Nothing hi-tech here, just a few important common sense questions
(from the article)
1. Can we identify unusual user or network activity to cloud services?
2. Can we track who accesses what cloud-hosted data and when?
3. How are we protecting against insider attacks at the cloud service providers?
4. How do we know unprotected sensitive data is not leaving the corporate network?
5. Can we reduce surface area of attack by limiting access based on device and geography?
The link below has more information:-
No comments:
Post a Comment