Dark Arts
  • index
  • BUY ME A BOOK
  • 🪄Dark Magic
    • Pentesting
      • Industry Methodologies
    • Scopes of Testing
    • Reconnaissance
      • Passive
        • WHOIS
        • DNS
          • nslookup
          • dig
        • WAF
        • Subdomain
        • Google Dork
        • Misc. Techniques
        • Leaked Passwords
      • Active
        • Browser & Plugins
        • ping & traceroute
        • fping
        • telnet & netcat
        • DNS
          • Zone Transfer
          • DNS Amplification DDoS Attack Breakdown
        • Misc. Techniques
    • Vulnerability Assessment
    • Attack Types
  • 🕷️Aragoogs Nest
    • Web Application Overview & Security
      • Security Testing
      • Common Threats & Risks
    • Web Application Architecture
      • Technologies
    • HTTP/S
      • Message
      • Request
      • Response
        • Status Code
    • Crawling/Spidering
  • 🧪Potions
    • Web Browsers
    • Computer Networking
      • Network Protocol
      • Packets
      • OSI Layer
        • Layer 3: Network
        • Layer 4: Transport
      • DNS
        • Primary-Secondary
        • Local Name Resolution
        • Domain Hierarchy
        • FQDN
        • Lookups
        • DNS Resolution
        • DNS Records
        • Security: Attack-Defense (Default)
  • 🎆Spells
    • 📜Linux Scroll
    • 📜WebShell Scroll
    • git
      • Attacks + Vulnerabilities
  • 🖼️Flaws w/ Magical Frameworks
    • Windows
      • In a Nutshell
      • CVE-2019-0708: BlueKeep
      • CVE-2017-0144: EternalBlue: MS17-010
      • Attacking Services
        • MS IIS - WebDAV
        • SMB
        • HTTP File Server (HFS)
        • Apache Tomcat Web Server
        • RDP
        • WinRM
      • File System Vulnerabilities
      • Credential Dumping
        • Password Search in Windows Configuration Files
        • Mimikatz
        • Pass-the-Hash Attack
    • Linux
      • In a Nutshell
      • CVE-2014-6271: Shellshock
      • Attacking Services
        • FTP
        • SSH
        • SAMBA
        • SMTP
        • RSYNC
      • Dumping Hashes
  • 🌼Marauder's Boost
    • Privilege Escalation
    • Windows PrivEsc
      • Windows Kernel Exploit
      • Bypassing UAC
      • Access Token Impersonation
    • Linux PrivEsc
      • Linux Kernel Exploit
      • Misconfigured Cron Jobs
      • Exploiting SUID Binaries
      • shells
      • File Permissions
  • ☠️Death Eaters
    • Post Exploitation
      • Windows
      • Linux
  • 🪄OLLIVANDERS
    • nmap
      • Host Discovery
      • Port Scan
      • Service & OS
      • NSE
      • Firewall/IDS Evasion
      • Scan Optimization
      • Misc. Methods
    • ffuf
    • Hydra
    • Metasploit Framework
      • Architecture
      • Must to Know
      • msfvenom
      • Auxiliary Modules
      • Service Enumeration
      • Vulnerability Scanning
      • Imports
      • Automating
    • Vulnerability Scanners
    • Wireshark
  • 🚂Platform 9(3/4)
    • Auth-Auth
      • Authentication
        • Password-based Authentication
        • Basic Authentication
        • Multi-factor Authentication
        • Access Token
        • Token-based Authentication
          • JWT
          • OAuth 2.0
    • Secure Headers
      • Content-Security-Policy (CSP)
    • Cryptography
      • Caesar Cipher
  • ⛲Port Pensieve
    • Enumeration
      • SMB & NetBIOS
      • SNMP
    • Wordlists
  • 🔆DUELS
    • Pivoting
    • SMB Relay Attack
  • 🗺️Marauder's Map
    • Web Application Pentesting
    • API Pentesting
      • GraphQL
        • Primer
    • Mobile Application Pentesting
  • 🎧SIDE CHANNEL
    • Side Channel Analysis
    • Timing Side-Channel Attacks
      • Vulnerable Login
  • 🥃Sky
    • Cloud Basics
    • Cloud Management
      • Shared Responsibility Model
    • Using Cloud Resources
      • Monitoring & Alerts
      • Identity & Access Management
      • Scalability & Availability
      • Solution Design
    • Cloud Providers
    • Cloud Security & Regulatory Compliance
      • Resource Protection
      • ICCA: Cloud Security & Regulatory Compliance
    • ICCA Preparation
      • Knowledge Tests
      • Lab
  • 🔷Obsidian
    • Pentest Engagement
      • Scoping
    • Pentest Ethics
      • Rules of Engagement
    • Auditing Fundamentals
      • Process/Lifecycle
      • Pentest & Security Auditing
      • GRC
      • Standards, Frameworks & Guidelines
      • From Audit to Pentest
  • 💢Threat Modeling
    • Why Threat Model?
  • 📡THREAT INTEL
    • Threat Intelligence
    • Tool Dump
  • 📱Anything-Mobile-IoT
    • Firmware
    • Firmware Analysis
      • Example: CVE-2016-1555
    • Firmware Installation/Flashing
  • 🎉Mischeif
    • Social Engineering
    • Phishing
      • GoPhish
    • Pretexting
Powered by GitBook
On this page
  • Cloud Regulatory Compliance
  • Cloud Infrastructure Protection
  • Cloud IAM (Identity and Access Management)
  • Cloud Data Protection Concepts and Tools
  • Cloud Identity Vulnerabilities and Protection Tools
  1. Sky
  2. Cloud Security & Regulatory Compliance

ICCA: Cloud Security & Regulatory Compliance

Cloud Regulatory Compliance

Cloud regulatory compliance involves adhering to specific laws, regulations, and industry standards governing the protection, privacy, and security of data in the cloud. Organizations must comply with various requirements, such as GDPR (General Data Protection Regulation), HIPAA (Health Insurance Portability and Accountability Act), and PCI DSS (Payment Card Industry Data Security Standard). Compliance ensures that sensitive data is handled appropriately and that organizations meet legal and industry obligations.

  • AWS: AWS offers compliance certifications and tools like AWS Artifact and AWS Config to help meet compliance requirements.

  • Azure: Azure provides compliance offerings and tools like Azure Policy and Compliance Manager to monitor and enforce compliance.

  • GCP: Google Cloud offers compliance resources and tools like GCP Policy Intelligence and Security Command Center for regulatory compliance.

Cloud Infrastructure Protection

Cloud infrastructure protection involves securing the physical and virtual components that form the foundation of cloud services, such as servers, storage, networking, and data centers. This protection includes measures like DDoS (Distributed Denial of Service) protection, encryption, network segmentation, and firewalls.

  • AWS: AWS Shield (DDoS protection), AWS WAF (Web Application Firewall), and GuardDuty (threat detection).

  • Azure: Azure DDoS Protection, Azure Firewall, and Azure Security Center.

  • GCP: Google Cloud Armor (DDoS protection), Google Cloud Firewall, and Security Command Center.

Cloud IAM (Identity and Access Management)

Cloud IAM refers to managing user identities and controlling access to cloud resources. IAM includes authentication, authorization, and enforcing security policies to ensure only authorized users and services access the cloud environment.

  • AWS: AWS IAM, with features like MFA (Multi-Factor Authentication), roles, policies, and federated access.

  • Azure: Azure Active Directory (AD), with Conditional Access, role-based access control (RBAC), and Identity Protection.

  • GCP: Google Cloud IAM, with IAM policies, roles, and identity federation.

Cloud Data Protection Concepts and Tools

Cloud data protection involves safeguarding data at rest, in transit, and in use through encryption, access controls, and monitoring. Key concepts include data encryption, backup and recovery, and data lifecycle management.

  • AWS: S3 encryption, AWS KMS (Key Management Service), and AWS Backup.

  • Azure: Azure Storage encryption, Azure Key Vault, and Azure Backup.

  • GCP: Cloud Storage encryption, Google Cloud KMS, and Google Cloud Backup and DR.

Cloud Identity Vulnerabilities and Protection Tools

Cloud identity vulnerabilities include weak passwords, leaked credentials, and improper access control, which can lead to unauthorized access and data breaches. Protection tools help mitigate these risks through strong authentication, access controls, and monitoring.

  • AWS: IAM Access Analyzer, AWS Secrets Manager, and AWS CloudTrail (monitoring and logging).

  • Azure: Azure Identity Protection, Azure AD Password Protection, and Azure Monitor.

  • GCP: Google Cloud Identity-Aware Proxy (IAP), Google Cloud Secret Manager, and Google Cloud Audit Logs.

Each cloud provider offers distinct tools and services tailored to securing their platform while providing the flexibility and capabilities necessary to maintain regulatory compliance and protect infrastructure, identities, and data.

PreviousResource ProtectionNextICCA Preparation

Last updated 9 months ago

🥃