Cloud Security in Cloud Computing

0
52
views
Cloud Security

Ask yourselves these two questions, who is responsible for data security? The data owner or the cloud provider? You should understand that Cloud vendors can provide a relatively secure environment for information, with appropriate controls and regular maintenance checks. However the primary responsibility falls on the data owner. The best example is that of a parking garage. The owner of the facility may include cameras and security personnel, but that doesn’t relieve the car owner from locking the vehicle. In the same way, businesses should do whatever possible to ensure their data is secured and protected even from the personnel within the cloud provider.

Consumer Data

Below are some specific actions, that organizations or data consumer can use to feel secure in the cloud.

1) The recent trend in cloud computing is setting up multiple environments for data to stay or reside in. These environments include multiple cloud solutions, such as private and public solutions. The management of multiple environments can easily result in different security requirements, inconsistent security, and controls. This lack of standardization is likely the risk in security for a business as it results in managing multiple security profiles concurrently. The best approach to take is a unified central approach to security across all the environments.

2) Cloud consumers must always fully understand their networks and applications to determine how to provide functionality and security for cloud-deployed applications and systems. Due diligence must be performed across the applications and systems being deployed to the cloud, including the planning, development and deployment, operations, and decommissioning.

3) Always identify and Authenticate Users. Use multi-factor authentication to reduce the risk of credential compromise because stolen privileged user credentials allow an attacker to control and configure cloud consumer resources.

4) Never forget to assign user access rights. Plan a collection of roles to be able to fill both shared and customer explicit responsibilities. CSPs (Cloud service providers) for example provides advice on designing roles. These roles ought to guarantee that no individual can adversely influence the whole virtual data center.

5) When confidential information needs to be destroyed in a paper world, all evidence of the information is usually gathered and shredded. The same process is possible and should be applied digitally by removing all known data sets from the cloud and destroying associated cryptographic keys. Despite the fact that the cloud is a dynamic virtual environment where data indexes may reside in numerous areas, this procedure in persistent control will guarantee the data is never again decipherable or usable.

6) The CSP gives monitoring information to the consumer that is related to the customer’s utilization of services. Always rely on CSP-provided monitoring information as your first line of monitoring to detect unauthorized access to, or use of, systems and applications, as well as unexpected behavior or use of the systems and applications or their users.

7) Data living in the cloud, especially a public cloud, ought to always be encrypted with the encryption keys controlled by the business. Encrypted data is unreadable to any individual without the key to access it. That key can be made accessible to users within the business; empowering the information to be readable just to authorized personnel. Related to the granular access controls, data encryption gives this extra layer of barrier against unauthorized access.

Conclusion

In conclusion, cloud consumers should always consider utilizing the security tools. Tools such as correctly configured access control, encryption of data at rest, and multi-factor authentication offered by the CSPs. A common understanding across these cloud security practices outlined above. This is the need for cloud consumers to always develop a deep understanding of the services they are buying and to always use the security tools provided by the CSP.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.