FlashGenius Logo FlashGenius
Updated August 2026 · ISC2 CCSP

CCSP Domain 1:
Cloud Concepts, Architecture & Design

17% of the 2026 CCSP exam · ~17 questions · Includes new AI/ML Security subsection 1.6

17%Domain Weight
~17Questions (~100–150 total)
700/1000Passing Score
Aug 1, 2026New Exam Outline
Overview

CCSP Domain 1 at a Glance

The conceptual foundation — every other domain assumes you know this cold.

Exam At a Glance

Certification: CCSP — Certified Cloud Security Professional (ISC2)

Format: Computerized Adaptive Testing (CAT) — since October 2025

Questions: 100–150 (~25 unscored pretest items)

Duration: 3 hours

Passing Score: 700 / 1000 scaled

Testing: Pearson VUE (English, Chinese, German, Japanese)

Experience: 5 yrs IT (3 cybersecurity, 1 CCSP domain); CISSP waives all

New Outline: Effective August 1, 2026

🆕 What's New in the August 2026 Outline

  • New subsection 1.6 — AI/ML in Cloud Security (BRAND NEW to Domain 1): cloud threat detection with AI, data source validation & verification, SOAR (Security Orchestration, Automation and Response), ethical AI concerns, AI regulatory requirements (EU AI Act, NIST AI RMF)
  • Domain 4 weight shifted from 17% → 16%; Domain 5 from 16% → 17%
  • OWASP LLM Top-10 added to Domain 4 (Cloud Application Security)
  • AI/ML data protection added to Domain 2, subsection 2.9
  • CAT format since October 2025: adaptive 100–150 questions, 3-hour exam (no longer fixed 125 questions)
Domain Topic Weight ~Questions
★ 1 Cloud Concepts, Architecture & Design (this page)
17%
~17
2 Cloud Data Security
20%
~20
3 Cloud Platform & Infrastructure Security
17%
~17
4 Cloud Application Security
16%
~16
5 Cloud Security Operations
17%
~17
6 Legal, Risk & Compliance
13%
~13

★ = This page. Total = 100%. Source: ISC2 CCSP Exam Outline, August 2026.

Why Domain 1 Matters

"The conceptual foundation — every other domain assumes you know this. If you can't define a deployment model or explain the shared responsibility model cold, questions in Domains 2–6 will trip you up even when you know the security control. Start here, build fluency, then move on."

Domain 1 Subdomain Map

1.1 — Cloud Computing Concepts (NIST 5-3-4, roles, characteristics, deployment models)
1.2 — Cloud Reference Architecture (NIST model, actors, CSA EA)
1.3 — Security Concepts (crypto, IAM, sanitization, virtualization security, threats)
1.4 — Design Principles (data lifecycle, BC/DR, BIA, shared responsibility, DevSecOps)
1.5 — CSP Evaluation (compliance certs, FIPS 140-2, SOC 2, ISO 27001, CSA STAR)
1.6 — AI/ML Security NEW ★ (threat detection, data validation, SOAR, ethics, regulations)
Concepts

Domain 1 Subdomains

Click any subdomain to expand. Study in order — each builds on the last.

1.1 Understand Cloud Computing Concepts

NIST SP 800-145 — The "5-3-4" Framework

5 Essential Characteristics: On-Demand Self-Service · Broad Network Access · Resource Pooling · Rapid Elasticity/Scalability · Measured Service (pay-per-use).

3 Service Models: IaaS (Infrastructure), PaaS (Platform), SaaS (Software).

4 Deployment Models: Public · Private · Hybrid · Community. (Multi-cloud is an architectural strategy, not an official NIST deployment model.)

Roles and Responsibilities

  • Cloud Service Customer — acquires and uses cloud services; owns data classification responsibilities
  • Cloud Service Provider (CSP) — builds and operates the cloud infrastructure; owns physical security
  • Cloud Service Partner — provides support services (consulting, integration) related to cloud
  • Cloud Service Broker — acts as intermediary, aggregating/customizing services from multiple CSPs
  • Regulator — government or industry body setting compliance standards (GDPR, HIPAA, FedRAMP)

Essential Characteristics — Deeper

  • On-Demand Self-Service — users provision without human interaction with the CSP
  • Broad Network Access — capabilities available over the network via standard mechanisms (mobile phones, tablets, laptops)
  • Multi-Tenancy / Resource Pooling — provider serves multiple consumers from shared resources; location-independent
  • Rapid Elasticity — capabilities scale automatically; appear unlimited to the user
  • Measured Service — resource usage is monitored, controlled, and reported (utility model)

Building Block Technologies

VirtualizationStorageNetworking DatabasesOrchestrationContainers ServerlessEdge ComputingConfidential Computing

Shared Considerations

Key exam topics across all cloud decisions: interoperability, portability, reversibility, availability, security, privacy, resiliency, performance, governance, SLAs, auditability, regulatory compliance, outsourcing risks.

⚡ Exam Tip

NIST SP 800-145 is the authoritative definition ISC2 uses. Know all five characteristics, three models, and four deployment models by heart — they appear directly in questions.

1.2 Describe Cloud Reference Architecture

NIST Cloud Reference Architecture

Defines five major actors: Cloud Consumer, Cloud Provider, Cloud Auditor, Cloud Broker, Cloud Carrier. Each has distinct activities and responsibilities in the cloud ecosystem.

  • Cloud Consumer — uses services; manages user access, data, applications (in IaaS/PaaS)
  • Cloud Provider — provides service, manages infrastructure, handles physical security and hypervisor
  • Cloud Auditor — conducts independent assessments of security controls and performance
  • Cloud Broker — manages use, performance, and delivery from multiple CSPs
  • Cloud Carrier — provides connectivity (network transport) between consumer and provider

CSA Enterprise Architecture

The Cloud Security Alliance EA provides a framework for secure cloud adoption across business, information, application, technology, and security layers. Aligns to the Open Group TOGAF and SABSA frameworks.

Logical vs. Physical Architecture

  • Logical — abstract view: tenants, applications, APIs, services, virtual networks
  • Physical — actual hardware: data centers, servers, network gear, storage arrays, power/cooling
⚡ Exam Tip

The NIST reference architecture actors (5 of them) are a common question source. Don't confuse Cloud Broker (intermediary managing services) with Cloud Carrier (network transport provider).

1.3 Security Concepts Relevant to Cloud Computing

Cryptography & Key Management

  • Encryption at rest, in transit, and in use (confidential computing)
  • Key management: HSM (Hardware Security Module), BYOK (Bring Your Own Key), HYOK (Hold Your Own Key)
  • Cryptographic standards: FIPS 140-2 for module validation; AES-256, RSA-2048+, ECC

Identity and Access Control

  • User access — MFA, SSO, least privilege, role-based access control (RBAC)
  • Privileged access — PAM (Privileged Access Management), just-in-time access
  • Service access — service accounts, API keys, OAuth, OIDC, federated identity

Data & Media Sanitization

  • Overwriting — may not be feasible for cloud storage (shared, distributed media)
  • Cryptographic Erase — destroy encryption keys rendering data permanently unreadable; preferred cloud method
  • Physical destruction — not applicable to CSP-managed hardware

Network Security

  • Security groups (virtual firewall), network ACLs, VPC segmentation
  • Traffic inspection: IDS/IPS, WAF, Cloud-native security services
  • Geofencing, geo-restriction of access and data residency
  • Microsegmentation for zero trust architectures

Virtualization Security

  • Hypervisor security — Type 1 (bare-metal) more secure than Type 2; patch aggressively
  • Container security — image scanning, namespace isolation, no privileged containers
  • Ephemeral computing — short-lived instances reduce attack surface; immutable infrastructure
  • Serverless security — function-level permissions, event injection risks
  • Isolation — logical separation between tenants is critical (multi-tenancy risk)

Common Cloud Threats

VM EscapeAPI AttacksData Breaches Insider ThreatsMisconfigurationNoisy Neighbor Data LossAccount Hijacking

Security Hygiene

  • Patching and vulnerability management at cloud scale
  • Baselining and configuration management (CIS Benchmarks)
  • Immutable architecture — replace don't patch in production
  • Image hardening and golden AMIs / container images
1.4 Design Principles of Secure Cloud Computing

Cloud Secure Data Lifecycle (6 Phases)

"Can Students Usually Score Above D?" → Create · Store · Use · Share · Archive · Destroy

  • Create — data is generated; classify at creation
  • Store — persist to storage; apply encryption and access controls
  • Use — data in use (memory); confidential computing protects here
  • Share — transmitted to users/systems; encrypt in transit (TLS)
  • Archive — long-term storage; retention policies, regulatory holds
  • Destroy — secure deletion / cryptographic erase; certificate of destruction

BC/DR in Cloud

  • RTO (Recovery Time Objective) — how fast must you recover?
  • RPO (Recovery Point Objective) — how much data loss is tolerable?
  • Multi-region replication, failover, active-active vs. active-passive strategies
  • Testing: tabletop, functional, full interruption exercises

BIA — Business Impact Analysis

  • CBA (Cost-Benefit Analysis) — justify security investment vs. risk reduction value
  • ROI — quantify security controls in financial terms
  • Identify critical systems, data, dependencies, and impact of outages

Shared Responsibility Model

SaaS — CSP manages everything through the application layer. Customer controls: data classification, user access, endpoint security. Least customer control.
PaaS — CSP manages infrastructure, OS, middleware. Customer controls: applications, data, runtime configuration. Shared middle ground.
IaaS — CSP manages physical hardware and hypervisor. Customer controls: OS, network config, middleware, applications, data. Most customer control.

Cloud Design Patterns

  • SANS Security Principles — least privilege, defense in depth, fail safe, complete mediation
  • Well-Architected Framework — AWS/Azure/GCP pillars: security, reliability, performance, cost optimization, operational excellence
  • CSA Enterprise Architecture — holistic cloud security reference for enterprise design
  • Secure by Design — security integrated from the start, not bolted on

DevSecOps

  • Integrate security into every phase of the CI/CD pipeline (shift left)
  • Automated security testing: SAST, DAST, SCA in pipelines
  • Infrastructure as Code (IaC) security scanning
  • Security gates before deployment; immutable artifacts
1.5 Evaluate Cloud Service Providers (CSP)

Key Evaluation Criteria

  • Compliance certifications and third-party audit reports
  • Transparency: published security whitepapers, SLAs, data processing agreements
  • Supply chain security: vendor due diligence, sub-processors

Key Certifications & Reports

FIPS 140-2 / 140-3

US federal standard validating cryptographic module security. Four security levels (1–4). Required for U.S. government workloads. Level 2+ for most cloud HSM implementations.

Common Criteria (CC) / ISO 15408

International standard for evaluating IT product security. Defines Evaluation Assurance Levels (EAL 1–7). Used for OS, hypervisor, and security product certifications.

SOC 2 Type II

AICPA Trust Services Criteria report covering security, availability, processing integrity, confidentiality, privacy. Type II = historical (6–12 months of operation). Most important CSP audit report for cloud customers.

ISO/IEC 27001

International ISMS (Information Security Management System) standard. Certification requires third-party audit and ongoing surveillance audits. Widely recognized globally.

CSA STAR

Cloud Security Alliance Security Trust Assurance and Risk registry. Three levels: STAR Level 1 (self-assessment), Level 2 (third-party audit, maps to ISO 27001), Level 3 (continuous monitoring). Built on CSA Cloud Controls Matrix (CCM).

⚡ Exam Tip

When the question asks about cryptographic module validation → FIPS 140-2. When it asks about historical operating effectiveness of controls → SOC 2 Type II. When it asks about a CSP registry with multiple assurance tiers → CSA STAR.

