Translations:Cloud shared security responsibility model/3/en: Difference between revisions
Jump to navigation
Jump to search
(Importing a new version from external source) |
(Importing a new version from external source) |
||
Line 1: | Line 1: | ||
==Research team responsibilities: Security in the cloud== | ==Research team responsibilities: Security in the cloud== | ||
Research teams are responsible for | Research teams are responsible for the following: | ||
* implementing security controls to protect the confidentiality, integrity, and availability of their research data; | * implementing security controls to protect the confidentiality, integrity, and availability of their research data; | ||
* installing, configuring, and managing their virtual machines, as well as their operating systems, services and applications; | * installing, configuring, and managing their virtual machines, as well as their operating systems, services and applications; |
Revision as of 19:41, 27 January 2023
Research team responsibilities: Security in the cloud
Research teams are responsible for the following:
- implementing security controls to protect the confidentiality, integrity, and availability of their research data;
- installing, configuring, and managing their virtual machines, as well as their operating systems, services and applications;
- applying updates and security patches on a timely basis;
- configuring security group rules that limit the services exposed to the Internet;
- implementing and testing backup and recovery procedures;
- ensuring the principle of least privilege is followed when granting access.