Index

A

  • abuse of cloud services, scalability threat for, 23
  • acceptable risk for access, 91
  • acceptance strategy for risk, 127
  • access and access management
    • authentication, 24
    • authorization, 25, 68
    • business needs and acceptable risk, 91
    • data sets, 104
    • DRM policies, 53
    • federation, 104
    • granting, 104
    • IAM. See identity and access management (IAM)
    • missing function level access control, 14
    • object, 91
    • physical access points, 83
    • physical and logical controls, 104
    • process order, 25
    • sensitive information, 69
    • virtualization tools, 118
  • access control lists (ACLs), mapping to, 35
  • accidental errors
    • archives for, 56
    • BC/DR, 71
  • account credentials
    • revocation, 77
    • sharing, 21
  • accountability in IAM, 103
  • accounts for external vendors, 186
  • ACLs (access control ...

Get (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.