CIOApplications
static-image
  • Home
  • Applications
      • Bioinformatics
      • Business Continuity
      • Business Intelligence
      • Chatbot
      • Collaboration
      • Custom Software Development
      • CRM
      • Enterprise Reporting Software
      • GRC
      • Human Resource
      • Indoor Positioning
      • InsurTech
      • Intellectual Property
      • IT Operations Management
      • IT Service Management
      • Low Code Platform
      • Maintenance Management
      • Managed IT Services
      • MarTech
      • Master Data Management
      • Mobile Application
      • Order Management
      • Parking Management
      • Procurement Tech
      • Publishing Software
      • Remote Monitoring
      • RFID
      • Sales Tech
      • SAS
      • Software Testing
      • Task Management
      • Unified Communications
      • Workflow
      • Workplace Management
  • Verticals
      • BioTechnology
      • Construction
      • Contact Center
      • Education
      • Fintech
      • Food and Beverages
      • Government
      • Healthcare
      • Legal
      • Logistics
      • Manufacturing
      • Travel and Hospitality
      • Utilities
  • Technologies
      • Agile
      • API
      • Artificial Intelligence
      • Blockchain
      • CAD/CAM
      • Cloud
      • Cyber Security
      • Data Analytics
      • Data Center
      • Digital Transformation
      • Graphics
      • IoT
      • Machine Learning
      • Machine Vision and Imaging
      • Predictive Analytics
      • Robotic Process Automation
      • Simulation
      • Smart Labelling
  • Eco System
      • Adobe
      • Amazon
      • Esri
      • Google
      • IBM
      • Infor
      • Kubernetes Partner
      • NetSuite
      • Oracle
      • PTC Partners
      • Qlik Partner
      • Salesforce
      • ServiceNow
      • SiteCore
      • VMware
  • Vendors
  • News
  • Newsletter
  • Whitepaper
  • conferences
  • About Us
  • Specials

  • Menu
      • Business Continuity
      • Chatbot
      • Cloud
      • Collaboration
      • Contact Center
      • Esri
      • Human Resource
      • InsurTech
      • IT Service Management
      • Machine Learning
      • Manufacturing
      • Master Data Management
      • Procurement Tech
      • Robotic Process Automation
      • Salesforce
      • ServiceNow
      • Software Testing
  • Contact Center
  • Collaboration
  • Chatbot
  • Esri
  • Human Resource
  • InsurTech
  • Machine Learning
Specials
  • Specials

  • Business Continuity
  • Chatbot
  • Cloud
  • Collaboration
  • Contact Center
  • Esri
  • Human Resource
  • InsurTech
  • IT Service Management
  • Machine Learning
  • Manufacturing
  • Master Data Management
  • Procurement Tech
  • Robotic Process Automation
  • Salesforce
  • ServiceNow
  • Software Testing
×
#

CIO Applications Weekly Brief

Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from CIO Applications

Subscribe

loading
  • Home
  • Cloud
Editor's Pick (1 - 4 of 8)
left
Brokering the Cloud Services

Brokering the Cloud Services
Eric Boyette, Secretary & State CIO, Information Technology

The Cloud (and DMS)

The Cloud (and DMS)
Judi Flournoy, CIO, Kelley Drye & Warren LLP

Conducting Cloud Operations Economically

Conducting Cloud Operations Economically
Scott Crowder, SVP and CIO, BMC Software

Leveraging Cloud for Enhanced Productivity

Leveraging Cloud for Enhanced Productivity
Aaron Gette, CIO, The Bay Club Company

UNLOCKING GREAT CONSUMER EXPERIENCES WITH LEAN CLOUD STACKS

UNLOCKING GREAT CONSUMER EXPERIENCES WITH LEAN CLOUD STACKS
Anthony Baker, Executive Technology Director, R/GA

