Security Guidance for Critical Areas of Focus in Cloud Computing


         

Cloud Security Guidance by JCK


   
 


#            Computing Acronyms / Cloud Computing Alphabit
#     I also recommend that you have two monitors available if possible. One is for the exam itself and the other is for the Guidance and ENISA documents, as well as the latest copy of the Cloud Controls Matrix.
# Cloud Model / Deployment Models   / Hybrid / Cloud Bursting = an application deployment model in which an application runs in a private cloud or data center and bursts into a public cloud using a load balancer when the demand for computing capacity spikes.
#      MDM - Mobile Device Management
#     CAMP - Cloud Application Management for Platforms
##
## Cloud Model /  

## Cloud Model /  Essential Characteristics  {5} / Broad Network Access / Rapid Elasticity / Measured Service / On-Demand Self-Service / Resource Pooling
## Cloud Model /  Essential Characteristics / Multitenanacy (listed separately only in ISO/IEC 17788)
## Cloud Model / 3 Service Models   / SaaS   / PaaS    / Iaas / (aka SPI stack OR tiers) http://www.bigcommerce.com/blog/saas-vs-paas-vs-iaas/#the-three-types-of-cloud-computing-service-models-explained
## Cloud Model / 4 Deployment Models   / Public / Private / Hybrid / Community
#buz
#buz    4 cloud customer considerations  = Cross-border or multi-jurisdiction / Assignment of compliance responsibilities including the CSP's providers / CSP capability to show compliance / Relationship between all parties including customer, CSP, auditors and CSP's providers
#buz       =
#buz       = Companies are expected to develop and operate their products and services in accordance with "privacy by design" and "privacy by default" principles.
#buz Big Data     The 3 Vs of Big Data = Volume, Variety and Velocity
#buz Big Data        exabytes = 1,024 petabytes
#buz Big Data        petabytes = 1,024 terabytes
#buz Big Data        zettabytes = 1,024 exabytes  http://en.wikipedia.org/wiki/Zettabyte
#buz Big Data     = Big data is a data set of large volume of data, which includes structured and unstructured data.
#buz Big Data     = http://www.gartner.com/en/glossary?glossarykeyword=Big%20Data    Gartner defines it as such: "Big data is high volume, high velocity, and/or high variety information assets that require new forms of processing to enable enhanced decision making, insight discovery and process optimization."
#buz CSA   Cloud Jump Kit  = These are the tools needed to investigate in a remote location.
#buz IoT        IoT - Internet of Things
#buz IoT     = This could be anything from fitness trackers, connected lightbulbs to medical devices and beyond. IoT will connect to the cloud for the back-end processing and storage of all the data collected.
#buz IoT     = http://www.gartner.com/en/information-technology/glossary/internet-of-things   Gartner defines IoT as: "The Internet of Things {IoT} is the network of physical objects that contain embedded technology to communicate and sense or interact with their internal states or the external environment."
#buz roles  Multi-Factor Authentication - (MFA): use of multiple factors in authentication
#buz roles CSA   Access Control  = restricting access to a resource. Access management is the process of managing access to the resources.
#buz roles CSA   Attributes   = facets of an identity. Attributes can be relatively static (like an organizational unit) or highly dynamic (IP address, device being used, if the user authenticated with MFA, location, etc.).
#buz roles CSA   Authentication  = the process of confirming an identity. When you log in to a system you present a username (the identifier) and password (an attribute we refer to as an authentication factor). Also known as Authn.
#buz roles CSA   Authoritative Source  = the "root" source of an identity, such as the directory server that manages employee identities.
#buz roles CSA   Authorization   = allowing an identity access to something (e.g. data or a function). Also known as Authz.
#buz roles CSA   Entitlement   = mapping an identity (including roles, personas, and attributes) to an authorization. The entitlement is what they are allowed to do, and for documentation purposes we keep these in an entitlement matrix.
#buz roles CSA   Entity   = the person or "thing" that will have an identity. It could be an individual, a system, a device, or application code.
#buz roles CSA   Federated Identity Management = the process of asserting an identity across different systems or organizations. This is the key enabler of Single Sign On and also core to managing IAM in Security Guidance.
#buz roles CSA   Identifier   = the means by which an identity can be asserted. For digital identities this is often a cryptological token. In the real world it might be your passport.
#buz roles CSA   Identity Provider  = the source of the identity in federation. The identity provider isn't always the authoritative source, but can sometimes rely on the authoritative source, especially if it is a broker for the process.
#buz roles CSA   Identity   = the unique expression of an entity within a given namespace. An entity can have multiple digital identities, such as a single individual having a work identity (or even multiple identities, depending on the systems), a social media identity, and a personal identity. For example, if you are a single entry in a single directory server then that is your identity.
#buz roles CSA   Multi-Factor Authentication = use of multiple factors in authentication. Common options include one-time passwords generated by a physical or virtual device/token (OTP), out-of-band validation through an OTP sent via text message, or confirmation from a mobile device, biometrics, or plug-in tokens.
#buz roles CSA   Persona   = the expression of an identity with attributes that indicates context. For example, a developer who logs into work and then connects to a cloud environment as a developer on a particular project. The identity is still the individual, and the persona is the individual in the context of that project.
#buz roles CSA   Relying Party   = the system that relies on an identity assertion from an identity provider.
#buz roles CSA   Role    = identities can have multiple roles which indicate context. "Role" is a confusing and abused term used in many different ways. For our purposes we will think of it as similar to a persona, or as a subset of a persona. For example, a given developer on a given project may have different roles, such as "super-admin" and "dev", which are then used to make access decisions.
#buz roles    Attributes   = for each identity, there are attributes that represent the facets of it.
#buz roles    Authentication  = the process of confirming an identity
#buz roles    Authoritative source  = the "root" source of an identity
#buz roles    Entity   = can be a user, a device or a piece of code that has an identity
#buz roles    Identifier   = the means by which an identity is asserted.
#buz roles    Identity Federation  = Identity Federation is the relationship between identities and attributes stored across multiple distinct identity management systems.
#buz roles    Identity Provider  = the source of the identity in federation
#buz roles    Identity   = this is used by an entity to consistently and comprehensively be identified as unique.
#buz roles    Persona   = is the expression for an identity with attributes that indicate context.
#buz roles    Role    = is similar to persona, or can be a subset of a persona. Identities can have multiple roles, which indicate context
#buz roles        Federation = The connection of one Identity repository to another. It is the interconnection of disparate Directories Services. Federation, with the use of
#buz roles     Relying Party = the system that relies on an identity assertion from an identity provider.
#buz roles       SAML = offers portability to disparate and independent security domains with some organizations extending their DS environment via a gateway product that will handle SAML assertions.
#buz sec     4 D's of perimeter security = Deter, Detect, Delay, Deny
#buz sec        EDR - Endpoint Detection and Response
#buz soft   Sanity Checking = The act of checking that something does not contain elementary mistakes or impossibilities, or is not based on invalid assumptions.
#buz std authentication   OASIS \  SAML - Security Assertion Markup Language / an XML-based open standard for exchanging authentication and authorization data between security domains.
#buz std authentication   OASIS  - Organization for the Advancement of Structured Information Standards
#buz std authentication    OAuth  - Open Authentication / reference architecture for authentication / Is an open authorization, an open standard for authorization that allows users to share their private resources with tokens instead of credentials.
#buz std authentication    OIDC   - OpenID Connect / authentication layer built on top of OAuth 2.0
#buz std authentication    OpenID - OpenID protocol / an open standard that allows users to be authenticated in a decentralized manner. / OpenID is an open standard and decentralized authentication protocol.
#buz std web        URL - Uniform Resource Locator  / pronounced 'Earl'
#buz std web       HTML - HyperText Markup Language / pronounced 'Hit-Mel'
#buz std web      XACML - (eXtensible Access Control Markup Language): is a standard for defining attribute-based access controls/authorizations. It is a policy language for defining access controls
#buz storage          Nearline = not immediately available, but can be made online quickly without human intervention. Nearline storage dates back to the IBM 3850 Mass Storage System tape library, which was announced in 1974.
#buz storage          Offline  = not immediately available, and requires some human intervention to become online.
#buz storage          Online   = immediately available for I/O.
#buz         BIG-IP APM - Access Policy Manager
#buz         BIG-IP APM - Visual Policy Editor
#buz         GRC - Governance, Risk, and Compliance
#buz         P2V - Physical to Virtual / is a term that refers to the migration of physical machines to virtual machines.
#buz       Agent = also called softbot 'software robot', a computer program that performs various actions continuously and autonomously on behalf of an individual.
#buz    Future-proofing - the process of anticipating the future and developing methods of minimizing the effects of shocks and stresses of future events.
#def         Black Swan vulnerability = theory of black swan events is a metaphor that describes an event that comes as a surprise, has a major effect, and is often inappropriately rationalised after the fact with the benefit of hindsight
#def       Scaling Out  = adding more servers (for example, adding servers to a web farm to service requests)
#def       Scaling Up   = using more powerful servers (such as a four-CPU configuration as opposed to two)
#def          adherents = someone who supports a particular party, person, or set of ideas.
#def          canonical = conforming to well-established patterns or rules.
#def          collude = cooperate in a secret or unlawful way in order to deceive or gain an advantage over others.
#def          collusion = secret or illegal cooperation or conspiracy, especially in order to cheat or deceive others.
#def          ephemeral = lasting for a very short time
#def          immutable = unchanging over time or unable to be changed
#def          RPC / RMI - Remote Method Invocation
#def          RPC - Remote Procedure Call   http://en.wikipedia.org/wiki/Remote_procedure_call
#def         Governance = The ability of an organization to govern and measure enterprise risk introduced by cloud computing.
#def        repudiation = denial of the truth or validity of something.
#def     grid computing - use of widely distributed computer resources to reach a common goal
#def         CIO - Chief Information Officer
#def         CTO - Chief Technology Officer
#def         DSP - Digital Service Providers  

