CompTIA Secure Cloud Professional
1 Cloud Concepts and Models
1-1 Cloud Computing Overview
1-2 Cloud Service Models (IaaS, PaaS, SaaS)
1-3 Cloud Deployment Models (Public, Private, Hybrid, Community)
1-4 Cloud Characteristics (On-demand self-service, Broad network access, Resource pooling, Rapid elasticity, Measured service)
2 Cloud Security Concepts
2-1 Security in the Cloud
2-2 Shared Responsibility Model
2-3 Cloud Security Controls
2-4 Cloud Security Posture Management (CSPM)
3 Cloud Governance and Compliance
3-1 Governance in the Cloud
3-2 Compliance and Regulatory Requirements
3-3 Data Sovereignty and Residency
3-4 Cloud Service Agreements (CSAs)
4 Cloud Data Security
4-1 Data Classification and Handling
4-2 Data Encryption in the Cloud
4-3 Data Loss Prevention (DLP)
4-4 Data Lifecycle Management
5 Cloud Infrastructure Security
5-1 Virtualization Security
5-2 Network Security in the Cloud
5-3 Identity and Access Management (IAM)
5-4 Security Monitoring and Logging
6 Cloud Application Security
6-1 Secure Development Lifecycle (SDLC) in the Cloud
6-2 Application Security Testing
6-3 API Security
6-4 Secure Configuration Management
7 Cloud Incident Response and Disaster Recovery
7-1 Incident Response in the Cloud
7-2 Disaster Recovery Planning
7-3 Business Continuity Planning
7-4 Backup and Restore Strategies
8 Cloud Risk Management
8-1 Risk Assessment and Management
8-2 Threat Modeling in the Cloud
8-3 Vulnerability Management
8-4 Cloud Security Audits and Assessments
9 Cloud Security Operations
9-1 Security Operations Center (SOC) in the Cloud
9-2 Continuous Monitoring and Detection
9-3 Incident Management and Response
9-4 Security Automation and Orchestration
10 Cloud Security Technologies and Tools
10-1 Cloud Access Security Brokers (CASBs)
10-2 Security Information and Event Management (SIEM)
10-3 Intrusion Detection and Prevention Systems (IDPS)
10-4 Cloud Workload Protection Platforms (CWPPs)
11 Cloud Security Best Practices
11-1 Security Policies and Procedures
11-2 Security Awareness and Training
11-3 Vendor Management and Third-Party Risk
11-4 Continuous Improvement and Innovation
Data Sovereignty and Residency

Data Sovereignty and Residency

Key Concepts

Data Sovereignty and Residency are critical aspects of cloud computing that address where data is stored and who has jurisdiction over it. Understanding these concepts is essential for ensuring compliance with legal and regulatory requirements.

Data Sovereignty

Data Sovereignty refers to the concept that data is subject to the laws and regulations of the country in which it is physically located. This means that the legal jurisdiction over the data is determined by its geographical location, regardless of where the data owner or cloud provider is based.

For example, if a company stores data in a cloud server located in Germany, that data is subject to German data protection laws, such as the General Data Protection Regulation (GDPR). This means the company must comply with GDPR requirements, even if the company is headquartered in the United States.

Data Residency

Data Residency refers to the physical or geographic location of data storage. It is concerned with where the data is physically stored and processed. Many countries have specific regulations that require certain types of data to be stored within their borders.

For instance, India has regulations that mandate that sensitive personal data of Indian citizens must be stored within the country. This means that any company operating in India must ensure that such data is stored on servers located in India, regardless of the company's global presence.

Examples and Analogies

Think of Data Sovereignty as the legal jurisdiction that applies to a piece of land. Just as a country has laws that govern activities within its borders, data stored within a country's borders is subject to that country's laws.

Data Residency can be compared to the physical address of a house. Just as a house is located in a specific place, data is stored in a specific location. This location determines which laws and regulations apply to the data.

Understanding Data Sovereignty and Residency is crucial for organizations to ensure compliance with local laws and regulations, protect sensitive data, and avoid legal penalties.