- 
  Encryption and Key 
  Management 
- 
  Hashing 
- 
  Masking 
- 
  Tokenization 
- 
  Data Loss Prevention 
  (DLP) 
- 
  Data 
  Obfuscation 
- 
  Data De-identification (e.g., 
  anonymization) 
- 
  Mapping 
- 
  Labelling 
- 
  Sensitive data (e.g., 
  Protected Health Information (PHI), Personally Identifiable Information (PII), 
  card holder data) 
- 
  Plan and Implement Data 
  Retention, Deletion and Archiving Policies 
- 
  Data Retention 
  Policies 
- 
  Data Deletion Procedures and 
  Mechanisms 
- 
  Data Archiving Procedures and 
  Mechanisms 
- 
  Legal Hold 
- 
  Design and Implement 
  Auditability, Traceability and Accountability of Data Events 
    - 
    Definition of Event Sources 
    and Requirement of Identity Attribution 
- 
    Logging, Storage and 
    Analysis of Data Events 
- 
    Chain of Custody and 
    Non-repudiation 
 
- 
  Comprehend Cloud 
  Infrastructure Components 
- 
  Design a Secure Data 
  Center 
    - 
    Logical Design (e.g., 
    tenant partitioning, access control) 
- 
    Physical Design (e.g. 
    location, buy or build) 
- 
    Environmental Design (e.g., 
    Heating, Ventilation and Air Conditioning (HVAC), multi-vendor pathway 
    connectivity) 
 
- 
  Analyze Risks Associated with 
  Cloud Infrastructure 
- 
  Design and Plan Security 
  Controls 
- 
  Plan Disaster Recovery (DR) 
  and Business Continuity (BC) 
  - 
  Physical 
  Environment 
- 
  Network and 
  Communications 
- 
  Compute 
- 
  Virtualization 
- 
  Storage 
- 
  Management 
  Plane 
- 
  Risk Assessment and 
  Analysis 
- 
  Cloud Vulnerabilities, 
  Threats and Attacks 
- 
  Virtualization 
  Risks 
- 
  Counter-measure 
  Strategies 
- 
  Physical and Environmental 
  Protection (e.g., on-premise) 
- 
  System and Communication 
  Protection 
- 
  Virtualization Systems 
  Protection 
- 
  Identification, 
  Authentication and Authorization in Cloud Infrastructure 
- 
  Audit Mechanisms (e.g., log 
  collection, packet capture) 
- 
  Risks Related to the Cloud 
  Environment 
- 
  Business Requirements (e.g., 
  Recovery Time Objective (RTO), Recovery Point Objective (RPO), Recovery 
  Service Level (RSL)) 
- 
  Business Continuity/Disaster 
  Recovery Strategy 
- 
  Creation, Implementation and 
  Testing of Plan 
  - 
  Advocate Training and 
  Awareness for Application Security 
- 
  Describe the Secure Software 
  Development Life Cycle (SDLC) Process 
    - 
    Business 
    Requirements 
- 
    Phases and 
    Methodologies 
 
- 
  Apply the Secure Software 
  Development Life Cycle (SDLC) 
- 
  Apply Cloud Software 
  Assurance and Validation 
- 
  Use Verified Secure 
  Software 
    - 
    Approved Application 
    Programming Interfaces (API) 
- 
    Supply-chain 
    Management 
- 
    Third Party Software 
    Management 
- 
    Validated Open Source 
    Software 
- 
    Avoid Common 
    Vulnerabilities During Development 
- 
    Cloud-specific 
    Risks 
- 
    Quality 
    Assurance 
- 
    Threat 
    Modelling 
- 
    Software Configuration 
    Management and Versioning 
 
- 
  Comprehend the Specifics of 
  Cloud Application Architecture 
- 
  Supplemental Security 
  components (e.g., Web Application Firewall (WAF), Database Activity 
  Monitoring 
- 
  (DAM), Extensible Markup 
  Language (XML) firewalls, Application Programming Interface (API) 
  gateway) 
- 
  Design Appropriate Identity 
  and Access Management (IAM) Solutions 
- 
  Implement and Build Physical 
  and Logical Infrastructure for Cloud Environment 
    - 
    Hardware Specific Security 
    Configuration Requirements (e.g., Basic Input Output System (BIOS), settings 
    for virtualization and Trusted Platform Module (TPM), storage controllers, 
    network controllers) 
- 
    Installation and 
    Configuration of Virtualization Management Tools 
- 
    Virtual Hardware Specific 
    Security Configuration Requirements (e.g., network, storage, memory, Central 
    Processing Unit (CPU) 
- 
    Installation of Guest 
    Operating System (OS) Virtualization Toolsets 
 
- 
  Operate Physical and Logical 
  Infrastructure for Cloud Environment 
- 
  Manage Physical and Logical 
  Infrastructure for Cloud Environment 
  - 
  Access Controls for Remote 
  Access (e.g., Remote Desktop Protocol (RDP), Secure Terminal Access, Secure 
  Shell (SSH)) 
- 
  Operating System (OS) 
  Baseline Compliance 
- 
  Monitoring and 
  Remediation 
- 
  Patch 
  Management 
- 
  Performance and Capacity 
  Monitoring (e.g., network, compute, storage, response time) 
- 
  Hardware Monitoring (e.g., 
  Disk, Central Processing Unit (CPU), fan speed, temperature) 
- 
  Configuration of Host and 
  Guest Operating System (OS) Backup and Restore Functions 
- 
  Network Security Controls 
  (e.g., firewalls, Intrusion Detection Systems (IDS), Intrusion Prevention 
  Systems (IPS), honeypots, vulnerability assessments, network security 
  groups) 
- 
  Management Plane (e.g., 
  scheduling, orchestration, maintenance) 
- 
  Configure Access Control for 
  Local and Remote Access (e.g., Secure Keyboard Video Mouse (KVM), 
  console-based access mechanisms, Remote Desktop Protocol 
  (RDP)) 
- 
  Secure Network Configuration 
  (e.g., Virtual Local Area Networks (VLAN), Transport Layer Security (TLS), 
  Dynamic Host Configuration Protocol (DHCP), Domain Name System (DNS), Virtual 
  Private Network (VPN)) 
- 
  Operating System (OS) 
  Hardening Through the Application of Baselines (e.g., Windows, Linux, 
  VMware) 
- 
  Availability of Stand-Alone 
  Hosts 
- 
  Availability of Clustered 
  Hosts (e.g., Distributed Resource Scheduling (DRS), Dynamic 
- 
  Optimization (DO), storage 
  clusters, maintenance mode, High Availability) 
- 
  Availability of Guest 
  Operating System (OS) 
- 
  Change 
  Management 
- 
  Continuity 
  Management 
- 
  Information Security 
  Management 
- 
  Continual Service Improvement 
  Management 
- 
  Incident 
  Management 
- 
  Problem 
  Management 
- 
  Release 
  Management 
- 
  Deployment 
  Management 
- 
  Configuration 
  Management 
- 
  Service level 
  Management 
- 
  Availability 
  Management 
- 
  Capacity 
  Management 
- 
  Vendors 
- 
  Customers 
- 
  Partners 
- 
  Regulators 
- 
  Other 
  Stakeholders 
- 
  Implement Operational 
  Controls and Standards (e.g., Information Technology 
- 
  Infrastructure Library 
  (ITIL), International Organization for 
  Standardization/International 
- 
  Electrotechnical Commission 
  (ISO/IEC) 20000-1) 
- 
  Support Digital 
  Forensics 
- 
  Manage Communication with 
  Relevant Parties 
- 
  Manage Security 
  Operations 
    - 
    Security Operations Center 
    (SOC) 
- 
    Monitoring of Security 
    Controls (e.g., firewalls, Intrusion Detection Systems 
    (IDS), 
- 
    Intrusion Prevention 
    Systems (IPS), honeypots, vulnerability assessments, network security 
    groups) 
- 
    Log Capture and Analysis 
    (e.g., Security Information and Event Management (SIEM), log 
    management) 
- 
    Incident 
    Management 
 
- 
  Articulate Legal Requirements 
  and Unique Risks within the Cloud Environment 
- 
  Understand Privacy 
  Issues 
    - 
    Difference Between 
    Contractual and Regulated Private Data (e.g., Protected Health Information 
    (PHI), Personally Identifiable Information (PII)) 
- 
    Country-Specific 
    Legislation Related to Private Data (e.g., Protected Health Information 
    (PHI), Personally Identifiable Information (PII)) 
- 
    Jurisdictional Differences 
    in Data Privacy 
- 
    Standard Privacy 
    Requirements (e.g., International Organization for 
    Standardization/International Electrotechnical Commission (ISO/IEC) 27018, 
    Generally Accepted Privacy Principles (GAPP), General Data Protection 
    Regulation (GDPR)) 
 
- 
  Understand Audit Process, 
  Methodologies, and Required Adaptations for a Cloud 
  Environment 
  - 
  Conflicting International 
  Legislation 
- 
  Evaluation of Legal Risks 
  Specific to Cloud Computing 
- 
  Legal Framework and 
  Guidelines 
- 
  eDiscovery (e.g., 
  International Organization for Standardization/International Electrotechnical 
  Commission (ISO/IEC) 27050, Cloud Security Alliance (CSA) 
  Guidance) 
- 
  Forensics 
  Requirements 
- 
  Internal and External Audit 
  Controls 
- 
  Impact of Audit 
  Requirements 
- 
  Identify Assurance Challenges 
  of Virtualization and Cloud 
- 
  Types of Audit Reports (e.g., 
  Statement on Standards for Attestation Engagements (SSAE), Service 
  Organization Control (SOC), International Standard on Assurance Engagement 
  (ISAE)) 
- 
  Restrictions of Audit Scope 
  Statements (e.g., Statement on Standards for Attestation Engagements (SSAE), 
  International Standard on Assurance Engagements (ISAE)) 
- 
  Gap Analysis 
- 
  Audit 
  Planning 
- 
  Internal Information Security 
  Management System (ISMS) 
- 
  Internal Information Security 
  Controls System 
- 
  Policies (e.g., 
  organizational, functional, cloud computing) 
- 
  Identification and 
  Involvement of Relevant Stakeholders 
- 
  Specialized Compliance 
  Requirements for Highly-Regulated Industries (e.g., North American Electric 
  Reliability Corporation/ Critical Infrastructure Protection (NERC/CIP), Health 
  Insurance Portability and Accountability Act (HIPAA), Payment Card Industry 
  (PCI)) 
- 
  Impact of Distributed 
  Information Technology (IT) Model (e.g., diverse geographical locations and 
  crossing over legal jurisdictions) 
- 
  Understand Implications of 
  Cloud to Enterprise Risk Management 
- 
  Understand Outsourcing and 
  Cloud Contract Design 
    - 
    Business Requirements 
    (e.g., Service Level Agreement (SLA), Master Service Agreement (MSA), 
    Statement of Work (SOW)) 
- 
    Vendor 
    Management 
- 
    Contract Management (e.g., 
    right to audit, metrics, definitions, termination, litigation, assurance, 
    compliance, access to cloud/data, cyber risk insurance) 
- 
    Supply-Chain Management 
    (e.g., International Organization for Standardization/International 
    Electrotechnical Commission (ISO/IEC) 
27036)