Cloud Data Storage: Key Threats

Cloud Data Storage: Key Threats

Are you using cloud storage services? If yes, then you need to be aware of these key threats.

In the cloud, data storage can be manipulated into unauthorized usage, for example, by account hijacking or uploading illegal content. The multitenancy of cloud storage makes tracking unauthorized usage more challenging.

  • Unauthorized access: Unauthorized access can happen due to hacking, improper data access permissions being assigned in a multitenant environment, or internal cloud service provider employees accessing data without proper authorization.

Continue reading here

要查看或添加评论,请登录

Amrita Mukherjee, CCSP的更多文章

  • BCDR Assessment: 10 questions to ask

    BCDR Assessment: 10 questions to ask

    Here's a quick & dirty assessment for your organization's Business Continuity & Disaster Recovery maturity - When it…

  • QuickGuide: Connecting to a Private EC2 Instance from your laptop/desktop

    QuickGuide: Connecting to a Private EC2 Instance from your laptop/desktop

    Step 1 – Create Bastion Host a) Navigate to EC2 Dashboard, click on Launch instance b) Select Amazon Linux 2, click…

  • Cloud Encryption Challenges

    Cloud Encryption Challenges

    There are myriad factors influencing encryption considerations and associated implementations in the enterprise. The…

  • How Cloud impacts Application Security

    How Cloud impacts Application Security

    This article is intended for software development and IT teams who want to securely build and deploy applications in…

  • How Cloud impacts Incident Response

    How Cloud impacts Incident Response

    The Incident Response (IR) Lifecycle Preparation: “Establishing an incident response capability so that the…

  • QuickGuide: Cloud Incident Response Recommendations

    QuickGuide: Cloud Incident Response Recommendations

    SLAs and setting expectations around what the customer does versus what the provider does are the most important…

  • QuickGuide: FedRAMP

    QuickGuide: FedRAMP

    The Federal Risk and Authorization Management Program (FedRAMP) is a U.S.

  • QuickGuide: Cloud Security Recommendations

    QuickGuide: Cloud Security Recommendations

    Know the infrastructure security of your provider or platform: ? In the shared security model, the provider (or whoever…

  • Common Cloud Security Threats

    Common Cloud Security Threats

    Cloud deployments, whether public, private, hybrid or community, are susceptible to all the traditional cybersecurity…

  • "Trust me, I am a CISO"

    "Trust me, I am a CISO"

    As things around us rapidly unfold in the cybersecurity realm, many "experts" are sprouting out of the woodwork. How do…

社区洞察

其他会员也浏览了