CLOUD SECURITY

Cloud security, also known as cloud computing security, is the practice of protecting cloud-based data, applications, and infrastructure from cyber attacks and cyber threats.

[wd_asp id=41]

Frequently Asked Questions

  • Cloud Security
  • What are the requirements for cloud security?
    1: Top-of-the-Line Perimeter Firewall 2: Intrusion Detection Systems with Event Logging 3: Internal Firewalls for Individual Applications, and Databases 4: Data-at-Rest Encryption 5: Tier IV Data Centers with Strong Physical Security
  • What are the Top Threats to Cloud Cyber Security?
    1: Data Breaches 2: Insufficient Identity, Credential, and Access Management 3: Insecure APIs 4: System Vulnerabilities 5: Account Hijacking 6: Malicious Insiders 7: Advanced Persistent Threats 8: Data Loss 9: Insufficient Due Diligence 10: Abuse and Nefarious Use of Cloud Services 11: Denial of Service 12: Shared Technology Vulnerabilities
  • Why is cloud security policy important?

    Most IT department policies and procedures complement each other. They define what is to be provided -- e.g., a cloud security policy -- and how policy compliance is achieved -- e.g., cloud security procedures. Without policies, companies may be at risk of security breaches, financial losses, and other security consequences. Absence of relevant policies can be cited during IT audit activities and, in some cases, may result in noncompliance fines or other penalties.

  • What are the components of a cloud security policy?

    The following is an outline of the necessary components of a cloud security policy:

    · Introduction. State the fundamental reasons for having a cloud security policy.

    · Purpose and scope. Provide details on the cloud policy's purpose and scope.

    · Statement of policy. State the cloud security policy in clear terms.

    · Policy leadership. State who is responsible for approving and implementing the policy, as well as levying penalties for noncompliance.

    · Verification of policy compliance. State what is needed, such as assessments, exercises, or penetration tests, to verify cloud security activities comply with policies.

    · Penalties for noncompliance. State penalties -- for example, verbal reprimand and note in personnel file for internal incidents or fines and legal action for external activities -- for failure to comply with policies and service-level agreements (SLAs) if they are part of the policy.

    · Appendixes (as needed). Provide additional reference information, such as lists of contacts, SLAs, or additional details on specific cloud security policy statements.

  • Why is cloud security important?

    Far too often, organizations place their trust in cloud providers to ensure a secure environment. Unfortunately, that approach has numerous problems -- namely that cloud providers don't always know the risk associated with a customer's systems and data. They don't have visibility into other components in the customer's ecosystem and the security requirements of those components. Failing to take ownership of cloud security is a serious downfall that could lead organizations to suffer data loss, system breaches, and devastating attacks.

  • What are the most cloud security challenges?

    misconfigurations and inadequate change controls;

    lack of cloud security architecture and strategy;

    insufficient identity, credential, access and key management;

    account hijacking; insecure interfaces and APIs;

    and abuse and nefarious use of cloud services.

  • Who is responsible for cloud security?

    Organizations should create a cloud IAM team dedicated to certain aspects of cloud security, such as access, authentication, and authorization. Shackleford recommended that the cloud IAM team, which could tackle single sign-on and federation, should be started with existing internal groups because they have a deep understanding of the business and its goals.

  • What's a CASB?

    A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure. CASBs are available as both an on-premises or cloud-based software as well as a service.

  • What are the pillars of CASB ?

    1. Firewalls to identify malware and prevent it from entering the enterprise network

    2. Authentication to check users' credentials and ensure they only access appropriate company resources

    3. Web application firewalls (WAFs) to thwart malware designed to breach security at the application level, rather than at the network level

    4. Data loss prevention (DLP) to ensure that users cannot transmit sensitive information outside of the corporation

  • How does a CASB work?

    CASBs work by ensuring that network traffic between on-premises devices and the cloud provider complies with an organization's security policies. CASBs use autodiscovery to identify cloud applications in use and identify high-risk applications, high-risk users, and other key risk factors. Cloud access security brokers may enforce a number of different security access controls, including encryption and device profiling. They may also provide other services such as credential mapping when single sign-on is not available.

  • BOOKS

    0
    SHARES
    5
    VIEWS
    Securing DevOps: Security in the Cloud

    Securing DevOps explores how the techniques of DevOps and security should be applied together to make cloud services safer. This introductory book reviews the latest practices used in securing web applications and their infrastructure and teaches you techniques to integrate security directly into your product. You'll also learn the core...

    Read more

    COURSES & CERTS

    DEFINITIONS

    ENTERTAINMENT

    0
    SHARES
    0
    VIEWS
    Meanwhile in Security – Podcast

    Cloud security is a minefield of news that assumes the word 'Security' is lurking somewhere in your job description. It doesn't have to be this way. Weekly cloud security news for people with other jobs to do. Cloud Security For Humans.

    Read more

    QUOTES

    0
    SHARES
    22
    VIEWS
    “We are in a cloud security transition…”

    We are in a cloud security transition period in which focus is shifting from the provider to the customer. Enterprises are learning that huge amounts of time spent trying to figure out if any particular cloud service provider is ‘secure’ or not has virtually no payback

    Read more

    TOOLS

    Welcome Back!

    Create New Account!

    Retrieve your password

    Please enter your username or email address to reset your password.

    Add New Playlist