Chapter Title
Related domains:
2.0 Threats, Vulnerabilities, and Mitigations 22% 3.0 Security Architecture 18% 4.0 Security Operations 28%
Related sub-domains
2.3 Explain various types of vulnerabilities. 3.1 Compare and contrast security implications of different architecture models. 3.3 Compare and contrast concepts and strategies to protect data. 4.1 Given a scenario, apply common security techniques to computing resources.
cloud cloud roles anything as a Service XaaS Infrastructure as a Service IaaS Software as a Service SaaS Platform as a Service PaaS Function as a Service FaaS Managed Service Providers Managed Security Service Providers cloud deployment models cloud bursting responsibility matrix cloud controls matrix virtualisation containerization cloud storage resources cloud networking devops Infrastructure As Code IaC cloud security issues API inspection secure web gateways SWG governance and auditing of third-party vendors hardening cloud infrastructure