Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Cloud Security Considerations

12

Flashcards

0/12

Still learning
StarStarStarStar

Threat Intelligence

StarStarStarStar

Threat intelligence involves collecting and analyzing information about emerging or existing threat actors and threats to inform security decisions.

StarStarStarStar

Data Encryption

StarStarStarStar

Encryption helps protect data at rest and in transit, making it unreadable to unauthorized users even in the event of a security breach.

StarStarStarStar

Disaster Recovery Planning

StarStarStarStar

Having a robust disaster recovery plan helps ensure business continuity and data availability in the face of catastrophic events.

StarStarStarStar

Access Management

StarStarStarStar

Proper access management ensures that only authorized individuals have access to certain data or resources, preventing unauthorized access and data breaches.

StarStarStarStar

Compliance with Regulations

StarStarStarStar

Cloud services must adhere to various regulatory requirements, such as GDPR, to protect user privacy and avoid legal penalties.

StarStarStarStar

Vendor Lock-in

StarStarStarStar

Dependency on a single cloud provider can cause challenges in migration and higher costs, thereby hindering flexibility and control.

StarStarStarStar

Multi-tenancy and Data Segregation

StarStarStarStar

Multi-tenancy refers to the sharing of infrastructure between different tenants in the cloud, which could lead to data leaks if proper segregation is not maintained.

StarStarStarStar

API Security

StarStarStarStar

APIs can offer potential vulnerabilities unless they are properly secured and monitored, which can lead to unauthorized access and exploitation.

StarStarStarStar

Data Residency

StarStarStarStar

Data residency concerns arise when laws require that data be stored in a specific jurisdiction, which might conflict with where cloud providers store data.

StarStarStarStar

Serverless Architectures

StarStarStarStar

With serverless architectures, the lack of a dedicated server infrastructure can introduce unique security issues, such as function permissions and event injection attacks.

StarStarStarStar

Endpoint Security

StarStarStarStar

Securing endpoints that access the cloud is vital to protect against vulnerabilities and ensure that malicious actors cannot exploit these entry points.

StarStarStarStar

Activity Monitoring and Logging

StarStarStarStar

Monitoring and logging activities are crucial for detecting suspicious behaviors and supporting forensic investigations after an incident.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.