Is the customer always right? In restaurants and retail, perhaps. For enterprises in the cloud, as it turns out, not so much. According to Gartner, at least 95% of public cloud security failures between 2018 and 2022 will be the customer's fault, often due to insufficiently managing security technologies and policies. And that doesn't mean a secure cloud infrastructure is a myth, either. Over the same time period, public cloud IaaS workloads will experience approximately 60% fewer security incidents than those in traditional data centers, Gartner forecasts.
Regardless of what kind of cloud you're operating -- public, private or hybrid -- enterprises and cloud providers alike play a role in being able to secure cloud infrastructure and services. From the data's center front door to virtual machine hosts, informational security professionals need to be mindful of the various assets that must be well-protected. Domain 3 of the CCSP exam, “Cloud Platform & Infrastructure Security,” assesses your understanding of the physical and the virtual components of the cloud infrastructure and risk-management analysis, including tools and techniques necessary for maintaining a secure cloud infrastructure.
This SearchSecurity Security School, based on (ISC)² CCSP training material, covers the fundamentals of Domain 3 of the exam. Once you've reviewed the content in this Security School about designing, building and managing secure cloud infrastructure, take the practice quiz to see how prepared you are for Domain 3 of the CCSP exam.
View our Security School Course Catalog to view more schools.
CCSP® is a registered mark of (ISC)².
Understanding how to secure cloud infrastructure
Avoiding vulnerabilities in the cloud is easier said than done, but it's not impossible. Learn about the defining characteristics of a secure cloud infrastructure, what goes into conducting proper cloud risk assessment and the essentials of cloud risk management.
There is no shortage of vulnerabilities in the cloud, but the same is true of any outsourcing arrangement. Practicing cloud risk management is essential to staying secure. Continue Reading
Just as there's no one way to infiltrate the cloud, there's no singular way to protect it. Cloud computing security controls incorporate facilities, personnel, processes and more. Continue Reading