top of page
  • Facebook
  • Twitter
  • Linkedin
Search

Cloud Security # 2

  • Writer: Steve Murphy
    Steve Murphy
  • Aug 16, 2020
  • 1 min read



So as promised today we are looking at Asset protection and resilience. In order to achieve that we need to consider the following;


You need to understand the legal circumstances of how your data could be accessed without your consent

i.e. identify the locations where the data is stored, processed and managed.


You must be confident you understand how data handling controls are enforced in accordance with UK law. Remember inadequate protection of user data may result in regulatory sanction and reputational damage.


You also need to understand how your cloud vendor “secures the cloud” – this contractual, and you need to understand how you “secure in the cloud” – this is your responsibility.


Lots to cover in this section so this is a bite size view if you need help with the above, then get in touch. More than happy to have a chat regarding your current cloud security.


Tomorrow – Separation between users

 
 
 

Recent Posts

See All
Do we need Rules?

Information security policies are critical documents that organizations develop to ensure the protection of their sensitive information...

 
 
 
Supply Chain Security

In today's interconnected world, supply chains have become an integral part of businesses across all industries. However, with the...

 
 
 
Privacy Policy

We receive, collect and store any information you enter on our website or provide us in any other way. In addition, we collect the...

 
 
 

Comments


Contact Us

Thanks for submitting!

 Address. 15 Bluebell Close, East Grinstead, RH19 1RS

Tel. 07957 689 093

© 2023 by ITG. Proudly created with Wix.com

bottom of page