<div dir="ltr"><div><div class="gmail_signature"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><a href="https://cloudtweaks.com/2017/10/certification-cloud-service-providers/">https://cloudtweaks.com/2017/10/certification-cloud-service-providers/</a><br></div><div dir="ltr"><br></div><div dir="ltr"><h1>Certification for Cloud Service Providers</h1>
<p>As of 2017, the concept of “<em>cloud</em>” has become more of a norm
for companies and organizations worldwide. Most now use cloud service
providers (CSPs) for some part of their business, and cloud has grown
from simply being an IT concern to a C-level concern. Debate continues
over the varieties of cloud available, such as on-premise, hybrid,
public and private, and it is an industry that according to Global
Industry Analysts, Inc., will reach over $127 billion by the end of the
year.</p>
<h2>Problems</h2>
<p>Since so much data is now being stored on cloud servers, CSPs must be
vigilant and proactive to ensure their clients’ vital digital property
is never compromised, infected, or held for ransom. The potential for
damage extends well beyond simple data loss; companies can face
litigation, fines, and destruction of their reputation and brand if
their cloud platform is breached.</p>
<p>Cloud security is a joint responsibility: organizations bear some
obligation to protect their data, but so, too, do the CSPs themselves.
As a result, many CSPs realize that despite the substantial technology
and human expertise they have at their disposal, the threats are varied
and persistent. They must seek to stay one step ahead to continue
serving as a trusted technology and security advisor to their clients.
This is when certification can make a big difference.</p>
<p>While there are many compliance certifications that CSPs maintain,
having certified cloud security professionals on staff, and also having
them as third-party contractors, provides an opportunity for CSPs to
bolster their reputation and expertise. This is especially useful when
customers have reservations about cloud computing. Cloud security
certification confers credibility and helps reassure the customer of a
CSP’s status as a trusted technology and security advisor in the cloud.</p>
<h2>The Power of the CCSP Designation</h2>
<p>The CCSP (<a href="https://cloudtweaks.com/2015/11/cloud-security-insights-ccsp-pros/">Certified Cloud Security Professional</a>)
designation was co-created by (ISC)² and Cloud Security Alliance, and
is a globally recognized credential representing the highest standard of
cloud security expertise. The certification attests to deep, up-to-date
knowledge and hands-on experience with cloud security architecture,
design, operations, and service orchestration.</p>
<p>To qualify, candidates must already possess a minimum of five years
cumulative, paid, full-time work experience in information technology,
of which three years must be in information security and one year in one
or more of the six domains of the CCSP Common Body of Knowledge (CBK).</p>
<p>Why should anyone pursue such a designation, and why should CSPs or their clients care about it?</p>
<p>As highly trained experts, CCSPs work either within an organization
or as external contractors. Their role is to stay ahead of the trends,
threats, and other developments that the often-overtaxed members of an
internal IT team have little time to review. These include:</p>
<ul>
<li style="padding-left:30px">Assessing the viability and security of APIs</li>
<li style="padding-left:30px">Detecting compromised credentials, poor
password hygiene and insufficient authentication, including one-off
activities like forgetting to de-activate the credentials of people who
have left the project or company.</li>
<li style="padding-left:30px">Incorporation of multifactor authentication</li>
<li style="padding-left:30px">Assessing the CSP’s security around the identity platform</li>
<li style="padding-left:30px">Evaluating the potential for a cloud application to be used as an attack launchpad</li>
<li style="padding-left:30px">Scanning for vulnerabilities and bugs</li>
<li style="padding-left:30px">Scanning for sabotage or people acting as weak links</li>
<li style="padding-left:30px">Training and consulting on employee awareness against phishing and other forms of external attack</li>
<li style="padding-left:30px">Training employees on the use of BYOD devices</li>
</ul>
<p>CCSPs assist with software and patches, vulnerability testing,
auditing and training/awareness programs based on the most up-to-date
knowledge. They are also well-versed in discussing strategy, planning
and crisis management with people outside the IT department,
specifically the executive.</p>
<h2>The Need for Constantly Updated Risk Awareness and Mitigation</h2>
<p>Attacks come from every type of connection point; not just cloud, but
every other type of technology that touches a company, such as SaaS
services, BYOD devices, even phishing emails. According to some experts,
more than 400,000 new malware instances are recognized daily.</p>
<p>Cloud service providers must be able to protect themselves as well as
their customers, while simultaneously staying competitive, through
innovation, scalability, and reliability. Much like a physician who must
stay healthy while supporting the health of her patients, CSPs must be
constantly on guard for threats and must stay permanently up-to-date.
They must use tools and configurations that are very different from
those that they give to their customers, for example, the technologies
and protocols specific to hypervisor environments, which must remain
isolated from their customers’ own structure.</p>
<p>CCSPs must also ensure their clients keep tabs on cloud security
challenges that happen on an individual level, for example, when
employees either choose or unwittingly start to use convenient
commercial “DropBox-style” cloud storage providers or even infected USB
drives. When they use these technologies, employees inevitably lead
their companies into situations of heightened vulnerability by
circumventing established security protocols.</p>
<h2>The Need to Constantly Deliver Proof of Security</h2>
<p>Ultimately, cloud service providers must satisfy the customer’s
concerns around a range of issues. These include transparency regarding
where the data resides and how it is being protected; proof of a CSP’s
ability to protect that data; proof of experience and up-to-date
capability, and a guarantee of available resources and expertise.</p>
<p>CCSPs give cloud service providers the capacity to build, operate,
and demonstrate a security policy that can be proactive, and which is
also able to react with great speed, accuracy, and completeness.</p>
<p>The CCSP allows the cloud service provider to remain a trusted
advisor and a trusted repository of their customers’ vital data,
prosperity and reputation.</p><br clear="all"><div><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><b><span style="font-size:10pt"></span></b><span style="font-size:10pt"></span><span style="font-family:arial,helvetica,sans-serif"></span><br><br></div></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div>