top of page
  • Facebook
  • Twitter
  • Linkedin
Search

Cloud Security # 8

  • Writer: Steve Murphy
    Steve Murphy
  • Aug 24, 2020
  • 1 min read


Secure User Management, what does this mean? Simply put it’s about ensuring that the cloud provider has made available tools for you to securely manage your users.

These user management interfaces and procedures make up a vital part of the security barrier, preventing unauthorised access and alteration of your resources, applications and data.

You must be confident that the following is in place;


  • You know of all of the mechanisms by which the service provider would accept management or support requests from you (telephone phone, web portal, email etc.)

  • Only authorised individuals from your organisation can use those mechanisms to affect your use of the service.

  • Confidence that other users cannot access, modify or otherwise affect your service management

  • Manage the risks of privileged access using a system such as the ‘principle of least privilege’ or ‘zero trust’

  • You understand how management interfaces are protected and what functionality they expose

Tomorrow – Identity and Authentication

 
 
 

Recent Posts

See All
Do we need Rules?

Information security policies are critical documents that organizations develop to ensure the protection of their sensitive information...

 
 
 
Supply Chain Security

In today's interconnected world, supply chains have become an integral part of businesses across all industries. However, with the...

 
 
 
Privacy Policy

We receive, collect and store any information you enter on our website or provide us in any other way. In addition, we collect the...

 
 
 

Comentários


Contact Us

Thanks for submitting!

 Address. 15 Bluebell Close, East Grinstead, RH19 1RS

Tel. 07957 689 093

© 2023 by ITG. Proudly created with Wix.com

bottom of page