Career upgrade: Learn practical AI skills for better jobs and higher pay.
Level up
Cheat sheet

Alibaba CSA-C01 Cheat Sheet

Cloud Security Basics

8%of exam

Shared ResponsibilityMLPSThreatsRisk TreatmentIR Lifecycle

Identity + Access

18%of exam

RAMSTSMFASSOResource Directory

Host + Operations

24%of exam

Security CenterBastionhostActionTrailLog ServiceCloud Config

Data Protection

22%of exam

KMSSecrets ManagerOSS EncryptionRDS TDESDDP

Network Security

28%of exam

Security GroupsNetwork ACLsCloud FirewallWAFAnti-DDoS

Quick Facts

Exam
CSA-C01
Credential
Cloud Security Engineer
Questions
50 MCQ
Time
90 min
Pass
70/100
Fee
$200 USD
Language
English
Delivery
Pearson VUE
Retake
14 days
Replaces
ACA Cloud Security

Exam Basics

CSA-C01
Current security exam
ACA Security
Retired predecessor
Associate
Entry practitioner level
Scenario focus
Choose correct service
No prereq
Cloud basics recommended
Pearson VUE
Online or center
Nonrefundable
Fee not returned
Course
Eight Academy chapters

Security Basics

Shared model
Provider plus customer
Alibaba owns
Facilities hypervisor platform
Customer owns
Data identities config
ECS customer
Guest OS patches
Defense depth
Layered cloud controls
Least privilege
Minimum necessary access
MLPS
China protection levels
ISO 27001
ISMS evidence

Secure Architecture

Private subnets
Hide internal services
WAF entry
Protect web ingress
Firewall egress
Restrict outbound paths
No public DB
Use private access
Tagged assets
Scope policy audits
Central logs
Preserve evidence
Break-glass
Emergency admin path
Pen test notice
Notify before testing

RAM Policy Core

EARC: Effect Action Resource Condition

EffectActionResourceCondition

RAM User vs Role

RAM user

  • Long-term identity
  • Human or workload
  • Can hold AccessKeys

RAM role

  • Assumed identity
  • Temporary STS tokens
  • Cross-account access

Static vs assumed

Identity Picker

  1. Daily human adminRAM user(MFA required)
  2. Many similar usersUser group(Attach policies)
  3. Cross-account accessRAM role(Trust policy)
  4. App needs OSSSTS(Temporary token)
  5. Corporate loginSSO(Federated access)
  6. Many accountsResource Directory(Central governance)
  7. Maximum permissionsControl policy(Guardrail)
  8. API secret foundRotate AccessKey(Check ActionTrail)

RAM Core

Root account
Account-level identity
RAM user
Person or workload
User group
Policy assignment set
RAM role
Assumable identity
System policy
Alibaba-managed policy
Custom policy
Customer-authored policy
Implicit deny
Default no access
Explicit Deny
Overrides any Allow

System vs Custom Policy

System policy

  • Alibaba managed
  • Broad common access
  • Updated by provider

Custom policy

  • Customer authored
  • Fine-grained scope
  • Maintained by customer

Managed vs tailored

RAM Governance

STS
Temporary scoped credentials
AccessKey
Long-lived API secret
MFA
Second login factor
SAML SSO
Corporate identity federation
OIDC
Token-based federation
Resource Directory
Multi-account hierarchy
Control policy
Account permission guardrail
Condition
Context-based restriction

Ops Evidence Chain

Access, events, logs, config

BastionhostActionTrailLog ServiceCloud Config

ActionTrail vs Log Service

ActionTrail

  • Control-plane events
  • Console API activity
  • Audit evidence

Log Service

  • Log analytics
  • Dashboards alerts
  • Multi-source logs

Events vs analytics

Operations Picker

  1. Host risk postureSecurity Center
  2. Hardening driftBaseline check
  3. Admin shell accessBastionhost
  4. Trace API callActionTrail
  5. Search security logsLog Service
  6. Detect config driftCloud Config
  7. Protect object dataOSS SSE-KMS
  8. Rotate app secretSecrets Manager

Host Operations

Security Center
Host threat posture
Vulnerability scan
Find missing fixes
Baseline check
Hardening drift detection
Webshell detection
Malicious script finding
Malware alert
Suspicious file signal
Ransomware defense
Backup and detection
Image scan
Container risk finding
Proactive defense
Higher edition feature

