Use your web proxy, firewall, or SIEM logs to discover what cloud services are being used that you don’t know about, then run an assessment of their risk profile. Step 3: Discover shadow IT (unknown cloud use). Most people do not ask their IT team before signing up for a cloud storage account or converting a PDF online.Assess the permissions on files and folders in your cloud environment, along with access context like user roles, user location, and device type.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |