Menu

3.4 Explain how cloud technology adoption impacts organizational security.

Automation and orchestration

Encryption configuration

Logs

 Availability

 Collection

 Monitoring

 Configuration

 Alerting

Monitoring configurations

Key ownership and location

Key life-cycle management

Backup and recovery methods

 Cloud as business continuity and disaster recovery (BCDR)

 Primary provider BCDR

 Alternative provider BCDR

Infrastructure vs. serverless computing

Application virtualization

Software-defined networking

Misconfigurations

Collaboration tools

Storage configurations

 Bit splitting

 Data dispersion

Cloud access security broker (CASB)