Explore tens of thousands of sets crafted by our community.
Cloud Security Considerations
12
Flashcards
0/12
Threat Intelligence
Threat intelligence involves collecting and analyzing information about emerging or existing threat actors and threats to inform security decisions.
Data Encryption
Encryption helps protect data at rest and in transit, making it unreadable to unauthorized users even in the event of a security breach.
Disaster Recovery Planning
Having a robust disaster recovery plan helps ensure business continuity and data availability in the face of catastrophic events.
Access Management
Proper access management ensures that only authorized individuals have access to certain data or resources, preventing unauthorized access and data breaches.
Compliance with Regulations
Cloud services must adhere to various regulatory requirements, such as GDPR, to protect user privacy and avoid legal penalties.
Vendor Lock-in
Dependency on a single cloud provider can cause challenges in migration and higher costs, thereby hindering flexibility and control.
Multi-tenancy and Data Segregation
Multi-tenancy refers to the sharing of infrastructure between different tenants in the cloud, which could lead to data leaks if proper segregation is not maintained.
API Security
APIs can offer potential vulnerabilities unless they are properly secured and monitored, which can lead to unauthorized access and exploitation.
Data Residency
Data residency concerns arise when laws require that data be stored in a specific jurisdiction, which might conflict with where cloud providers store data.
Serverless Architectures
With serverless architectures, the lack of a dedicated server infrastructure can introduce unique security issues, such as function permissions and event injection attacks.
Endpoint Security
Securing endpoints that access the cloud is vital to protect against vulnerabilities and ensure that malicious actors cannot exploit these entry points.
Activity Monitoring and Logging
Monitoring and logging activities are crucial for detecting suspicious behaviors and supporting forensic investigations after an incident.
© Hypatia.Tech. 2024 All rights reserved.