Questions and Checklists
Question |
Checklist/Best Practice |
---|---|
SEC01 How do we develop the overall cloud security governance policies? |
|
SEC02 How do we manage the identity authentication of human-machine interfaces and machine-machine interfaces? |
|
SEC03 How do we manage the permissions of human and machine? |
|
SEC04 How do we design network security? |
|
SEC05 How do we design the operating environment security? |
|
SEC06 How do we design application security? |
|
SEC07 How do we design data security? |
|
SEC08 How do we design data privacy protection? |
|
SEC09 How do we implement security awareness and threat detection? |
|
SEC10 How do we respond to security incidents? |
|
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot