Legal, Risk and Compliance
Understand legal requirements, privacy issues, and risk management in the cloud.
In the context of the Certified Cloud Security Professional (CCSP) certification, Legal, Risk, and Compliance represent the foundational governance structure required to manage cloud security effectively. **Legal** issues in the cloud are complex due to the lack of physical boundaries. A primary f…
Concepts covered: Conflicting international legislation, Evaluation of legal risks specific to cloud computing, Legal framework and guidelines, eDiscovery, Forensics requirements, Privacy issues, Contractual vs regulated private data, Country-specific legislation related to private data, Jurisdictional differences in data privacy, Standard privacy requirements, Privacy Impact Assessments (PIA), Audit process, methodologies, and adaptations, Internal and external audit controls, Impact of audit requirements, Assurance challenges of virtualization and cloud, Types of audit reports, Restrictions of audit scope statements, Gap analysis, Audit planning, Internal information security management system, Policies, Identification and involvement of relevant stakeholders, Specialized compliance requirements, Impact of distributed IT model, Cloud to enterprise risk management implications, Assess providers risk management programs, Data owner/controller vs. data custodian/processor, Regulatory transparency requirements, Risk treatment, Risk frameworks, Metrics for risk management, Assessment of risk environment, Outsourcing and cloud contract design, Vendor management, Contract management, Supply-chain management
CCSP - Legal, Risk and Compliance Example Questions
Test your knowledge of Legal, Risk and Compliance
Question 1
A European financial entity archives client records to a US-based cloud storage provider. To mitigate risks associated with US surveillance laws identified in a Transfer Impact Assessment, the entity seeks to rely on the 'Use Case 1' architecture defined in EDPB Recommendations 01/2020. Which technical implementation successfully satisfies the requirement for effective supplementary measures preventing access by public authorities?
Question 2
A financial enterprise is onboarding a SaaS platform hosted on a separate public cloud infrastructure. To strictly align with Enterprise Risk Management (ERM) best practices regarding Nth-party supply chain risks, how should the organization strategically structure its assurance activities for the underlying infrastructure?
Question 3
A European e-commerce retailer intends to host a backup database containing EU citizen personally identifiable information (PII) in a data center located in Buenos Aires, Argentina. Which regulatory classification allows the retailer to transfer this data to the Argentinian facility with legal friction comparable to intra-EU transfers?