10 Best Practices for Security, Compliance Monitoring

By Gina Roos

The Cloud Security Alliance recently published a new handbook, "The Big Data Security and Privacy Handbook: 100 Best Practices in Big Data Security and Privacy," aimed at helping big data solution providers reduce security and privacy threats that are growing and evolving as big data is collected and consumed in the cloud. "As big data expands through streaming cloud technology, traditional security mechanisms tailored to secure small-scale, static data on firewalled and semi-isolated networks are inadequate," J.R. Santos, executive vice president of research for the CSA, said in a statement. One of biggest challenges big data providers face as they migrate to the cloud is ensuring real-time security, which includes putting measures in place that stop unauthorized access to data. Compliance monitoring also is a key issue for providers as they create guidelines to determine how they can use the data, while ensuring that privacy laws and regulations are met. From CSA's massive listing, we've gleaned 10 best practices for delivering real-time security and compliance monitoring.

This article was originally published on 2016-08-30