-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

CCSP (ISC)2 Certified Cloud Security Professional Exam Guide
By :

Access controls in the cloud are crucial measures regulating local and remote access, forming a multi-layered security approach to prevent unauthorized entry, safeguard against potential threats, and ensure secure interactions with cloud resources. These controls span various protocols and mechanisms to ensure a robust security posture.
Remote Desktop Protocol (RDP), a proprietary Microsoft protocol, stands as a widely utilized means for remote access to VMs and desktops. RDP incorporates robust security features, including encryption, authentication, and Network-Level Authentication (NLA). To bolster RDP security, administrators can configure Group Policy settings, applying restrictions on user access, session timeouts, and other security-related configurations aligned with organizational policies. Firewall considerations play a vital role, as configuring firewalls to permit RDP traffic exclusively from trusted IP addresses reduces the...