Course 2 Resources and Citations
Course 2 Resources and Citations
1
Use existing frameworks to demonstrate compliance
Citations
● Holladay, H.G. (2022, November 21). How to write a cloud security policy for your
business. Kirkpatrick Price Blog.
● SCA Editor. (2020, September 9). What are the 5 domains of the NIST cybersecurity
framework? SCA security.
● Sharma, V. (2024, January 18). CCSP domains: Requirements for CCSP qualification.
Knowledgehut blog.
● Skoutaris, E.(2020, October 16). What is the cloud controls matrix (CCM)? Cloud
Security Alliance blog.
2
Explore compliance and security
● Coretelligent. (2023, May 19). Security vs. Compliance: Differences & similarities (2023).
● Cyber Risk Management. (2023, November). Security vs. compliance: What’s the
difference? Trava Security blog.
● Miller, A. (2021, June 25). IT security vs IT compliance: What’s the difference? Security &
Compliance blog.
● Exabeam. (n.d.). Cloud security controls: Key elements and 4 control frameworks.
● Joint Task Force. (2020, September). Security and privacy controls for information
systems and organizations (Special Publication 800-53r5). National Institute of
Standards and Technology.
3
Risk and compliance
● Cyber Risk Management. (2023, November). Security vs. compliance: What’s the
difference? Trava Security blog.
● SecurityScorecard. (2021, August 25). Compliance vs risk management: What you need
to know.
● Plutora. (2020, September 8). People, process, technology: The PPT framework,
explained.
● PCI DSS “©2006-2023 PCI Security Standards Council, LLC. All Rights Reserved."
● Yawn, A.J. (2022, January 24). SOC 2 Trust Services Categories. SANS Institute.
● Exabeam. (n.d.). Cloud security controls: Key elements and 4 control frameworks.
4
Explore steps to implement security controls
● Google Cloud. (2020, February 5). Enforce uniform MFA to company-owned resources.
● Shah, J. (2019, December 9). What to do, and How to do it — 5 Steps to Implementing IT
Security Controls. Medium.
5
Learn more about data protection and privacy regulations
● PIPEDA in brief
● ISO standards
6
● PIPEDA legislation and related regulations
● Center for Internet Security: New CIS Benchmark for Google Cloud Computing
Platform
7
Citations
● Kosutic, D. (n.d.). What is ISO 27001? A quick and easy explanation. Advisera.
● National Institute of Standards and Technology. (2023, December 13). NIST Risk
Management Framework. Computer Security Resource Center.
● AICPA & CIMA. (n.d.). SOC 2® - SOC for service organizations: Trust services criteria.
● Stevenson, R. (2022, August 26). Risk Management Framework (RMF): Overview + Best
Practices. Drata.
● National Institute of Standards and Technology. (2021, May 14). Examples of framework
profiles. NIST Cybersecurity Framework.
● Hansen, R. & Venables, P. (2023, June 8). Introducing Google’s secure AI framework.
Google blog.
● TutorialsPoint. (2022, March 22). Distinguish between data privacy and data protection.
● Klosowski, T. (2021, September 6). The State of Consumer Data Privacy Laws in the US
(And Why It Matters). Wirecutter.
8
Data protection and privacy scenarios
● National Institute of Standards and Technology. (2019, April 30). NIST Privacy
Framework: An enterprise risk management tool (Discussion Draft).
● Centers for Disease Control and Prevention. (2022, June 27). Health insurance
portability and accountability act of 1996 (HIPAA). Public Health Professionals Gateway.
● Gorman, J., & Redding, J. (2023, February 21). FedRAMP is law! So what? Infusion Points.
● Hartwig, B. (2021, May 20). CCPA vs CalOPPA: Which one applies to you and how to
ensure data security compliance. Infosec.
● Nadeau, M. (2020, June 12). General Data Protection Regulation (GDPR): What you need
to know to stay compliant. CSO Online.
● The Office of the National Coordinator for Health Information Technology. (n.d.). Guide
to privacy and security of health information. HealthIT.
● Centers for Disease Control and Prevention. (2022, June 27). Health insurance
portability and accountability act of 1996 (HIPAA). Public Health Professionals Gateway.
● Gorman, J., & Redding, J. (2023, February 21). FedRAMP is law! So what? Infusion Points.
● Hartwig, B. (2021, May 20). CCPA vs CalOPPA: Which one applies to you and how to
ensure data security compliance. Infosec.
● Nadeau, M. (2020, June 12). General Data Protection Regulation (GDPR): What you need
to know to stay compliant. CSO Online.
9
● The Office of the National Coordinator for Health Information Technology. (n.d.). Guide
to Privacy and Security of Health Information. HealthIT.
● de Groot, J. (2023, May 8). What is PCI compliance? 12 requirements & more. Digital
Guardian.
● Gallop, D. (n.d.). PCI DSS compliance levels and requirements for your business.
Carbide Secure blog.
● PCI security standards council. (n.d.). Official PCI Security Standards Council site.
● PCI Security Standards Council. (2018, July). PCI DSS quick reference guide:
Understanding the payment card industry data security standard version 3.2.1.
● Scurti, H. (2022, October 4). Level 1 PCI compliance: What it is & what you need to know.
EBizCharge.
10
Module 3: The compliance lifecycle
Resources
● Google Cloud: Three security and scalability improvements for Cloud SQL for SQL
Server
● AICPA & CIMA: System and Organization Controls: SOC Suite of Services
11
Citations
● PCI Security Standards Council. (2008) Getting started with PCI data security standard.
