Security & Compliance Basics

Table of contents

  1. Table of contents
  2. Overview
  3. Core Security Principles
    1. The CIA Triad
    2. Defense in Depth
    3. Principle of Least Privilege
    4. Zero Trust Security Model
  4. Identity and Access Management (IAM)
    1. Authentication vs. Authorization
    2. Multi-Factor Authentication (MFA)
    3. Role-Based Access Control (RBAC)
  5. Data Protection Fundamentals
    1. Data Classification
    2. Data Encryption
    3. Data Loss Prevention (DLP)
  6. Network Security Basics
    1. Core Controls
  7. Common Security Threats
    1. Cloud-Specific Considerations
  8. Compliance Frameworks Overview
    1. What is Compliance?
    2. Major Frameworks
    3. Cloud Compliance
  9. Risk Management Principles
    1. Risk Process
    2. Business Continuity
  10. Security Governance
  11. Cloud Security Best Practices
  12. Industry-Specific Considerations
  13. Summary
  14. Next Steps
  15. Additional Resources

Overview

Security and compliance are fundamental considerations in cloud computing. Understanding basic security principles and compliance frameworks is essential for making informed decisions about cloud adoption and ensuring appropriate protection of organizational assets and data.

Core Security Principles

View Diagram: The CIA Triad

CIA Triad showing Confidentiality, Integrity, and Availability Figure: The CIA Triad forms the foundation of information security

The CIA Triad

The foundation of information security rests on three core principles:

Confidentiality

  • Ensures information is accessible only to authorized individuals
  • Protects sensitive data from unauthorized disclosure
  • Implemented through access controls, encryption, and authentication

Integrity

  • Ensures information remains accurate, complete, and unaltered
  • Protects against unauthorized modification or destruction
  • Implemented through checksums, digital signatures, and version control

Availability

  • Ensures information and systems are accessible when needed
  • Protects against disruption of service or access
  • Implemented through redundancy, backup systems, and disaster recovery

Defense in Depth

View Diagram: Defense in Depth Layers

Defense in Depth showing 7 security layers Figure: Multiple layers of security controls provide comprehensive protection

Multiple layers of security controls (physical, network, endpoint, application, data, identity, administrative) provide comprehensive protection.

Principle of Least Privilege

Users receive only minimum permissions necessary for their role. Regular review and time-bound access reduce risk.

Zero Trust Security Model

Never trust, always verify. Continuous verification of identity and device state with conditional access based on risk.

Identity and Access Management (IAM)

Authentication vs. Authorization

Authentication (Who are you?): Verifies identity through passwords, MFA, biometrics Authorization (What can you do?): Determines access permissions based on roles and policies

Multi-Factor Authentication (MFA)

Combines multiple verification factors:

  • Knowledge: Passwords, PINs
  • Possession: Mobile phones, hardware tokens
  • Inherence: Biometrics (fingerprint, facial recognition)

Role-Based Access Control (RBAC)

Users assigned to roles based on job responsibilities. Roles have predefined permissions, simplifying management and compliance.

Data Protection Fundamentals

Data Classification

Public: No harm if disclosed Internal: Internal use only, basic controls Confidential: Could cause harm, enhanced protection Restricted: Severe damage potential, highest protection

Data Encryption

In Transit: Protects data moving between systems (TLS/SSL, IPsec) At Rest: Protects stored data (files, databases, backups) Key Management: Secure key generation, storage, rotation; HSMs for high-value keys

Data Loss Prevention (DLP)

Monitors data movement, identifies sensitive patterns, blocks/alerts on policy violations

Network Security Basics

Core Controls

Firewalls: Control traffic based on security rules, first line of defense VPNs: Encrypted tunnels for secure remote access Network Segmentation: Isolate resources to limit breach impact

Common Security Threats

Malware: Viruses, ransomware; mitigate with antivirus, patching, training Phishing: Fraudulent communications; mitigate with training, filtering, MFA Social Engineering: Psychological manipulation; mitigate with awareness training Insider Threats: Internal risks; mitigate with access controls, monitoring

Cloud-Specific Considerations

Shared Responsibility: Provider secures infrastructure, customer secures data/apps Data Location: Understand storage locations and residency requirements Account Management: Secure cloud accounts and integrate with identity systems

Compliance Frameworks Overview

What is Compliance?

Meeting legal, regulatory, and industry requirements; following standards; demonstrating due diligence.

View Diagram: Compliance Frameworks Comparison

Compliance Frameworks showing GDPR, HIPAA, SOC 2, PCI DSS, FedRAMP, and ISO 27001 comparison Figure 1: Major compliance frameworks and their key focus areas

Major Frameworks

SOC 2: Service provider security, availability, confidentiality, privacy ISO 27001: International information security management standard GDPR: EU data protection and privacy regulation HIPAA: US healthcare data protection (PHI) PCI DSS: Credit card data security requirements

Cloud Compliance

Shared Responsibility: Providers achieve certifications, customers ensure compliant use Benefits: Professional controls, third-party audits, automated monitoring, cost-effective access

Risk Management Principles

Risk Process

Identification: Identify threats, vulnerabilities, and asset value Analysis: Assess impact and probability, prioritize by severity Treatment: Accept, avoid, mitigate, or transfer risks

Business Continuity

Impact Analysis: Define RTO/RPO for critical processes Disaster Recovery: Backup procedures, alternative sites, regular testing High Availability: Redundancy, failover, geographic distribution

Security Governance

Policies: High-level management intent, acceptable use, accountability Procedures: Detailed implementation guidelines and standards Training: Regular awareness training, phishing simulations, role-specific training Continuous Improvement: Regular assessments, lessons learned, threat updates

Cloud Security Best Practices

Account Security: MFA enabled, regular password updates, access reviews, admin/user separation Data Protection: Encryption at rest and in transit, key management, automated backups, recovery testing Monitoring: Continuous security monitoring, automated alerts, log analysis, regular assessments Incident Response: Defined procedures, clear roles, communication plans, post-incident reviews

Industry-Specific Considerations

Healthcare: HIPAA compliance (administrative, physical, technical safeguards) Financial: SOX, PCI DSS, GLBA, Basel III requirements Government: FedRAMP, FISMA, ITAR compliance

Summary

Security and compliance are foundational to successful cloud adoption. Key principles include:

  • CIA Triad: Confidentiality, Integrity, Availability
  • Defense in Depth: Multiple layers of security controls
  • Identity and Access Management: Authentication and authorization
  • Data Protection: Classification, encryption, and loss prevention
  • Compliance Frameworks: Understanding regulatory requirements
  • Risk Management: Assessment, treatment, and continuous monitoring

Understanding these basics prepares you for more advanced security topics and helps ensure appropriate protection in cloud environments.

Next Steps

  1. ✅ Review security principles and their applications
  2. ✅ Consider how these concepts apply to your organization
  3. ✅ Continue to Data Protection Principles
  4. ✅ Study Compliance Frameworks
  5. ✅ Review Identity and Access Basics
  6. ✅ Complete Module 2 Knowledge Check

Additional Resources


Last Updated: November 2025