CCSK

Course
Time
9 hours 29 minutes
Difficulty
Intermediate
CEU/CPE
10

Video Transcription

00:01
it is. Module will be going over domain. 13. Security as a service will begin by defining what that is and its characteristics, or view the major benefits and concerns that it brings
00:13
and then finish off reviewing the major categories of security as a service offerings.
00:17
From here till the end of the video, we're gonna cover the definition and then some of the key characteristics of security as a service.
00:25
So security as a service also abbreviated as second as it is delivered as a cloud service. And this could be delivered by specialized cloud providers, specific SAS type solutions or past solutions. And it's often bundled as a service and capability
00:42
with major cloud providers such as AWS,
00:45
azar, G, C, P and so forth. It could be used to secure either cloud environments
00:52
on premise environments or hybrid environments, so itself runs in the cloud. But you can use it to secure a variety of paradigms,
01:00
some of the key characteristics of sec ***.
01:03
It is a security product delivered as a cloud service, so once again, a cloud service kind of a SAS offering. It's not infrastructure as a service. It's not a physical appliance there are physical plants is that to security, those would not fall into the category of seconds. It really needs to meet the essential NIST characteristics.
01:21
And if you don't recall, we actually discussed the NIST characteristics back in domain one.
01:26
Do I have a image here? At the bottom of the slide outlined the deployment models, the delivery methods and then, of course, those essential characteristics on demand. Self service ubiquitous network access also considered broad network access. Rapid elasticity, location, independent resource pooling
01:45
and it's a measured service.
01:47
So the more you use, the more you pay, the less you use, the less you pay.
01:53
I was a quick video, but let's go ahead and have a quiz. Where is enforcement of seconds Security policies most likely to occur on a physical appliance attached to your private corporate network
02:07
on infrastructure managed by the seconds provider
02:10
on a virtual application. Running in your eyes environment that you manage. Give it a thought and the answer is B. Remember the key thing. It is cloud based, so yes, there are physical appliances. You can connect to your network that will provide security, but the key thing and be is its infrastructure
02:27
managed by the seconds provider. That's that's a key characteristic of software. As a service. This is a software service.
02:32
To summarize this video, we went over the definition of seconds and covered some of the key characteristics of it.

Up Next

CCSK

This course prepares you to take the CCSK certification by covering material included in the exam. It explains how the exam can be taken and how CCSK certification process works.

Instructed By

Instructor Profile Image
James Leone
Cloud, IoT & DevSecOps at Abbott
Instructor