Explore tens of thousands of sets crafted by our community.
Cloud Security Considerations
12
Flashcards
0/12
Multi-tenancy and Data Segregation
Multi-tenancy refers to the sharing of infrastructure between different tenants in the cloud, which could lead to data leaks if proper segregation is not maintained.
Access Management
Proper access management ensures that only authorized individuals have access to certain data or resources, preventing unauthorized access and data breaches.
Data Encryption
Encryption helps protect data at rest and in transit, making it unreadable to unauthorized users even in the event of a security breach.
Compliance with Regulations
Cloud services must adhere to various regulatory requirements, such as GDPR, to protect user privacy and avoid legal penalties.
Vendor Lock-in
Dependency on a single cloud provider can cause challenges in migration and higher costs, thereby hindering flexibility and control.
Disaster Recovery Planning
Having a robust disaster recovery plan helps ensure business continuity and data availability in the face of catastrophic events.
Endpoint Security
Securing endpoints that access the cloud is vital to protect against vulnerabilities and ensure that malicious actors cannot exploit these entry points.
API Security
APIs can offer potential vulnerabilities unless they are properly secured and monitored, which can lead to unauthorized access and exploitation.
Data Residency
Data residency concerns arise when laws require that data be stored in a specific jurisdiction, which might conflict with where cloud providers store data.
Activity Monitoring and Logging
Monitoring and logging activities are crucial for detecting suspicious behaviors and supporting forensic investigations after an incident.
Threat Intelligence
Threat intelligence involves collecting and analyzing information about emerging or existing threat actors and threats to inform security decisions.
Serverless Architectures
With serverless architectures, the lack of a dedicated server infrastructure can introduce unique security issues, such as function permissions and event injection attacks.
© Hypatia.Tech. 2024 All rights reserved.