CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide Graham Thompson
1. Download the full version and explore a variety of ebooks
or textbooks at https://ebookmass.com
CCSK Certificate of Cloud Security Knowledge All-
in-One Exam Guide Graham Thompson
_____ Follow the link below to get your download now _____
https://ebookmass.com/product/ccsk-certificate-of-cloud-
security-knowledge-all-in-one-exam-guide-graham-thompson/
Access ebookmass.com now to download high-quality
ebooks or textbooks
2. We have selected some products that you may be interested in
Click the link to download now or visit ebookmass.com
for more options!.
Ccsp Certified Cloud Security Professional All-In-One Exam
Guide Daniel Carter
https://ebookmass.com/product/ccsp-certified-cloud-security-
professional-all-in-one-exam-guide-daniel-carter/
CCSP Certified Cloud Security Professional All-in-One Exam
Guide 3rd Edition Daniel Carter
https://ebookmass.com/product/ccsp-certified-cloud-security-
professional-all-in-one-exam-guide-3rd-edition-daniel-carter/
Google Cloud Certified Professional Cloud Architect All-
in-One Exam Guide Iman Ghanizada
https://ebookmass.com/product/google-cloud-certified-professional-
cloud-architect-all-in-one-exam-guide-iman-ghanizada/
Google Cloud Certified Associate Cloud Engineer All-in-One
Exam Guide Jack Hyman
https://ebookmass.com/product/google-cloud-certified-associate-cloud-
engineer-all-in-one-exam-guide-jack-hyman/
3. CompTIA Security+ All-in-One Exam Guide (Exam SY0-601))
Wm. Arthur Conklin
https://ebookmass.com/product/comptia-security-all-in-one-exam-guide-
exam-sy0-601-wm-arthur-conklin/
AWS Certified Cloud Practitioner All-in-One Exam Guide
(Exam CLF-C01) Daniel Carter
https://ebookmass.com/product/aws-certified-cloud-practitioner-all-in-
one-exam-guide-exam-clf-c01-daniel-carter/
CompTIA Cloud+ Certification All-in-One Exam Guide (Exam
CV0-003) Eric A. Vanderburg
https://ebookmass.com/product/comptia-cloud-certification-all-in-one-
exam-guide-exam-cv0-003-eric-a-vanderburg/
Google Cloud Certified Professional Cloud Architect All-
in-One Exam Guide 1st Edition Iman Ghanizada
https://ebookmass.com/product/google-cloud-certified-professional-
cloud-architect-all-in-one-exam-guide-1st-edition-iman-ghanizada/
AWS Certified Security Specialty All-in-One Exam Guide
(Exam SCS-C01) Tracy Pierce
https://ebookmass.com/product/aws-certified-security-specialty-all-in-
one-exam-guide-exam-scs-c01-tracy-pierce/
6. Contents
1. Cover
2. About the Author
3. Title Page
4. Copyright Page
5. Dedication
6. Contents at a Glance
7. Contents
8. Foreword
9. Acknowledgments
10. Introduction
11. Chapter 1 Cloud Computing Concepts and Architectures
1. Cloud Logical Model
1. Infrastructure
2. Metastructure
3. Infostructure
4. Applistructure
2. Cloud Computing Definitions
1. Essential Characteristics
2. Cloud Service Models
3. Cloud Deployment Models
3. Cloud Security Scope and the Shared Responsibility Model
1. Shared Responsibility Model
2. Cloud Security Alliance Tools
3. Cloud Controls Matrix
4. Consensus Assessments Initiative Questionnaire
5. STAR Registry
6. Cloud Reference and Architecture Models
7. 4. Chapter Review
1. Questions
2. Answers
12. Chapter 2 Governance and Enterprise Risk Management
1. Governance
1. Governance Backgrounder
2. Cloud Governance
2. Risk Management
1. Risk Management Backgrounder
3. Cloud Risk Management
1. The Effects of Service and Deployment Models
2. Cloud Risk Management Trade-Offs
3. Assessing Cloud Service Providers
4. Chapter Review
1. Questions
2. Answers
13. Chapter 3 Legal Issues, Contracts, and Electronic Discovery
1. Legal Frameworks Governing Data Protection and Privacy
1. Required Security Measures
2. Treaties
3. Restrictions to Cross-Border Data Transfers
4. CLOUD Act
2. Regional Examples
1. Asia Pacific Region
2. European Union and European Economic Area
8. 3. The Americas
3. Contracts and Provider Selection
1. Internal Due Diligence
2. Monitoring, Testing, and Updating
3. External Due Diligence
4. Contract Negotiations
5. Third-Party Audits and Attestations
4. Electronic Discovery
1. Possession, Custody, and Control
2. Relevant Cloud Applications and Environment
3. Searchability and E-Discovery Tools
4. Preservation
5. Data Retention Laws and Recordkeeping
Obligations
6. Data Collection
7. Forensics
8. Reasonable Integrity
9. Direct Access
10. Native Production
11. Authentication
12. Cooperation Between Provider and Client in E-
Discovery
13. Response to a Subpoena or Search Warrant
5. Chapter Review
1. Questions
2. Answers
14. Chapter 4 Compliance and Audit Management
1. Compliance Backgrounder
2. Impact of the Cloud on Contracts
3. How the Cloud Changes Compliance
1. Compliance Inheritance
2. Continuous Compliance
9. 4. Audit Backgrounder
5. Audit Management in the Cloud
6. SOC Reports and ISO Certifications Backgrounder
1. SOC Backgrounder
2. ISO Backgrounder
7. How the Cloud Changes Audits
1. Right to Audit
2. Audit Scope
3. Auditor Requirements
8. Chapter Review
1. Questions
2. Answers
15. Chapter 5 Information Governance
1. Cloud Information Governance Domains
1. Information Classification Backgrounder
2. Information Management Backgrounder
2. The Data Security Lifecycle
1. Locations and Entitlements
2. Functions, Actors, and Controls
3. Chapter Review
1. Questions
2. Answers
16. Chapter 6 Management Plane and Business Continuity
1. Management Plane
1. Application Programming Interface Backgrounder
10. 2. Accessing the Management Plane
3. Securing the Management Plane
2. Business Continuity and Disaster Recovery in the Cloud
1. BCP/DR Backgrounder
2. Architecting for Failure
3. Business Continuity Within the Cloud Provider
4. Chaos Engineering
5. Business Continuity for Loss of the Cloud Provider
6. Continuity for Private Cloud and Providers
3. Chapter Review
1. Questions
2. Answers
17. Chapter 7 Infrastructure Security
1. Cloud Network Virtualization
1. OSI Reference Model Backgrounder
2. VLANs
3. VXLAN
4. Networking Planes Backgrounder
5. Software Defined Networking
6. Network Functions Virtualization
2. How Security Changes with Cloud Networking
1. Challenges of Virtual Appliances
2. Benefits of SDN Security
3. Microsegmentation and the Software Defined
Perimeter
4. Additional Considerations for CSPs or Private
Clouds
5. Hybrid Cloud Considerations
3. Cloud Compute and Workload Security
1. Compute Abstraction Technologies
2. How the Cloud Changes Workload Security
11. 3. Immutable Workloads Enable Security
4. The Impact of the Cloud on Standard Workload
Security Controls
5. Changes to Workload Security Monitoring and
Logging
6. Changes to Vulnerability Assessment
4. Chapter Review
1. Questions
2. Answers
18. Chapter 8 Virtualization and Containers
1. Major Virtualization Categories Relevant to Cloud
Computing
1. Compute Virtualization
2. Network Virtualization
3. Storage Virtualization
2. Containers
1. Container Definitions Backgrounder
2. Container Security Recommendations
3. Chapter Review
1. Questions
2. Answers
19. Chapter 9 Incident Response
1. Incident Response Lifecycle
1. Incident and Event Backgrounder
2. Preparation Phase
3. Detection and Analysis Phase
4. Containment, Eradication, and Recovery Phase
5. Post-Incident Activity Phase
2. How the Cloud Impacts Incident Response
12. 1. Preparation
2. Detection and Analysis
3. Containment, Eradication, and Recovery
4. Post-Incident Activity
3. Chapter Review
1. Questions
2. Answers
20. Chapter 10 Application Security
1. The SSDLC and Cloud Computing
2. Secure Design and Development
1. Training
2. Define
3. Design
4. Develop
5. Test
3. Secure Deployment
1. Cloud Impacts on Vulnerability Assessments
2. Cloud Impact on Penetration Testing
3. Deployment Pipeline Security
4. Impact of IaC and Immutable Workloads
4. Secure Operations
5. How the Cloud Impacts Application Design and
Architectures
1. Microservices Backgrounder
6. The Rise and Role of DevOps
1. DevOps Backgrounder
2. Security Implications and Advantages of DevOps
7. Chapter Review
1. Questions
13. 2. Answers
21. Chapter 11 Data Security and Encryption
1. Data Security Controls
2. Cloud Data Storage Types
3. Managing Data Migrations to the Cloud
1. CASB Backgrounder
2. Securing Cloud Data Transfers
4. Securing Data in the Cloud
1. Cloud Data Access Controls
2. Storage (at Rest) Encryption and Tokenization
3. Key Management (Including Customer-Managed
Keys)
5. Data Security Architecture
6. Monitoring, Auditing, and Alerting
7. Additional Data Security Controls
1. Cloud Platform/Provider-Specific Controls
2. Data Loss Prevention
3. Enterprise Rights Management
4. Data Masking and Test Data Generation
8. Enforcing Lifecycle Management Security
9. Chapter Review
1. Questions
2. Answers
22. Chapter 12 Identity, Entitlement, and Access Management
1. How IAM Works in the Cloud
2. IAM Terms
3. IAM Standards
1. Federation Backgrounder
14. 4. Managing Users and Identities for Cloud Computing
5. Authentication and Credentials
6. Entitlements and Access Management
7. Privileged User Management
8. Chapter Review
1. Questions
2. Answers
23. Chapter 13 Security as a Service
1. Potential Benefits and Concerns of SecaaS
2. Major Categories of SaaS Offerings
1. Identity, Entitlement, and Access Management
Services
2. Cloud Access Security Broker
3. Web Security Gateway
4. E-mail Security
5. Security Assessment
6. Web Application Firewall
7. Intrusion Detection/Prevention
8. Security Information and Event Management
(SIEM)
9. Encryption and Key Management
10. Business Continuity and Disaster Recovery
11. Security Management
12. Distributed Denial of Service Protection
3. Chapter Review
1. Questions
2. Answers
24. Chapter 14 Related Technologies
1. Big Data
1. Distributed Data Collection Backgrounder
2. Hadoop Backgrounder
3. Security and Privacy Considerations
15. 4. Data Collection
5. Key Management
6. Security Capabilities
7. Identity and Access Management
8. PaaS
2. Internet of Things (IoT)
3. Mobile Computing
4. Serverless Computing
5. Chapter Review
1. Questions
2. Answers
25. Chapter 15 ENISA Cloud Computing: Benefits, Risks, and
Recommendations for Information Security
1. Security Benefits of Cloud
1. Security and the Benefits of Scale
2. Security as a Market Differentiator
3. Standardized Interfaces for Managed Security
Services
4. Rapid, Smart Scaling of Resources
5. Audit and Evidence Gathering
6. Timely, Effective, and Efficient Updates and
Defaults
7. Audit and SLAs Force Better Risk Management
8. Benefits of Resource Concentration
2. Top Security Risks
1. IT Risk Backgrounder
2. Loss of Governance
3. Lock-in
4. Isolation Failure
5. Compliance Risks
6. Management Interface Compromise
7. Data Protection
8. Insecure or Incomplete Data Deletion
9. Malicious Insider
16. 3. Five Key Legal Issues Common Across All Scenarios
1. Data Protection
2. Confidentiality
3. Intellectual Property
4. Professional Negligence
5. Outsourcing Service and Changes in Control
4. Additional Items for the Exam
1. Open Virtualization Format
2. VM Hopping
3. Economic Denial of Service
4. Licensing Risks
5. Risk Concerns of a Cloud Provider Being Acquired
6. Data Controller vs. Data Processor Definitions
7. Guest System Monitoring in IaaS Responsibilities
8. User Provisioning Vulnerability
9. Underlying Vulnerability in Loss of Governance
5. Risks R.1–R.35 and Underlying Vulnerabilities
6. Chapter Review
1. Questions
2. Answers
26. Appendix A Cloud Computing Security Policy Examples
1. Cloud Security Policy: Centralized Example
1. Purpose
2. Scope
3. Background
4. Policy
2. Cloud Security Policy: Classification Example
1. Purpose
2. Scope
3. Background
4. Policy
17. 27. Appendix B About the Online Content
1. System Requirements
2. Your Total Seminars Training Hub Account
1. Privacy Notice
3. Single User License Terms and Conditions
4. TotalTester Online
5. Technical Support
28. Glossary
29. Index
Guide
1. Cover
2. Title Page
3. CCSK™ Certificate of Cloud Security Knowledge All-in-One Exam
Guide
Page List
1. i
2. iii
3. v
4. vi
5. vii
6. viii
7. x
8. xi
9. xii
10. xiii
11. xiv
12. xv
13. xvi
27. ABOUT THE AUTHOR
Graham Thompson is the founder of Intrinsec Security, a
cloud security consulting and training organization that serves
enterprises and governments across North America. He is a
security professional with more than 25 years of experience in
areas such as systems engineering, technical architecture,
vulnerability assessment, and a variety of management roles.
