CCM: A hypothetical company called: “Health4Sure” is located in the United States and provides cloud based services for tracking patient health. The company is compliant with HIPAA/HITECH Act among other industry standards. Health4Sure decides to assess the overall security of their cloud service against the CCM toolkit so that they will be able to present this document to potential clients.
Which of the following approach would be most suitable to assess the overall security posture of Health4Sure’s cloud service?
Which of the following best describes the purpose of cloud security control objectives?
Which of the following best describes a key aspect of cloud risk management?
Which of the following best describes the Identity Provider (IdP) and its role in managing access to deployments?
Which type of security tool is essential for enforcing controls in a cloud environment to protect endpoints?
Which approach creates a secure network, invisible to unauthorized users?
In the context of FaaS, what is primarily defined in addition to functions?
Cloud services exhibit five essential characteristics that demonstrate their relation to, and differences from, traditional computing approaches. Which one of the five characteristics is described as: a consumer can unilaterally provision computing capabilities such as server time and network storage as needed.
What is a key advantage of using Infrastructure as Code (IaC) in application development?
Which of the following statements best defines the "authorization" as a component of identity, entitlement, and access management?
Which concept focuses on maintaining the same configuration for all infrastructure components, ensuring they do not change once deployed?
What is the primary function of landing zones or account factories in cloud environments?
Which of the following is a perceived advantage or disadvantage of managing enterprise risk for cloud deployments?
Which of the following best describes a key benefit of Software-Defined Networking (SDN)?
Which of the following from the governance hierarchy provides specific goals to minimize risk and maintain a secure environment?
Why is it important to control traffic flows between networks in a cybersecurity context?
What key characteristic differentiates cloud networks from traditional networks?
Which factors primarily drive organizations to adopt cloud computing solutions?
In a containerized environment, what is fundamental to ensuring runtime protection for deployed containers?
Which cloud deployment model involves a cloud and a datacenter, bound together by technology to enable data and application portability?
How can virtual machine communications bypass network security controls?
What can be implemented to help with account granularity and limit
blast radius with laaS an PaaS?
Which of the following statements best describes an identity
federation?
Which of the following is one of the five essential characteristics of cloud computing as defined by NIST?
Which of the following is a common exploitation factor associated with serverless and container workloads?
What is a primary benefit of using Identity and Access Management (IAM) roles/identities provided by cloud providers instead of static secrets?
When investigating an incident in an Infrastructure as a Service (IaaS) environment, what can the user investigate on their own?
Why is it essential to include key metrics and periodic reassessment in cybersecurity governance?
In the IaaS shared responsibility model, which responsibility typically falls on the Cloud Service Provider (CSP)?
What is a key advantage of using Policy-Based Access Control (PBAC) for cloud-based access management?
Use elastic servers when possible and move workloads to new instances.
What is critical for securing serverless computing models in the cloud?
Which practice ensures container security by preventing post-deployment modifications?
Which statement best describes the Data Security Lifecycle?
Which two key capabilities are required for technology to be considered cloud computing?
What is the primary purpose of implementing a systematic data/asset classification and catalog system in cloud environments?
What is the primary role of Identity and Access Management (IAM)?
Which of the following encryption methods would be utilized when object storage is used as the back-end for an application?
How does centralized logging simplify security monitoring and compliance?
Which of the following statements is true in regards to Data Loss Prevention (DLP)?
Which cloud storage technology is basically a virtual hard drive for instanced or VMs?
What is a common characteristic of default encryption provided by cloud providers for data at rest?
A cloud deployment of two or more unique clouds is known as:
According to NIST, what is cloud computing defined as?
Which of the following is a primary purpose of establishing cloud risk registries?
Why is snapshot management crucial for the virtual machine (VM) lifecycle?
What is a primary benefit of implementing Zero Trust (ZT) architecture in cloud environments?
The containment phase of the incident response lifecycle requires taking systems offline.
In the context of incident response, which phase involves alerts validation to reduce false positives and estimates the incident's scope?
In a cloud computing incident, what should be the initial focus of analysis due to the ephemeral nature of resources and centralized control mechanisms?
ENISA: Lock-in is ranked as a high risk in ENISA research, a key underlying vulnerability causing lock in is:
What is the primary goal of implementing DevOps in a software development lifecycle?
What factors should you understand about the data specifically due to legal, regulatory, and jurisdictional factors?
All assets require the same continuity in the cloud.
How can the use of third-party libraries introduce supply chain risks in software development?
Which of the following enhances Platform as a Service (PaaS) security by regulating traffic into PaaS components?
Which concept provides the abstraction needed for resource pools?
Which of the following is used for governing and configuring cloud resources and is a top priority in cloud security programs?
What is the main purpose of multi-region resiliency in cloud environments?
Containers are highly portable code execution environments.
CCM: Cloud Controls Matrix (CCM) is a completely independent cloud
assessment toolkit that does not map any existing standards.
When mapping functions to lifecycle phases, which functions are required to successfully process data?
How can key management be leveraged to prevent cloud providers from inappropriately accessing customer data?
Which layer is the most important for securing because it is considered to be the foundation for secure cloud operations?
How does cloud adoption impact incident response processes in cybersecurity?
In a cloud environment spanning multiple jurisdictions, what is the most important factor to consider for compliance?
Which approach is commonly used by organizations to manage identities in the cloud due to the complexity of scaling across providers?
Which of the following best describes a primary risk associated with the use of cloud storage services?
Which activity is a critical part of the Post-Incident Analysis phase in cybersecurity incident response?
Which practice best helps mitigate security risks by minimizing root/core access and restricting deployment creation?
Audits should be robustly designed to reflect best practice, appropriate resources, and tested protocols and standards. They should also use what type of auditors?
In a cloud environment, what does the Shared Security Responsibility Model primarily aim to define?
Which type of controls should be implemented when required controls for a cybersecurity framework cannot be met?
What is true of a workload?
Which Cloud Service Provider (CSP) security measure is primarily used to filter and monitor HTTP requests to protect against SQL injection and XSS attacks?
Which cloud security model type provides generalized templates for helping implement cloud security?
What key activities are part of the preparation phase in incident response planning?
What are the primary security responsibilities of the cloud provider in the management infrastructure?
Which of the following best describes the multi-tenant nature of cloud computing?
What is a PRIMARY cloud customer responsibility when managing SaaS applications in terms of security and compliance?
Which attack surfaces, if any, does virtualization technology introduce?
What type of logs record interactions with specific services in a system?
Which of the following events should be monitored according to CIS AWS benchmarks?
What is known as a code execution environment running within an operating system that shares and uses the resources of the operating system?
Which of the following best explains how Multifactor Authentication (MFA) helps prevent identity-based attacks?
Who is responsible for the security of the physical infrastructure and virtualization platform?
CCM: The Cloud Service Delivery Model Applicability column in the CCM indicates the applicability of the cloud security control to which of the following elements?
What is the purpose of access policies in the context of security?
Which technique is most effective for preserving digital evidence in a cloud environment?
What is a potential concern of using Security-as-a-Service (SecaaS)?
Which of the following is a common security issue associated with serverless computing environments?