Showing posts from February, 2021Show all
Understanding Dynamic Resource Allocation and Elasticity in Cloud Computing
Clustered Hosts
Secure Server Configuration
Uptime Institute's Data Center Site Infrastructure
Physical Design && Infrastructure
Application Security Testing
Supplemental Security Devices
Threat Modeling: Stride
Threat Modeling
OpenID Connect Process Flow
OpenID connect
SAML v2.0 Process Flow
Managing the IAAA in the cloud through Federations
Steps to Access Control
Organizational Normative Framework
The SDLC for the cloud
Multitenancy
Common pitfalls of cloud security application Deployment
Types of APIs
APIs
Determining Data sensitivity && Cloud Application Architecture
Data center operations
Physical location of cloud infrastructure
Backup and Recovery considerations
Physical and Environment controls && Redundancy
Post-incident review
Testing the Plan
Creating the BCP
Threat types && Strategy Risks
The Business Impact Analysis (BIA)
BCDR Scenarios
Virtualization systems Controls && IAAA in the cloud Infrastructure
Further Attack Vector && Countermeasures across the cloud
Legal
Cloud-specific Risks && Non-cloud-specific Risks
Policy and Organizational Risk && General Risk
Object Storage && Risk Assessment and Analysis in the cloud
Recommendation for Virtualization
Virtualization concerns
Securing the Guest OS
Software Defined Networking
Network Functionality
Physical Environment of the cloud Infrastructure
Policy controls for privacy and Data Protection
Domains of the CCM
CSA  Cloud Controls Matrix (CCM)
Integrity && Hashing && Digital signature
Redundancy && Data Protection policies: Retention
Service Level Agreements && Threats to Data storage:Denial of Service
Due Diligence and Due care
Data Privacy
Load More That is All