1.6 AI/ML in Cloud Security NEW ★ August 2026

Brand New in August 2026 Outline

This entire subsection did not exist in prior CCSP exam outlines. Expect 2–3 questions specifically testing AI/ML cloud security concepts. Use the DESERT mnemonic to cover all six pillars.

Cloud Threat Detection & Analysis with AI/ML

  • Behavioral analytics — baseline normal behavior; flag deviations as threats
  • Anomaly detection — ML models identify outlier events in logs, network traffic, API calls
  • UEBA (User and Entity Behavior Analytics) — monitor users AND systems for insider threats and compromised accounts
  • AI-powered SIEM integration: real-time pattern matching at scale across cloud telemetry

Data Source Validation & Verification

  • Training data integrity — validate that datasets used to train security AI models are uncontaminated
  • Data poisoning prevention — adversarial manipulation of training data to bias model outputs
  • Provenance tracking — know where training data came from; chain of custody for AI datasets
  • Input validation for AI systems: sanitize inputs to prevent prompt injection and model manipulation

SOAR — Security Orchestration, Automation & Response

  • Automated playbooks — predefined response workflows triggered automatically on security alerts
  • AI-driven triage — prioritize incidents by severity, context, and business impact using ML
  • Integrates SIEM, ticketing, threat intel, and remediation tools
  • Reduces MTTR (Mean Time to Respond) by automating repetitive analyst tasks

Ethical Concerns

  • Bias in AI security tools — models trained on biased data produce discriminatory or inaccurate threat scores
  • Explainability (XAI) — security teams must understand why an AI flagged an event (black-box problem)
  • Accountability — who is responsible when an AI security tool makes a wrong decision?
  • Fairness — equitable application of AI-driven security controls across user populations

Regulatory Requirements

  • EU AI Act — risk-based framework classifying AI systems (Unacceptable / High / Limited / Minimal risk); security-related AI may be classified high-risk
  • NIST AI RMF (AI Risk Management Framework) — four functions: Govern, Map, Measure, Manage; voluntary U.S. framework for responsible AI
  • Emerging AI governance — ISO/IEC 42001 (AI Management System), OECD AI Principles, national AI strategies
🧠 DESERT Mnemonic for 1.6

Data validation · Ethics · SOAR · Explainability · Regulatory compliance · Threat detection — the 6 pillars of cloud AI security (1.6).

Memory Hooks

6 Mnemonics for Domain 1

Learn these and you'll lock in the frameworks that appear on every CCSP exam.

1
NIST 5-3-4
"Five Three Four, walk through the cloud door"
5 Essential Characteristics · 3 Service Models (IaaS, PaaS, SaaS) · 4 Deployment Models (Public, Private, Hybrid, Community). These numbers come from NIST SP 800-145 — the CCSP's authoritative cloud definition.
2
BROAD — 5 Essential Characteristics
"BROAD access to the cloud"
Broad network access · Resource pooling · On-demand self-service · Agile elasticity (rapid) · Data metering (measured service). All five must be present for something to qualify as cloud computing per NIST.
3
CSL Pyramid — Service Models
"Servers In Pieces"
SaaS (top — least control) · IaaS (base — most control) · PaaS (middle). The higher you go in the stack, the less the customer controls and the more the CSP manages. "Going up = giving up control."
4
Data Lifecycle: C-S-U-S-A-D
"Can Students Usually Score Above D?"
Create · Store · Use · Share · Archive · Destroy. The six phases of the cloud data lifecycle (1.4). Each phase requires specific security controls. Destroy = cryptographic erase in cloud environments.
5
Shared Responsibility Rule
"Higher model = less you control"
In SaaS you control the least (just data + users). In IaaS you control the most (OS, network, apps). The CSP always controls: physical, hypervisor. The customer always controls: data classification. Everything in between shifts by model.
6
AI/ML 1.6: DESERT
"DESERT: where AI security lives"
Data validation (source integrity, poisoning) · Ethics (bias, accountability) · SOAR (automated response) · Explainability (XAI) · Regulatory compliance (EU AI Act, NIST AI RMF) · Threat detection (UEBA, anomaly detection). The 6 pillars of new subsection 1.6.
Quiz

Domain 1 Vignette Quiz

10 scenario-based questions. Select your answer, then click Next to advance.

