Security as a Service

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Difficulty
Intermediate
Video Transcription
00:01
>> In this module, we'll be going over Domain 13,
00:01
security as a service.
00:01
We'll begin by defining what that
00:01
is and its characteristics,
00:01
we'll review the major benefits and
00:01
concerns that it brings,
00:01
and then finish off reviewing
00:01
the major categories of security as a service offerings.
00:01
From here till the end of the video,
00:01
we're going to cover the definition and then some of
00:01
the key characteristics of security as a service.
00:01
Security as a service,
00:01
also abbreviated as SECaaS.
00:01
It is delivered as a Cloud service.
00:01
This can be delivered by specialized Cloud providers,
00:01
specific SaaS type solutions or PaaS solutions.
00:01
It's often bundled as a service and
00:01
capability with major Cloud providers such as AWS,
00:01
Azure, GCP and so forth.
00:01
It can be used to secure either Cloud environments,
00:01
on-premise environments, or hybrid environments.
00:01
It itself runs in the Cloud,
00:01
but you can use it to secure a variety of paradigms.
00:01
Some of the key characteristics of SECaaS.
00:01
It is a security product delivered as a Cloud service.
00:01
So once again, a Cloud service, a SaaS offering.
00:01
It's not infrastructure as a service.
00:01
It's not a physical appliance.
00:01
There are physical appliances that do security,
00:01
those would not fall into the category of SECaas.
00:01
It really needs to meet
00:01
the essential NIST characteristics.
00:01
If you don't recall, we actually discussed
00:01
the NIST characteristics back in Domain 1.
00:01
I have an image here at the bottom of the slide,
00:01
outline the deployment models,
00:01
the delivery methods, and then
00:01
of course those essential characteristics, on-demand,
00:01
self-service, ubiquitous network access
00:01
also considered broad network access,
00:01
rapid elasticity, location independent resource pooling,
00:01
and it's a measured service.
00:01
The more you use, the more you pay,
00:01
the less you use, the less you pay.
00:01
That was a quick video,
00:01
but let's go ahead and have a quiz.
00:01
Where is enforcement of
00:01
SECaaS security policies most likely to occur?
00:01
On a physical appliance
00:01
attached to your private corporate network?
00:01
On infrastructure managed by the SECaaS provider,
00:01
on a virtual application running in
00:01
your IaaS environment that you manage?
00:01
Give it a thought and the answer is B.
00:01
Remember the key thing, it is Cloud-based, so yes,
00:01
there are physical appliances you can connect
00:01
to your network that will provide security.
00:01
But the key thing in B is
00:01
its infrastructure managed by the SECaaS provider.
00:01
That's a key characteristic of software as a service.
00:01
This is a software service.
00:01
To summarize this video,
00:01
we went over the definition of SECaaS
00:01
and covered some of the key characteristics of it.
Up Next
Benefits and Concerns
Major Categories
Domain 13 Knowledge Recap
Related Technologies
IoT and Mobile