Isaca
CCAK
175
Certificate of Cloud Auditing Knowledge
A: Reporting tools are reliable and based on defined objectives.
B: The cloud service provider is compliant.
C: Assessment tools are configured based on cloud security best practices.
D: Application programming interfaces (APIs) implemented are appropriate.
A: CCM mapping enables cloud service providers and customers alike to streamline their own compliance and security efforts.
B: CCM mapping entitles cloud service providers to be listed as an approved supplier for tenders and government contracts.
C: CCM mapping entitles cloud service providers to be certified under the CSA STAR program.
D: CCM mapping enables an uninterrupted data flow and in particular the export of personal data across different jurisdictions.
A: IT exception
B: Threat
C: Shadow IT
D: Vulnerability
A: Examine the cloud provider's certifications and ensure the scope is appropriate.
B: Document the requirements and responsibilities within the customer contract
C: Interview the cloud security team and ensure compliance.
D: Pen test the cloud service provider to ensure compliance.