Time
9 hours 48 minutes
Difficulty
Intermediate
CEU/CPE
10

Video Transcription

00:00
okay. The counter measures that we talked about here shouldn't surprise you. These air just foundational principles of network security
00:09
layer defense. There is no one device that will protect your network. So when we think, well, your defense, we think of a series of controls protecting our resource is we'll think about physical controls, technical controls, administrative controls and making sure that we're not again that phrase Putting all your eggs in one basket.
00:28
I just spent $50,000 on a firewall. Well, that's fine.
00:33
But there are a 1,000,000 other elements that that firewall can't be guaranteed to protect against so
00:40
layer defense. Redundancy, redundancy, redundancy and not just redundancy. Comprehensive redundancy. Backups for data redundancy, Raid for hard driver done and see cluster for server redundancy, multiple links for physical
00:56
network, redundancy and on and on that comprehensive
01:00
redundancy of all the elements,
01:03
automation of controls could be referred to his orchestration of controls. Again, This could be a double edged sword because when you take the human element away, you minimize the possibility of mistake or you minimize the human, you know, element there. But
01:22
any time you're allowing systems to communicate and do things without any sort of human interaction. Um,
01:29
there's the opportunity for spoofing There's the opportunity for modification that might go on detected. So we think about both those elements. But when we can automate we do, I don't mean we do it blindly. Um, you know, we image systems.
01:48
Why? Because it saves us a ton of time in an insurer's consistency. And insurers
01:53
security. Um, we do things in batches. We let the batches run. But of course, before we turn on the automation of the feature, we test and we check, and we insure that what's being automated is done. So probably
02:08
access controls. Talked about those
02:12
cloud service provider needs access controls for their physical location. They're hyper visor. Those elements we need access control for the elements that are ours that are gonna be accessed through the cloud. A so same counter measures that you think about for network security again. These are
02:31
as important or even more so when you're looking at clouds porch

Up Next

Certified Cloud Security Professional (CCSP)

This Certified Cloud Security Professional (CCSP) certification course covers topics across six domains, to ensure the candidate has a wide range of competencies and is capable in the assessment and implementation of cloud service solutions.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor