Skip to content
Menu
Cloud Gal 42
  • Home
Cloud Gal 42

Category: cloudsecurity

Data Loss Prevention (DLP)

July 12, 2021 by admin

Data loss prevention and data leakage prevention are terms used interchangeably to describe the controls put in place by an organization to ensure that certain types of data (structured and unstructured) remain under organizational controls, in line with policies, standards, and procedures. Controls to protect data form the foundation of organizational security and enable the…

Read More

Cloud Storage Services

July 9, 2021July 12, 2021 by admin

At the core of all cloud services, products, and solutions are software tools with three underlying pillars of functionality: Processing data and running applications (compute servers) Moving data (networking) Preserving or storing data (storage) Cloud Storage Services Cloud storage is basically defined as data storage that is made available as a service via a network….

Read More

How Cloud impacts Supply Chain & Vendor Management

July 4, 2021June 28, 2021 by admin

It is important to understand the capabilities and policies of your supporting vendors. Emergency communication paths should be established and tested with all vendors. Categorizing, or ranking, a vendor/supplier on some sort of scale is critical when managing the relationship with that vendor/supplier appropriately. Strategic suppliers are deemed to be mission critical and cannot be…

Read More

Audit: Assurance Challenges of Virtualization and Cloud

June 23, 2021June 17, 2021 by admin

Previous article in series – Audit: Planning Traditional methods of assurance of services and controls management in an on-premises data center or even with colocation services are no longer sufficient given the complexity of virtualization and cloud services. To gain greater assurance of expected services, we can review information available from publicly accessible registries. Cloud…

Read More

Security Considerations for Software as a Service (SaaS)

June 2, 2021May 25, 2021 by admin

Previous article in series – Security Considerations for PaaS When SaaS is consumed from a public cloud service provider, the security options that the customer can control may be only at the application level. In that model, application security is the responsibility of the cloud service provider, but the customer retains responsibility for identity access…

Read More

Security Considerations for Platform as a Service (PaaS)

June 1, 2021June 7, 2021 by admin

Previous article in the series – IaaS: Cloud Virtual Infrastructure Threats With the PaaS (platform as a service) model the vendor offers a complete development environment in which application developers can create and deploy their code. This avoids the need to build a server environment to run an application and the need to install a…

Read More

IaaS: Cloud Virtual Infrastructure Threats

May 31, 2021June 7, 2021 by admin

Previous article in series – IaaS: Hypervisor Security Provisioning tools and VM templates are exposed to different attacks that attempt to create new unauthorized VMs or patch the VM templates to infect the other VMs that will be cloned from this template. These new categories of security threats are a result of the new, complex,…

Read More

IaaS: Hypervisor Security

May 30, 2021June 7, 2021 by admin

Previous article in series – Cloud Computing: Shared Security Model The hypervisor acts as the abstraction layer that provides the management functions for required hardware resources among VMs. Virtual machine attacks: Active VMs are vulnerable to all traditional attacks that can affect physical servers. Once a VM is compromised, it may be able to attack…

Read More

Cloud Computing: Shared Security Model

May 29, 2021June 2, 2021 by admin

In cloud computing, security is a shared responsibility between the CSP and the customer. The service model will dictate the general responsibilities, but specifics will also vary based on the actual service being consumed. Security Considerations for Infrastructure as a Service (IaaS) Within IaaS, a key emphasis and focus must be placed on the various…

Read More

ISO/IEC 27017: Information Security Controls for Cloud Computing

May 28, 2021May 25, 2021 by admin

ISO/IEC 27017:2015 gives guidelines for information security controls applicable to the provision and use of cloud services by providing: Additional implementation guidance for relevant controls specified in ISO/IEC 27002 Additional controls with implementation guidance that specifically relate to cloud services. This standard provides enhanced controls for cloud service providers and cloud service customers and should…

Read More
  • Previous
  • 1
  • 2
  • 3
  • 4
  • Next

Recent Posts

  • Role of AI/ML in Cybersecurity
  • QuickGuide: Security on OCI
  • The Cloud Management Plane
  • Secure Installation and Configuration of Virtualized Cloud Datacenters
  • Cloud Datacenter: Hardware-specific Security Configuration Requirements

Recent Comments

  • Rafael on Installing Debian on OCI
  • Jorge on Installing Debian on OCI
  • admin on Installing Debian on OCI
  • Andreas on Installing Debian on OCI
  • admin on Installing Debian on OCI

Archives

  • December 2022
  • February 2022
  • September 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • February 2021
  • January 2021
  • November 2020
  • October 2020

Categories

  • aws
  • bcdr
  • cloud
  • cloudsecurity
  • compliance
  • informationsecurity
  • oracle
  • pci
  • QuickGuide
  • security
©2025 Cloud Gal 42 | Powered by WordPress and Superb Themes!