Module 6: Risk & Provider Assessment
Practice using the CSA Cloud Controls Matrix (CCM) for risk
Practice using the CSA Cloud Controls Matrix (CCM) for risk
Build a 2-tier cloud application with complete security configurations. Implement
Encrypt storage volumes with customer-managed encryption keys. Secure snapshots and
Create a secure Virtual Private Cloud (VPC) and implement baseline
Expand IAM with Attribute-Based Access Control (ABAC) and implement enterprise-scale
Configure essential security controls (MFA, IAM) within the first minutes