시작하기. 무료입니다
또는 회원 가입 e메일 주소
CCSP 저자: Mind Map: CCSP

1. PaaS

1.1. Structured

1.2. Unstructured

2. Cloud Compumting concepts

2.1. Definition

2.1.1. NIST - SP 800-145

2.1.2. Service Models

2.1.2.1. Saas

2.1.2.2. Pass

2.1.2.3. Iaas

2.1.3. Deployment Models

2.1.3.1. Public

2.1.3.2. Private

2.1.3.3. community

2.1.3.4. Hybrid

2.1.4. Cloud App (Cloud Application)

2.1.5. Cloud Architect

2.1.6. Cloud Backup

2.1.7. Cloud Computing

2.1.8. Business Requirement

2.1.8.1. functional requirements

2.1.8.2. nonfunctional requirements

2.1.8.3. Existing State

2.1.8.4. Quantifying Benefits and Opportunity Cost

2.1.8.5. Reduction in Capital Expenditure

2.1.8.6. Reduction in Personnel Costs

2.1.8.7. Reduction in Operational Costs

2.1.8.8. Transferring Some Regulatory Costs

2.1.8.9. Reduction in Costs for Data Archival/Backup Services

2.1.8.10. Intended Impact

2.1.9. Cloud Migration

2.1.10. Cloud Portability

2.1.11. Cost-Benefit Analysis

2.1.12. FIPS 140-2

2.1.13. Managed Service Provider

2.1.14. NIST 800-53

2.1.15. Trusted Cloud Initiative (TCI) Reference Model

2.1.16. Vendor Lock-in

2.1.17. Vendor Lock-out

2.2. Fundational Concepts

2.2.1. Sensitive Data

2.2.2. Virtualization

2.2.3. Encryption

2.2.4. Autditing and Compliance

2.2.5. Cloud Sevice Provider Contracts

2.3. Key Cloud Computing characterist

2.3.1. On-Demand Self Service

2.3.2. Broad Network Access

2.3.3. Multitenacy

2.3.4. Rapd Elasticity and Scalability

2.3.5. Resource Pooling

2.3.6. Measured Service

2.3.7. virtualization

2.3.8. Storage

2.3.9. Networking

2.3.10. Databases

2.3.11. Orchestration

2.4. Computing Roles

2.4.1. Cloud Service Costumer

2.4.2. Cloud Service Provider

2.4.3. Cloud Service Partiner

2.4.4. Cloud Service Broker

2.4.5. Cloud Access Security Broker (CASB)

2.4.6. Regulators

2.5. Cloud Evolution, Vernacular, and Models

2.5.1. New Technology, New Options

2.5.1.1. Elasticity

2.5.1.2. Simplicity

2.5.1.3. Scalability

2.6. Related and Emerging Technologies

2.6.1. Machine learning and artificial intelligence (AI)

3. Cloud Data Security

3.1. Cloud Data Lifecycle

3.1.1. Phases

3.1.1.1. Create

3.1.1.1.1. ->Classiication

3.1.1.2. Store

3.1.1.2.1. ->Access Control

3.1.1.2.2. ->Encription

3.1.1.2.3. ->Auditing

3.1.1.2.4. ->:Backup

3.1.1.2.5. -> Redundancy

3.1.1.3. Use

3.1.1.3.1. ->auditing

3.1.1.3.2. -> Purely Read Only

3.1.1.4. Share

3.1.1.5. Archive

3.1.1.6. Destroy

3.1.1.7. Data Dispersion

3.2. Design And Implement Clould Data Storage Architectures

3.2.1. Storage Types

3.2.1.1. IaaS

3.2.1.1.1. Volume

3.2.1.1.2. Object

3.2.1.2. SaaS

3.2.1.2.1. Information Storage an Mnagement

3.2.1.2.2. Content and File Storage

3.2.2. Threats to Storage Types

3.2.2.1. Unauthorized access

3.2.2.2. Regulatory noncompliance

3.2.2.3. Unauthorized provisioning

3.2.2.4. Jurisdictional issues

3.2.2.5. Denial of service

3.2.2.6. Data corruption or destruction

3.2.2.7. Theft or media loss

3.2.2.8. Malware and ransomware

3.2.2.9. Improper disposal

3.2.2.10. -->DLP

3.3. Design And Apply Data Security Technologies and Strategies

3.3.1. Encryption and Key Management

3.3.2. Encryption

3.3.2.1. Levels

3.3.2.1.1. Object-level encryption

3.3.2.1.2. File-level encryption

3.3.2.1.3. Application-level encryption

3.3.2.1.4. Storage-level encryption

3.3.2.1.5. Database-level encryption

3.3.2.1.6. Volume-level encryption