Skip to content
Menu
Cloud Gal 42
  • Home
Cloud Gal 42

Category: security

Secure Cloud Data Center Design – Part 2

September 1, 2021 by admin

Physical Environment ISO/IEC TS 22237-1:2018: Information technology — Data center facilities and infrastructures enumerates availability and protection classes that define different levels of recommended environment restrictions, automated support systems, and design criteria for data centers. The ISO/IEC 22237 seven-part series is comprised of: ISO/IEC TS 22237-1:2018 Information technology — Data center facilities and infrastructures outlines…

Read More

Secure Cloud Data Center Design – Part 1

July 28, 2021July 21, 2021 by admin

Secure cloud data center design begins with a logical design that then leads to physical design. ISO/IEC 19441:2017 provides illumination on two key concerns related to data in a data center, namely portability and interoperability. The basic environmental protection concerns within a data center are evolving to include concerns outside of the data center. Logical…

Read More

Continuous Operations

July 26, 2021July 19, 2021 by admin

In order to support continuous operations, the following principles should be adopted as part of the security operations policies. Audit logging: Higher levels of assurance are required for protection, retention, and lifecycle management of audit logs, adhering to applicable legal, statutory, or regulatory compliance obligations. Audit logging also provides unique user access accountability that can…

Read More

Data Event Logging and Event Attributes

July 26, 2021July 19, 2021 by admin

In order to be able to perform effective audits and investigations, the event log should contain as much of the relevant data as possible for the processes being examined. OWASP Proactive Controls v3.0, section C9, recommends the following when implementing security logging functions. For security logging implementation: Use a common logging format and approach within…

Read More

An Effective Information Security Continuous Monitoring (ISCM) Strategy

July 26, 2021July 19, 2021 by admin

Continuous monitoring is a concept that has grown in importance during the transition to cloud computing. Information Security Continuous Monitoring (ISCM) is defined as “maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions.” Resource: NIST SP 800-137, page vi http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-137.pdf The terms continuous and ongoing in this context mean…

Read More

Applying Controls for Personally Identifiable Information (PII)

July 25, 2021July 14, 2021 by admin

The operative application of defined controls for the protection of PII is widely affected by the “cluster” of providers/sub-providers involved in the operation of a specific cloud service; therefore, any attempt to provide guidelines for this can be made only at a general level. Since the goal of applying data protection measures is to fulfill…

Read More

Data Security on the Cloud

July 25, 2021July 19, 2021 by admin

Data stored in the cloud replicates, moves, and is backed up and restored just as non-cloud data is. However, the dynamic and elastic nature of the cloud can present unique challenges when looking to build efficient data governance policies in the virtualized, multitenant environment of the cloud. From time to time, an organization needs to…

Read More

Data Protection on the Cloud

July 24, 2021July 15, 2021 by admin

Data protection policies should include guidelines for the different data lifecycle phases. In the cloud, the following three policies should receive proper adjustments and attention: Data retention Data deletion Data archiving Policies serve as the operational foundation for all aspects of data management and should be clearly reflected in data retention, deletion, and archival activities….

Read More

Data Classification for P&DP Purposes

July 24, 2021July 14, 2021 by admin

The figure below provides a quick recap of the main input entities for data classification regarding P&DP. Data classification can be accomplished in different ways ranging from “tagging” the data by using other external information, to extrapolating the classification from the content of the data. The latter method, however, may raise some concerns because, according…

Read More

Classification of Discovered Sensitive Data

July 23, 2021July 14, 2021 by admin

Classification of data for the purpose of compliance with the applicable privacy and data protection laws plays an essential role for the operative control of those elements that are the feeds of the P&DP compliance. This means that not only the “nature” of the data should be traced with classification but also its relationship with…

Read More
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 9
  • Next

Recent Posts

  • Role of AI/ML in Cybersecurity
  • QuickGuide: Security on OCI
  • The Cloud Management Plane
  • Secure Installation and Configuration of Virtualized Cloud Datacenters
  • Cloud Datacenter: Hardware-specific Security Configuration Requirements

Recent Comments

  • Rafael on Installing Debian on OCI
  • Jorge on Installing Debian on OCI
  • admin on Installing Debian on OCI
  • Andreas on Installing Debian on OCI
  • admin on Installing Debian on OCI

Archives

  • December 2022
  • February 2022
  • September 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • February 2021
  • January 2021
  • November 2020
  • October 2020

Categories

  • aws
  • bcdr
  • cloud
  • cloudsecurity
  • compliance
  • informationsecurity
  • oracle
  • pci
  • QuickGuide
  • security
©2025 Cloud Gal 42 | Powered by WordPress and Superb Themes!