The security laws which are implements to secure data in the cloud are as follows:
► Input Validation: Controls the input data which is being to any system.
► Processing: Control that the data is being processed correctly and completely in an application.
► File: Control the data being manipulated in any type of file.
► Output Reconciliation: Control the data that has to be reconciled from input to output.
► Backup & Recovery: Control the security breaches logs and the problems which has occurred while creating the back.

0 comments:

Post a Comment

Management Consultants