100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

SC-900 PART 1; DESCRIBE THE CONCEPTS OF SECURITY AND COMPLIANCE TEST

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
05-02-2025
Written in
2024/2025

SC-900 PART 1; DESCRIBE THE CONCEPTS OF SECURITY AND COMPLIANCE TEST...

Institution
SC-900 PART 1; DESCRIBE THE CONCEPTS OF SECURITY
Course
SC-900 PART 1; DESCRIBE THE CONCEPTS OF SECURITY









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
SC-900 PART 1; DESCRIBE THE CONCEPTS OF SECURITY
Course
SC-900 PART 1; DESCRIBE THE CONCEPTS OF SECURITY

Document information

Uploaded on
February 5, 2025
Number of pages
7
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

SC-900 PART 1; DESCRIBE THE CONCEPTS OF
SECURITY AND COMPLIANCE TEST




Shared Responsibility Model
It defines which security tasks are the responsibility of cloud provider, and
which security tasks are the responsibility of the customer himself.
Consequently, it makes responsibilities clear.


On-premises datacenters
You are responsible for everything from physical security to encrypting
sensitive data


Infrastructure as a Service (IaaS)
cloud service that requires the most management by the cloud customer; cloud
customer still has responsibility for software components running on that
computing infrastructure such as operating systems, network controls,
applications, and protecting data


Platform as a Service (PasS)
Provides an environment to build, test, and deploy software applications. This
service enables you to quickly create an application without managing the
underlying infrastructure. The hardware and operating systems are managed by
the cloud provider while the customer manages the applications and data.


Software as a Service (SaaS)

, hosted and managed by the cloud provider, for the customer; licensed
subscription (Ex: Microsoft 365, Skype, Dynamics CRM); requires the least
amount of management by the could customer


Defense in depth
A defense that uses multiple types of security devices to protect a network. Also
called layered security;uses a series of mechanisms to slow the advance of an
attack


Example of layers of security
Physical
Identity and Access
Perimeter
Network
Compute
Application
Data


Physical security
limit access to a datacenter to authorized personnel only


Identify and access security controls
control access to infrastructure and change control, such as multifactor
authentication or condition-based access


Perimeter security of network

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
luzlinkuz Chamberlain University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1428
Member since
4 year
Number of followers
849
Documents
27650
Last sold
1 day ago

3.7

303 reviews

5
131
4
61
3
54
2
17
1
40

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions