Cloud
Comprehensive Cybersecurity Checklist for the Cloud
Written by Brendan Wright
Mar 17, 201. Identity & Access Management (Users, Privileges, Clients)
- Identity & access management
- Privileged identity management
- Identity governance
- Assign a dedicated Cyber team
2. Network security (Anomalies, Threats, Activities)
- Monitoring events
- Inter-workload protection
- Threat detection and prevention
3. Data protection (Databases, Workloads, Content)
- File and folder encryption
- Vulnerability scanning
- Monitoring Logs
- Data loss prevention
- Key lifecycle management
4. Application security (Threat prevention)
- Secure application development
- Application vulnerability assessment & management
5. Visibility and intelligence (Anomalies, Threats, Activities)
- Event correlation
- Multi-cloud & on-premise integration
- Monitoring & alerting
6. Workload centric (Security and DevOps management)
- Cloud security policy management
- Patch management
- Auditing of controls
Got a project on the cards? We’d love to hear about it.
Schedule a time to discussTo Top