1
Identity & Access Management
(users, privileges, clients)
• identity and access management
• identity governance
• privileged identity management
3
Data protection
(databases, workloads, content)
• file and folder encryption
• data loss prevention
• vulnerability scanning
• key lifecycle management
• PII discover and monitoring
5
Visibility and intelligence
(anomalies, threats, activities)
• event correlation
• monitoring and alerting
• multi-cloud and on-premise integration
Comprehensive Cybersecurity
Checklist for the Cloud
Workload centric
(security and DevOps management)
• cloud security policy management
• patch management
• auditing of controls
6
Application security
(threat prevention)
• secure application development
• application vulnerability assessment and management
4
Network security
(anomalies, threats, activities)
• monitoring events
• threat detection and prevention
• inter-workload protection
2

Comprehensive Cybersecurity Checklist for the Cloud [Infographic]

  • 1.
    1 Identity & AccessManagement (users, privileges, clients) • identity and access management • identity governance • privileged identity management 3 Data protection (databases, workloads, content) • file and folder encryption • data loss prevention • vulnerability scanning • key lifecycle management • PII discover and monitoring 5 Visibility and intelligence (anomalies, threats, activities) • event correlation • monitoring and alerting • multi-cloud and on-premise integration Comprehensive Cybersecurity Checklist for the Cloud Workload centric (security and DevOps management) • cloud security policy management • patch management • auditing of controls 6 Application security (threat prevention) • secure application development • application vulnerability assessment and management 4 Network security (anomalies, threats, activities) • monitoring events • threat detection and prevention • inter-workload protection 2