Cloud Governance & Compliance
Discover how to strengthen your security control environments, reduce consistent threats, and provide standardized risk management during the Cloud Governance & Compliance course. You will learn the current cloud use models, the potential impact on traditional governance models, and how it fits into the overall corporate governance.
What are the Benefits of Cloud Governance & Compliance Training?
- Know how to compare potential cloud providers and assess an organization's security posture.
- Discover how to identify common threats and help address vulnerabilities.
- Learn different approaches for assessing assurance, quality and performance of cloud services being deployed including fiscal performance, security, compliance, privacy and monitoring
- Deploy tools and techniques to attain assurance and the gain the skills and competencies necessary to design, implement and operate these tools.
Who Should Take this Course?
Cloud Governance & Compliance Modules
Suggested CSA tools and frameworks you’ll practice using…
Cloud Controls Matrix (CCM)
The only framework of cloud-specific security controls, mapped to leading standards, best practices and regulations, CCM is currently considered a de-facto standard for cloud security assurance and compliance.Training Takeaways:
Learn the 16 control domains in the CCM, how to use the mappings, and real world uses.
Consensus Assessments Initiative Questionnaire (CAIQ)
The CAIQ questionnaire is a set of Yes/No questions based on the CCM used to assess the security capabilities of a cloud service provider.Training Takeaways:
Learn how to use the CAIQ to verify implementation of CCM controls and the specific uses for CSPs, Customers, Auditors.
Security, Trust, Assurance & Risk (STAR)
STAR is the industry’s most powerful program for security assurance in the cloud. The STAR registry gives customers a clear understanding of a solution provider’s security posture as it relates to cloud security controls.Training Takeaways:
Learn the requirements for each level of the STAR registry and how to make submissions.
Top Threats to Cloud Computing Deep Dive
The CSA Top Threats reports lists cloud computing’s most pressing threats. This case study contains nine real-life examples. Each example provides an attack-style synopsis of the actor, spanning from threats and vulnerabilities to end controls and mitigations.Training Takeaways:
Learn how to analyze the Top Threats for Cloud Computing and implement applicable CCM Controls.