Course Outline
Security Foundations & Shared Responsibility
- Cloud service models (IaaS, PaaS, SaaS) and the role of application security within each.
- The shared responsibility model, with examples distinguishing customer versus provider responsibilities.
- Security baselines and configuration standards, including CIS benchmarks and provider-specific best practices.
Identity, Access Management & Zero Trust
- Fundamentals of Cloud IAM: roles, policies, groups, and least-privilege design.
- Federation, single sign-on, and multi-factor authentication within cloud environments.
- Zero Trust principles for cloud applications and network segmentation patterns.
Secure Infrastructure & Platform Hardening
- Hardening virtual machines, container hosts, and managed services using prescriptive checklists.
- Key management and encryption patterns (at-rest and in-transit); understanding KMS concepts and secrets management.
- Network controls, security groups, Web Application Firewall (WAF) basics, and protecting service endpoints.
Secure Software Development in the Cloud
- Secure SDLC concepts and "shift-left" practices: linting, SAST, dependency scanning, and Software Composition Analysis (SCA) integration.
- Secure coding patterns and common pitfalls (mapping OWASP Top Ten to cloud contexts).
- Handling secrets in code and environment variables; supply chain considerations regarding dependencies and CI/CD runners.
Application Threats, Vulnerabilities and Mitigations
- Web application threats: broken access control, injection, misconfigurations, cryptographic failures, and their cloud-specific manifestations.
- API security: authentication, rate limiting, schema validation, and API gateway controls.
- Runtime protections: WAF tuning, Runtime Application Self-Protection (RASP) concepts, and container runtime defenses.
Testing, Scanning and Continuous Assessment
- SAST, DAST, IAST, and dependency scanning: interpreting and triaging results.
- Cloud posture and configuration assessment: using CSPM/CNAPP tools, benchmarking, and automated compliance checks.
- Designing continuous monitoring: logging, telemetry, SIEM integration, and alerting (using CloudTrail, Azure Monitor, and GCP Logging as examples).
Penetration Testing and Vulnerability Management
- Planning secure cloud penetration tests: provider rules of engagement, scoping, and legal considerations.
- Common cloud attack paths and hands-on vulnerability exploitation demonstrations in a controlled lab environment.
- Remediation workflows, patching strategies, and vulnerability tracking using Key Performance Indicators (KPIs).
Data Security & Privacy in the Cloud
- Data classification, encryption architectures, and tokenization patterns.
- DBaaS and storage security: access controls, backups, and secure snapshots.
- Privacy and compliance considerations: data residency, GDPR fundamentals, and contractual controls.
Designing Secure Cloud-Native Applications
- Microservices, service meshes, and secure communication patterns (mTLS, mutual authentication).
- Container and Kubernetes security essentials: image hardening, scanning, and runtime policies.
- Serverless security considerations: least privilege, event injection, and implications of cold starts.
Incident Response, Audit & Governance
- Incident detection and response in cloud environments: playbooks, forensics, and evidence collection.
- Audit and third-party assessment: penetration tests, security reviews, and certification mapping.
- Governance, policy automation, and measuring security posture over time.
Capstone Lab: Secure an Example Cloud Application
- Baseline review: conducting a cloud configuration scan and application SAST/DAST scans.
- Implementing fixes: enforcing IAM least-privilege, encryption, and CI/CD security gating.
- Validating improvements and producing a remediation and monitoring roadmap.
Summary and Next Steps
Requirements
- A foundational understanding of general software development concepts.
- Experience with at least one programming language or web stack.
- Familiarity with basic networking and operating system principles.
Target Audience
- Developers
- Managers
- IT and security professionals
Testimonials (1)
Azure web security, it was more what i was expecting, the penetration testing i would never do in my job