Protecting Data In The Cloud: Top Security Measures
Security and cloud. Not so long ago it was the main resistance concern about not going to the cloud but now most of them have moved even if some part of the cloud are not so secure, exemples are easy to find (playstation network, ubisoft...). So when we are a company what should we look before putting data inside our cloud provider.
First you should increase our security and our process, because with the arrival of virtualization security have been lowered du comply some performance issue or some other part of security have not been updated after virtualization and they still liked to a physical world. So double down on data security or seek assistance from cloud providers for data protection must be one of your priority. You should also check the Responsibility because it depends on the type of cloud service that your provider deliver to you.
With the introduction of cloud you should deploy new security capabilities to control the flow and access to data and also protect sensitive or confidential data transferred to the cloud without your authorization. Most of the IaaS adopters indicated that they have no knowledge of the data protection measures in place! so take some. The use hardware security modules become more important for businesses that can afford the devices to manage encryption and keys. Some cloud providers and businesses are beginning to make key management a shared responsibility between the cloud provider and the cloud user. The goal is to reduce costs and improve efficiency as part of a formal key management strategy but you should take a look at the new cryptographic standard known as the Key Management Interoperability Protocol (KMIP) was gaining relevance in encryption key management among cloud environments.
This standard was designed to make enterprise key management systems and encryption systems interoperate more efficiently, reducing vendor lock-in, so it will authorize you to move your data quickly if you are not satisfied about your cloud provider. You should also check for ISO 27001 certification for your provider.
Now, Identity and access management is seen as the top data protection priority, followed by data discovery and data protection when in use within business applications and businesses are searching for ways to federate identity across systems. Some firms added multifactor authentication measures to protect against password misuse. Meanwhile, encryption was used for data backup, on internal networks and within cloud services and databases.
thanks
Commentaires
Publier un commentaire