(ISC)2 - International Information System Security Certification Consortium ✔✔Answer - A security certification granting organization that has a long history of certifications that were difficult to get. This difficulty has made their certificates seen as having higher value in the industry.
(ISC)2 Cloud Secure Data Life Cycle ✔✔Answer - Based on CSA Guidance. 1. Create; 2. Store; 3. Use; 4. Share; 5. Archive; 6. Destroy.
(SAS) 70✔✔Answer - _____ was a recognized standard of the American Institute of Certified Public Accountants (AICPA) in response to the issues that also lead to Sarbanes-Oxley (SOX). Deprecated in 2011 by the Statement on Standards for Attestation Engagements (SSAE) No. 16.
AICPA✔✔Answer - established SAS 70 and later SAAE 16.
AICPA✔✔Answer - American Institute of Certified Public Accountants
Organizational Normative Framework (ONF) ✔✔Answer - Concepts of ISO 27034. There is only one _____ for an organization but potentially as many ANF's as applications.
ASHRAE - American Society of Heating, Refrigerating and Air-Conditioning Engineers ✔✔Answer - a professional association seeking to advance heating, ventilation, air conditioning and refrigeration systems design and construction.
Biba✔✔Answer - an access control model designed to preserve data integrity. It has 3 goals. Maintain internal and external consistency; prevent unauthorized data modification even by authorized parties; prevent data modification by unauthorized individuals. Capability Maturity Model (CMM) ✔✔Answer - a development model where the maturity relates to the formality and optimization of processes. When applied to cloud security it would focus on those aspects as they relate to cloud security.
Child Online Protection Act (COPA) ✔✔Answer - An attempt to restrict access by minors to material defined as harmful to minors. A permanent injunction against the law in 2009.
Cloud Access Security Brokers (CASBs) ✔✔Answer - monitors network activity between users and cloud applications and enforces security policy and blocking malware.
Cloud Security Alliance (CSA) ✔✔Answer - publishes the Notorious Nine: 1) Data breaches; 2) Data Loss; 3) Account service traffic hijacking; 4) Insecure Interfaces and APIs; 5) Denial of Service; 6) Malicious Insiders; 7) Abuse of Cloud Services; 8) Insufficient Due Diligence; 9) Shared technology Vulnerabilities. There are also implications and controls associated with each.
CSA STAR - Cloud Security Alliance (CSA) Security, Trust, and Assurance Registry (STAR) ✔✔Answer - _______ uses the Consensus Assessments Initiative Questionnaire (CAIQ), Cloud Controls Matrix (CCM), and GDPR Self-Assessment as inputs to certify an organization to Level 1. Level 2 integrates the CSA Cloud Controls Matrix and the AICPA Trust Service Principles - AT 101 for STAR attestation. STAR Certification for level to uses the CSA Cloud Controls Matrix and the requirements of the ISO/IEC 27001:2013 management system standard together with the CSA Cloud Controls Matrix. Certification certificates follow normal ISO/IEC 27001 protocol for a 3rd party assessment.
Cloud Security Alliance Cloud Controls Matrix (CSA CCM) ✔✔Answer - Composed of 17 domains covering
key elements of cloud. It contains 170 objectives within the domains. They integrate with the STAR program.
COBIT or Control Objectives for Information and Related Technologies ✔✔Answer - a framework for IT governance and management. Initially used to achieve compliance with Sarbanes-Oxley and focused on