A Practical Guide to Designing Secure Health Solutions Using Microsoft Azure

Today I have finished publishing my latest great work of security and compliance content. Check it out!.

A Practical Guide to Designing Secure Health Solutions Using Microsoft Azure whitepaper providers readers considerations guidance for using cloud technology, includes risk management, shared responsibility considerations, establishing an information security management system, understanding industry and local regulations, and establishing standard operating procedures. It outlines, and provides recommendations to 13 security principles that are both aligned to a standard information security management standard, such as ISO 27001, and standard development processes, such as Microsoft’s Security Development Lifecycle (SDL). The paper also gives readers a direct view of the key principles by applying them to a ‘lift and shift’ health based case study.



Whitepaper Table of Content

Compliance and security methodology  
Standard operating procedures
Incorporating regulation considerations – health industry
Shared responsibilities 
Key principles and recommendations for secure development and operations             
1.           Enable identity and authentication solutions      
2.           Use appropriate access controls
3.           Use industry-recommended, enterprise-wide antimalware solution             
4.           Effective certificate acquisition and management            
5.           Encrypt all customer data           
6.           Penetration testing        
7.           Threat modeling services and applications          
8.           Log security events, implement monitoring and visualization capabilities
9.           Determine the root cause of incidents   
10.         Train all staff in cyber security   
11.         Patch all systems and ensure security updates are deployed       
12.         Keep service and server inventory current and up-to-date           
13.         Maintain clear server configuration with security in mind            

Applying key principles in use case Lift and Shift | Implementation of a healthcare application   

Comments

Popular posts from this blog

Protecting sensitive data

Secure workstation - Root of trust to manage the cloud

Why is privileged access important?