Innovation brings risk. How do you protect data in the Cloud?

Innovation brings risk. How do you protect data in the Cloud?

Welcome to this week’s Security Spotlight, where we shine a light on:

 


Cloud computing offers organisations easy-to-scale services, extended IT capabilities and access to innovations.

But innovation brings risk.

If you can access data in the Cloud from anywhere, how will you secure it?

 

New blog | How to Meet the NCSC’s 14 Cloud Security Principles[KR1] [KK2] 

The NCSC established 14 Cloud security principles, including:

1.       Identity and authentication

2.       Data in transit protection

3.       Supply chain security

These principles guide your due diligence checks when vetting your provider.

This blog explains all 14 principles, and how you can meet or check for them.

Read more

 

Blog | Security Risks of Outsourcing to the Cloud: Who’s Responsible?

This blog explains:

  • Legal and contractual requirements around Cloud security
  • Who’s responsible for what
  • How to manage Cloud security

Read more

 

Blog | 3 ISO 27001:2022 Controls That Help Secure Your Cloud Services

When looking for specific controls to secure the Cloud, ISO 27001 can help.

This blog details 3 controls to get you started:

1.       Contractual assurance – how to do your due diligence

2.       A policy for use of Cloud services

3.       Access control

Read more

 

Blog | What Are ISO 27017 and ISO 27018, and What Are Their Controls?

You can extend your ISMS with codes of practice ISO 27017 and ISO 27018 to cover specific aspects of Cloud security:

  • ISO 27017 – information security controls based on ISO 27002 for Cloud services
  • ISO 27018 – protecting PII in the Cloud as a data processor

This blog explains ISO 27017 and ISO 27018, and their controls.

Read more

 



Q&A | GDPR Article 28 Contracts: What You Need to Know

Whether in the Cloud or not, when you outsource personal data processing, check your contracts are GDPR compliant.

This doesn’t just avoid GDPR fines.

It avoids operational disruption and liability for something that was your supplier’s fault.

Data privacy trainer and DPO Andrew Snow explains.

Read the full interview

 


Free report | GDPR Benchmark Report 2024[KK6] 

The GDPR Benchmark Report 2024 is out!

This report, by our sister company DQM GRC , covers 4 years of gap analysis results, taken from organisations across a wide range of industries and sizes.

Find out how your organisation measures up when it comes to GDPR compliance. And get our top tips for overcoming your compliance challenges.

Download now

 


Free webinar | Cyber Essentials vs ISO 27001: Which cyber security framework is right for you?

Tuesday, 12 November 2024, 3:00 – 4:00 pm (GMT)

Choosing the right cyber security framework can be daunting.

This webinar breaks down the key differences between Cyber Essentials and ISO 27001.

Our experts Ashley Brett and Andrew Pattison will:

  • Offer practical advice and insights based on their extensive experience
  • Tackle common misconceptions
  • Discuss the benefits and challenges of each framework
  • Guide you through the steps to successful implementation

Whether you’re a small business looking to strengthen your security or a larger organisation considering ISO 27001, this session will provide the clarity you need to make an informed decision.

Register now

We previously interviewed Ashley about the key differences between Cyber Essentials and ISO 27001.

 

Free webinar | Using ISO/IEC 27018 as the Key to Data Privacy in the Cloud

Wednesday, 20 November 2024, 3:00 – 4:00 pm (GMT)

Get an overview of ISO 27018 in this free webinar, delivered by Alice Turley and Andrew Johnston :

  • How does ISO 27018 align with ISO 27001?
  • How does ISO 27018 certification enhance data privacy compliance and security?
  • What are practical steps to integrate ISO 27001 principles with ISO 27018 and other standards?
  • What are real-world examples of ISO 27018, and how does the Standard add value?

Whether you’re a DPO, GDPR professional or information security manager, you’ll gain a comprehensive understanding of ISO 27018 and its critical role in ensuring data privacy in the Cloud.

Register now

 


Speak to an information security expert

With 20+ years’ experience in information security, we understand risk management.

Our experts have implemented information security programmes for hundreds of organisations across a multitude of industries in both the private and public sectors.

New to the world of information security and need advice on how to get started?

Or updating an existing information security programme?

Our experts are here to help.

Get in touch

 

To view or add a comment, sign in

More articles by IT Governance Ltd

Explore topics