Wednesday, September 28, 2011

Cloud lockdown – is the cloud secure?

One of the most common questions I hear is “is my data secure”?  You might think I’ve heard this question for my whole career, but I haven’t, I’ve really heard it in relation to cloud computing.  Why the difference, I truly don’t know.  Somehow when installing a server on site, there is a sense of peace of mind that since the physical box is within eye-sight, that the data is also secure.  Subsequently, when using a cloud app,many people assume that the data is not secure because they can’t see it.  In reality, data security should be thought of in the same way, regardless of whether it’s in a cloud or at an office building.  Data stored at your office may be secure, but it may not be; likewise data stored in a cloud may be secure, or it may not be.
Here are some transcendent things to use to evaluate the security of your data, regardless of where it is:
Physical Security: No matter where your data is, it is ultimately housed at one or more physical locations.  The more secure that physical location, the better. The most secure facilities include features such as locked doors (ideally man-traps where one door locks before the next opens), video cameras, windows that can’t shatter or that don’t impact the equipment, and security guards.  The more features, the better.  For instance, having a server locked in a room at your office is good, but using biometrics is even better.  Datacenters that cloud computing firms use typically offer all of these features and staff them 24×7.  Ultimately you need decide what level of security is the necessary and ideal for your business.
Virtual Security:
Once you are assured that your data is protected to your satisfaction from a physical standpoint, it’s time to evaluated virtual security.  A variety of options are available for virtual security including running and maintaining firewalls and other network equipment, watching areas such as operating system patches and updates, ensuring data transmission is encrypted by 128-bit or higher SSL or VPN’s, encryption of data that is stored, and secure login technology for authentication.  The best clouds employ all of the above.
Knowledge / Maintenance:
Once your data is secured physically and virtually it’s time to ensure that someone is watching that security and ensuring that the technology tools are used to the best of their ability. Finally, never underestimate the element the end-users bring to the table.  The best security in the world protects nothing once a user prints out sensitive data and lets it fall in the hands of unintended eyes.  For example, complex passwords should be encouraged, and password sharing prohibited regardless of whether you are storing your data on a computer in your office or in the cloud.  Personnel that are maintaining the physical and virtual security should be experienced and up-to-date on what they are doing.
While all of the above areas apply to both on-premise and cloud security, one area that is more applicable with the cloud is selecting a trust-worthy and reputable vendor.  Every vendor might show a seemingly impressive list of statistics, but it is up to you to determine what areas and values are important to you, and then look for a cloud company that meets your requirements.
If you do store data on premise, make sure that it is protected physically whether it’s from thieves or flooding, protected virtually from hackers, protected by staff that know what they are doing, make sure you are backing up off-site, and ultimately check and re-check frequently.
If you don’t have an environment that meets the rigorous demands of your business and is vulnerable in any of the ways mentioned here, consider a reputable cloud computing company as a way to meet the most demanding security requirements.
- written and published by Reviora, the leading provider of managed private cloud solutions for ERP software and hosted Dynamics. Call 888-REVIORA for questions or comments

No comments:

Post a Comment