FINAL - CCSP Domain Chapter Mapping
FINAL - CCSP Domain Chapter Mapping
5.2.11 Configuration of host and guest operating system (OS) Chapter 6 Module 1
backup and restore functions
5.2.12 Management plane Chapter 1 Module 1,
Chapter 4 Modules 1&5
5.3 Implement operational controls and standards Chapter 6 Module 2
5.3.1 Change management Chapter 6 Module 2
5.3.2 Continuity management Chapter 6 Module 2
5.3.3 Information security management Chapter 6 Module 2
5.3.4 Continual service improvement management Chapter 6 Module 2
5.3.5 Incident management Chapter 6 Module 2
5.3.6 Problem management Chapter 6 Module 2
5.3.7 Release management Chapter 6 Module 2
5.3.8 Deployment management Chapter 6 Module 2
5.3.9 Configuration management Chapter 6 Module 2
5.3.10 Service level management Chapter 6 Module 2
5.3.11 Availability management Chapter 6 Module 2
5.3.12 Capacity management Chapter 6 Module 2
5.4 Support digital forensics Chapter 2 Module 2,
Chapter 6 Module 3
5.4.1 Forensic data collection methodologies Chapter 2 Module 2
5.4.2 Evidence management Chapter 2 Module 2,
Chapter 6, Module 3
5.4.3 Collect, acquire and preserve digital evidence Chapter 2 Module 2,
Chapter 6, Module 3
5.5 Manage communication with relevant parties Chapter 2 Module 2,
Chapter 6 Module 4
5.5.1 Vendors Chapter 6 Module 4
5.5.2 Customers Chapter 6 Module 4
5.5.3 Partners Chapter 6 Module 4
5.5.4 Regulators Chapter 6 Module 4
5.5.5 Other stakeholders Chapter 6 Module 4
5.6 Manage security operations Chapter 6 Module 6
5.6.1 Security operations center (SOC) Chapter 6 Module 6
5.6.2 Intelligent monitoring of security controls Chapter 4 Module 5,
Chapter 6 Module 1,
Chapter 6 Module 6
5.6.3 Log capture and analysis Chapter 6 Module 6
5.6.4 Incident management Chapter 6 Module 2
5.6.5 Vulnerability assessments Chapter 5 Module 4
Domain 6: Legal, Risk and Compliance
6.1 Legal requirements and unique risks in cloud environment Chapter 2 Module 1
6.1.1 Conflicting international legislation Chapter 2 Module 1
6.1.2 Evaluation of legal risks specific to cloud computing Chapter 2 Module 1
6.1.3 Legal framework and guidelines Chapter 2 Module 1
6.1.4 E-discovery Chapter 2 Module 2
6.1.5 Forensics requirements Chapter 2 Module 2
6.2 Understand privacy issues Chapter 2 Module 3
6.2.1 Difference between contractual and regulated private data Chapter 2 Module 3
6.2.2 Country-specific legislation related to private data Chapter 2 Module 3
6.2.3 Jurisdictional differences in data privacy Chapter 2 Module 3
6.2.4 Standard privacy requirement Chapter 2 Module 3
6.2.5 Privacy impact assessments (PIA) Chapter 2 Module 3
6.3 Understand audit process, methodologies, and required Chapter 2 Modules 3 & 4
adaptations for a cloud environment
6.3.1 Internal and external audit controls Chapter 2 Module 4
6.3.2 Impact of audit requirements Chapter 2 Module 4
6.3.3 Identify assurance challenges of virtualization and cloud Chapter 6 Module 2
6.3.4 Types of audit reports Chapter 2 Module 4
6.3.5 Restrictions of audit scope statements Chapter 2 Module 4
6.3.6 Gap analysis Chapter 2 Module 4
6.3.7 Audit planning Chapter 2 Module 4
6.3.8 Internal information security management system Chapter 2 Module 4
6.3.9 Internal information security controls system Chapter 2 Module 4
6.3.10 Policies Chapter 2 Module 4
6.3.11 Identification and involvement of relevant stakeholders Chapter 2 Module 4
6.3.12 Specialized compliance requirements for highly regulated Chapter 2 Modules 3 & 4
industries
6.3.13 Impact of distributed information technology (IT) model Chapter 2 Modules 3 & 4
6.4 Implications of cloud to enterprise risk management Chapter 2 Module 5
6.4.1 Assess provider’s risk management program Chapter 2 Module 5
6.4.2 Difference between Data owner/controller vs. data Chapter 2 Module 5
custodian/processor
6.4.3 Regulatory transparency requirements Chapter 2 Module 5
6.4.4 Risk treatment Chapter 2 Module 5
6.4.5 Different risk frameworks Chapter 2 Module 5
6.4.6 Metrics for risk management Chapter 2 Module 5
6.4.7 Assessment of risk environment Chapter 2 Module 5
6.5 Understand outsourcing and cloud contract design Chapter 2 Module 6
6.5.1 Business requirements Chapter 1 Module 5,
Chapter 2 Module 6
6.5.2 Vendor management Chapter 2 Module 6
6.5.3 Contract management Chapter 2 Module 6
6.5.4 Supply-chain management Chapter 2 Module 6