Core technical questions specific to cloud security and infrastructure protection.
IAM differences, security services, compliance offerings
Unified security, cross-cloud monitoring, policy management
Provider vs customer responsibilities, security boundaries
SOC 2, PCI DSS, HIPAA, GDPR in cloud environments
Role-based access, permission policies, regular audits
SAML, OIDC, SSO integration, directory services
Secret managers, rotation policies, encryption
Just-in-time access, session recording, approval workflows
VPCs, security groups, network ACLs, transit gateways
WAF, DDoS protection, traffic filtering, threat intelligence
Identity verification, micro-segmentation, continuous monitoring
Site-to-site VPN, client VPN, direct connect, peering
CloudTrail, CloudWatch, security hub, custom dashboards
CSPM tools, configuration scanning, compliance monitoring
Automated response, forensics, containment strategies
Policy enforcement, cost management, resource optimization
Real-world scenarios to test your practical cloud security skills.
Account structure, cross-account access, centralized security
Identity-based access, network segmentation, continuous verification
On-premises integration, consistent security, unified management
Risk assessment, security controls, compliance requirements
Access revocation, forensics, containment, recovery
Data classification, breach notification, remediation
Backup strategies, recovery procedures, prevention
Evidence collection, control validation, remediation
Essential tools and technologies every cloud security engineer should know.