Cloud Services Best Practices: Identify all cloud services in use & evaluate risk
|Submitted on: Wed, 31 Jul 2013 04:58:36||Views: 375|
Flying blind is never a good idea, so before you begin taking steps to reduce risk, you need to understand what risk you are currently exposed to. This is a two-step process. The first step in the process is to identify every cloud service in use at your organization. Relying on a proxy of firewall alone will make this an arduous (manual) and incomplete task as they classify the most popular services but overlook thousands of other services. Instead, reference your log traffic against a cloud registry that has a minimum 3,000 services in order to gain a complete view of your enterpriseâs cloud usage.
Note that most CIOs expect 25-40 services in their environment, but find an average of 300-400 services, most existing in the âShadow IT systemsâ bucket. Also note that this discovery of cloud exposure must be a continuous activity because the velocity of new cloud service introduction and use is only increasing; a one-time snapshot will rapidly get stale.
The second step in the process is to understand the risk of the various cloud services in use. Not all cloud services are risky, so itâs important to get an objective understanding of the risk level for every service. Given the sheer volume of services, evaluating each one is an impossible task so leverage a cloud registry that classifies services based on a thorough set of criteria. Since every business has a different risk profile, make sure the registryâs risk ratings are easily customizable. The risk assessment of services should also be a continuous activity; for example a password breach at a cloud service should increase the risk of that service until the breach is addressed.
» Latest news on : Security
» Google News for: Cloud Services Best Practices: Identify all cloud services in use & evaluate risk
Lates tweets about Computers / Security
From @SanjayIyer on Fri Nov 16 07:47:43 EST 2018|
RT @DefenceMinIndia: Smt @nsitharaman spoke extensively on 'India's National Security Imperatives admist a transitional world order' while…
From @Bored_O_Ed on Fri Nov 16 07:47:43 EST 2018
“ #BetsyDeVos began receiving around-the-clock security from the U.S. Marshals Service days after being confirmed,… https://t.co/ccFbtOVgqg
From @mckaj5 on Fri Nov 16 07:47:42 EST 2018
RT @ChrisLu44: Security of Cabinet needs to be taken seriously. But it also needs to be clearly justified.
DeVos is receiving around-the-c…
From @EllidaProject on Fri Nov 16 07:47:41 EST 2018
If you do any sort of significant "prison reform" that loosens standards or lowers jail time @realDonaldTrump it wi… https://t.co/N5aFb9zkEK
From @megruiz_ on Fri Nov 16 07:47:41 EST 2018
RT @specialchad: URGENT ALERT!!!
Security personnels of Coca-cola have just started to VIOLENTLY DESTROY the camp set-up by the striking w…
From @CyberTaters on Fri Nov 16 07:47:41 EST 2018
RT @Donperin: System error: Japan potatosecurity minister admits he has never used a computer https://t.co/xX0sRwH1pj
The minister from our…
From @wmcarterelliott on Fri Nov 16 07:47:41 EST 2018
RT @rgoodlaw: This is rich.
Assange's attorney says it is highly "irresponsible...to put in a public filing information that clearly was n…
From @KimDavid927 on Fri Nov 16 07:47:41 EST 2018
RT @CharlieDaniels: Abolish ICE Ms Harris???
Why dont we just do away with the Senate security detail and remove the metal detectors in the…
From @kevinz301 on Fri Nov 16 07:47:40 EST 2018
RT @RobertDyas: It's time for our 1st Yale Smart Home Security #giveaway #competition, worth £1,069! Follow us & RT to enter for your chanc…
From @kalibeck4 on Fri Nov 16 07:47:40 EST 2018
RT @ellievan65: Betsy DeVos is receiving around-the-clock security from the U.S. Marshals Service , an armed detail provided to no other c…
Copyright © 2008 - 2011 VIC Consulting - WEB Development, website promotion & SEO services
Autos neuves et usagées |
Ottawa used cars, furniture & real estate |
Toronto Computers Security