SlideShare a Scribd company logo
Download the full version and explore a variety of ebooks
or textbooks at https://ebookmass.com
CCSK Certificate of Cloud Security Knowledge All-
in-One Exam Guide Graham Thompson
_____ Follow the link below to get your download now _____
https://ebookmass.com/product/ccsk-certificate-of-cloud-
security-knowledge-all-in-one-exam-guide-graham-thompson/
Access ebookmass.com now to download high-quality
ebooks or textbooks
We have selected some products that you may be interested in
Click the link to download now or visit ebookmass.com
for more options!.
Ccsp Certified Cloud Security Professional All-In-One Exam
Guide Daniel Carter
https://ebookmass.com/product/ccsp-certified-cloud-security-
professional-all-in-one-exam-guide-daniel-carter/
CCSP Certified Cloud Security Professional All-in-One Exam
Guide 3rd Edition Daniel Carter
https://ebookmass.com/product/ccsp-certified-cloud-security-
professional-all-in-one-exam-guide-3rd-edition-daniel-carter/
Google Cloud Certified Professional Cloud Architect All-
in-One Exam Guide Iman Ghanizada
https://ebookmass.com/product/google-cloud-certified-professional-
cloud-architect-all-in-one-exam-guide-iman-ghanizada/
Google Cloud Certified Associate Cloud Engineer All-in-One
Exam Guide Jack Hyman
https://ebookmass.com/product/google-cloud-certified-associate-cloud-
engineer-all-in-one-exam-guide-jack-hyman/
CompTIA Security+ All-in-One Exam Guide (Exam SY0-601))
Wm. Arthur Conklin
https://ebookmass.com/product/comptia-security-all-in-one-exam-guide-
exam-sy0-601-wm-arthur-conklin/
AWS Certified Cloud Practitioner All-in-One Exam Guide
(Exam CLF-C01) Daniel Carter
https://ebookmass.com/product/aws-certified-cloud-practitioner-all-in-
one-exam-guide-exam-clf-c01-daniel-carter/
CompTIA Cloud+ Certification All-in-One Exam Guide (Exam
CV0-003) Eric A. Vanderburg
https://ebookmass.com/product/comptia-cloud-certification-all-in-one-
exam-guide-exam-cv0-003-eric-a-vanderburg/
Google Cloud Certified Professional Cloud Architect All-
in-One Exam Guide 1st Edition Iman Ghanizada
https://ebookmass.com/product/google-cloud-certified-professional-
cloud-architect-all-in-one-exam-guide-1st-edition-iman-ghanizada/
AWS Certified Security Specialty All-in-One Exam Guide
(Exam SCS-C01) Tracy Pierce
https://ebookmass.com/product/aws-certified-security-specialty-all-in-
one-exam-guide-exam-scs-c01-tracy-pierce/
CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide Graham Thompson
CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide Graham Thompson
Contents
1. Cover
2. About the Author
3. Title Page
4. Copyright Page
5. Dedication
6. Contents at a Glance
7. Contents
8. Foreword
9. Acknowledgments
10. Introduction
11. Chapter 1 Cloud Computing Concepts and Architectures
1. Cloud Logical Model
1. Infrastructure
2. Metastructure
3. Infostructure
4. Applistructure
2. Cloud Computing Definitions
1. Essential Characteristics
2. Cloud Service Models
3. Cloud Deployment Models
3. Cloud Security Scope and the Shared Responsibility Model
1. Shared Responsibility Model
2. Cloud Security Alliance Tools
3. Cloud Controls Matrix
4. Consensus Assessments Initiative Questionnaire
5. STAR Registry
6. Cloud Reference and Architecture Models
4. Chapter Review
1. Questions
2. Answers
12. Chapter 2 Governance and Enterprise Risk Management
1. Governance
1. Governance Backgrounder
2. Cloud Governance
2. Risk Management
1. Risk Management Backgrounder
3. Cloud Risk Management
1. The Effects of Service and Deployment Models
2. Cloud Risk Management Trade-Offs
3. Assessing Cloud Service Providers
4. Chapter Review
1. Questions
2. Answers
13. Chapter 3 Legal Issues, Contracts, and Electronic Discovery
1. Legal Frameworks Governing Data Protection and Privacy
1. Required Security Measures
2. Treaties
3. Restrictions to Cross-Border Data Transfers
4. CLOUD Act
2. Regional Examples
1. Asia Pacific Region
2. European Union and European Economic Area
3. The Americas
3. Contracts and Provider Selection
1. Internal Due Diligence
2. Monitoring, Testing, and Updating
3. External Due Diligence
4. Contract Negotiations
5. Third-Party Audits and Attestations
4. Electronic Discovery
1. Possession, Custody, and Control
2. Relevant Cloud Applications and Environment
3. Searchability and E-Discovery Tools
4. Preservation
5. Data Retention Laws and Recordkeeping
Obligations
6. Data Collection
7. Forensics
8. Reasonable Integrity
9. Direct Access
10. Native Production
11. Authentication
12. Cooperation Between Provider and Client in E-
Discovery
13. Response to a Subpoena or Search Warrant
5. Chapter Review
1. Questions
2. Answers
14. Chapter 4 Compliance and Audit Management
1. Compliance Backgrounder
2. Impact of the Cloud on Contracts
3. How the Cloud Changes Compliance
1. Compliance Inheritance
2. Continuous Compliance
4. Audit Backgrounder
5. Audit Management in the Cloud
6. SOC Reports and ISO Certifications Backgrounder
1. SOC Backgrounder
2. ISO Backgrounder
7. How the Cloud Changes Audits
1. Right to Audit
2. Audit Scope
3. Auditor Requirements
8. Chapter Review
1. Questions
2. Answers
15. Chapter 5 Information Governance
1. Cloud Information Governance Domains
1. Information Classification Backgrounder
2. Information Management Backgrounder
2. The Data Security Lifecycle
1. Locations and Entitlements
2. Functions, Actors, and Controls
3. Chapter Review
1. Questions
2. Answers
16. Chapter 6 Management Plane and Business Continuity
1. Management Plane
1. Application Programming Interface Backgrounder
2. Accessing the Management Plane
3. Securing the Management Plane
2. Business Continuity and Disaster Recovery in the Cloud
1. BCP/DR Backgrounder
2. Architecting for Failure
3. Business Continuity Within the Cloud Provider
4. Chaos Engineering
5. Business Continuity for Loss of the Cloud Provider
6. Continuity for Private Cloud and Providers
3. Chapter Review
1. Questions
2. Answers
17. Chapter 7 Infrastructure Security
1. Cloud Network Virtualization
1. OSI Reference Model Backgrounder
2. VLANs
3. VXLAN
4. Networking Planes Backgrounder
5. Software Defined Networking
6. Network Functions Virtualization
2. How Security Changes with Cloud Networking
1. Challenges of Virtual Appliances
2. Benefits of SDN Security
3. Microsegmentation and the Software Defined
Perimeter
4. Additional Considerations for CSPs or Private
Clouds
5. Hybrid Cloud Considerations
3. Cloud Compute and Workload Security
1. Compute Abstraction Technologies
2. How the Cloud Changes Workload Security
3. Immutable Workloads Enable Security
4. The Impact of the Cloud on Standard Workload
Security Controls
5. Changes to Workload Security Monitoring and
Logging
6. Changes to Vulnerability Assessment
4. Chapter Review
1. Questions
2. Answers
18. Chapter 8 Virtualization and Containers
1. Major Virtualization Categories Relevant to Cloud
Computing
1. Compute Virtualization
2. Network Virtualization
3. Storage Virtualization
2. Containers
1. Container Definitions Backgrounder
2. Container Security Recommendations
3. Chapter Review
1. Questions
2. Answers
19. Chapter 9 Incident Response
1. Incident Response Lifecycle
1. Incident and Event Backgrounder
2. Preparation Phase
3. Detection and Analysis Phase
4. Containment, Eradication, and Recovery Phase
5. Post-Incident Activity Phase
2. How the Cloud Impacts Incident Response
1. Preparation
2. Detection and Analysis
3. Containment, Eradication, and Recovery
4. Post-Incident Activity
3. Chapter Review
1. Questions
2. Answers
20. Chapter 10 Application Security
1. The SSDLC and Cloud Computing
2. Secure Design and Development
1. Training
2. Define
3. Design
4. Develop
5. Test
3. Secure Deployment
1. Cloud Impacts on Vulnerability Assessments
2. Cloud Impact on Penetration Testing
3. Deployment Pipeline Security
4. Impact of IaC and Immutable Workloads
4. Secure Operations
5. How the Cloud Impacts Application Design and
Architectures
1. Microservices Backgrounder
6. The Rise and Role of DevOps
1. DevOps Backgrounder
2. Security Implications and Advantages of DevOps
7. Chapter Review
1. Questions
2. Answers
21. Chapter 11 Data Security and Encryption
1. Data Security Controls
2. Cloud Data Storage Types
3. Managing Data Migrations to the Cloud
1. CASB Backgrounder
2. Securing Cloud Data Transfers
4. Securing Data in the Cloud
1. Cloud Data Access Controls
2. Storage (at Rest) Encryption and Tokenization
3. Key Management (Including Customer-Managed
Keys)
5. Data Security Architecture
6. Monitoring, Auditing, and Alerting
7. Additional Data Security Controls
1. Cloud Platform/Provider-Specific Controls
2. Data Loss Prevention
3. Enterprise Rights Management
4. Data Masking and Test Data Generation
8. Enforcing Lifecycle Management Security
9. Chapter Review
1. Questions
2. Answers
22. Chapter 12 Identity, Entitlement, and Access Management
1. How IAM Works in the Cloud
2. IAM Terms
3. IAM Standards
1. Federation Backgrounder
4. Managing Users and Identities for Cloud Computing
5. Authentication and Credentials
6. Entitlements and Access Management
7. Privileged User Management
8. Chapter Review
1. Questions
2. Answers
23. Chapter 13 Security as a Service
1. Potential Benefits and Concerns of SecaaS
2. Major Categories of SaaS Offerings
1. Identity, Entitlement, and Access Management
Services
2. Cloud Access Security Broker
3. Web Security Gateway
4. E-mail Security
5. Security Assessment
6. Web Application Firewall
7. Intrusion Detection/Prevention
8. Security Information and Event Management
(SIEM)
9. Encryption and Key Management
10. Business Continuity and Disaster Recovery
11. Security Management
12. Distributed Denial of Service Protection
3. Chapter Review
1. Questions
2. Answers
24. Chapter 14 Related Technologies
1. Big Data
1. Distributed Data Collection Backgrounder
2. Hadoop Backgrounder
3. Security and Privacy Considerations
4. Data Collection
5. Key Management
6. Security Capabilities
7. Identity and Access Management
8. PaaS
2. Internet of Things (IoT)
3. Mobile Computing
4. Serverless Computing
5. Chapter Review
1. Questions
2. Answers
25. Chapter 15 ENISA Cloud Computing: Benefits, Risks, and
Recommendations for Information Security
1. Security Benefits of Cloud
1. Security and the Benefits of Scale
2. Security as a Market Differentiator
3. Standardized Interfaces for Managed Security
Services
4. Rapid, Smart Scaling of Resources
5. Audit and Evidence Gathering
6. Timely, Effective, and Efficient Updates and
Defaults
7. Audit and SLAs Force Better Risk Management
8. Benefits of Resource Concentration
2. Top Security Risks
1. IT Risk Backgrounder
2. Loss of Governance
3. Lock-in
4. Isolation Failure
5. Compliance Risks
6. Management Interface Compromise
7. Data Protection
8. Insecure or Incomplete Data Deletion
9. Malicious Insider
3. Five Key Legal Issues Common Across All Scenarios
1. Data Protection
2. Confidentiality
3. Intellectual Property
4. Professional Negligence
5. Outsourcing Service and Changes in Control
4. Additional Items for the Exam
1. Open Virtualization Format
2. VM Hopping
3. Economic Denial of Service
4. Licensing Risks
5. Risk Concerns of a Cloud Provider Being Acquired
6. Data Controller vs. Data Processor Definitions
7. Guest System Monitoring in IaaS Responsibilities
8. User Provisioning Vulnerability
9. Underlying Vulnerability in Loss of Governance
5. Risks R.1–R.35 and Underlying Vulnerabilities
6. Chapter Review
1. Questions
2. Answers
26. Appendix A Cloud Computing Security Policy Examples
1. Cloud Security Policy: Centralized Example
1. Purpose
2. Scope
3. Background
4. Policy
2. Cloud Security Policy: Classification Example
1. Purpose
2. Scope
3. Background
4. Policy
27. Appendix B About the Online Content
1. System Requirements
