A Breach-Proof Public Cloud Database Security Program — Part 10: Selecting Security Service Providers

Oct 1, 2020 / by SecureCloudDB posted in Security Program Series

0 Comments

In this 10 part series, we review the key components that are needed to formulate and apply a consistent, regimented cloud database security program that helps ensure data is only available through authorized access. Part 9 reviewed reporting recommendations. Part 10 below provides considerations for selecting security service providers and concludes the series.

Read More

A Breach-Proof Public Cloud Database Security Program — Part 9: Reporting

Sep 29, 2020 / by SecureCloudDB posted in Security Program Series

0 Comments

In this 10 part series, we review the key components that are needed to formulate and apply a consistent, regimented cloud database security program that helps ensure data is only available through authorized access. Part 8 addressed the other side of monitoringalerting. Part 9 below reviews reporting recommendations. 

Read More

A Breach-Proof Public Cloud Database Security Program — Part 8: Alerting

Sep 24, 2020 / by SecureCloudDB posted in Security Program Series

0 Comments

In this 10 part series, we review the key components that are needed to formulate and apply a consistent, regimented cloud database security program that helps ensure data is only available through authorized access. Part 7 delved into public cloud database activity monitoring. Part 8 below addresses the other side of monitoringalerting.

Read More

A Breach-Proof Public Cloud Database Security Program — Part 7: Activity Monitoring

Sep 22, 2020 / by SecureCloudDB posted in Security Program Series

0 Comments

In this 10 part series, we review the key components that are needed to formulate and apply a consistent, regimented cloud database security program that helps ensure data is only available through authorized access. Part 6 discussed remediation, including how to proactively reduce risk. Part 7 below delves into public cloud database activity monitoring.

Read More

A Breach-Proof Public Cloud Database Security Program — Part 6: Remediation

Sep 17, 2020 / by SecureCloudDB posted in Security Program Series

0 Comments

In this 10 part series, we review the key components that are needed to formulate and apply a consistent, regimented cloud database security program that helps ensure data is only available through authorized access. Part 5 unpacked vulnerability assessments including the step-by-step process and critical areas to check. Part 6 below discusses remediation, including how to proactively reduce risk.

Read More

A Breach-Proof Public Cloud Database Security Program — Part 5: Vulnerability Assessments

Sep 15, 2020 / by SecureCloudDB posted in Security Program Series

0 Comments

In this 10 part series, we review the key components that are needed to formulate and apply a consistent, regimented cloud database security program that helps ensure data is only available through authorized access. Part 4 reviewed considerations related to asset discovery.Part 5 below unpacks vulnerability assessments including the step-by-step process and critical areas to check.

Read More

A Breach-Proof Public Cloud Database Security Program — Part 4: Asset Discovery

Sep 10, 2020 / by SecureCloudDB posted in Security Program Series

0 Comments

In this 10 part series, we review the key components that are needed to formulate and apply a consistent, regimented cloud database security program that helps ensure data is only available through authorized access. Part 3 discussed public cloud database configuration best practices. Part 4 below reviews considerations related to asset discovery.  

Read More

A Breach-Proof Public Cloud Database Security Program — Part 3: Configuration

Sep 9, 2020 / by SecureCloudDB posted in Security Program Series

0 Comments

In this 10 part series, we review the key components that are needed to formulate and apply a consistent, regimented cloud database security program that helps ensure data is only available through authorized access. Part 2 explored how people, policies and plans are essential to successfully protecting data. Part 3 below discusses public cloud database configuration best practices.

Read More

A Breach-Proof Public Cloud Database Security Program — Part 2: People, Policies and Plans

Sep 3, 2020 / by SecureCloudDB posted in Security Program Series

0 Comments

In this 10 part series, we review the key components that are needed to formulate and apply a consistent, regimented cloud database security program that helps ensure data is only available through authorized access. Part 1 introduced the 8 requisite elements of database security in the public cloud. Part 2 below explores how people, policies and plans are essential to successfully protecting data.   

Read More

A Breach-Proof Public Cloud Database Security Program — Part 1: 8 Key Components

Sep 1, 2020 / by SecureCloudDB posted in Security Program Series

0 Comments

In this 10 part series, we review the key components that are needed to formulate and apply a consistent, regimented cloud database security program that helps ensure data is only available through authorized access. Part 1 below introduces the requisite elements of database security in the public cloud. 

Read More