{"id":67618,"date":"2018-09-26T09:01:05","date_gmt":"2018-09-26T09:01:05","guid":{"rendered":"https:\/\/www.whizlabs.com\/blog\/?p=67618"},"modified":"2021-02-01T07:29:06","modified_gmt":"2021-02-01T07:29:06","slug":"cloud-security-for-beginners","status":"publish","type":"post","link":"https:\/\/www.whizlabs.com\/blog\/cloud-security-for-beginners\/","title":{"rendered":"Cloud Security: A Complete Guide for Beginners"},"content":{"rendered":"<p class=\"p4\" style=\"text-align: justify;\"><span class=\"s1\">Cloud technology has opened up a whole new era in IT solutions in terms of storage, flexibility, accessibility, and productivity. As the cloud gives the provision of shared resources, it brings along the new overheads of security concerns. Not only sharing features but also its identity management, access control, and privacy are the points of concern. Thus for organizations using cloud computing as well as for the cloud vendors providing services &#8211; cloud security is a high priority.<\/span><\/p>\n<p><a href=\"https:\/\/www.whizlabs.com\/certificate-of-cloud-security-knowledge\/free-test\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"size-full wp-image-67638 aligncenter\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/sites\/2\/2018\/09\/Certificate-of-Cloud-Security-Knowledge-1.jpg\" alt=\"Certificate of Cloud Security Knowledge\" width=\"728\" height=\"90\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/Certificate-of-Cloud-Security-Knowledge-1.jpg 728w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/Certificate-of-Cloud-Security-Knowledge-1-300x37.jpg 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/Certificate-of-Cloud-Security-Knowledge-1-640x79.jpg 640w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/Certificate-of-Cloud-Security-Knowledge-1-681x84.jpg 681w\" sizes=\"(max-width: 728px) 100vw, 728px\" \/><\/a><\/p>\n<p class=\"p6\" style=\"text-align: justify;\"><span class=\"s1\">In this blog, we will cover what is cloud security and the different aspects of cloud security like possible risks,<\/span><span class=\"s2\"> challenges, and solutions. Also, we will have a look over the list of the most in-demand <a href=\"https:\/\/www.whizlabs.com\/blog\/top-cloud-security-certifications\/\" target=\"_blank\" rel=\"noopener\">cloud security certification<\/a>.<\/span><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 ez-toc-wrap-left counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ea7e02;color:#ea7e02\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ea7e02;color:#ea7e02\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.whizlabs.com\/blog\/cloud-security-for-beginners\/#What_is_Cloud_Security\" >What is Cloud Security?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.whizlabs.com\/blog\/cloud-security-for-beginners\/#What_are_the_Various_Cloud_Security_Risks\" >What are the Various Cloud Security Risks?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.whizlabs.com\/blog\/cloud-security-for-beginners\/#What_are_the_Different_Cloud_Security_Solutions_Available\" >What are the Different Cloud Security Solutions Available?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.whizlabs.com\/blog\/cloud-security-for-beginners\/#What_are_the_Benefits_of_Cloud_Security\" >What are the Benefits of Cloud Security?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.whizlabs.com\/blog\/cloud-security-for-beginners\/#Difference_between_Cloud_Security_Solutions_and_Traditional_IT_Solutions\" >Difference between Cloud Security Solutions and Traditional IT Solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.whizlabs.com\/blog\/cloud-security-for-beginners\/#What_are_the_Different_Cloud_Security_Certifications_in_the_IT_Industry\" >What are the Different Cloud Security Certifications in the IT Industry?<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.whizlabs.com\/blog\/cloud-security-for-beginners\/#Vendor-specific\" >Vendor-specific<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.whizlabs.com\/blog\/cloud-security-for-beginners\/#Vendor-neutral\" >Vendor-neutral<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2 class=\"p7\" style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"What_is_Cloud_Security\"><\/span><span class=\"s1\">What is Cloud Security?