Under GDPR, an organization should report a data breach within what time frame?
Under the General Data Protection Regulation (GDPR), organizations are required to report a data breach to the appropriate supervisory authority within 72 hours of becoming aware of it. This timeframe is critical to ensure timely communication with the authorities and affected individuals, if necessary, to mitigate any potential harm caused by the breach.
Application programming interfaces (APIs) are likely to be attacked continuously by bad actors because they:
APIs are likely to be attacked continuously by bad actors because they are generally the most exposed part of an application or system. APIs serve as the interface between different components or services, and often expose sensitive data or functionality to the outside world. APIs can be accessed by anyone with an Internet connection, and can be easily discovered by scanning or crawling techniques. Therefore, APIs are a prime target for attackers who want to exploit vulnerabilities, steal data, or disrupt services.
ISACA, Certificate of Cloud Auditing Knowledge (CCAK) Study Guide, 2021, p. 88-89.
OWASP, The Ten Most Critical API Security Risks - OWASP Foundation, 2019, p.4-5
Which of the following cloud service provider activities MUST obtain a client's approval?
Deleting subscription owner accounts is an activity that MUST obtain a client's approval in the context of cloud service provider activities. Subscription owner accounts are critical as they hold the ownership and control over the resources and services within a cloud subscription. Deleting these accounts can have significant implications, including loss of access, control, and potential data loss. Therefore, it is essential for a cloud service provider to seek explicit approval from the client before proceeding with such an action to ensure transparency, maintain trust, and avoid any unintended consequences.
Microsoft Trust Center, Cloud Services Due Diligence Checklist1.
Google Cloud, What is a Cloud Service Provider?2.
Partner Center, CSP agreements, price lists, and offers3.
Microsoft Azure, How to choose a cloud service provider4.
FCA, FG16/5 Guidance for firms outsourcing to the 'cloud' and other third-party IT services
To ensure that cloud audit resources deliver the best value to the organization, the FIRST step is to:
The control domain feature within a Cloud Controls Matrix (CCM) represents:
Jennifer
27 days agoCharlesetta
2 months agoFranchesca
3 months agoCory
3 months agoJanna
4 months agoIsadora
4 months agoMelina
5 months agoAlfreda
5 months agoDoug
5 months agoJacqueline
6 months agoAnjelica
6 months agoHelaine
6 months agoMaurine
7 months agoLatosha
7 months agoLazaro
7 months agoGeorgiana
8 months agoBrent
8 months agoCecily
8 months agoCheryl
8 months agoMyrtie
9 months agoViola
10 months agoCharlene
10 months agoColeen
11 months ago