Module 47: Cloud Application Architecture and Security Components
The CCSP exam tests whether you understand how architectural decisions create or eliminate security risks — and that the best security is designed into the architecture, not bolted on after.
Microservices Security Architecture
Microservices decompose applications into small, independent services. The exam tests security implications:
- Increased attack surface — more services means more endpoints, more APIs, more potential vulnerabilities
- Service mesh — infrastructure layer handling service-to-service communication with built-in mTLS, observability, and traffic management
- Sidecar proxy pattern — security proxy alongside each service handles auth, encryption, and logging transparently
- Service identity — each microservice needs its own identity for authentication and authorization
If the exam describes a microservices architecture where internal services communicate without authentication, the answer involves implementing a service mesh with mutual TLS — not adding a perimeter firewall.
Event-Driven and Serverless Architecture
Event-driven patterns introduce unique security considerations:
- Every event source is a potential attack vector (message queues, object storage triggers, HTTP webhooks)
- Input validation must occur at every event handler, not just the entry point
- Function permissions must follow least privilege for each individual function
- Cold start environments may retain data from previous invocations
- Observability is harder because traditional monitoring tools cannot instrument ephemeral functions
Multi-Tenant Application Design
SaaS applications serving multiple customers require careful tenant isolation:
- Data isolation — separate databases per tenant (strongest), schema-per-tenant, or row-level filtering (weakest)
- Compute isolation — dedicated containers or instances per tenant vs. shared runtime
- Network isolation — tenant-specific VPCs or network namespaces
- Noisy neighbor — one tenant consuming excessive resources affecting others
The exam expects you to understand the trade-offs: stronger isolation is more secure but more expensive. The correct isolation level depends on data sensitivity and regulatory requirements.
Security Components and Services
Cloud applications leverage dedicated security components:
- WAF (Web Application Firewall) — Layer 7 inspection protecting against OWASP Top 10 attacks
- CASB (Cloud Access Security Broker) — visibility and control over SaaS application usage
- RASP (Runtime Application Self-Protection) — embedded security that detects and blocks attacks in real-time
- SIEM integration — centralized log analysis for security event correlation across cloud applications
- Secrets manager — secure storage and rotation of application credentials