Site icon TheCyberThrone

CCSP Domain 1 — Cloud Concepts, Architecture & Design Detailed Notes

Advertisements

Preface

Cloud computing has transformed how organizations build, deploy, and secure their digital ecosystems. As enterprises shift from traditional data centers to API-driven, distributed cloud environments, the need for strong architectural principles and security frameworks becomes paramount. CCSP Domain 1 lays the foundation for understanding this transformation by defining the essential concepts, roles, technologies, and design considerations that govern secure cloud adoption.

This domain introduces the core elements of cloud computing—from NIST characteristics and service models to emerging technologies like containers, serverless, and edge computing. It emphasizes the importance of shared responsibility, secure design patterns, and well-engineered architectures that align with business objectives. It also guides professionals in evaluating cloud service providers, assessing risks, and ensuring compliance through internationally recognized certifications such as Common Criteria (CC) and FIPS 140-2/3.

Ultimately, Domain 1 prepares security practitioners to navigate the complexities of cloud environments with clarity and confidence. It equips them with the foundational knowledge needed to build resilient, scalable, and compliant cloud architectures that can withstand modern threats and support future technological evolution.

1.1 – Understand Cloud Computing Concepts

Cloud Computing Definitions

Cloud Computing Roles & Responsibilities

Cloud Service Customer (CSC)

Cloud Service Provider (CSP)

Cloud Service Partner

Cloud Service Broker

Regulator

Key Cloud Characteristics

On-Demand Self-Service

Broad Network Access

Resource Pooling / Multi-Tenancy

Rapid Elasticity & Scalability

Measured Service

Building Block Technologies

Virtualization

Storage Technologies

Networking

Databases

Orchestration


1.2 – Cloud Reference Architecture

Cloud Computing Activities

Cloud Service Capabilities

Application Capabilities (SaaS)

Platform Capabilities (PaaS)

Infrastructure Capabilities (IaaS)

Cloud Service Categories (SaaS, PaaS, IaaS)

Cloud Deployment Models

Public Cloud

Private Cloud

Hybrid Cloud

Community Cloud

Multi-Cloud

Cloud Shared Considerations

Impact of Related Technologies

Data Science, ML, AI

Blockchain

IoT

Containers & Kubernetes

Quantum Computing

Edge Computing

Confidential Computing

DevSecOps


1.3 – Security Concepts Relevant to Cloud Computing

Cryptography & Key Management

Identity & Access Control

User Access

Privileged Access Management (PAM)

Service Access (Machine/Workload Identities)

Data & Media Sanitization

Overwriting

Cryptographic Erase

  1. Deletes encryption keys to render data inaccessible instantly.
  2. Preferred in cloud due to lack of physical media access.

Network Security

Network Security Groups (NSG/Firewall)

Traffic Inspection

Geofencing

Zero Trust Network

Virtualization Security

Hypervisor Security

Container Security

Ephemeral Computing

Serverless Security

Common Threats

Security Hygiene

Patching

Baselining


1.4 – Design Principles of Secure Cloud Computing

Cloud Secure Data Lifecycle

Cloud-Based BC/DR Plan

Business Impact Analysis (BIA)

Functional Security Requirements

Security Responsibilities Across Cloud Service Models

SaaS

PaaS

IaaS

Cloud Design Patterns

SANS Security Principles

Well-Architected Framework (AWS/Azure/GCP)

CSA Enterprise Architecture

DevOps Security / DevSecOps


1.5 – Evaluate Cloud Service Providers

1. Common Criteria (CC)

Common Criteria (ISO/IEC 15408) is an international framework for evaluating the security functionality and assurance of IT products (hardware, software, systems).
It provides a standardized, repeatable method to determine how secure a product truly is.

1.1 Goals of Common Criteria

1.2 Core Components of CC

Let’s break them down:

1. Protection Profile (PP)

2. Security Target (ST)

3. Evaluation Assurance Levels (EAL 1–7)

These levels measure depth and rigor of testing.

EAL 1 – Functionally Tested

EAL 2 – Structurally Tested

EAL 3 – Methodically Tested & Checked

EAL 4 – Methodically Designed, Tested, Reviewed

EAL 5 – Semi-formally Designed & Tested

EAL 6 – Semi-formally Verified, Designed & Tested

EAL 7 – Formally Verified, Designed & Tested

1.3 CC Evaluation Process (All Stages)

Stage 1 — Preparation

Stage 2 — Evaluation Planning

Stage 3 — Documentation Review

Stage 4 — Testing & Analysis

Stage 5 — Assurance Evaluation

Stage 6 — Certification

Why Common Criteria Matters in Cloud

FIPS 140-2 / 140-3 Certification (Cryptographic Modules)

FIPS 140 is a U.S. and Canadian government standard for certifying cryptographic modules.
Used for cloud services, hardware security modules (HSMs), libraries, and encryption appliances.

2.1 What FIPS Certifies

FIPS 140 certifies:

2.2 FIPS 140 Security Levels (1–4)

FIPS Level 1 — Basic Security

FIPS Level 2 — Tamper-Evident

FIPS Level 3 — Tamper-Resistant

FIPS Level 4 — Highest Level


2.3 FIPS Evaluation Modules

Certifications cover 11 areas including:

  1. Cryptographic Module Specification
  2. Roles, Services & Authentication
  3. Finite State Model
  4. Physical Security
  5. Operational Environment
  6. Cryptographic Key Management
  7. Self-tests
  8. Design Assurance
  9. Mitigation of Attacks
  10. EMI/EMC
  11. Software/Firmware Security

2.4 FIPS 140 Evaluation Stages

Stage 1 — Submission

Stage 2 — Documentation Review

Stage 3 — Algorithm Testing

Stage 4 — Functional Testing

Stage 5 — Physical Security Testing (Levels 2–4)

Stage 6 — Attacks & Resistance

Stage 7 — Certification

Why FIPS Matters in Cloud

Exam Crams

  1. Know NIST cloud traits: On-demand, Access, Pooling, Elasticity, Measured service.
  2. Multi-tenancy risk → Isolation + hypervisor/container hardening.
  3. Shared responsibility: SaaS = provider, IaaS = customer, PaaS = shared.
  4. IAM first: MFA, least privilege, RBAC/ABAC, JIT, API key hygiene.
  5. Crypto: KMS vs HSM, rotation, separation, cryptographic erase.
  6. Secure Data Lifecycle: Create → Store → Use → Share → Archive → Destroy.
  7. Network: SG/NSG, WAF, ZTNA, microsegmentation, encrypted transit.
  8. Virtualization: Image scanning, hypervisor security, serverless config.
  9. BC/DR via multi-region, snapshots, RTO/RPO alignment.
  10. Key standards: ISO 27017, CC (EAL1–EAL7), FIPS 140-2/3.

Conclusion

Domain 1 establishes the foundational knowledge required to understand how cloud environments operate and how they should be secured. It connects cloud architecture, service models, emerging technologies, and shared responsibility into a cohesive security framework.

Mastery of this domain ensures professionals can evaluate cloud providers, design resilient architectures, and apply the correct controls at every layer of the cloud stack. With a deep understanding of these principles, practitioners are well prepared to support secure cloud transformation and make informed decisions that align with business, compliance, and risk objectives.

Exit mobile version