Cyber Magazine June 2024 | Page 103

CROWDSTRIKE ’ S SRM BEST PRACTICES :
1 . Carefully review the SLA . Security responsibilities will differ depending on the cloud model , cloud provider and other variables .
2 . Prioritise data security . Cloud customers are always fully responsible for any data stored in the cloud or produced by applications in the cloud .
3 . Ensure robust identity and access management . The cloud customer is also completely responsible for defining access rights to cloud-based resources and granting access to authorised users . 4 . Embrace DevSecOps . 5 . Identify a trusted cybersecurity partner . A cybersecurity partner can assist the organisation ’ s internal security team in managing all aspects of cloud security .
cybermagazine . com 103