Remove Hacking Remove Personal Security Remove Policy Compliance
article thumbnail

Types of Cloud Security Controls & Their Uses

eSecurity Planet

Corrective Controls Following an attack, cloud security’s corrective procedures kick in to limit damage and restore regular operations. They perform actions such as reboots, backups, and unplugging hacked systems. Use corrective controls to respond swiftly to breaches and mitigate their consequences.

Risk 107