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"p8\" style=\"text-align: justify;\"><span class=\"s1\">Cloud security is similar to IT security in on-premises data centers. However, it does not need any hardware or maintenance facility. Cloud security solutions are provided using software tools that protect and monitor the information flow in the cloud resources. Hence, there is no need for physical storage devices or servers. Using various security measures, we can prevent data theft, data leakage, and unwanted data deletion.<\/span><\/p>\n<p><span class=\"s1\">In a broad sense, cloud security is a subdomain of information security which comprises the computer and network security. However, it has its own set of policies, controls, and technologies to protect cloud data, applications, and infrastructure.<\/span><\/p>\n<p><img decoding=\"async\" class=\"wp-image-67644 aligncenter\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/sites\/2\/2018\/09\/Cloud-Security-Neede-1.png\" alt=\"Cloud Security Needs Hierarchy\" width=\"600\" height=\"503\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/Cloud-Security-Neede-1.png 940w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/Cloud-Security-Neede-1-300x251.png 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/Cloud-Security-Neede-1-768x644.png 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/Cloud-Security-Neede-1-501x420.png 501w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/Cloud-Security-Neede-1-640x537.png 640w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/Cloud-Security-Neede-1-681x571.png 681w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<h2 class=\"p10\" style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"What_are_the_Various_Cloud_Security_Risks\"><\/span><span class=\"s1\">What are the Various Cloud Security Risks?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"p11\" style=\"text-align: justify;\"><span class=\"s1\">Cloud security challenges may come in different ways. The most vulnerable are as below:<\/span><\/p>\n<h4 class=\"p12\" style=\"text-align: justify;\"><span class=\"s1\">1. Account Hijack<\/span><\/h4>\n<p class=\"p15\" style=\"text-align: justify;\"><span class=\"s1\">Account hijack is a growing threat in the IT industry due to open access to the cloud platform. It has enhanced credential compromise like login details by attackers to make them successful in accessing sensitive user information in the cloud. Moreover, they can manipulate the information using the hijacked credentials. Sometimes hijackers use the cloud for stealing credentials by injecting cross-site scripting bug.<\/span><\/p>\n<h4 class=\"p12\" style=\"text-align: justify;\"><span class=\"s1\">2. Insider Threat<\/span><\/h4>\n<p class=\"p15\" style=\"text-align: justify;\"><span class=\"s1\">Every company maintains some quality control measures in terms of its process, data security, data sharing, and access. When any violation happens to that by the employees, it is called an insider threat. Though it is very unlikely to happen inside an organization, the\u00a0insider threat is a viable security issue in the cloud. In such a scenario, an employee\u00a0can misuse his authorized\u00a0access to access organization\u2019s cloud-based services such as customer accounts, financial information, and other sensitive information.<\/span><\/p>\n<blockquote><p><strong>Also Read:<\/strong> <a href=\"https:\/\/www.whizlabs.com\/blog\/5-best-cloud-certifications-in-2018\/\" target=\"_blank\" rel=\"noopener\">Top 5 Cloud Certifications in 2018<\/a><\/p><\/blockquote>\n<h4 class=\"p12\" style=\"text-align: justify;\"><span class=\"s1\">3. Malware Injection<\/span><\/h4>\n<p class=\"p15\" style=\"text-align: justify;\"><span class=\"s1\">Malware injections are the code or scripts which are used for malicious activities in the cloud. They are embedded into valid instances of cloud services and run as Software as a Service (SaaS) to cloud servers. Once such code or scripts are injected, it starts executing and utilizing it. Attackers can compromise the sensitive information along with stealing data.\u00a0<\/span><\/p>\n<h4 class=\"p12\" style=\"text-align: justify;\"><span class=\"s1\">4. Abuse of Cloud Services<\/span><\/h4>\n<p class=\"p15\" style=\"text-align: justify;\"><span class=\"s1\">As the cloud leverages the extended facility of storage and services, enterprises whether small or large host a vast amount of data in the cloud. However, this storage solution also allows hosting illegal software, and other digital contents. Consequently it sometimes adversely affect the cloud service providers and their clients. In most of the cases, such contents include pirated software, music, videos or books.