Audit + Logging

Bastionhost
Privileged access gateway
Session recording
Replay admin activity
Command audit
Track risky commands
ActionTrail
API console events
Event lookup
Who did what
Log Service
Central log analytics
Log alert
Detection notification
Cloud Config
Configuration compliance rules

Data Lock Stack

Keys, secrets, encryption, immutability

KMSSecrets ManagerSSE-KMSWORM

KMS vs Secrets Manager

KMS

  • Cryptographic keys
  • Envelope encryption
  • Service integrations

Secrets Manager

  • Passwords tokens
  • Secret rotation
  • Application retrieval

Keys vs secrets

Data Security

KMS
Managed key service
CMK
Customer master key
Data key
Encrypts actual data
Envelope encryption
CMK wraps data keys
BYOK
Import customer key
Key rotation
Limit key lifetime
HSM
Hardware key protection
Scheduled deletion
Delayed key destruction

Storage + Database

Secrets Manager
Rotate application secrets
OSS SSE
Server-side object encryption
SSE-KMS
KMS-backed OSS encryption
Block Public Access
Prevent public buckets
Bucket policy
Object access rules
OSS WORM
Immutable retention
RDS TDE
Database at-rest encryption
RDS SSL
Encrypted database transport

Edge Defense Triad

Flood, web exploit, traffic policy

Anti-DDoSWAFCloud Firewall

Security Group vs ACL

Security group

  • Stateful rules
  • Instance or ENI
  • Workload firewall

Network ACL

  • Stateless rules
  • Subnet boundary
  • Extra segmentation

Instance vs subnet

Network Picker

  1. Instance port controlSecurity group(Stateful)
  2. Subnet-wide controlNetwork ACL(Stateless)
  3. Central firewallingCloud Firewall(Policy hub)
  4. HTTP exploit attemptsWAF(Layer seven)
  5. Traffic floodAnti-DDoS(Scrubbing)
  6. Bot abuseBot Management(Behavior rules)
  7. No public pathPrivate endpoint(Internal access)
  8. TLS offloadSLB certificate(HTTPS entry)

Network Controls

Security group
Stateful instance firewall
Network ACL
Stateless subnet control
VPC
Private network boundary
vSwitch
Zone subnet segment
Route table
Traffic path rules
Private endpoint
No public internet
Internal endpoint
Alibaba backbone access
SLB TLS
Managed certificate termination

WAF vs Anti-DDoS

WAF

  • HTTP inspection
  • SQLi XSS bots
  • Application layer

Anti-DDoS

  • Traffic scrubbing
  • Flood protection
  • Availability defense

Exploit vs flood

Edge Defense

Cloud Firewall
Central traffic control
Internet firewall
North-south policy
VPC firewall
East-west policy
IPS
Inline threat blocking
WAF
HTTP attack defense
Managed rules
OWASP protections
Bot Management
Automated abuse control
Anti-DDoS
Volumetric flood scrubbing

Cloud Firewall vs Security Group

Cloud Firewall

  • Central policy
  • IPS intelligence
  • Cross-boundary logs

Security group

  • Distributed rules
  • Port allowlist
  • No managed IPS

Central vs local

Common Traps

Current vs Retired Exam

CSA-C01 current ACA Security retired

Customer vs Provider

Guest OS customer Hypervisor Alibaba

Temporary vs Permanent Credentials

STS temporary AccessKey long-lived

HTTP Exploit vs Flood

WAF blocks SQLi Anti-DDoS absorbs floods

Stateful vs Stateless

Security group stateful Network ACL stateless

Audit vs Access

ActionTrail records events Bastionhost controls sessions

Keys vs Secrets

KMS manages keys Secrets Manager rotates secrets

Evidence vs Deletion

Preserve logs first Do not delete trails

Last Minute

  1. 1.Memorize 50 questions format
  2. 2.Use CSA-C01 facts only
  3. 3.Root account needs MFA
  4. 4.Prefer roles plus STS
  5. 5.Explicit Deny always wins
  6. 6.Security groups are stateful
  7. 7.Network ACLs are stateless
  8. 8.WAF protects HTTP apps
  9. 9.Anti-DDoS handles floods
  10. 10.ActionTrail answers who did
  11. 11.KMS enables envelope encryption
  12. 12.Preserve logs during incidents
Same family resources

Explore More Alibaba Cloud Certifications

Continue into nearby exams from the same family. Each card keeps practice questions, study guides, flashcards, videos, and articles in one place.