All Episodes
Displaying 21 - 40 of 99 in total
Episode 22 — Network Architectures: Virtual Networks, Peering and Segmentation
Networking is at the heart of cloud security, and understanding its architecture is essential for success. This episode walks through how cloud platforms implement vir...

Episode 23 — Resilience by Design: Availability, Fault Tolerance and DR Patterns
Cloud computing makes resilience both easier to achieve and more complex to manage. This episode focuses on designing for availability, fault tolerance, and disaster r...

Episode 24 — Threat Modeling: Cloud-Specific Approaches and Patterns
Threat modeling is a proactive practice for identifying risks before they become incidents. In this episode, we introduce cloud-specific approaches to threat modeling,...

Episode 25 — Governance & Design: Policies, Standards and Guardrails as Code
Effective governance ensures that cloud adoption aligns with both security and business goals. This episode explores how policies, standards, and design guardrails are...

Episode 26 — Domain 2 Overview: Cloud Data Security
Domain 2 focuses on protecting data throughout its lifecycle. In this episode, we provide an overview of what the exam expects in this domain, from classification and ...

Episode 27 — Data Lifecycle: Create, Store, Use, Share, Archive and Destroy
Understanding the data lifecycle is fundamental to managing information securely in the cloud. This episode walks through each stage—creation, storage, usage, sharing,...

Episode 28 — Data Discovery: Catalogs and Classification at Scale
Data discovery is a critical step in understanding what information you hold and where it resides. In this episode, we discuss how discovery tools and catalogs are use...

Episode 29 — Data Classification: Sensitivity Labels and Handling Rules
Classification assigns value and handling requirements to data, and it’s central to both exam content and real-world practice. This episode explains the different leve...

Episode 30 — Data Protection: Encryption at Rest and In Transit
Encryption is one of the strongest defenses in the cloud, and the CCSP exam devotes significant focus to it. In this episode, we explore encryption at rest and in tran...

Episode 31 — Encryption in Use: Confidential Computing and Memory Protections
Encryption isn’t only about data at rest or in transit—today’s cloud technologies also secure data while it is being processed. This episode explains the emerging fiel...

Episode 32 — Key Management: KMS, HSM, BYOK and HYOK Considerations
Effective key management is critical to making encryption usable and trustworthy. In this episode, we dive into concepts such as Key Management Systems (KMS), Hardware...

Episode 33 — Access to Data: ABAC, RBAC and Least Privilege Enforcement
Controlling access to data is as important as protecting it. This episode introduces Attribute-Based Access Control (ABAC), Role-Based Access Control (RBAC), and the p...

Episode 34 — Tokenization & Masking: Protecting Sensitive Fields
Tokenization and masking are techniques for reducing risk by substituting sensitive values with safe alternatives. This episode explains how tokenization preserves for...

Episode 35 — Data Loss Prevention: Patterns, Policies and Tuning
Data Loss Prevention (DLP) systems help prevent sensitive information from leaving controlled environments. In this episode, we describe how DLP works through pattern ...

Episode 36 — Data Retention: Backup, Archival and Versioning in Cloud
Retention policies dictate how long data must be preserved and in what form. This episode covers how cloud platforms implement backup, archival storage, and versioning...

Episode 37 — Secure Data Deletion: Sanitization and Crypto-Erase in Cloud
Secure deletion is essential to prevent residual data exposure when storage is repurposed or decommissioned. This episode explains sanitization methods, from overwriti...

Episode 38 — Data Sovereignty: Residency, Localization and Transfer Controls
Where data resides can be just as important as how it is secured. This episode explores sovereignty issues, including residency requirements, localization mandates, an...

Episode 39 — Privacy by Design: Minimization, Consent and DPIAs
Privacy by design integrates data protection principles into every stage of system development. This episode covers key practices such as data minimization, consent ma...

Episode 40 — E-Discovery & Legal Holds: Cloud Storage Implications
E-Discovery and legal holds present unique challenges in the cloud, where data may be distributed across services and regions. This episode explains how organizations ...

Episode 41 — Domain 3 Overview: Cloud Platform & Infrastructure Security
Domain 3 of the CCSP exam takes us into the technical backbone of the cloud: platforms and infrastructure. In this episode, we establish the scope of the domain, inclu...
