Major Update

SEC549: Cloud Security Architecture

GIAC Cloud Security Architecture and Design (GCAD)
GIAC Cloud Security Architecture and Design (GCAD)
  • In Person (5 days)
  • Online
30 CPEs

Organizations are migrating infrastructure and applications to the cloud at a rapid pace. As migrations take place, security architects are struggling to design hybrid and cloud-native solutions to meet their organization's security requirements. Shifting to the cloud requires a deep understanding of the threats introduced by a cloud migration, and how each provider mitigates those threats using their well-architected framework. SEC549 teaches security professionals how to design an enterprise-ready, scalable cloud organization. SEC549 prepares students to design secure, scalable cloud infrastructure. Through a hands-on, representative case study, students will threat model and analyze real-world challenges in identity and access management, organizational policy, network and data security, and log aggregation—learning how to centralize controls while enabling fast, secure cloud adoption.

What You Will Learn

Design It Right from the Start.

SEC549 teaches students how to design enterprise-scale, cloud infrastructure solutions for their organization. By learning the cloud providers' well-architected frameworks, security architects can design centralized security controls for their cloud estate while maximizing the speed of cloud adoption for the organization. Students will learn how threat models change in the cloud with new, vastly distributed perimeters and unfamiliar trust boundaries. With those challenges in mind, the focus shifts to designing strategies for centralizing and reinforcing workforce identity, conditional access, policy guardrails, workload identity, network security controls, data perimeters, and cloud logging.

SEC549 takes students through the cloud migration journey of a fictional enterprise and the challenges they encounter along the way. As aspiring cloud security architects, students perform threat models against the company’s existing cloud infrastructure. Using those threats and countermeasures, in-depth security architecture reviews are performed to identity the pros and cons of the company’s new cloud design patterns. 

Concluding each section, students are challenged to create their own architecture design plans supporting the enterprise’s acquisition of a young startup company. Each CloudWars scenario gives students insight into the startup’s existing cloud resources, interviews with key employees, and requirements for the migration. Students work in teams to build the migration plans, architecture diagrams, and documentation supporting the acquisition. Each team presents their cloud architecture plans in the final capstone exercise to determine which team wins the SEC549 challenge coin.

"I would recommend this course. It hits many core aspects of secure design. Additionally, lack of Cloud Security Architecture and Strategy, and Insecure Design have been highlighted as a top risk by organizations like Cloud Security Alliance and OWASP. Cloud security architecture topics need to have more attention and focus in general." - Greg Lewis, SAP

What Is Cloud Security Architecture?

Cloud security architecture requires us to understand business requirements and existing cloud services and capabilities in order to design access control patterns, network controls, and secure processes to support a business outcome that can be implemented and maintained within required cloud operating environments. This requires architects to understand and design secure cloud solutions for workloads deployed on Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS) service models. Understanding hybrid architecture patterns is also important as cloud workloads integrate with on-premises systems. The cloud security architect's goal is to identify security design flaws and inefficiencies when information systems interconnect and mitigate these flaws in the early stages of development using available cloud-capable security controls.

Business Takeaways

  • Reduce cloud risks with strategic, phased adoption plans. 
  • Prevent identity sprawl and technical debt through centralization. 
  • Support growth with high-level guardrails and secure architecture. 
  • Avoid costly anti-patterns with thoughtful cloud design. 
  • Move toward zero-trust using proven access control patterns. 
  • Create effective conditional access and manage policy exceptions. 

"The problems we talk about are some that I face in my job every day or know I will face shortly. Getting definitive answers for many of these issues is very helpful for me. Getting years of experience from the instructors and what they have worked on is invaluable." - Patrick Haughney, Paylocity

What You Will Learn

  • Design secure, enterprise-ready cloud architectures that align with business goals.
  • Build a scalable identity foundation using centralized workforce identity, conditional access policies, and break-glass access.
  • Implement zero-trust security for workforce, customer, and workload identities using identity-based and network-based controls.
  • Create micro-network segmentation with hub-and-spoke models and centralized inspection firewalls.
  • Protect cloud data using strong perimeters, data lakes, shared Key Management Service (KMS), and disaster recovery strategies.
  • Enable cloud incident response and telemetry with centralized intra-cloud and cross-cloud logging solutions.

Cloud Security Architect Training

The practical portion of SEC549 is unique and especially suited to students who want to architect for the cloud. Each lab is performed by observing and correcting an anti-pattern presented as an architectural diagram. The completed version of each diagram is implemented as live infrastructure in AWS, Azure, or Google (depending on the topic) and made available for students to explore. In this course, students have access to an enterprise-scale AWS, Azure, and Google Cloud organization and can observe all details discussed in the labs and throughout the course.

"I've done a lot of labs over the years. These are likely one of the best ways to present them I've ever used." - Daniel Russell, BCBSLA

"The labs and exercises were excellent and provided additional supplementary, hands-on learning that helped solidify the course content." - Tyler Piller, British Columbia Lottery Corporation

"Based on my experience, the labs in 549 are very much aligned with what an Architect could encounter in their day to day work." - Macie J Bak, Standard Chartered

Syllabus Summary

Each section discusses security design considerations for all three major clouds. Labs are used to demonstrate the real-world implementations.

  • Section 1: Introduces core concepts like cloud threat modeling and secure design, then dives into cloud identity. Students build identity foundations, enable federation from Entra ID to AWS and GCP, design resource hierarchies, set up policy guardrails, and manage cloud access.
  • Section 2: Explores zero-trust in the cloud, focusing on conditional access policies, customer identity and access management (CIAM), and authenticating users and machines across clouds.
  • Section 3: Covers cloud network components and design, starting with key resources for public, private, and hybrid clouds. Students learn centralized management, micro-segmentation, traffic inspection, and how to access shared services.
  • Section 4: Dives into cloud-native data protection, covering storage controls, data lake security, and data loss prevention using tags, attribute-based access control (ABAC), and masking. It ends with key management and backup architecture strategies.
  • Section 5: Teaches how to enable SOC operations in the cloud—covering cloud data sources, log aggregation, and exporting to a central SIEM. Students design logging architectures that support threat detection, response, and recovery from cloud incidents.

Additional Free Resources

What You Will Receive

  • Printed and electronic courseware
  • Draw.io architectural diagrams representing secure patterns you can use as reference architecture
  • Access to the SEC549 Cloud lab environment

What Comes Next?

Syllabus (30 CPEs)

Download PDF
  • Overview

    Section 1 starts by defining concepts used throughout the course such as threat modeling the cloud, what makes a secure design, and how security changes in the cloud. Students then start designing cloud identity for the enterprise by learning enabling identity federation and provisioning from Microsoft Entra ID to both AWS and Google Cloud using Entra ID enterprise applications. With identity federation in place, students design a foundational cloud resource hierarchy for the organization to host resources with policy guardrails for organization units and accounts. The final module covers the cloud provider permission models and how to design an identity foundation for workforce team members accessing the cloud’s management control plane.

    Exercises
    • Threat Model: Workforce Identity (cloud agnostic)
    • Secure Architecture Review: Centralizing Account Provisioning with Entra ID (Azure)
    • Secure Architecture Review: Account Provisioning with Identity Center (AWS)
    • Secure Architecture Review: Account Provisioning with Google Cloud Identity (Google)
    • Secure Architecture Review: Cloud Organization Hierarchy (AWS / Azure/ Google)
    • Secure Architecture Review: Cloud Policy Guardrails (AWS / Azure / Google)
    • CloudWars: Account Management and Identity
    Topics
    • Security Architecture in the Cloud
      • Threat modeling the cloud
      • Cloud-native security models
    • Federated Access / Single Sign-On
      • Managing users at scale with Microsoft Entra ID, AWS Single Sign-On, and Google Cloud Identity
      • Provisioning users with the System for Cross-domain Identity Management (SCIM) specification
    • Creating Hierarchical Cloud Structures
      • Designing organizational hierarchy with AWS Organizations, Azure Management Groups, and Google Cloud
      • Creating policy guardrails in the hierarchy to help silo job roles and prevent IAM mistakes
    • Implementing an Identity Foundation
      • Understanding how permissions are granted and patterns of IAM in the cloud
      • Designing access to the management control plane for standard, privileged, break glass, and administrators
      • Granting secure external access to vendors and contractors
  • Overview

    Section 2 starts with an in-depth look at the zero-trust movement, its history and how zero-trust in the cloud can be leveraged to modernize legacy access patterns. We not only discuss permission granting architectures but also how to build identity guardrails into your cloud estates, ensuring conditional access policies define how and when resources can be accessed. Students will learn how to authenticate customers and machine identities across multiple public cloud environments. With this knowledge, students will see how restrict access between an organization's resources and trusted third parties.

