3

Top Threats and Essential Cloud Security Concepts and Controls

In the last chapter, you studied cloud reference architectures, cloud service models, cloud deployment models, and their inherent capabilities. In this chapter, you will discuss security concepts that are relevant to cloud computing and review some of the common threats to cloud deployments. The chapter will introduce the most common control categories and control types necessary to secure data, network, and virtualization layers for cloud computing.

By the end of this chapter, you will be able to confidently answer questions on the following topics:

  • The CIA triad—confidentiality, integrity, and availability
  • Common threats to cloud deployments
  • Enterprise security control categories ...

Get CCSP (ISC)2 Certified Cloud Security Professional Exam Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.