Cloud Security and Compliance
Information Security Concepts
Cloud Infrastructure and Services
Security and Risk Management
Cloud Computing Models and Standards
100

This policy defines the acceptable ways in which a network, website, or service may be used

What is Acceptable Use Policy?

100

This term refers to the mathematical function used in encryption and decryption

What is an Algorithm?

100

This paradigm enables network access to a scalable and elastic pool of resources

What is Cloud Computing?

100

This term refers to the ability to map an activity back to the responsible party

What is Accountability?

100

This person or organization audits the provision and use of cloud services

What is Cloud Auditor?

200

This 2017 criteria by AICPA focuses on security, availability, processing integrity, confidentiality, and privacy

What is AICPA TSC 2017?

200

These controls reduce the risk of control weaknesses resulting in errors

What are Compensating Controls?

200

This term describes a customer of a cloud service

What is Cloud Customer?

200

This concept in information security refers to the property of being accessible and usable upon demand

What is Availability?

200

This refers to a method of packaging and running applications in a virtualization environment

What is Container?

300

This term refers to the process of erasing or encrypting identifiers to protect sensitive information

What is Anonymization?

300

This approach to security involves multiple mechanisms in a layered method

What is Defense-in-depth?

300

This service model provides fundamental computing resources like processing and storage

What is Infrastructure as a Service (IaaS)?

300

This type of security focuses on protecting networks remotely bridged to client devices

What is Endpoint Security?

300

This CSA concept includes a set of functional capabilities and processes for assessing IT and cloud providers' security capabilities

What is CSA Enterprise Architecture?

400

This type of testing involves a set of tools used to test software during operation for compliance and security issues

What is Dynamic Application Security Testing?

400

This process involves transforming plaintext into ciphertext

What is Encryption?

400

This cloud model is composed of two or more distinct cloud infrastructures

What is Hybrid Cloud?

400

The process of identifying and evaluating risk and its potential effects

What is Risk Assessment?

400

This program includes principles of transparency, rigorous auditing, and harmonization of standards

What is STAR Program?

500

This EU regulation focuses on data protection and privacy

What is General Data Protection Regulation (GDPR)?

500

This method isolates untested code changes from the production environment in software development

What is Sandbox?

500

This computing model provides a flexible cloud computing execution model with dynamic resource allocation

What is Serverless Computing?

500

This term refers to the management of vulnerabilities in an Information Security Continuous Monitoring (ISCM) capability

What is Vulnerability Management?

500

This type of testing analyzes application source code for security vulnerabilities

What is Static Application Security Testing?

M
e
n
u