Previous article in series – Digital Forensics: Preparing for a Legal Hold E-Discovery Service Types SaaS-based: To some, “e-discovery in the cloud” means using the cloud to deliver tools used for e-discovery. SaaS packages typically cover one of several e-discovery tasks, such as collection, preservation, or review. Hosted e-discovery (provider): In the cloud, e-discovery can…
Category: compliance
Digital Forensics: Preparing for a Legal Hold
Previous article in series – Digital Forensics: E-Discovery Preparing for a legal hold or e-discovery may include the following: Consideration of the SLA and contract agreements to ensure that investigations of cloud-based assets are permitted, or to check if prior notification and acceptance are required Contract agreements, explicitly stating the communication path between court participants…
Digital Forensics: E-Discovery
Previous article in series – Digital Forensics: Challenges & Recommendations What is E-Discovery? Electronic discovery (e-discovery) is the identification, preservation, collection, processing, review, analysis, or production of electronically stored information. Often it is the support mechanism and the impetus for investigations, data acquisition, and insight-driven initiatives. To properly manage e-discovery a multidisciplinary team needs to…
Digital Forensics: Challenges & Recommendations
Welcome to the fun world of Digital Forensics! *ahem* It’s even more fun on the Cloud. Gathering evidence is a crucial part of digital forensics, cloud or otherwise. Therefore, it is important to identify challenges before you begin the process. Key challenges to keep in mind are – The seizure of servers containing files from…
Corporate & Cloud Governance
Policies are the foundation of corporate governance. They require penalties as well as senior management sponsorship to be effective. Policies are created in response to a requirement such as a standard or requirement benchmark. This standard is the result of either a regulation, which is a legislative requirement, or a contractual requirement such as a…
Governance, Risk Management, and Compliance (GRC)
An approach commonly known as governance, risk management, and compliance (GRC) has evolved to analyze risks and manage mitigation in alignment with business and compliance objectives. Governance ensures the business focuses on core activities, clarifies who in the organization has the authority to make decisions, determines accountability for actions and responsibility for outcomes, and addresses…
Intrusion Kill Chain Framework by Lockheed Martin
The “intrusion kill chain” framework is an analytical tool introduced by Lockheed Martin security researchers in 2011. It is also sometimes referred to as the “Cyber Kill Chain”. It is an intelligence- driven, threat-focused approach to study intrusions from the adversaries’ perspective that could give network defenders the upper hand in fighting cyber attackers. So, what is…
Revisiting the Target breach of 2013
Between November 27 and December 18, 2013, the Target Corporation’s network was breached. 40 million credit and debit card numbers and 70 million records of personal information were stolen. The ordeal cost credit card unions over two hundred million dollars for just reissuing cards. Six months prior to the breach, Target deployed a well-known and…
Cloud Encryption Challenges
There are myriad factors influencing encryption considerations and associated implementations in the enterprise. The usage of encryption should always be directly related to business considerations, regulatory requirements, and any additional constraints that the organization may have to address. Different techniques will be used based on the location of data, whether at rest, in transit, or…
Cloud Data Storage: Key Threats
Are you using cloud storage services? If yes, then you need to be aware of these key threats. In the cloud, data storage can be manipulated into unauthorized usage, for example, by account hijacking or uploading illegal content. The multitenancy of cloud storage makes tracking unauthorized usage more challenging. Unauthorized access: Unauthorized access can happen due to…