Flashcards

8 Domain 1 Flashcards

Click any card to flip it. Front = term. Back = definition.

NIST Characteristic
On-Demand Self-Service
Click to flip →
A consumer can unilaterally provision computing capabilities (server time, network storage) as needed automatically without requiring human interaction with each service provider. One of the 5 NIST essential characteristics (SP 800-145).
Cloud Concept
Multi-Tenancy
Click to flip →
Multiple cloud customers (tenants) share the same physical infrastructure while remaining logically isolated from one another. Foundation of cloud economics — enables resource pooling. Primary attack concern: VM escape, data leakage across tenant boundaries.
CSP Evaluation
FIPS 140-2
Click to flip →
U.S. federal standard (NIST/CMVP) that validates the security of cryptographic modules. Four levels (1=lowest, 4=highest). Level 2+ required for most government cloud workloads. Critical for evaluating a CSP's HSM and encryption implementation. Successor: FIPS 140-3.
Data Sanitization
Cryptographic Erase
Click to flip →
The destruction of the encryption key(s) that protect data, rendering the encrypted data permanently unreadable without physically destroying media. The preferred sanitization method in cloud environments where physical destruction or overwriting of shared media is impossible.
Design Principle
Cloud Shared Responsibility Model
Click to flip →
Security duties split between CSP and customer based on service model. IaaS = most customer control (OS, network, apps, data). PaaS = shared middle. SaaS = least customer control (data and users only). CSP always owns physical security and hypervisor.
CSP Evaluation
CSA STAR
Click to flip →
Cloud Security Alliance Security Trust Assurance and Risk registry. Three levels: Level 1 (CSP self-assessment using CAIQv4), Level 2 (third-party audit aligned to ISO 27001 + CCM), Level 3 (continuous monitoring). Built on the CSA Cloud Controls Matrix (CCM).
Security Hygiene
Immutable Architecture
Click to flip →
Servers and containers are never patched or modified in place — when a change is needed, a new image is built and the old instance is replaced. Eliminates configuration drift, reduces attack surface, and ensures every instance matches a known-good baseline.
1.6 NEW ★
SOAR
NEW in August 2026
Click to flip →
Security Orchestration, Automation and Response. AI-driven automated response to security events: automated playbooks execute on alert triggers, AI triages incidents by severity, integrates SIEM + ticketing + remediation tools. Covered in new subsection 1.6 of the August 2026 CCSP outline.
Study Advisor

Domain 1 Readiness Assessment

Rate your confidence in each subdomain category. Your overall readiness score updates automatically.

0%
Domain 1 Readiness Score
Select your readiness for each category below to see your score.

1. Cloud Service & Deployment Models

IaaS/PaaS/SaaS boundaries, NIST 5-3-4, deployment model use cases

2. Security Design Principles & Data Lifecycle

C-S-U-S-A-D phases, BC/DR, BIA, DevSecOps, design patterns

3. Cryptography & IAM Concepts

Key management, BYOK, cryptographic erase, identity federation, PAM

4. CSP Evaluation & Compliance Certifications

FIPS 140-2, Common Criteria, SOC 2 Type II, ISO 27001, CSA STAR levels

5. AI/ML Security — Subsection 1.6 NEW

Threat detection AI, data poisoning, SOAR, ethics, EU AI Act, NIST AI RMF

Study Priority Recommendations

  • Complete the assessment above to see personalized recommendations.
Resources

Official Study Resources

All links point to official sources. Verify exam details directly before registering.

FlashGenius · CCSP Complete Series

Study All 6 CCSP Domains with FlashGenius

Adaptive flashcards, vignette quiz banks, and AI-powered study recommendations — built for the August 2026 CCSP exam outline.

Start Free at FlashGenius ISC2 CCSP Official Page