CCSP Domain 2: Cloud Data Security - PowerPoint PPT Presentation

About This Presentation
Title:

CCSP Domain 2: Cloud Data Security

Description:

The CCSP is a globally recognized certification that represents the pinnacle of cloud security knowledge. It was co-created by (ISC)2 and the Cloud Security Alliance (CSA), two of the most respected information security and cloud computing security organizations. – PowerPoint PPT presentation

Number of Views:135

less

Transcript and Presenter's Notes

Title: CCSP Domain 2: Cloud Data Security


1
CCSP Domain 2 Cloud Data Security
www.infosectrain.com sales_at_infosectrain.com
2
CCSP The CCSP is a globally recognized
certification that represents the pinnacle of
cloud security knowledge. It was co-created by
(ISC)2 and the Cloud Security Alliance (CSA), two
of the most respected information security and
cloud computing security organizations. This
certification meets the increasing demand for
trained and certified Cloud Security
Professionals. A CCSP demonstrates competence in
Cloud Security architecture, design, operations,
and service orchestration by applying information
security expertise to a Cloud computing
environment. This professional competence is
assessed against a body of knowledge that is
globally recognized.
www.infosectrain.com sales_at_infosectrain.com
3
www.infosectrain.com sales_at_infosectrain.com
4
Domains of CCSP
www.infosectrain.com sales_at_infosectrain.com
5
  • CCSP comprises a total of six domains
  • Domain 1 Cloud Concepts, Architecture and
    Design (17)
  • Domain 2 Cloud Data Security (19)
  • Domain 3 Cloud Platform Infrastructure
    Security (17)
  • Domain 4 Cloud Application Security (17)
  • Domain 5 Cloud Security Operations (17)
  • Domain 6 Legal, Risk, and Compliance (13)

In this blog, we will cover the second domain
Cloud Data Security. https//youtu.be/6Y1n6kI1MHM
www.infosectrain.com sales_at_infosectrain.com
6
  • Cloud Data Security
  • The second domain of CCSP, Cloud Data Security,
    is the most crucial domain as it covers the
    central part of the CCSP exam. It holds a
    weightage of 19. It mainly focuses on
  • Describing Cloud Data Concepts
  • Designing and Implementing Cloud Data Storage
    Architecture
  • Designing and Applying Data Security Technologies
    and Strategies
  • Implementing Data Discovery
  • Implementing Data Classification
  • Designing and Implementing Information Rights
    Management (IRM)





www.infosectrain.com sales_at_infosectrain.com
7
  • Understanding the Cloud Data Lifecycle
  • In this, we understand the different phases of
    data during its lifecycle. They are mainly
    referred to as CSUSAD, which stands for Create,
    Store, Use, Share, Archive, and Destroy. Data can
    be found in three states
  • Data in Transit (DIT)
  • Data in Use (DIU)
  • Data at Rest (DAR)
  • In order to ensure security in these phases, we
    must be aware of the organization mapping of the
    different stages of a Data Life Cycle. The Cloud
    Security Alliance (CSA) is one of the two
    developers of the CCSP that offers guidance
    regarding the Cloud Data Lifecycle. The
    candidates who want to pursue CCSP certification
    must be familiar with the Cloud Data Lifecycle
    phases and the data protection tools used to
    execute them. Along with Data Lifecycle, Data
    Dispersion also falls under this category, which
    is used for redundancy and robustness.





www.infosectrain.com sales_at_infosectrain.com
8
Designing and Implementing Cloud Data Storage
Architectures In this section, we learn about
the different types of Cloud Storage Services
available that vary across the service model.
This portion of the CCSP is devoted to all facets
of cloud storage. To be prepared, you must
understand the various types of storage
(long-term, ephemeral, and raw-disk), and the
kinds of storage we use in SaaS, PaaS, and IaaS,
respectively. We learn about the advantages and
drawbacks of these storage services. Also, we
understand the possible threats to each type of
storage (unauthorized access, unauthorized usage,
liability due to regulatory non-compliance, etc.)
and how to address and mitigate these threats
using encryption and other technologies.




