Cloud security vulnerabilities can come from within an organization in the form of malicious insiders. This type of threat can originate from a current employee, past employee, partner, or others who have access to sensitive data and use it for nefarious purposes. Insider threats can be tough to manage. The following excerpt regarding malicious insiders, access control, and building secure cloud infrastructure in the cloud is taken from a live discussion titled Cloud Security Hurdles and How to Overcome Them.
Thoughts on Malicious Insiders & Cloud Security
Apr 1, 2021 / by SecureCloudDB posted in Insider, Permissions
4 Common Cloud Database Security Misconceptions and How to Avoid Them
Oct 8, 2020 / by SecureCloudDB posted in Permissions, Shared Responsibility, Audits
The use of cloud databases is growing exponentially among businesses. Yet, many organizations are not as familiar with the technology as they are with on-premises databases — or how to best secure the data in it. (Download this white paper—Database Security: Moving to the Public Cloud—to explore the architectural and security differences between the public cloud and on-premises databases in more depth).