- Advocate Training and Awareness for Application Security
- Cloud Development Basics
- Common Pitfalls
- Common Cloud Vulnerabilities
- Describe the Secure Software Development Life Cycle (SDLC) Process
- Business Requirements
- Phases and Methodologies
- Apply the Secure Software Development Life Cycle (SDLC)
- Avoid Common Vulnerabilities During Development
- Cloud-specific Risks
- Quality Assurance
- Threat Modeling
- Software Configuration Management and Versioning
- Apply Cloud Software Assurance and Validation
- Functional Testing
- Security Testing Methodologies
- Use Verified Secure Software
- Approved Application Programming Interfaces (API)
- Supply-chain Management
- Third Party Software Management
- Validated Open Source Software
- Comprehend the Specifics of Cloud Application Architecture
- Supplemental Security components (e.g., Web Application Firewall (WAF), Database Activity Monitoring (DAM), Extensible Markup Language (XML) firewalls, Application Programming Interface (API) gateway)
- Cryptography
- Sandboxing
- Application Virtualization and Orchestration
- Design Appropriate Identity and Access Management (IAM) Solutions
- Federated Identity
- Identity Providers
- Single Sign-On (SSO)
- Multi-factor Authentication
- Cloud Access Security Broker (CASB)