● Silveira, P., Rodriguez, C., Birukou, A., Casati, F., Daniel, F., D’Andrea, V., Worledge, C.,
and Taheri, Z. (2011). Aiding compliance governance in service-based business
processes. Researchgate. 10.4018/978-1-61350-432-1.ch022.
● Baykara, S. (2021, December 9). Cloud security controls: What you need to know. PCI
DSS GUIDE.
● Davies, K. (2022, August 24). Cloud Controls Matrix: How to secure your journey to the
cloud. Contino.
● PCI Security Standards Council. (n.d.). Official PCI security standards council site.
● Sahoo, N. (2021, June 15). What are compensating controls in PCI DSS? Payments
Journal.
Control mapping
● MITRE Engenuity: Center for Threat Informed Defense. (n.d.). Google Cloud Platform
security control mappings to MITRE ATT&CK®.
12
Review a compliance report
● Ross, W. L., & Copan, W. (2020, September). Security and privacy controls for
information systems and organizations (NIST Special Publication 800-53, Rev. 5).
National Institute of Standards and Technology.
● Finney, J. (2022, November 9). Cloud compliance audits: What you need to know.
Linford & Co. LLP Blog.
● TeamMate. (2022, November 30). How to audit the cloud: 4 tips to help internal auditors
get started. Wolters Kluwer.
● Varghese, J. (2023, October 23). All you need to know about Security Audit Report.
Astra Blog.
● RSI Security (2022, September 19). Best practices for auditing the cloud. RSI Security
Blog.
13
Cloud security control inheritance
● Ford, J. (2022, September 27). What is compliance inheritance? Project Hosts: Security
Compliant Clouds.
● Tracy, R. (2020, May 5). Control Inheritance – Easing the burden of compliance and
reducing audit fatigue. Telos Corporation Blog.
● Google Cloud. (2023, August 8). Google Cloud Architecture Framework: Security,
privacy, and compliance.
● Google Cloud. (2024, January 22). Using resource hierarchy for access control.
● Google Cloud. (2024, January 22). Introduction to the Organization Policy Service.
● Arcserve. (2023, December 20). 7 most infamous cloud security breaches. Arcserve
Cybersecurity Blog.
● Cybersecurity and Infrastructure Security Agency, United States Digital Service, &
Federal Risk and Authorization Management Program. (2022, June). Cloud security
technical reference architecture.
14
Policy as code and infrastructure as code
● Ross, W. L., & Copan, W. (2020, September). Security and privacy controls for
information systems and organizations (Special Publication 800-53, Rev. 5). National
Institute of Standards and Technology.
Vulnerability management
15
Cloud security management (CSPM) resources
● Gartner Peer Insights: Cloud security posture management tools reviews and ratings
Guide to Guide to risk assessment and compliance management with Security Command
Center
16
Digital sovereignty and sovereign clouds
● Interview Warmup
Citations
● National Institute of Standards and Technology. (2023, April 21). Getting started.
17
Vulnerability management
● RSI Security. (2023, May 29). Comparing vulnerability management frameworks. RSI
Security Blog.
● Goldstein, E. (2021, September 7). Cloudy with a chance of migration: Helping agencies
make the move to the cloud. Cybersecurity & Infrastructure Security Agency.
● Google Cloud Tech. (2022, October 7) How to detect threats in your Google Cloud
environment with Security Command Center [Video]. YouTube.
● Google Cloud Tech. (2022, October 10) Getting started with Security Command Center
[Video]. YouTube.
● Horev, R. (2021, July 29). 5 GCP security tools you should know about. Vulcan Cyber
Blog.
18
Security Command Center, Risk Manager, Policy Analyzer, Assured Workloads
● Center for Internet Security. (n.d.). New CIS benchmark for Google Cloud Computing
Platform.
Guide to risk assessment and compliance management with Security Command Center
19
Understand Google Cloud’s Risk Protection Program
● Google Cloud Tech. (2022, October 24). What is the risk protection program? [Video].
YouTube.
● Munich RE. (n.d.). Cloud protection +: Innovative cyber insurance solution for Google
Cloud customers.
● Venables, P. & Potti, S. (2021, March 2). Announcing the Risk Protection Program: Moving
from shared responsibility to shared fate. Google Cloud Blog.
● Chuvakin, A. & Rosenblatt, S. (2023, March 22). Lessons from the future: Why shared
fate shows us a better cloud roadmap. Google Cloud Blog.
● Venables, P. & Potti, S. (2021, March 2). Announcing the Risk Protection Program: Moving
from shared responsibility to shared fate. Google Cloud Blog.
● Karlstad, W. (2022, April 19). Why sovereign cloud is a hot topic – 5 tips, and the
background. CIO.
● Google Cloud. (2024, January 22). Introduction to the Organization Policy Service.
20
Organization policy service
● Peacock, T. & Chuvakin, A. (Hosts). (2022, February 7). Policy intelligence: More fun and
useful than it sounds! [Audio podcast]. Cloud Security Podcast. (51).
● Google Cloud. (2021, November 5). Preventing security requirements violations with
Google Cloud [Video]. YouTube.
● Google Cloud. (2022, October 11). How Goldman Sachs bolstered their security posture
through policy management and controls [Video]. Youtube.
21