Cloud Platform & Infrastructure Security
Design secure cloud infrastructure and platform components.
Cloud Platform and Infrastructure Security, constituting Domain 3 of the Certified Cloud Security Professional (CCSP) certification, focuses on securing the physical and virtual foundations of the cloud environment. It addresses the design, implementation, and risk management of the underlying comp…
Concepts covered: Cloud infrastructure components, Secure data center design, Risk assessment and analysis of cloud infrastructure, Cloud vulnerabilities, threats, and attacks, Virtualization risks, Countermeasure strategies, Design and plan security controls, Physical and environmental protection, System and communication protection, Virtualization systems protection, Identification and authentication, Audit mechanisms, Disaster recovery (DR) and business continuity (BC) strategy
CCSP - Cloud Platform & Infrastructure Security Example Questions
Test your knowledge of Cloud Platform & Infrastructure Security
Question 1
A cloud architect is finalizing the security design for a legacy financial calculation engine moving to a public IaaS provider. The design must guarantee that the application's data-in-use is cryptographically isolated from the cloud provider's hypervisor, satisfying the requirement to process existing binaries without code modification. Additionally, the system must utilize a cryptographic challenge to verify the host's integrity before releasing sensitive parameters. Which security architecture satisfies these specific constraints?
Question 2
A security architect is designing an authentication flow for a Single Page Application (SPA) involving a public client that cannot securely store secrets. To effectively mitigate authorization code interception attacks and ensure that the entity exchanging the code for a token is the same entity that initiated the request, which standard protocol extension should be implemented?
Question 3
During a forensic investigation of a compromised cloud workload, security analysts discover that an attacker manipulated a server-side image rendering function to force the application to issue HTTP GET requests to the link-local IPv4 address 169.254.169.254. This action allowed the extraction of temporary security credentials assigned to the compute resource's identity role. Which specific attack vector exploits this trust relationship between the virtual instance and the cloud control plane?