Get in Touch

Course Outline

Introduction to ISO 27017

  • Overview of ISO/IEC 27017
  • Relationship to ISO 27001 and ISO 27002
  • The importance of cloud security governance

Cloud Security Risks and Threats

  • Common security risks in cloud environments
  • Cloud-based attack vectors
  • Risk assessment methodologies for cloud services

Key Information Security Controls in ISO 27017

  • Additional cloud-specific controls
  • Shared security responsibilities between CSPs and customers
  • Data protection and encryption in the cloud

Implementing Cloud Security Policies

  • Defining security policies for cloud adoption
  • Access control and identity management
  • Security incident management in the cloud

Compliance and Regulatory Considerations

  • Legal and regulatory implications of cloud security
  • Mapping ISO 27017 to GDPR, HIPAA, and other regulations
  • Cloud compliance audits and certification processes

Best Practices for Cloud Security

  • Security monitoring and threat detection
  • Implementing continuous improvement in cloud security
  • Ensuring resilience and disaster recovery

Hands-On Implementation and Case Studies

  • Applying ISO 27017 controls in real-world scenarios
  • Reviewing cloud security case studies
  • Interactive exercises on cloud security strategy

Summary and Next Steps

Requirements

  • A fundamental understanding of cloud computing.
  • Knowledge of general information security principles.
  • Familiarity with ISO 27001 or other cybersecurity frameworks.

Target Audience

  • Cloud security professionals.
  • IT security managers.
  • Compliance officers.
  • Cloud service providers.
 14 Hours

Number of participants


Price per participant

Testimonials (2)

Upcoming Courses

Related Categories