{"id":2986,"date":"2019-08-31T10:59:32","date_gmt":"2019-08-31T10:59:32","guid":{"rendered":"https:\/\/www.testpreptraining.com\/tutorial\/?page_id=2986"},"modified":"2020-05-01T11:04:57","modified_gmt":"2020-05-01T11:04:57","slug":"cloud-security","status":"publish","type":"page","link":"https:\/\/www.testpreptraining.ai\/tutorial\/aws-certified-security-specialty\/cloud-security\/","title":{"rendered":"Cloud Security"},"content":{"rendered":"\n<ul class=\"wp-block-list\"><li>It is a part of information security. <\/li><li>It refer to technologies, policies and controls used\nto protect data, applications and other resources in a cloud computing\nenvironment <\/li><li>Many security issues. major threats and security\nissues are<ul><li>Abuse and Nefarious Use of Cloud Computing<\/li><\/ul><ul><li>Insecure Application Programming Interfaces<\/li><\/ul><ul><li>Malicious Insiders<\/li><\/ul><ul><li>Shared Technology Vulnerabilities<\/li><\/ul><ul><li>Data Loss\/Leakage<\/li><\/ul><ul><li>Account, Service &amp; Traffic Hijacking<\/li><\/ul><ul><li>Unknown Risk Profile<\/li><\/ul><\/li><li>Identity management is main challenge and\ncomponents are<ul><li>Directory Services repositories &#8211; to store and\nmanage accounts, identity information, and security credentials. <\/li><\/ul><ul><li>Access Management &#8211; process of authenticating\ncredentials and controlling access to networked resources based on trust and\nidentity. <\/li><\/ul><ul><li>Identity Life Cycle Management &#8211; processes used\nto create and delete accounts, manage account and entitlement changes, and\ntrack policy compliance.<\/li><\/ul><\/li><li>A security policy is organization wide and\nrepresents a statement of security goals.<\/li><li>Security policy lifecycle involves<ul><li>Assess risk from business context <\/li><\/ul><ul><li>Develop security policies<\/li><\/ul><ul><li>Implement security policies<\/li><\/ul><ul><li>Manage security policies<\/li><\/ul><ul><li>Audit security policies<\/li><\/ul><\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"528\" height=\"400\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2019\/09\/image-119-528x400.png\" alt=\"\" class=\"wp-image-3667\" srcset=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2019\/09\/image-119-528x400.png 528w, https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2019\/09\/image-119.png 624w\" sizes=\"auto, (max-width: 528px) 100vw, 528px\" \/><\/figure>\n\n\n\n<p><strong>AWS and Cloud Security<\/strong><\/p>\n\n\n\n<p>AWS gives highest priority to cloud security so that, AWS\nmaintains a secure environment so that users can easily scale their\napplications and computing infrastructure. <\/p>\n\n\n\n<p>Few AWS tools are as <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Identity and Access Management &nbsp;or IAM &#8211; Create users, groups, and roles, and\nuse permissions to allow and deny their access to AWS resources such as EC2,\nRDS, and VPC. With IAM, unique credentials can be given to every user so that\nthey can access only allocated AWS services and resources. <\/li><li>It is also compatible with Active Directory.<\/li><li>Virtual Private Clouds (VPCs) &#8211; It enables\nprovisioning of compute resources, like EC2 instances and RDS, in isolated\nvirtual networks with total control of inbound and outbound network traffic. <\/li><li>Security Group and NACLs &#8211; Use it to implement\nfirewall rules to control network traffic, both incoming and outgoing. Control\ntraffic as per type of protocol (TCP, UDP, ICMP), IP address, and port.<\/li><li>Data Encryption &#8211; It is made available for EBS,\nS3, RDS and Glacier service. It encrypts data using AES-256.<\/li><li>Direct Connect &#8211; Creates &nbsp;a virtual private interface amongst the on-premise\nnetwork and the VPC. <\/li><\/ul>\n\n\n\n<p>AWS Cloud Trail &#8211; It gives a log of API calls made against account resources, include those by the AWS Management Console, SDKs, and command line tools. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>It is a part of information security. It refer to technologies, policies and controls used to protect data, applications and other resources in a cloud computing environment Many security issues. major threats and security issues are Abuse and Nefarious Use of Cloud Computing Insecure Application Programming Interfaces Malicious Insiders Shared Technology Vulnerabilities Data Loss\/Leakage Account,&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":2474,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"categories":[2],"tags":[7,519,520],"class_list":["post-2986","page","type-page","status-publish","hentry","category-amazon-aws","tag-aws","tag-cloud-security","tag-security-basics"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cloud Security - Testprep Training Tutorials<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.testpreptraining.ai\/tutorial\/aws-certified-security-specialty\/cloud-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud Security - Testprep Training Tutorials\" \/>\n<meta property=\"og:description\" content=\"It is a part of information security. It refer to technologies, policies and controls used to protect data, applications and other resources in a cloud computing environment Many security issues. major threats and security issues are Abuse and Nefarious Use of Cloud Computing Insecure Application Programming Interfaces Malicious Insiders Shared Technology Vulnerabilities Data Loss\/Leakage Account,...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.testpreptraining.ai\/tutorial\/aws-certified-security-specialty\/cloud-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Testprep Training Tutorials\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-01T11:04:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2019\/09\/image-119-528x400.