2. Your Total Seminars Training Hub Account
1. Privacy Notice
3. Single User License Terms and Conditions
4. TotalTester Online
5. Technical Support
28. Glossary
29. Index
Guide
1. Cover
2. Title Page
3. CCSK™ Certificate of Cloud Security Knowledge All-in-One Exam
Guide
Page List
1. i
2. iii
3. v
4. vi
5. vii
6. viii
7. x
8. xi
9. xii
10. xiii
11. xiv
12. xv
13. xvi
14. xvii
15. xviii
16. xix
17. xx
18. xxi
19. xxii
20. xxiii
21. xxiv
22. xxv
23. xxvi
24. xxvii
25. xxviii
26. xxix
27. xxx
28. 1
29. 2
30. 3
31. 4
32. 6
33. 5
34. 7
35. 8
36. 9
37. 10
38. 11
39. 12
40. 13
41. 14
42. 15
43. 16
44. 17
45. 18
46. 19
47. 20
48. 21
49. 22
50. 23
51. 24
52. 25
53. 26
54. 27
55. 28
56. 29
57. 30
58. 31
59. 32
60. 33
61. 34
62. 35
63. 36
64. 37
65. 38
66. 39
67. 40
68. 41
69. 42
70. 43
71. 44
72. 45
73. 46
74. 47
75. 48
76. 49
77. 50
78. 51
79. 52
80. 53
81. 54
82. 55
83. 56
84. 57
85. 58
86. 59
87. 60
88. 61
89. 62
90. 63
91. 64
92. 65
93. 66
94. 67
95. 68
96. 69
97. 70
98. 71
99. 72
100. 73
101. 74
102. 75
103. 76
104. 77
105. 78
106. 79
107. 80
108. 81
109. 82
110. 83
111. 84
112. 85
113. 86
114. 87
115. 88
116. 89
117. 90
118. 91
119. 92
120. 93
121. 94
122. 95
123. 96
124. 97
125. 98
126. 99
127. 100
128. 101
129. 102
130. 103
131. 104
132. 105
133. 106
134. 107
135. 108
136. 109
137. 110
138. 111
139. 112
140. 113
141. 114
142. 115
143. 116
144. 117
145. 118
146. 119
147. 120
148. 121
149. 122
150. 123
151. 124
152. 125
153. 126
154. 127
155. 128
156. 129
157. 130
158. 131
159. 132
160. 133
161. 134
162. 135
163. 136
164. 137
165. 138
166. 139
167. 140
168. 141
169. 142
170. 143
171. 144
172. 145
173. 146
174. 147
175. 148
176. 149
177. 150
178. 151
179. 152
180. 153
181. 154
182. 155
183. 156
184. 157
185. 158
186. 159
187. 160
188. 161
189. 162
190. 163
191. 164
192. 165
193. 166
194. 167
195. 168
196. 169
197. 170
198. 171
199. 172
200. 173
201. 174
202. 175
203. 176
204. 177
205. 178
206. 179
207. 180
208. 181
209. 182
210. 183
211. 184
212. 185
213. 186
214. 187
215. 188
216. 189
217. 190
218. 191
219. 192
220. 193
221. 194
222. 195
223. 196
224. 197
225. 198
226. 199
227. 200
228. 201
229. 202
230. 203
231. 204
232. 205
233. 206
234. 207
235. 208
236. 209
237. 210
238. 211
239. 212
240. 213
241. 214
242. 215
243. 216
244. 217
245. 218
246. 219
247. 220
248. 221
249. 222
250. 223
251. 224
252. 225
253. 226
254. 227
255. 228
256. 229
257. 230
258. 231
259. 232
260. 233
261. 234
262. 235
263. 236
264. 237
265. 238
266. 239
267. 240
268. 241
269. 242
270. 243
271. 244
272. 245
273. 246
274. 247
275. 248
276. 249
277. 250
278. 251
279. 252
280. 253
281. 254
282. 255
283. 256
284. 257
285. 258
286. 259
287. 260
288. 261
289. 262
290. 263
291. 264
292. 265
293. 266
294. 267
295. 268
296. 269
297. 270
298. 271
299. 272
300. 273
301. 274
302. 275
303. 276
304. 277
305. 278
306. 279
307. 280
308. 281
309. 282
310. 283
311. 284
312. 285
313. 286
314. 287
315. 288
316. 289
317. 290
318. 291
319. 292
320. 293
321. 294
322. 295
323. 296
324. 298
325. 299
326. 300
327. 301
328. 302
329. 303
330. 304
331. 305
332. 306
333. 307
334. 308
335. 309
336. 310
337. 311
338. 312
339. 313
340. 314
341. 315
342. 316
343. 317
344. 318
345. 319
346. 320
347. 321
348. 322
349. 323
350. 324
351. 325
352. 326
353. 327
354. 328
355. 329
356. 330
357. 331
358. 332
359. 333
360. 334
361. 335
362. 336
363. 337
ABOUT THE AUTHOR
Graham Thompson is the founder of Intrinsec Security, a
cloud security consulting and training organization that serves
enterprises and governments across North America. He is a
security professional with more than 25 years of experience in
areas such as systems engineering, technical architecture,
vulnerability assessment, and a variety of management roles.
He has built successful multimillion-dollar security solutions for
leading enterprises and government agencies.
Since 2010, Graham has dedicated himself to cloud security. He
has architected and assessed cloud security solutions for
government agencies and Fortune 500 financial, telecom, and
retail companies across North America. He is a Cloud Security
Alliance and (ISC) authorized trainer of CCSK, CISSP, and
CCSP, a course he helped develop as a subject matter expert.
In addition to his CSA and (ISC) certifications, Graham has
obtained multiple certifications, including Amazon, ISACA
(CISA), Microsoft (MCSE), Cisco, Symantec, Fortinet, SANS,
and others. He attended McGill University in Montreal and has
been an adjunct professor for multiple security courses at
Algonquin College in Ottawa.
ABOUT THE TECHNICAL EDITORS
Ryan Bergsma, CCSK, is a dedicated cybersecurity
professional who endeavors to promote best practices in
cybersecurity in general and cloud security in particular. As the
Training Program Director for the Cloud Security Alliance, he is
constantly looking for ways to turn the most recent best
2
2
practices documentation into training products that can help to
fill the cybersecurity skills gap and develop individuals who can
create a more secure cyber ecosystem. Ryan comes from a sales
and business background and holds a bachelor’s degree in
computer information system security.
Daniele Catteddu is a security and risk management
practitioner and a privacy evangelist. He worked in senior roles
in both the private and public sectors. Currently, he is the CTO
at Cloud Security Alliance, where he is responsible for driving
the adoption of the organization technology strategy. He is the
co-founder of the CSA STAR Program and a member of the
Italian Standard National delegation at ISO/IEC SC27. He is a
lecturer at the Maastricht University Centre on Privacy &
Cybersecurity, a member of the European Privacy Association
Scientific Committee, and a member of the Advisory Board of
the Kent University CyberSecurity. In the past, he worked at
ENISA, the European Union Agency for Cybersecurity, as an
expert in the areas of critical information infrastructure
protection and emerging and future risks. Before joining
ENISA, he worked as an information security consultant in the
banking and financial sector. He holds a master’s degree in
business administration and economics from the University of
Parma (Italy). He is a frequent keynote speaker at leading
security conferences and the author of several papers on
cybersecurity and privacy.
Dr. Peter van Eijk, CCSK, CCSP, is a highly accomplished
information technology professional with more than 40 years of
experience in many fields of information and communications
technology as well as computer science. He is a practitioner, a
researcher, and a teacher. His experience includes teaching and
researching computer networks, managing many projects and
groups on digital infrastructure projects, and acting as the
technical director of an Internet service provider. In his
consulting career, his practical experience includes IT shared
services cost and risk assessments, client-service architectures,
IT strategy, collaborative architectures, and shared services
implementations. He has also been active in ISO
standardization activities, on government committees on
critical network infrastructures, and as a volunteer for CSA
activities. He authored and delivered several cloud-training
programs, including the first version of what is now known as
CompTIA Cloud Essentials. He is currently working as an
independent CCSK trainer and as an associate professor of
cybersecurity and the cloud at Hogeschool Utrecht. He holds a
master’s degree in mathematics and computer science from the
University of Groningen and a PhD from Twente University.
CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide Graham Thompson
CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide Graham Thompson
Copyright © 2020 by McGraw-Hill Education. All rights
reserved. Except as permitted under the United States
Copyright Act of 1976, no part of this publication may be
reproduced or distributed in any form or by any means, or
stored in a database or retrieval system, without the prior
written permission of the publisher, with the exception that the
program listings may be entered, stored, and executed in a
computer system, but they may not be reproduced for
publication.
ISBN: 978-1-26-046009-4
MHID: 1-26-046009-6
The material in this eBook also appears in the print version of
this title: ISBN: 978-1-26-046008-7, MHID: 1-26-046008-8.
eBook conversion by codeMantra
Version 1.0
All trademarks are trademarks of their respective owners.
Rather than put a trademark symbol after every occurrence of a
trademarked name, we use names in an editorial fashion only,
and to the benefit of the trademark owner, with no intention of
infringement of the trademark. Where such designations appear
in this book, they have been printed with initial caps.
McGraw-Hill Education eBooks are available at special quantity
discounts to use as premiums and sales promotions or for use in
corporate training programs. To contact a representative, please
visit the Contact Us page at www.mhprofessional.com.
Information has been obtained by McGraw-Hill Education from
sources believed to be reliable. However, because of the
possibility of human or mechanical error by our sources,
McGraw-Hill Education, or others, McGraw-Hill Education
does not guarantee the accuracy, adequacy, or completeness of
any information and is not responsible for any errors or
omissions or the results obtained from the use of such
information.
TERMS OF USE
This is a copyrighted work and McGraw-Hill Education and its
licensors reserve all rights in and to the work. Use of this work
is subject to these terms. Except as permitted under the
Copyright Act of 1976 and the right to store and retrieve one
copy of the work, you may not decompile, disassemble, reverse
engineer, reproduce, modify, create derivative works based
upon, transmit, distribute, disseminate, sell, publish or
sublicense the work or any part of it without McGraw-Hill
Education’s prior consent. You may use the work for your own
noncommercial and personal use; any other use of the work is
strictly prohibited. Your right to use the work may be
terminated if you fail to comply with these terms.
THE WORK IS PROVIDED “AS IS.” McGRAW-HILL
EDUCATION AND ITS LICENSORS MAKE NO GUARANTEES
OR WARRANTIES AS TO THE ACCURACY, ADEQUACY OR
COMPLETENESS OF OR RESULTS TO BE OBTAINED FROM
USING THE WORK, INCLUDING ANY INFORMATION THAT
CAN BE ACCESSED THROUGH THE WORK VIA HYPERLINK
OR OTHERWISE, AND EXPRESSLY DISCLAIM ANY
WARRANTY, EXPRESS OR IMPLIED, INCLUDING BUT NOT
LIMITED TO IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR
PURPOSE. McGraw-Hill Education and its licensors do not
warrant or guarantee that the functions contained in the work
will meet your requirements or that its operation will be
uninterrupted or error free. Neither McGraw-Hill Education
nor its licensors shall be liable to you or anyone else for any
inaccuracy, error or omission, regardless of cause, in the work
or for any damages resulting therefrom. McGraw-Hill
Education has no responsibility for the content of any
information accessed through the work. Under no
circumstances shall McGraw-Hill Education and/or its licensors
be liable for any indirect, incidental, special, punitive,
consequential or similar damages that result from the use of or
inability to use the work, even if any of them has been advised of
the possibility of such damages. This limitation of liability shall
apply to any claim or cause whatsoever whether such claim or
cause arises in contract, tort or otherwise.
This book is dedicated to you, the reader. My wish is that you
use the knowledge in this book to secure your potential.
Knowing that you may benefit by my efforts drove me to the
finish line. Here’s to your future success.
