Artwork

محتوای ارائه شده توسط Kashif Manzoor. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Kashif Manzoor یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
Player FM - برنامه پادکست
با برنامه Player FM !

96 - Cloud Security with CIS Benchmarks Part 2

16:49
 
اشتراک گذاری
 

Manage episode 300484467 series 2922369
محتوای ارائه شده توسط Kashif Manzoor. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Kashif Manzoor یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

It is 2nd part of the session on CIS Benchmarks and controls for Cloud. The Center for Internet Security is a nonprofit organization with the mission to 'identify, develop, validate, promote, and sustain best practice solutions for cyber defense.’ Experts and IT professionals from different governments, institutes, and businesses across the globe are participating and finalizing the controls based on the consensus decision-making model.

Now let us link this to why it is essential for every one of us and every organization. I have got a chance to read the article on data breaches affecting millions of users and some of the biggest breaches in recent times published by CSOonline with the title “The 15 biggest data breaches of the 21st century.”

CIS Benchmarks

The CIS Controls consists of a recommended best practices to secure systems and devices, and CIS Benchmarks are rules for hardening specific operating systems, middleware, software applications, and network devices. The CIS Controls and the CIS Benchmarks are developed using a consensus-based approach by communities of experts.

CIS controls have been mapped to many other standards and regulatory frameworks, for example. the NIST Cybersecurity Framework (CSF), the ISO 27000, PCI DSS, HIPAA, and many others.

The decision must consider an organization’s requirements, evaluation criteria, and architecture principles.

In CIS 8 the number of controls is reduced to 18 from 20 in CIS 7. CIS 8 contains 153 Safeguards, which were called sub-controls in CS7 and they were 171 sub-controls

You’ll Learn:

CIS Security areas to assist you in preparing cloud security architecture

In Part 1 (Session no 95)

  • What is the role of CIS and how it is playing to ensure secure internet
  • What are CIS Benchmarks & benefits?
  • What are the seven core categories of CIS Benchmarks?
  • Basics of CIS Controls 7 & CIS Controls 8
  • What different cloud vendors provide you to meet CIS Benchmarks?

In Part 2 (Session no 96)

  • What are the 18 controls of the version CIS 8

Resources:

  continue reading

132 قسمت

Artwork
iconاشتراک گذاری
 
Manage episode 300484467 series 2922369
محتوای ارائه شده توسط Kashif Manzoor. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Kashif Manzoor یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

It is 2nd part of the session on CIS Benchmarks and controls for Cloud. The Center for Internet Security is a nonprofit organization with the mission to 'identify, develop, validate, promote, and sustain best practice solutions for cyber defense.’ Experts and IT professionals from different governments, institutes, and businesses across the globe are participating and finalizing the controls based on the consensus decision-making model.

Now let us link this to why it is essential for every one of us and every organization. I have got a chance to read the article on data breaches affecting millions of users and some of the biggest breaches in recent times published by CSOonline with the title “The 15 biggest data breaches of the 21st century.”

CIS Benchmarks

The CIS Controls consists of a recommended best practices to secure systems and devices, and CIS Benchmarks are rules for hardening specific operating systems, middleware, software applications, and network devices. The CIS Controls and the CIS Benchmarks are developed using a consensus-based approach by communities of experts.

CIS controls have been mapped to many other standards and regulatory frameworks, for example. the NIST Cybersecurity Framework (CSF), the ISO 27000, PCI DSS, HIPAA, and many others.

The decision must consider an organization’s requirements, evaluation criteria, and architecture principles.

In CIS 8 the number of controls is reduced to 18 from 20 in CIS 7. CIS 8 contains 153 Safeguards, which were called sub-controls in CS7 and they were 171 sub-controls

You’ll Learn:

CIS Security areas to assist you in preparing cloud security architecture

In Part 1 (Session no 95)

  • What is the role of CIS and how it is playing to ensure secure internet
  • What are CIS Benchmarks & benefits?
  • What are the seven core categories of CIS Benchmarks?
  • Basics of CIS Controls 7 & CIS Controls 8
  • What different cloud vendors provide you to meet CIS Benchmarks?

In Part 2 (Session no 96)

  • What are the 18 controls of the version CIS 8

Resources:

  continue reading

132 قسمت

همه قسمت ها

×
 
Loading …

به Player FM خوش آمدید!

Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.

 

راهنمای مرجع سریع