www.infosectrain.com sales_at_infosectrain.com
9
  • Designing and Applying Data Security Strategies
  • This is the most crucial part from the exam point
    of view. In this section, we understand the
    various data-protection resources available and
    how to use them. We learn about
  • Encryption and Key management Symmetric and
    Asymmetric Encryption, ECC, RSA, AES
  • Hashing
  • Masking Static and Dynamic Masking
  • Tokenization
  • Data Loss Prevention (DLP)
  • Data Obfuscation
  • Data De-identification and modern and evolving
    cryptography-related technologies.
  • https//www.infosectrain.com/courses/ccsp-certific
    ation-training/





www.infosectrain.com sales_at_infosectrain.com
10
  • Understanding and Implementing Data
    Classification Techniques
  • In this section, we understand the different
    methods to find data within a cloud environment
    and how to classify data properly. It is about
    analyzing the data value based on the criticality
    and sensitivity of data. We learn about
  • Mapping It involves mapping the sensitive data
    and the security controls deployed to guard.
  • Labeling It provides visibility to the data.
  • Sensitive Data It includes PHI, PII, Card Holder
    data, etc.





www.infosectrain.com sales_at_infosectrain.com
11
  • Understanding and Implementing Data Discovery
  • This section opens up a landscape of the
    possibility of enterprise collaborations that is
    enabled by sharing data and analytics. In this
    section, we understand the different types of
    data discovery approaches. We learn about
  • Structured Data
  • Unstructured Data
  • Designing and Implementing Relevant
    Jurisdictional Data Protections for Personally
    Identifiable Information (PII)
  • Personal Identifiable Information (PII) is a
    category of data that is commonly-regulated. In
    this section, we understand the major data
    privacy laws, conduct data discovery, identify
    the data discovered, and chart, define, and apply
    security controls to protected data.





www.infosectrain.com sales_at_infosectrain.com
12
  • Designing and Implementing Information Rights
    Management (IRM)
  • In this section, we understand the technology for
    managing user access to various data. This
    includes being familiar with the controlling of
    data movement in the Cloud. You need to
    understand the difference between Enterprise DRM
    and Consumer DRM. We learn about
  • Objectives Data Rights, Provisioning, Access
    Models, etc.
  • Appropriate Tools Issuing and Revocation of
    Certificates





www.infosectrain.com sales_at_infosectrain.com
13
  • Designing and Implementing Data Retention,
    Deletion, and Archiving Policies
  • Data is moved to long-term storage after
    completion of its lifecycle. Data preservation,
    deletion, and archiving policies are stringent in
    most corporate and legally protected data. Due to
    the lack of physical control over the hardware
    where the data is stored, cloud environments can
    make these policies more difficult to implement.
    In this section, we understand data retention,
    deletion, and archiving practices, processes, and
    mechanisms. We learn about
  • Data Retention Policies
  • Data Deletion Procedures and Mechanisms
  • Data Archiving Procedures and Mechanisms
  • Legal Hold





www.infosectrain.com sales_at_infosectrain.com
14
  • Designing and Implementing Auditability,
    Traceability, and Accountability of Data Events
  • In this section, we cover all aspects of event
    management, including identifying event sources,
    recording events, storing events, and constantly
    improving the process. The section also concerns
    chain of custody and ensuring that collected data
    is non-repudiable. We learn about
  • Definition of Event Sources and Requirement of
    Identity Attribution
  • Logging, Storage, and Analysis of Data Events
  • Chain of Custody and Non-repudiation





www.infosectrain.com sales_at_infosectrain.com
15
CCSP with InfosecTrain You can opt for
the Certified Cloud Security Professional
(CCSP) for professional knowledge and an in-depth
understanding of Cloud security. We are one of
the leading training providers with our well-read
and experienced trainers. The courses will help
you understand the basic concepts and provide a
sound knowledge of the subject. This
certification will indeed merit each penny and
minute you will invest.




www.infosectrain.com sales_at_infosectrain.com
16
About InfosecTrain
  • Established in 2016, we are one of the finest
    Security and Technology Training and Consulting
    company
  • Wide range of professional training programs,
    certifications consulting services in the IT
    and Cyber Security domain
  • High-quality technical services, certifications
    or customized training programs curated with
    professionals of over 15 years of combined
    experience in the domain

www.infosectrain.com sales_at_infosectrain.com
17
Our Endorsements
www.infosectrain.com sales_at_infosectrain.com
18
Why InfosecTrain
Global Learning Partners
Access to the recorded sessions
Certified and Experienced Instructors
Flexible modes of Training
Tailor Made Training
Post training completion
www.infosectrain.com sales_at_infosectrain.com
19
Our Trusted Clients
www.infosectrain.com sales_at_infosectrain.com
20
(No Transcript)
21
Contact us
Get your workforce reskilled by our certified and
experienced instructors!
IND 1800-843-7890 (Toll Free) / US 1
657-221-1127 / UK 44 7451 208413
sales_at_infosectrain.com
www.infosectrain.com
Write a Comment
User Comments (0)
About PowerShow.com