CONTENTS AT A GLANCE
Chapter 1 Cloud Computing Concepts and Architectures
Chapter 2 Governance and Enterprise Risk Management
Chapter 3 Legal Issues, Contracts, and Electronic
Discovery
Chapter 4 Compliance and Audit Management
Chapter 5 Information Governance
Chapter 6 Management Plane and Business Continuity
Chapter 7 Infrastructure Security
Chapter 8 Virtualization and Containers
Chapter 9 Incident Response
Chapter 10 Application Security
Chapter 11 Data Security and Encryption
Chapter 12 Identity, Entitlement, and Access Management
Chapter 13 Security as a Service
Chapter 14 Related Technologies
Chapter 15 ENISA Cloud Computing: Benefits, Risks, and
Recommendations for Information Security
Appendix A Cloud Computing Security Policy Examples
Appendix B About the Online Content
Glossary
Index
CONTENTS
Foreword
Acknowledgments
Introduction
Chapter 1 Cloud Computing Concepts and Architectures
Cloud Logical Model
Infrastructure
Metastructure
Infostructure
Applistructure
Cloud Computing Definitions
Essential Characteristics
Cloud Service Models
Cloud Deployment Models
Cloud Security Scope and the Shared Responsibility Model
Shared Responsibility Model
Cloud Security Alliance Tools
Cloud Controls Matrix
Consensus Assessments Initiative Questionnaire
STAR Registry
Cloud Reference and Architecture Models
Chapter Review
Questions
Answers
Chapter 2 Governance and Enterprise Risk Management
Governance
Governance Backgrounder
Cloud Governance
Risk Management
Risk Management Backgrounder
Cloud Risk Management
The Effects of Service and Deployment Models
Cloud Risk Management Trade-Offs
Assessing Cloud Service Providers
Chapter Review
Questions
Answers
Chapter 3 Legal Issues, Contracts, and Electronic
Discovery
Legal Frameworks Governing Data Protection and Privacy
Required Security Measures
Treaties
Restrictions to Cross-Border Data Transfers
CLOUD Act
Regional Examples
Asia Pacific Region
European Union and European Economic Area
The Americas
Contracts and Provider Selection
Internal Due Diligence
Monitoring, Testing, and Updating
External Due Diligence
Contract Negotiations
Third-Party Audits and Attestations
Electronic Discovery
Possession, Custody, and Control
Relevant Cloud Applications and Environment
Searchability and E-Discovery Tools
Preservation
Data Retention Laws and Recordkeeping Obligations
Data Collection
Forensics
Reasonable Integrity
Direct Access
Native Production
Authentication
Cooperation Between Provider and Client in E-Discovery
Response to a Subpoena or Search Warrant
Chapter Review
Questions
Answers
Chapter 4 Compliance and Audit Management
Compliance Backgrounder
Impact of the Cloud on Contracts
How the Cloud Changes Compliance
Compliance Inheritance
Continuous Compliance
Audit Backgrounder
Audit Management in the Cloud
SOC Reports and ISO Certifications Backgrounder
SOC Backgrounder
ISO Backgrounder
How the Cloud Changes Audits
Right to Audit
Audit Scope
Auditor Requirements
Chapter Review
Questions
Answers
Chapter 5 Information Governance
Cloud Information Governance Domains
Information Classification Backgrounder
Information Management Backgrounder
The Data Security Lifecycle
Locations and Entitlements
Functions, Actors, and Controls
Chapter Review
Questions
Answers
Chapter 6 Management Plane and Business Continuity
Management Plane
Application Programming Interface Backgrounder
Accessing the Management Plane
Securing the Management Plane
Business Continuity and Disaster Recovery in the Cloud
BCP/DR Backgrounder
Architecting for Failure
Business Continuity Within the Cloud Provider
Chaos Engineering
Business Continuity for Loss of the Cloud Provider
Continuity for Private Cloud and Providers
Chapter Review
Questions
Answers
Chapter 7 Infrastructure Security
Cloud Network Virtualization
OSI Reference Model Backgrounder
VLANs
VXLAN
Networking Planes Backgrounder
Software Defined Networking
Network Functions Virtualization
How Security Changes with Cloud Networking
Challenges of Virtual Appliances
Benefits of SDN Security
Microsegmentation and the Software Defined Perimeter
Additional Considerations for CSPs or Private Clouds
Hybrid Cloud Considerations
Cloud Compute and Workload Security
Compute Abstraction Technologies
How the Cloud Changes Workload Security
Immutable Workloads Enable Security
The Impact of the Cloud on Standard Workload Security
Controls
Changes to Workload Security Monitoring and Logging
Changes to Vulnerability Assessment
Chapter Review
Questions
Answers
Chapter 8 Virtualization and Containers
Major Virtualization Categories Relevant to Cloud Computing
Compute Virtualization
Network Virtualization
Storage Virtualization
Containers
Container Definitions Backgrounder
Container Security Recommendations
Chapter Review
Questions
Answers
Chapter 9 Incident Response
Incident Response Lifecycle
Incident and Event Backgrounder
Preparation Phase
Detection and Analysis Phase
Containment, Eradication, and Recovery Phase
Post-Incident Activity Phase
How the Cloud Impacts Incident Response
Preparation
Detection and Analysis
Containment, Eradication, and Recovery
Post-Incident Activity
Chapter Review
Questions
Answers
Chapter 10 Application Security
The SSDLC and Cloud Computing
Secure Design and Development
Training
Define
Design
Develop
Test
Secure Deployment
Cloud Impacts on Vulnerability Assessments
Cloud Impact on Penetration Testing
Deployment Pipeline Security
Impact of IaC and Immutable Workloads
Secure Operations
How the Cloud Impacts Application Design and Architectures
Microservices Backgrounder
The Rise and Role of DevOps
DevOps Backgrounder
Security Implications and Advantages of DevOps
Chapter Review
Questions
Answers
Chapter 11 Data Security and Encryption
Data Security Controls
Cloud Data Storage Types
Managing Data Migrations to the Cloud
CASB Backgrounder
Securing Cloud Data Transfers
Securing Data in the Cloud
Cloud Data Access Controls
Storage (at Rest) Encryption and Tokenization
Key Management (Including Customer-Managed Keys)
Data Security Architecture
Monitoring, Auditing, and Alerting
Additional Data Security Controls
Cloud Platform/Provider-Specific Controls
Data Loss Prevention
Enterprise Rights Management
Data Masking and Test Data Generation
Enforcing Lifecycle Management Security
Chapter Review
Questions
Answers
Chapter 12 Identity, Entitlement, and Access Management
How IAM Works in the Cloud
IAM Terms
IAM Standards
Federation Backgrounder
Managing Users and Identities for Cloud Computing
Authentication and Credentials
Entitlements and Access Management
Privileged User Management
Chapter Review
Questions
Answers
Chapter 13 Security as a Service
Potential Benefits and Concerns of SecaaS
Major Categories of SaaS Offerings
Identity, Entitlement, and Access Management Services
Cloud Access Security Broker
Web Security Gateway
Other documents randomly have
different content
Scott, Sir Walter, 643.
Scottish rivers’ victims, 244.
se, 643.
sea-serpent, the, 122.
Sebastian, Dom, 482.
Sébillot, 273.
sechem, 225.
second sight, 158, 275, 330.
sēdes, 677.
Seely Court, the, 592: see silly.
Segais, 392.
Segantii, 385: see Setantii.
Seidhun, 331, 386: see Sein.
Seidi, 388: see Saidi.
seiet, the, 350.
seig, 611.
seily, seely, 591: see silly.
Sein, Sun, 331, 386.
Seirith, 569.
Seithennin, Seithenhin, 383–8, 395, 419.
Seithyn, 386–8.
Sena, 331.
Senaudon, 562: see Snowdon.
senchasa, 498.
Senghenyđ, 26.
Seren Gomer, 167.
Seri, 569.
Serrigi, Serigi, 565, 569.
Serw, the, 206.
Sescenn Uairbeóil, 510.
sessam, -om, 225.
Setanta, 385, 387, 388, 656, 657.
Setantii, 385, 387.
Seteia, Segeia, 387.
Sethor . ethor . othor, &c., 635.
Setinte, Setinti, 387.
Severn, 391, 407, 449.
Sgubor Gerrig, 198, 199.
shag-foal, the, 324.
shaman, 631.
Shannon, the, 390.
shears, Twrch’s, 512.
sheep sacrifice, 308.
Shenn Laa Boaldyn, 307, 308.
sheriff, 569.
Shetland fishermen, 346.
Shetlands, the, 679.
Shone, 31.
Siân William, 237.
sibh, 643.
Sibi, 97, 668.
siblais, siblad, silis, 436, 437.
Sichfraith, Sichraidh, 569.
síd, síth, 383, 657, 658, 680.
Síd Nechtáin, 383.
síde, 678, 683.
Sidi, Caer, 678: see under Caer.
Siegfried, 569.
signourie et princeté, 491.
Sigrœđ-r, 569: see Siegfried.
Sigtrygg-r, 569.
Sikes, Wirt, 99, 169, 173, 191, 195, 405.
silence in visiting a well, 362.
silly frit, Sìli Ffrit, 64–6, 229, 584, 585, 591, 592, 597.
Silly go Dwt, Sìli g. D., 229, 584, 590–2, 597.
Silvan Evans, Chancellor D., 40, 156, 271, 273, 357.
silver to shoot witches with, 294.
simach, 67.
Simond, Simonds, 67, 68.
Simwch, 67.
Simwnt, 67: see Simond.
Simychiaid, 67, 668.
Sinann, Sinand, Sinend, 390–2, 395.
Singhalese, the, 627.
Sinodun, Sinadoun, 562: see Snowdon.
Siôn, 31.
Siôn Ifan, 201.
Sitriuce, Sitriug, 569.
Sizun, 331, 386: see Sein.
σκιαί, 627.
skilled man, the, 102, 111: see cunning.
sl, l, 542.
Slamannan, 550.
Slaney, the, 581.
sleih beggey, 289.
Sliabh na Caillighe, 393.
Slieau Maggyl, 315.
— Whallian, 296.
Sloe, Slack, 510.
Smith, Dr. A., 344.
smiths, 294, 295.
Smychiaid, 67–9: see Simychiaid.
Snaefell, 286, 287, 312, 314.
snakes, 689, 690.
Snowdon, 509, 533, 554, 559, 560, 562.
soap as fairy ointment, 213, 669.
Soar, 547.
Sodom, 73.
sods, properties of certain, 158, 170, 171, 303.
sojourner in Faery, the, 291: see Faery.
Solomon, Wm. Thos., 208–10.
Solor, 565.
son oural, 307, 308.
Sophia, 692.
soul, the, 601–4, 607, 608, 611, 612, 626, 627.
sour apple-tree portent, the, 60.
spaagagh, 337, 339.
Spain, 489.
spear ground during mass, 315.
— stone-tipped, 689.
Spencer, Edward, 489.
— and Gillen, 662, 663.
spinning after supper in winter, 212.
standing on another’s foot, 330.
stealing the fairies’ flowers, 21.
steel, 128: see iron.
Stepney-Gulston, Mr., 468.
Stevenson, Mr., 547, 563.
Stifyn Ifan, 400.
Stindwy, 443: see Ỻan Ystumdwy.
stockaded isle, 73: see Syfađon.
Stokes, Dr. Whitley, 519, 527, 575, 618.
stone age, the, 606.
stones thrown into the bonfire, 225.
Straỻyn, 443: see Ỻyn Cwm Straỻyn.
strand, 39.
Strangford Lough, 426.
Strata Florida, 12, 579.
strath, 39.
straw to curse with, 345.
— spun into gold, 214.
Sualdaim, 657.
submerged bells, 405, 415, 417.
súi, gen. suad, 616.
súithe, 616, 617.
Sunday of harvest, the first, 312–5: see August.
superstitions modified, 216, 313, 612.
surnames, 163: see Davies, Jones, Mason.
Svatovit, 553.
Swaffham, 466, 467.
Swan Maidens, the, 583.
swans, the Children of Lir as, 94.
Swansea Bay, 402.
Swyđ Ffynnon, 246, 250.
Syfađon, 19, 73, 74, 134, 379, 401, 415, 429, 452, 496, 534.
sympathetic magic, 638: see magic.
synhuir vann, 385.
syrcyn, 106.
Syrigi, 565, 569: see Serrigi.
syw, sywyd, sywedyđ, 616, 617.
Tabhîda, Dyphryn, 22.
Tacitus, 271, 408, 559.
Taf, the, 449, 534.
Taff, the, 175, 449.
Tafwys, 449: see Tamesis.
taghairm, the, 320.
Tai Bach, 31.
— Teulwriaid, 55.
Táin Bó Cuailnge, 657.
Tal y Clegyr, 202.
— y Ỻychau, 12.
— y Treuđin, 533.
Talhaiarn, 617.
Taliesin ab Iolo, 439.
Taliessin, 614–7.
Taỻwch, 499.
Tamesis, 449.
Tamise, la, 449.
tappag, the, 353.
Tarawg, 529.
Tarr-cáin, 391.
Tarren y Cigfrain, 181, 189.
— y Crynwyr, 175.
tarroo ushtey, 284, 285.
Tarvos Trigaranus, 581.
tarw penwyn Corwrion, 52, 55, 61.
tatter-colt, tatter-foal, 324.
tattooing, 682.
tau, tawaf, 280.
taut, 592.
Tawe, 522.
Taxatio of Nicholas IV, 516.
Tegai, 52.
Tegau Eurfron, 689.
Tegid, 408: see Tacitus.
— Foel, 408.
— Lake, 376: see Ỻyn Tegid.
— Morgan, 120–3.
Tegid’s monster, 122, 123.
Teifi, the, 577.
Teilo’s skull, 399.
— well, 398, 399.
Teirgwaeđ, 510.
Teithion, 530.
telyn aur, 148.
Teme, the, 22.
Ternóc, 568.
Testament, the New, 493.
Tethra, 291.
Teulu Oeth, &c., 619.
teuz, 375.
Teyrnon, 226.
th, 2.
th, đ, omitted, 563.
Thames, the, 449.
Thargelia, the, 310.
third Peel boat, the, 343.
þokk, 651.
Thomas, David, 60.
—, D. Ỻeufer, 469.
—, Evan, 198, 199.
