top of page
  • Facebook
  • Twitter
  • Linkedin
Search

Cloud Security # 5

  • Writer: Steve Murphy
    Steve Murphy
  • Aug 18, 2020
  • 1 min read


The topic for the 5th post is Operational Security, this is a fairly complex subject so this post will highlight the key elements that need to be covered;


  • Configuration and change management

  • Vulnerability management

  • Protective monitoring

  • Incident management

You should be confident that you have the above covered, or your “IT people” do.

Not sure or simply need a review, then get in touch and we can provide an Audit of the cloud for you. Ensuring that some of the following goals are achieved by your Operational Security.

  • Potential new threats, vulnerabilities or exploitation techniques which could affect your service are assessed and remedial action is applied

  • Changes to the service are assessed for potential security impact. Then managed and tracked through to completion.

Tomorrow – Personnel Security

 
 
 

Recent Posts

See All
Do we need Rules?

Information security policies are critical documents that organizations develop to ensure the protection of their sensitive information...

 
 
 
Supply Chain Security

In today's interconnected world, supply chains have become an integral part of businesses across all industries. However, with the...

 
 
 
Privacy Policy

We receive, collect and store any information you enter on our website or provide us in any other way. In addition, we collect the...

 
 
 

Comments


Contact Us

Thanks for submitting!

 Address. 15 Bluebell Close, East Grinstead, RH19 1RS

Tel. 07957 689 093

© 2023 by ITG. Proudly created with Wix.com

bottom of page