#def         FAM - File Activity monitoring  (DAB - DB Activity monitoring)
#def         HDI - Human Development Index
#def         OES - Operators of Essential Services
#def         SME - Small and Mid-size Enterprises
#def        CDIO - chief digital information officer or information technology (IT) director
#def        CISO - Chief Information Security Officer
#def        PACS - Physical Access Control Systems
#lnk   http://cloudsecurityalliance.org/research/working-groups/software-defined-perimeter/#_overview
#lnk d/l:  Security Guidance for Critical Areas of Focus in Cloud Computing
@            CDN - Content Delivery Network (or Content Distribution Network)
@         HPC - High-Performance Computing
aaS  IaaS /        Bare Metal Cloud  = a public cloud service in which the customer rents hardware resources from a remote service http://searchstorage.techtarget.com/definition/bare-metal-cloud
aaS  IaaS /        Bare Metal  = http://phoenixnap.com/blog/bare-metal-cloud-vs-iaas
aaS  IaaS     - Infrastructure As A Service - facilities (physical data center), hardware (proprietary or standard), abstraction (virtualization), and orchestration (APIs).
aaS  IaaS     = accessed via multiple methods-web, CLI, or API for customers to manage their virtual environment, hence the term cloud management plane (and is part of the metastructure logical model).
aaS  IaaS     = More mature cloud implementations by consumers are programmatically driven through accessing APIs. In fact, this programmatic-driven virtual infrastructure (referred to as a software defined infrastructure) is something that every cloud consumer should strive for.
aaS  IaaS     = Software-Defined Infrastructure / allows you to create an infrastructure template to configure all or some aspects of a cloud deployment. These templates are then translated natively by the cloud platform or into API calls that orchestrate the configuration.
aaS / buz / SaaS /      MaaS - Monitoring As A Service
aaS / buz / SaaS /    = BackBlaze - data storage provider (pilot light OT hot standby)
aaS / buz / XaaS / BaaS /      BaaS - Backend As A Service - developers outsource all the behind-the-scenes aspects of a web or mobile application
aaS / buz / XaaS / CaaS /      CaaS - Communication As A Service - VoIP or Internet telephony
aaS / buz / XaaS / DBaaS /     DBaaS - DataBase As A Service
aaS / buz / XaaS / DRaaS /     DRaaS - Disaster Recovery As A Service
aaS / buz / XaaS /      XaaS - Anything As A Service
AAS / buz       BYOC - Bring Your Own Cloud / http://www.elastichosts.com/blog/ultimate-list-of-cloud-computing-acronyms/
AAS / buz       BYOD - Bring Your Own Device / http://www.cloudswitched.com/blog/10-cloud-application-acronyms-explained
AAS / buz       BYOK - Bring Your Own Key (customers can use their own key management server)
aaS / buz       DaaS - Desktop As A Service
aaS / buz       FaaS - Function As A Service  
aaS             SecaaS           - SECurity software As A Service
aaS             SecaaS /     MSS - Managed Security Services (offered by large cloud providers)
aaS             SecaaS /    EaaS - Encryption As A Service
aaS             SecaaS / SIEMaaS - Security Information and Event Management As A Service
aaS         Examples /   SaaS = Examples include online word processing and spreadsheet tools, CRM services and web content delivery services (Salesforce CRM, Google Docs, etc).
aaS         Examples /  PaaS = Examples are Microsoft Azure, Force (Salesforce) and Google App engine.
aaS         Examples / IaaS = Examples include Amazon EC2 and S3, Terremark Enterprise Cloud, Windows Live Skydrive and Rackspace Cloud.
aaS       Shadow Cloud Gaming = service that gives you virtual access to a beefy PC rig for gaming (PaaS/SaaS)
aaS             CSP - Cloud Service Provider - Infrastructure, Metastructure (Virtual environment with the cloud management plane), Infostructure (Data), Applistructure (Application and OS)   http://www.rationalsurvivability.com/blog/2009/06/incomplete-thought-cloudanatomy-infrastructure-metastructure-infostructure/  

aaS           SaaS - Software As A Service - SaaS delivers software and its associated data hosted centrally typically in the cloud and are usually accessed by users via a web browser over the Internet.
aaS          CSP / SPI - Software as a service, Platform as a service and Infrastructure as a service.  


aaS        PaaS - Platforms As A Service / http://www.cloudswitched.com/blog/10-cloud-application-acronyms-explained
aaS        PaaS =    adds a layer of integration with application development frameworks; middle-ware capabilities; and functions such as databases, messaging, and queuing.
aaS        PaaS =   In the PaaS service model, the provider builds the infrastructure (or leverages IaaS from another provider).
aaS        PaaS =  Customers in turn leverage this multitenant platform that is fully managed by the provider.
aaS        PaaS =  example: Database as a Service
aaS       iPaas - Integration Platform As A Service  
AAS    UCC  - Unified Communications & Collaboration / the integration of various communications methods with collaboration tools such as virtual white boards, real-time audio and video conferencing, and enhanced call control capabilities.
aaS    UCCaaS  - Unified Communications & Collaboration As A Service
aC IaC   CM /         SaltStack = manages infrastructure as code, open source
aC IaC   CM /          Chef = manages infrastructure as code, open source - is a company and the name of a configuration management tool          http://en.wikipedia.org/wiki/Chef_(software)
aC IaC   CM /    CloudFormation = manages infrastructure as code, open source http://blog.gruntwork.io/why-we-use-terraform-and-not-chef-puppet-ansible-saltstack-or-cloudformation-7989dad2865c?gi=2af3ec6a3c59
aC IaC   CM /     Puppet = manages infrastructure as code, open source
aC IaC   CM /    Ansible = manages infrastructure as code, open source
aC IaC   CM     - Configuration Management
aC IaC            IaC - Infrastructure as Code                    http://en.wikipedia.org/wiki/Infrastructure_as_code
aC            SDI - Software-Defined Infrastructure
arc Data Security /      gap network = Data Security Architecture using cloud storage or a queue service that communicates on the provider's network, not within your virtual network. http://en.wikipedia.org/wiki/Air_gap_(networking)
arc Data Security /   Dynamic masking = Dynamic masking rewrites data on the fly, typically using a proxy mechanism, to mask all or part of data delivered to a user.
arc Data Security /   Test data generation = This is the creation of a database with non-sensitive test data based on a "real" database.
arc Data Security /      An example would be using object storage for data transfers and batch processing, rather than SFTP-ing, to static instances.
arc Data Security /      Another is message queue gapping-run application components on different virtual networks that are only bridged by passing data through the cloud provider's message queue service.  This eliminates network attacks from one portion of the application to the other.
arc       CSA / compute abstraction type 1 = Virtual machines / the most-well known form of compute abstraction, and are offered by all IaaS providers. They are commonly called instances in cloud computing since they are created (or cloned) off a base image.
arc       CSA / compute abstraction type 2 = Containers / code execution environments that run within an operating system (for now), sharing and leveraging resources of that operating system.
arc       CSA / compute abstraction type 3 = Platform-based workloads / logic/procedures running on a shared database platform.
arc       CSA / compute abstraction type 4 = Serverless computing broad category that refers to any situation where the cloud user doesn't manage any of the underlying hardware or virtual machines, and just accesses exposed functions.
arc          Jericho Cloud Cube Model = dimension 1: Internal/External     (Physical Location)   http://ccskguide.org/jericho-cloud-cube-model
arc          Jericho Cloud Cube Model = dimension 4: Insourced/Outsourced    (Who provides the cloud service)
arc         Jericho Cloud Cube Model = dimension 2: Proprietary/Open     (State of Ownership)
arc         Jericho Cloud Cube Model = dimension 3: Perimeterised/De-perimeterized Architectures (Architectural mindset)
arc     MSA - MicroService Architecture  
arc     SOA - Service-Oriented Architecture
arc  1/2 infrastructure macro layers = The raw, physical and logical compute (processors, memory, etc.), networks, and storage used to build the cloud's resource pools.
arc  2/2 infrastructure macro layers = The virtual/abstracted infrastructure managed by a cloud user. That's the compute, network, and storage assets that they use from the resource pools.
buz         Discovery by Design = eDiscovery     http://techcrunch.com/2011/11/06/discovery-by-design/
buz            Blue-Green = deployment application release model that gradually transfers user traffic from a previous version of an app or microservice to a nearly identical new release
buz      Encryption Componets = 1. where is the data, 2. where is the Encryption engine, 3. where are the keys
buz    Upgrade /  Forklifting = A forklift upgrade is the complete overhaul of an IT infrastructure
buz    Upgrade / Lift & Shift = The lift and shift migration approach is about migrating your application and associated data to the cloud with minimal or no changes
buz     object storage = Dropbox
buz       Cloud = impacts app design & architecture 4 ways: 1. segregation by default, 2. immutable infrastructure, 3. increase use of microservices, 4. PaaS/serverless
buz        Access Controls/Encryption
cert          CNAP - Cybersecurity National Action Plan
cert       CISSP - Certified Information Systems Security Professional
cert       CNCI  - Comprehensive National Cybersecurity Initiative
cont        Docker      = set of platform as a service (PaaS) products that use OS-level virtualization to deliver software in packages called containers   http://www.docker.com/products/kubernetes  

cont        Docker Swarm = a group of either physical or virtual machines that are running the Docker application.
cont        Kubernetes  = Kubernetes is an open source orchestration system for automating the management, placement, scaling and routing of containers   http://labs.play-with-k8s.com
cont        Kubernetes \ CNI - Container Network Interface   http://dzone.com/articles/understanding-kubernetes-interfaces-cri-cni-amp-cs
cont        Kubernetes \ CRI - Container Runtime Interface
cont        Kubernetes \ CSI - Container Storage Interface
cont          LXC - LinuX Container        
cont  component / Container  = this is the execution environment itself.
cont  component / Engine  = aka container runtime / this is the environment on top of which a container is run. A very popular example of a container runtime is Docker Engine.
cont  component / Image Repository = where all of the images and code that can be deployed as containers are stored. Docker Hub is a popular example.
cont  component / Orchestration = orchestration & scheduling controller deals with managing the lifecycle of containers. / Orchestration deals with items such as provisioning and deployment of containers, scaling, movement of containers, and container health monitoring. Example: Kubernetes, Docker Swarm
cp net         ULA - Unique Local Address
cp         DRS - Distributed Resource Scheduling
cp         QOS - Quality Of Service
cp         SLA - Service Level Agreement
cp         ToS - Term of Service
cp         ULA - User Licensing Agreement  
 

csp    MS / Azure
csp    MS / Azure / BLOB - Binary Large OBject
csp   AWS / Boto3  = Boto is the Amazon Web Services (AWS) SDK for Python.
csp   AWS / EC2  - Elastic Compute Cloud IaaS
csp   AWS / Elastic Beanstalk = http://docs.aws.amazon.com/elasticbeanstalk/latest/dg/Welcome.html
csp   AWS / KMS  - Key Management Service
csp   AWS / Lambda  = lets you run code without provisioning or managing servers (NOT serverless)      http://docs.aws.amazon.com/general/latest/gr/glos-chap.html
csp   AWS / S3  - Simple Storage Service
csp   AWS / VPC  - Virtual Private Cloud     http://en.wikipedia.org/wiki/Amazon_Virtual_Private_Cloud
csp   GCP / GCE  = Google Cloud Platform / Google Compute Engine - Infrastructure as a Service component of Google Cloud Platform which is built on the global infrastructure that runs Google's search engine
csp   GCP   = Google Cloud Platform
csp Data Dispersion    = This process takes data (say, an object), breaks it up into smaller fragments, makes multiple copies of these fragments, and stores them across multiple servers and multiple drives to provide high durability (resiliency)
csp Data Fragmentation of Bit Splitting = This process takes data (say, an object), breaks it up into smaller fragments, makes multiple copies of these fragments, and stores them across multiple servers and multiple drives to provide high durability (resiliency)
csp OPEX vs CAPEX    = OPerating Expense vs CAPital Expense
data   Data Security Lifecycle 6 phases  = Create / Store / Use / Share / Archive / Destroy   http://www.securosis.com/blog/data-security-lifecycle-2.0    