—, Howell, 125.
—, Hugh, 73.
—, John, 217.
—, Rees, 380.
— ab Rhodri, 491.
thorns for pins, 365.
three advices, the mermaid’s, 166.
— battle-knights, 509.
— blows, the, 6, 9, 10, 28: see three disagreements.
— boundaries, junction of, 295.
— chief enchanters, 505.
— disagreements, the, 28: see three blows.
— Islands of the Mighty, 280.
— Islands of Prydain, 280, 281.
— Marchlyn ladies, 236.
— outpost Isles, 280.
— Sons of the Gapless Sword, 529.
Thurneysen, Dr., 533.
Till, the, 244.
Tír Cluchi Midir ocus Maic Óic, 436.
— Dimuner, 528.
— nan Óg, 678.
— Tairngirc, 390.
— fo Thuinn, 437.
Tobar a vëac, 692.
tocad, 647.
toeli, the, 273, 274, 279.
toleth, tolaeth, 273, 274: see tylwyth.
Tom na Hurich, 483.
— Tit Tot, 584, 590, 592.
tòn, 176.
torc, 521.
torgochiaid, 33.
Torogi, Tarogi, 503, 505, 506: see Troggy.
torrog, torogi, 508: see Troggy.
Tortain, 693.
tote, 592.
Touaregs, 682.
Toubir-more, 692: see Tobar a vëac.
toulu, 273: see toeli.
tout, 592.
Towy, 146.
Towyn Trewern, 37.
Trachmyr, 529, 530, 537.
Traeth Lafan, 402.
traha, 395.
Traỻwng, Traỻwn, Traỻwm, 378.
tramynyat, 514.
Trawsfynyđ parson, the, 102.
Tre’ Gaerfyrđin, 207.
— Geiri, 280: see Tre’r Ceiri.
— Wylan, 410.
treasure-finders, 148.
tref, tre’, 207.
Tref Rita, 478.
Treflys, 60.
Trefriw, 30, 198, 199.
Tregalan, 473, 476.
Tregan Anthrod, &c., 208, 218, 219: see Caer Arianrhod.
Tregaranthreg, 207, 208.
Tregaron, 577.
Tremadoc, 443.
Tremains, 354.
Tre’r Ceiri, 214, 279, 280, 283, 686.
— Gwyđelod, 566.
Tretower, 516, 518.
Trevine, Trefin, 165, 171.
Triads, the Welsh, 429, 440–5, 498–501, 503–6, 509, 560, 570.
—, Irish, 498.
triath, gen. tréith, 521, 522.
Triban Morgannwg, 19.
Tricephal, the, 653.
Triglaus, 553.
Tringad, 530.
Trinio, 71, 72, 496.
Trinity invoked in charms, the, 297.
Triple Alliance, the, 486.
Tristan, Trystan, 499: see Drystan.
Trit-a-Trot, 593, 597, 694.
Troed yr Aur, 166, 464–6.
tröeỻ bach, 64, 229, 584.
Troggy, 506, 508.
Troia, 444.
Troit, Porcus, 538, 541.
Trojans, the, 271, 280, 281.
trot, 694.
trwi, 29.
trwtan, trwdlan, 592.
Trwtyn-Tratyn, 229, 592, 597, 694.
Trwyd, 541: see Trwyth.
Trwyn Swch, 693.
— Swncwl, 278: see Bwlch T. S.
Trwyth, 541, 544.
Tryfan, 580.
Tuan mac Cairill, 611, 615, 618, 620, 621.
Tuatha Dé ocus Andé, 637.
— Dé Danann, 454, 544, 548–50, 554, 685.
Tudwal Roads, 232.
Tunccetace, 647.
tut, tud, 374, 375.
tuthe, 374.
Tweed, the, 244.
twin changelings, 692.
Twm Bach, 202.
— Bryn Syỻty, 199.
— Ifan Siams, 80.
two first things, 107.
Twrch, the river, 524.
— Ỻawin, 514, 522.
— Trwyth, 509–15, 519–30, 534, 536–9, 552, 565, 693.
twt, 592.
Twyn y moch, 536.
Twyne, Thomas, 412.
Ty Gwyn, 534.
Tydoch, 163.
tyđyn, tyn, 33.
Tyđyn y Barcud, 62.
Ty-fry, 26, 27.
Tylen, 210: see Dylan.
tyloethod, 274.
Tylor, Professor, 290, 329, 641, 657.
tylwyth, 273.
Tylwyth Teg, 115, 671.
tylwythes, -en, 48.
tyn = tyđyn, 33, 367.
Tyn y Ffynnon, 366, 367.
— Gadlas, 33.
— Ỻan, 78.
— yr Onnen, 33.
— Siarlas, 33.
tynghed, 644, 646–51, 694.
tyngu, 225, 647–9, 694.
Tyno Helig, 387, 415, 422.
Týr, 642.
Uairbhél, 510.
Uath mac Imomain, 618.
uđ, 203.
ugliness of fairies, 262: see fairies.
Ulfilas, 626.
Ulster, 502.
— women, the, 498.
umbræ, 627.
un, dau, tri, pedwar, pump, 418, 419.
Undine, 1, 124, 389, 437, 661.
unlucky things, 342–5.
Uoret, 217.
Urđawl Ben, 552.
Urnach, 507, 564, 565.
Urogenonertus, 580.
urus, the, 579–81.
Usk, the, 518.
uwchwynt, yr, 596.
uzon, 626.
v = Welsh f, 2.
vates, 616.
Vaughan the antiquary, 491.
vel p’agh sthie, 349.
Velfrey, 512, 513.
Vendubar-i, 568.
vengeance, the cry of, 403, 404, 408, 409, 413, 414, 452.
—, delay of, 423.
Vergilius, 539.
Verwig, 166, 167.
Vigfusson, Dr., 321.
vir, 264.
Virginia Water, 394.
Viriatus, 218.
Visurix, 662.
voices concerning the murdered, 73.
Volospá, 322.
Voltaire, 640.
Vortigern, 218, 469, 470, 487, 507.
Vulgate, the, 287.
Waen Fawr, 41, 275.
Warinsey, sibyl of, 331: see Guernsey.
Warrefield, 314.
warts, 297, 360–2.
Wastinus, 71: see Gwestin.
watch and ward, 311.
water efficacious during mass, 315.
water-bull, the, 284, 285, 289, 323.
water-horse, the, 324, 433, 434.
Waungyrlais, 20.
wealhstód, 511.
wedding, a Welsh, 277.
wele dacw, 109.
well priesthood, 389, 396, 400.
— ritual, 332, 333, 395, 396, 399.
— water bottled, 315.
well, Ỻancarvan, 356.
—, St. Maughold’s, 333.
—, St. Teilo’s, 398, 399.
Wellington, Duke of, 494.
wells, covered, 389, 394, 692.
—, Manx mountain, 314.
wells for dadwitsio, 363.
— with pins and rags, 327, 332–5, 355–7.
—: see Ffynnon.
Welsh rabbit, 614.
— spelling, 671.
Welshpool, 378.
wenestir, finaun, 395.
Werđon, 204, 205.
— gwel’d y, 204, 205.
Wesleyan Methodists, 348, 353.
Wessobrunn Codex, 682.
Weun Gonnws, 568.
Wexford Harbour, 427.
white dog and his owner, the, 148.
— stones, 344, 345.
Whitland, 534.
Whuppity Stoorie, 588, 590.
Wi, Wi Wei, 277.
wicken, 325: see rowan.
widow’s son, the, 3, 29, 660, 661.
wife caned, the, 54.
Wight, Isle of, 281.
William Dafyđ, 78, 80.
— Ỻeyn, 693.
— Wmffra, 80.
Williams, Canon, 130.
—, Evan, 230.
—, Jane, 221.
—, Owen, 207.
—, Sir Robert, 478.
—, S. Rhys, 89.
— of Trefriw, Thos., 280.
—, William, 193.
Williams-Ellis, J. C., 368, 371.
——, Mrs., 278, 366, 368, 371, 471.
Willin, Clerk, 410–2.
wind, traffic in, 330, 331.
Windele’s MSS., 335.
window opened for a changeling, 103.
window opened for a death, 601.
Winter Nights, Feast of the, 321.
wisps, traffic in, 299.
witch pronounced butch, the word, 294, 691.
— at crossroads, the, 295.
— of Endor, the, 349.
— as a hare, the, 309.
— and the heart, the, 305.
witchcraft, how inherited, 326.
witches bled, 326.
— caught by a black greyhound, 294.
— fetched by boiling herbs, 300.
— fetched by burning a carcase, 305.
— tortured to death, 296.
witch’s besom, the, 295, 296.
— face, 305.
with, 630.
Woden, 676.
wood fires in Glamorgan, 267.
wool, virtue of, 357, 361.
wormwood, &c., the charmer using, 299.
Wright, Professor, 66.
Wrnach, Gwrnach, 565.
Wryd, Wryd! 217.
wy, 516.
Wye, the, 391, 516.
wyneb, 634.
Wynne, Sir John, 490, 670.
— of Peniarth, Mr., 242.
Wynns, the, 444.
wyrion, 70.
Y Bala aeth, 378.
— Blaiđ, 528.
— Dinas, 469, 470.
— Đinas, 467.
— Gromlech, 673.
y law, 198.
— raw, 198.
Y Wyđfa, 479.
Yarrow Kirk, 448.
ych, 530.
Ychain Mannog, 131, 132: see Ychen Bannog.
Ychain Mannog melody, the, 132.
Ychen Bannog, Bannawc, 131, 142, 561, 579, 580.
year, the Celtic, 317.
—, the Norse, 321.
yellow hair and blue eyes, 148.
Yeuwains, 488: see Yvain.
ym, 523.
Ymhacsen, 564.
Ynys y Ceûri, Ceiri, 280, 283.
— Enỻi, 413, 440.
— Geinon, 254, 255, 674.
— y Kedyrn, 280, 282, 283, 386.
— Prydein, 281, 282.
— Wair, 679.
Yr Ystrad, 39–46.
ysbryd y lantar, 59.
Yscawt, 529.
Yskithyrwynn Pennbeiđ, 520.
Yspađaden, 520, 646, 647.
Yspytty Ifan, 206, 693.
Ystalyfera, 251, 522.
Ystrad, 39.
— Dyfodwg, 23, 461, 582.
— Einon, 517.
— Fflur, 578.
— Gynlais, 522.
— Meurig, 216, 244–8, 601, 661, 669.
— Rhonđa, 27.
— Yw, 516, 517, 524, 531, 536.
Ystradfellte, 255.
Ystum Cegid, 220.
ystyr, 511.
Yvain, Yeuwains, Yewains, 488–91.
yw, Yw, ywen, 516–8, 524, 531, 534, 536.
Ywains le fils Urien, 490.
Ywein, Ewein, 489: see Owen Lawgoch.
Ζεύς, 642, 644, 652.
Zimmer, Professor, 375, 480, 544, 694.
Zipporah, 583.
THE END.
OXFORD
PRINTED AT THE CLARENDON PRESS
BY HORACE HART, M.A.
PRINTER TO THE UNIVERSITY
Welcome to our website – the perfect destination for book lovers and
knowledge seekers. We believe that every book holds a new world,
offering opportunities for learning, discovery, and personal growth.
That’s why we are dedicated to bringing you a diverse collection of
books, ranging from classic literature and specialized publications to
self-development guides and children's books.
More than just a book-buying platform, we strive to be a bridge
connecting you with timeless cultural and intellectual values. With an
elegant, user-friendly interface and a smart search system, you can
quickly find the books that best suit your interests. Additionally,
our special promotions and home delivery services help you save time
and fully enjoy the joy of reading.
Join us on a journey of knowledge exploration, passion nurturing, and
personal growth every day!
ebookmasss.com

More Related Content

PDF
CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide Graham Tho...
PDF
[PDF Download] CCSK Certificate of Cloud Security Knowledge All-in-One Exam G...
PDF
CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide Graham Tho...
PDF
Sscp Systems Security Certified Practitioner Allinone Exam Guide Third Editio...
PDF
Cloud Computing: Concepts, Technology, Security, and Architecture, Second Edi...
PDF
Cloud Computing: Concepts, Technology, Security, and Architecture, Second Edi...
PDF
Cloud Computing: Concepts, Technology, Security, and Architecture, Second Edi...
PDF
SSCP Systems Security Certified Practitioner All in One Exam Guide Third Edit...
CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide Graham Tho...
[PDF Download] CCSK Certificate of Cloud Security Knowledge All-in-One Exam G...
CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide Graham Tho...
Sscp Systems Security Certified Practitioner Allinone Exam Guide Third Editio...
Cloud Computing: Concepts, Technology, Security, and Architecture, Second Edi...
Cloud Computing: Concepts, Technology, Security, and Architecture, Second Edi...
Cloud Computing: Concepts, Technology, Security, and Architecture, Second Edi...
SSCP Systems Security Certified Practitioner All in One Exam Guide Third Edit...

