CCSK

Course
Time
9 hours 29 minutes
Difficulty
Intermediate
CEU/CPE
10

Video Transcription

00:04
So let's recap what we learned in this module. We talked about the three V's high volume, high velocity and high variety. The three distributed components distributed collection, distributed, storage and distributed processing. Then we discuss big data platforms and the security considerations in architect ING and building data platforms.
00:24
We examined server lis and its various security considerations.
00:28
We took a good dive into the basics of Internet of things, defining it as well of unique security considerations there. And and we finished off by examining mobile security specifically as it relates to mobile devices interacting with the cloud. We saw a lot of overlap between that set of considerations and those in the I O. T.
00:49
And let's test some your knowledge things you've learned in this module and maybe even past related modules. Which of the following should be considered your primary security control for a P I security encryption logging certificate, pinning access controls and fail over.
01:06
So the answer is D access controls. Keep that in mind. We discussed it earlier. Access controls are going to be your first line of security and prevention. They're not gonna be your Onley point of security applying defense and depths. They're gonna have many different layers. But it really does start with access control, defining the entitlement matrices and being very clear
01:26
who can do what under which circumstances
01:32
and continuing on when using a providers function as a service capability. Where are authorisation Rules of a function typically managed
01:42
in the management plane
01:42
in the function code itself, in the database connection strings or in a Federated identity broker.
01:49
And to be clear, we're talking about a providers function as a service capabilities. So the answer in this case is going to be the management plane. You'll be defining the access controls. The function will have its own principal. It'll have an identity of itself, and you need to define what other assets and resource is.
02:07
Can this function interact with? Can had cocked to. Databases can talk to
02:10
storage blobs. Can I talk to additional services and functions and invoke them? A lot of that is gonna be defined in the management plane.
02:21
We heard this term several times in the videos. What is certificate pinning a k a. Cert. Pinning
02:27
is it installing a certificate on a device? Is its storing a certificate in an open certificate registry that can be used for validation.
02:36
Is it associating? Ah, host with the certificate or is it all of the above? So the answer is all the above as it involves several different steps. Keep in mind the goal of this is to limit communication between your device or the application running on the device. And the resource is that can be trusted running in the cloud. And so this assert pinning process is what allows you to do this
02:55
getting there and implementing It has numerous different steps
02:59
which are outlined here.
03:04
Which of the following would not be considered a component of a big data system distributed collection, distributed storage, distributed security or distributed processing. Reviewed this in the module summary and the answer is C distributed security. That is not a component of a big data system.
03:23
Distributed collection, distributed storage and distributing
03:25
processing are the three major components of a big data system that wraps it up for this model that wraps it up for the different domains of the C s. A guidance. We're gonna continue on with a few more modules, but I just encourage you to hang in there. You've worked so hard. We've covered so much material in the last few hours.
03:44
You're almost there to get to that point where you're equipped to take the CCS k exam
03:49
and obtain your CCS case certification.

Up Next

CCSK

This course prepares you to take the CCSK certification by covering material included in the exam. It explains how the exam can be taken and how CCSK certification process works.

Instructed By

Instructor Profile Image
James Leone
Cloud, IoT & DevSecOps at Abbott
Instructor