Translations:Cloud shared security responsibility model/3/en: Difference between revisions

From Alliance Doc
Jump to navigation Jump to search
(Importing a new version from external source)
(Importing a new version from external source)
 
Line 6: Line 6:
* configuring security group rules that limit the services exposed to the Internet;
* configuring security group rules that limit the services exposed to the Internet;
* implementing and testing backup and recovery procedures;
* implementing and testing backup and recovery procedures;
* encrypting sensitive data in transit and/or at rest
* ensuring the [https://en.wikipedia.org/wiki/Principle_of_least_privilege principle of least privilege] is followed when granting access.
* ensuring the [https://en.wikipedia.org/wiki/Principle_of_least_privilege principle of least privilege] is followed when granting access.

Latest revision as of 18:55, 6 November 2024

Information about message (contribute)
This message has no documentation. If you know where or how this message is used, you can help other translators by adding documentation to this message.
Message definition (Cloud shared security responsibility model)
==Research team responsibilities: Security in the cloud==
Research teams are responsible for the following:
* implementing security controls to protect the confidentiality, integrity, and availability of their research data;
* installing, configuring, and managing their virtual machines, as well as their operating systems, services and applications;
* [[Security_considerations_when_running_a_VM#Updating_your_VM|applying updates]] and security patches on a timely basis; 
* configuring security group rules that limit the services exposed to the Internet;
* implementing and testing backup and recovery procedures;
* encrypting sensitive data in transit and/or at rest
* ensuring the [https://en.wikipedia.org/wiki/Principle_of_least_privilege principle of least privilege] is followed when granting access.

Research team responsibilities: Security in the cloud

Research teams are responsible for the following:

  • implementing security controls to protect the confidentiality, integrity, and availability of their research data;
  • installing, configuring, and managing their virtual machines, as well as their operating systems, services and applications;
  • applying updates and security patches on a timely basis;
  • configuring security group rules that limit the services exposed to the Internet;
  • implementing and testing backup and recovery procedures;
  • encrypting sensitive data in transit and/or at rest
  • ensuring the principle of least privilege is followed when granting access.