Similar to CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide Graham Thompson (20)

PDF
SSCP Systems Security Certified Practitioner All in One Exam Guide Third Edit...
PDF
Cloud Computing: Concepts, Technology, Security, and Architecture, Second Edi...
PDF
Network Security Through Data Analysis From Data To Action 2nd Edition Michae...
PDF
Computer Security Principles and Practice 3rd Edition William Stallings
PDF
PDF
Google Cloud Certified Associate Cloud Engineer All-in-One Exam Guide 1st Edi...
PDF
Ccsk course content v1
DOC
Cloud security
PDF
Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...
PDF
Why CCSK with InfosecTrain (1).pdf
PDF
Slide Deck Class Session 10 – FRSecure CISSP Mentor Program
PDF
Secure Cloud Storage
PDF
Full download Cloud Computing: Concepts, Technology, Security, and Architectu...
PPTX
Security issues in cloud database
PPT
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
PPT
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
PPTX
Guide to security patterns for cloud systems and data security in aws and azure
PPTX
Slide Deck – Session 10 – FRSecure CISSP Mentor Program 2017
PPT
Effectively and Securely Using the Cloud Computing Paradigm
PDF
Cloud Computing: Concepts, Technology, Security, and Architecture, Second Edi...
SSCP Systems Security Certified Practitioner All in One Exam Guide Third Edit...
Cloud Computing: Concepts, Technology, Security, and Architecture, Second Edi...
Network Security Through Data Analysis From Data To Action 2nd Edition Michae...
Computer Security Principles and Practice 3rd Edition William Stallings
Google Cloud Certified Associate Cloud Engineer All-in-One Exam Guide 1st Edi...
Ccsk course content v1
Cloud security
Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...
Why CCSK with InfosecTrain (1).pdf
Slide Deck Class Session 10 – FRSecure CISSP Mentor Program
Secure Cloud Storage
Full download Cloud Computing: Concepts, Technology, Security, and Architectu...
Security issues in cloud database
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Guide to security patterns for cloud systems and data security in aws and azure
Slide Deck – Session 10 – FRSecure CISSP Mentor Program 2017
Effectively and Securely Using the Cloud Computing Paradigm
Cloud Computing: Concepts, Technology, Security, and Architecture, Second Edi...
Ad

Recently uploaded (20)

PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
My India Quiz Book_20210205121199924.pdf
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
International_Financial_Reporting_Standa.pdf
PDF
Hazard Identification & Risk Assessment .pdf
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
Trump Administration's workforce development strategy
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Cambridge-Practice-Tests-for-IELTS-12.docx
TNA_Presentation-1-Final(SAVE)) (1).pptx
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
History, Philosophy and sociology of education (1).pptx
Environmental Education MCQ BD2EE - Share Source.pdf
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
My India Quiz Book_20210205121199924.pdf
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Paper A Mock Exam 9_ Attempt review.pdf.
International_Financial_Reporting_Standa.pdf
Hazard Identification & Risk Assessment .pdf
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Trump Administration's workforce development strategy
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
B.Sc. DS Unit 2 Software Engineering.pptx
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
Ad

CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide Graham Thompson

  • 1. Download the full version and explore a variety of ebooks or textbooks at https://ebookmass.com CCSK Certificate of Cloud Security Knowledge All- in-One Exam Guide Graham Thompson _____ Follow the link below to get your download now _____ https://ebookmass.com/product/ccsk-certificate-of-cloud- security-knowledge-all-in-one-exam-guide-graham-thompson/ Access ebookmass.com now to download high-quality ebooks or textbooks
  • 2. We have selected some products that you may be interested in Click the link to download now or visit ebookmass.com for more options!. Ccsp Certified Cloud Security Professional All-In-One Exam Guide Daniel Carter https://ebookmass.com/product/ccsp-certified-cloud-security- professional-all-in-one-exam-guide-daniel-carter/ CCSP Certified Cloud Security Professional All-in-One Exam Guide 3rd Edition Daniel Carter https://ebookmass.com/product/ccsp-certified-cloud-security- professional-all-in-one-exam-guide-3rd-edition-daniel-carter/ Google Cloud Certified Professional Cloud Architect All- in-One Exam Guide Iman Ghanizada https://ebookmass.com/product/google-cloud-certified-professional- cloud-architect-all-in-one-exam-guide-iman-ghanizada/ Google Cloud Certified Associate Cloud Engineer All-in-One Exam Guide Jack Hyman https://ebookmass.com/product/google-cloud-certified-associate-cloud- engineer-all-in-one-exam-guide-jack-hyman/
  • 3. CompTIA Security+ All-in-One Exam Guide (Exam SY0-601)) Wm. Arthur Conklin https://ebookmass.com/product/comptia-security-all-in-one-exam-guide- exam-sy0-601-wm-arthur-conklin/ AWS Certified Cloud Practitioner All-in-One Exam Guide (Exam CLF-C01) Daniel Carter https://ebookmass.com/product/aws-certified-cloud-practitioner-all-in- one-exam-guide-exam-clf-c01-daniel-carter/ CompTIA Cloud+ Certification All-in-One Exam Guide (Exam CV0-003) Eric A. Vanderburg https://ebookmass.com/product/comptia-cloud-certification-all-in-one- exam-guide-exam-cv0-003-eric-a-vanderburg/ Google Cloud Certified Professional Cloud Architect All- in-One Exam Guide 1st Edition Iman Ghanizada https://ebookmass.com/product/google-cloud-certified-professional- cloud-architect-all-in-one-exam-guide-1st-edition-iman-ghanizada/ AWS Certified Security Specialty All-in-One Exam Guide (Exam SCS-C01) Tracy Pierce https://ebookmass.com/product/aws-certified-security-specialty-all-in- one-exam-guide-exam-scs-c01-tracy-pierce/
  • 6. Contents 1. Cover 2. About the Author 3. Title Page 4. Copyright Page 5. Dedication 6. Contents at a Glance 7. Contents 8. Foreword 9. Acknowledgments 10. Introduction 11. Chapter 1 Cloud Computing Concepts and Architectures 1. Cloud Logical Model 1. Infrastructure 2. Metastructure 3. Infostructure 4. Applistructure 2. Cloud Computing Definitions 1. Essential Characteristics 2. Cloud Service Models 3. Cloud Deployment Models 3. Cloud Security Scope and the Shared Responsibility Model 1. Shared Responsibility Model 2. Cloud Security Alliance Tools 3. Cloud Controls Matrix 4. Consensus Assessments Initiative Questionnaire 5. STAR Registry 6. Cloud Reference and Architecture Models
  • 7. 4. Chapter Review 1. Questions 2. Answers 12. Chapter 2 Governance and Enterprise Risk Management 1. Governance 1. Governance Backgrounder 2. Cloud Governance 2. Risk Management 1. Risk Management Backgrounder 3. Cloud Risk Management 1. The Effects of Service and Deployment Models 2. Cloud Risk Management Trade-Offs 3. Assessing Cloud Service Providers 4. Chapter Review 1. Questions 2. Answers 13. Chapter 3 Legal Issues, Contracts, and Electronic Discovery 1. Legal Frameworks Governing Data Protection and Privacy 1. Required Security Measures 2. Treaties 3. Restrictions to Cross-Border Data Transfers 4. CLOUD Act 2. Regional Examples 1. Asia Pacific Region 2. European Union and European Economic Area
  • 8. 3. The Americas 3. Contracts and Provider Selection 1. Internal Due Diligence 2. Monitoring, Testing, and Updating 3. External Due Diligence 4. Contract Negotiations 5. Third-Party Audits and Attestations 4. Electronic Discovery 1. Possession, Custody, and Control 2. Relevant Cloud Applications and Environment 3. Searchability and E-Discovery Tools 4. Preservation 5. Data Retention Laws and Recordkeeping Obligations 6. Data Collection 7. Forensics 8. Reasonable Integrity 9. Direct Access 10. Native Production 11. Authentication 12. Cooperation Between Provider and Client in E- Discovery 13. Response to a Subpoena or Search Warrant 5. Chapter Review 1. Questions 2. Answers 14. Chapter 4 Compliance and Audit Management 1. Compliance Backgrounder 2. Impact of the Cloud on Contracts 3. How the Cloud Changes Compliance 1. Compliance Inheritance 2. Continuous Compliance
  • 9. 4. Audit Backgrounder 5. Audit Management in the Cloud 6. SOC Reports and ISO Certifications Backgrounder 1. SOC Backgrounder 2. ISO Backgrounder 7. How the Cloud Changes Audits 1. Right to Audit 2. Audit Scope 3. Auditor Requirements 8. Chapter Review 1. Questions 2. Answers 15. Chapter 5 Information Governance 1. Cloud Information Governance Domains 1. Information Classification Backgrounder 2. Information Management Backgrounder 2. The Data Security Lifecycle 1. Locations and Entitlements 2. Functions, Actors, and Controls 3. Chapter Review 1. Questions 2. Answers 16. Chapter 6 Management Plane and Business Continuity 1. Management Plane 1. Application Programming Interface Backgrounder
  • 10. 2. Accessing the Management Plane 3. Securing the Management Plane 2. Business Continuity and Disaster Recovery in the Cloud 1. BCP/DR Backgrounder 2. Architecting for Failure 3. Business Continuity Within the Cloud Provider 4. Chaos Engineering 5. Business Continuity for Loss of the Cloud Provider 6. Continuity for Private Cloud and Providers 3. Chapter Review 1. Questions 2. Answers 17. Chapter 7 Infrastructure Security 1. Cloud Network Virtualization 1. OSI Reference Model Backgrounder 2. VLANs 3. VXLAN 4. Networking Planes Backgrounder 5. Software Defined Networking 6. Network Functions Virtualization 2. How Security Changes with Cloud Networking 1. Challenges of Virtual Appliances 2. Benefits of SDN Security 3. Microsegmentation and the Software Defined Perimeter 4. Additional Considerations for CSPs or Private Clouds 5. Hybrid Cloud Considerations 3. Cloud Compute and Workload Security 1. Compute Abstraction Technologies 2. How the Cloud Changes Workload Security
  • 11. 3. Immutable Workloads Enable Security 4. The Impact of the Cloud on Standard Workload Security Controls 5. Changes to Workload Security Monitoring and Logging 6. Changes to Vulnerability Assessment 4. Chapter Review 1. Questions 2. Answers 18. Chapter 8 Virtualization and Containers 1. Major Virtualization Categories Relevant to Cloud Computing 1. Compute Virtualization 2. Network Virtualization 3. Storage Virtualization 2. Containers 1. Container Definitions Backgrounder 2. Container Security Recommendations 3. Chapter Review 1. Questions 2. Answers 19. Chapter 9 Incident Response 1. Incident Response Lifecycle 1. Incident and Event Backgrounder 2. Preparation Phase 3. Detection and Analysis Phase 4. Containment, Eradication, and Recovery Phase 5. Post-Incident Activity Phase 2. How the Cloud Impacts Incident Response
  • 12. 1. Preparation 2. Detection and Analysis 3. Containment, Eradication, and Recovery 4. Post-Incident Activity 3. Chapter Review 1. Questions 2. Answers 20. Chapter 10 Application Security 1. The SSDLC and Cloud Computing 2. Secure Design and Development 1. Training 2. Define 3. Design 4. Develop 5. Test 3. Secure Deployment 1. Cloud Impacts on Vulnerability Assessments 2. Cloud Impact on Penetration Testing 3. Deployment Pipeline Security 4. Impact of IaC and Immutable Workloads 4. Secure Operations 5. How the Cloud Impacts Application Design and Architectures 1. Microservices Backgrounder 6. The Rise and Role of DevOps 1. DevOps Backgrounder 2. Security Implications and Advantages of DevOps 7. Chapter Review 1. Questions
  • 13. 2. Answers 21. Chapter 11 Data Security and Encryption 1. Data Security Controls 2. Cloud Data Storage Types 3. Managing Data Migrations to the Cloud 1. CASB Backgrounder 2. Securing Cloud Data Transfers 4. Securing Data in the Cloud 1. Cloud Data Access Controls 2. Storage (at Rest) Encryption and Tokenization 3. Key Management (Including Customer-Managed Keys) 5. Data Security Architecture 6. Monitoring, Auditing, and Alerting 7. Additional Data Security Controls 1. Cloud Platform/Provider-Specific Controls 2. Data Loss Prevention 3. Enterprise Rights Management 4. Data Masking and Test Data Generation 8. Enforcing Lifecycle Management Security 9. Chapter Review 1. Questions 2. Answers 22. Chapter 12 Identity, Entitlement, and Access Management 1. How IAM Works in the Cloud 2. IAM Terms 3. IAM Standards 1. Federation Backgrounder
  • 14. 4. Managing Users and Identities for Cloud Computing 5. Authentication and Credentials 6. Entitlements and Access Management 7. Privileged User Management 8. Chapter Review 1. Questions 2. Answers 23. Chapter 13 Security as a Service 1. Potential Benefits and Concerns of SecaaS 2. Major Categories of SaaS Offerings 1. Identity, Entitlement, and Access Management Services 2. Cloud Access Security Broker 3. Web Security Gateway 4. E-mail Security 5. Security Assessment 6. Web Application Firewall 7. Intrusion Detection/Prevention 8. Security Information and Event Management (SIEM) 9. Encryption and Key Management 10. Business Continuity and Disaster Recovery 11. Security Management 12. Distributed Denial of Service Protection 3. Chapter Review 1. Questions 2. Answers 24. Chapter 14 Related Technologies 1. Big Data 1. Distributed Data Collection Backgrounder 2. Hadoop Backgrounder 3. Security and Privacy Considerations
