Capital newspaper releases guide on safe cloud storage use

Capital Ethiopia has released a comprehensive guide on using cloud storage safely and effectively. The article outlines key security practices for teams to protect data without hindering productivity.

Published on January 28, 2026, by Capital Newspaper, this guide details best practices for secure and efficient cloud storage usage. It begins by stressing the shared responsibility model, where providers handle infrastructure security while users manage identities, data, and settings. Teams are advised to document ownership and review assignments after integrations to avoid blind spots.

The article recommends enabling encryption for data at rest and in transit, using TLS for connections, and deciding on key management—either provider-managed for ease or self-controlled for added security. Keys should be rotated regularly, and approved ciphers maintained to keep systems current.

Monitoring and response form another core section, urging the activation of logs for access, changes, and audits. Tools for cloud data security can consolidate signals for quicker threat detection. Rules for risks like public buckets or mass downloads are suggested, alongside incident drills to test recovery from scenarios such as lost devices.

Strong identity controls emphasize least privilege, short-lived tokens, and Zero Trust principles, with references to Microsoft's guidance on the CISA Zero Trust Maturity Model. Monthly reviews of admin roles and enhanced monitoring for high-privilege accounts are highlighted.

Data classification and minimization advise labeling by sensitivity, removing duplicates, and using separate storage for varying risk levels. Automated lifecycle rules ensure timely archiving or deletion.

For resilience, backups in isolated accounts and regions, with immutable storage and regular restore tests, are essential. Standardized runbooks and checklists verify recovery capabilities.

Configurations should be validated against frameworks like the NIST Cybersecurity Framework 2.0, updated in February 2024, as noted in an AWS whitepaper. This alignment aids in demonstrating progress.

Finally, it covers regulatory duties, mapping controls to applicable laws and contracts. The U.S. Binding Operational Directive exemplifies mandatory safeguards for federal systems. The guide encourages starting with simple improvements and quarterly reviews to build secure habits.

Artikel Terkait

Illustration depicting an investor reviewing SEC bulletin on crypto custody risks, with symbols of secure wallets, hacks, bankruptcies, and shutdowns.
Gambar dihasilkan oleh AI

SEC releases investor bulletin on crypto custody risks

Dilaporkan oleh AI Gambar dihasilkan oleh AI

The U.S. Securities and Exchange Commission has published an investor bulletin to educate retail investors on crypto asset custody. The guide outlines best practices for storing digital assets and highlights risks associated with hacks, bankruptcies, and shutdowns. It emphasizes the importance of scrutinizing custodians and securing personal wallets.

Laporan penelitian baru Google menunjukkan bahwa lanskap ancaman keamanan cloud sedang berkembang pesat. Peretas semakin menargetkan pihak ketiga dan kerentanan perangkat lunak untuk menembus sistem. Laporan tersebut juga mencatat penurunan kesalahan konfigurasi cloud.

Dilaporkan oleh AI

One year after its initial guidance, the U.S. Securities and Exchange Commission has issued a new bulletin cautioning retail investors on cryptocurrency custody risks, expanding on third-party vulnerabilities like rehypothecation and linking to advancing digital asset regulations.

Pelahaman data besar telah terungkap, melibatkan 149 juta kredensial yang dibiarkan terekspos secara online. Cache 98 GB mencakup nama pengguna dan kata sandi unik dari layanan keuangan, media sosial, dan aplikasi kencan. Penemuan ini menyoroti kerentanan berkelanjutan dalam keamanan digital.

Dilaporkan oleh AI

African nations like Kenya and Ghana have enacted new laws to regulate virtual asset service providers, addressing rising financial crime risks in the digital economy. These frameworks aim to balance innovation with safeguards against money laundering and fraud. The moves come as global cryptocurrency thefts exceed $2 billion annually.

Microsoft telah menguraikan langkah-langkah untuk bertindak sebagai 'tetangga baik' di wilayah yang menampung pusat data mereka, bertujuan mencegah kenaikan tagihan utilitas lokal. Perusahaan merespons kekhawatiran publik yang meningkat tentang kebutuhan energi infrastruktur mereka. Ini termasuk mendorong tarif listrik yang lebih tinggi khusus untuk pusat data.

Dilaporkan oleh AI

Microsoft telah memperkenalkan kebijakan yang melibatkan kunci BitLocker yang mendorong pengguna untuk mempertimbangkan beralih ke Linux. Langkah ini dipandang sebagai kekurangan besar bagi pengguna Windows yang peduli dengan keamanan dan privasi data.

 

 

 

Situs web ini menggunakan cookie

Kami menggunakan cookie untuk analisis guna meningkatkan situs kami. Baca kebijakan privasi kami untuk informasi lebih lanjut.
Tolak