    Exercises
    • Threat Model: Zero Trust Architecture (cloud agnostic)
    • Secure Architecture Review: Microsoft Entra Conditional Access (Azure)
    • Secure Architecture Review: Application Identity with Microsoft Entra External ID (Azure)
    • Secure Architecture Review: Application Identity with AWS Cognito (AWS)
    • Secure Architecture Review: AWS Identity Federation (AWS)
    • Secure Architecture Review: GCP Identity Federation (Google)
    • CloudWars: Implementing an Identity Perimeter
    Topics
    • Implementing Zero-Trust Architecture
      • History of Zero-Trust
      • Using cloud services to implement zero-trust architecture
    • Conditional Access Policies
      • Designing effective Conditional Access policies
      • Understanding Conditional Access using Google BeyondCorp, AWS Verified Access, AWS Service Control Policy (SCP), and Entra ID Conditional Access
    • Customer Identity and Access Management (CIAM)
      • Identity federation with Microsoft Entra External ID and AWS Cognito
    • Architecting Cross-Cloud Authentication
      • Cloud provider machine identities (AWS IAM Roles, Azure managed identities and Google Cloud service accounts)
      • Designing workload identity federation across cloud providers
      • Using certificates and AWS IAM Roles Anywhere to authenticate workloads to cloud machine identities
      • Using workload identity federation and OIDC to authentication workloads to cloud machine identities
  • Overview

    Section 3 shifts focus to designing network perimeters in the cloud. Starting with the key resources required to build public, private, and hybrid cloud networks, students learn to centrally manage the configuration of these resources across their organization. Next, we explore cloud micro-segmentation, hub and spoke networks, and routing traffic between micro-networks. From there, the architecture expands to include traffic inspection for ingress, egress, and east-west traffic using third-party security appliances. Finally, students learn how to share network services by adding additional spoke networks and sharing DNS configurations across the organization.

    Exercises
    • Threat Model: Centralizing Network
    • Secure Architecture Review: AWS Hub & Spoke (AWS)
    • Secure Architecture Review: Azure Hub & Spoke (Azure)
    • Secure Architecture Review: AWS Spoke Edge Routing (AWS)
    • Secure Architecture Review: AWS Internal Firewall (AWS)
    • Secure Architecture Review: Azure Centralized Firewall (Azure)
    • CloudWars: Private Service Access
    Topics
    • On-Premises Versus Cloud Networks
      • Cloud architecture challenges
      • CISA Zero Trust Model: Network & Environment
    • Managing Cloud-Hosted Networks at Scale
      • Cloud network building blocks (virtual networks, subnets, internet gateways, firewall rules, network interfaces, and private service endpoints)
      • Hosting network resources centrally in a cloud organization
      • Sharing VPC networks across projects / accounts
      • Managing firewall rules using AWS Firewall Manager, Azure Firewall Manager, and Google Cloud Hierarchical Firewall Policies
    • Cloud Network Micro-Segmentation
      • Connecting micro networks using VPC peering and hub and spoke services
      • Creating hybrid networks with site-to-site VPN tunnels and dedicated connections
    • Network Firewalls and Traffic Inspection
      • Centralizing ingress and egress traffic network controls using AWS Transit Gateway and Azure Virtual WAN
      • Inspecting east-west traffic with third-party security appliances, Kubernetes network policy, and AWS VPC Lattice
      • Load balancing traffic and symmetric routing to third-party security appliances
    • Centralized Shared Network Services
      • Hosting private link / private access services in a centralized spoke
      • Designing least privilege private link policies for data perimeters
      • Sharing private DNS hosted zones with spoke networks
  • Overview

    Section 4 focuses on cloud-native data protection patterns. Starting with common organization-wide storage service controls, students will establish foundational data perimeter policies. From there, we learn to segment data lake access through views and access points. Next, students explore how attribute-based access control, tagging, and data masking can enable cloud-native data loss prevention controls. Finally, the section wraps up with key management and backup architecture patterns.

    Exercises
    • Threat Model: Data Discovery and Classification (cloud agnostic)
    • Security Architecture Review: Sharing S3 Data Through Access Points (AWS)
    • Security Architecture Review: BigQuery Data Lake Design
    • Security Architecture Review: Azure Customer Managed Key Architecture
    • Security Architecture Review: GCP Customer Managed Key Architecture (Google)
    • Security Architecture Review: AWS Customer Managed Key Architecture (AWS)
    • CloudWars: Data Lake Migration and Disaster Recovery Planning
    Topics
    • Data Security & Privacy Playbook
      • Defining, dissecting, and defending data
      • Data classification patterns
      • Resource naming and tagging
      • Cloud data discovery and classification services
    • Cloud Storage Service Security
      • Managing access to cloud storage services
      • Establishing network perimeters in the cloud for data access
      • Designing data backup, replication, and business continuity plans in the cloud
    • Data Lake Security
      • Designing centralized data warehouses with data mart access points
      • Access control and governance with S3 access points
      • Access control and governance with BigQuery views, row-level, and column-level policies
      • Big Query identity and data exfiltration controls
      • Data pipelines for tagging for attribute-based access control, masking, and data loss prevention
    • Key Management Architecture
      • Creating centralized key management stores for the organization
      • Patterns for isolating key administrators from data being protected
      • Sharing keys across cloud accounts
      • Regulatory requirements that may require customer-managed or cloud hardware security module (HSM) managed keys
    • Disaster Recovery
      • Advantages and disadvantages of disaster recovery (DR) in the cloud
      • Cloud DR design for Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS)
      • Storage service ransomware prevention, replication, and immutable policy
      • Cross-cloud disaster recovery strategies
  • Overview

    This section covers how to enable your SOC to operate (investigate incidents, log events, hunt for threats) in the new cloud-based world. Covered in this section is a deep dive on cloud data sources, aggregating logs and cloud-native events within the CSP while positioning them for export to the central SIEM. This section teaches students how to build effective architecture which empowers defenders to respond, contain and ultimately recover from cloud-based incidents.

    Exercises
    • Threat Model: Managing Cloud-Native Events (cloud agnostic)
    • Secure Architecture Review: Centralizing Cloud-Native Events (AWS / Azure / Google)
    • Secure Architecture Review: Exporting Telemetry to a SIEM – Azure
    • Secure Architecture Review: Exporting Telemetry to a SIEM – AWS
    • Secure Architecture Review: Exporting Telemetry to a SIEM – GCP
    • CloudWars: Incident Response and Final Presentation
    Topics
    • Security Operations in a Cloud-Centric World
      • On-premises versus cloud security operations
      • Cloud service provider incident coordination
      • Managing security contacts in AWS, Azure, and Google cloud
    • Intra-cloud Logging and Aggregation
      • Understanding the logging journey for events in the cloud
      • Cloud event log types and data elements
      • Designing an intra-cloud security data lake for in-depth analysis
    • Centralized Log Export Patterns
      • Comparing SIEM solutions and platforms
      • Ingesting cloud events using push and pull architecture patterns
      • Exporting AWS log events using Kinesis, S3, and SQS
      • Exporting Azure log events using Event Hub
      • Exporting Google Cloud log events using Pub/Sub
      • Data processing and transformation using Cribl
      • Ingesting cross-cloud log event data using Microsoft Sentinel

GIAC Cloud Security Architecture and Design

The GIAC Cloud Security Architecture and Design (GCAD) certification validates a practitioner’s understanding of cloud provider frameworks and design approaches for secure architecture in the cloud. GCAD certification holders have demonstrated knowledge of the strategies and design techniques for topics such as workforce identity, conditional access, network security controls, and centralized logging.

  • Identity and access management
  • Design and implement Zero-Trust concepts
  • Network architecture and design
  • Data protection
  • Configuring centralized monitoring
More Certification Details

Prerequisites

  • Familiarity with AWS, Azure, and Google Management Consoles and common services in these cloud providers 
  • Experience (or willing to learn) how to use cloud architecture diagram tools such as draw.io. 
  • Ability to run basic Linux commands (or willing to learn) for SSH connections, testing network connectivity, and looking up domain names 
  • Familiarity with identity federation technologies (or willing to learn) such as SAML, Open ID Connect (OIDC), and JSON Web Tokens (JWT)
Preparing For SEC549

Students taking SEC549 will have the opportunity to learn many different architecture patterns across the AWS, Azure, and Google clouds. Basic familiarity with cloud concepts like IAM, role-based access control, identity federation, VPC networks, and storage services management is helpful.

Additionally, students will delve into cloud-native tools for securing deployments at the network layer. Having a basic understanding of network concepts such as firewalls, network access control lists and IP addressing is also very helpful.

Laptop Requirements

Important! Bring your own system configured according to these instructions.

A properly configured system is required to fully participate in this course. If you do not carefully read and follow these instructions, you will not be able to fully participate in hands-on exercises in your course. Therefore, please arrive with a system meeting all the specified requirements.

Back up your system before class. Better yet, use a system without any sensitive/critical data. SANS is not responsible for your system or data.

Mandatory SEC549 System Hardware Requirements

  • Wireless networking (802.11 standard) is required. There is no wired Internet access in the classroom.

Mandatory SEC549 Host Configuration And Software Requirements

  • Your host operating system must be the latest version of Windows 10, Windows 11, or macOS 10.15.x or newer.
  • Fully update your host operating system prior to the class to ensure you have the right drivers and patches installed.
  • If you choose to use Linux as your host, you are solely responsible for configuring it to work with the course materials and/or VMs.

SANS will be providing access to the following cloud environments: AWS, Azure, and Google Cloud. Unfortunately due to some cloud security controls we cannot control, sometimes the login you receive requires verification with a valid phone number where you can receive text messages (virtual numbers will not work). Please ensure you have and are willing to provide your phone number to the cloud provider should this situation occur.

Your course materials include a "Setup Instructions" document that details important steps you must take before you travel to a live class event or start an online class. It may take 30 minutes or more to complete these instructions.

Your class uses ranges.io for delivering the lab documents and challenges. Your class uses a browser hosted electronic workbook for delivering the lab instructions. A second monitor and/or a tablet device can be useful for keeping the lab instructions visible while you are working in the cloud web consoles and draw.io diagrams.

If you have additional questions about the laptop specifications, please contact customer service.

Author Statement

"Distributing our workloads and data to the public cloud increases our perimeter, which is often protected only by identity-based security controls. With the network perimeter being lifted, the margin for error is slim. Even with this grim reality, we can still be optimistic. Migrating to the cloud enables our most innovative technologies and presents an opportunity for the security sector to evolve and mature.

“If armed with the correct foundational design principles, we can build more security in the cloud with greater availability and confidentiality than ever possible on-premises. Transitioning to the new cloud-native, zero-trust world may be bumpy, but we are here to help guide you on your journey."

- Eric Johnson, David Hazar

"Eric was an excellent instructor. He was open to questions and very good with making the content interactive. It was also nice to discuss potential pitfalls he's seen in real life implementations." - Derek Dorman, Wright-Patt Credit Union

"David is a great instructor and was well versed with the content. He was able to answer all my questions, and even elaborate further on some knock on effects. I would definitely highly recommend him to other people looking to take a SANS course." - Jamie Swingler, RLI Corp

Reviews

The content is excellent, provides a lens and framework to look at enterprise problems from an architectural lens and will provide actionable information that can be used Day 1 after this course.
Tyler Piller
British Columbia Lottery Corporation
The labs are the most life like simulation of a security architect’s day that I have seen. For people aspiring to become architects, it gives them a great example of what day to day architecture can be like.
Maciej Bak
Standard Chartered
Current information and lots of it.
Michael Martin
Banner Health

    Register for SEC549

    Learn about Group Pricing

    Prices below exclude applicable taxes and shipping costs. If applicable, these will be shown on the last page of checkout.

    Loading...