrain.com sales_at_infosectrain.com
15Our Endorsements
www.infosectrain.com sales_at_infosectrain.com
16Why InfosecTrain
Global Learning Partners
Access to the recorded sessions
Certified and Experienced Instructors
Flexible modes of Training
Tailor Made Training
Post training completion
www.infosectrain.com sales_at_infosectrain.com
17Our Trusted Clients
www.infosectrain.com sales_at_infosectrain.com
18(No Transcript)
19Contact us
Get your workforce reskilled by our certified and
experienced instructors!
IND 1800-843-7890 (Toll Free) / US 1
657-221-1127 / UK 44 7451 208413
sales_at_infosectrain.com
www.infosectrain.com