  • 15. 4. Data Collection 5. Key Management 6. Security Capabilities 7. Identity and Access Management 8. PaaS 2. Internet of Things (IoT) 3. Mobile Computing 4. Serverless Computing 5. Chapter Review 1. Questions 2. Answers 25. Chapter 15 ENISA Cloud Computing: Benefits, Risks, and Recommendations for Information Security 1. Security Benefits of Cloud 1. Security and the Benefits of Scale 2. Security as a Market Differentiator 3. Standardized Interfaces for Managed Security Services 4. Rapid, Smart Scaling of Resources 5. Audit and Evidence Gathering 6. Timely, Effective, and Efficient Updates and Defaults 7. Audit and SLAs Force Better Risk Management 8. Benefits of Resource Concentration 2. Top Security Risks 1. IT Risk Backgrounder 2. Loss of Governance 3. Lock-in 4. Isolation Failure 5. Compliance Risks 6. Management Interface Compromise 7. Data Protection 8. Insecure or Incomplete Data Deletion 9. Malicious Insider
  • 16. 3. Five Key Legal Issues Common Across All Scenarios 1. Data Protection 2. Confidentiality 3. Intellectual Property 4. Professional Negligence 5. Outsourcing Service and Changes in Control 4. Additional Items for the Exam 1. Open Virtualization Format 2. VM Hopping 3. Economic Denial of Service 4. Licensing Risks 5. Risk Concerns of a Cloud Provider Being Acquired 6. Data Controller vs. Data Processor Definitions 7. Guest System Monitoring in IaaS Responsibilities 8. User Provisioning Vulnerability 9. Underlying Vulnerability in Loss of Governance 5. Risks R.1–R.35 and Underlying Vulnerabilities 6. Chapter Review 1. Questions 2. Answers 26. Appendix A Cloud Computing Security Policy Examples 1. Cloud Security Policy: Centralized Example 1. Purpose 2. Scope 3. Background 4. Policy 2. Cloud Security Policy: Classification Example 1. Purpose 2. Scope 3. Background 4. Policy
  • 17. 27. Appendix B About the Online Content 1. System Requirements 2. Your Total Seminars Training Hub Account 1. Privacy Notice 3. Single User License Terms and Conditions 4. TotalTester Online 5. Technical Support 28. Glossary 29. Index Guide 1. Cover 2. Title Page 3. CCSK™ Certificate of Cloud Security Knowledge All-in-One Exam Guide Page List 1. i 2. iii 3. v 4. vi 5. vii 6. viii 7. x 8. xi 9. xii 10. xiii 11. xiv 12. xv 13. xvi
  • 18. 14. xvii 15. xviii 16. xix 17. xx 18. xxi 19. xxii 20. xxiii 21. xxiv 22. xxv 23. xxvi 24. xxvii 25. xxviii 26. xxix 27. xxx 28. 1 29. 2 30. 3 31. 4 32. 6 33. 5 34. 7 35. 8 36. 9 37. 10 38. 11 39. 12 40. 13 41. 14 42. 15 43. 16 44. 17 45. 18 46. 19 47. 20 48. 21 49. 22 50. 23 51. 24 52. 25 53. 26 54. 27
  • 19. 55. 28 56. 29 57. 30 58. 31 59. 32 60. 33 61. 34 62. 35 63. 36 64. 37 65. 38 66. 39 67. 40 68. 41 69. 42 70. 43 71. 44 72. 45 73. 46 74. 47 75. 48 76. 49 77. 50 78. 51 79. 52 80. 53 81. 54 82. 55 83. 56 84. 57 85. 58 86. 59 87. 60 88. 61 89. 62 90. 63 91. 64 92. 65 93. 66 94. 67 95. 68
  • 20. 96. 69 97. 70 98. 71 99. 72 100. 73 101. 74 102. 75 103. 76 104. 77 105. 78 106. 79 107. 80 108. 81 109. 82 110. 83 111. 84 112. 85 113. 86 114. 87 115. 88 116. 89 117. 90 118. 91 119. 92 120. 93 121. 94 122. 95 123. 96 124. 97 125. 98 126. 99 127. 100 128. 101 129. 102 130. 103 131. 104 132. 105 133. 106 134. 107 135. 108 136. 109
  • 21. 137. 110 138. 111 139. 112 140. 113 141. 114 142. 115 143. 116 144. 117 145. 118 146. 119 147. 120 148. 121 149. 122 150. 123 151. 124 152. 125 153. 126 154. 127 155. 128 156. 129 157. 130 158. 131 159. 132 160. 133 161. 134 162. 135 163. 136 164. 137 165. 138 166. 139 167. 140 168. 141 169. 142 170. 143 171. 144 172. 145 173. 146 174. 147 175. 148 176. 149 177. 150
  • 22. 178. 151 179. 152 180. 153 181. 154 182. 155 183. 156 184. 157 185. 158 186. 159 187. 160 188. 161 189. 162 190. 163 191. 164 192. 165 193. 166 194. 167 195. 168 196. 169 197. 170 198. 171 199. 172 200. 173 201. 174 202. 175 203. 176 204. 177 205. 178 206. 179 207. 180 208. 181 209. 182 210. 183 211. 184 212. 185 213. 186 214. 187 215. 188 216. 189 217. 190 218. 191
  • 23. 219. 192 220. 193 221. 194 222. 195 223. 196 224. 197 225. 198 226. 199 227. 200 228. 201 229. 202 230. 203 231. 204 232. 205 233. 206 234. 207 235. 208 236. 209 237. 210 238. 211 239. 212 240. 213 241. 214 242. 215 243. 216 244. 217 245. 218 246. 219 247. 220 248. 221 249. 222 250. 223 251. 224 252. 225 253. 226 254. 227 255. 228 256. 229 257. 230 258. 231 259. 232
  • 24. 260. 233 261. 234 262. 235 263. 236 264. 237 265. 238 266. 239 267. 240 268. 241 269. 242 270. 243 271. 244 272. 245 273. 246 274. 247 275. 248 276. 249 277. 250 278. 251 279. 252 280. 253 281. 254 282. 255 283. 256 284. 257 285. 258 286. 259 287. 260 288. 261 289. 262 290. 263 291. 264 292. 265 293. 266 294. 267 295. 268 296. 269 297. 270 298. 271 299. 272 300. 273
  • 25. 301. 274 302. 275 303. 276 304. 277 305. 278 306. 279 307. 280 308. 281 309. 282 310. 283 311. 284 312. 285 313. 286 314. 287 315. 288 316. 289 317. 290 318. 291 319. 292 320. 293 321. 294 322. 295 323. 296 324. 298 325. 299 326. 300 327. 301 328. 302 329. 303 330. 304 331. 305 332. 306 333. 307 334. 308 335. 309 336. 310 337. 311 338. 312 339. 313 340. 314 341. 315
  • 26. 342. 316 343. 317 344. 318 345. 319 346. 320 347. 321 348. 322 349. 323 350. 324 351. 325 352. 326 353. 327 354. 328 355. 329 356. 330 357. 331 358. 332 359. 333 360. 334 361. 335 362. 336 363. 337
  • 27. ABOUT THE AUTHOR Graham Thompson is the founder of Intrinsec Security, a cloud security consulting and training organization that serves enterprises and governments across North America. He is a security professional with more than 25 years of experience in areas such as systems engineering, technical architecture, vulnerability assessment, and a variety of management roles. He has built successful multimillion-dollar security solutions for leading enterprises and government agencies. Since 2010, Graham has dedicated himself to cloud security. He has architected and assessed cloud security solutions for government agencies and Fortune 500 financial, telecom, and retail companies across North America. He is a Cloud Security Alliance and (ISC) authorized trainer of CCSK, CISSP, and CCSP, a course he helped develop as a subject matter expert. In addition to his CSA and (ISC) certifications, Graham has obtained multiple certifications, including Amazon, ISACA (CISA), Microsoft (MCSE), Cisco, Symantec, Fortinet, SANS, and others. He attended McGill University in Montreal and has been an adjunct professor for multiple security courses at Algonquin College in Ottawa. ABOUT THE TECHNICAL EDITORS Ryan Bergsma, CCSK, is a dedicated cybersecurity professional who endeavors to promote best practices in cybersecurity in general and cloud security in particular. As the Training Program Director for the Cloud Security Alliance, he is constantly looking for ways to turn the most recent best 2 2
  • 28. practices documentation into training products that can help to fill the cybersecurity skills gap and develop individuals who can create a more secure cyber ecosystem. Ryan comes from a sales and business background and holds a bachelor’s degree in computer information system security. Daniele Catteddu is a security and risk management practitioner and a privacy evangelist. He worked in senior roles in both the private and public sectors. Currently, he is the CTO at Cloud Security Alliance, where he is responsible for driving the adoption of the organization technology strategy. He is the co-founder of the CSA STAR Program and a member of the Italian Standard National delegation at ISO/IEC SC27. He is a lecturer at the Maastricht University Centre on Privacy & Cybersecurity, a member of the European Privacy Association Scientific Committee, and a member of the Advisory Board of the Kent University CyberSecurity. In the past, he worked at ENISA, the European Union Agency for Cybersecurity, as an expert in the areas of critical information infrastructure protection and emerging and future risks. Before joining ENISA, he worked as an information security consultant in the banking and financial sector. He holds a master’s degree in business administration and economics from the University of Parma (Italy). He is a frequent keynote speaker at leading security conferences and the author of several papers on cybersecurity and privacy. Dr. Peter van Eijk, CCSK, CCSP, is a highly accomplished information technology professional with more than 40 years of experience in many fields of information and communications technology as well as computer science. He is a practitioner, a researcher, and a teacher. His experience includes teaching and researching computer networks, managing many projects and groups on digital infrastructure projects, and acting as the
  • 29. technical director of an Internet service provider. In his consulting career, his practical experience includes IT shared services cost and risk assessments, client-service architectures, IT strategy, collaborative architectures, and shared services implementations. He has also been active in ISO standardization activities, on government committees on critical network infrastructures, and as a volunteer for CSA activities. He authored and delivered several cloud-training programs, including the first version of what is now known as CompTIA Cloud Essentials. He is currently working as an independent CCSK trainer and as an associate professor of cybersecurity and the cloud at Hogeschool Utrecht. He holds a master’s degree in mathematics and computer science from the University of Groningen and a PhD from Twente University.
  • 32. Copyright © 2020 by McGraw-Hill Education. All rights reserved. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher, with the exception that the program listings may be entered, stored, and executed in a computer system, but they may not be reproduced for publication. ISBN: 978-1-26-046009-4 MHID: 1-26-046009-6 The material in this eBook also appears in the print version of this title: ISBN: 978-1-26-046008-7, MHID: 1-26-046008-8. eBook conversion by codeMantra Version 1.0 All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trademarked name, we use names in an editorial fashion only, and to the benefit of the trademark owner, with no intention of infringement of the trademark. Where such designations appear in this book, they have been printed with initial caps. McGraw-Hill Education eBooks are available at special quantity discounts to use as premiums and sales promotions or for use in corporate training programs. To contact a representative, please visit the Contact Us page at www.mhprofessional.com. Information has been obtained by McGraw-Hill Education from sources believed to be reliable. However, because of the possibility of human or mechanical error by our sources,
  • 33. McGraw-Hill Education, or others, McGraw-Hill Education does not guarantee the accuracy, adequacy, or completeness of any information and is not responsible for any errors or omissions or the results obtained from the use of such information. TERMS OF USE This is a copyrighted work and McGraw-Hill Education and its licensors reserve all rights in and to the work. Use of this work is subject to these terms. Except as permitted under the Copyright Act of 1976 and the right to store and retrieve one copy of the work, you may not decompile, disassemble, reverse engineer, reproduce, modify, create derivative works based upon, transmit, distribute, disseminate, sell, publish or sublicense the work or any part of it without McGraw-Hill Education’s prior consent. You may use the work for your own noncommercial and personal use; any other use of the work is strictly prohibited. Your right to use the work may be terminated if you fail to comply with these terms. THE WORK IS PROVIDED “AS IS.” McGRAW-HILL EDUCATION AND ITS LICENSORS MAKE NO GUARANTEES OR WARRANTIES AS TO THE ACCURACY, ADEQUACY OR COMPLETENESS OF OR RESULTS TO BE OBTAINED FROM USING THE WORK, INCLUDING ANY INFORMATION THAT CAN BE ACCESSED THROUGH THE WORK VIA HYPERLINK OR OTHERWISE, AND EXPRESSLY DISCLAIM ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. McGraw-Hill Education and its licensors do not warrant or guarantee that the functions contained in the work will meet your requirements or that its operation will be uninterrupted or error free. Neither McGraw-Hill Education
  • 34. nor its licensors shall be liable to you or anyone else for any inaccuracy, error or omission, regardless of cause, in the work or for any damages resulting therefrom. McGraw-Hill Education has no responsibility for the content of any information accessed through the work. Under no circumstances shall McGraw-Hill Education and/or its licensors be liable for any indirect, incidental, special, punitive, consequential or similar damages that result from the use of or inability to use the work, even if any of them has been advised of the possibility of such damages. This limitation of liability shall apply to any claim or cause whatsoever whether such claim or cause arises in contract, tort or otherwise.
