From the course: Ethical Hacking: Cloud Computing
Unlock the full course today
Join today to access over 23,200 courses taught by industry experts.
Cloud security best practices
From the course: Ethical Hacking: Cloud Computing
Cloud security best practices
- [Instructor] Okay, so at this point we've covered a lot of cloud security, potential vulnerabilities and how you might mitigate their impacts. Let's focus now on cloud security best practices. As we're going through this discussion, I'd like you to think about how your organization is using cloud computing services and how some of the things that we will be talking about could apply, in terms of hardening those cloud services. Let's start with the cloud access security broker, CASB, otherwise just pronounced CASB. What is a CASB? Well, its purpose is to control access to cloud resources. Now, that's a pretty big umbrella statement. So what's that really mean? Well, it can mean data loss prevention. In other words, we want to make sure we limit data ex-filtration possibilities, sensitive data being taken out of the organization, such as from cloud services, like databases, or storage buckets. Cloud governance, which…
Contents
-
-
-
-
-
-
(Locked)
Cloud auditing5m 57s
-
(Locked)
Enable cloud alert notification5m 41s
-
(Locked)
Encryption and the cloud2m 58s
-
(Locked)
Force HTTPS for cloud-hosted web applications7m 20s
-
(Locked)
Deploying a cloud jump box5m 2s
-
(Locked)
Cloud artificial intelligence and machine learning2m 59s
-
(Locked)
Cloud DDoS protection2m 11s
-
(Locked)
Pen testing and the cloud6m 26s
-
(Locked)
Cloud hacking tools8m 15s
-
(Locked)
Cloud security best practices8m 50s
-
(Locked)
-