Security Guidelines for Storage Infrastructure
From Continuity
The guide – co-authored by Continuity’s CTO – provides an overview of the evolution of storage technology, recent security threats, and the risks they pose.
Get a comprehensive set of recommendations for the secure deployment, configuration, and operation of storage resources. These include data and confidentiality protection using encryption, isolation and restoration assurance.
What you’ll learn:
• Back to basics of storage & backup infrastructure
• Threats, risks and attack surfaces
• How to securely deploy, configure and operate storage resources
• The best way to build a program to manage storage infrastructure risks and integrate it with existing cybersecurity frameworks