CCSP Cloud Slides
CCSP Cloud Slides
CCSP Cloud Slides
2
Domain 0
COURSE INTRODUCTION AND EXAM SPECIFICS
THE 6 DOMAINS OF CCSP
CISSP Course Syllabus:
Domain 0: Introduction and Exam Specifics
Domain 1: Architectural Concepts and Design Requirements
Domain 2: Cloud Data Security
Domain 3: Cloud Platform and Infrastructure
Domain 4: Cloud Application Security
Domain5: Operations
Domain 6: Legal and Compliance
4
EXAM REQUIREMENTS
EXAM SPECIFICS
Domain 1
ARCHITECTURAL CONCEPTS AND DESIGN
REQUIREMENTS
DOMAIN 1: ARCHITECTURAL CONCEPTS AND
DESIGN REQUIREMENTS INTRODUCTION
Separation of Duties
Training
Authentication and Authorization procedures
Vulnerability Assessments
Backup and Recovery processes
Logging
Data-retention control
Secure disposal
DATA RIGHTS MANAGEMENT
DRM or IRM (Information Rights Management) adds an extra
layer of access controls on top of the data object or
document and provides granularity flowing down to
printing, saving, copying and other options
ACLs are embedded into the file, it is agnostic to the
location of data. IRM will travel with the file
Useful for protecting sensitive organization content and
intellectual property
IRM CLOUD CHALLENGES
IRM requires that al users with access should have matching
encryption keys. This requires a strong and comprehensive
identity structure
Each user will need to be provisioned with an access policy and
keys
Access can be identity based or role based (RBAC)
Identity can be implemented with a single director location or
across federated trust
End users will likely have to install a local IRM agent for key
storage or authenticating and retrieval of protected information
Can be challenging with disparate systems and document
readers
DATA PROTECTION POLICIES: RETENTION
Data retention: Established protocol for keeping information for
operational or regulatory compliance needs.
Cloud considerations:
Legal, regulatory and standards requirements must be
well-documented and agreed upon
Data mapping should map all relevant data in order to
understand formats, data types and data locations
Data Classification based on locations, compliance
requirements, ownership and business usage
Each categorys procedures should be followed based on
appropriate policy that governs the data type
DATA PROTECTION POLICIES: DATA DELETION
https://www.owasp.org/index.php/About_OWASP
OWASP TOP TEN 2013
https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=OWASP_Top_10_for_2013
1. CODE INJECTION
Injection flaws, such as SQL, OS, and LDAP injection occur
when untrusted data is sent to an interpreter as part of a
command or query. The attackers hostile data can trick the
interpreter into executing unintended commands or
accessing data without proper authorization
2. BROKEN AUTHENTICATION &
SESSION MANAGEMENT
Application functions related to authentication and
session management are often not implemented
correctly, allowing attackers to compromise passwords,
keys, or session tokens, or to exploit other
implementation flaws to assume other users identities
3. XSS (CROSS SITE SCRIPTING)
XSS flaws occur whenever an application takes
untrusted data and sends it to a web browser without
proper validation or escaping. XSS allows attackers to
execute scripts in the victims browser which can hijack
user sessions, deface web sites, or redirect the user to
malicious sites
4. INSECURE DIRECT OBJECT REFERENCES
Defined as an unauthorized user or process which can invoke
the internal functionality of the software by manipulating
parameters and other object values that directly reference this
functionality. Issues resulting include:
Data disclosure
Privilege escalation
Authentication and authorization checks bypass
Restricted resource access
5. SECURITY MISCONFIGURATIONS
https://www.owasp.org/index.php/Application_Threat_Modeling
THREAT MODELING: STRIDE
Threat Mitigation
Spoofing Authentication
Tampering Integrity Verification (Message Digests/CRCs)
Repudiation Non-Repudiation (Digital Signatures, Keys)
Information Disclosure Confidentiality Through Encryption
Denial of Service High Availability/Redundancy/Fault Tolerance
Escalation of Privilege Authorization
RISKS IN DESIGN
Code Reuse
Flaws vs. Bugs
Flaw: Inherent fault with the design of code
Bug: Implementation fault
Open vs. Closed Design
CONTROLS EVALUATION
Efficacy of Controls
Economy of Mechanism
Cost/Benefit Analysis
Psychological Acceptability
SUPPLEMENTAL SECURITY DEVICES
WAF Web Application Firewall is Layer 7 firewall that can
understand HTTP traffic and help prevent DoS attacks
DAM Database Activity Monitoring is a layer 7 monitoring device
that understands SQL commands and can limit code injection
XML Gateways transform how services and sensitive data are
exposed as APIs to developers and users and can implement
DLPs, antivirus and anti-malware
Firewalls can be configured across the SaaS, PaaS and IaaS
API Gateways filter APIs and can implement access control, rate
limiting, logging, metrics and filtering
APPLICATION SECURITY TESTING
SAST Static Application Security Testing: Whitebox test used to
determine structure and logic and to detect coding errors without
executing the code. Should be done early in the lifecycle
DAST Dynamic Application Security Testing is used with
applications in their running state and is considered a black-box
test
RASP Runtime Application Self Protection: enables applications to
protect themselves by identifying and blocking attacks in real time.
Unlike firewalls, which rely solely on network data to work, RASP
leverages the applications intrinsic knowledge of itself to accurately
differentiate attacks from legitimate traffic, stopping only malicious
traffic
DOMAIN 5 OPERATIONS
Physical and Environmental Controls for the Datacenter
Logical Cloud Infrastructure
Risk Assessments of Physical and Logical Infrastructure
PHYSICAL AND ENVIRONMENTAL DESIGN