From the course: CCSP Cert Prep: 5 Cloud Security Operations Audio Review
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Secure infrastructure operations
From the course: CCSP Cert Prep: 5 Cloud Security Operations Audio Review
Secure infrastructure operations
- [Instructor] Once we have a cloud data center in place, we need to adopt security controls that allow us to securely operate that physical infrastructure. Now, the first thing we should think about is local access to systems. Large data centers have thousands of servers in them, so we can't connect keyboards and monitors to every single one. Instead, we use keyboard, video and mouse, or KVM systems to share one keyboard, monitor and mouse with many different systems. In addition to this local physical access, we also may need to access system remotely and there are a few remote access technologies at our disposal. First, KVM systems may offer remote access, allowing us to use the same KVM system from afar that we would use if we were physically present in the data center. Second, for Windows servers, we can use the Remote Desktop Protocol, or RDP, to provide graphical access to the familiar Windows server interface.…
Contents
-
-
-
(Locked)
Physical and logical infrastructure2m 54s
-
(Locked)
Physical and logical infrastructure: Q&A2m
-
(Locked)
Secure infrastructure operations2m 50s
-
(Locked)
Secure infrastructure operations: Q&A1m 18s
-
(Locked)
Network operations2m 36s
-
(Locked)
Network operations: Q&A1m 11s
-
(Locked)
Network security2m 28s
-
(Locked)
Network security: Q&A1m 51s
-
(Locked)
Security baselines and standards2m 32s
-
(Locked)
Security baselines and standards: Q&A1m 39s
-
(Locked)
Monitoring2m 11s
-
(Locked)
Monitoring: Q&A1m 37s
-
(Locked)
Threat assessment2m 10s
-
(Locked)
Threat assessment: Q&A1m 35s
-
(Locked)
Incident management1m 47s
-
(Locked)
Incident management: Q&A1m 23s
-
(Locked)
Investigations and forensics1m 51s
-
(Locked)
Investigations and forensics: Q&A1m 25s
-
(Locked)
-