The containment phase of the incident response lifecycle requires taking systems offline.
Which data security control is the LEAST likely to be assigned to an IaaS provider?
CCM: A hypothetical company called: “Health4Sure” is located in the United States and provides cloud based services for tracking patient health. The company is compliant with HIPAA/HITECH Act among other industry standards. Health4Sure decides to assess the overall security of their cloud service against the CCM toolkit so that they will be able to present this document to potential clients.
Which of the following approach would be most suitable to assess the overall security posture of Health4Sure’s cloud service?
If the management plane has been breached, you should confirm the templates/configurations for your infrastructure or applications have not also been compromised.