Most Read This Week
Real-World Cloud Computing
Common Gotchas: Cloud Security Problems to Avoid
For organizations looking to adopt the cloud, securing sensitive information outside the corporate perimeter isn’t as daunting
By: Paige Leidig
Apr. 19, 2014 01:00 PM
Cloud computing security can be a conundrum. The point of using the public cloud is to outsource certain infrastructure and application needs to third party providers, after all. How can you secure your data once it leaves your perimeter and your control? As puzzling as it may seem, there is hope.
Luckily for organizations looking to adopt the cloud, securing sensitive information outside the corporate perimeter isn't as daunting (or as impossible) as it may appear. Technologies exist to enable cloud computing security strong enough for companies to remain in compliance while taking full advantage of the flexibility, agility, and economies of scale of the cloud. Avoid these common pitfalls for a secure cloud experience.
Pitfall 1: Assuming that responsibility for cloud computing security rests with your CSP
It stands to reason but isn't true. While recent revisions to data privacy regulations like HIPAA do specify that third-party contractors bear some responsibility for data security - and while CSPs take security very seriously - that doesn't shift the burden from covered entities at all. In the event of a breach of your organization's data, your organization will still be held liable and still have to make a public breach disclosure. Look for ways to retain control over the privacy and integrity of your data no matter which CSP you choose.
Pitfall 2: Not encrypting enough
Not quite, and therefore encryption in transit isn't enough. Encryption in transit is a cloud computing security standard, of course. It protects data from would-be eavesdroppers while that data's en route from your premises to the CSPs. Data should always be encrypted in transit.
But encryption in transit is only one part of the story. Last year, the NSA's MUSCULAR program made waves when the news came out that the agency had tapped directly into Google and Yahoo internal networks in order to intercept data as it moved between their data centers. Encryption in transit wouldn't be much help there. Choose a cloud data encryption solution that will protect your data every step of the way - in transit to the cloud, at rest in the cloud, and even while in motion or in use in the cloud.
Pitfall 3: Forgetting your neighbors
Cloud computing security concerns can make companies hesitant to adopt the cloud, but they don't need to be. There is a solution to the data privacy challenges created by the cloud, and that solution is control. Maintain control of your data from the moment it leaves your perimeter throughout its life cycle in the cloud and maintain control of your encryption keys, and your data can remain safe no matter where it roams.
Reader Feedback: Page 1 of 1
Subscribe to the World's Most Powerful Newsletters
Today's Top Reads