I am doing industry analysis on Public Cloud Risk Management and looking for the related information, for example, what are the key unique risks related to public cloud computing and how public cloud risks fit into overall enterprise risk management framework, (e,g, risk categories or subcategories to be used for managing public cloud risks)?

529 viewscircle icon8 Comments
Sort by:
Head of Information/Cyber Securitya year ago

 I would like to recommend leveraging the guidelines outlined in the NIST Special Publication 800-144.

NIST SP 800-144 provides comprehensive recommendations and best practices tailored for securing data and systems in public cloud environments. It covers essential topics such as risk management frameworks, security controls, data protection strategies, and compliance considerations specific to cloud computing.

You can access the full document directly via this link:

https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-144.pdf

Implementing these guidelines will help us align our cloud security strategy with industry standards and regulatory requirements, ensuring robust protection of our data assets while maximizing the benefits of cloud adoption.

1 Reply
no titlea year ago

Thanks, Viral

CISO in Manufacturinga year ago

You can also have a look at OWASP Cloud Architecture Security Cheat Sheet (https://cheatsheetseries.owasp.org/cheatsheets/Secure_Cloud_Architecture_Cheat_Sheet.html#cloud-architecture-security-cheat-sheet) or CISA and NSA Release Cybersecurity Information Sheets on Cloud Security Best Practices (https://www.cisa.gov/news-events/alerts/2024/03/07/cisa-and-nsa-release-cybersecurity-information-sheets-cloud-security-best-practices)

1 Reply
no titlea year ago

Thank you, Alexander

VP of ITa year ago

1. There is no ownership of the environment.
2. There is no physical separation of the hardware.
3. Physical security control is not visible.
4. Insider threats.
5. Data privacy and compliance.
6. Data loss and recovery (we faced this in our previous experience).

1 Reply
no titlea year ago

Thank you, @<mention id="657552a7ffbf5c0001de4c21" displayname="Yaagoub Alnujaidi"></mention>, for your insight. We did include the above in our consideration and now we are thinking to map the above to risk taxonomy, for example, isolation failure for #2 and insider risk for #3 etc. And eventually we also like to map all the cloud risk taxonomies to some enterprise risk categories, for example, technology risk, operational risk, data risk, or cyber security risk. Any insight from this perspective?

VP of ITa year ago

There is wealth of information on this subject at Saudi Arabia National Cybersecurity Agency (NCA) but in Arabic that you might need to translate to English

https://nca.gov.sa/ar/regulatory-documents/controls-list/179/

1 Reply
no titlea year ago

Thanks

Content you might like

Username, Password, Biometrics18%

Username, Biometrics, Password31%

Biometrics, Password, Username36%

All are equally secure.13%

Other (comment below)

View Results

Specific ransomware mitigation measures17%

Developing/implementing cybersecurity contingency and recovery plans66%

Conducting a cybersecurity architecture design review16%

Other (please share below)

View Results