Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Table of Contents

...

Reference_description_with_linked_URLs__________________________Notes_________________________________________________________
m Cloud Solutions
m Kubernetes
AWS basics
AWS Solution Architecture
AWS management work 2
m IBM Cloud
m GCP - Google Cloud
m Azure Cloud


Grokking Coding Interview Patterns in Javaeducation.io tips
https://www.khanacademy.org/free good online self study for all high school college courses ****
https://www.eweek.com/cloud/at-a-high-level-aws-vs-azure-vs-google-cloud?
utm_medium=email&utm_campaign=B2B_NL_WHN_20190807_AR1&mkt_
tok=eyJpIjoiTkdSalpEZzNZamhoTVdVMiIsInQiOiJ3dElRVTIrWXpnbzdUe
TVOWE8yc2FMRjhET2xwMnByV0NkMnFFNFFsb1NSM292clA1VlpFMXhw
ZGw2ZURGSjBqWnh3UWx3ZHdSV1dZRWJsdE5lNXZDRitYbTNRNmFsSk
Jxc3pjOWtZK3d5UWxXYSt2cTdFYW1XQ1h2NkFcLytvdloifQ%3D%3Dfreecodecamp.org/
good free tech online courses with custom certs, projects ***
https://www.udemy.com/all tech courses very affordable when on sale ****
https://k21academy.com/affordable self study courses for cloud cert tests **
devops - cloud webinar library  ** 
eweek - compare AWS Azure GCP clouds - summaryeweek - compare AWS Azure GCP clouds - summary **
https://www.linkedin.com/pulse/overview-security-postures-azure-aws-
christophe-parisel/
Build Run Pipeline strategies in the Cloud


https://www.digitalocean.com/pricing/Compare Digitalocean.com pricing to AWS and Azure – Azure is high


Processors AWS secret weapon is revolutionizing computing pdfProcessors AWS secret weapon is revolutionizing computing 


cloud security concepts dzone   

cloud-security-dzone-2202-w_defa3108.pdf file

cloud-security-dzone-2202-w_defa3108.pdf link

cloud security concepts dzone   









Key Concepts



eweek - compare AWS Azure GCP clouds - summary

...

This is a high-level comparison of the three major cloud service leaders here in mid-2019. We will be updating this article with new information as it becomes available, and eWEEK will also be examining in closer detail the various services—computing, storage, networking and tools—that each vendor offers.


Cloud Security Concepts


cloud security concepts dzone   

cloud-security-dzone-2202-w_defa3108.pdf file

cloud-security-dzone-2202-w_defa3108.pdf link


finserv-cloud-security-101-2023.pdf file

TOC

01 Securing customers' money in a cloud-first world..............3

02 Key cloud security solution categories: CSPM,

CIEM, and CWPP

03 What is CSPM?.

04 What is CIEM?

05 What is CWPP?

What is CNAPP?.

CNAPP has you covered.

Six key considerations when evaluating a cloud security solution

#1 Choose an agentless + agent based approach for comprehensive protection

#2 Manage configuration and permission risk..

#3 Identify and prioritize vulnerabilities from source to run........

#4 Enable cloud security monitoring with audit logs.........

#5 Implement runtime detection and response..

#6 Map to the MITRE ATT&CK framework............




Potential Value Opportunities



Potential Challenges



Cloud Short-term vs Long-term Benefits, Costs

https://www.zdnet.com/article/cloud-sticker-shock-were-spending-way-too-much/

cloud-strategies-Cloud sticker shock explored were spending way too much some venture capitalists say

Good for startups to lower devops, infrastructure costs BUT

  • cloud custom services have a learning 
  • create cloud vendor locking requiring costs to move applications later ( vs open-source standard stacks with lower migration costs )
  • as firms grow, efficient management of services can compete on costs with better flexibility, control than cloud providers in many cases



cloud-enterprise-hybrid-cloud-adoption-management-2024-short.pdf  file

concepts

strategies

myths

tips




Build Run Pipelines in the Cloud

https://www.linkedin.com/pulse/overview-security-postures-azure-aws-christophe-parisel/

build-run-concepts-2019-linkedin.com-An overview of security postures in Azure and AWS.pdf


Candidate Solutions


ATARC  - Advanced Tech Architecture Research Council

Government systems technology focus



NIST - National Institute of Security Technology - issues bulletins on recommended security practices and alerts



FIPS 140.2 - Security Basics Compliance Recommendations for IT systems



Fedramp = standard for security assessment, authorization, monitoring

https://www.fedramp.gov/faqs/

The Federal Risk and Authorization Management Program (FedRAMP) is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. This approach uses a “do once, use many times” framework that saves cost, time, and staff required to conduct redundant Agency security assessments.

Yes, FedRAMP is mandatory for Federal Agency cloud deployments and service models at the low, moderate, and high risk impact levels. Private cloud deployments intended for single organizations and implemented fully within federal facilities are the only exception.


CSA - Cloud Security Alliance  - Security, Trust, Assurance and Risk (STAR)

Security, Trust, Assurance and Risk (STAR)
The industry's most powerful program for security assurance in the cloud.

The Security, Trust, Assurance, and Risk (STAR) Registry is a publicly accessible registry that documents the security and privacy controls provided by popular cloud computing offerings.

STAR encompasses the key principles of transparency, rigorous auditing, and harmonization of standards outlined in the Cloud Controls Matrix (CCM). Publishing to the registry allows organizations to show current and potential customers their security and compliance posture, including the regulations, standards, and frameworks they adhere to. It ultimately reduces complexity and helps alleviate the need to fill out multiple customer questionnaires.

Level 1 - self assessment with cloud security standards 

Level 2 - audited proof of compliance with cloud security standards

Which organizations should pursue level 2?

Organizations should pursue this level if they are...

  • Operating in a medium to high risk environment
  • Already hold or adhere to the following: ISO27001, SOC 2, GB/T 22080-2008, or GDPR
  • Looking for a cost-effective way to increase assurance for cloud security and privacy.




Step-by-step guide for Example

...