Home / cybersecurity / Certified Cloud Security Professional / Cheat Sheet
Certified Cloud Security Professional

Certified Cloud Security Professional Cheat Sheet

CCSP: You're Accountable for Cloud Security Even When You Don't Own the Infrastructure

The CCSP tests your ability to manage cloud risk across shared responsibility models, data sovereignty, and vendor governance.

Check Your Readiness →
Among the harder certs
Avg: Approximately 62–67%
Pass: 750 / 1000
Most candidates understand Certified Cloud Security Professional concepts — and still fail. This exam tests how you apply knowledge under pressure.

CCSP Shared Responsibility Matrix

CCSP tests 6 domains: Cloud Concepts & Architecture, Data Security, Platform & Infrastructure Security, Application Security, Compliance & Legal, and Operations. Shared responsibility and data sovereignty questions appear across all domains.

  1. 01
    IaaS — Customer owns OS, applications, data; vendor owns physical/network/virtualization
  2. 02
    PaaS — Customer owns applications and data; vendor owns platform and below
  3. 03
    SaaS — Customer owns data and access management; vendor owns everything else
  4. 04
    All models — Customer retains accountability for data classification and compliance
  5. 05
    Contractual controls — SLAs, right-to-audit, data portability must be in vendor contracts

Wrong instinct vs correct approach

A regulated healthcare company wants to move patient data to a public cloud provider
✕ Wrong instinct

Select the cheapest compliant cloud provider and proceed

✓ Correct approach

Classify the data, map regulatory requirements (HIPAA), assess the provider's compliance posture, negotiate a Business Associate Agreement, and implement customer-side access controls

A cloud provider experiences a security incident affecting customer data
✕ Wrong instinct

Wait for the provider to notify you and follow their response plan

✓ Correct approach

Invoke your own incident response plan immediately, assess the impact on your data under shared responsibility, notify regulators per your obligations (independent of the provider's timeline)

Sensitive data needs to be deleted from a cloud environment
✕ Wrong instinct

Delete the data objects from the cloud storage interface

✓ Correct approach

Use cryptographic erasure (destroy the encryption keys) — standard deletion in cloud environments doesn't guarantee physical destruction of underlying media

Know these cold

  • You are always accountable for your data — regardless of cloud model
  • Right-to-audit must be in the contract — assume nothing
  • Cryptographic erasure is the cloud-appropriate data destruction method
  • Data sovereignty follows the data's location — not the company's headquarters
  • Shared responsibility doesn't mean shared accountability for compliance
  • Know CSA STAR, ISO 27017, SOC 2 Type II as cloud governance frameworks
  • Egress controls prevent unauthorized data exfiltration from cloud environments

Can you answer these without checking your notes?

In this scenario: "A regulated healthcare company wants to move patient data to a public cloud provider" — what should you do first?
Classify the data, map regulatory requirements (HIPAA), assess the provider's compliance posture, negotiate a Business Associate Agreement, and implement customer-side access controls
In this scenario: "A cloud provider experiences a security incident affecting customer data" — what should you do first?
Invoke your own incident response plan immediately, assess the impact on your data under shared responsibility, notify regulators per your obligations (independent of the provider's timeline)
In this scenario: "Sensitive data needs to be deleted from a cloud environment" — what should you do first?
Use cryptographic erasure (destroy the encryption keys) — standard deletion in cloud environments doesn't guarantee physical destruction of underlying media

Common Exam Mistakes — What candidates get wrong

Assuming cloud provider responsibility for data protection

Regardless of cloud model, the customer is always responsible for data classification, access controls, and regulatory compliance. The provider secures the infrastructure — the customer secures the data.

Ignoring data residency in multi-region deployments

Storing or processing data across geographic regions may violate data sovereignty laws (GDPR, local data protection laws). Candidates design architectures without addressing jurisdictional requirements.

Treating encryption at rest and encryption in transit as equivalent

These protect data in different states. A system can encrypt at rest but transmit data in plaintext. CCSP requires both for sensitive data.

Selecting cloud deployment model by cost rather than risk profile

Public cloud is cost-efficient; private cloud offers more control; community cloud serves shared regulatory environments; hybrid allows sensitive workload isolation. Risk and compliance requirements — not cost — should drive the decision.

Failing to include right-to-audit in vendor agreements

Without a right-to-audit clause, the customer cannot verify vendor security controls independently. CCSP expects this to be negotiated into all cloud service agreements.

Cloud security accountability doesn't end at the vendor's SLA. Test whether your CCSP thinking is risk-based.