Cloud security

De Wiki Campus Cyber
Révision datée du 17 avril 2024 à 10:05 par Angèle (discussion | contributions)
(diff) ← Version précédente | Voir la version actuelle (diff) | Version suivante → (diff)
Aller à :navigation, rechercher

Définir les risques inhérents au cloud sur l’ensemble des thématiques (risque de fuite d’information, intrusion, compliance …)

Catégorie : Communauté d'intérêt Mots clés : Cloud

Statut : En cours

Description

-Define the risks inherent in the cloud in all areas (risk of information leakage, intrusion, compliance, etc.).

-Prioritize risk coverage needs.

-Define the major issues and challenges surrounding public and private cloud security. Focus on the specificities of the cloud (container security, use of CI/CD, use of CSPM/CNAPP/CIEM tools, secret management, partitioning & filtering, resilience, etc.).

-Share best practices and methods for the secure deployment of these new technologies (containers, CICD, CNAPP, etc.)

-Share best practices for hosting applications with confidential data in clouds.

Logbook

05.04

The Cloud Security IC has completed its task of collecting topics and is working on the pre-configuration of working groups. 3 working groups will be prioritised and launched in May. Members are invited to position themselves on the working groups as contributors and coordinators.

09.02.24

Ideation work on subjects of interest and start of problematisation. The next session will be devoted to defining working groups based on the issues identified.

12.01.24

Kick off on January, 12th. Round-table discussion, introductions, alignment of CI objectives and member expectations.


Groupes de travail

 StatusDescription
GT Sécurisation du Cloud - Gouvernance des configurations dans le Cloud publicEn coursGroupe de travail dédié à la gouvernance des configurations dans le Cloud public
GT Sécurisation du Cloud - Sécurité de la donnéeEn coursGT dédié à la sécurisation et au chiffrement des données dans le Cloud : chiffrement at rest, en transit, in use, gestion des clés, des certificats, BYOK,HYOK & co, Confidential Computing