{"id":3729,"date":"2017-04-30T07:36:31","date_gmt":"2017-04-30T07:36:31","guid":{"rendered":"http:\/\/bulletins.bfconsulting.com\/?p=3729"},"modified":"2017-12-19T07:05:15","modified_gmt":"2017-12-19T07:05:15","slug":"it-policies-for-more-secured-cloud-usage","status":"publish","type":"post","link":"https:\/\/bulletins.bfconsulting.com\/en\/it-policies-for-more-secured-cloud-usage\/","title":{"rendered":"IT policies for more secured cloud usage"},"content":{"rendered":"<p>The following internal policies provide for maximum cloud data security and prevent unnecessary information leaks.<\/p>\n<p><strong>Basic policies:<\/strong><\/p>\n<ul>\n<li>employee trainings on how to handle sensitive data in various situations<\/li>\n<li>advanced access management which compartmentalizes departments and gives them access only to the parts of the cloud infrastructure they need<\/li>\n<li>activity logs which log every detail of cloud activity, preserving a record of what each person views and changes<\/li>\n<\/ul>\n<p><strong>Secure infrastructure:<\/strong><\/p>\n<ul>\n<li>working with a cloud solution provider specialized in managing sensitive data, especially for businesses without a dedicated IT team to setup and monitor the cloud system<\/li>\n<\/ul>\n<p><strong>Redundancies:<\/strong><\/p>\n<ul>\n<li>keeping an offline backup, not connected to an internet-enabled network<\/li>\n<\/ul>\n<div class=\"rpbt_shortcode\">\n\n<div id='rpbt-related-gallery-1' class='gallery related-gallery related-galleryid-3729 gallery-columns-3 gallery-size-thumbnail'><figure class='gallery-item' role='group' aria-label='BFC FinTech Monitor (October \u2013 November 2022)'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/bfc-fintech-monitor-october-november-2022\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2022\/11\/Bj8GFM1-150x150.png\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-16887\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-16887'>\n\t\t\t\tBFC FinTech Monitor (October \u2013 November 2022)\n\t\t\t\t<\/figcaption><\/figure><figure class='gallery-item' role='group' aria-label='Open banking is uberizing Ukraine\u2019s financial services'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/open-banking-is-uberizing-ukraine-s-financial-services\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2018\/08\/open-banking-ua-150x150.png\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-10535\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-10535'>\n\t\t\t\tOpen banking is uberizing Ukraine\u2019s financial services\n\t\t\t\t<\/figcaption><\/figure><figure class='gallery-item' role='group' aria-label='Scotland\u2019s FinTech Skills Academy hailed as great success'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/scotland-s-fintech-skills-academy-hailed-as-great-success\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2019\/03\/scotland-s-fintech-skills-academy-hailed-as-great-success-150x150.png\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-12467\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-12467'>\n\t\t\t\tScotland\u2019s FinTech Skills Academy hailed as great success\n\t\t\t\t<\/figcaption><\/figure>\n\t\t<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>The following internal policies provide for maximum cloud data security and prevent unnecessary information leaks. Basic policies: employee trainings on how to handle sensitive data in various situations advanced access management which compartmentalizes departments and gives them access only to the parts of the cloud infrastructure they need activity logs which log every detail of &hellip;<\/p>\n","protected":false},"author":1,"featured_media":3731,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,16],"tags":[184,49],"_links":{"self":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/3729"}],"collection":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/comments?post=3729"}],"version-history":[{"count":6,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/3729\/revisions"}],"predecessor-version":[{"id":6727,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/3729\/revisions\/6727"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/media\/3731"}],"wp:attachment":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/media?parent=3729"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/categories?post=3729"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/tags?post=3729"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}