Skip to content
Menu
Cloud Gal 42
  • Home
Cloud Gal 42

Category: security

Digital Forensics: Evidence Management

June 11, 2021June 22, 2021 by admin

Previous article in series – Digital Forensics: Identification, Collection, and Preservation of Digital Evidence Maintaining evidence from collection to trial is a critical part of digital forensics. You should have policies and procedures in place for the collection and management of evidence. In some cases, you may need to collect digital evidence on short notice….

Read More

Digital Forensics: Identification, Collection, and Preservation of Digital Evidence

June 10, 2021June 11, 2021 by admin

Previous article in series – Digital Forensics: E-Discovery Service Types & Legal Terms ISO/IEC 27037 offers guidance on identifying potential data sources and acquiring the data from the sources. Data acquisition should be performed using a three-step process: Develop a plan to acquire the data: Developing a plan is an important first step in most…

Read More

Digital Forensics: E-Discovery Service Types & Legal Terms

June 9, 2021June 11, 2021 by admin

Previous article in series – Digital Forensics: Preparing for a Legal Hold E-Discovery Service Types SaaS-based: To some, “e-discovery in the cloud” means using the cloud to deliver tools used for e-discovery. SaaS packages typically cover one of several e-discovery tasks, such as collection, preservation, or review. Hosted e-discovery (provider): In the cloud, e-discovery can…

Read More

Digital Forensics: Preparing for a Legal Hold

June 8, 2021June 10, 2021 by admin

Previous article in series – Digital Forensics: E-Discovery Preparing for a legal hold or e-discovery may include the following: Consideration of the SLA and contract agreements to ensure that investigations of cloud-based assets are permitted, or to check if prior notification and acceptance are required Contract agreements, explicitly stating the communication path between court participants…

Read More

Digital Forensics: E-Discovery

June 7, 2021June 9, 2021 by admin

Previous article in series – Digital Forensics: Challenges & Recommendations What is E-Discovery? Electronic discovery (e-discovery) is the identification, preservation, collection, processing, review, analysis, or production of electronically stored information. Often it is the support mechanism and the impetus for investigations, data acquisition, and insight-driven initiatives. To properly manage e-discovery a multidisciplinary team needs to…

Read More

Digital Forensics: Challenges & Recommendations

June 6, 2021June 9, 2021 by admin

Welcome to the fun world of Digital Forensics! *ahem* It’s even more fun on the Cloud. Gathering evidence is a crucial part of digital forensics, cloud or otherwise. Therefore, it is important to identify challenges before you begin the process. Key challenges to keep in mind are – The seizure of servers containing files from…

Read More

Security Considerations for Software as a Service (SaaS)

June 2, 2021May 25, 2021 by admin

Previous article in series – Security Considerations for PaaS When SaaS is consumed from a public cloud service provider, the security options that the customer can control may be only at the application level. In that model, application security is the responsibility of the cloud service provider, but the customer retains responsibility for identity access…

Read More

Security Considerations for Platform as a Service (PaaS)

June 1, 2021June 7, 2021 by admin

Previous article in the series – IaaS: Cloud Virtual Infrastructure Threats With the PaaS (platform as a service) model the vendor offers a complete development environment in which application developers can create and deploy their code. This avoids the need to build a server environment to run an application and the need to install a…

Read More

IaaS: Cloud Virtual Infrastructure Threats

May 31, 2021June 7, 2021 by admin

Previous article in series – IaaS: Hypervisor Security Provisioning tools and VM templates are exposed to different attacks that attempt to create new unauthorized VMs or patch the VM templates to infect the other VMs that will be cloned from this template. These new categories of security threats are a result of the new, complex,…

Read More

IaaS: Hypervisor Security

May 30, 2021June 7, 2021 by admin

Previous article in series – Cloud Computing: Shared Security Model The hypervisor acts as the abstraction layer that provides the management functions for required hardware resources among VMs. Virtual machine attacks: Active VMs are vulnerable to all traditional attacks that can affect physical servers. Once a VM is compromised, it may be able to attack…

Read More
  • Previous
  • 1
  • …
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • Next

Recent Posts

  • Role of AI/ML in Cybersecurity
  • QuickGuide: Security on OCI
  • The Cloud Management Plane
  • Secure Installation and Configuration of Virtualized Cloud Datacenters
  • Cloud Datacenter: Hardware-specific Security Configuration Requirements

Recent Comments

  • Rafael on Installing Debian on OCI
  • Jorge on Installing Debian on OCI
  • admin on Installing Debian on OCI
  • Andreas on Installing Debian on OCI
  • admin on Installing Debian on OCI

Archives

  • December 2022
  • February 2022
  • September 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • February 2021
  • January 2021
  • November 2020
  • October 2020

Categories

  • aws
  • bcdr
  • cloud
  • cloudsecurity
  • compliance
  • informationsecurity
  • oracle
  • pci
  • QuickGuide
  • security
©2025 Cloud Gal 42 | Powered by WordPress and Superb Themes!