He has built successful multimillion-dollar security solutions for
leading enterprises and government agencies.
Since 2010, Graham has dedicated himself to cloud security. He
has architected and assessed cloud security solutions for
government agencies and Fortune 500 financial, telecom, and
retail companies across North America. He is a Cloud Security
Alliance and (ISC) authorized trainer of CCSK, CISSP, and
CCSP, a course he helped develop as a subject matter expert.
In addition to his CSA and (ISC) certifications, Graham has
obtained multiple certifications, including Amazon, ISACA
(CISA), Microsoft (MCSE), Cisco, Symantec, Fortinet, SANS,
and others. He attended McGill University in Montreal and has
been an adjunct professor for multiple security courses at
Algonquin College in Ottawa.
ABOUT THE TECHNICAL EDITORS
Ryan Bergsma, CCSK, is a dedicated cybersecurity
professional who endeavors to promote best practices in
cybersecurity in general and cloud security in particular. As the
Training Program Director for the Cloud Security Alliance, he is
constantly looking for ways to turn the most recent best
2
2
28. practices documentation into training products that can help to
fill the cybersecurity skills gap and develop individuals who can
create a more secure cyber ecosystem. Ryan comes from a sales
and business background and holds a bachelor’s degree in
computer information system security.
Daniele Catteddu is a security and risk management
practitioner and a privacy evangelist. He worked in senior roles
in both the private and public sectors. Currently, he is the CTO
at Cloud Security Alliance, where he is responsible for driving
the adoption of the organization technology strategy. He is the
co-founder of the CSA STAR Program and a member of the
Italian Standard National delegation at ISO/IEC SC27. He is a
lecturer at the Maastricht University Centre on Privacy &
Cybersecurity, a member of the European Privacy Association
Scientific Committee, and a member of the Advisory Board of
the Kent University CyberSecurity. In the past, he worked at
ENISA, the European Union Agency for Cybersecurity, as an
expert in the areas of critical information infrastructure
protection and emerging and future risks. Before joining
ENISA, he worked as an information security consultant in the
banking and financial sector. He holds a master’s degree in
business administration and economics from the University of
Parma (Italy). He is a frequent keynote speaker at leading
security conferences and the author of several papers on
cybersecurity and privacy.
Dr. Peter van Eijk, CCSK, CCSP, is a highly accomplished
information technology professional with more than 40 years of
experience in many fields of information and communications
technology as well as computer science. He is a practitioner, a
researcher, and a teacher. His experience includes teaching and
researching computer networks, managing many projects and
groups on digital infrastructure projects, and acting as the
29. technical director of an Internet service provider. In his
consulting career, his practical experience includes IT shared
services cost and risk assessments, client-service architectures,
IT strategy, collaborative architectures, and shared services
implementations. He has also been active in ISO
standardization activities, on government committees on
critical network infrastructures, and as a volunteer for CSA
activities. He authored and delivered several cloud-training
programs, including the first version of what is now known as
CompTIA Cloud Essentials. He is currently working as an
independent CCSK trainer and as an associate professor of
cybersecurity and the cloud at Hogeschool Utrecht. He holds a
master’s degree in mathematics and computer science from the
University of Groningen and a PhD from Twente University.
33. McGraw-Hill Education, or others, McGraw-Hill Education
does not guarantee the accuracy, adequacy, or completeness of
any information and is not responsible for any errors or
omissions or the results obtained from the use of such
information.
