The security laws which are implements to secure data in the cloud are as follows:
► Input Validation: Controls the input data which is being to any system.
► Processing: Control that the data is being processed correctly and completely in an application.
► File: Control the data being manipulated in any type of file.
► Output Reconciliation: Control the data that has to be reconciled from input to output.
► Backup & Recovery: Control the security breaches logs and the problems which has occurred while creating the back.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment