Course Outline

Introduction to ISO 27017

  • Overview of ISO/IEC 27017
  • Relation to ISO 27001 and ISO 27002
  • Importance of cloud security governance

Cloud Security Risks and Threats

  • Common security risks in cloud environments
  • Cloud-based attack vectors
  • Risk assessment methodologies for cloud services

Key Information Security Controls in ISO 27017

  • Additional cloud-specific controls
  • Shared security responsibilities between CSPs and customers
  • Data protection and encryption in the cloud

Implementing Cloud Security Policies

  • Defining security policies for cloud adoption
  • Access control and identity management
  • Security incident management in the cloud

Compliance and Regulatory Considerations

  • Legal and regulatory implications of cloud security
  • Mapping ISO 27017 to GDPR, HIPAA, and other regulations
  • Cloud compliance audits and certification processes

Best Practices for Cloud Security

  • Security monitoring and threat detection
  • Implementing continuous improvement in cloud security
  • Ensuring resilience and disaster recovery

Hands-On Implementation and Case Studies

  • Applying ISO 27017 controls in real-world scenarios
  • Reviewing cloud security case studies
  • Interactive exercises on cloud security strategy

Summary and Next Steps

Requirements

  • Basic understanding of cloud computing
  • Knowledge of general information security principles
  • Familiarity with ISO 27001 or other cybersecurity frameworks

Audience

  • Cloud security professionals
  • IT security managers
  • Compliance officers
  • Cloud service providers
 14 Hours

Number of participants


Price per participant

Provisional Upcoming Courses (Require 5+ participants)

Related Categories