AWS

Course Introduction

Cloud Governance, Risk, and Compliance

Intermediate
Course completed!
Check

Watch Preview
icon enterprise Created with Sketch.
Work for a company?
Try Cloud Academy for Teams!
Grow your team's cloud skill with the Enterprise Training program.
1/16
1h7m
191

In the last decade the nature and complexity of security attacks have increased tremendously. From simple attacks, which focused on hacking exposed web pages; we have evolved to stealthy attacks, which focus on the hacker staying hidden for years on end inside the victim’s network with the sole purpose of stealing data. To make matters worse, more and more companies have started to store their data in the cloud, thereby transferring part of the responsibility of securing that data to the cloud service provider. Therefore these days the cloud service is entrusted with the task of providing adequate security to the data and services that it provides to customers. While making a decision to move to the cloud, the two main metrics that enterprises look at tend to be cost and security risk.


Transcripts are available as part of your Cloud Academy membership.

Sign-up for a 7-day free trial