data expample        Pharmacist = The Data Controller
data expample       Accountants = The Data Processor
data expample        DBA = The Data Custodian
data Crypto-shredding   = the practice of 'deleting' data by deliberately deleting or overwriting the encryption keys. This requires that the data have been encrypted. Data comes in these three states: data at rest, data in transit and data in use. In the CIA triad of confidentiality, integrity, and availability all three states must be adequately protected.
database     \ The Data C**************  = In the majority of data protection laws, when the data is transferred to a third party custodian, responsible for the security of the data.
database     \ The Data Controller (UK)  = The natural or legal person, public authority, agency or any other body which alone or jointly with others determines the purposes and means of the processing of personal data; where the purposes and means of processing are determined by national or Community laws or regulations, the controller or the specific criteria
database     \ The Data Custodian  (US)  = The natural or legal person, public authority, agency or any other body which alone or jointly with others determines the purposes and means of the processing of personal data; where the purposes and means of processing are determined by national or Community laws or regulations, the controller or the specific criteria
database     \ The Data Processor  = A natural or legal person, public authority, agency or any other body which processes personal data on behalf of the controller.
database     \ The Data Subject   = Identified or identifiable natural person (see EU Directive 95/46/EC) from whom data is collected and/or about whom that data is processed
database     \    Data Sovereignty  = the idea that data are subject to the laws and governance structures within the nation it is collected  http://en.wikipedia.org/wiki/Data_sovereignty
database        HDFS / MapReduce  = Mapping input data is divided into input splits for analysis. Reducer processes the data that comes from the mapper.
database        HDFS / YARN  - Yet Another Resource Negotiator
database        HDFS   - Hadoop Distributed File System (Apache Hadoop) http://www.tutorialspoint.com/hadoop/hadoop_mapreduce.htm
database        DAB - DB Activity monitoring  (FAM - File Activity monitoring)
database        DAM - Database Activity Monitoring / captures and records all Structured Query (duplicate acronym: Digital Asset Management)
database        TDE - Transparent Sata Encryption  http://en.wikipedia.org/wiki/Transparent_data_encryption
database  Homomorphic Encryption = form of encryption allowing one to perform calculations on encrypted data without decrypting it first / http://en.wikipedia.org/wiki/Homomorphic_encryption
date Data-centric security   = an approach to security that emphasizes the security of the data itself rather than the security of networks, servers, or applications.  http://en.wikipedia.org/wiki/Data-centric_security
db         SQL - Structured Query Language
dr         BCP - Business Continuity Planning
dr         BP - Business Process
dr         BPM - Business Process Management
dr       BIA \ RPO - Recovery Point Objective  (disaster recovery)
dr       BIA \ RTO - Recovery Time Objective  (disaster recovery)
dr       BIA  - Business Impact Analysis    
hard         HDD - Hard Disk Drive
hard         UPS - Uninterruptable power supply
hard      SSD - Solid-State Drive
HDD        RAID - Redundant Array of Independent Disks  (originally Redundant Array of Inexpensive Disks)
legal  court terminology /    integrity  = Integrity can be defined as assurance of the accuracy and reliability of information and systems from its original state (called a "reference version").
legal  court terminology / authenticity  = Authenticity is defined as assurance that the "reference version" data has not been altered from what it was when another party was in control of it.
legal International Safe Harbor Privacy  = This treaty basically allowed companies to commit voluntarily to protecting EU citizens' data stored in the United States the same way that it would protect the data if it were held in the European Union.
legal International Safe Harbor Privacy  = otherwise known as the Safe Harbor agreement, between the United States and the European Union.
legal        APEC / Privacy Framework  = Asia Pacific Economic Cooperation / Privacy Framework
legal             Data Sovereignty = the idea that data are subject to the laws and governance structures within the nation it is collected  http://en.wikipedia.org/wiki/Data_sovereignty
legal         EU-US Privacy Shield = operates in much the same way as the old Safe Harbor under the EU GDPR
legal              sectoral = covers specific categories of personal data
legal     right-to-audit clause = (aka 'first-party audit') should be obtained whenever possible. This clause should state requirements for third-party audits and/or certifications and that any reports related to such certification processes or other vulnerability assessments or penetration tests be provided to your institution.
legal        adjudicated = a legal term for making an official decision
legal        E-Discovery = Electronic Discovery
legal            NDA - Non-Disclosure Agreement
legal         SLA - Service Level Agreement
legal         ToU - Terms of Use
legal         BCR - Binding Corporate Rules
legal         SCC - Standard Contractual Clauses
legal     omnibus = covers all categories of personal data
legal   FISMA /  FIPS 199 - Federal Information Processing Standards / FIPS 199 and FIPS 200 are mandatory security standards as required by FISMA. http://en.wikipedia.org/wiki/FIPS_199
legal   FISMA   - Federal Information Security Management Act of 2002          http://en.wikipedia.org/wiki/FISMA
legal  AUS /       ACL - Australian Consumer Law
legal  CAN /    PIPEDA - Personal Information Protection and Electronic Documents Act (Canada)
legal  click-wrap agreement  = A non-negotiated contract
legal  EU /        CSIRT = Computer Security Incident Response Team - Each member state must create a CSIRT. These CSIRTs will work in cooperation with CSIRTs across all EU/EEA members as part of a cohesive EU-wide network.
legal  EU / EEA / GER   = Germany also requires that a Data Protection Officer be appointed if the company has more than nine employees.
legal  EU / EEA      NIS - Network Information Security Directive
legal  EU / EEA     GDPR = Breaches of security - The GDPR requires that data controllers report security breaches within 72 hours of detection.
legal  EU / EEA   - European Economic Area - The EEA consists of the EU countries plus Iceland, Lichtenstein, and Norway.
legal  EU / EEA   = the 1995 European Union (EU) Data Protective Directive and the 2002 ePrivacy Directive as amended in 2009.
legal  EU /         GDPR - General Data Protection Regulation  (EU GDPR)
legal  INT /      OECD - Organization for Economic Cooperation and Development / Privacy and Security Guidelines
legal  JAP /      APPI - Act on the Protection of Personal Information
legal  RUS /    = Russian Data Protection regulator
legal  US /              CLOUD Act - Clarifying Lawful Overseas Use of Data Act - introduced in the United States in 2018
legal  US / AICPA  SOC / CUEC - Complementary User Entity Controls / all controls within a service organization's systematic processes that rely on the user entity for implementation and function. In other words, user entities are accountable for the performance of CUECs. And if a user entity does not consistently perform CUECs as stipulated, its affiliated service organizations may ultimately be unable to deliver contracted control objectives.
legal  US / AICPA  SOC 1  = reports are traditionally used to prove controls over financial reporting.
legal  US / AICPA  SOC 2 / Type 1 = A point-in-time look at the design of the controls.
legal  US / AICPA  SOC 2 / Type 2 = An inspection of the operating effectiveness of the controls over a period of time.
legal  US / AICPA  SOC 2  = incorporates Trust Services Criteria (TSC) for general IT controls.
legal  US / AICPA  SOC   - System and Organizational Controls
legal  US / AICPA   - American Institute of Certified Public Accountants
legal  US / Gov     ATO  - Authority to Operate - to offer their services to the US government.
legal  US / Gov FedRAMP  - Federal Risk and Authorization Management Program / Providers must be FedRAMP authorized
legal  US / Law / FRCP Rule 26  = Duty to Disclose; General Provisions Governing Discovery.  http://www.law.cornell.edu/rules/frcp/rule_26
legal  US / Law / FRCP Rule 26  = Duty to Disclose; The rule requires that a party make disclosures based on information reasonably available and must also disclose any witnesses who will present evidence at trial.
legal  US / Law / FRCP      ESI - Electronically Stored Information   http://thesedonaconference.org
legal  US / Law / FRCP   - Federal Rules of Civil Procedure - govern civil procedure in United States district courts.
legal  US / Law      SOX - Sarbanes-Oxley - An auditing law passed by the US Congress that is used for publicly traded companies in the United States.
legal  US /        FTC - Federal Trade Commission (over cloud companies)
legal  US /        GSA - General Services Administration
legal  US /        PHI - Patient Health Information
legal  US /        PII / SPI - Sensitive Personal Information
legal  US /        PII - Personally Identifiable Information (GSA - General Services Administration) / Name, email, home address and phone number, last four of SSN
legal  US /      NYS DFS 500 - New York State Department of Financial Services   http://www.mdsny.com/how-to-meet-dfs-23nycrr-500-in-five-steps/
legal  US /        GLBA - Gramm-Leach-Bliley Act - financial regulations
legal  US /   HIPAA / PHI    - Protected Health Information
legal  US /   HIPAA  - Health Insurance Portability and Accountability Act        http://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Accountability_Act
legal  US /     COPPA - Children's Online Privacy Protection Act
net-      SAN / FCoE   - Fibre Channel over Ethernet  http://en.wikipedia.org/wiki/Fibre_Channel_over_Ethernet
net-      SAN / Fibre Channel / CNA - Converged Network Adapter
net-      SAN / Fibre Channel / HBA - Host Bus Adapter
net-      SAN / iSCSI   - Internet Small Computer Systems Interface
net-      SAN / LUN   - Logical Unit Number (from SCSI)
net-      SAN    - Storage Area Network  
net-         RDP - Remote Desktop Protocol - Microsoft proprietary protocol
net-        HTTP - HyperText Transfer Protocol
net-      Microsoft IIS - MS Internet Information Services
net-       IP - Internet Protocol
net arc          Microsegmentation = a method of creating secure zones in data centers and cloud deployments that allows companies to isolate workloads from one another and secure them individually. It's aimed at making network security more granular. The purpose behind implementing microsegmentation is to limit the blast radius if an attacker compromises a resource.
net arc         Flat Metwork = a computer network design approach that aims to reduce cost, maintenance and administration. Flat networks are designed to reduce the number of routers and switches on a computer network by connecting the devices to a single switch instead of separate switches. http://en.wikipedia.org/wiki/Flat_network
net arc         Zero Trust = a security model based on the principle of maintaining strict access controls and not trusting anyone by default, even those already inside the network perimeter.  http://www.cloudflare.com/learning/security/glossary/what-is-zero-trust
net attack     ARP Poisoning = (ARP spoofing, ARP cache poisoning, or ARP poison routing) a technique by which an attacker sends (spoofed) Address Resolution Protocol (ARP) messages onto a local area network. Generally, the aim is to associate the attacker's MAC address with the IP address of another host, such as the default gateway, causing any traffic meant for that IP address to be sent to the attacker instead.  http://en.wikipedia.org/wiki/ARP_spoofing
net attack     MAC Spoofing = a technique for changing a factory-assigned Media Access Control (MAC) address of a network interface on a networked device.  http://en.wikipedia.org/wiki/MAC_spoofing
net buz           inbound  = ingress
net buz           outbound = egress
net cp     ONF / OpenFlow = communications protocol that gives access to the forwarding plane of a network switch or router over the network.
net cp     ONF / SDN / NFV - Network Function Virtualization         http://en.wikipedia.org/wiki/Network_function_virtualization
net cp     ONF / SDN - Software-Defined Networking (architecture that offers isolation) / ex: VMware NSX, OpenFlow / SDN is centralized by taking the "brains" out of the underlying networking appliance and placing this functionality in the SDN controller.  http://en.wikipedia.org/wiki/Software-defined_networking
net cp     ONF  - Open Networking Foundation  /  standard bearer for Software Defined Networking (SDN)  

net sec         TLS - Transport Layer Security - protocol that provides authentication, privacy, and data integrity between two communicating computer applications.
net         Bastion (Transit) = a special-purpose computer on a network specifically designed and configured to withstand attacks.  

net      Cloud load balancing = a type of load balancing that is performed in cloud computing.   http://en.wikipedia.org/wiki/Cloud_load_balancing
net           CSA / SDP model - Software Defined Perimeter / aka 'Black Cloud'  http://en.wikipedia.org/wiki/Software_Defined_Perimeter  

net           DOD / DISA - Defense Information Systems Agency    http://en.wikipedia.org/wiki/Defense_Information_Systems_Agency
net           DOD / GIG - Global Information Grid - an all-encompassing communications project of the United States Department of Defense. http://en.wikipedia.org/wiki/Global_Information_Grid
net          Overlay Network  = formed on top of the underlay in direction to construct a virtualized network.
net          Underlay Network = physical infrastructure above which overlay network is built. It is the underlying network responsible for delivery of packets across networks.
net          NFV / VNF - Virtual Network Functions
net          NFV  - Network Functions Virtualization
net          OSI model - Open Systems Interconnection model - People Don't Need Those Stupid Packets Anyway / Physical, Data link, Network, Transport, Session, Presentation, Application  

net         IETF / RFC - Request for Comments
net         IETF  - Internet Engineering Task Force                  http://www.ietf.org/
net            IDS = Intrusion Detection System / a device, or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system.
net       Edge Network = The network edge, also known as the WAN edge, is where an enterprise network connects to third-party network services
net       VLAN / PVLAN - Private VLAN                    
net       VLAN  - Virtual Local Area Network / 4096 addresses / Most cloud computing today uses SDN for virtualizing networks. (VLANs are often not suitable for cloud deployments since they lack important isolation capabilities for multitenancy.)  http://en.wikipedia.org/wiki/Virtual_LAN
net      IGP / OSPF - Open Shortest Patch First
net      IGP / RIP - Routing Information Protocol
net      IGP  - Interior Gateway Protocol
net         ARP - Address Resolution Protocol
net         DNS - Domain Name Server
net         FTP - File Transfer Protocol
net         MAC - Media Access Control
net         SSL - Secure Sockets Layer
net         SSL - Secure Sockets Layer (used for encrypting traffic between web servers and browsers)
net         TCP - Transmission Control Protocol
net         TLS - Transport Layer Security (used for encrypting traffic between web servers and browsers)
net         XML - eXtensible Mark-up Language
net        CIDR - Classless Inter-Domain Routing {10.0.0.0/16}  http://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing
net     IP - Internet Protocol
net     VLAN = Virtual Local Area Network    
net    VXLAN /  - Virtual eXtensive Local Area Network / 16.7 million addresses
net    VXLAN / VNI - VXLAN Network Identifier
net    VXLAN / VTEP - VXLAN Tunnel End Point
net   Router /   Fair Queuing = a family of scheduling algorithms used in some process and network schedulers.
net   Router /     CBQ - Class-Based Queuing / queuing discipline for the network scheduler that allows traffic to share bandwidth equally, after being grouped by classes.
net   Router /     HTB - Hierarchical Token Bucket / a faster replacement for the class-based queuing discipline in Linux. It is useful to limit a client's download/upload rate so that the limited client cannot saturate the total bandwidth.
sec  Identity-as-a-service /   PAP-as-a-service - Policy Access Points
sec  Identity-as-a-service /   PDP-as-a-service - Policy Decision Points
sec  Identity-as-a-service /   PEP-as-a-service - Policy Enforcement Points
sec  Identity-as-a-service   - a generic term that covers one or many of the services that may comprise an identity ecosystem.
sec        AAA Vulnerabilities = Authentication, Authorization, and Accounting
sec        AAA   - Authenticate, Authorize, and Audit
sec          CVE - Common Vulnerabilities and Exposures   http://cve.mitre.org
sec          DLP - Data Loss Prevention    
sec          HSM - Hardware Security Module - is a physical computing device that safeguards and manages digital keys
sec     Threat Modeling = a process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified, enumerated, and mitigations can be prioritized.
sec aaS       IDaaS - IDentity As A Service                http://www.webopedia.com/TERM/I/iam-identity-and-access-management.html
sec keys          Virtual appliance/software = Deploy a virtual appliance or software-based key manager in the cloud.
sec keys   Cloud provider service = This is a key management service offered by the cloud provider.
sec keys        HSM - Hardware Security Module (appliance-based key manager) / typically need to be on-premises, and deliver the keys to the cloud over a dedicated connection.
sec keys     =   Standards exist to help establish good security and the proper use of encryption and key management techniques and processes.
sec keys     =  Specifically, NIST SP-800-57 and ANSI X9.69 and X9.73.
sec keys    Hybrid  = HSM as the root of trust for keys but then delivering application-specific keys to a virtual appliance that's located in the cloud.
sec login      Federated Identity  - the means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems.  