<\/span><\/p>\n<h4 class=\"p12\" style=\"text-align: justify;\"><span class=\"s1\">5. Insecure APIs<\/span><\/h4>\n<p class=\"p15\" style=\"text-align: justify;\"><span class=\"s1\">Application Programming Interfaces (API) is the means to customize the features of cloud services to enhance user cloud experience. Programmers build their own programs and integrate those applications with cloud services for better performance. However, sometimes these APIs are used for authentication, accessibility and encryption purposes, and that&#8217;s where the vulnerability lies with it. This increases the security risks.<\/span><\/p>\n<h4 class=\"p12\" style=\"text-align: justify;\"><span class=\"s1\">6. Denial of Service Attacks (DoS)<\/span><\/h4>\n<p class=\"p15\" style=\"text-align: justify;\"><span class=\"s1\">Denials of Service (DoS) attacks are the kind of cyber attack that does not target to breach the sensitive information. However, they carry long-term effects like making a website and servers unavailable. In addition to that, sometimes it turns down firewalls to perform malicious activities.<\/span><\/p>\n<h4 class=\"p12\"><span class=\"s1\">7. Data Breaches<\/span><\/h4>\n<p class=\"p13\"><span class=\"s1\">Data breaches are the common problem in IT for years. With the cloud, this problem is more highlighted as the cloud offer open access to data stored online. There are different types of data breaches that happen in cloud platform which is displayed in the below chart.<\/span><\/p>\n<p><img decoding=\"async\" class=\"size-full wp-image-67622 aligncenter\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/sites\/2\/2018\/09\/data-breach.png\" alt=\"Data Breaches\" width=\"536\" height=\"366\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/data-breach.png 536w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/data-breach-300x205.png 300w\" sizes=\"(max-width: 536px) 100vw, 536px\" \/><\/p>\n<p class=\"p15\"><span class=\"s1\">As per the market survey report, data breach occurrence happens 3 times more in the organizations that use cloud than those of the others. This is because of the cloud&#8217;s unique set of characteristics which makes it more vulnerable.<\/span><\/p>\n<p style=\"text-align: justify;\">Are you an AWS Security professional? <a href=\"https:\/\/www.whizlabs.com\/aws-certified-security-specialty\/\" target=\"_blank\" rel=\"noopener\">AWS Security Specialty<\/a> certification recognizes and demonstrates your expertise in AWS Security. Plan now to validate your skills with the <a href=\"https:\/\/www.whizlabs.com\/aws-certified-security-specialty\/\" target=\"_blank\" rel=\"noopener\">AWS Certified Security Speciality<\/a> exam!<\/p>\n<h4 class=\"p12\" style=\"text-align: justify;\"><span class=\"s1\">8. Insufficient Due Diligence<\/span><\/h4>\n<p class=\"p15\" style=\"text-align: justify;\"><span class=\"s1\">Apart from the technical security concern, security issue can arise due to incorrect cloud strategy. This means when an organization is not clear about its policies, organizational goals, and resources, that causes insufficient due diligence which creates the security risk for the company. <\/span><\/p>\n<h4 class=\"p12\" style=\"text-align: justify;\"><span class=\"s1\">9. Shared Vulnerabilities<\/span><\/h4>\n<p class=\"p15\" style=\"text-align: justify;\"><span class=\"s1\">The security of cloud is a shared goal for the provider and the client. Here the partnership is between the client and the provider where the client needs to take preventive measures to protect data. In case this shared responsibility is omitted, there is a high possibility of comprising security. <\/span><\/p>\n<h4 class=\"p12\" style=\"text-align: justify;\"><span class=\"s1\">10. Data Loss<\/span><\/h4>\n<p class=\"p13\" style=\"text-align: justify;\"><span class=\"s1\">Cloud service provider must have a proper data recovery plan. The reason behind is that there is a high chance of data loss on cloud services due to:<\/span><\/p>\n<ul class=\"ul1\" style=\"text-align: justify;\">\n<li class=\"li16\"><span class=\"s4\">Malicious attack<\/span><\/li>\n<li class=\"li16\"><span class=\"s4\">Natural disaster<\/span><\/li>\n<li class=\"li16\"><span class=\"s4\">Data removal by the provider<\/span><\/li>\n<\/ul>\n<p class=\"p13\" style=\"text-align: justify;\"><span class=\"s1\">An organization can lose vital information along with these lost data, and it could badly impact an organization. Hence, verifying the provider&#8217;s data backup policy is an utmost importance as it is related to physical storage, access, and geographical location of the data centers.<\/span><\/p>\n<blockquote>\n<p style=\"text-align: justify;\">Aspired to become an AWS Certified Cloud Security certification? Follow this <a href=\"https:\/\/www.whizlabs.com\/blog\/prepare-aws-certified-security-specialty-exam\/\" target=\"_blank\" rel=\"noopener\">preparation guide for the AWS Certified Security Specialty exam <\/a>and get ahead in your career.<\/p>\n<\/blockquote>\n<h2 class=\"p17\" style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"What_are_the_Different_Cloud_Security_Solutions_Available\"><\/span><span class=\"s1\">What are the Different Cloud Security Solutions Available?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">There are various ways of applying cloud solutions. Some of them are as below:<\/span><\/p>\n<ul class=\"ul1\" style=\"text-align: justify;\">\n<li class=\"li18\"><span class=\"s4\">Firewalls<\/span><\/li>\n<li class=\"li18\"><span class=\"s4\">Penetration testing\u00a0<\/span><\/li>\n<li class=\"li18\"><span class=\"s4\">Tokenization <\/span><\/li>\n<li class=\"li18\"><span class=\"s4\">Virtual private networks (VPN)<\/span><\/li>\n<\/ul>\n<h2 class=\"p20\" style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"What_are_the_Benefits_of_Cloud_Security\"><\/span><span class=\"s1\">What are the Benefits of Cloud Security?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"p18\" style=\"text-align: justify;\"><span class=\"s1\">In a nutshell, cloud security helps to remove all the security concerns we have mentioned in the previous section. However, cloud security, more importantly, helps to recover the below areas of concerns:<\/span><\/p>\n<ul class=\"ul1\" style=\"text-align: justify;\">\n<li class=\"li18\"><span class=\"s1\">Cloud DDoS Protection<\/span><\/li>\n<li class=\"li18\"><span class=\"s1\">High Availability<\/span><\/li>\n<li class=\"li18\"><span class=\"s1\">Data Security<\/span><\/li>\n<li class=\"li18\"><span class=\"s1\">Regulatory Compliance<\/span><\/li>\n<\/ul>\n<h2 class=\"p20\" style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Difference_between_Cloud_Security_Solutions_and_Traditional_IT_Solutions\"><\/span><span class=\"s1\">Difference between C<\/span><span class=\"s4\">loud Security Solutions and Traditional IT Solutions<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Some people may consider cloud security and traditional IT security the same but it&#8217;s not. Cloud security is different from traditional IT security in many aspects. Let&#8217;s understand the difference between cloud security solutions and traditional IT solutions &#8211;<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-67623 aligncenter\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/sites\/2\/2018\/09\/cloud-security-vs-traditional-it-security.png\" alt=\"Cloud Security vs Traditional IT Security\" width=\"586\" height=\"264\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/cloud-security-vs-traditional-it-security.png 586w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/cloud-security-vs-traditional-it-security-300x135.png 300w\" sizes=\"(max-width: 586px) 100vw, 586px\" \/><\/p>\n<h2 class=\"p20\" style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"What_are_the_Different_Cloud_Security_Certifications_in_the_IT_Industry\"><\/span><span class=\"s1\">What are the Different Cloud Security Certifications in the IT Industry?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">As we have discussed the importance of cloud security from an organizational perspective, it is also engaging more and more cloud professionals to pursue cloud security certifications to make them credible for the role. However, these cloud security certifications are not easy to pass without proper cloud security training. Moreover, there are numerous certifications available in the industry. Here we have highlighted the most prominent ones.<\/span><\/p>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">We can categorize cloud security certifications as follows:<\/span><\/p>\n<ul class=\"ul1\" style=\"text-align: justify;\">\n<li class=\"li18\"><span class=\"s4\"><i>Vendor specific<\/i><\/span><\/li>\n<li class=\"li18\"><span class=\"s4\"><i>Vendor-neutral<\/i><\/span><\/li>\n<\/ul>\n<h3 class=\"p1\" style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Vendor-specific\"><\/span><span class=\"s1\">Vendor-specific<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4 class=\"p1\" style=\"text-align: justify;\">1. AWS Certified Security \u2013Specialty<\/h4>\n<ul class=\"ul1\" style=\"text-align: justify;\">\n<li class=\"li30\"><span class=\"s4\">Format: Multiple choices, multiple answers<\/span><\/li>\n<li class=\"li30\"><span class=\"s4\">Length:\u00a0170 minutes, 65 questions<\/span><\/li>\n<li class=\"li30\"><span class=\"s4\">Languages:\u00a0English, Japanese, Korean, Simplified Chinese<\/span><\/li>\n<li class=\"li31\"><span class=\"s4\">Registration Fee:\u00a0300 USD<\/span><\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.whizlabs.com\/aws-certified-security-specialty\/free-test\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"aligncenter wp-image-67628 size-full\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/sites\/2\/2018\/09\/AWS-Certified-Security-Specialty-Free-Test.jpg\" alt=\"AWS Certified Security Specialty Free Test\" width=\"728\" height=\"90\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/AWS-Certified-Security-Specialty-Free-Test.jpg 728w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/AWS-Certified-Security-Specialty-Free-Test-300x37.jpg 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/AWS-Certified-Security-Specialty-Free-Test-640x79.jpg 640w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/AWS-Certified-Security-Specialty-Free-Test-681x84.jpg 681w\" sizes=\"(max-width: 728px) 100vw, 728px\" \/><\/a><\/p>\n<h4>2. Cisco Certified Network Associate Cloud<\/h4>\n<ul class=\"ul1\" style=\"text-align: justify;\">\n<li class=\"li18\"><span class=\"s4\">Certification level: Foundational<\/span><\/li>\n<li class=\"li18\"><span class=\"s4\">Certification type: Vendor-specific<\/span><\/li>\n<\/ul>\n<h3 class=\"p1\" style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Vendor-neutral\"><\/span><span class=\"s1\">Vendor-neutral<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4 class=\"p1\" style=\"text-align: justify;\"><span class=\"s4\">1. Certificate of Cloud Security Knowledge (<a href=\"https:\/\/www.whizlabs.com\/blog\/certificate-of-cloud-security-knowledge-preparation\/\" target=\"_blank\" rel=\"noopener\">CCSK Certification<\/a>)<\/span><\/h4>\n<ul class=\"ul1\" style=\"text-align: justify;\">\n<li class=\"li33\"><span class=\"s4\">Provider<b>:<\/b>\u00a0Cloud Security Alliance<\/span><\/li>\n<li class=\"li34\"><span class=\"s4\">Exam pattern:<\/span><\/li>\n<\/ul>\n<ul class=\"ul1\" style=\"text-align: justify;\">\n<li class=\"li34\"><span class=\"s4\">No of questions:60<\/span><\/li>\n<li class=\"li34\"><span class=\"s4\">Allocated time:90 minutes<\/span><\/li>\n<li class=\"li34\"><span class=\"s4\">Questions types: Multiple choices<\/span><\/li>\n<\/ul>\n<ul class=\"ul1\" style=\"text-align: justify;\">\n<li class=\"li35\"><span class=\"s13\">Cost<\/span><span class=\"s4\"><b>:<\/b>\u00a0345 USD<\/span><b><\/b><\/li>\n<\/ul>\n<blockquote>\n<p style=\"text-align: justify;\">Preparing for the Certificate of Cloud Security Knowledge (CCSK) exam? Here is the comprehensive <a href=\"https:\/\/www.whizlabs.com\/blog\/certificate-of-cloud-security-knowledge-preparation\/\" target=\"_blank\" rel=\"noopener\">preparation guide for Certificate of Cloud Security Knowledge (CCSK) exam<\/a>.<\/p>\n<\/blockquote>\n<h4><span class=\"s4\">2. Certified Cloud Security Professional<\/span><\/h4>\n<ul class=\"ul1\" style=\"text-align: justify;\">\n<li class=\"li36\"><span class=\"s13\">Provider<b>:<\/b><\/span><span class=\"s4\">\u00a0Cloud Security Alliance and (ISC)<\/span><span class=\"s14\"><sup> 2<\/sup><\/span><\/li>\n<li class=\"li37\"><span class=\"s4\">Exam pattern:<\/span><\/li>\n<\/ul>\n<ul class=\"ul1\" style=\"text-align: justify;\">\n<li class=\"li37\"><span class=\"s4\">No of questions:125<\/span><\/li>\n<li class=\"li37\"><span class=\"s4\">Allocated time:4 hours<\/span><\/li>\n<li class=\"li37\"><span class=\"s4\">A passing score is 700 out of 1000 points<\/span><\/li>\n<li class=\"li37\"><span class=\"s4\">Questions types: Multiple choices<\/span><\/li>\n<\/ul>\n<ul class=\"ul1\" style=\"text-align: justify;\">\n<li class=\"li35\"><span class=\"s13\">Cost<\/span><span class=\"s4\"><b>:<\/b>\u00a0549 USD<\/span><b><\/b><\/li>\n<\/ul>\n<h4><span class=\"s4\">3. Certified Cloud Security Specialist (CCSS)<\/span><\/h4>\n<ul class=\"ul1\" style=\"text-align: justify;\">\n<li class=\"li36\"><span class=\"s4\">Provider<b>: <\/b>Global Science and Technology Forum (GSTF)<\/span><\/li>\n<li class=\"li37\"><span class=\"s4\">Exam pattern:<\/span><\/li>\n<\/ul>\n<p class=\"p38\" style=\"text-align: justify;\"><strong><span class=\"s1\">Component 1: Written Examination (MCQ)<\/span><\/strong><\/p>\n<ul class=\"ul1\" style=\"text-align: justify;\">\n<li class=\"li37\"><span class=\"s4\">No of Questions: 30 Questions<\/span><\/li>\n<li class=\"li37\"><span class=\"s4\">Allocated time:45 Minutes<\/span><\/li>\n<li class=\"li37\"><span class=\"s4\">Pattern: Closed Book and multiple choice<\/span><\/li>\n<li class=\"li37\"><span class=\"s4\">Passing score: 65%<\/span><\/li>\n<\/ul>\n<p class=\"p39\" style=\"text-align: justify;\"><strong><span class=\"s1\">Component 2: Written Examination (MCQ)<\/span><\/strong><\/p>\n<ul class=\"ul1\" style=\"text-align: justify;\">\n<li class=\"li37\"><span class=\"s4\">Project Work Component (PWC)<\/span><\/li>\n<li class=\"li37\"><span class=\"s4\">Individual project<\/span><\/li>\n<li class=\"li37\"><span class=\"s4\">Allocated time:2 weeks from course completion date<\/span><\/li>\n<li class=\"li37\"><span class=\"s4\">Passing score: 65%<\/span><\/li>\n<\/ul>\n<p class=\"p40\" style=\"text-align: justify;\"><span class=\"s1\"><b><span class=\"Apple-converted-space\">\u00a0\u00a0 \u00a0 <\/span><\/b>Cost<\/span><span class=\"s17\"><b>:<\/b>\u00a0<\/span><span class=\"s1\">Not mentioned by the provider<\/span><\/p>\n<h4 class=\"p40\" style=\"text-align: justify;\">4. Professional Cloud Security Manager<\/h4>\n<ul class=\"ul1\" style=\"text-align: justify;\">\n<li class=\"li36\"><span class=\"s4\">Provider<b>:\u00a0<\/b>Cloud Credential Council<\/span><\/li>\n<li class=\"li37\"><span class=\"s4\">Exam pattern:<\/span><\/li>\n<\/ul>\n<ul class=\"ul1\" style=\"text-align: justify;\">\n<li class=\"li37\"><span class=\"s4\">No of Questions: 40 Questions<\/span><\/li>\n<li class=\"li37\"><span class=\"s4\">Allocated time:60 Minutes<\/span><\/li>\n<li class=\"li37\"><span class=\"s4\">Pattern: Multiple choices<\/span><\/li>\n<\/ul>\n<ul class=\"ul1\" style=\"text-align: justify;\">\n<li class=\"li36\"><span class=\"s4\">Cost<b>:<\/b>\u00a0305 USD<\/span><b><\/b><\/li>\n<\/ul>\n<h4><span class=\"s4\">5. Certified Integrator Secure Cloud Services<\/span><\/h4>\n<ul class=\"ul1\" style=\"text-align: justify;\">\n<li class=\"li36\"><span class=\"s4\">Provider:\u00a0EXIN<\/span><\/li>\n<li class=\"li37\"><span class=\"s4\">Exam pattern:<\/span><\/li>\n<\/ul>\n<ul class=\"ul1\" style=\"text-align: justify;\">\n<li class=\"li37\"><span class=\"s4\">No of Questions: 40 Questions<\/span><\/li>\n<li class=\"li37\"><span class=\"s4\">Allocated time:60 Minutes<\/span><\/li>\n<li class=\"li37\"><span class=\"s4\">Pattern: Multiple choices<\/span><\/li>\n<\/ul>\n<ul class=\"ul1\" style=\"text-align: justify;\">\n<li class=\"li36\"><span class=\"s13\">Cost<\/span><span class=\"s4\">:\u00a0Free <\/span><\/li>\n<\/ul>\n<h4>Summing Up<\/h4>\n<p class=\"p43\" style=\"text-align: justify;\"><span class=\"s1\">To conclude, becoming a cloud practitioner needs your knowledge of the domain as a whole. This includes cloud security as well. Hence, every employer looks for the cloud professional who has the breadth of knowledge on cloud security features and hands-on expertise on implementing them.<\/span><\/p>\n<p class=\"p44\" style=\"text-align: justify;\"><span class=\"s1\">Keeping this in mind, Whizlabs as a pioneer of IT certifications training provider has introduced the practice test series for <a href=\"https:\/\/www.whizlabs.com\/aws-certified-security-specialty\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s18\">AWS Certified Security Specialty\u00a0<\/span><\/a>and <a href=\"https:\/\/www.whizlabs.com\/certificate-of-cloud-security-knowledge\/practice-tests\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s18\">Certificate of Cloud Security Knowledge (CCSK v.4)<\/span><\/a>. These are the two most demanded cloud security examinations in the IT industry, and the combination of the both makes a cloud professional a strong weapon against possible IT threats in a cloud environment.<\/span><\/p>\n<p class=\"p45\" style=\"text-align: justify;\"><span class=\"s1\"><i>Hence, join us today and build a valuable future for tomorrow.<\/i><\/span><\/p>\n<p><em>Have any query regarding Cloud or its Security? Just write below in the comment section or contact us at <a href=\"https:\/\/help.whizlabs.com\/hc\/en-us\/requests\/new\" target=\"_blank\" rel=\"noopener\">Whizlabs Helpdesk<\/a> and we&#8217;ll respond to you in no time.\u00a0<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cloud technology has opened up a whole new era in IT solutions in terms of storage, flexibility, accessibility, and productivity. As the cloud gives the provision of shared resources, it brings along the new overheads of security concerns. Not only sharing features but also its identity management, access control, and privacy are the points of concern. Thus for organizations using cloud computing as well as for the cloud vendors providing services &#8211; cloud security is a high priority. In this blog, we will cover what is cloud security and the different aspects of cloud security like possible risks, challenges, and [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":67633,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[10],"tags":[621,623,627,628,629],"class_list":["post-67618","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-computing-certifications","tag-cloud-security-certifications","tag-cloud-security-challenges","tag-cloud-security-risks","tag-cloud-security-solutions","tag-cloud-security-training"],"uagb_featured_image_src":{"full":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/Beginners-Guide-to-Cloud-Security-01.jpg",600,315,false],"thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/Beginners-Guide-to-Cloud-Security-01-150x150.jpg",150,150,true],"medium":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/Beginners-Guide-to-Cloud-Security-01-300x158.jpg",300,158,true],"medium_large":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/Beginners-Guide-to-Cloud-Security-01.jpg",600,315,false],"large":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/Beginners-Guide-to-Cloud-Security-01.jpg",600,315,false],"1536x1536":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/Beginners-Guide-to-Cloud-Security-01.jpg",600,315,false],"2048x2048":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/Beginners-Guide-to-Cloud-Security-01.jpg",600,315,false],"profile_24":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/Beginners-Guide-to-Cloud-Security-01.jpg",24,13,false],"profile_48":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/Beginners-Guide-to-Cloud-Security-01.jpg",48,25,false],"profile_96":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/Beginners-Guide-to-Cloud-Security-01.jpg",96,50,false],"profile_150":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/Beginners-Guide-to-Cloud-Security-01.jpg",150,79,false],"profile_300":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/Beginners-Guide-to-Cloud-Security-01.jpg",300,158,false],"tptn_thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/Beginners-Guide-to-Cloud-Security-01-250x250.jpg",250,250,true],"web-stories-poster-portrait":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/Beginners-Guide-to-Cloud-Security-01.jpg",600,315,false],"web-stories-publisher-logo":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/Beginners-Guide-to-Cloud-Security-01.jpg",96,50,false],"web-stories-thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2018\/09\/Beginners-Guide-to-Cloud-Security-01.jpg",150,79,false]},"uagb_author_info":{"display_name":"Pavan Gumaste","author_link":"https:\/\/www.whizlabs.com\/blog\/author\/pavan\/"},"uagb_comment_info":9,"uagb_excerpt":"Cloud technology has opened up a whole new era in IT solutions in terms of storage, flexibility, accessibility, and productivity. As the cloud gives the provision of shared resources, it brings along the new overheads of security concerns. Not only sharing features but also its identity management, access control, and privacy are the points of&hellip;","_links":{"self":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/67618","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/comments?post=67618"}],"version-history":[{"count":7,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/67618\/revisions"}],"predecessor-version":[{"id":77534,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/67618\/revisions\/77534"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media\/67633"}],"wp:attachment":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media?parent=67618"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/categories?post=67618"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/tags?post=67618"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}