Translations:Cloud shared security responsibility model/3/en: Difference between revisions
Jump to navigation
Jump to search
(Importing a new version from external source) |
(Importing a new version from external source) |
||
Line 1: | Line 1: | ||
==Research team responsibilities: Security in the cloud== | ==Research team responsibilities: Security in the cloud== | ||
Research teams are responsible for security controls to protect the confidentiality, integrity, and availability of their research data | Research teams are responsible for | ||
* implementing security controls to protect the confidentiality, integrity, and availability of their research data; | |||
* installing, configuring, and managing their virtual machines, as well as their operating systems, services and applications; | |||
* [[Security_considerations_when_running_a_VM#Updating_your_VM|applying updates]] and security patches on a timely basis; | |||
* configuring security group rules that limit the services exposed to the Internet; | |||
* implementing and testing backup and recovery procedures; | |||
* ensuring the [https://en.wikipedia.org/wiki/Principle_of_least_privilege principle of least privilege] is followed when granting access. |
Revision as of 18:44, 27 January 2023
Research team responsibilities: Security in the cloud
Research teams are responsible for
- implementing security controls to protect the confidentiality, integrity, and availability of their research data;
- installing, configuring, and managing their virtual machines, as well as their operating systems, services and applications;
- applying updates and security patches on a timely basis;
- configuring security group rules that limit the services exposed to the Internet;
- implementing and testing backup and recovery procedures;
- ensuring the principle of least privilege is followed when granting access.