encryption

ISO-27001-Annex-A.10-Cryptography

ISO 27001 Annex : A.10 Cryptography

ISO 27001 Annex : A.10 Cryptography in this article explaining Cryptographic controls, Policy on the Utilization of Cryptographic Controls & Key Management. A.10.1 Cryptographic controls Its objective is to ensure the proper and efficient use of cryptography to protect the confidentiality, authenticity and/or integrity of the information. A.10.1.1 Policy on the Utilization of Cryptographic Controls Control- A policy on the use of cryptographic controls to secure information should be developed and enforced. Implementation Guidance- The …

ISO 27001 Annex : A.10 Cryptography Read More »

ISO-27001-Annex-A.9.2.3 Management-of-Privileged-Access-Rights

ISO 27001 Annex : A.9.2.3 Management of Privileged Access Rights & A.9.2.4 Management of Secret Authentication Information of Users

ISO 27001 Annex : A.9.2.3 Management of Privileged Access Rights & A.9.2.4 Management of Secret Authentication Information of Users these two topic is explained in this article. A.9.2.3 Management of Privileged Access Rights Control- A.9.2.3 Management of Privileged Access Rights The allocation and usage of exclusive access privileges will be limited and controlled. Implementation guidance- A structured authorizing procedure in accordance with the appropriate access management policies should monitor the allocation and usage of delegated …

ISO 27001 Annex : A.9.2.3 Management of Privileged Access Rights & A.9.2.4 Management of Secret Authentication Information of Users Read More »

Amazon Simple Storage Service-infosavvy

Amazon Simple Storage Service

Amazon Simple Storage Service (S3) is where individuals, applications, and a long list of AWS services keep their data. It’s an excellent platform for the following: – Maintaining backup archives, log files, and disaster recovery images – Running analytics on big data at rest – Hosting static websites S3 provides inexpensive and reliable storage that can, if necessary, be closely integrated with operations running within or external to Amazon web services. This isn’t the same …

Amazon Simple Storage Service Read More »

Vulnerability-Assessments-Top-8-Most-Useful

Vulnerability Assessments Top 8 Most Useful

Vulnerability assessments top 8 most useful analysis the method of recognizing, categorizing and characterizing the safety holes among the network infrastructure, computers & package, etc. Few samples of such vulnerabilities resort of a misconfiguration of parts in network infrastructure. A defect in associate degree software system, any ambiguity during a marketable product, etc. Given below are the different types of vulnerability assessments: Active Assessments Active evaluation are a type of vulnerability assessment that uses network scanners to scan the network to identify the hosts, …

Vulnerability Assessments Top 8 Most Useful Read More »