Cloud Security

What are the steps to secure our data on the cloud? How authentication process work between an authorized user and endpoint data? What are the 3rd parties vendor who provides authentication and encryption services on our data in the cloud?

1 Like

The answer to this is a course to its self and a security pros speciality.

Start by going here;
https://cloudsecurityalliance.org/

Look at things like;
https://cloudsecurityalliance.org/guidance/#_overview

1 Like

We were discussing this today whilst at work in a meeting and a couple of points was brought up.

  1. The first point was about cloud security and the websites mentioned.

  2. The second point was about the location i.e. countries, where the servers are located and how secure the sever complexes are.

Its something we will have to look into seriously because location could be a major decision if we are going to use cloud servers for our customers.

The CSA guidance cover location. Yes this obviously matters.

1 Like