Cloud 101CircleEventsBlog
Download Presentations from the CSA AI Summit at RSAC Now

Download Publication

Cloud Incident Response Framework - Korean Translation
Cloud Incident Response Framework - Korean Translation

Cloud Incident Response Framework - Korean Translation

Release Date: 12/09/2021

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected]

This framework created by the Cloud Incident Response Working Group serves as a go-to guide for cloud customers to effectively prepare for and manage cloud incidents. It explains how to assess an organization’s security requirements and then opt for the appropriate level of incident protection. Cloud customers will learn how to negotiate with cloud service providers, select security capabilities that are made-to-measure, and divide security responsibilities.

Translation:
클라우드 침해사고 대응 Working Group에서 만든 CIR 프레임워크는 클라우드 사용자가 클라우드 침해사고에 효과적으로 대비하고 관리할 수 있는 가이드 역할을 합니다. 조직의 보안 요구 사항을 파악하고 적절한 침해사고 보호 방법을 선택하는데 도움을 줍니다. 클라우드 사용자는 클라우드 서비스 제공자와 협상하여 고객사의 적합한 보안 기능을 선택하고, 보안 책임을 나누는 방법을 배웁니다.

Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
Cloud Controls Matrix and CAIQ v4
Cloud Controls Matrix and CAIQ v4
HSM-as-a-Service Use Cases, Considerations, and Best Practices
HSM-as-a-Service Use Cases, Considerations, and...
Defining the Zero Trust Protect Surface
Defining the Zero Trust Protect Surface
How Continuous Controls Monitoring Brings IT Unity & Agility
How Continuous Controls Monitoring Brings IT Unity & Agility
Published: 05/10/2024
CSA Community Spotlight: Educating the Security Industry with CISO Rick Doten
CSA Community Spotlight: Educating the Security Industry with CISO ...
Published: 05/08/2024
Navigating Legacy Infrastructure: A CISO’s Strategy for Success
Navigating Legacy Infrastructure: A CISO’s Strategy for Success
Published: 05/08/2024
Resource Constraints in Kubernetes and Security
Resource Constraints in Kubernetes and Security
Published: 05/06/2024
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training