![]() ![]() Many of the tools used to scan for vulnerabilities and security misconfigurations do a poor job in identifying storage and backup risks. The reasons are not difficult to comprehend-the scope of compliance for storage and backup systems is immense. Historically, these have been weak areas within organizations. Once the preparations are complete, even more time is absorbed in writing reports that demonstrate compliance-and this is only the beginning of an ongoing process.Īccording to NIST document SP 800-209 Security Guidelines For Storage Infrastructure, organizations are required to: “periodically and proactively assess configuration compliance to storage security policy”. Some organizations spend countless hours manually preparing for compliance-related activities such as a PCI audit. Storage & Backup Compliance is Time Consuming In addition, many of these standards require organizations to verify that they are carrying out their fiduciary responsibilities concerning Common Vulnerabilities & Exposures (CVEs). Organizations need to verify they comply with the different requirements of security frameworks and regulations such as CIS, NIST, PCI DSS, ISO, and others. In this feature, Continuity Software CTO Doron Pinhas and Veeam‘s Eric Ellenberg offer tips on how to demonstrate data storage and backup compliance.Ĭompliance to industry standards and regulatory mandates can absorb a huge amount of time. Solutions Review’s Premium Content Series is a collection of contributed articles written by industry experts in enterprise software categories. ![]()
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |