Category Banner

Trend Micro will assess your security posture with just 25 simple questions

Basic information and questions/Assessment result

Cloud

To start, please indicate your industry, company size, and job title in the menu at the right. This allows us to provide a comparison to all respondents, and allows you to compare your current security posture with the averages of your peers.

Answer the 25 questions below then click Start Assessment to submit your answers for instant analysis.

Industry
Job title
Size(number of employees)
Country
Name
Company
Email
Bussiness Number
Mobile

Questions

[Question 1] We implemented or deployed security measures that are not applied or deployed by our cloud service provider.
[Question 2] Minimum access rights are enforced, controlling who can access and use cloud services within our organization.
[Question 3] Vulnerability assessment or penetration testing is carried out on applications before deploying in the cloud.
[Question 4] Security patches are applied to client/server operating systems immediately after availability. Otherwise, IPS, available as part of security portfolio, is used as an alternative.
[Question 5] Security patches are applied to applications on client/server immediately after availability. Otherwise, IPS, available as part of security portfolio, is used as an alternative.
[Question 6] Security policy on cloud service usage exists within our organization, and is shared and communicated with employees.
[Question 7] A process for handling security breaches in cloud services is documented.
[Question 8] We have dedicated resources, either inside or outside the organization, to handle security breaches in cloud services.
[Question 9] We have alert services or systems in place to notify security breaches in cloud services.
[Question 10] We know the security measures that are implemented by our cloud service provider.
[Question 11] Comprehensive security solution is deployed to servers in the cloud by either our cloud service provider or us.
[Question 12] We classified the types of systems and services that should and should not be moved to the cloud.
[Question 13] We classified the types of data that should and should not be moved to the cloud.
[Question 14] We understand the advantages and disadvantages of using cloud services for our business.
[Question 15] We understand that we would share IT resources with third parties when using cloud services.
[Question 16] We understand the level of ownership and a responsibility of security is different by cloud service models.
[Question 17] We have evaluation criteria or requirements on choosing cloud services from a security perspective.
[Question 18] We understand our cloud service provider's security policy.
[Question 19] We understand virtualization, which is the foundation of cloud services, from a security perspective.
[Question 20] We understand security risks associated with or related to cloud services.
[Question 21] We understand that a particular jurisdiction, or regional legal requirement, may apply depending on where cloud services and data are located.
[Question 22] Important data is encrypted in the cloud.
[Question 23] A comprehensive security solution is deployed to devices, such as desktop, notebook, smartphone and tablet, that are used to access cloud services.
[Question 24] A Web Application Firewall (WAF) or equivalent solution is deployed to protect cloud applications by either our cloud service provider or us.
[Question 25] A comprehensive security solution is deployed to servers in the cloud by either our cloud service provider or us.
[Question 26] Technology that can identify suspicious/malicious behavior, including antivirus, intrusion prevention, integrity monitoring, and log inspection, is used to monitor, protect, and remediate servers and applications in the cloud.
Top of page