Cloud Controls Matrix (CCM) Flashcards
If you wanted to determine whether a certain cloud environment satisfied data backup and recovery requirements, which Domain of the CCM should you refer to?
A. Governance and Risk Management
B. Human Resources Security
C. Mobile Security
D. Business Continuity Management and Operational Resilience
Answer: D
The BCR Domain in the CCM includes data backup and recovery controls. See BCR-01 in the CCM.
Which Domain of the CCM might be used to determine if a cloud environment is in compliance with ITIL Service Management requirements?
A. Application and Interface Security
B. Change Control and Configuration Management
C. Datacenter Security
D. Threat and Vulnerability Management
Answer: B
The CCC Domain addresses elements of the ITIL Service Management requirements. See CCC-02 and CCC-03 in the CCM.
Which Domain of the CCM is used to demonstrate the commitment of senior leadership to an information security program?
A. Audit Assurance and Compliance
B. Change Control and Configuration Management
C. Governance and Risk Management
D. Infrastructure and Virtualization
Answer: C
GRM-05 in the CCM specifically addresses senior management’s commitment to the information security program.
Which Domain of the CCM addresses the roles of employees and contractors in the cloud environment?
A. Datacenter Security
B. Human Resources Security
C. Interoperability and Portability
D. Supply Chain Management, Transparency, and Accountability
Answer: B
HRS-07 in the CCM specifically addresses the roles and responsibilities of employees, contractors, and third parties.
Which Domain of the CCM addresses the concept of least privilege?
A. Application and Interface Security
B. Audit Assurance and Compliance
C. Identity and Access Management
D. Mobile Security
Answer: C
IAM-02, IAM-06, IAM-08, and IAM-10 in the CCM specifically address the concept of least privilege. Least privilege is also mentioned in the Infrastructure and Virtualization Domain, but this was not one of the options listed.
Which control listed in the CCM prohibits the use of non-approved applications in the cloud environment?
A. MOS-03
B. STA-02
C. TVM-03
D. WPA2
Answer: A
MOS-03 requires the cloud environment to be governed by a policy limiting the use of non-approved applications or applications from untrusted sources.
WPA2 is not a control in the CCM; it is a wireless security standard.
Which control listed in the CCM recommends using file integrity monitoring when creating an operating system baseline?
A. GRM-10
B. HRS-03
C. IAM-02
D. IVS-07
Answer: D
Which control listed in the CCM discusses policies for encryption key generation?
A. EKM-01
B. EKM-02
C. EKM-03
D. EKM-04
Answer: B
Policies addressing encryption key generation are mentioned in EKM-02.
Which type of cloud architecture is control HRS-02 applied to? [select all that apply]
A. Physical
B. Network
C. Compute
D. Storage
E. Application
F. Data
Answer: F
Which type of cloud architecture is control IAM-11 applied to? [select all that apply]
A. Physical
B. Network
C. Compute
D. Storage
E. Application
F. Data
Answer: A, B, C, D, E, F
IAM-11 applies to all architectures.
Which type of cloud architecture is control IVS-07 applied to? [select all that apply]
A. Physical
B. Network
C. Compute
D. Storage
E. Application
F. Data
Answer: C
IVS-07 applies to the Computer architecture.
According to the CCM, which type of cloud service model requires a mechanism to monitor and quantify the types, volumes, and costs of information security incidents?
A. IaaS
B. PaaS
C. SaaS
D. All of the above
E. None of the above
Answer: D
SEF-05 applies to all types of cloud service models.
According to the CCM, which cloud service model requires that the provider ensure the integrity of all virtual machine images at all times?
A. IaaS
B. PaaS
C. SaaS
D. All of the above
E. None of the above
Answer: A
IVS-02 applies to the IaaS model.
According to the CCM, which entity is responsible for ensuring that security vulnerability assessment tools are “virtualization aware”?
A. the cloud provider
B. the cloud customer
C. the regulator
D. the taxpayer
Answer: A
IVS-05 is the responsibility of the provider. Regulators and taxpayers are generally outside the scope of cloud security responsibility.
According to the CCM, which entity is responsible for ensuring the operating system baseline template of a virtualized machine is hardened appropriately?
A. the cloud provider
B. the cloud customer
C. neither the provider nor the customer
D. both the provider and the customer
Answer: D
IVS-07 is the responsibility of both the cloud provider and the customer.