From the course: CCSP Cert Prep: 4 Cloud Application Security Audio Review
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Cloud application architecture
From the course: CCSP Cert Prep: 4 Cloud Application Security Audio Review
Cloud application architecture
- [Instructor] In chapter six, I covered the ways that you can build secure applications in a cloud environment. Let's review them. (whooshing) First, we walked through the components of a secure cloud application architecture. These include the use of network security groups to provide firewall functionality, the use of TLS to protect data in transit with cryptography and the use of full disk encryption to protect stored date. In a cloud environment, we can usually deploy full disk encryption as a simple setting change. Application virtualization is another security control that we can deploy in both on-premises and cloud settings to reduce the need for users to access data on their own devices. Web application firewalls play an important role in protecting cloud-based applications. They inspect HTTP requests made to a web server and watch for any signs of potential attack occurring against the application itself.…
Contents
-
-
-
(Locked)
Secure software development lifecycle2m 29s
-
(Locked)
Secure software development lifecycle Q&A1m 14s
-
(Locked)
Application security vulnerabilities2m 6s
-
(Locked)
Application security vulnerabilities Q&A1m 17s
-
(Locked)
Secure coding practices1m 49s
-
(Locked)
Secure coding practices Q&A1m 13s
-
(Locked)
Software security assessment2m 46s
-
(Locked)
Software security assessment Q&A1m 30s
-
(Locked)
Verified secure software2m 2s
-
(Locked)
Verified secure software Q&A55s
-
(Locked)
Cloud application architecture2m 28s
-
(Locked)
Cloud application architecture Q&A1m 18s
-
(Locked)
-