TERMS OF USE
This is a copyrighted work and McGraw-Hill Education and its
licensors reserve all rights in and to the work. Use of this work
is subject to these terms. Except as permitted under the
Copyright Act of 1976 and the right to store and retrieve one
copy of the work, you may not decompile, disassemble, reverse
engineer, reproduce, modify, create derivative works based
upon, transmit, distribute, disseminate, sell, publish or
sublicense the work or any part of it without McGraw-Hill
Education’s prior consent. You may use the work for your own
noncommercial and personal use; any other use of the work is
strictly prohibited. Your right to use the work may be
terminated if you fail to comply with these terms.
THE WORK IS PROVIDED “AS IS.” McGRAW-HILL
EDUCATION AND ITS LICENSORS MAKE NO GUARANTEES
OR WARRANTIES AS TO THE ACCURACY, ADEQUACY OR
COMPLETENESS OF OR RESULTS TO BE OBTAINED FROM
USING THE WORK, INCLUDING ANY INFORMATION THAT
CAN BE ACCESSED THROUGH THE WORK VIA HYPERLINK
OR OTHERWISE, AND EXPRESSLY DISCLAIM ANY
WARRANTY, EXPRESS OR IMPLIED, INCLUDING BUT NOT
LIMITED TO IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR
PURPOSE. McGraw-Hill Education and its licensors do not
warrant or guarantee that the functions contained in the work
will meet your requirements or that its operation will be
uninterrupted or error free. Neither McGraw-Hill Education
34. nor its licensors shall be liable to you or anyone else for any
inaccuracy, error or omission, regardless of cause, in the work
or for any damages resulting therefrom. McGraw-Hill
Education has no responsibility for the content of any
information accessed through the work. Under no
circumstances shall McGraw-Hill Education and/or its licensors
be liable for any indirect, incidental, special, punitive,
consequential or similar damages that result from the use of or
inability to use the work, even if any of them has been advised of
the possibility of such damages. This limitation of liability shall
apply to any claim or cause whatsoever whether such claim or
cause arises in contract, tort or otherwise.
35. This book is dedicated to you, the reader. My wish is that you
use the knowledge in this book to secure your potential.
Knowing that you may benefit by my efforts drove me to the
finish line. Here’s to your future success.
36. CONTENTS AT A GLANCE
Chapter 1 Cloud Computing Concepts and Architectures
Chapter 2 Governance and Enterprise Risk Management
Chapter 3 Legal Issues, Contracts, and Electronic
Discovery
Chapter 4 Compliance and Audit Management
Chapter 5 Information Governance
Chapter 6 Management Plane and Business Continuity
Chapter 7 Infrastructure Security
Chapter 8 Virtualization and Containers
Chapter 9 Incident Response
Chapter 10 Application Security
Chapter 11 Data Security and Encryption
Chapter 12 Identity, Entitlement, and Access Management
Chapter 13 Security as a Service
Chapter 14 Related Technologies
Chapter 15 ENISA Cloud Computing: Benefits, Risks, and
Recommendations for Information Security
37. Appendix A Cloud Computing Security Policy Examples
Appendix B About the Online Content
Glossary
Index
38. CONTENTS
Foreword
Acknowledgments
Introduction
Chapter 1 Cloud Computing Concepts and Architectures
Cloud Logical Model
Infrastructure
Metastructure
Infostructure
Applistructure
Cloud Computing Definitions
Essential Characteristics
Cloud Service Models
Cloud Deployment Models
Cloud Security Scope and the Shared Responsibility Model
Shared Responsibility Model
Cloud Security Alliance Tools
39. Cloud Controls Matrix
Consensus Assessments Initiative Questionnaire
STAR Registry
Cloud Reference and Architecture Models
Chapter Review
Questions
Answers
Chapter 2 Governance and Enterprise Risk Management
Governance
Governance Backgrounder
Cloud Governance
Risk Management
Risk Management Backgrounder
Cloud Risk Management
The Effects of Service and Deployment Models
Cloud Risk Management Trade-Offs
Assessing Cloud Service Providers
Chapter Review
Questions
40. Answers
Chapter 3 Legal Issues, Contracts, and Electronic
Discovery
Legal Frameworks Governing Data Protection and Privacy
Required Security Measures
Treaties
Restrictions to Cross-Border Data Transfers
CLOUD Act
Regional Examples
Asia Pacific Region
European Union and European Economic Area
The Americas
Contracts and Provider Selection
Internal Due Diligence
Monitoring, Testing, and Updating
External Due Diligence
Contract Negotiations
Third-Party Audits and Attestations
Electronic Discovery
41. Possession, Custody, and Control
Relevant Cloud Applications and Environment
Searchability and E-Discovery Tools
