Skip to content
Menu
Cloud Gal 42
  • Home
Cloud Gal 42

Category: compliance

ISO 31000:2018 Risk Framework

June 29, 2021June 24, 2021 by admin

Risk frameworks are useful for organizations that require a clear roadmap for managing risk in their environments. What an organization determines is acceptable risk, its risk profile or appetite, is related to internal mission commitments and external drivers such as laws, regulations, and consumer expectations. This section will consider frameworks that can serve as tools…

Read More

Data Privacy: Regulatory Transparency Requirements

June 28, 2021June 24, 2021 by admin

Previous article in series – Data Privacy: Difference Between Data Owner/Controller and Data Custodian/Processor There are various regulatory requirements regarding data transparency and requirements that stem from data breaches. The definition of what entails a breach is as varied as the regulations and includes but is not limited to impermissible use, disclosure, probability of compromise,…

Read More

Data Privacy: Difference Between Data Owner/Controller and Data Custodian/Processor

June 27, 2021June 24, 2021 by admin

Previous article in series – Data Privacy: Maturity Model By far the most comprehensive data protection framework that currently affects 28 nations directly and all interconnected (business trade) nations secondarily is the injunctions of the GDPR. These materials draw upon the definitions used by the European Commission to distinguish the roles related to data privacy…

Read More

North American Electric Reliability Corporation/Critical Infrastructure Protection (NERC/CIP)

June 26, 2021June 24, 2021 by admin

NERC/CIP is committed to protecting the bulk power system against cybersecurity compromises that could lead to maloperation or instability. On November 22, 2013, Federal Energy Regulatory Commission (FERC) approved Version 5 of the critical infrastructure protection cybersecurity standards (CIP Version 5), which represent significant progress in mitigating cyber risks to the bulk power system. The…

Read More

Audit: Internal Information Security Management System

June 25, 2021June 21, 2021 by admin

Previous article n series – Audit: Types of Audit Reports ISO/IEC 27001:2013 Domains Upon passing the audit process, an organization can have its information security management system (ISMS) certified by ISO/IEC 27001:2013. An ISMS will typically ensure that a structured, measured, and ongoing view of security is taken across an organization, allowing security impacts and…

Read More

Audit: Types of Audit Reports

June 24, 2021June 30, 2021 by admin

Previous article in series – Audit: Assurance Challenges of Virtualization and Cloud The Service Organization Control audits framework is designed for consumers to have confidence in the provider they’ve selected and for the provider to give assurance of the design and effectiveness of controls. Consumers are provided a means to assess and address risk with…

Read More

Audit: Assurance Challenges of Virtualization and Cloud

June 23, 2021June 17, 2021 by admin

Previous article in series – Audit: Planning Traditional methods of assurance of services and controls management in an on-premises data center or even with colocation services are no longer sufficient given the complexity of virtualization and cloud services. To gain greater assurance of expected services, we can review information available from publicly accessible registries. Cloud…

Read More

Audit: Planning

June 22, 2021June 11, 2021 by admin

Previous article in series – Audit: Internal and External Audit Controls In line with financial, compliance, regulatory, and other risk-related audits, the requirement for scoping and ensuring the appropriate focus and emphasis on components most relevant to cloud computing (and associated outsourcing) should include the following phases:   Define Audit Objectives The high-level objectives should…

Read More

Audit: Internal and External Audit Controls

June 21, 2021June 11, 2021 by admin

As organizations begin to transition services to the cloud, there is a need for ongoing assurances from both cloud customers and cloud service providers that controls are put in place and are operating as intended. An organization’s internal audit can provide visibility into: The cloud program’s effectiveness Assurance to the board and risk management team…

Read More

Data Privacy: Maturity Model

June 20, 2021June 24, 2021 by admin

Previous article in series – Data Privacy: Standard Requirements Maturity models are a recognized means by which organizations can measure their progress against established benchmarks. As such, they recognize that: Becoming compliant is a journey and progress along the way strengthens the organization, whether the organization has achieved all of the requirements or not In…

Read More
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next

Recent Posts

  • Role of AI/ML in Cybersecurity
  • QuickGuide: Security on OCI
  • The Cloud Management Plane
  • Secure Installation and Configuration of Virtualized Cloud Datacenters
  • Cloud Datacenter: Hardware-specific Security Configuration Requirements

Recent Comments

  • Rafael on Installing Debian on OCI
  • Jorge on Installing Debian on OCI
  • admin on Installing Debian on OCI
  • Andreas on Installing Debian on OCI
  • admin on Installing Debian on OCI

Archives

  • December 2022
  • February 2022
  • September 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • February 2021
  • January 2021
  • November 2020
  • October 2020

Categories

  • aws
  • bcdr
  • cloud
  • cloudsecurity
  • compliance
  • informationsecurity
  • oracle
  • pci
  • QuickGuide
  • security
©2025 Cloud Gal 42 | Powered by WordPress and Superb Themes!