Analyzing Weak Areas of the Federal Cloud Security Program
Offered By: YouTube
Course Description
Overview
Explore the weaknesses in the Federal Cloud Security Program through this insightful 54-minute conference talk from DerbyCon 4. Delve into the intricacies of FedRAMP, including its categories and purpose, while examining the 2013 IRS audit. Gain a comprehensive understanding of crucial aspects such as accountability, security measures, system boundaries, and the Critical 28 List. Investigate system interconnection, data collection practices, penetration testing methodologies, and internal threat assessment. Conclude with an examination of continuous monitoring strategies to enhance federal cloud security.
Syllabus
Intro
What is FedRAMP
Categories of FedRAMP
Why FedRAMP
The IRS
IRS 2013 Audit
Accountability
Security
System Boundary
Critical 28 List
System Interconnection
Data Collection
Penetration Test
Internal Threat
Continuous Monitoring
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube