Tech supplier concentration increases risk of downtime - Control Risks

Control Risks released their predictions for the top business risks for 2025, calling out Digital Concentration Risk as companies outsource their specialist IT services to external providers, such as cloud and security. “The concentration of risk in centralised technological ecosystems in a worsening threat landscape will be a top risk for organisations in 2025.” Global technology disruptions such as the July 2024 Crowdstrike outages shows how human error or system misconfigurations can create a correlated industry-wide impact to customer organisations. And as these companies pass control to external tech vendors, they may be losing the in-house skills needed to respond to future incidents and outages. ...

December 8, 2024 · 1 min · Graeme Milroy

Availability zone (AZ)

An availability zone (AZ) is a distinct location within a cloud provider’s infrastructure, designed to be isolated from failures in other zones. Each availability zone is implemented using one or more data centres, equipped with largely independent power, cooling, and networking to ensure high availability and fault tolerance between zones. Further reading Availability zone (Wikipedia)

1 min

Azure Kubernetes Services (AKS) cluster

An AKS cluster is a managed Kubernetes service provided by Microsoft Azure. Further reading What is Azure Kubernetes Service (AKS)? - Microsoft Learn Related pages Kubernetes

1 min

CLOUD Act (US)

The Clarifying Lawful Overseas Use of Data (CLOUD) Act is a US law that allows US law enforcement to access digital information stored outside of the US. Further reading CLOUD Act (Wikipedia) Related Schrems II

1 min

Cloud Computing

*the cloud is just someone else’s computer Graham Cluley Example Cloud Providers Microsoft Azure Google Cloud Amazon Web Services (AWS)

1 min

Cloud Control Matrix (CCM)

The Cloud Control Matrix (CCM) is a cybersecurity control framework developed by the Cloud Security Alliance (CSA) that provides a comprehensive set of security and compliance controls for cloud computing environments. From the Cloud Security Alliance: The CCM, the only meta-framework of cloud-specific security controls, mapped to leading standards, best practices and regulations. CCM provides organizations with the needed structure, detail and clarity relating to information security tailored to cloud computing. CCM is currently considered a de-facto standard for cloud security assurance and compliance. ...

1 min

Cloud Security Alliance (CSA)

The Cloud Security Alliance (CSA) is a nonprofit organization that promotes best practices for securing cloud computing environments through research, education, and industry collaboration. Related Cloud Control Matrix (CCM)

1 min

Openshift Container Platform (OCP) cluster

An OpenShift cluster is a set of connected computers (called nodes) that run applications in containers. It lets you easily deploy, manage, and monitor these applications, and is designed for cloud environments.

1 min

Schrems II

Further reading Schrems II a summary – all you need to know The CJEU judgment in the Schrems II case (European Parliament) (PDF) What is Schrems II and how does it affect your data protection in 2021? (Thales) Related pages US CLOUD Act

1 min

What is the Azure Shared Responsibility Model?

The Azure Shared Responsibility Model outlines the division of security responsibilities suggested by Microsoft between themselves and their customers for managing the cloud. Understanding this model is important for ensuring that both parties effectively manage and secure their cloud environments. Further reading Shared responsibility in the cloud - Microsoft Related pages Shared Responsibility Model

1 min