5 ways to minimize the security risks of the cloud

简介: Like real clouds, cloud services have holes. The Cloud Security Alliance (CSA) has warned that the shared and on-demand nature of cloud computing intr

5_ways_to_minimize_the_security_risks_of_the_cloud

Like real clouds, cloud services have holes. The Cloud Security Alliance (CSA) has warned that the shared and on-demand nature of cloud computing introduces the possibility of new security risks that can erase any gains made by the switch to cloud technology1.

Below is a list of five ways enterprises can minimize security risks when moving to the cloud.

1. Replicate local security measures


Organizations can curtail the danger to their applications and data in the cloud if they replicate the same security processes that have worked for them on premise in the cloud, wherever possible. This measure will also build confidence in moving data over to the virtual cloud given that tried and tested methods will be employed to protect data.

2. Have a thorough understanding of your cloud service provider


It’s imperative to investigate a cloud service provider before any decision is made to adopt their services. Experienced providers understand the specific security needs of different industries, have multiple security measures available and provide timely and accessible support. Adequate understanding and careful review of any agreement to be made with a provider is also essential, especially with regard to their data breach policy as this is critical for handling emergencies.

3. Use encryption and multifactor authentication


The massive amount of data normally stored in the cloud makes the prospect of a data breach frightening since there’s a lot to lose. The CSA has recommended organizations use multifactor authentication and encryption to protect against data breaches of the cloud. A comprehensive security solution should also employ ongoing data monitoring.

4. Limit security risks prior to migration


When companies make the decision to transfer data and applications to the cloud, prior to the migration taking place, pre-emptive steps can be taken to reduce the security risks once the move is actually made. For example, CIOs can ensure their staff are trained with how to use the cloud securely once it is instituted in order to avoid security mishaps arising from human error following migration.

5. Have a cloud strategy in place


Gartner estimates that less than one-third of enterprises have a documented cloud strategy and even with the increasing adoption of the cloud, mapping out a cloud strategy is still perplexing to CIOs. This is unfortunate, because a cloud strategy can help ensure an organization is fully up to speed regarding how to protect data. An effective strategy should encompass all dimensions of security, including how to keep data secure, what to do if data is breached, what data is too risky to move to the cloud (such as confidential data) and so forth.
1 https://chapters.cloudsecurityalliance.org/southwest/files/2016/04/The-2016-Dirty-Dozen.pdf
目录
相关文章
|
存储 搜索推荐 Shell
|
负载均衡 大数据 Linux
|
安全
Information Systems Security Assessment – Open information security framework
The Information Systems Security Assessment Framework (ISSAF) seeks to integrate the following m...
927 0
|
存储 安全 Java
Spring Security(一)--Architecture Overview
Spring Security(一)--Architecture Overview
134 0
|
定位技术
Esri and Alibaba Cloud to Bring Enhanced Location Intelligence Technology to Cloud Users
Esri and Alibaba Cloud are working together to combine Esri’s excellence in GIS with Alibaba Cloud’s world-class Cloud Computing capabilities.
1356 0
Esri and Alibaba Cloud to Bring Enhanced Location Intelligence Technology to Cloud Users
|
网络协议 安全 关系型数据库
Using Mautic Automated Marketing on an Alibaba Cloud Instance with DirectMail
In this tutorial, we will install Mautic on a LEMP stack, using the Webinoly Optimized server automation tool.
3629 0
Using Mautic Automated Marketing on an Alibaba Cloud Instance with DirectMail
|
安全 API
Developing Secure Applications for the Cloud
A discussion of security best practices for developers who are building cloud applications.
1579 0
|
安全 人工智能
The Cloud is Taking Over Ecommerce
Ecommerce will account for 42% of total consumption growth by 2020, with 90% of that emanating from mobile e-commerce.
1236 0
Uptime And Monitoring Strategies For Cloud-Based E-Commerce Applications/Websites
In order to keep your e-commerce site functioning properly, you need to take positive steps to monitor both its performance and functionality.
1484 0
|
CDN
Configuring CDNs for Multiple Regions on Alibaba Cloud
Alibaba CDN is a service that optimizes delivery of files, images, and assets.
2228 0