Chandani Patel

Pillars of AWS Well-Architected Framework

Well-Architected Framework Cloud computing is proliferating each passing year denoting that there are plenty of opportunities. Creating a cloud solution calls for a strong architecture if the foundation is not solid then the solution faces issues of integrity and system workload. AWS 5 pillars help
/
Jeremy Daniel

Find Competitive Advantage through AWS by Partnering With The Experts

Setting up your cloud configuration is too important to not involve the experts MediaTemple & CloudTweaks Thought Leadership Brand Series So many great business ideas fail at the moment when strategy must turn to execution. Even the best laid plans often come to nothing, drowned
/
Steve Prentice CloudTweaks

Why Certification Matters for Cloud Service Providers

Certification for Cloud Service Providers

The concept of “cloud” has become more of a norm for companies and organizations worldwide. Most now use cloud service providers (CSPs) for some part of their business, and cloud has grown from simply being an IT concern to a C-level concern. Debate continues over the varieties of cloud available, such as on-premise, hybrid, public and private, and it is an industry that according to Global Industry Analysts, Inc., will reach over $127 billion by the end of the year.

CSP Problems

Since so much data is now being stored on cloud servers, CSPs must be vigilant and proactive to ensure their clients’ vital digital property is never compromised, infected, or held for ransom. The potential for damage extends well beyond simple data loss; companies can face litigation, fines, and destruction of their reputation and brand if their cloud platform is breached.

Cloud security is a joint responsibility: organizations bear some obligation to protect their data, but so, too, do the CSPs themselves. As a result, many CSPs realize that despite the substantial technology and human expertise they have at their disposal, the threats are varied and persistent. They must seek to stay one step ahead to continue serving as a trusted technology and security advisor to their clients. This is when certification can make a big difference.

While there are many compliance certifications that CSPs maintain, having certified cloud security professionals on staff, and also having them as third-party contractors, provides an opportunity for CSPs to bolster their reputation and expertise. This is especially useful when customers have reservations about cloud computing. Cloud security certification confers credibility and helps reassure the customer of a CSP’s status as a trusted technology and security advisor in the cloud.

The Power of the CCSP Designation

Certification for Cloud Service Providers 

The CCSP (Certified Cloud Security Professional) designation was co-created by (ISC)² and Cloud Security Alliance, and is a globally recognized credential representing the highest standard of cloud security expertise. The certification attests to deep, up-to-date knowledge and hands-on experience with cloud security architecture, design, operations, and service orchestration.

To qualify, candidates must already possess a minimum of five years cumulative, paid, full-time work experience in information technology, of which three years must be in information security and one year in one or more of the six domains of the CCSP Common Body of Knowledge (CBK).

Why should anyone pursue such a designation, and why should CSPs or their clients care about it?

As highly trained experts, CCSPs work either within an organization or as external contractors. Their role is to stay ahead of the trends, threats, and other developments that the often-overtaxed members of an internal IT team have little time to review. These include:

  • Assessing the viability and security of APIs
  • Detecting compromised credentials, poor password hygiene and insufficient authentication, including one-off activities like forgetting to de-activate the credentials of people who have left the project or company.
  • Incorporation of multifactor authentication
  • Assessing the CSP’s security around the identity platform
  • Evaluating the potential for a cloud application to be used as an attack launchpad
  • Scanning for vulnerabilities and bugs
  • Scanning for sabotage or people acting as weak links
  • Training and consulting on employee awareness against phishing and other forms of external attack
  • Training employees on the use of BYOD devices

CCSPs assist with software and patches, vulnerability testing, auditing and training/awareness programs based on the most up-to-date knowledge. They are also well-versed in discussing strategy, planning and crisis management with people outside the IT department, specifically the executive.

The Need for Constantly Updated Risk Awareness and Mitigation

Attacks come from every type of connection point; not just cloud, but every other type of technology that touches a company, such as SaaS services, BYOD devices, even phishing emails. According to some experts, more than 400,000 new malware instances are recognized daily.

Cloud service providers must be able to protect themselves as well as their customers, while simultaneously staying competitive, through innovation, scalability, and reliability. Much like a physician who must stay healthy while supporting the health of her patients, CSPs must be constantly on guard for threats and must stay permanently up-to-date. They must use tools and configurations that are very different from those that they give to their customers, for example, the technologies and protocols specific to hypervisor environments, which must remain isolated from their customers’ own structure.

CCSPs must also ensure their clients keep tabs on cloud security challenges that happen on an individual level, for example, when employees either choose or unwittingly start to use convenient commercial “DropBox-style” cloud storage providers or even infected USB drives. When they use these technologies, employees inevitably lead their companies into situations of heightened vulnerability by circumventing established security protocols.

The Need to Constantly Deliver Proof of Security

Ultimately, cloud service providers must satisfy the customer’s concerns around a range of issues. These include transparency regarding where the data resides and how it is being protected; proof of a CSP’s ability to protect that data; proof of experience and up-to-date capability, and a guarantee of available resources and expertise.

CCSPs give cloud service providers the capacity to build, operate, and demonstrate a security policy that can be proactive, and which is also able to react with great speed, accuracy, and completeness.

The CCSP allows the cloud service provider to remain a trusted advisor and a trusted repository of their customers’ vital data, prosperity and reputation.

Sponsored series by (ISC)². For information on CCSP, check out this infographic or visit the (ISC)² website at www.isc2.org/ccsp.  

By Steve Prentice

  • Steves Articles
Senior CloudTweaks Writer
Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.
follow me
Kris Lahri

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet ...
The Cloud Debate - Private, Public, Hybrid or Multi Clouds?

The Cloud Debate – Private, Public, Hybrid or Multi Clouds?

The Cloud Debate Now that we've gotten over the hump of whether we should adopt the cloud or not, "which cloud" is now the center ...
Daren Glenister

10 Ways The Enterprise Can Prevent Data Leaks In The Cloud

Prevent Data Leaks In The Cloud More companies are turning to the cloud for storage. In fact, over 60 percent of organizations store sensitive information ...
Amazon logo

Amazon Expands Chicago Tech Hub and Announces Plans to Create 400 New Tech Jobs

/
Amazon to double its tech workforce in downtown Chicago Tomorrow, September 17th, Amazon will hold ‘Amazon Career Day’ event in Chicago for job seekers to learn more about the hundreds of open positions across Illinois—candidates can register ...
Gartner

Top Trends in Blockchain Technology; inching towards Web 3.0

/
There’s no shortage of news about mega digital commerce players controlling the algorithms that guide our daily actions and thoughts.  See Amazon Changed Search Algorithms in Ways to Boost its Own ...
400 Million Medical Radiological Images Exposed on the Internet

400 Million Medical Radiological Images Exposed on the Internet

/
An analysis of medical image storage systems exposed to the public web reveals that almost 600 servers in 52 countries are completely unprotected against unauthorized access. Audited systems were unpatched ...

TRENDING | TECH NEWS