Search:

    A Breach-Proof Public Cloud Database Security Program — Part 10: Selecting Security Service Providers

    Oct 1, 2020 / by SecureCloudDB posted in Security Program Series

    0 Comments

    In this 10 part series, we review the key components that are needed to formulate and apply a consistent, regimented cloud database security program that helps ensure data is only available through authorized access. Part 9 reviewed reporting recommendations. Part 10 below provides considerations for selecting security service providers and concludes the series.

    Read More

    A Breach-Proof Public Cloud Database Security Program — Part 9: Reporting

    Sep 29, 2020 / by SecureCloudDB posted in Security Program Series

    0 Comments

    In this 10 part series, we review the key components that are needed to formulate and apply a consistent, regimented cloud database security program that helps ensure data is only available through authorized access. Part 8 addressed the other side of monitoringalerting. Part 9 below reviews reporting recommendations. 

    Read More

    A Breach-Proof Public Cloud Database Security Program — Part 8: Alerting

    Sep 24, 2020 / by SecureCloudDB posted in Security Program Series

    0 Comments

    In this 10 part series, we review the key components that are needed to formulate and apply a consistent, regimented cloud database security program that helps ensure data is only available through authorized access. Part 7 delved into public cloud database activity monitoring. Part 8 below addresses the other side of monitoringalerting.

    Read More

    A Breach-Proof Public Cloud Database Security Program — Part 7: Activity Monitoring

    Sep 22, 2020 / by SecureCloudDB posted in Security Program Series

    0 Comments

    In this 10 part series, we review the key components that are needed to formulate and apply a consistent, regimented cloud database security program that helps ensure data is only available through authorized access. Part 6 discussed remediation, including how to proactively reduce risk. Part 7 below delves into public cloud database activity monitoring.

    Read More

    A Breach-Proof Public Cloud Database Security Program — Part 6: Remediation

    Sep 17, 2020 / by SecureCloudDB posted in Security Program Series

    0 Comments

    In this 10 part series, we review the key components that are needed to formulate and apply a consistent, regimented cloud database security program that helps ensure data is only available through authorized access. Part 5 unpacked vulnerability assessments including the step-by-step process and critical areas to check. Part 6 below discusses remediation, including how to proactively reduce risk.

    Read More

    A Breach-Proof Public Cloud Database Security Program — Part 5: Vulnerability Assessments

    Sep 15, 2020 / by SecureCloudDB posted in Security Program Series

    0 Comments

    In this 10 part series, we review the key components that are needed to formulate and apply a consistent, regimented cloud database security program that helps ensure data is only available through authorized access. Part 4 reviewed considerations related to asset discovery.Part 5 below unpacks vulnerability assessments including the step-by-step process and critical areas to check.

    Read More

    A Breach-Proof Public Cloud Database Security Program — Part 4: Asset Discovery

    Sep 10, 2020 / by SecureCloudDB posted in Security Program Series

    0 Comments

    In this 10 part series, we review the key components that are needed to formulate and apply a consistent, regimented cloud database security program that helps ensure data is only available through authorized access. Part 3 discussed public cloud database configuration best practices. Part 4 below reviews considerations related to asset discovery.  

    Read More

    A Breach-Proof Public Cloud Database Security Program — Part 3: Configuration

    Sep 9, 2020 / by SecureCloudDB posted in Security Program Series

    0 Comments

    In this 10 part series, we review the key components that are needed to formulate and apply a consistent, regimented cloud database security program that helps ensure data is only available through authorized access. Part 2 explored how people, policies and plans are essential to successfully protecting data. Part 3 below discusses public cloud database configuration best practices.

    Read More

    A Breach-Proof Public Cloud Database Security Program — Part 2: People, Policies and Plans

    Sep 3, 2020 / by SecureCloudDB posted in Security Program Series

    0 Comments

    In this 10 part series, we review the key components that are needed to formulate and apply a consistent, regimented cloud database security program that helps ensure data is only available through authorized access. Part 1 introduced the 8 requisite elements of database security in the public cloud. Part 2 below explores how people, policies and plans are essential to successfully protecting data.   

    Read More

    A Breach-Proof Public Cloud Database Security Program — Part 1: 8 Key Components

    Sep 1, 2020 / by SecureCloudDB posted in Security Program Series

    0 Comments

    In this 10 part series, we review the key components that are needed to formulate and apply a consistent, regimented cloud database security program that helps ensure data is only available through authorized access. Part 1 below introduces the requisite elements of database security in the public cloud. 

    Read More