{"id":3729,"date":"2017-04-30T07:36:31","date_gmt":"2017-04-30T07:36:31","guid":{"rendered":"http:\/\/bulletins.bfconsulting.com\/?p=3729"},"modified":"2017-12-19T07:05:15","modified_gmt":"2017-12-19T07:05:15","slug":"it-policies-for-more-secured-cloud-usage","status":"publish","type":"post","link":"https:\/\/bulletins.bfconsulting.com\/en\/it-policies-for-more-secured-cloud-usage\/","title":{"rendered":"IT policies for more secured cloud usage"},"content":{"rendered":"<p>The following internal policies provide for maximum cloud data security and prevent unnecessary information leaks.<\/p>\n<p><strong>Basic policies:<\/strong><\/p>\n<ul>\n<li>employee trainings on how to handle sensitive data in various situations<\/li>\n<li>advanced access management which compartmentalizes departments and gives them access only to the parts of the cloud infrastructure they need<\/li>\n<li>activity logs which log every detail of cloud activity, preserving a record of what each person views and changes<\/li>\n<\/ul>\n<p><strong>Secure infrastructure:<\/strong><\/p>\n<ul>\n<li>working with a cloud solution provider specialized in managing sensitive data, especially for businesses without a dedicated IT team to setup and monitor the cloud system<\/li>\n<\/ul>\n<p><strong>Redundancies:<\/strong><\/p>\n<ul>\n<li>keeping an offline backup, not connected to an internet-enabled network<\/li>\n<\/ul>\n<div class=\"rpbt_shortcode\">\n\n<div id='rpbt-related-gallery-1' class='gallery related-gallery related-galleryid-3729 gallery-columns-3 gallery-size-thumbnail'><figure class='gallery-item' role='group' aria-label='Video: World FinTech Report 2017 findings'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/video-world-fintech-report-2017-findings\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2018\/09\/World-FinTech-Report-2017-Where-Finance-and-Technology-Collide-150x150.jpeg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-10757\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-10757'>\n\t\t\t\tVideo: World FinTech Report 2017 findings\n\t\t\t\t<\/figcaption><\/figure><figure class='gallery-item' role='group' aria-label='2019 FIRST Cyber Threat Intelligence Symposium'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/2019-first-cyber-threat-intelligence-symposium\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2018\/11\/2019-first-cyber-threat-intelligence-symposium-150x150.png\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-11649\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-11649'>\n\t\t\t\t2019 FIRST Cyber Threat Intelligence Symposium\n\t\t\t\t<\/figcaption><\/figure><figure class='gallery-item' role='group' aria-label='Germany forms cybersecurity agency'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/germany-forms-cybersecurity-agency\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2018\/10\/germany-forms-cybersecurity-agency-150x150.png\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-11165\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-11165'>\n\t\t\t\tGermany forms cybersecurity agency\n\t\t\t\t<\/figcaption><\/figure>\n\t\t<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>The following internal policies provide for maximum cloud data security and prevent unnecessary information leaks. Basic policies: employee trainings on how to handle sensitive data in various situations advanced access management which compartmentalizes departments and gives them access only to the parts of the cloud infrastructure they need activity logs which log every detail of &hellip;<\/p>\n","protected":false},"author":1,"featured_media":3731,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,16],"tags":[184,49],"_links":{"self":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/3729"}],"collection":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/comments?post=3729"}],"version-history":[{"count":6,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/3729\/revisions"}],"predecessor-version":[{"id":6727,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/3729\/revisions\/6727"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/media\/3731"}],"wp:attachment":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/media?parent=3729"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/categories?post=3729"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/tags?post=3729"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}