What process involves an independent examination of records, operations, processes, and controls within an organization to ensure compliance with cybersecurity policies, standards, and regulations?
Which phase of the CSA secure software development life cycle (SSDLC) focuses on ensuring that an application or product is deployed onto a secure infrastructure?
Which of the following best explains how Multifactor Authentication (MFA) helps prevent identity-based attacks?
Which activity is a critical part of the Post-Incident Analysis phase in cybersecurity incident response?
Which concept focuses on maintaining the same configuration for all infrastructure components, ensuring they do not change once deployed?
How does artificial intelligence pose both opportunities and risks in cloud security?
Which factors primarily drive organizations to adopt cloud computing solutions?
Which feature in cloud enhances security by isolating deployments similar to deploying in distinct data centers?
Which of the following BEST describes a benefit of Infrastructure as Code (IaC) in cybersecurity contexts?
Which of the following is a common security issue associated with serverless computing environments?
Which of the following is the MOST common cause of cloud-native security breaches?
How does cloud sprawl complicate security monitoring in an enterprise environment?
Which approach is essential in identifying compromised identities in cloud environments where attackers utilize automated methods?
Which of the following strategies best enhances infrastructure resilience against Cloud Service Provider (CSP) technical failures?
What is the primary focus during the Preparation phase of the Cloud Incident Response framework?
Which of the following best describes the responsibility for security in a cloud environment?
In a hybrid cloud environment, why would an organization choose cascading log architecture for security purposes?
How does network segmentation primarily contribute to limiting the impact of a security breach?
Which aspect is crucial for crafting and enforcing CSP (Cloud Service Provider) policies?
If in certain litigations and investigations, the actual cloud application or environment itself is relevant to resolving the dispute in the litigation or investigation, how is the information likely to be obtained?
CCM: Cloud Controls Matrix (CCM) is a completely independent cloud
assessment toolkit that does not map any existing standards.
What is the best way to ensure that all data has been removed from a public cloud environment including all media such as back-up tapes?
Which cloud-based service model enables companies to provide client-based access for partners to databases or applications?
ENISA: An example high risk role for malicious insiders within a Cloud Provider includes
What does it mean if the system or environment is built automatically from a template?
CCM: The Cloud Service Delivery Model Applicability column in the CCM indicates the applicability of the cloud security control to which of the following elements?
CCM: A hypothetical company called: “Health4Sure” is located in the United States and provides cloud based services for tracking patient health. The company is compliant with HIPAA/HITECH Act among other industry standards. Health4Sure decides to assess the overall security of their cloud service against the CCM toolkit so that they will be able to present this document to potential clients.
Which of the following approach would be most suitable to assess the overall security posture of Health4Sure’s cloud service?
Which statement best describes why it is important to know how data is being accessed?
What is known as a code execution environment running within an operating system that shares and uses the resources of the operating system?
Which data security control is the LEAST likely to be assigned to an IaaS provider?
Network logs from cloud providers are typically flow records, not full packet captures.
Vulnerability assessments cannot be easily integrated into CI/CD pipelines because of provider restrictions.
Cloud services exhibit five essential characteristics that demonstrate their relation to, and differences from, traditional computing approaches. Which one of the five characteristics is described as: a consumer can unilaterally provision computing capabilities such as server time and network storage as needed.
When configured properly, logs can track every code, infrastructure, and configuration change and connect it back to the submitter and approver, including the test results.
How can key management be leveraged to prevent cloud providers from inappropriately accessing customer data?
APIs and web services require extensive hardening and must assume attacks from authenticated and unauthenticated adversaries.
Dynamic Application Security Testing (DAST) might be limited or require pre-testing permission from the provider.
Which cloud security model type provides generalized templates for helping implement cloud security?
Which of the following statements are NOT requirements of governance and enterprise risk management in a cloud environment?