CCSP Domain 5 Quick Recap/Review| Cloud Security Operations| CCSP Full Crash Course | CCSP Training

แชร์
ฝัง
  • เผยแพร่เมื่อ 4 ส.ค. 2024
  • Website: cyberplatter.com/
    Discord Channel: / discord
    ISC2 CCSP Exam Outline: www.isc2.org/Certifications/c...
    CCSP Review/Recap Playlist: • CCSP Domain 1 Quick Re...
    Domain 5: Cloud Security Operations
    5.1 Implement and build physical and logical infrastructure for cloud environment
    • Hardware Specific security configuration requirements (e.g., BIOS settings for virtualization and TPM, storage controllers, network controllers)
    • Installation and configuration of virtualization management tools
    • Virtual hardware specific security configuration requirements (e.g., network, storage, memory, CPU)
    • Installation of guest Operating System(OS) virtualization toolsets
    5.2 Operate physical and logical infrastructure for cloud environment
    • Configure access control for local and remote access (e.g., secure KVM, control-based access mechanisms, RDP)
    • Secure network configuration (e.g., VLAN, TLS, DHCP, DNS, VPN)
    • OS hardening through application of baselines (e.g., Windows, Linux, VMware)
    • Availability of standalone hosts
    • Availability of clustered hosts (e.g., DRS, DO, storage clusters, maintenance mode, high availability)
    • Availability of guest OS
    5.3 Manage physical and logical infrastructure for cloud environment
    • Access controls for remote access (e.g., RDP, SSH)
    • OS baseline compliance monitoring and remediation
    • Patch management
    • Performance and capacity monitoring (e.g., Network, compute, storage, response time)
    • Hardware monitoring (e.g., Disk, CPU, fan speed, temperature)
    • Configuration of host and guest OS backup and restore functions
    • Network security controls (e.g., Firewalls, IDS, IPS, honeypots, vulnerability assessments, network security groups)
    • Management plane (e.g., scheduling, orchestration, maintenance)
    5.4 Implement operational controls and standards (ITIL, ISO/IEC 20000-1)
    • Change management
    • Continuity management
    • Information security management
    • Continual service improvement management
    • Incident management
    • Problem management
    • Release management
    • Deployment management
    • Configuration management
    • Service level management
    • Availability management
    • Capacity management
    5.5 Support Digital Forensics
    • Forensic data collection methodologies
    • Evidence management
    • Collect, acquire and preserve digital evidence
    5.6 Manage communication with relevant parties
    • Vendors
    • Regulators
    • Customers
    • Partners
    • Other stakeholders
    5.7 Manage security operations
    • Security Operations Center (SOC)
    • Monitoring of security controls (e.g., firewalls, IDS, IPS, honeypots, vulnerability assessments, network security groups)
    • Log capture and analysis (e.g., SIEM, log management)
    • Incident management

ความคิดเห็น •