Preservation
Data Retention Laws and Recordkeeping Obligations
Data Collection
Forensics
Reasonable Integrity
Direct Access
Native Production
Authentication
Cooperation Between Provider and Client in E-Discovery
Response to a Subpoena or Search Warrant
Chapter Review
Questions
Answers
Chapter 4 Compliance and Audit Management
Compliance Backgrounder
Impact of the Cloud on Contracts
42. How the Cloud Changes Compliance
Compliance Inheritance
Continuous Compliance
Audit Backgrounder
Audit Management in the Cloud
SOC Reports and ISO Certifications Backgrounder
SOC Backgrounder
ISO Backgrounder
How the Cloud Changes Audits
Right to Audit
Audit Scope
Auditor Requirements
Chapter Review
Questions
Answers
Chapter 5 Information Governance
Cloud Information Governance Domains
Information Classification Backgrounder
Information Management Backgrounder
43. The Data Security Lifecycle
Locations and Entitlements
Functions, Actors, and Controls
Chapter Review
Questions
Answers
Chapter 6 Management Plane and Business Continuity
Management Plane
Application Programming Interface Backgrounder
Accessing the Management Plane
Securing the Management Plane
Business Continuity and Disaster Recovery in the Cloud
BCP/DR Backgrounder
Architecting for Failure
Business Continuity Within the Cloud Provider
Chaos Engineering
Business Continuity for Loss of the Cloud Provider
Continuity for Private Cloud and Providers
Chapter Review
44. Questions
Answers
Chapter 7 Infrastructure Security
Cloud Network Virtualization
OSI Reference Model Backgrounder
VLANs
VXLAN
Networking Planes Backgrounder
Software Defined Networking
Network Functions Virtualization
How Security Changes with Cloud Networking
Challenges of Virtual Appliances
Benefits of SDN Security
Microsegmentation and the Software Defined Perimeter
Additional Considerations for CSPs or Private Clouds
Hybrid Cloud Considerations
Cloud Compute and Workload Security
Compute Abstraction Technologies
How the Cloud Changes Workload Security
45. Immutable Workloads Enable Security
The Impact of the Cloud on Standard Workload Security
Controls
Changes to Workload Security Monitoring and Logging
Changes to Vulnerability Assessment
Chapter Review
Questions
Answers
Chapter 8 Virtualization and Containers
Major Virtualization Categories Relevant to Cloud Computing
Compute Virtualization
Network Virtualization
Storage Virtualization
Containers
Container Definitions Backgrounder
Container Security Recommendations
Chapter Review
Questions
Answers
46. Chapter 9 Incident Response
Incident Response Lifecycle
Incident and Event Backgrounder
Preparation Phase
Detection and Analysis Phase
Containment, Eradication, and Recovery Phase
Post-Incident Activity Phase
How the Cloud Impacts Incident Response
Preparation
Detection and Analysis
Containment, Eradication, and Recovery
Post-Incident Activity
Chapter Review
Questions
Answers
Chapter 10 Application Security
The SSDLC and Cloud Computing
Secure Design and Development
Training
47. Define
Design
Develop
Test
Secure Deployment
Cloud Impacts on Vulnerability Assessments
Cloud Impact on Penetration Testing
Deployment Pipeline Security
Impact of IaC and Immutable Workloads
Secure Operations
How the Cloud Impacts Application Design and Architectures
Microservices Backgrounder
The Rise and Role of DevOps
DevOps Backgrounder
Security Implications and Advantages of DevOps
Chapter Review
Questions
Answers
Chapter 11 Data Security and Encryption
48. Data Security Controls
Cloud Data Storage Types
Managing Data Migrations to the Cloud
CASB Backgrounder
Securing Cloud Data Transfers
Securing Data in the Cloud
Cloud Data Access Controls
Storage (at Rest) Encryption and Tokenization
Key Management (Including Customer-Managed Keys)
Data Security Architecture
Monitoring, Auditing, and Alerting
Additional Data Security Controls
Cloud Platform/Provider-Specific Controls
Data Loss Prevention
Enterprise Rights Management
Data Masking and Test Data Generation
Enforcing Lifecycle Management Security
Chapter Review
Questions
49. Answers
Chapter 12 Identity, Entitlement, and Access Management
How IAM Works in the Cloud
IAM Terms
IAM Standards
Federation Backgrounder
Managing Users and Identities for Cloud Computing
Authentication and Credentials
Entitlements and Access Management
Privileged User Management
Chapter Review
Questions
Answers
Chapter 13 Security as a Service
Potential Benefits and Concerns of SecaaS
Major Categories of SaaS Offerings
Identity, Entitlement, and Access Management Services
Cloud Access Security Broker
Web Security Gateway
69. Virginia Water, 394.
Viriatus, 218.
