+1(978)310-4246 credencewriters@gmail.com
  

Description

For this assignment, I want you to find a  different article on cloud security and summarize some of the  recommendations in the article. so you definitely will want to ensure that no one else has found  the same article you did to post.  Your post should be about one  paragraph in length to summarize the article, with between 3 – 5  recommendations that you discuss from the article or white paper.  Be  certain to provide a link to the article and remember to comment on at  least one other learner’s post.
NOTE: Be sure to cite which (Source) white paper or article you are summarizing or using for recommendations.
Lack of citation will mean -1 point for this Discussion Board
DON’T USE below ARTICLES:

Article “Cloud Infrastructure Security: 7 Best Practices to Secure Your Sensitive Data.” Cloud Infrastructure Security: 7 Best Practices for Cloud Data Protection | Ekran System, 17 Mar. 2023, https://www.ekransystem.com/en/blog/cloud-infrastructure-security.
Article “Securing Cloud Technology in a Growing Threat Landscape.” Security Intelligence, 10 Mar. 2023, https://securityintelligence.com/posts/securing-cl…
Article   “Best practices for securing your AWS environment” (Source: https://www.csoonline.com/article/3292225/best-practices-for-securing-your-aws- environment.html)
Article Title: “Cloud Security Best Practices: Tips to Secure Cloud Computing Services”
(Source: https://www.varonis.com/blog/cloud-security-best-practices/)

AND NEED A REPLY FOR THIS:
The  articles “Cloud Infrastructure Security: 7 Best practices to Secure  Your Sensitive Data,” posted on the Ekran website, and “Securing Cloud  Technologies in a Growing Threat Landscape,” posted on the  SecurityIntelligence website, state that cloud technologies are becoming  increasing due to the greater flexibility and scalability of cloud  service providers, as well as their ability to reduce administrative  overhead and save costs. However, these benefits come with security  risks that must be addressed. Therefore, it is crucial to take measures  to secure cloud security, such as selecting a reputable cloud service  provider that has robust security protocols and certifications. It is  also recommended to implement a strong authentication mechanism, access  control, and data encryption to prevent unauthorized access to the cloud  resources. Furthermore, employee training on cloud security best  practices can help prevent and respond to security incidents. Finally,  having a well-defined disaster recovery plan is critical to ensure that  data and applications can be restored in case of an unexpected event or  outage.
Works Cited
“Cloud Infrastructure Security: 7 Best Practices to Secure Your Sensitive Data.” Cloud Infrastructure Security: 7 Best Practices for Cloud Data Protection | Ekran System, 17 Mar. 2023, https://www.ekransystem.com/en/blog/cloud-infrastructure-security.
“Securing Cloud Technology in a Growing Threat Landscape.” Security Intelligence, 10 Mar. 2023, https://securityintelligence.com/posts/securing-cloud-technology-growing-threat-landscape/?c=Cloud+Security.

  
error: Content is protected !!