Outsourcing involving Cloud computing Services

September 24, 2018

In July 2015, APRA published an information paper titled ’Outsourcing involving shared computing services (including cloud)’ 1 which outlined prudential considerations and key principles that should be considered when adopting use of cloud computing services. This paper updates the July 2015 paper. The update is a response to APRA’s observation of the growing usage of cloud computing services by APRA-regulated entities, an increasing appetite for higher inherent risk activities, as well as areas of weakness identified as part of supervisory activities.

Spotlight

Iquall Networks

We are an American company specialized in the provision of telecommunications services and solutions. We are committed to adopting both the diversity and the wealth of our vast continent, as well as to growing and learning from our customers and the continuous technological changes arising in the market, so that we can realize our business ideas into first-class solutions.

OTHER WHITEPAPERS
news image

How Virtual Desktop Infrastructure (VDI) Can Help Your Business Survive the Pandemic—And Prevailin the Future

whitePaper | December 6, 2022

Growing demand for remote working solutions in light of the pandemic is bolstering the case for virtual desktop infrastructure (VDI) adoption. In this white paper, we discuss why VDI is best suited for today’s business environments, especially since remote work is poised to play a big role both now and in the “new normal” of a post-COVID-19 world. We discuss VDI’s main advantages, its shortcomings and what can be done to address them.

Read More
news image

Zero Trust Maturity Model

whitePaper | June 13, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Read More
news image

IPU Based Cloud Infrastructure

whitePaper | January 1, 2023

2020 will go down in history as the year the world met with one of its most significant challenges in nearly a century – the great coronavirus pandemic. The resulting situation can be aptly described by the term “VUCA,” an acronym standing for Volatility, Uncertainty, Complexity and Ambiguity. In other words, the world faced a crisis.

Read More
news image

IPsec VPN User Guide

whitePaper | September 15, 2022

For each VPN tunnel, both AH and ESP tunnel sessions are installed on Services Processing Units (SPUs) and the control plane. Tunnel sessions are updated with the 7 protocol on is completed. For SRX5400, SRX5600, and SRX5800 devices, tunnel sessions on anchor SPUs are updated with the protocol while non-anchor SPUs retain ESP and AH tunnel sessions. ESP and AH tunnel sessions are displayed in the outputs.

Read More
news image

SK Telecom 6G White Paper

whitePaper | August 14, 2023

6G requires setting achievable goals and continuous communication with the market and consumers.  Efforts of all participants in the new 6G ecosystem are required, such as expanding of 6G usage scenarios, selecting candidate spectrums, vitalizing open interfaces, e.g., Open RAN, and simple architecture options, etc.

Read More
news image

Building a Successful Cloud Infrastructure Security and Compliance Practice

whitePaper | August 15, 2022

Cloud security truly is a team sport that requires strong collaboration between security, IT and line of business teams. The dynamic nature of cloud is forcing information security teams to rethink how they operate and partner with other groups to address emerging security and compliance challenges their organizations face

Read More

Spotlight

Iquall Networks

We are an American company specialized in the provision of telecommunications services and solutions. We are committed to adopting both the diversity and the wealth of our vast continent, as well as to growing and learning from our customers and the continuous technological changes arising in the market, so that we can realize our business ideas into first-class solutions.

Events