Identity and access management (IAM) and data protection are the areas that should be reviewed when auditing a public cloud, as they are the key aspects of cloud security and compliance that affect both the cloud service provider and the cloud service customer. IAM and data protection refer to the methods and techniques that ensure the confidentiality, integrity, and availability of data and resources in the cloud environment. IAM involves the use of credentials, policies, roles, permissions, and tokens to verify the identity and access rights of users or devices. Data protection involves the use of encryption, backup, recovery, deletion, and retention to protect data from unauthorized access, modification, loss, or disclosure123.
Patching and configuration (A) are not the areas that should be reviewed when auditing a public cloud, as they are not the key aspects of cloud security and compliance that affect both the cloud service provider and the cloud service customer. Patching and configuration refer to the processes and practices that ensure the security, reliability, and performance of the cloud infrastructure, platform, or software. Patching involves the use of updates or fixes to address vulnerabilities, bugs, errors, or exploits that may compromise or affect the functionality of the cloud components. Configuration involves the use of settings or parameters to customize or optimize the functionality of the cloud components. Patching and configuration are mainly under the responsibility of the cloud service provider, as they own and operate the cloud infrastructure, platform, or software. The cloud service customer has limited or no access or control over these aspects123.
Vulnerability management and cyber security reviews (B) are not the areas that should be reviewed when auditing a public cloud, as they are not specific or measurable aspects of cloud security and compliance that can be easily audited or tested. Vulnerability management and cyber security reviews refer to the processes and practices that identify, assess, treat, monitor, and report on the risks that affect the security posture of an organization or a domain. Vulnerability management involves the use of tools or techniques to scan, analyze, prioritize, remediate, or mitigate vulnerabilities that may expose an organization or a domain to threats or attacks. Cyber security reviews involve the use of tools or techniques to evaluate, measure, benchmark, or improve the security capabilities or maturity of an organization or a domain. Vulnerability management and cyber security reviews are general or broad terms that encompass various aspects of cloud security and compliance, such as IAM, data protection, patching, configuration, etc. Therefore, they are not specific or measurable areas that can be audited or tested individually123.
Source code reviews and hypervisor (D) are not the areas that should be reviewed when auditing a public cloud, as they are not relevant or accessible aspects of cloud security and compliance for most cloud service customers. Source code reviews refer to the processes and practices that examine the source code of software applications or systems to identify errors, bugs, vulnerabilities, or inefficiencies that may affect their quality, functionality, or security. Hypervisor refers to the software that allows the creation and management of virtual machines on a physical server. Source code reviews and hypervisor are mainly under the responsibility of the cloud service provider, as they own and operate the software applications or systems that deliver cloud services. The cloud service customer has no access or control over these aspects123. References :=
Cloud Audits: A Guide for Cloud Service Providers - Cloud Standards …
Cloud Audits: A Guide for Cloud Service Customers - Cloud Standards …
Cloud Auditing Knowledge: Preparing for the CCAK Certificate Exam