Current Issues in Cloud Computing
Identify common weaknesses and gaps as well as understand security controls for defensible cloud security.
Businesses are already in the cloud for efficiency, processing power and ease of remote work. However, the security model is more complex and will only become more complex as cloud technologies evolve. This topic will help consumers and businesses explore the various challenges associated with transitioning more information systems, applications and data to a cloud environment. It will also help consumers and businesses develop a sound strategy for cloud development in line with recent compliance concerns. This material also offers invaluable insight on how security responsibilities are shared with the service provider and practical considerations for conducting due diligence across different cloud applications. As highlighted in the Capital One OCC Enforcement Action, it is critical for businesses to establish effective risk assessment processes prior to migrating significant information technology operations to the cloud. This topic will help you identify common weaknesses and gaps as well as discuss security controls for defensible cloud security.
• You will be able to describe CIS standards in securing cloud implementation.
• You will be able to identify defensible security controls for cloud computing.
• You will be able to recognize common cyberattacks against cloud platforms.
• You will be able to explain the key advantages and disadvantages of using the cloud.