Skip to end of metadata
Go to start of metadata

You are viewing an old version of this content. View the current version.

Compare with Current View Version History

« Previous Version 6 Next »

Welcome to the CUIT Cloud Security Page.

Experts say that enterprises can increase the security of their public cloud deployments by following best practices and deploying the right cloud security technologies. Enterprises that want to be among the organizations experiencing fewer security issues should take the following steps:

  • Understand your shared responsibility model
  • Ask cloud provider detailed security questions
  • Deploy identity and access management (IAM) solution, leverage SAML and multi-factor authentication
  • Train your staff about the newest threats and potential countermeasures
  • Establish and enforce cloud security policies - security staff should have automated solutions in place to ensure that everyone is following these policies
  • Secure your endpoints that includes firewalls, anti-malware, intrusion detectionaccess control 
  • Encrypt data in motion and at rest
  • Use intrusion detection and prevention technology - help organizations identify when an attack has occurred and take action to stop attacks in progress
  • Review your organization's particular compliance requirements and make sure that your service provider will meet their data security needs
  • Consider a 3rd party partner or consultant - to offer solutions or services designed to enhance cloud security
  • Conduct audits and penetration testing - to determine whether your existing cloud security efforts are sufficient to protect your data and applications

By seeking and reporting on unfavorable events discovered among Columbia Cloud Security environments, we can work towards a safer operation and reduction of risk when using these technologies. Please see the below categories to view more information regarding a particular cloud platform along with their respective alerts.

  • No labels