Are Differentiated Access Controls and Periodic Reviews Applied to Cloud Services?
Table of Contents
Description
Wolkvox implements a in its infrastructure hosted on Google Cloud Platform (GCP), based on the and aligned with ISO/IEC 27001 standards. This approach ensures that each user, service, or system has only the permissions necessary to perform their functions, thereby reducing the risk of unauthorized data exposure. Additionally, of access and permissions are conducted, supplemented by and , to ensure compliance with security policies and the protection of sensitive information.
Features
Access Controls in GCP
- Principle of Least Privilege: Roles and permissions are assigned based on the of each user or service, avoiding unnecessary access to critical resources.
- Robust Authentication: Use of multi-factor authentication (MFA) and strong password policies for accessing cloud services.
- Role Segmentation: Definition of in GCP (e.g., administrator, developer, auditor) to limit the scope of actions each profile can perform.
- Data Encryption: All stored or transmitted information is encrypted, both , using standards such as AES-256 and TLS.
Review and Audit
- Periodic Assessments: Permissions and access rights are reviewed quarterly, removing those that are no longer necessary or obsolete.
- Activity Logs: Detailed monitoring and logging of all actions performed in the cloud, with automatic alerts for suspicious or unusual activities.
- Shared Responsibility Matrix: Wolkvox and Google collaborate to ensure that access controls comply with best practices, following GCP’s .