Cloud Security Principle 8: Supply chain security
Cloud services often rely upon third party products and services. Consequently, if this…
This author has yet to write their bio.
Meanwhile lets just say that we are proud serviceteamit contributed a whooping 1041 entries.
Cloud services often rely upon third party products and services. Consequently, if this…
Weak authentication to these interfaces may enable unauthorised access to your systems, resulting…
The design, implementation and management of administration systems should follow enterprise good practice, whilst recognising…
The extent of your responsibility will vary depending on the deployment models of…
The following security risk management principles are applicable to how people and organisations…
Goals You should be confident that: New and evolving threats are reviewed and…
The aspects to consider are: Authentication of users to management interfaces and support…
If some of the interfaces exposed are private (such as management interfaces) then…
For each of the 14 principles, we answer three questions: 1. What is the…
Factors affecting user separation include: where the separation controls are implemented – this…
Serviceteam IT Limited, 49 Frederick Road, Edgbaston, Birmingham, B15 1HN.
Copyright © 2011 Serviceteam IT Limited. Registered in England 07578043.