Useful Links
Computer Science
Cloud Computing
Cloud Security
1. Foundations of Cloud Security
2. Cloud Governance and Risk Management
3. Identity and Access Management (IAM)
4. Infrastructure Security
5. Data Protection and Encryption
6. Application Security
7. Security Operations and Monitoring
8. DevSecOps and Automation
9. Emerging Technologies and Advanced Topics
Cloud Governance and Risk Management
Cloud Governance Frameworks
Governance Principles
Cloud Security Alliance (CSA) Framework
Cloud Controls Matrix (CCM)
Consensus Assessments Initiative Questionnaire (CAIQ)
NIST Cloud Computing Framework
NIST SP 800-144
NIST SP 800-146
ISO/IEC 27017
Cloud-Specific Controls
Implementation Guidelines
Center for Internet Security (CIS) Controls
Critical Security Controls
Cloud Implementation Guidance
Risk Assessment and Management
Cloud Risk Identification
Technical Risks
Operational Risks
Legal and Regulatory Risks
Risk Analysis Methodologies
Qualitative Risk Assessment
Quantitative Risk Assessment
Risk Matrices and Scoring
Risk Treatment Strategies
Risk Acceptance
Risk Mitigation
Risk Transfer
Risk Avoidance
Vendor Risk Management
Due Diligence Processes
Third-Party Assessments
Contract Security Requirements
Ongoing Vendor Monitoring
Compliance and Regulatory Requirements
Regulatory Landscape Overview
Data Protection Regulations
General Data Protection Regulation (GDPR)
California Consumer Privacy Act (CCPA)
Personal Information Protection and Electronic Documents Act (PIPEDA)
Industry-Specific Regulations
Health Insurance Portability and Accountability Act (HIPAA)
Payment Card Industry Data Security Standard (PCI DSS)
Sarbanes-Oxley Act (SOX)
Federal Information Security Management Act (FISMA)
International Standards
ISO/IEC 27001
ISO/IEC 27002
ISO/IEC 27018
Compliance Frameworks
Service Organization Control (SOC) Reports
Cloud Security Alliance STAR
FedRAMP Authorization
Audit and Assessment
Cloud Audit Planning
Audit Scope Definition
Evidence Collection Methods
Continuous Monitoring
Compliance Reporting
Gap Analysis and Remediation
Previous
1. Foundations of Cloud Security
Go to top
Next
3. Identity and Access Management (IAM)