This
week, the class and I learned about securing cloud resources and identifying different
types of threats to cloud security. System misconfiguration occurs when an
application is configured improperly or are missing certain settings or guidelines.
This creates a ripple effect that exposes weak spots in the system for threat
actors to take advantage of. There are common security weak spots that IT
professionals should consider when a security issue arrives: unencrypted data
and communications, obsolete security technologies, incorrect hardening
settings, security device failure, insufficient security controls and processes,
and unauthorized physical access (West, 2022, p. 249). To fix these misconfigurations,
the team must consider identifying the root of the problem, evaluate the
severity, implement correction, and document the situation. The reason for
documenting is for future reference, meaning if this situation occurs again,
the team will be prepared.
West, J. (2022b).
CompTIA Cloud+ Guide to Cloud Computing. Course Technology.
No comments:
Post a Comment