  • 35. This book is dedicated to you, the reader. My wish is that you use the knowledge in this book to secure your potential. Knowing that you may benefit by my efforts drove me to the finish line. Here’s to your future success.
  • 36. CONTENTS AT A GLANCE Chapter 1 Cloud Computing Concepts and Architectures Chapter 2 Governance and Enterprise Risk Management Chapter 3 Legal Issues, Contracts, and Electronic Discovery Chapter 4 Compliance and Audit Management Chapter 5 Information Governance Chapter 6 Management Plane and Business Continuity Chapter 7 Infrastructure Security Chapter 8 Virtualization and Containers Chapter 9 Incident Response Chapter 10 Application Security Chapter 11 Data Security and Encryption Chapter 12 Identity, Entitlement, and Access Management Chapter 13 Security as a Service Chapter 14 Related Technologies Chapter 15 ENISA Cloud Computing: Benefits, Risks, and Recommendations for Information Security
  • 37. Appendix A Cloud Computing Security Policy Examples Appendix B About the Online Content Glossary Index
  • 38. CONTENTS Foreword Acknowledgments Introduction Chapter 1 Cloud Computing Concepts and Architectures Cloud Logical Model Infrastructure Metastructure Infostructure Applistructure Cloud Computing Definitions Essential Characteristics Cloud Service Models Cloud Deployment Models Cloud Security Scope and the Shared Responsibility Model Shared Responsibility Model Cloud Security Alliance Tools
  • 39. Cloud Controls Matrix Consensus Assessments Initiative Questionnaire STAR Registry Cloud Reference and Architecture Models Chapter Review Questions Answers Chapter 2 Governance and Enterprise Risk Management Governance Governance Backgrounder Cloud Governance Risk Management Risk Management Backgrounder Cloud Risk Management The Effects of Service and Deployment Models Cloud Risk Management Trade-Offs Assessing Cloud Service Providers Chapter Review Questions
  • 40. Answers Chapter 3 Legal Issues, Contracts, and Electronic Discovery Legal Frameworks Governing Data Protection and Privacy Required Security Measures Treaties Restrictions to Cross-Border Data Transfers CLOUD Act Regional Examples Asia Pacific Region European Union and European Economic Area The Americas Contracts and Provider Selection Internal Due Diligence Monitoring, Testing, and Updating External Due Diligence Contract Negotiations Third-Party Audits and Attestations Electronic Discovery
  • 41. Possession, Custody, and Control Relevant Cloud Applications and Environment Searchability and E-Discovery Tools Preservation Data Retention Laws and Recordkeeping Obligations Data Collection Forensics Reasonable Integrity Direct Access Native Production Authentication Cooperation Between Provider and Client in E-Discovery Response to a Subpoena or Search Warrant Chapter Review Questions Answers Chapter 4 Compliance and Audit Management Compliance Backgrounder Impact of the Cloud on Contracts
  • 42. How the Cloud Changes Compliance Compliance Inheritance Continuous Compliance Audit Backgrounder Audit Management in the Cloud SOC Reports and ISO Certifications Backgrounder SOC Backgrounder ISO Backgrounder How the Cloud Changes Audits Right to Audit Audit Scope Auditor Requirements Chapter Review Questions Answers Chapter 5 Information Governance Cloud Information Governance Domains Information Classification Backgrounder Information Management Backgrounder
  • 43. The Data Security Lifecycle Locations and Entitlements Functions, Actors, and Controls Chapter Review Questions Answers Chapter 6 Management Plane and Business Continuity Management Plane Application Programming Interface Backgrounder Accessing the Management Plane Securing the Management Plane Business Continuity and Disaster Recovery in the Cloud BCP/DR Backgrounder Architecting for Failure Business Continuity Within the Cloud Provider Chaos Engineering Business Continuity for Loss of the Cloud Provider Continuity for Private Cloud and Providers Chapter Review
  • 44. Questions Answers Chapter 7 Infrastructure Security Cloud Network Virtualization OSI Reference Model Backgrounder VLANs VXLAN Networking Planes Backgrounder Software Defined Networking Network Functions Virtualization How Security Changes with Cloud Networking Challenges of Virtual Appliances Benefits of SDN Security Microsegmentation and the Software Defined Perimeter Additional Considerations for CSPs or Private Clouds Hybrid Cloud Considerations Cloud Compute and Workload Security Compute Abstraction Technologies How the Cloud Changes Workload Security
  • 45. Immutable Workloads Enable Security The Impact of the Cloud on Standard Workload Security Controls Changes to Workload Security Monitoring and Logging Changes to Vulnerability Assessment Chapter Review Questions Answers Chapter 8 Virtualization and Containers Major Virtualization Categories Relevant to Cloud Computing Compute Virtualization Network Virtualization Storage Virtualization Containers Container Definitions Backgrounder Container Security Recommendations Chapter Review Questions Answers
  • 46. Chapter 9 Incident Response Incident Response Lifecycle Incident and Event Backgrounder Preparation Phase Detection and Analysis Phase Containment, Eradication, and Recovery Phase Post-Incident Activity Phase How the Cloud Impacts Incident Response Preparation Detection and Analysis Containment, Eradication, and Recovery Post-Incident Activity Chapter Review Questions Answers Chapter 10 Application Security The SSDLC and Cloud Computing Secure Design and Development Training
  • 47. Define Design Develop Test Secure Deployment Cloud Impacts on Vulnerability Assessments Cloud Impact on Penetration Testing Deployment Pipeline Security Impact of IaC and Immutable Workloads Secure Operations How the Cloud Impacts Application Design and Architectures Microservices Backgrounder The Rise and Role of DevOps DevOps Backgrounder Security Implications and Advantages of DevOps Chapter Review Questions Answers Chapter 11 Data Security and Encryption
  • 48. Data Security Controls Cloud Data Storage Types Managing Data Migrations to the Cloud CASB Backgrounder Securing Cloud Data Transfers Securing Data in the Cloud Cloud Data Access Controls Storage (at Rest) Encryption and Tokenization Key Management (Including Customer-Managed Keys) Data Security Architecture Monitoring, Auditing, and Alerting Additional Data Security Controls Cloud Platform/Provider-Specific Controls Data Loss Prevention Enterprise Rights Management Data Masking and Test Data Generation Enforcing Lifecycle Management Security Chapter Review Questions
  • 49. Answers Chapter 12 Identity, Entitlement, and Access Management How IAM Works in the Cloud IAM Terms IAM Standards Federation Backgrounder Managing Users and Identities for Cloud Computing Authentication and Credentials Entitlements and Access Management Privileged User Management Chapter Review Questions Answers Chapter 13 Security as a Service Potential Benefits and Concerns of SecaaS Major Categories of SaaS Offerings Identity, Entitlement, and Access Management Services Cloud Access Security Broker Web Security Gateway
  • 50. Other documents randomly have different content
  • 51. Scott, Sir Walter, 643. Scottish rivers’ victims, 244. se, 643. sea-serpent, the, 122. Sebastian, Dom, 482. Sébillot, 273. sechem, 225. second sight, 158, 275, 330. sēdes, 677. Seely Court, the, 592: see silly. Segais, 392. Segantii, 385: see Setantii. Seidhun, 331, 386: see Sein. Seidi, 388: see Saidi. seiet, the, 350. seig, 611. seily, seely, 591: see silly. Sein, Sun, 331, 386. Seirith, 569. Seithennin, Seithenhin, 383–8, 395, 419. Seithyn, 386–8.
  • 52. Sena, 331. Senaudon, 562: see Snowdon. senchasa, 498. Senghenyđ, 26. Seren Gomer, 167. Seri, 569. Serrigi, Serigi, 565, 569. Serw, the, 206. Sescenn Uairbeóil, 510. sessam, -om, 225. Setanta, 385, 387, 388, 656, 657. Setantii, 385, 387. Seteia, Segeia, 387. Sethor . ethor . othor, &c., 635. Setinte, Setinti, 387. Severn, 391, 407, 449. Sgubor Gerrig, 198, 199. shag-foal, the, 324. shaman, 631. Shannon, the, 390. shears, Twrch’s, 512.
  • 53. sheep sacrifice, 308. Shenn Laa Boaldyn, 307, 308. sheriff, 569. Shetland fishermen, 346. Shetlands, the, 679. Shone, 31. Siân William, 237. sibh, 643. Sibi, 97, 668. siblais, siblad, silis, 436, 437. Sichfraith, Sichraidh, 569. síd, síth, 383, 657, 658, 680. Síd Nechtáin, 383. síde, 678, 683. Sidi, Caer, 678: see under Caer. Siegfried, 569. signourie et princeté, 491. Sigrœđ-r, 569: see Siegfried. Sigtrygg-r, 569. Sikes, Wirt, 99, 169, 173, 191, 195, 405. silence in visiting a well, 362.
  • 54. silly frit, Sìli Ffrit, 64–6, 229, 584, 585, 591, 592, 597. Silly go Dwt, Sìli g. D., 229, 584, 590–2, 597. Silvan Evans, Chancellor D., 40, 156, 271, 273, 357. silver to shoot witches with, 294. simach, 67. Simond, Simonds, 67, 68. Simwch, 67. Simwnt, 67: see Simond. Simychiaid, 67, 668. Sinann, Sinand, Sinend, 390–2, 395. Singhalese, the, 627. Sinodun, Sinadoun, 562: see Snowdon. Siôn, 31. Siôn Ifan, 201. Sitriuce, Sitriug, 569. Sizun, 331, 386: see Sein. σκιαί, 627. skilled man, the, 102, 111: see cunning. sl, l, 542. Slamannan, 550. Slaney, the, 581.
  • 55. sleih beggey, 289. Sliabh na Caillighe, 393. Slieau Maggyl, 315. — Whallian, 296. Sloe, Slack, 510. Smith, Dr. A., 344. smiths, 294, 295. Smychiaid, 67–9: see Simychiaid. Snaefell, 286, 287, 312, 314. snakes, 689, 690. Snowdon, 509, 533, 554, 559, 560, 562. soap as fairy ointment, 213, 669. Soar, 547. Sodom, 73. sods, properties of certain, 158, 170, 171, 303. sojourner in Faery, the, 291: see Faery. Solomon, Wm. Thos., 208–10. Solor, 565. son oural, 307, 308. Sophia, 692. soul, the, 601–4, 607, 608, 611, 612, 626, 627.
  • 56. sour apple-tree portent, the, 60. spaagagh, 337, 339. Spain, 489. spear ground during mass, 315. — stone-tipped, 689. Spencer, Edward, 489. — and Gillen, 662, 663. spinning after supper in winter, 212. standing on another’s foot, 330. stealing the fairies’ flowers, 21. steel, 128: see iron. Stepney-Gulston, Mr., 468. Stevenson, Mr., 547, 563. Stifyn Ifan, 400. Stindwy, 443: see Ỻan Ystumdwy. stockaded isle, 73: see Syfađon. Stokes, Dr. Whitley, 519, 527, 575, 618. stone age, the, 606. stones thrown into the bonfire, 225.
  • 57. Straỻyn, 443: see Ỻyn Cwm Straỻyn. strand, 39. Strangford Lough, 426. Strata Florida, 12, 579. strath, 39. straw to curse with, 345. — spun into gold, 214. Sualdaim, 657. submerged bells, 405, 415, 417. súi, gen. suad, 616. súithe, 616, 617. Sunday of harvest, the first, 312–5: see August. superstitions modified, 216, 313, 612. surnames, 163: see Davies, Jones, Mason. Svatovit, 553. Swaffham, 466, 467. Swan Maidens, the, 583. swans, the Children of Lir as, 94. Swansea Bay, 402. Swyđ Ffynnon, 246, 250. Syfađon, 19, 73, 74, 134, 379, 401, 415, 429, 452, 496, 534.