sec login      Federated Identity /   SSO - Single Sign-On (Federation) / a user's single authentication ticket, or token, is trusted across multiple IT systems or even organizations.
sec login      Federated Identity /  FIdM - Federated identity management amounts to having a common set of policies, practices and protocols in place to manage the identity and trust into IT users and devices across organizations.
sec login      Federated Identity /  SOA - Service-Oriented Architecture
sec login        FIDO / U2F - Universal 2nd Factor (uses specialized USB or near-field communication [NFC])         http://en.wikipedia.org/wiki/Universal_2nd_Factor
sec login        FIDO  - Fast IDentity Online   http://en.wikipedia.org/wiki/FIDO_Alliance
sec login        OTP / TOTP - Time-based One-Time Password                http://en.wikipedia.org/wiki/Time-based_One-time_Password_algorithm
sec login        OTP  - One-Time Password
sec login        RP/SP / IdP - Identity Provider
sec login        RP/SP / IP - Identity Provider
sec login        RP/SP  - Relying Party / Service Provider
sec login    OpenID / OIDC  - OpenID Connect
sec login    OpenID  - Open standard and decentralized authentication protocol for Federated Authentication            http://en.wikipedia.org/wiki/OpenID
sec login     IETF /   SCIM - System for Cross-domain Identity Management aka 'Simple Cloud Identity Management' / is a standard for automating the exchange of user identity information between identity domains, or IT systems.
sec login         AD - Active Directory
sec login        PII - Personally Identifiable Information               http://www.vcsolutions.com/blog/what-is-pii/
sec login       ADFS - Active Directory Federation Service
sec login       IAM  - Identity and Access Management (aka IdM - Identity Management)
sec login       IdEA - Identity, Entitlement, and Access (aka IAM)
sec login       LDAP - Lightweight Directory Access Protocol
sec login       SAML - Security Assertion Markup Language (Federation)            http://en.wikipedia.org/wiki/Security_Assertion_Markup_Language
sec login MFA    - Multi-Factor Authentication
sec login MFA / Biometrics  - For cloud services, the biometric is a local protection that doesn't send biometric information to the cloud provider and is instead an attribute that can be sent to the provider. As such the security and ownership of the local device needs to be considered.
sec login MFA / Hard tokens  - are physical devices that generate one time passwords for human entry or need to be plugged into a reader. These are the best option when the highest level of security is required.
sec login MFA / Out-of-band Passwords - are text or other messages sent to a user's phone (usually) and are then entered like any other one time password generated by a token. Although also a good option, any threat model must consider message interception, especially with SMS.
sec login MFA / Soft tokens  - work similarly to hard tokens but are software applications that run on a phone or computer. Soft tokens are also an excellent option but could be compromised if the user's device is compromised, and this risk needs to be considered in any threat model.
sec saas        WAF - Web Application Firewall     (layer 7, does NOT offer DDoS, can be cloud or on premise)
sec saas        WSG - Web Security Gateway
sec saas       CASB - Cloud Access Security Brokers  (aka Cloud Security Gateways)          http://en.wikipedia.org/wiki/Cloud_access_security_broker
sec saas   DDoS / EDOS - Economic Denial of Service - The destruction of economic resources; the worst case scenario would be bankruptcy of the customer or a serious economic impact .
sec saas   DDoS  - Distributed Denial of Service protection service
sec test       DAST - Dynamic Application Security Testing (aka "black box" testing)
sec test       IAST - Interactive Application Security Testing    (designed to address the shortcomings of SAST and DAST)
sec test       RASP - Run-time Application Security Protection             http://www.softwaresecured.com/what-do-sast-dast-iast-and-rasp-mean-to-developers
sec test       SAST - Static Application Security Testing
sec vm         hypervisor - 'guest-hopping attacks', SQL injection attacks exposing multiple customers' data stored in the same table, and side channel attacks.
sec vm         hypervisor - 'guest to host escape', an example of which is 'Cloudburst', a VMware vulnerability recently discovered
sec     Incident Response Lifecycle  
sec          Defense in Depth = a concept used in Information security in which multiple layers of security controls (defense) are placed throughout an information technology (IT) system.
sec          CIA Triad - Confidentiality, Integrity, and Availability of information security (infosec)
sec          EPP  - EndPoint Protection / Examines files as they enter the network. ex: VMware Carbon Black Cloud  http://en.wikipedia.org/wiki/Endpoint_security
sec          IDS / IPS - Intrusion Detection System / Intrusion Prevention System
sec          WAF  - Web Application Firewall
sec         RND /  RNG - Random Number Generator
sec         RND / HRNG - Hardware Random Number Generator
sec         RND / tRNG - True Random Number Generator
sec         SIEM / SEM - Security Event Management
sec         SIEM / SIM - Security Information Management              http://en.wikipedia.org/wiki/Security_information_and_event_management
sec         SIEM \    IDS = Intrusion Detection System / a device, or software application that monitors a network or systems for malicious activity (Anomaly Detection) or policy violations. Any intrusion activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system.
sec         SIEM  - Security Information and Event Management  /  I also don't think it's a secret to say that SIEM experts are very expensive, and there is a very limited pool of talent available.
sec     Vulnerability  = Any circumstance or event with the potential to adversely impact an asset through unauthorized access, destruction, disclosure, modification of data, and/or denial of service
sec          VA - Vulnerability Assessment
sec         ACL - Access Control List
sec         CIA - Confidentiality, Integrity, and Availability (guide policies)
sec         DAM - Digital Asset Management system    (duplicate acronym: Database Activity Monitoring)
sec         DLP - Data Loss Prevention
sec         ERM - Enterprise Risk Management
sec         FPE - Format Preserving Encryption
sec         IRM - Integrated Risk Management
sec         PDP - Policy Decision Point                http://www.identropy.com/blog/iam-blog/bid/77844/commonly-used-acronyms-in-identity-and-access-management
sec         PEP - Policy Enforcement Point
sec        ABAC - Attribute-Based Access Control  (better in cloud than RBAC)
sec        CASB - Cloud Access Security Broker - software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure
sec        CBAC - Microsoft's standard, the idea is still Attributes informing the Access         http://dzone.com/articles/acl-rbac-abac-pbac-radac-and-a-dash-of-cbac
sec        RBAC - Role-Based Access Control  (ABAC is better in cloud)
sec        SCIM - System for Cross-domain Identity Management
sec      RAdAC  - Risk Adaptive-Based Access Control
sec     STRIDE  - Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, Elevation of privilege
sec   IETF /   OAuth  - OAuth is a service that is complementary to and distinct from OpenID           http://en.wikipedia.org/wiki/OAuth
sec   XACML /     PAP  - Policy Administration Point - Point which manages access authorization policies
sec   XACML /     PDP  - Policy Decision Point  Point which evaluates access requests against authorization policies before issuing access decisions
sec   XACML /     PEP  - Policy Enforcement Point  Point which intercepts user's access request to a resource, makes a decision request to the PDP to obtain the access decision (i.e. access to the resource is approved or rejected), and acts on the received decision
sec   XACML /     PIP  - Policy Information Point  The system entity that acts as a source of attribute values (i.e. a resource, subject, environment)
sec   XACML /     PRP  - Policy Retrieval Point  Point where the XACML access authorization policies are stored, typically a database or the filesystem.
sec   XACML   - eXtensible Access Control Markup Language  (rarely provided by CSP)    http://en.wikipedia.org/wiki/XACML
sec  SANS Institute /      ISC - Internet Storm Center / monitors the level of malicious activity on the Internet, particularly with regard to large-scale infrastructure events.  http://isc.sans.edu
sec  SANS Institute / SANS Checklist = security checklist
sec  SANS Institute   = (officially the Escal Institute of Advanced Technologies) a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training, and selling certificates.
soft        SafeCODE = Software Assurance Forum for Excellence in Code / std
soft        SANS Checklist = security checklist
soft management        IRP - Incidence Response Plan / should be performed annually or when significant changes are made.
soft management      TOGAF - The Open Group Architecture Framework  (Enterprise Architecture)          http://www.opengroup.org/togaf
soft management     DevOps - Development and Operations / Remember that DevOps is a culture, not a tool or technology (although a continuous integration service is a key component of the CI/CD pipeline that will be leveraged by DevOps).
soft management     DevOps = Rugged DevOps OR SecDevOps (also known as DevSecOps and DevOpsSec) is the process of integrating secure development best practices and methodologies into development and deployment processes which DevOps makes possible
soft management     DevOps = Rugged DevOps = an approach to software development that places a priority on ensuring that code is secure at all stages of the software development lifecycle.   http://whatis.techtarget.com/definition/rugged-DevOps
soft management   ITIL / CI - Configuration Item
soft management   ITIL / Event = a "change of state" that has significance for the management of an IT service or other configuration item (CI)
soft management   ITIL / Incident = an unplanned interruption to an IT service, or a reduction in the quality of service.
soft management   ITIL  - Information Technology Infrastructure Library (Service Management)
soft management  Aplication Stack Map = can be implemented to understand where data is going to reside.
soft management  CSIRTs   - Computer Security Incident Response Teams
soft management  IR / lifecycle 4 phases = preparation; detection and analysis; containment, eradication, and recovery; and post-incident activity.
soft management  IR   - Incidence Response / SLAs and setting expectations around what the customer does versus what the provider does are the most important aspects of incident response for cloud-based resources.
