LDR520: Cloud Security for Leaders

  • In Person (5 days)
  • Online
30 CPEs

LDR520: Cloud Security for Leaders equips security leaders, IT executives, and aspiring cloud security professionals with the knowledge needed to develop and implement effective cloud security strategies. Participants gain practical frameworks, including a cloud security maturity model, to build a strategic roadmap and deploy capabilities across the enterprise. Through 12 Cyber42 leadership simulation exercises and a capstone project, students build the skills to lead cloud security initiatives that align with business goals and drive organizational transformation.

What You Will Learn

Cloud Security Leadership & Strategy Implementation

Cloud adoption is popular across all types of industries, and many organizations are taking strategic advantage of the cost and speed benefits of transitioning to the cloud. Since cloud environments differ significantly from traditional on-premises IT environments in terms of protection requirements and threat vectors, the traditional network perimeter is no longer the most effective defense. The frequency and sophistication of cloud security incidents continue to rise, creating significant organizational risk. Organizations are migrating mission-critical workloads and sensitive data to private and public cloud solutions, often without understanding the key decisions needed for secure implementation. This course walks participants through applying the practical security maturity model to evolve their cloud security across relevant domains—from initial setup to a high-maturity state.

LDR520 complements traditional IT management techniques that leaders are accustomed to and helps with making informed decisions around strategy, financial investment, and necessary team technical capabilities. Through the 12 Cyber42 simulation exercises, we cover key security controls in cloud environments, including planning, deploying, and running the environment from a basic starting point to a progressively more mature state. Each exercise aligns with critical security domains, focusing on locking down the environment, securing data, maintaining compliance, enhancing security visibility to operations, and managing security response on a continuous basis. Students will develop practical leadership skills to confidently guide their organization's entire cloud transition journey.

What You'll Learn

  • Create effective cloud security strategies for enterprises  
  • Build security roadmaps supporting rapid cloud adoption  
  • Leverage cloud security capabilities to enhance protection  
  • Implement cloud security governance and compliance  
  • Communicate cloud security vision to executives and teams 

Business Takeaways 

  • Architect cloud security strategies that accelerate business transformation 
  • Evaluate your security posture against industry benchmarks to identify competitive advantages 
  • Optimize security investments with metrics-driven ROI frameworks
  • Implement automated guardrails that protect assets while enabling innovation
  • Balance security controls with cloud adoption velocity to avoid becoming a bottleneck 
  • Create unified governance frameworks that scale across multi-cloud environments

Hands-On Cloud Security Strategy Training

LDR520 uses case scenarios, group discussions, team-based security leadership simulations with embedded real life technical components to help students absorb both technical and management topics. About 60 minutes per day is dedicated to these learning experiences using the Cyber42 leadership simulation game. This web application-based game is a continuous exercise where students play to improve security culture, manage budget, and schedule, and improve security capabilities at a fictional organization. This puts you in real-world scenarios that spur discussion and critical thinking of situations that you will encounter at work.

"Love "seeing" the cloud." - Ivan Clatanoff, CME Group

"Loved the labs. They really help emphasize what we are learning." - Jana Laney

"Team is collaborative. We are all able to bounce ideas of each other comfortably and using AWS to get hands on makes it feel more real than if we were answering questions on a quiz." - Richard Sanders, Best Western International

Syllabus Summary

  • Section 1: Cloud Security Fundamentals and Identity Management
  • Section 2: Cloud Security Environment Protection and Architecture
  • Section 3: Data Protection, Security Detection and Cloud Security Governance
  • Section 4: Securing Workload and Security Assurance
  • Section 5: Roadmap Planning and Capstone Exercise

NOTE: This course will have limited overlap with the SANS SEC488: Cloud Security Essentials course because it will provide foundational information on cloud services and cloud security to ensure that students are on the same page.

Additional Free Resources:

What You Will Receive:

  • Printed and Electronic courseware
  • MP3 audio files of the course
  • Access to the Cyber42 web application

What Comes Next:

Syllabus (30 CPEs)

Download PDF
  • Overview

    The first section of the course aims to help management professionals develop a solid fundamental knowledge into cloud adoption models and gain understanding on one of the most important security domain within cloud security which is Identity and Access Management (IAM).

    Exercises
    • Cloud security planning
    • Landing Zone template scenario
    • IAM account and access-based scenario
    Topics

    Introduction to Cloud

    • Industry Cloud Adoption Rate

    Cloud Service Model

    • Cloud services fundamentals
    • IaaS/PaaS/SaaS

    Transition Process

    • Planning process
    • Initial setup and Landing Zone establishment

    IAM - Segregation

    • Multi-account/subscription
    • Isolation to reduce blast radiation

    IAM - Identity Management

    • MFA/passwordless
    • Single Sign-on for cloud
    • Customer IAM integration
    • Centralized management of identity, process and workflow

    IAM - Access Management

    • Leadership support in access management
    • Managed policies/custom access policies
    • Role management with workflow
    • Risk reduction access rationalization drive on recurring basis
    • Temporary just in time access management for privileged access
    • Access management transformation for cloud adoption
  • Overview

    The second section of the course is dedicated to managing the technology aspect of the cloud environment. Securing cloud technology is rather different than securing technologies on-premise. This section will highlight the difference and discuss the capabilities and competencies that matter the most.

    Exercises
    • Config Management
    • Container/Image Management security
    • Firewall/Network Architecture
    Topics

    Config Management

    • Security configuration span and importance
    • Configuration guardrail across services
    • CSPM services and native tooling
    • Maturity transformation over the journey of cloud adoption

    Image Management

    • VM and container image security management
    • OS images in hybrid environment
    • OS image automation and pipeline

    Resource Management

    • Resource management security automation
    • Enterprise strategy to provide assistance and reference material

    Network Management

    • Cloud network design principles, IP schemes, network architecture
    • Secure Network to support workforce, customers, partners and work locations
    • Network Firewall challenges in cloud and identity based perimeter transformation

    Cloud Architecture

    • Security Best practices (Well architected framework and Security Reference Design)
    • Zero Trust and Segmentation Transformation
  • Overview

    In section three, we delve into three key cloud security domains: data asset protection, security detection and response in the cloud environment, and governance aspects of cloud security.

    Exercises
    • Data Protection
    • Security Monitoring
    • Cost Management
    Topics

    Data Encryption and Key Management

    • Encryption at rest/in use and in transit within cloud
    • Key management in cloud and hybrid environment, both strategy and implementation
    • Common compliance driven requirements in encryption

    Data Classification and Protection

    • Automated data discovery across various cloud services
    • Automated encryption and de-identification
    • Enterprise practices and transformation in data protection (tagging, identification...)

    Data Backup

    • Data backup strategy in cloud
    • Continuity vs recovery/resiliency
    • Immutable backup
    • Measuring metrics and validation

    Security Intelligence

    • Intelligence collection and generation
    • Detection logic translation and transformation
    • Feed evaluation and prioritization

    Security Detection Analysis and Monitoring

    • Security Monitoring and analysis
    • Logs normalization
    • Network flows/traffic based logs and application based logs
    • Alerts tuning
    • Hybrid environment monitoring operations
    • Data level monitoring (CASB)

    Security Response and Transformation

    • Runbooks and playbooks in security response
    • Metrics based operations and tuning
    • Automation and effectiveness based transformation in cloud
    • Modeling via table top and purple team exercises

    Log Management

    • Logging configuration, collection and device configuration
    • Consolidated logs visibility across hybrid environments

    Cloud Leadership and Oversight

    • Strategy for executive involvement
    • Organization for collaboration and driving proper ownership
    • Goals, cadence and operations of the governance committee

    Security Policy

    • Structuring the policy and connecting the policy with implementation policies
    • Enforcement of policy
    • Communication of policy

    Cost Management

    • Cost management principles
    • Model, budget and optimization
    • Automation to assist with cost management
    • Importance of tagging
  • Overview

    Section four begins with a focus on securing applications/workloads within the cloud environment through comprehensive DevSecOps practices and integrated assessment tools. The discussion then transitions to security assurance mechanisms including protection services, posture validation, and regulatory compliance frameworks. The section concludes with an exploration of security testing methodologies including vulnerability assessments, penetration testing with deliberate scoping, and threat modeling of the cloud environment.

    Exercises
    • Application Protection
    • Security validation and assessment
    • Validation and Security testing

    Topics

    Cloud Application Practices

    • DevSecOps best practices, security throughout the lifecycle
    • SBOM
    • CI/CD pipeline and security protection + integration
    • Empowering development teams supported by security guidance
    • Full stack development -- impact to IAM and traditional organization alignment

    Application Assessment

    • SAST/DAST integrated into CI/CD pipeline
    • Threat modeling and manual testing

    Security Protection Services

    • Cloud based protection services such as DDoS and DNS protection
    • WAF services
    • CWPP and RASP that can be integrated into the application or running environment
    • Progression of protection capabilities

