Translations:Cloud shared security responsibility model/3/en: Difference between revisions
Jump to navigation
Jump to search
(Importing a new version from external source) |
(Importing a new version from external source) |
||
Line 6: | Line 6: | ||
* configuring security group rules that limit the services exposed to the Internet; | * configuring security group rules that limit the services exposed to the Internet; | ||
* implementing and testing backup and recovery procedures; | * implementing and testing backup and recovery procedures; | ||
* encrypting sensitive data in transit and/or at rest | |||
* ensuring the [https://en.wikipedia.org/wiki/Principle_of_least_privilege principle of least privilege] is followed when granting access. | * ensuring the [https://en.wikipedia.org/wiki/Principle_of_least_privilege principle of least privilege] is followed when granting access. |
Latest revision as of 18:55, 6 November 2024
Research team responsibilities: Security in the cloud
Research teams are responsible for the following:
- implementing security controls to protect the confidentiality, integrity, and availability of their research data;
- installing, configuring, and managing their virtual machines, as well as their operating systems, services and applications;
- applying updates and security patches on a timely basis;
- configuring security group rules that limit the services exposed to the Internet;
- implementing and testing backup and recovery procedures;
- encrypting sensitive data in transit and/or at rest
- ensuring the principle of least privilege is followed when granting access.