soft         Chaos Engineering = Chaos engineering is a technique to make software resilient.   http://en.wikipedia.org/wiki/Chaos_engineering
soft       API / REST / GET   = gets the file.
soft       API / REST / PATCH = update, but not replace, a file.
soft       API / REST / POST  = similar to PATCH, but a POST will update and delete the file.
soft       API / REST / PUT   = new file.
soft       API / REST  - REpresentational State Transfer  (stateless, architectural pattern, JSON)        http://www.guru99.com/comparison-between-web-services.html
soft       API   - Application Programming Interface - specification of interface published by software supplier
soft         API / SOAP - Simple Object Access Protocol  (protocol)
soft         IDE - Integrated Development Environment
soft         SDK - Software Sevelopment Kit / a collection of software development tools in one installable package. They ease creation of applications by having compiler, debugger and perhaps a software framework.
soft        CMCA - Continuous Monitoring, Continuous Auditing
soft        COTS - Commercial Off-The Shelf
soft        FOSS - Free Open Source Software
soft     BSIMM  - Building Security In Maturity Model                http://www.bsimm.com/about/faq.html
soft     CI/CD  - Continuous Integration (Jenkins server) and Continuous Delivery (or Continuous Deployment)  
soft     OWASP  - Open Web Application Security Project    
soft     PDCA  = Plan-Do-Check-Act / std     (or Plan-Do-Check-Adjust, OPDCA - Observe PDCA) the Deming circle/cycle/wheel http://en.wikipedia.org/wiki/PDCA
soft     SDLC  - Software Development LifeCycle    
soft     SSDLC  - Secure Software Development LifeCycle / ex: Microsoft's Security Development Lifecycle
std ENISA \ Asset    = The target of protection in a security analysis
std ENISA \ Availability   = The proportion of time for which a system can perform its function
std ENISA \ BS     - British Standard
std ENISA \ CA     - Certification Authority
std ENISA \ CC     - Common Criteria
std ENISA \ Co-residence   = Sharing of hardware or software resources by cloud customers
std ENISA \ Confidentiality   = Ensuring that information is accessible only to those authorized to have access (ISO 17799)
std ENISA \ CP     - Cloud Provider
std ENISA \ CRL     - Certificate Revocation List
std ENISA \ CRM     - Customer Relationship Management
std ENISA \ Data Controller   = The natural or legal person, public authority, agency or any other body which alone or jointly with others determines the purposes and means of the processing of personal data; where the purposes and means of processing are determined by national or Community laws or regulations, the controller or the specific criteria
std ENISA \ Data Processor   = A natural or legal person, public authority, agency or any other body which processes personal data on behalf of the controller.
std ENISA \ Data Subject   = Identified or identifiable natural person (see EU Directive 95/46/EC) from whom data is collected and/or about whom that data is processed
std ENISA \ De-provision   = The process of enforcing the removal of a resource from use, or disallowing its use by a set of users
std ENISA \ Edge network   = In this context, a network of computers which is able to process and store data for delivery close to the final destination
std ENISA \ EDoS    - Economic denial of service
std ENISA \ Escrow    = The storage of a resource by a third party which has access to that resource when certain well-defined conditions are satisfied
std ENISA \ FIM     - Federated Identity Management
std ENISA \ Guest OS    = An OS under the control of the cloud customer, running in a virtualised environment
std ENISA \ Host OS    = The operating system of the cloud provider which runs multiple guest OSs
std ENISA \ http    - Http connection using TLS or SSL
std ENISA \ Hypervisor    = Computer software or hardware platform virtualization software that allows multiple operating systems to run on a host computer concurrently
std ENISA \ IDS     - Intrusion Detection System
std ENISA \ Integrity    = The property that data has not been maliciously or accidentally altered during storage or transmission
std ENISA \ ISO     - International Organization for Standardization
std ENISA \ LDAP    - Lightweight Directory Access Protocol
std ENISA \ MAC     - Media access control (address of a network node in IP protocol)
std ENISA \ MITM    - Man In The Middle (a form of attack)
std ENISA \ MSS     - Managed Security Services
std ENISA \ NIS     - Network and Information Security
std ENISA \ NIST    - National Institute of Standards and Technology (US)
std ENISA \ Non-repudiation   = The property whereby a party in a dispute cannot repudiate or refute the validity of a statement or contract
std ENISA \ OCSP    - Online Certificate Status Protocol
std ENISA \ OS     - Operating system
std ENISA \ OTP     - One-Time Password (type of authentication token)
std ENISA \ OVF     - Open Virtualisation Format
std ENISA \ Perimeterisation   = The control of access to an asset or group of assets
std ENISA \ Port Scan    = Probing a network host to determine which ports are open and what services they offer
std ENISA \ Protection Profile   = A document specifying security evaluation criteria to substantiate vendors' claims of a given family of information system products (a term used in Common Criteria)
std ENISA \ Provision    = The issuing of a resource
std ENISA \ PV LAN    - Private VLAN
std ENISA \ Resilience    = The ability of a system to provide and maintain an acceptable level of service in the face of faults (unintentional, intentional, or naturally caused)
std ENISA \ ROI     - Return On Investment
std ENISA \ ROSI    - Return On Security Investment
std ENISA \ RPO     - Recovery Point Objective
std ENISA \ RTO     - Recovery Time Objective
std ENISA \ RTSM    - Real-Time Security Monitoring
std ENISA \ Security Target   = A document specifying security evaluation criteria to substantiate the vendor's claims for the product's security properties (a term used in Common Criteria)
std ENISA \ Service Engine   = The system responsible for delivering cloud services
std ENISA \ Side channel attack   = Any attack based on information gained from the physical implementation of a system; e.g., timing information, power consumption, electromagnetic leaks or even sound can provide an extra source of information which can be exploited to break the system.
std ENISA \ Subpoena    = In this context, a legal authority to confiscate evidence
std ENISA     - European Union Agency for Cybersecurity
std ETSI     - European Telecommunications Standards Institute
std           SafeCODE - Software Assurance Forum for Excellence in Code
std          CIS  - Center for Internet Security
std          ISO / IEC - International Organization for Standardization / International Electrotechnical Commission
std          PCI / DSS - Payment Card Industry / Data Security Standard
std          PCI  - Payment Card Industry        http://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard
std         CSA /      - Cloud Security Alliance / inaugural Security Guidance for Critical Areas of Focus in Cloud Computing v4
std         CSA /  CCM - Cloud Controls Matrix      (Cloud Entitlement Matrix - who can access what resources)
std         CSA /  SDP - Software-Defined Perimeter
std         CSA / CAIQ - Consensus Assessment Initiative Questionnaire
std         CSA / STAR - Security Trust Assurance and Risk
std        AICPA / SAS 70
std        AICPA / SOC - System and Organization Controls
std        AICPA  - American Institute of Certified Public Accountants        http://en.wikipedia.org/wiki/American_Institute_of_Certified_Public_Accountants
std        NIST /  AES - Advanced Encryption Standard (AES-256)
std        NIST /  ITL - Information Technology Laboratory
std        NIST /  RMF - Risk Management Framework
std        NIST  - National Institute of Standards and Technology
std     ISMS   = Information Security Management System
std     ISO/IEC 15408 /    CC - Common_Criteria / an international standard (ISO/IEC 15408) for computer security certification. It is currently in version 3.1 revision 5.   http://en.wikipedia.org/wiki/Common_Criteria
std     ISO/IEC 27001  = Part of the vendor management process under ISO 27001 is ensuring that you establish an appropriate service level agreement (SLA) protecting all data within your ecosystem.
std     ISO/IEC 27001  = requires the creation of an ISMS
std     ISO/IEC 27001 /  PDCA - Plan-Do-Check-Act - cycle aligning it with quality standards such as ISO 9000.
std        DMTF - Distributed Management Task Force                http://en.wikipedia.org/wiki/Distributed_Management_Task_Force
std      COBIT  - Control OBjectives for Information and related Technology
std      e-GIF  - e-Government Interoperability Framework     http://en.wikipedia.org/wiki/E-GIF
std    FedRAMP  - FEDeral Risk and Authorization Management Program
std    IETF / HSTS - HTTP Strict-Transport-Security   http://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security
std    IETF / IAB - Internet Architecture Board       http://en.wikipedia.org/wiki/Internet_Architecture_Board
std    IETF  - Internet Engineering Task Force       http://en.wikipedia.org/wiki/Internet_Engineering_Task_Force
std    OASIS / OData - Open Data Protocol / Simplifying data sharing across disparate applications in enterprise, Cloud, and mobile devices.
std    OASIS  - Organization for the Advancement of Structured Information Standards   http://en.wikipedia.org/wiki/OASIS_(organization)
std   ISACA / Systrust
std   ISACA   - Information Systems Audit and Control Association http://www.isaca.org
vm     hypervisor / Type 1 = installed directly onto the physical server (such as VMware ESXi, Xen, or KVM).
vm     hypervisor / Type 2 = installed on top of the operating system already running on a server (such as VMware Workstation, VMware Workstation Player, or Oracle VM VirtualBox).
vm     hypervisor  = virtual machine - an abstraction layer that decouples the physical hardware from the guest operating system.
vm      VM test = iofuzz, crashme
vm      VM - Virtual Machine
vm      VMM - Virtual Machine Monitor (hypervisor)      
vm cp      XEN = Open Source Hypervisor    http://en.wikipedia.org/wiki/Xen
vm      HPC - Hosted Private Cloud
vm      KVM - Kernel-based Virtual Machine
vm      OVA - Open Virtual Appliance (tar)
vm      OVF - Open Virtualization Format (portability)                  http://en.wikipedia.org/wiki/Open_Virtualization_Format
vm      VDI - Virtual Desktop Infrastructure
vm      VPC - Virtual Private Cloud
vm      VPD - Virtual Private Desktop
vm      VPN - Virtual Private Network
vm      VPS - Virtual Private Server  


