A Breach-Proof Public Cloud Database Security Program [Series Index]

Sep 1, 2020 / by SecureCloudDB

Storing data in the public cloud opens organizations up to risks unique to cloud computing. Poor visibility into databases and their backups, misconfigured APIs, and instances accidentally left open to the internet are just a few of the many cloud database security risks an organization might experience. Organizations must identify gaps in their security posture both internally and externally, quantifying risk as they go, in order to determine remediation measures and fortify their defense.

Automating as much of the process as is possible will enable operational consistency and increase security. A culture of security consciousness and a combination of training and tools are required to strengthen an organization’s collective understanding of how data could be accessed and the steps to take to protect it. 

To minimize risk and protect public cloud databases, a comprehensive approach comprising several key elements must be in place. In this 10 part series, we review the key components that are needed to formulate and apply a consistent, regimented cloud database security program that helps ensure data is only available through authorized access.

 

A Breach-Proof Public Cloud Database Security Program

Part 1: Key Components

Part 2: People, Policies and Plans

Part 3: Configuration

Part 4: Asset Discovery

Part 5: Vulnerability Assessments

Part 6: Remediation

Part 7: Activity Monitoring

Part 8: Alerting 

Part 9: Reporting

Part 10: Selecting Security Service Providers 

 

Tags: Security Program Series

Written by SecureCloudDB