Take the Cloud Security Risk Assessment
How secure are your sensitive data and applications? Take the
Security Assessment Challenge to see if your organization is at risk.
Rate Your Security Risk
Get Started
How much do you agree with each statement?
|
1
|
You know where all your sensitive data resides
(structured and unstructured
across all devices and systems).
|
|
Strongly
Disagree Disagree
Neutral
Agree
Strongly
Agree |
|
2
|
You manage your customers or partners with an identity
management
solution.
|
|
Strongly
Disagree Disagree
Neutral
Agree
Strongly
Agree |
|
3
|
You manage your employees with an identity management
solution.
|
|
Strongly
Disagree Disagree
Neutral
Agree
Strongly
Agree |
|
4
|
You have access controls for privileged users, such as
database
administrators.
|
|
Strongly
Disagree Disagree
Neutral
Agree
Strongly
Agree |
|
5
|
You encrypt sensitive data at rest and in motion.
|
|
Strongly
Disagree Disagree
Neutral
Agree
Strongly
Agree |
|
6
|
You can manage the encryption key management lifecycle
for hybrid cloud
environments.
|
|
Strongly
Disagree Disagree
Neutral
Agree
Strongly
Agree |
|
7
|
You collect and consolidate data from logs, applications
and users to alert,
and report on threats.
|
|
Strongly
Disagree Disagree
Neutral
Agree
Strongly
Agree |
|
8
|
You can detect anomalous activities based on user or
entity behaviors (also
known as User and Entity Behavior Analytics).
|
|
Strongly
Disagree Disagree
Neutral
Agree
Strongly
Agree |
|
9
|
You monitor user activity across heterogeneous and hybrid
cloud
environments.
|
|
Strongly
Disagree Disagree
Neutral
Agree
Strongly
Agree |
|
10
|
You can automatically mitigate today’s cyber threats by
blocking, suspending
and/or responding with follow up incident management.
|
|
Strongly
Disagree Disagree
Neutral
Agree
Strongly
Agree |
|
11
|
When detecting suspicious behavior, you can automatically
step-up authentication requirements to require two-factor authentication.
|
|
Strongly
Disagree Disagree
Neutral
Agree
Strongly
Agree |
|
12
|
In the case of a personal data breach, your organization
can notify the
appropriate supervisory authority no later than 72 hours after having become
aware of the breach.
|
|
Strongly
Disagree Disagree
Neutral
Agree
Strongly
Agree |
Your Risk is:
Calculating...
Your initial risk self-rating: