CCSP最全思维导图
2024-12-25 15:09:19 0 举报
AI智能生成
云端安全与新兴科技是现今信息安全趋势之一, ISC2 CCSP 是非特定厂商且权威、内容知识丰富的云端信息安全管理认证!能够让云端安全从业者学习到许多实用知识。
作者其他创作
大纲/内容
D1 云概念、架构和设计<br>Cloud Concepts, Architecture and Design<br>
1.1 了解云计算概念<br>Understand cloud computing concepts<br>
云计算定义<br>Cloud computing definitions<br>
云计算角色和职责<br>Cloud computing roles and responsibilities<br>
云服务客户<br>cloud service customer<br>
云服务供应商<br>cloud service provider<br>
云服务合作伙伴<br>cloud service partner<br>
云服务代理<br>cloud service broker<br>
监管机构<br>regulator<br>
云计算关键特性<br>Key cloud computing characteristics<br>
按需自助服务<br>on-demand self-service<br>
广泛的网络访问<br>broad network access<br>
多租户<br>multi-tenancy<br>
快速弹性和可伸缩性<br>rapid elasticity and scalability<br>
资源池化<br>resource pooling<br>
可度量服务<br>measured service<br>
构建块技术<br>Building block technologies<br>
虚拟化<br>virtualization<br>
存储<br>storage<br>
联网<br>networking<br>
数据库<br>databases<br>
编排<br>orchestration<br>
1.2 描述云计算参考架构<br>Describe cloud reference architecture<br>
云计算活动<br>Cloud computing activities<br>
云服务能力<br>Cloud service capabilities<br>
应用能力类型<br>application capability types<br>
平台能力类型<br>platform capability types<br>
基础设施能力类型 <br>infrastructure capability types<br>
云服务类别<br>Cloud service categories<br>
软件即服务 (SaaS)<br>Software as a Service (SaaS)<br>
基础设施即服务 (IaaS)<br>Infrastructure as a Service (IaaS)<br>
平台即服务 (PaaS)<br>Platform as a Service (PaaS)<br>
云部署模型<br>Cloud deployment models<br>
公共云<br>public<br>
私有云<br>private
混合云<br>hybrid<br>
社区云<br>community<br>
多云<br>multi-cloud<br>
云共享考虑因素<br>Cloud shared considerations<br>
互操作性<br>interoperability<br>
可移植性<br>portability<br>
可逆性<br>reversibility<br>
可用性<br>availability<br>
安全性<br>security
隐私<br>privacy<br>
弹性<br>resiliency<br>
性能<br>performance<br>
治理<br>governance<br>
维护和版本控制<br>maintenance and versioning<br>
服务等级和服务等级协议 (SLA)<br>service levels and service-level agreements (SLA)<br>
可审计性<br>auditability<br>
监管<br>regulatory<br>
外包<br>outsourcing<br>
相关技术的影响<br>Impact of related technologies<br>
数据科学<br>data science<br>
机器学习<br>machine learning<br>
人工智能 (AI)<br>artificial intelligence (AI)
区块链<br>blockchain<br>
物联网 (IoT)<br>Internet of Things (IoT)<br>
容器<br>containers<br>
量子计算<br>quantum computing<br>
边缘计算<br>edge computing<br>
机密计算<br>confidential computing<br>
DevSecOps
1.3 了解与云计算相关的安全概念<br>Understand security concepts relevant to cloud computing<br>
密码学和密钥管理<br>Cryptography and key management<br>
身份和访问控制<br>Identity and access control<br>
用户访问<br>user access<br>
特权访问<br>privilege access<br>
服务访问<br>service access<br>
数据和媒介清理<br>Data and media sanitization<br>
覆盖<br>overwriting<br>
加密擦除<br>cryptographic erase<br>
网络安全<br>Network security<br>
网络安全组<br>network security groups<br>
流量检查<br>traffic inspection<br>
地理围栏<br>geofencing<br>
零信任网络<br>zero trust network<br>
虚拟化安全<br>Virtualization security<br>
hypervisor 安全<br>hypervisor security<br>
容器安全<br>container security<br>
临时计算<br>ephemeral computing<br>
无服务器技术<br>serverless technology<br>
常见威胁<br>Common threats<br>
安全卫生<br>Security hygiene<br>
打补丁<br>patching<br>
基线<br>baselining<br>
1.4 了解安全云计算的设计原则<br>Understand design principles of secure cloud computing<br>
云安全数据生命周期<br>Cloud secure data lifecycle<br>
基于云的业务连续性 (BC) 和灾难恢复 (DR) 计划<br>Cloud-based business continuity (BC) and disaster recovery (DR) plan<br>
业务影响分析 (BIA)<br>Business impact analysis (BIA)<br>
成本效益分析<br>cost-benefit analysis<br>
投资回报率 (ROI)<br>return on investment (ROI)<br>
功能安全要求<br>Functional security requirements<br>
可移植性<br>portability<br>
互操作性<br>interoperability<br>
供应商锁定<br>vendor lock-in<br>
不同云类别的安全注意事项和责任<br>Security considerations and responsibilities for different cloud categories<br>
软件即服务 (SaaS)<br>Software as a Service (SaaS)<br>
基础设施即服务 (IaaS)<br>Infrastructure as a Service (IaaS)<br>
平台即服务 (PaaS)<br>Platform as a Service (PaaS)<br>
云设计模式<br>Cloud design patterns<br>
SANS 安全原则<br>SANS security principles<br>
架构完善的框架<br>Well-Architected Framework<br>
云安全联盟 (CSA) 企业架构<br>Cloud Security Alliance (CSA) Enterprise Architecture<br>
DevOps 安全<br>DevOps security<br>
1.5 评估云服务供应商<br>Evaluate cloud service providers<br>
根据标准进行验证<br>Verification against criteria<br>
国际标准组织/国际电子技术委员会 (ISO/IEC) 27017<br>International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 27017<br>
支付卡行业数据安全标准 (PCI DSS)<br>Payment Card Industry Data Security Standard (PCI DSS)<br>
系统/子系统产品认证<br>System/subsystem product certifications<br>
通用标准 (CC)<br>Common Criteria (CC)<br>
联邦信息处理标准 (FIPS) 140-2<br>Federal Information Processing Standard (FIPS) 140-2<br>
D2 云数据安全<br>Cloud Data Security<br>
2.1 描述云数据概念<br>Describe cloud data concepts<br>
云数据生命周期阶段<br>Cloud data life cycle phases<br>
数据分散<br>Data dispersion<br>
数据流<br>Data flows<br>
2.2 设计和实现云数据存储架构<br>Design and implement cloud data storage architectures<br>
存储类型<br>Storage types<br>
长期<br>long-term<br>
临时<br>ephemeral<br>
原始存储<br>raw storage<br>
对存储类型的威胁<br>Threats to storage types<br>
2.3 设计和应用数据安全技术和策略<br>Design and apply data security technologies and strategies<br>
加密和密钥管理<br>Encryption and key management<br>
散列<br>Hashing<br>
数据混淆<br>Data obfuscation<br>
屏蔽<br>masking<br>
匿名化<br>anonymization<br>
令牌化<br>Tokenization<br>
数据丢失防护(DLP)<br>Data loss prevention (DLP)<br>
密钥、机密和证书管理<br>Keys, secrets and certificates management<br>
2.4 实现数据发现<br>Implement data discovery<br>
结构化数据<br>Structured data<br>
非结构化数据<br>Unstructured data<br>
半结构化数据<br>Semi-structured data<br>
数据位置<br>Data location<br>
2.5 计划和实现数据分类<br>Plan and implement data classification<br>
数据分类策略<br>Data classification policies<br>
数据映射<br>Data mapping<br>
数据标记<br>Data labeling<br>
2.6 设计和实现信息权限管理 (IRM)<br>Design and implement Information Rights Management (IRM)<br>
目标<br>Objectives<br>
数据权限<br>data rights<br>
访问<br>provisioning<br>
访问模型<br>access models<br>
适当的工具<br>Appropriate tools<br>
颁发和撤销证书<br>issuing and revocation of certificates<br>
2.7 规划和实施数据保留、删除和归档策略<br>Plan and implement data retention, deletion and archiving policies<br>
数据保留策略<br>Data retention policies<br>
数据删除程序和机制<br>Data deletion procedures and mechanisms<br>
数据归档程序和机制<br>Data archiving procedures and mechanisms<br>
依法保留<br>Legal hold<br>
2.8 设计和实施数据事件的可审计性、可追溯性和责任性<br>Design and implement auditability, traceability and accountability of data events<br>
事件源的定义和事件属性的要求<br>Definition of event sources and requirement of event attributes<br>
身份<br>identity<br>
互联网协议 (IP) 地址<br>Internet Protocol (IP) address<br>
地理位置<br>geolocation<br>
数据事件的日志记录、存储和分析<br>Logging, storage and analysis of data events<br>
监管链和不可抵赖性<br>Chain of custody and non-repudiation<br>
D3 云平台和基础架构安全<br>Cloud Platform and Infrastructure Security<br>
3.1 理解云基础架构和平台组件<br>Comprehend cloud infrastructure and platform components<br>
物理环境<br>Physical environment<br>
网络与通信<br>Network and communications<br>
计算<br>Compute<br>
虚拟化<br>Virtualization<br>
存储<br>Storage<br>
管理平面<br>Management plane<br>
3.2 设计安全的数据中心<br>Design a secure data center<br>
逻辑设计<br>Logical design<br>
租户分区<br>tenant partitioning<br>
访问控制<br>access control<br>
物理设计<br>Physical design<br>
位置<br>location<br>
购买或建造<br>buy or build<br>
环境设计<br>Environmental design<br>
供暖<br>Heating<br>
通风与空调 (HVAC)<br>Heating, Ventilation, and Air Conditioning (HVAC)<br>
多供应商通路连接<br>multi-vendor pathway connectivity<br>
设计弹性<br>Design resilient<br>
3.3 分析与云基础架构和平台相关的风险<br>Analyze risks associated with cloud infrastructure and platforms<br>
风险评估<br>Risk assessment<br>
识别<br>identification<br>
分析<br>analysis<br>
云漏洞、威胁和攻击<br>Cloud vulnerabilities, threats and attacks<br>
风险缓解策略<br>Risk mitigation strategies<br>
3.4 计划和实现安全控制<br>Plan and implementation of security controls<br>
物理和环境保护<br>Physical and environmental protection<br>
内部部署<br>on-premises<br>
系统、存储和通信保护<br>System, storage and communication protection<br>
云环境中的识别、认证和授权<br>Identification, authentication and authorization in cloud environments<br>
审计机制<br>Audit mechanisms<br>
日志收集<br>log collection<br>
关联<br>correlation<br>
数据包捕获<br>packet capture<br>
3.5 计划业务连续性 (BC) 和灾难恢复 (DR)<br>Plan business continuity (BC) and disaster recovery (DR)<br>
业务连续性 (BC) / 灾难恢复 (DR) 策略<br>Business continuity (BC) / disaster recovery (DR) strategy<br>
业务需求<br>Business requirements<br>
恢复时间目标 (RTO)<br>Recovery Time Objective (RTO)<br>
恢复点目标 (RPO)<br>Recovery Point Objective (RPO)<br>
恢复服务级别<br>recovery service level<br>
计划的创建、实施和测试<br>Creation, implementation and testing of plan<br>
D4 云应用安全<br>Cloud Application Security<br>
4.1 倡导应用程序安全性的培训和意识<br>Advocate training and awareness for application security<br>
云开发基础<br>Cloud development basics<br>
常见陷阱<br>Common pitfalls<br>
常见云漏洞<br>Common cloud vulnerabilities<br>
开放web应用安全项目 (OWASP) 10 大风险<br>Open Web Application Security Project (OWASP) Top-10<br>
SANS 前 25 个最危险的软件错误<br>SANS Top-25<br>
4.2 描述安全软件开发生命周期 (SDLC) 流程<br>Describe the Secure Software Development Life Cycle (SDLC) process<br>
业务需求<br>Business requirements<br>
阶段和方法<br>Phases and methodologies<br>
设计<br>design<br>
编码<br>code<br>
测试<br>test
维护<br>maintain
瀑布式与敏捷<br>waterfall vs. agile<br>
4.3 应用安全软件开发生命周期 (SDLC)<br>Apply the Secure Software Development Life Cycle (SDLC)<br>
云特定风险<br>Cloud-specific risks<br>
威胁建模<br>Threat modeling<br>
欺骗、篡改、抵赖、信息泄露、拒绝服务和特权提升 (STRIDE)<br>Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege (STRIDE)<br>
灾难、可重现性、可利用性、受影响用户与可发现性 (DREAD)<br>Damage, Reproducibility, Exploitability, Affected Users, and Discoverability (DREAD)<br>
架构、威胁、攻击面和缓解措施(ATASM)<br>Architecture, Threats, Attack Surfaces, and Mitigations (ATASM)<br>
攻击模拟和威胁分析过程 (PASTA)<br>Process for Attack Simulation and Threat Analysis (PASTA)<br>
避免开发过程中的常见漏洞<br>Avoid common vulnerabilities during development<br>
安全编码<br>Secure coding<br>
开放web应用安全项目 (OWASP) 应用安全检验标准 (ASVS)<br>Open Web Application Security Project (OWASP) Application Security Verification Standard (ASVS)<br>
卓越代码软件保障论坛 (SAFECode)<br>Software Assurance Forum for Excellence in Code (SAFECode)<br>
软件配置管理和版本控制<br>Software configuration management and versioning<br>
4.4 应用云软件保障和验证<br>Apply cloud software assurance and validation<br>
功能和非功能测试<br>Functional and non-functional testing<br>
安全测试方法<br>Security testing methodologies<br>
黑盒<br>blackbox<br>
白盒<br>whitebox<br>
静态<br>static<br>
动态<br>dynamic<br>
软件组成分析(SCA)<br>Software Composition Analysis (SCA)<br>
交互式应用程序安全测试 (IAST)<br>interactive application security testing (IAST)<br>
质量保证 (QA)<br>Quality assurance (QA)<br>
滥用案例测试<br>Abuse case testing<br>
4.5 使用经过验证的安全软件<br>Use verified secure software<br>
保护应用编程接口 (API)<br>Securing application programming interfaces (API)<br>
供应链管理<br>Supply-chain management<br>
供应商评估<br>vendor assessment<br>
第三方软件管理<br>Third-party software management<br>
许可<br>licensing<br>
经过验证的开源软件<br>Validated open-source software<br>
4.6 了解云应用架构的细节<br>Comprehend the specifics of cloud application architecture<br>
补充安全组件<br>Supplemental security components<br>
web应用防火墙 (WAF)<br>web application firewall (WAF)<br>
数据库活动监控 (DAM)<br>Database Activity Monitoring (DAM)<br>
可扩展标记语言 (XML) 防火墙<br>Extensible Markup Language (XML) firewalls<br>
应用编程接口 (API) 网关<br>application programming interface (API) gateway<br>
密码学<br>Cryptography<br>
沙盒<br>Sandboxing<br>
应用程序虚拟化和编排<br>Application virtualization and orchestration<br>
微服务<br>microservices<br>
容器<br>containers<br>
4.7 设计适当的身份和访问管理 (IAM) 解决方案<br>Design appropriate identity and access management (IAM) solutions<br>
联合身份<br>Federated identity<br>
身份提供商 (IdP)<br>Identity providers (IdP)<br>
单点登录 (SSO)<br>Single sign-on (SSO)<br>
多因子验证 (MFA)<br>Multi-factor authentication (MFA)<br>
云访问安全代理 (CASB)<br>Cloud access security broker (CASB)<br>
密钥/凭据管理<br>Secrets management<br>
D5 云安全运营<br>Cloud Security Operations<br>
5.1 为云环境构建和实现物理和逻辑基础架构<br>Build and implement physical and logical infrastructure for cloud environment<br>
硬件特定的安全配置要求<br>Hardware specific security configuration requirements<br>
硬件安全模块 (HSM) <br>hardware security module (HSM) <br>
可信赖平台模块 (TPM)<br>Trusted Platform Module (TPM)<br>
管理工具的安装和配置<br>Installation and configuration of management tools<br>
虚拟硬件特定的安全配置要求<br>Virtual hardware specific security configuration requirements<br>
网络<br>network
存储<br>storage
内存<br>memory
中央处理器 (CPU)<br>central processing unit (CPU)<br>
Hypervisor 类型 1 和 2<br>Hypervisor type 1 and 2<br>
安装客户操作系统 (OS) 虚拟化工具集<br>Installation of guest operating system (OS) virtualization toolsets<br>
5.2 运行和维护云环境的物理和逻辑基础架构 <br>Operate and maintain physical and logical infrastructure for cloud environment<br>
本地和远程访问的访问控制<br>Installation of guest operating system (OS) virtualization toolsets<br>
远程桌面协议 (RDP)<br>Remote Desktop Protocol (RDP)<br>
安全终端访问<br>secure terminal access<br>
安全外壳 (SSH)<br>Secure Shell (SSH)<br>
基于控制台的访问机制<br>console-based access mechanisms<br>
跳板机<br>jumpboxes<br>
虚拟客户端<br>virtual client<br>
安全网络配置<br>Secure network configuration<br>
虚拟局域网 (VLAN)<br>virtual local area networks (VLAN)<br>
传输层安全 (TLS)<br>Transport Layer Security (TLS)<br>
动态主机配置协议 (DHCP)<br>Dynamic Host Configuration Protocol (DHCP)<br>
域名系统安全扩展 (DNSSEC)<br>Domain Name System Security Extensions (DNSSEC)<br>
虚拟专用网络 (VPN)<br>virtual private network (VPN)<br>
网络安全控制<br>Network security controls<br>
防火墙<br>firewalls<br>
入侵检测系统 (IDS)<br>intrusion detection systems (IDS)<br>
入侵防御系统 (IPS)<br>intrusion prevention systems (IPS)<br>
蜜罐<br>honeypots<br>
漏洞评估<br>vulnerability assessments<br>
网络安全组<br>network security groups<br>
堡垒主机<br>bastion host<br>
通过应用基线、监控和修复来强化操作系统 (OS)<br>Operating system (OS) hardening through <br>the application of baselines, monitoring and <br>remediation<br>
Windows
Linux
VMware
补丁管理<br>Patch management<br>
基础设施即代码 (IaC) 策略<br>Infrastructure as Code (IaC) strategy<br>
集群主机的可用性<br>Availability of clustered hosts<br>
分布式资源调度<br>distributed resource scheduling<br>
动态优化<br>dynamic optimization<br>
存储集群<br>storage clusters<br>
维护模式<br>maintenance mode<br>
高可用性(HA)<br>high availability (HA)<br>
客户操作系统 (OS) 的可用性<br>Availability of guest operating system (OS)<br>
性能和容量监控<br>Performance and capacity monitoring<br>
网络<br>network
计算<br>compute
存储<br>storage
响应时间<br>response time<br>
硬件监控<br>Hardware monitoring<br>
磁盘<br>disk
中央处理器 (CPU)<br>central processing unit (CPU)<br>
风扇速度<br>fan speed<br>
温度<br>temperature
主机和客户操作系统 (OS) 备份和恢复功能的配置<br>Configuration of host and guest operating system <br>(OS) backup and restore functions<br>
管理平面<br>Management plane<br>
调度<br>scheduling
编排<br>orchestration
维护<br>maintenance
5.3 实施运营控制和标准(例如,信息技术基础架构库 (ITIL)、国际标准组织/国际电子技术委员会 <br>(ISO/IEC) 20000-1)<br>Implement operational controls and standards (e.g., Information Technology Infrastructure <br>Library (ITIL), International Organization for Standardization/International Electrotechnical <br>Commission (ISO/IEC) 20000-1)<br>
变更管理<br>Change management<br>
连续性管理<br>Continuity management<br>
信息安全管理<br>Information security management<br>
连续的服务改进管理<br>Continual service improvement management<br>
事故管理<br>Incident management<br>
问题管理<br>Problem management<br>
发布管理<br>Release management<br>
部署管理<br>Deployment management<br>
配置管理<br>Configuration management<br>
服务等级管理<br>Service level management<br>
可用性管理<br>Availability management<br>
容量管理<br>Capacity management<br>
5.4 支持数字取证<br>Support digital forensics<br>
取证数据收集方法<br>Forensic data collection methodologies<br>
证据管理<br>Evidence management<br>
收集、获取和保存数字证据<br>Collect, acquire, and preserve digital evidence<br>
5.5 管理与相关方的沟通<br>Manage communication with relevant parties<br>
供应商<br>Vendors<br>
客户<br>Customers<br>
合作伙伴<br>Partners<br>
监管机构<br>Regulators<br>
其他利益相关者<br>Other stakeholders<br>
5.6 管理安全运营<br>Manage security operations<br>
安全运营中心 (SOC)<br>Security operations center (SOC)<br>
安全控制的智能监控<br>Intelligent monitoring of security controls<br>
防火墙<br>firewalls<br>
入侵检测系统 (IDS)<br>intrusion detection systems (IDS)<br>
入侵防御系统 (IPS)<br>intrusion prevention systems (IPS)<br>
蜜罐<br>honeypots<br>
网络安全组<br>network security groups<br>
人工智能 (AI)<br>artificial intelligence (AI)<br>
日志捕获和分析<br>Log capture and analysis<br>
安全信息和事件管理 (SIEM)<br>security information and event management (SIEM)<br>
日志管理<br>log management<br>
事故管理<br>Incident management<br>
漏洞评估<br>Vulnerability assessments<br>
D6 法律、风险和合规<br>Legal, Risk and Compliance<br>
6.1 明确云环境中的法律要求和独特风险<br>Articulate legal requirements and unique risks within the cloud environment<br>
国际法律冲突<br>Conflicting international legislation<br>
云计算特有的法律风险评估<br>Evaluation of legal risks specific to cloud computing<br>
法律框架和准则<br>Legal framework and guidelines<br>
eDiscovery
国际标准组织/国际电子技术委员会 (ISO/IEC) 27050<br>International Organization for Standardization/International <br>Electrotechnical Commission (ISO/IEC) 27050<br>
云安全联盟 (CSA) 指引<br>Cloud Security Alliance (CSA) Guidance<br>
取证要求<br>Forensics requirements<br>
6.2 了解隐私问题<br>Understand privacy issues<br>
合同规定的和受监管的私人数据之间的区别<br>Difference between contractual and regulated private data<br>
受保护的健康信息 (PHI)<br>protected health information (PHI)<br>
个人可识别信息 (PII)<br>personally identifiable information (PII)<br>
与私人数据相关的国家特定立法<br>Country-specific legislation related to private data<br>
受保护的健康信息 (PHI)<br>protected health information (PHI)<br>
个人可识别信息 (PII)<br>personally identifiable information (PII)<br>
数据隐私的司法管辖区差异<br>Jurisdictional differences in data privacy<br>
标准隐私要求<br>Standard privacy requirements<br>
国际标准组织/国际电子技术委员会 (ISO/IEC) 27018<br>International Organization for Standardization/International <br>Electrotechnical Commission (ISO/IEC) 27018<br>
普遍接受的隐私原则 (GAPP)<br>Generally Accepted Privacy Principles (GAPP)<br>
一般数据保护条例 (GDPR)<br>General Data Protection Regulation (GDPR)<br>
隐私影响评估 (PIA)<br>Privacy Impact Assessments (PIA)<br>
6.3 了解云环境的审计流程、方法和必要的调整<br>Understand audit process, methodologies, <br>and required adaptations for a cloud environment<br>
内部和外部审计控制<br>Internal and external audit controls<br>
审计要求的影响<br>Impact of audit requirements<br>
确定虚拟化和云的保障挑战<br>Identify assurance challenges of virtualization and cloud<br>
审计报告的类型<br>Types of audit reports<br>
关于认证业务标准的声明 (SSAE)<br>Statement on Standards for Attestation Engagements (SSAE)<br>
服务组织控制 (SOC)<br>Service Organization Control (SOC)<br>