Visurix, 662.
voices concerning the murdered, 73.
Volospá, 322.
Voltaire, 640.
Vortigern, 218, 469, 470, 487, 507.
Vulgate, the, 287.
Waen Fawr, 41, 275.
Warinsey, sibyl of, 331: see Guernsey.
Warrefield, 314.
warts, 297, 360–2.
Wastinus, 71: see Gwestin.
watch and ward, 311.
water efficacious during mass, 315.
water-bull, the, 284, 285, 289, 323.
water-horse, the, 324, 433, 434.
Waungyrlais, 20.
wealhstód, 511.
wedding, a Welsh, 277.
wele dacw, 109.
70. well priesthood, 389, 396, 400.
— ritual, 332, 333, 395, 396, 399.
— water bottled, 315.
well, Ỻancarvan, 356.
—, St. Maughold’s, 333.
—, St. Teilo’s, 398, 399.
Wellington, Duke of, 494.
wells, covered, 389, 394, 692.
—, Manx mountain, 314.
wells for dadwitsio, 363.
— with pins and rags, 327, 332–5, 355–7.
—: see Ffynnon.
Welsh rabbit, 614.
— spelling, 671.
Welshpool, 378.
wenestir, finaun, 395.
Werđon, 204, 205.
— gwel’d y, 204, 205.
Wesleyan Methodists, 348, 353.
Wessobrunn Codex, 682.
Weun Gonnws, 568.
71. Wexford Harbour, 427.
white dog and his owner, the, 148.
— stones, 344, 345.
Whitland, 534.
Whuppity Stoorie, 588, 590.
Wi, Wi Wei, 277.
wicken, 325: see rowan.
widow’s son, the, 3, 29, 660, 661.
wife caned, the, 54.
Wight, Isle of, 281.
William Dafyđ, 78, 80.
— Ỻeyn, 693.
— Wmffra, 80.
Williams, Canon, 130.
—, Evan, 230.
—, Jane, 221.
—, Owen, 207.
—, Sir Robert, 478.
—, S. Rhys, 89.
— of Trefriw, Thos., 280.
—, William, 193.
72. Williams-Ellis, J. C., 368, 371.
——, Mrs., 278, 366, 368, 371, 471.
Willin, Clerk, 410–2.
wind, traffic in, 330, 331.
Windele’s MSS., 335.
window opened for a changeling, 103.
window opened for a death, 601.
Winter Nights, Feast of the, 321.
wisps, traffic in, 299.
witch pronounced butch, the word, 294, 691.
— at crossroads, the, 295.
— of Endor, the, 349.
— as a hare, the, 309.
— and the heart, the, 305.
witchcraft, how inherited, 326.
witches bled, 326.
— caught by a black greyhound, 294.
— fetched by boiling herbs, 300.
— fetched by burning a carcase, 305.
— tortured to death, 296.
witch’s besom, the, 295, 296.
76. Ζεύς, 642, 644, 652.
Zimmer, Professor, 375, 480, 544, 694.
Zipporah, 583.
THE END.
77. OXFORD
PRINTED AT THE CLARENDON PRESS
BY HORACE HART, M.A.
PRINTER TO THE UNIVERSITY
78. Welcome to our website – the perfect destination for book lovers and
knowledge seekers. We believe that every book holds a new world,
offering opportunities for learning, discovery, and personal growth.
That’s why we are dedicated to bringing you a diverse collection of
books, ranging from classic literature and specialized publications to
self-development guides and children's books.
More than just a book-buying platform, we strive to be a bridge
connecting you with timeless cultural and intellectual values. With an
elegant, user-friendly interface and a smart search system, you can
quickly find the books that best suit your interests. Additionally,
our special promotions and home delivery services help you save time
and fully enjoy the joy of reading.
Join us on a journey of knowledge exploration, passion nurturing, and
personal growth every day!
ebookmasss.com