Discuz! Board

 找回密码
 立即注册
搜索
热搜: 活动 交友 discuz
查看: 93|回复: 0

A Priceless Gizmo in the Digital World

[复制链接]

1

主题

1

帖子

5

积分

新手上路

Rank: 1

积分
5
发表于 2023-7-23 18:18:31 | 显示全部楼层 |阅读模式
Change management approaches must reflect the relentless and dynamic nature of ongoing business transformations and the security challenges to ensure that approved changes are made correctly using automated real-time verification. Lack of cloud security architecture and strategy The rapid pace of change and the prevailing self-service, decentralized approach to cloud infrastructure administration hamper the ability to take technical and business considerations into account and conscious design, the report notes. Consequently, security threats in the cloud increase. However, the report also added that security considerations and risks must not be ignored for cloud efforts to be successful and secure. These issues can be compounded when multiple cloud providers are involved.

Leveraging cloud providers is certainly not new. However, the security product space continues to emerge and evolve around the cloud, says Kennedy. As examples, we saw early on cloud workload security emerge as an approach to providing common third-party security functions. Find the right combination So most security professionals looking Australia Email List at cloud security must consider what combination of standard cloud provider controls, premium cloud provider controls, and what third-party security product offerings address their specific risk profile, and sometimes that profile is different at the application level. After all, it can present a lot of complexity in the face of emerging threats, adds Kennedy.



Key findings on the lack of cloud security architecture and strategy include Enterprises must consider business objectives, risks, security threats, and legal compliance in cloud services and infrastructure design and decisions. Given the rapid pace of change and limited centralized control in cloud deployments, it is more important, not least, to develop and adhere to an infrastructure strategy and design principles. Adopters are advised to consider the vendor's fundamental due diligence and security assessment practices. That is, they must be complemented with secure design and integration to prevent the kinds of systemic failures that occurred in SolarWinds, Kaseya, and Bonobos breaches.

回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

Archiver|手机版|小黑屋|DiscuzX

GMT+8, 2025-9-11 03:47 , Processed in 0.046539 second(s), 18 queries .

Powered by Discuz! X3.4

Copyright © 2001-2020, Tencent Cloud.

快速回复 返回顶部 返回列表