In this 10 part series, we review the key components that are needed to formulate and apply a consistent, regimented cloud database security program that helps ensure data is only available through authorized access. Part 9 reviewed reporting recommendations. Part 10 below provides considerations for selecting security service providers and concludes the series.
A Breach-Proof Public Cloud Database Security Program — Part 10: Selecting Security Service Providers
Oct 1, 2020 / by SecureCloudDB posted in Security Program Series
A Breach-Proof Public Cloud Database Security Program — Part 9: Reporting
Sep 29, 2020 / by SecureCloudDB posted in Security Program Series
In this 10 part series, we review the key components that are needed to formulate and apply a consistent, regimented cloud database security program that helps ensure data is only available through authorized access. Part 8 addressed the other side of monitoring—alerting. Part 9 below reviews reporting recommendations.
A Breach-Proof Public Cloud Database Security Program — Part 8: Alerting
Sep 24, 2020 / by SecureCloudDB posted in Security Program Series
In this 10 part series, we review the key components that are needed to formulate and apply a consistent, regimented cloud database security program that helps ensure data is only available through authorized access. Part 7 delved into public cloud database activity monitoring. Part 8 below addresses the other side of monitoring—alerting.
A Breach-Proof Public Cloud Database Security Program — Part 7: Activity Monitoring
Sep 22, 2020 / by SecureCloudDB posted in Security Program Series
In this 10 part series, we review the key components that are needed to formulate and apply a consistent, regimented cloud database security program that helps ensure data is only available through authorized access. Part 6 discussed remediation, including how to proactively reduce risk. Part 7 below delves into public cloud database activity monitoring.
A Breach-Proof Public Cloud Database Security Program — Part 6: Remediation
Sep 17, 2020 / by SecureCloudDB posted in Security Program Series
In this 10 part series, we review the key components that are needed to formulate and apply a consistent, regimented cloud database security program that helps ensure data is only available through authorized access. Part 5 unpacked vulnerability assessments including the step-by-step process and critical areas to check. Part 6 below discusses remediation, including how to proactively reduce risk.
A Breach-Proof Public Cloud Database Security Program — Part 5: Vulnerability Assessments
Sep 15, 2020 / by SecureCloudDB posted in Security Program Series
In this 10 part series, we review the key components that are needed to formulate and apply a consistent, regimented cloud database security program that helps ensure data is only available through authorized access. Part 4 reviewed considerations related to asset discovery.Part 5 below unpacks vulnerability assessments including the step-by-step process and critical areas to check.
A Breach-Proof Public Cloud Database Security Program — Part 4: Asset Discovery
Sep 10, 2020 / by SecureCloudDB posted in Security Program Series
In this 10 part series, we review the key components that are needed to formulate and apply a consistent, regimented cloud database security program that helps ensure data is only available through authorized access. Part 3 discussed public cloud database configuration best practices. Part 4 below reviews considerations related to asset discovery.
A Breach-Proof Public Cloud Database Security Program — Part 3: Configuration
Sep 9, 2020 / by SecureCloudDB posted in Security Program Series
In this 10 part series, we review the key components that are needed to formulate and apply a consistent, regimented cloud database security program that helps ensure data is only available through authorized access. Part 2 explored how people, policies and plans are essential to successfully protecting data. Part 3 below discusses public cloud database configuration best practices.
A Breach-Proof Public Cloud Database Security Program — Part 2: People, Policies and Plans
Sep 3, 2020 / by SecureCloudDB posted in Security Program Series
In this 10 part series, we review the key components that are needed to formulate and apply a consistent, regimented cloud database security program that helps ensure data is only available through authorized access. Part 1 introduced the 8 requisite elements of database security in the public cloud. Part 2 below explores how people, policies and plans are essential to successfully protecting data.
A Breach-Proof Public Cloud Database Security Program — Part 1: 8 Key Components
Sep 1, 2020 / by SecureCloudDB posted in Security Program Series
In this 10 part series, we review the key components that are needed to formulate and apply a consistent, regimented cloud database security program that helps ensure data is only available through authorized access. Part 1 below introduces the requisite elements of database security in the public cloud.