    Posture Validation

    • Roles and responsibilities defined, ownership of vulnerabilities identified
    • Getting consensus and commitment to remediate
    • Benchmark selection and implementing the assessments in automatic fashion
    • Operationalize the validation
    • Rolling into a measurable program supporting 3rd line visibility

    Regulatory Compliance

    • Provider compliance
    • Split of responsibilities for compliance
    • Data level analysis to determine best compliance requirements

    Security Testing

    • Vulnerability assessment in cloud
    • Penetration testing with deliberate scoping
    • Threat modeling of the environment
  • Overview

    In section five, we delve into the growing trend of adopting multi-cloud systems and emphasize the significance of a security strategy tailored for multi-cloud environments. Additionally, we examine the management aspects of the Software as a Service (SaaS) model and its application in enterprise settings. The section concludes with a capstone exercise, allowing students to apply the concepts, management tools, and methodologies they have learned in a practical scenario.

    Exercises

    Capstone: Large scale traditional enterprise moving to the cloud. Working in groups, students are to draft the roadmap to modernize the entire security program and present to the class on their approach.

    Topics

    Skill Readiness

    • Structuring a training program
    • Define training and learning models 
    • Skills requirements definition 
    • Scaling the program 

    Organizational Alignment

    • Involving teams at inception
    • Supporting transformation through cross-functional teams
    • Evolving the DevSecOps team
    • Choosing between decentralized and centralized approaches

    SaaS security management

    • Multicloud Management
      • Security governance with multicloud
      • Technical config alignment
      • Workload mobility
      • Data level security alignment
      • Security monitoring across CSP

Prerequisites

Students should have three to five years of experience in IT and/or cybersecurity. This course covers the core areas of security leadership in migrating workloads to the cloud environment and assumes a basic understanding of technology, networks, and security.

Laptop Requirements

Important! Bring your own system configured according to these instructions.

A properly configured system is required to fully participate in this course. If you do not carefully read and follow these instructions, you will not be able to fully participate in hands-on exercises in your course. Therefore, please arrive with a system meeting all of the specified requirements.

Back up your system before class. Better yet, use a system without any sensitive/critical data. SANS is not responsible for your system or data.

MANDATORY LDR520 SYSTEM HARDWARE REQUIREMENTS
  • Wireless networking (802.11 standard) is required. There is no wired Internet access in the classroom.
MANDATORY LDR520 HOST CONFIGURATION AND SOFTWARE REQUIREMENTS
  • Your host operating system must be the latest version of Windows 10, Windows 11, or macOS 11.7.x or newer.
  • Fully update your host operating system prior to the class to ensure you have the right drivers and patches installed.
  • Linux hosts are not supported in the classroom due to their numerous variations. If you choose to use Linux as your host, you are solely responsible for configuring it to work with the course materials and/or VMs.
  • Local Administrator Access is required. (Yes, this is absolutely required. Don't let your IT team tell you otherwise.) If your company will not permit this access for the duration of the course, then you should make arrangements to bring a different laptop.
  • You should ensure that antivirus or endpoint protection software is disabled, fully removed, or that you have the administrative privileges to do so. Many of our courses require full administrative access to the operating system and these products can prevent you from accomplishing the labs.
  • Any filtering of egress traffic may prevent accomplishing the labs in your course. Firewalls should be disabled or you must have the administrative privileges to disable it.

If you have additional questions about the laptop specifications, please contact laptop_prep@sans.org

Author Statement

“Cloud transition is widespread today, but many security leaders feel overwhelmed and underprepared for its security aspects. When organizations integrate security into their transformation, they can match their in-house security levels while leapfrogging forward using cloud capabilities. In LDR520, we discuss industry-proven techniques to plan for the security aspects of cloud transformation. Through our practical security maturity model and engaging Cyber42 leadership simulations, security leaders develop a structured approach to progressively enhance their cloud security posture. This course arms students with the necessary tools to make strategic security decisions, effectively communicate with stakeholders, and confidently lead their organization's cloud security transformation from planning through implementation."

- Jason Lam

"I like how the content builds and progresses. Jason clearly thought a lot about how to sequence the information to make it easy to digest." - Jim Pruitt, Revolutionary Security

Reviews

Perfect for understanding the inner workings without getting too in the weeds.
Krupa Levinson
Blue Shield of CA
The game platform [Cyber42] and challenges are really interesting and add a nice dimension to the class.
Karl Mueller
Great course, a lot of material to go through but it really shows the model an organization should follow to increase the security on cloud environments.
Jesus Fernandez
FEMSA

    Register for LDR520

    Learn about Group Pricing

    Prices below exclude applicable taxes and shipping costs. If applicable, these will be shown on the last page of checkout.

    Loading...