  • 58. sympathetic magic, 638: see magic. synhuir vann, 385. syrcyn, 106. Syrigi, 565, 569: see Serrigi. syw, sywyd, sywedyđ, 616, 617. Tabhîda, Dyphryn, 22. Tacitus, 271, 408, 559. Taf, the, 449, 534. Taff, the, 175, 449. Tafwys, 449: see Tamesis. taghairm, the, 320. Tai Bach, 31. — Teulwriaid, 55. Táin Bó Cuailnge, 657. Tal y Clegyr, 202. — y Ỻychau, 12. — y Treuđin, 533. Talhaiarn, 617. Taliesin ab Iolo, 439. Taliessin, 614–7. Taỻwch, 499.
  • 59. Tamesis, 449. Tamise, la, 449. tappag, the, 353. Tarawg, 529. Tarr-cáin, 391. Tarren y Cigfrain, 181, 189. — y Crynwyr, 175. tarroo ushtey, 284, 285. Tarvos Trigaranus, 581. tarw penwyn Corwrion, 52, 55, 61. tatter-colt, tatter-foal, 324. tattooing, 682. tau, tawaf, 280. taut, 592. Tawe, 522. Taxatio of Nicholas IV, 516. Tegai, 52. Tegau Eurfron, 689. Tegid, 408: see Tacitus. — Foel, 408. — Lake, 376: see Ỻyn Tegid.
  • 60. — Morgan, 120–3. Tegid’s monster, 122, 123. Teifi, the, 577. Teilo’s skull, 399. — well, 398, 399. Teirgwaeđ, 510. Teithion, 530. telyn aur, 148. Teme, the, 22. Ternóc, 568. Testament, the New, 493. Tethra, 291. Teulu Oeth, &c., 619. teuz, 375. Teyrnon, 226. th, 2. th, đ, omitted, 563. Thames, the, 449. Thargelia, the, 310. third Peel boat, the, 343. þokk, 651.
  • 61. Thomas, David, 60. —, D. Ỻeufer, 469. —, Evan, 198, 199. —, Howell, 125. —, Hugh, 73. —, John, 217. —, Rees, 380. — ab Rhodri, 491. thorns for pins, 365. three advices, the mermaid’s, 166. — battle-knights, 509. — blows, the, 6, 9, 10, 28: see three disagreements. — boundaries, junction of, 295. — chief enchanters, 505. — disagreements, the, 28: see three blows. — Islands of the Mighty, 280. — Islands of Prydain, 280, 281. — Marchlyn ladies, 236. — outpost Isles, 280. — Sons of the Gapless Sword, 529. Thurneysen, Dr., 533.
  • 62. Till, the, 244. Tír Cluchi Midir ocus Maic Óic, 436. — Dimuner, 528. — nan Óg, 678. — Tairngirc, 390. — fo Thuinn, 437. Tobar a vëac, 692. tocad, 647. toeli, the, 273, 274, 279. toleth, tolaeth, 273, 274: see tylwyth. Tom na Hurich, 483. — Tit Tot, 584, 590, 592. tòn, 176. torc, 521. torgochiaid, 33. Torogi, Tarogi, 503, 505, 506: see Troggy. torrog, torogi, 508: see Troggy. Tortain, 693. tote, 592. Touaregs, 682. Toubir-more, 692: see Tobar a vëac.
  • 63. toulu, 273: see toeli. tout, 592. Towy, 146. Towyn Trewern, 37. Trachmyr, 529, 530, 537. Traeth Lafan, 402. traha, 395. Traỻwng, Traỻwn, Traỻwm, 378. tramynyat, 514. Trawsfynyđ parson, the, 102. Tre’ Gaerfyrđin, 207. — Geiri, 280: see Tre’r Ceiri. — Wylan, 410. treasure-finders, 148. tref, tre’, 207. Tref Rita, 478. Treflys, 60. Trefriw, 30, 198, 199. Tregalan, 473, 476. Tregan Anthrod, &c., 208, 218, 219: see Caer Arianrhod. Tregaranthreg, 207, 208.
  • 64. Tregaron, 577. Tremadoc, 443. Tremains, 354. Tre’r Ceiri, 214, 279, 280, 283, 686. — Gwyđelod, 566. Tretower, 516, 518. Trevine, Trefin, 165, 171. Triads, the Welsh, 429, 440–5, 498–501, 503–6, 509, 560, 570. —, Irish, 498. triath, gen. tréith, 521, 522. Triban Morgannwg, 19. Tricephal, the, 653. Triglaus, 553. Tringad, 530. Trinio, 71, 72, 496. Trinity invoked in charms, the, 297. Triple Alliance, the, 486. Tristan, Trystan, 499: see Drystan. Trit-a-Trot, 593, 597, 694. Troed yr Aur, 166, 464–6. tröeỻ bach, 64, 229, 584.
  • 65. Troggy, 506, 508. Troia, 444. Troit, Porcus, 538, 541. Trojans, the, 271, 280, 281. trot, 694. trwi, 29. trwtan, trwdlan, 592. Trwtyn-Tratyn, 229, 592, 597, 694. Trwyd, 541: see Trwyth. Trwyn Swch, 693. — Swncwl, 278: see Bwlch T. S. Trwyth, 541, 544. Tryfan, 580. Tuan mac Cairill, 611, 615, 618, 620, 621. Tuatha Dé ocus Andé, 637. — Dé Danann, 454, 544, 548–50, 554, 685. Tudwal Roads, 232. Tunccetace, 647. tut, tud, 374, 375. tuthe, 374. Tweed, the, 244.
  • 66. twin changelings, 692. Twm Bach, 202. — Bryn Syỻty, 199. — Ifan Siams, 80. two first things, 107. Twrch, the river, 524. — Ỻawin, 514, 522. — Trwyth, 509–15, 519–30, 534, 536–9, 552, 565, 693. twt, 592. Twyn y moch, 536. Twyne, Thomas, 412. Ty Gwyn, 534. Tydoch, 163. tyđyn, tyn, 33. Tyđyn y Barcud, 62. Ty-fry, 26, 27. Tylen, 210: see Dylan. tyloethod, 274. Tylor, Professor, 290, 329, 641, 657. tylwyth, 273. Tylwyth Teg, 115, 671.
  • 67. tylwythes, -en, 48. tyn = tyđyn, 33, 367. Tyn y Ffynnon, 366, 367. — Gadlas, 33. — Ỻan, 78. — yr Onnen, 33. — Siarlas, 33. tynghed, 644, 646–51, 694. tyngu, 225, 647–9, 694. Tyno Helig, 387, 415, 422. Týr, 642. Uairbhél, 510. Uath mac Imomain, 618. uđ, 203. ugliness of fairies, 262: see fairies. Ulfilas, 626. Ulster, 502. — women, the, 498. umbræ, 627. un, dau, tri, pedwar, pump, 418, 419. Undine, 1, 124, 389, 437, 661.
  • 68. unlucky things, 342–5. Uoret, 217. Urđawl Ben, 552. Urnach, 507, 564, 565. Urogenonertus, 580. urus, the, 579–81. Usk, the, 518. uwchwynt, yr, 596. uzon, 626. v = Welsh f, 2. vates, 616. Vaughan the antiquary, 491. vel p’agh sthie, 349. Velfrey, 512, 513. Vendubar-i, 568. vengeance, the cry of, 403, 404, 408, 409, 413, 414, 452. —, delay of, 423. Vergilius, 539. Verwig, 166, 167. Vigfusson, Dr., 321. vir, 264.
  • 69. Virginia Water, 394. Viriatus, 218. Visurix, 662. voices concerning the murdered, 73. Volospá, 322. Voltaire, 640. Vortigern, 218, 469, 470, 487, 507. Vulgate, the, 287. Waen Fawr, 41, 275. Warinsey, sibyl of, 331: see Guernsey. Warrefield, 314. warts, 297, 360–2. Wastinus, 71: see Gwestin. watch and ward, 311. water efficacious during mass, 315. water-bull, the, 284, 285, 289, 323. water-horse, the, 324, 433, 434. Waungyrlais, 20. wealhstód, 511. wedding, a Welsh, 277. wele dacw, 109.
  • 70. well priesthood, 389, 396, 400. — ritual, 332, 333, 395, 396, 399. — water bottled, 315. well, Ỻancarvan, 356. —, St. Maughold’s, 333. —, St. Teilo’s, 398, 399. Wellington, Duke of, 494. wells, covered, 389, 394, 692. —, Manx mountain, 314. wells for dadwitsio, 363. — with pins and rags, 327, 332–5, 355–7. —: see Ffynnon. Welsh rabbit, 614. — spelling, 671. Welshpool, 378. wenestir, finaun, 395. Werđon, 204, 205. — gwel’d y, 204, 205. Wesleyan Methodists, 348, 353. Wessobrunn Codex, 682. Weun Gonnws, 568.
  • 71. Wexford Harbour, 427. white dog and his owner, the, 148. — stones, 344, 345. Whitland, 534. Whuppity Stoorie, 588, 590. Wi, Wi Wei, 277. wicken, 325: see rowan. widow’s son, the, 3, 29, 660, 661. wife caned, the, 54. Wight, Isle of, 281. William Dafyđ, 78, 80. — Ỻeyn, 693. — Wmffra, 80. Williams, Canon, 130. —, Evan, 230. —, Jane, 221. —, Owen, 207. —, Sir Robert, 478. —, S. Rhys, 89. — of Trefriw, Thos., 280. —, William, 193.
  • 72. Williams-Ellis, J. C., 368, 371. ——, Mrs., 278, 366, 368, 371, 471. Willin, Clerk, 410–2. wind, traffic in, 330, 331. Windele’s MSS., 335. window opened for a changeling, 103. window opened for a death, 601. Winter Nights, Feast of the, 321. wisps, traffic in, 299. witch pronounced butch, the word, 294, 691. — at crossroads, the, 295. — of Endor, the, 349. — as a hare, the, 309. — and the heart, the, 305. witchcraft, how inherited, 326. witches bled, 326. — caught by a black greyhound, 294. — fetched by boiling herbs, 300. — fetched by burning a carcase, 305. — tortured to death, 296. witch’s besom, the, 295, 296.
  • 73. — face, 305. with, 630. Woden, 676. wood fires in Glamorgan, 267. wool, virtue of, 357, 361. wormwood, &c., the charmer using, 299. Wright, Professor, 66. Wrnach, Gwrnach, 565. Wryd, Wryd! 217. wy, 516. Wye, the, 391, 516. wyneb, 634. Wynne, Sir John, 490, 670. — of Peniarth, Mr., 242. Wynns, the, 444. wyrion, 70. Y Bala aeth, 378. — Blaiđ, 528. — Dinas, 469, 470. — Đinas, 467. — Gromlech, 673.
  • 74. y law, 198. — raw, 198. Y Wyđfa, 479. Yarrow Kirk, 448. ych, 530. Ychain Mannog, 131, 132: see Ychen Bannog. Ychain Mannog melody, the, 132. Ychen Bannog, Bannawc, 131, 142, 561, 579, 580. year, the Celtic, 317. —, the Norse, 321. yellow hair and blue eyes, 148. Yeuwains, 488: see Yvain. ym, 523. Ymhacsen, 564. Ynys y Ceûri, Ceiri, 280, 283. — Enỻi, 413, 440. — Geinon, 254, 255, 674. — y Kedyrn, 280, 282, 283, 386. — Prydein, 281, 282. — Wair, 679. Yr Ystrad, 39–46.
  • 75. ysbryd y lantar, 59. Yscawt, 529. Yskithyrwynn Pennbeiđ, 520. Yspađaden, 520, 646, 647. Yspytty Ifan, 206, 693. Ystalyfera, 251, 522. Ystrad, 39. — Dyfodwg, 23, 461, 582. — Einon, 517. — Fflur, 578. — Gynlais, 522. — Meurig, 216, 244–8, 601, 661, 669. — Rhonđa, 27. — Yw, 516, 517, 524, 531, 536. Ystradfellte, 255. Ystum Cegid, 220. ystyr, 511. Yvain, Yeuwains, Yewains, 488–91. yw, Yw, ywen, 516–8, 524, 531, 534, 536. Ywains le fils Urien, 490. Ywein, Ewein, 489: see Owen Lawgoch.
  • 76. Ζεύς, 642, 644, 652. Zimmer, Professor, 375, 480, 544, 694. Zipporah, 583. THE END.
  • 77. OXFORD PRINTED AT THE CLARENDON PRESS BY HORACE HART, M.A. PRINTER TO THE UNIVERSITY
  • 78. Welcome to our website – the perfect destination for book lovers and knowledge seekers. We believe that every book holds a new world, offering opportunities for learning, discovery, and personal growth. That’s why we are dedicated to bringing you a diverse collection of books, ranging from classic literature and specialized publications to self-development guides and children's books. More than just a book-buying platform, we strive to be a bridge connecting you with timeless cultural and intellectual values. With an elegant, user-friendly interface and a smart search system, you can quickly find the books that best suit your interests. Additionally, our special promotions and home delivery services help you save time and fully enjoy the joy of reading. Join us on a journey of knowledge exploration, passion nurturing, and personal growth every day! ebookmasss.com