X      LXC - Linux Containers
X      SSH - Secure Shell
X            http://solutionsreview.com/cloud-platforms/glossary/
X            http://whatis.techtarget.com/
X            http://www.allacronyms.com/SOC/computing
X            http://www.cram.com/flashcards/ccsk-3657367  (CCSK v3)
X            http://www.cram.com/search?query=CCSK&submit=Search (CCSK v4 was made available 2017/12/01)
X            http://www.rationalsurvivability.com/blog/2009/06/incomplete-thought-cloudanatomy-infrastructure-metastructure-infostructure/
X            http://www.rationalsurvivability.com/blog/2009/06/incomplete-thought-cloudanatomy-infrastructure-metastructure-infostructure/
X            http://www.secureworldexpo.com/industry-news/67-top-cybersecurity-acronyms
X            http://www.whizlabs.com/certificate-of-cloud-security-knowledge/
x     Jim Reavis Co-founder and Chief Executive Officer, CSA says in Grand Rapids CloudCom 2020-08 video that 10,000 people have the CCSK  http://cloudsecurityalliance.org/education/ccak/
X     LAMP - Linux-Apache-MySQL-PHP
X     TLDR - Too Long; Didn't Read
X     TMI - Too Much Information
X  Building Trust in a Cloudy Sky       http://www.mcafee.com/enterprise/en-us/assets/executive-summaries/es-building-trust-cloudy-sky.pdf
X  CCSK flashcards torrent
Z_EXAM TIP: Anything that you will be tested on as part of your CCSK exam regarding CASB has been covered in this section, but there is much more to know about this technology, which is covered in the backgrounder.
Z_EXAM TIP: Don't get lost in applistructure thoughts when you're considering the cloud bursting example How your web application handles things like state transfer and other application-level issues is out of scope for this discussion. For the exam, just recall the example of having a load balancer that will send incoming traffic to a web server that can be in your data center or a cloud-hosted system, depending on current load.
Z_EXAM TIP: Don't waste your time memorizing all of the controls checked by the CSA tools Download the most recent version of the CCM and the CAIQ, understand the format of each document and its purpose, and have it open when you take your CCSK exam.
Z_EXAM TIP: Earning a CCSK is a great way for auditors to demonstrate their knowledge of cloud services. Remember that customers should work with auditors who have knowledge of the differences between traditional IT and the cloud.
Z_EXAM TIP: For image repository, I'm using the naming used in the CSA Guidance, but you should know about two related concepts-image registries and image repositories. An image registry is used to host and distribute images. An image repository is technically different, because it is defined as a collection of related images. Long story short, this means that an image registry can contain multiple repositories. You'll often see these terms used interchangeably. Your CCSK exam will use the term "image repository."
Z_EXAM TIP: For the exam, remember that compute virtualization abstracts the running of code (including operating systems) from the underlying hardware.
Z_EXAM TIP: For the exam, remember that contracts define the relationship between providers and customers, and they are the primary tool for customers to extend governance to their suppliers.
Z_EXAM TIP: For the exam, remember that the CCM states the control and the responsible party, whereas the CAIQ provides questions you can ask in plain language.
Z_EXAM TIP: For the exam, remember that using an immutable approach enables you to perform the bulk of security tests on the images before they go into production.
Z_EXAM TIP: For your CCSK exam, remember that all components and workloads required of any technology must have secure AAA in place. This remains true when underlying cloud services are consumed to deliver big data analytics for your organization. An example of a cloud-based big data system could consist of processing nodes running in instances that collect data in volume storage.
Z_EXAM TIP: Here's a reminder about the essential characteristics, and it's a big one for your exam. The five characteristics are from NIST (SP800-145). ISO/IEC 17788 calls out multitenancy as an additional essential characteristic. NIST includes multitenancy as part of resource pooling, and CSA states that clouds are multitenant by nature. Just remember that all three organizations see the cloud as a multitenant environment, but only ISO/IEC lists multitenancy separately.
Z_EXAM TIP: Here's the good news for your CCSK exam-you won't be asked about how this is done at the applistructure layer. You will be asked only about the metastructure (or virtual infrastructure) implementation.
Z_EXAM TIP: If you're asked about the difference between software-defined security and event-driven security, remember that software-defined security is a concept, whereas event-driven security puts that concept into action.
Z_EXAM TIP: If you're presented with any questions on OVF on the CCSK exam, remember that portability is the most important element of OVF.
Z_EXAM TIP: If you are asked a question about governance in a private cloud, pay attention to who owns and manages the infrastructure. An outsourced private cloud can incur much more change than insourced.
Z_EXAM TIP: It's important to remember that an IaaS system can be summarized as consisting of facilities (physical data center), hardware (proprietary or standard), abstraction (virtualization), and orchestration (APIs).
Z_EXAM TIP: It's important to remember that whether you are procuring a dedicated "encryption as a service" provider or using customer-managed keys from an IaaS provider, you are procuring a SecaaS.
Z_EXAM TIP: Keep in mind that malicious insiders aren't limited to administrators. A similar risk is posed by auditors, because they may have intimate knowledge of the inside architecture, processes, and weaknesses of a provider.
Z_EXAM TIP: Of the three models, you should get your head around the role of the controller/custodian and remember that jurisdiction is very important to determine applicable laws.
Z_EXAM TIP: Remember for your exam that encryption will often dramatically increase the string of a text, while tokenization and data masking techniques can keep the same length and format of data while rendering it unusable to anyone who may access it.
Z_EXAM TIP: Remember that a major benefit of SecaaS is the ability to enforce your policy using someone else's infrastructure.
Z_EXAM TIP: Remember that audits are a key tool to prove or disprove compliance.
Z_EXAM TIP: Remember that encryption breaks SaaS. This may help you answer multiple questions in your CCSK exam.
Z_EXAM TIP: Remember that immutable deployments and IaC can greatly improve security. You will likely be tested on this.
Z_EXAM TIP: Remember that many states have laws and regulations that require organizations to ensure that service providers provide adequate privacy protections and security measures for personal data.
Z_EXAM TIP: Remember that the CCM is an excellent starting point to build a cloud assessment program based on your existing compliance requirements, but it will need to be tailored to meet your needs.
Z_EXAM TIP: Remember that the FTC has taken the charge from a federal perspective on consumer privacy rights. State attorneys general deal with consumer privacy rights at a state level.
Z_EXAM TIP: Remember that the management plane is part of the metastructure.
Z_EXAM TIP: Remember that the NIS Directive applies to companies outside of the EU/EEA whose services are available in the European Union and that an EU-based representative must be established to ensure NIS Directive compliance.
Z_EXAM TIP: Remember that the STAR Registry contains CAIQ entries that are filled out by vendors and uploaded to the Cloud Security Alliance without any third-party review or assessment.
Z_EXAM TIP: Remember that volatile memory contains all kinds of potentially sensitive information (think unencrypted data, credentials, and so on) and must be protected from unapproved access. Volatile memory must also have strong isolation implemented and maintained by the provider.
Z_EXAM TIP: Remember that you're procuring security software that meets the essential characteristics of the cloud, and you'll be fine.
Z_EXAM TIP: Remember the three components listed here: data gets collected, stored, and processed.
Z_EXAM TIP: Remember these terms for your exam. IAM STANDARDS There are numerous standards in the IAM world that you need to know about. For your CCSK exam, you may be tested on Security Assertion Markup Language (SAML)
Z_EXAM TIP: Seriously, implement least privileges. If you are asked about appropriate permissions, the answer will always be related to the principle of least privilege.
Z_EXAM TIP: The 2018 update to this law is not covered as part of the CSA Guidance and therefore not likely to be part of the CCSK exam. However, from a real-life perspective, if you operate outside of the Chinese market but want to do business in China, it is highly advisable that you discuss both localization and governmental access to data stored in China with your legal counsel.
Z_EXAM TIP: The CCSK exam will likely test you on the shared responsibility between providers and customers. Take note of the following high-level recommendations for providers and customers: First, providers should properly design and implement controls. They should clearly document internal security controls and customer security features so the cloud user can make an informed decision. Second, customers should build a responsibilities matrix to document who is implementing which controls and how. This should be done on a per-workload basis. Selected controls should align with any necessary compliance standards.
Z_EXAM TIP: The concept of periodic monitoring, testing, and evaluation of your requirements and the vendor relationship is applicable for basically every subject in the CSA Guidance.
Z_EXAM TIP: The identity service offered by the provider may be referred to as the "internal" identity system on the exam.
Z_EXAM TIP: The main goal of the data security lifecycle as far as the CCSK exam goes is not to know every possible control to limit every possible action by any possible actor on every possible data set (or the validity of doing so). The goal for the exam is to understand that you have basic functions that map to phases of the data lifecycle. Based on the location of the data or the access device (that's the key for the exam), you may have different data security lifecycles.
Z_EXAM TIP: These additional services and how they can be leveraged are provider-specific, so you won't be tested on them as part of your CCSK exam.
Z_EXAM TIP: Understand these layers of the logical model These layers are key to understanding cloud security responsibility shifts and passing your CCSK exam.
Z_EXAM TIP: You'll be seeing quite a few references to standards by NIST and other organizations in this book. Don't jump away from this book and start studying these documents. The CCSK exam is about cloud security according to the CSA; it's not about NIST standards.
Z_EXAM TIP: You don't need to do a deep dive into the various EU standards, the differences between them, and release dates for the CCSK exam. They're highlighted in this introduction because GDPR is a huge deal these days.
Z_EXAM TIP: You should be aware of a couple of things about the whole STAR program. The CAIQ entries are considered "self assessments." Each self assessment is referred to as a "Level 1" STAR entry.
Z_EXAM TIP: You will likely be tested on your understanding that credentials and encryption in an application are the primary differences between applications that run in a cloud versus those that run a traditional data center.
Z_EXAM TIP: You won't see any general questions in the CCSK exam on either compliance or auditing basics, but do expect to see questions on cloud-specific changes to compliance and audits.