Identity and Access Management
Your data is only as secure as your configurations, so make sure
you're applying best practices such as:
▪ Multi-factor authentication
▪ Multiple logins with access controls
▪ Robust password policies
▪ Separate development and production environments
Compliance Standards
Review your security posture against proven security frameworks
such as:
▪ Center for Internet Security (CIS) Controls
▪ National Institute of Standards and Technology (NIST)
▪ Payment Card Industry (PCI) Data Security Standard
▪ Industry-specific controls, like Health Insurance Portability and
Accountability Act (HIPAA) and Cybersecurity Maturity Model
Certification (CMMC)
Disaster Recovery
Don't rely on a set-it-and-forget-it approach to data storage in the
cloud. Document what data will be stored and where and plan for
how you will secure it. Define a clear backup and recovery strategy no
matter where your data resides.
Endpoint Security
With the proliferation of the cloud and remote work, the number
of endpoint devices has increased, and the security landscape has
grown more complex. Review your endpoint strategy and look for
opportunities to tighten security through measures like:
▪ Continuous monitoring
▪ Regular patching
▪ API protection
8
oneneck.com
8
oneneck.com
02