• Deploy strong identity management and access management systems.
  • Understand how security works with third-party apps & integrations in detail. Ensure you know what exactly does granting access for anything to a third-party app means.
  • Ensure that your cloud vendor provides audit logs and check them regularly.
  • Check that your cloud software vendors are compliant with the widely accepted standards & regulations pertaining to your industry. Consider security assessments by third parties as well.
  • Look for how seriously your cloud & cloud software vendors take their bug bounty programs.

Full post here, 5 mins read