Capital newspaper releases guide on safe cloud storage use

Capital Ethiopia has released a comprehensive guide on using cloud storage safely and effectively. The article outlines key security practices for teams to protect data without hindering productivity.

Published on January 28, 2026, by Capital Newspaper, this guide details best practices for secure and efficient cloud storage usage. It begins by stressing the shared responsibility model, where providers handle infrastructure security while users manage identities, data, and settings. Teams are advised to document ownership and review assignments after integrations to avoid blind spots.

The article recommends enabling encryption for data at rest and in transit, using TLS for connections, and deciding on key management—either provider-managed for ease or self-controlled for added security. Keys should be rotated regularly, and approved ciphers maintained to keep systems current.

Monitoring and response form another core section, urging the activation of logs for access, changes, and audits. Tools for cloud data security can consolidate signals for quicker threat detection. Rules for risks like public buckets or mass downloads are suggested, alongside incident drills to test recovery from scenarios such as lost devices.

Strong identity controls emphasize least privilege, short-lived tokens, and Zero Trust principles, with references to Microsoft's guidance on the CISA Zero Trust Maturity Model. Monthly reviews of admin roles and enhanced monitoring for high-privilege accounts are highlighted.

Data classification and minimization advise labeling by sensitivity, removing duplicates, and using separate storage for varying risk levels. Automated lifecycle rules ensure timely archiving or deletion.

For resilience, backups in isolated accounts and regions, with immutable storage and regular restore tests, are essential. Standardized runbooks and checklists verify recovery capabilities.

Configurations should be validated against frameworks like the NIST Cybersecurity Framework 2.0, updated in February 2024, as noted in an AWS whitepaper. This alignment aids in demonstrating progress.

Finally, it covers regulatory duties, mapping controls to applicable laws and contracts. The U.S. Binding Operational Directive exemplifies mandatory safeguards for federal systems. The guide encourages starting with simple improvements and quarterly reviews to build secure habits.

Artículos relacionados

Illustration depicting an investor reviewing SEC bulletin on crypto custody risks, with symbols of secure wallets, hacks, bankruptcies, and shutdowns.
Imagen generada por IA

SEC publica boletín para inversores sobre riesgos de custodia cripto

Reportado por IA Imagen generada por IA

La Comisión de Bolsa y Valores de EE.UU. ha publicado un boletín para inversores destinado a educar a los inversores minoristas sobre la custodia de activos cripto. La guía describe las mejores prácticas para almacenar activos digitales y destaca los riesgos asociados a hackeos, quiebras y cierres. Enfatiza la importancia de examinar detenidamente a los custodios y asegurar las billeteras personales.

Un año después de su guía inicial, la Comisión de Valores y Bolsa de EE.UU. ha emitido un nuevo boletín que advierte a los inversores minoristas sobre los riesgos de custodia de criptomonedas, ampliando las vulnerabilidades de terceros como la rehipotecación y vinculándolo a las regulaciones en avance de activos digitales.

Reportado por IA

East Africa's digital economy is expanding rapidly, and Tier III data centres are emerging as the ideal solution for reliable infrastructure. These facilities provide high availability without the excessive costs of higher tiers. Experts emphasize their importance for businesses and governments in the region.

The Office of the Data Protection Commissioner (ODPC) has warned private security firms in Kenya against unlawfully harvesting excessive personal data from visitors. In a draft guidance note, the ODPC states that only names, identification numbers, and entry times should be collected for building access. This alert comes amid rising cyber threats and major data breaches in the country.

Reportado por IA

Hassan Abdalla, gobernador del Banco Central de Egipto, afirmó que las transformaciones por inteligencia artificial ofrecen oportunidades para potenciar capacidades analíticas y de supervisión, pero introducen riesgos como la fragmentación regulatoria y ciberamenazas. Pidió una infraestructura digital robusta y marcos legislativos modernos para abordarlos. Estas declaraciones se produjeron en una reunión de alto nivel en Abu Dabi sobre estabilidad financiera.

Ethiopia's Central Bank has unveiled a draft strategy to boost digital payments by mandating fee transparency and reducing charges for small transactions. Officials attribute persistent cash reliance to hidden costs, despite growing digital account adoption. The move aims to make digital options more accessible for millions.

Reportado por IA

Microsoft's cloud service Azure suffered major issues on Wednesday, affecting services worldwide including in Sweden. The disruptions began around 5 p.m. Swedish time and are expected to be resolved by midnight. Several Swedish sites like Systembolaget and SAS were temporarily down.

 

 

 

Este sitio web utiliza cookies

Utilizamos cookies para análisis con el fin de mejorar nuestro sitio. Lee nuestra política de privacidad para más información.
Rechazar