国际鉴证业务准则 (ISAE)<br>International Standard on Assurance Engagements (ISAE)<br>
审计范围声明的限制<br>Restrictions of audit scope statements<br>
关于认证业务标准的声明 (SSAE)<br>Statement on Standards for Attestation Engagements (SSAE)<br>
国际鉴证业务准则 (ISAE)<br>International Standard on Assurance Engagements (ISAE)<br>
差距分析<br>Gap analysis<br>
控制分析<br>control analysis<br>
基线<br>baselines<br>
审计计划<br>Audit planning<br>
内部信息安全管理系统<br>Internal information security management system<br>
内部信息安全控制系统<br>Internal information security controls system<br>
策略<br>Policies<br>
组织<br>organizational<br>
功能<br>functional<br>
云计算<br>cloud computing
相关利益相关者的识别和参与<br>Identification and involvement of relevant stakeholders<br>
受到严格监管行业的特殊合规要求<br>Specialized compliance requirements for <br>highly-regulated industries<br>
北美电力可靠性公司/关键基础设施保护 (NERC / CIP)<br>North American Electric Reliability Corporation / <br>Critical Infrastructure Protection (NERC / CIP)<br>
健康保险便捷与责任法案 (HIPAA)<br>Health Insurance Portability and Accountability Act (HIPAA)<br>
经济与临床医疗保健信息科技 (HITECH) 法案<br>Health Information Technology for <br>Economic and Clinical Health (HITECH) Act<br>
支付卡行业 (PCI)<br>Payment Card Industry (PCI)<br>
分布式信息技术 (IT) 模型的影响<br>Impact of distributed information technology (IT) model<br>
不同的地理位置<br>diverse geographical locations<br>
跨越法律管辖区<br>crossing over legal jurisdictions<br>
6.4 了解云对企业风险管理的影响<br>Understand implications of cloud to enterprise risk management<br>
评估提供商风险管理计划<br>Assess providers risk management programs<br>
控制<br>controls
方法<br>methodologies
策略<br>policies
风险概况<br>risk profile
风险偏好<br>risk appetite<br>
数据所有者/控制者与数据保管者/处理者之间的区别<br>Difference between data owner/controller vs. data custodian/processor<br>
监管透明度要求<br>Regulatory transparency requirements<br>
违规通知<br>breach notification<br>
Sarbanes-Oxley (SOX)
一般数据保护条例 (GDPR)<br>General Data Protection Regulation (GDPR)<br>
风险处理<br>Risk treatment<br>
规避<br>avoid
减轻<br>mitigate
转移<br>transfer
共享<br>share
接受<br>acceptance
不同的风险框架<br>Different risk frameworks<br>
风险管理指标<br>Metrics for risk management<br>
风险环境评估<br>Assessment of risk environment<br>
服务<br>service
供应商<br>vendor
基础架构<br>infrastructure
业务<br>business
6.5 了解外包和云合同设计<br>Understand outsourcing and cloud contract design<br>
业务要求<br>Business requirements<br>
服务等级协议(SLA)<br>service-level agreement (SLA)<br>
主服务协议(MSA)<br>master service agreement (MSA)<br>
工作陈述(SOW)<br>statement of work (SOW)<br>
供应商管理<br>Vendor management<br>
供应商评估<br>vendor assessments<br>
供应商锁定风险<br>vendor lock-in risks<br>
供应商生存能力<br>vendor viability<br>
托管<br>escrow<br>
合同管理<br>Contract management<br>
审计权<br>right to audit<br>
指标<br>metrics<br>
定义<br>definitions<br>
终止<br>termination<br>
诉讼<br>litigation<br>
保证<br>assurance<br>
合规<br>compliance<br>
访问云/数据<br>access to cloud/data<br>
网络风险保险<br>cyber risk insurance<br>
供应链管理<br>Supply-chain management<br>
国际标准组织/国际电子技术委员会 (ISO/IEC) 27036<br>International Organization for Standardization/International <br>Electrotechnical Commission (ISO/IEC) 27036<br>
收藏
0 条评论
下一页