THREE TOP PICKS TO HELP YOU START YOUR CLOUD-BASED TECHNOLOGY JOURNEY

THREE TOP PICKS TO HELP YOU START YOUR CLOUD-BASED TECHNOLOGY JOURNEY
Andrew Scales, Head of Employee Rewards and Systems, Domain

CLOUD INFRASTRUCTURE: SUPPORTING ORGANIZATIONS ADOPTING CLOUD TECHNOLOGIES

CLOUD INFRASTRUCTURE: SUPPORTING ORGANIZATIONS ADOPTING CLOUD...
John R. Wetsch, Ph.D., Program Director for Cloud Computing, Wake Technical Community College

RHB Leads the Way for Green Data Centres

RHB Leads the Way for Green Data Centres
Johari Ariff Bin Osman, Head, Data Centre Facility, RHB Banking Group

right

Thank you for Subscribing to CIO Applications Weekly Brief

Five Must-Adopt Cloud Security Practices

By CIO Applications| Thursday, December 10, 2020
Tweet

Some businesses employ ethical hackers or "red teams" to simulate an attack on their cloud infrastructure. This best practice will uncover security vulnerabilities until they are discovered by a criminal hacker or flagged in an external audit.

Fremont, CA: Transition to the cloud is one of the most important technology changes the business can face. The details of cloud security activities differ depending on your cloud platforms and use cases, but there are certain acceptable practices that any company should follow.

Here are five cloud securities every organization needs to practice:

Put the Systems to the Test

Check the cloud protection controls to see how well they can stand up to a cyber attack. Some businesses employ ethical hackers or "red teams" to simulate an attack on their cloud infrastructure. This best practice will uncover security vulnerabilities until they are discovered by a criminal hacker or flagged in an external audit.

Know Cloud Security Responsibilities

It is your responsibility and not your cloud provider to handle sufficient access and permissions for every user and device that interacts with cloud-based systems. These systems can include essential software or databases stored in the cloud, cloud frameworks for application creation, or tools used by the company or technical teams.

Take Extra Care for Third Parties

Vendor protection should be practiced as long as the third party is actively engaging with your company, and as soon as the interaction is finished. Vendor privileged access management (VPAM) solutions will include risks, handle privileged access, and include an audit trail to keep everyone accountable.

Plan for Change

The occasional discovery search of privileged accounts will not provide you with the exposure and control you need. Instead, implement continuous discovery for all types of cloud accounts as best practice. Then you should make sure your approvals are correctly configured and that proper monitoring is in place.

Map Compliance Requirements to Cloud Functions

Mapping your privileged access management policies to any enforcement mandates that are necessary for your company. If you're adopting NIST, CIS Controls, or some other best practice system for cybersecurity, make sure you have cloud defense in your policies.

tag

Securities

cyber attack

Weekly Brief

loading
ON THE DECK

Top Vendors

Field Service 2021

Top Vendors

Previous Next
Tweets by CIOApplications

Read Also

Four Benefits of Cloud-Based Business Budgeting Software

Four Benefits of Cloud-Based Business Budgeting Software

Four Major Benefits of Green Technology in the Construction Industry

Four Major Benefits of Green Technology in the Construction Industry

Things You Should Know About Insurtech

Things You Should Know About Insurtech

AiFi Announces Partnership with Wundermart to Launch Autonomous Convenience Stores

AiFi Announces Partnership with Wundermart to Launch Autonomous Convenience Stores

Abalta's WebLink Receives Support from Genius Maps

Abalta's WebLink Receives Support from Genius Maps

iTradeNetwork Implements Walmart-Compliant ASN on its Platform

iTradeNetwork Implements Walmart-Compliant ASN on its Platform

Loading...

I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

Copyright © 2021 CIOApplications. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy |  Sitemap  |  Subscribe |  About Us

follow on linkedin follow on twitter follow on rss
This content is copyright protected close

However, if you would like to share the information in this article, you may use the link below:

https://www.cioapplications.com/news/five-mustadopt-cloud-security-practices--nid-6924.html