5 ways to minimize the security risks of the cloud

Like real clouds, cloud services have holes. The Cloud Security Alliance (CSA) has warned that the shared and on-demand nature of cloud computing introduces the possibility of new security risks that can erase any gains made by the switch to cloud technology1.

Below is a list of five ways enterprises can minimize security risks when moving to the cloud.

1. Replicate local security measures

Organizations can curtail the danger to their applications and data in the cloud if they replicate the same security processes that have worked for them on premise in the cloud, wherever possible. This measure will also build confidence in moving data over to the virtual cloud given that tried and tested methods will be employed to protect data.

2. Have a thorough understanding of your cloud service provider

It’s imperative to investigate a cloud service provider before any decision is made to adopt their services. Experienced providers understand the specific security needs of different industries, have multiple security measures available and provide timely and accessible support. Adequate understanding and careful review of any agreement to be made with a provider is also essential, especially with regard to their data breach policy as this is critical for handling emergencies.

3. Use encryption and multifactor authentication

The massive amount of data normally stored in the cloud makes the prospect of a data breach frightening since there’s a lot to lose. The CSA has recommended organizations use multifactor authentication and encryption to protect against data breaches of the cloud. A comprehensive security solution should also employ ongoing data monitoring.

4. Limit security risks prior to migration

When companies make the decision to transfer data and applications to the cloud, prior to the migration taking place, pre-emptive steps can be taken to reduce the security risks once the move is actually made. For example, CIOs can ensure their staff are trained with how to use the cloud securely once it is instituted in order to avoid security mishaps arising from human error following migration.

5. Have a cloud strategy in place

Gartner estimates that less than one-third of enterprises have a documented cloud strategy and even with the increasing adoption of the cloud, mapping out a cloud strategy is still perplexing to CIOs. This is unfortunate, because a cloud strategy can help ensure an organization is fully up to speed regarding how to protect data. An effective strategy should encompass all dimensions of security, including how to keep data secure, what to do if data is breached, what data is too risky to move to the cloud (such as confidential data) and so forth.
1https://chapters.cloudsecurityalliance.org/southwest/files/2016/04/The-2016-Dirty-Dozen.pdf

时间: 2025-01-19 01:53:08

5 ways to minimize the security risks of the cloud的相关文章

Researches on Grid Security Authentication Algorithm in Cloud Computing

Researches on Grid Security Authentication Algorithm in Cloud Computing Keshou Wu  Lizhao Liu  Jian Liu  Weifeng Li, Gang Xie, Xiaona Tong and Yun Lin Index Terms-distributed computing; trusted computing; cloud computing; grid behavior; grid authenti

[文档]典型云计算服务中信息安全风险控制与法律规则

Research on Information Security Risk Control and Legal Regulation of Typical Cloud Computing Services Daoli Huang, Hao Yuan, Xi Xie, Liming Cai This paper analyzes eight (potential/possible) security risks of typical cloud computing services, propos

Android Development Security - Provider Component Security

1. Overview of the Content Provider Component The Content Provider component is one of the key Android app components. It manages data access and is mainly used to implement data sharing between apps. Content Provider data sources can be SQLite datab

User experience vs user security

The adoption of cloud computing among enterprises continues to accelerate. Seventy percent of organizations have at least one cloud-based application, and they are investing US $1.62 million in cloud computing on average, according to the latest 2016

How Important is Data Security for the Financial Industry?

Data is the lifeblood of the financial industry. Poor security management and the cyber attacks they enable are like sharp knives waiting to cause data hemorrhaging at financial companies. In a recent survey, 90% of financial companies worldwide thin

Cloud computing security with Nymble Technology

Cloud computing security with Nymble Technology Mr.Pradip U.Wawge  Ku.Ashvini R.Rathod  Amit R.Manakshe Keywords: misbehave blacklisting, privacy, security, revocation, error detection, cloud computing temp_12070408109302.pdf

Install Typical IIS Workloads

原文 Install Typical IIS Workloads  Introduction The IIS 7.0 and above modular architecture is designed to enable the IT professional to customize exactly which features are installed and running on the Web server. IIS is now factored into more than 40

Coding PHP with register

Intended AudienceIntroductionregister_globalsHow do the variables get to PHP? From the URL From a Form From a Cookie From the Environment or the ServerUse the superglobals! Why are they called superglobals?Other Coding Techniques Ways to HackSummaryA

25个增加linux服务器安全的点子

http://www.tecmint.com/linux-server-hardening-security-tips/ Everybody says that Linux is secure by default and agreed to some extend (It's debatable topics). However, Linux has in-built security model in place by default. Need to tune it up and cust