CCSK

Course
Time
9 hours 59 minutes
Difficulty
Intermediate
CEU/CPE
10

Video Transcription

00:02
in this video, we're going over key points regarding securing cloud applications. Users and related cloud technologies pulling from domain 10 12 and 14
00:12
Cloud deployments are often Greenfield in nature. That's provides you with an opportunity to re evaluate the processes you follow, develop software and ensure that security is baked into it. It starts with secure design and development. Of course. Training your developments draft training in the support staff to incorporate to secure design principles
00:32
such as threat modelling,
00:33
creating entitlement, matrixes when they're building the systems.
00:37
And from that point, you have secured employment. This is the pipeline taking your changes from development through Q A and into the eventually the production environments. This is a great opportunity to integrate human based code reviews, automated security checkers, static application, security analysis, duct about
00:54
dynamic application, security analysis, vulnerability assessments.
00:58
All of these methods should be configured toe work in the cloud environment, but also test concerns that you have specific to cloud platforms such as stored AP I credentials or hard coded passwords.
01:08
And finally we get to the secure operation. This is where you ensure you have good traceability. If you're using infrastructures, code change management can be realized not just at the application layer, but all the way through the infrastructure itself, which is being defied and clothed, making sure you've incorporated external perimeter defences such as Web application firewalls.
01:29
And you have ongoing monitoring and assessments taking place.
01:32
Application security changes in the cloud by starters. There's a higher baseline of security just by the beer nature of motivations that the providers have to make sure what they're delivering is secure.
01:44
You have a P eyes. In fact, you can be more easily create isolated environments by creating completely separate cloud accounts for your development environment versus your production environment. So if
01:53
one gets penetrated or compromised in some way, it doesn't have a ripple effect. And from within each subscription, you can further isolate. The cloud. Resource is leveraging micro segmentation.
02:04
You have great amounts of elasticity. You have the whole dev ops paradigm to incorporate into your application security.
02:10
Some of the challenges, though, where the limited visibility that you get you don't manage the full stack. The physical stack. You don't quite see some of the traditional models and methods for monitoring applications, monitoring network security and so forth. They don't apply in the cloud paradigm.
02:25
The threat models around you are constantly changing because you are in a shared responsibilities model.
02:31
So there's a variety of dependencies is the provider continues to upgrade things and alter things without your direct knowledge? Spend a good deal of time talking about identity management, making sure you have a formalized plan for how you're going to manage identities in a cloud. Environment Federation is a key technique to extend your identity management capabilities well outside your walls,
02:52
working within integrating with other cloud providers.
02:53
In doing so across the broad Internet networks identity broker, the hub and spoke model is definitely a preferred approach and cloud hosted services for identity access management can sink with your on premise. Authoritative services to support backwards compatibility with corporate systems you've used to manage identities in a pre cloud world,
03:14
a suite of responsibilities are shared between the provider and the customer. When we're dealing with access management in the cloud
03:20
provider needs to have basic capabilities in place. They need to make sure that their cloud plane at the least and management infrastructures are enforcing the authorization and access controls that you as a consumer are going to configure. And it's also very helpful and powerful if the provider
03:35
can not just support the concept of role based access control but include attribute based access control, allowing you to define and configure entitlements
03:43
and prerequisites that could be a little bit more situational e specific. For example, if somebody is logging in to perform administrative actions outside of your corporate network may require multi factor authentication, whereas if they're within the corporate network, you're gonna allow them to perform those different actions without requiring multi factor authentication
04:00
and finalize the summary of identity access management. We talked about
04:04
all the different kind of protocols that are out there, and there really are no magical protocols. You need to determine the protocols you support. You need to understand the protocols that the cloud provider supports and then examine your particular use cases in the constraints to define what is the right protocol to use to manage identities in a distributed cloud paradigm

Up Next

CCSK

This course prepares you to take the CCSK certification by covering material included in the exam. It explains how the exam can be taken and how CCSK certification process works.

Instructed By

Instructor Profile Image
James Leone
Cloud, IoT & DevSecOps at Abbott
Instructor