Tag Archive for: Compliance

Analyzing cloud security and compliance trends for 2022



Read Article


By Raj Srinivasaraghavan

It has been a known fact that cloud computing has been transforming the functional dynamics of businesses around the world making complex infrastructure and application deployment tasks simple. It is also known that in the pre-pandemic stage too, most organizations around the world were hosting their IT environments on the cloud. With no upfront capital investment required and low maintenance cost, migrating to a cloud environment offered businesses the advantages of cost optimization, reduced downtime and improved resilience. By facilitating seamless runtime mobility between multiple server environments, cloud hosting also offers the benefit of lowering stress on a single server.  Businesses are not required to expend precious time and resources to deploy and monitor their applications manually because cloud computing offers automatic software integration, automatic security updates and customized software services. Investing in cloud hosting has been seen as an operationally strategic and financially prudent move by business entities to facilitate application/database scalability, reduce risks and drive flexible work practices.

As businesses around the world consider migrating their critical tasks to a cloud environment, the foreseen and unforeseen security concerns and risks cannot be undermined. It is highly likely that as organizations undertake the process of migration, they could lose precious data and application files due to weak infrastructure. Data exposure and breach are already  emerging as serious risk considerations as malicious hackers increasingly target cloud infrastructures to gain unauthorised access to corporate databases/applications and steal sensitive business information. This  not only entails huge financial losses for business organizations but also leads to dire consequences in terms of loss of brand reputation if the stolen data is used  to perform unscrupulous acts. It is often deduced that improper security settings of application infrastructure in the cloud leads to these serious data or application breaches. .

For example, by providing accidental inbound/outbound network access in an unimpeded…

Source…

NIS Directive: Meeting NCSC’s Mobile Security Guidance



Are Cloud Computing Services Combating Challenges of Data Security, Compliance and Flexibility?


Cloud computing has become ubiquitous over the last ten years. Often, we barely even notice that we are using it to instantly move data and applications back and forth through the web. Like many workplaces, laboratories are increasingly looking to take advantage of cloud computing as a way to save time and resources, and as a cost-effective option to implement enterprise laboratory solutions.

By integrating cloud computing into all aspects of the scientific workflow, laboratories can harness the increased data security and improved performance delivered by the cloud. Cloud services enable laboratories to remotely access data, permitting scientists to view and process data sets outside the laboratory. A major benefit of cloud computing is that resources can be scaled-up or down, easily and quickly, meaning it can be applied to the small single-site laboratories with minimal or no IT support to multi-site, multi-lab global corporations.

But, how do laboratories integrate cloud systems into their pre-existing systems? Here, we discuss the challenges and benefits of operating in the cloud, focusing on how this model ensures data security and compliance, creating a flexible and scalable resource for all laboratories.

A nebular network of the Internet of Things (IoT)

Cloud computing is the delivery of on-demand computing resources over the Internet. Applications and data are hosted on centralized virtual servers in a cloud data center and accessed via an Internet connection. Usually, both the hardware and software required are delivered as small monthly payments, and only paying for what is used. Different pricing models allow you to make savings over on-demand services, and it is possible to commit to an amount of compute over one or three years and pay a portion of the costs or all the costs upfront maximizing savings.

Cloud computing has moved far beyond uploading photos and documents into storage systems and is more about connecting everyday objects into IoT. Smart fridges, analytical machines, thermostats and HVAC (heating, ventilation and air conditioning) systems; all are examples of instruments that are connected to the Internet for remote control and monitoring from personal…

Source…

Now Is the Time to Go for Compliance with CMMC


People in the upper tiers of the Department of Defense’s (DoD) supply chain are fully aware of the Cybersecurity Maturity Model Certification (CMMC) required by its suppliers starting in 2021, with rolling deadlines over the next few years.

Boswell-Julia.jpg
Julia Boswell

The CMMC is an assemblage of information and computer security controls, with additional requirements—namely NIST SP 800-171; NIST SP 800-53; and the CIS (Center for Internet Security) Controls. While suppliers have been required to be NIST800-171-compliant since early 2018, the self-verification process wasn’t robust enough to ensure the security of the Defense Industrial Base (DiB); a company could cite that it was compliant but it did not have to get audited and certified. As nation state, corporate and criminal hacks became more sophisticated and pervasive, the DoD decided to move away from self-attestation towards a verifiable certification process, and to that end, developed the new, comprehensive CMMC standard.

There are five levels of CMMC compliance. What a supplier provides, or where it fits in the supply chain, dictates the level of certification required by the DoD. For example, military aircraft engine OEMs may need to have a Level 5 certification, but a job shop providing fasteners for that engine may only need to have a Level 3 certification. As the DoD’s initial focus has been top-tier suppliers, the OEMs and Tier One suppliers are well on the road toward CMMC compliance. However, as the focus shifts onto their subcontractors’ cybersecurity posture, businesses will have to start preparing to meet the level of certification required of them.

ProShop ERP conducted an informal survey among our followers this year and discovered that almost half of the people who responded did not know about CMMC.

One of the first steps a defense parts supplier can take is to assign an interested staff member to understand the requirements of CMMC as it pertains to their business. Then, a gap assessment that captures the current state of an organization’s security architecture will help inform the implementation of the CMMC controls.

As a developer of a comprehensive ERP platform, or “digital ecosystem,” we are…

Source…