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/aws-certified-security-specialty\/cloud-security\/\",\"url\":\"https:\/\/www.testpreptraining.ai\/tutorial\/aws-certified-security-specialty\/cloud-security\/\",\"name\":\"Cloud Security - Testprep Training Tutorials\",\"isPartOf\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#website\"},\"datePublished\":\"2019-08-31T10:59:32+00:00\",\"dateModified\":\"2020-05-01T11:04:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/aws-certified-security-specialty\/cloud-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.testpreptraining.ai\/tutorial\/aws-certified-security-specialty\/cloud-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/aws-certified-security-specialty\/cloud-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.testpreptraining.ai\/tutorial\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AWS Certified Security Specialty\",\"item\":\"https:\/\/www.testpreptraining.ai\/tutorial\/aws-certified-security-specialty\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cloud Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#website\",\"url\":\"https:\/\/www.testpreptraining.ai\/tutorial\/\",\"name\":\"Testprep Training Tutorials\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.testpreptraining.ai\/tutorial\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#organization\",\"name\":\"Testprep Training\",\"url\":\"https:\/\/www.testpreptraining.ai\/tutorial\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.testpreptraining.com\/tutorial\/wp-content\/uploads\/2020\/07\/tpt-logo-6.png\",\"contentUrl\":\"https:\/\/www.testpreptraining.com\/tutorial\/wp-content\/uploads\/2020\/07\/tpt-logo-6.png\",\"width\":583,\"height\":153,\"caption\":\"Testprep Training\"},\"image\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/tutorial\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud Security - Testprep Training Tutorials","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.testpreptraining.ai\/tutorial\/aws-certified-security-specialty\/cloud-security\/","og_locale":"en_US","og_type":"article","og_title":"Cloud Security - Testprep Training Tutorials","og_description":"It is a part of information security. It refer to technologies, policies and controls used to protect data, applications and other resources in a cloud computing environment Many security issues. major threats and security issues are Abuse and Nefarious Use of Cloud Computing Insecure Application Programming Interfaces Malicious Insiders Shared Technology Vulnerabilities Data Loss\/Leakage Account,...","og_url":"https:\/\/www.testpreptraining.ai\/tutorial\/aws-certified-security-specialty\/cloud-security\/","og_site_name":"Testprep Training Tutorials","article_modified_time":"2020-05-01T11:04:57+00:00","og_image":[{"url":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-content\/uploads\/2019\/09\/image-119-528x400.png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/aws-certified-security-specialty\/cloud-security\/","url":"https:\/\/www.testpreptraining.ai\/tutorial\/aws-certified-security-specialty\/cloud-security\/","name":"Cloud Security - Testprep Training Tutorials","isPartOf":{"@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#website"},"datePublished":"2019-08-31T10:59:32+00:00","dateModified":"2020-05-01T11:04:57+00:00","breadcrumb":{"@id":"https:\/\/www.testpreptraining.ai\/tutorial\/aws-certified-security-specialty\/cloud-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.testpreptraining.ai\/tutorial\/aws-certified-security-specialty\/cloud-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/aws-certified-security-specialty\/cloud-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.testpreptraining.ai\/tutorial\/"},{"@type":"ListItem","position":2,"name":"AWS Certified Security Specialty","item":"https:\/\/www.testpreptraining.ai\/tutorial\/aws-certified-security-specialty\/"},{"@type":"ListItem","position":3,"name":"Cloud Security"}]},{"@type":"WebSite","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#website","url":"https:\/\/www.testpreptraining.ai\/tutorial\/","name":"Testprep Training Tutorials","description":"","publisher":{"@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.testpreptraining.ai\/tutorial\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#organization","name":"Testprep Training","url":"https:\/\/www.testpreptraining.ai\/tutorial\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#\/schema\/logo\/image\/","url":"https:\/\/www.testpreptraining.com\/tutorial\/wp-content\/uploads\/2020\/07\/tpt-logo-6.png","contentUrl":"https:\/\/www.testpreptraining.com\/tutorial\/wp-content\/uploads\/2020\/07\/tpt-logo-6.png","width":583,"height":153,"caption":"Testprep Training"},"image":{"@id":"https:\/\/www.testpreptraining.ai\/tutorial\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/pages\/2986","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/comments?post=2986"}],"version-history":[{"count":3,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/pages\/2986\/revisions"}],"predecessor-version":[{"id":3668,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/pages\/2986\/revisions\/3668"}],"up":[{"embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/pages\/2474"}],"wp:attachment":[{"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/media?parent=2986"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/categories?post=2986"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/tutorial\/wp-json\/wp\/v2\/tags?post=2986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}