{"id":220,"date":"2013-01-31T00:00:00","date_gmt":"2013-01-31T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/01\/31\/governance-must-drive-all-security-initiatives-even-cloud\/"},"modified":"2021-12-30T11:36:46","modified_gmt":"2021-12-30T11:36:46","slug":"governance-must-drive-all-security-initiatives-even-cloud","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/01\/31\/governance-must-drive-all-security-initiatives-even-cloud\/","title":{"rendered":"Governance Must Drive All Security Initiatives&#8230; Even Cloud"},"content":{"rendered":"<p>You need to know who IS accessing resources, and if they don\u2019t have the proper credentials, you need to be notified immediately to take further preventive action.  You need to know your rights, liabilities (SLA) for any application or service acquired and that they conform to your risk management practices.  Effective governance is the ability to have a centralized map of all these information roads and create certain controlled access points, road blocks (encryption), privileged private lanes\/public highways\u2026in short, governance is about accountability.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It is up to the CIO or CSO\u2019s due diligence to understand all the implications on how the deployment will affect the holistic enterprise. <\/p>\n<p>\u201cWhen cloud computing is treated as a governance initiative, with broad stakeholder engagement and well-planned risk management activities, it can bring tremendous value to an enterprise,&#8221; said Emil D&#8217;Angelo, CISA, CISM, international president of ISACA and founding member of the Cloud Security Alliance.<\/p>\n<p>When due diligence is done, a CIO will have a clear idea of an initiative\u2019s risk versus return and whether a cloud security deployment meets the individual requirements of the company. <\/p>\n<p>For example, seeing who has accessed a certain application gives you historical perspective, but, what if it is a retired account or tries using a decommissioned password? &#8230;  Or if a partner accesses certain parts of your database to which they are entitled, but quadruples their order in the dead of night to be shipped to Phnom Penh? &#8230;  There are literally thousands of scenarios by which leveraging the cooperative functionality of IDM, AM, SIEM and Log Management creates not only the holistic visibility to drive governance policies, but offers significant barriers to keep the IT enterprise safer.<\/p>\n<p>The challenge facing most security teams, therefore, is to provide line-of-business users with the access they need while ensuring that the access is appropriate and does not expose the enterprise to unnecessary business risk.   But first you must ensure visibility&#8211;and when you know where all your data is and all the multiple ways that it is available, then you can best manage the policies, roles, and security functions that best connects your requirements.<\/p>\n<p>Link: http:\/\/cloudcomputing.sys-con.com\/node\/2527026<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-220","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/220","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=220"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/220\/revisions"}],"predecessor-version":[{"id":2707,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/220\/revisions\/2707"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=220"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=220"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=220"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}